Apple faces UK iCloud monopoly compensation claim worth $3.8B

U.K. consumer rights group ‘Which?’ is filing a legal claim against Apple under competition law on behalf of some 40 million users of iCloud, its cloud storage service.

The collective proceeding lawsuit, which is seeking £3 billion in compensation damages (around $3.8 billion at current exchange rates), alleges that Apple has broken competition rules by giving its own cloud storage service preferential treatment and effectively locking people into paying for iCloud at “rip-off” prices.

“iOS has a monopoly and is in control of Apple’s operating systems and it is incumbent on Apple not to use that dominance to gain an unfair advantage in related markets, like the cloud storage market. But that is exactly what has happened,” Which wrote in a press release announcing the filing of the claim with the U.K.’s Competition Appeal Tribunal (CAT).

The lawsuit accuses Apple of encouraging users of its devices to sign up for iCloud for photo storage and other data storage needs, while simultaneously making it difficult for consumers to use alternative storage providers — including by not allowing them to store or back up all of their phone’s data with a third-party provider.

“iOS users then have to pay for the service once photos, notes, messages and other data go over the free 5GB limit,” Which noted.

The suit also accuses Apple of overcharging U.K. consumers for iCloud subscriptions owing to the lack of competition. “Apple raised the price of iCloud for UK consumers by between 20% and 29% across its storage tiers in 2023,” it wrote, saying it’s seeking damages for all affected Apple customers — and estimating that individual consumers could be owed an average of £70 (around $90), depending on how long they’ve been paying Apple for iCloud services.

A similar lawsuit — arguing Apple unlawfully monopolized the market for cloud storage — was filed in the U.S. back in March and remains pending after the company failed to get it tossed.

[…]

Source: Apple faces UK ‘iCloud monopoly’ compensation claim worth $3.8B | TechCrunch

USAF Flight Test Boss on use of AI at Edwards

[…]

“Right now we’re at a point as generation AI is coming along and it’s a really exciting time. We’re experimenting with ways to use new tools across the entire test process, from test planning to test execution, from test analysis to test reporting. With investments from the Chief Digital and Artificial Intelligence Office [CDAO] we have approved under Control Unclassified Information [CUI] a large language model that resides in the cloud, on a government system, where we can input a test description for an item under test and it will provide us with a Test Hazard Analysis [THA]. It will initially provide 10 points, and we can request another 10, and another 10, etc, in the format that we already use. It’s not a finished product, but it’s about 90% there.”

“When we do our initial test brainstorming, it’s typically a very creative process, but that can take humans a long time to achieve. It’s often about coming up with things that people hadn’t considered. Now, instead of engineers spending hours working on this and creating the administrative forms, the AI program creates all of the points in the correct format, freeing up the engineers to do what humans are really good at – thinking critically about what it all means.”

“So we have an AI tool for THA, and now we’ve expanded it to generate test cards from our test plans that we use in the cockpit and in the mission control rooms. It uses the same large language model but trained on the test card format. So we input the detailed test plan, which includes the method of the test, measures of effectiveness, and we can ask it to generate test cards. Rather than spending a week generating these cards, it takes about two minutes!”

The X-62A takes off from Edwards AFB. Jamie Hunter

Wickert says the Air Force Test Center is also blending its AI tooling into test reporting to enable rapid analysis and “quick look” reports. For example, audio recordings of debriefs are now able to be turned into written reports. “That’s old school debriefs being coupled with the AI tooling to produce a report that includes everything that we talked about in the audio and it produces it in a format that we use,” explained Wickert.

“There’s also the AI that’s under test, when the system under test is the AI, such as the X-62A VISTA [Variable-stability In-flight Simulator Test Aircraft]. VISTA is a sandbox for testing out different AI agents, in fact I just flew it and we did a BVR [Beyond Visual Range] simulated cruise missile intercept under the AI control, it was amazing. We were 20 miles away from the target and I simply pushed a button to engage the AI agent and then we continued hands off and it flew the entire intercept and saddled up behind the target. That’s an example of AI under test and we use our normal test procedures, safety planning, and risk management all apply to that.”

“There’s also AI assistance to test. In our flight-test control rooms, if we’re doing envelope expansion, flutter, or loads, or handling qualities – in fact we’re about to start high angle-of-attack testing on the Boeing T-7, for example – we have engineers sitting there watching and monitoring from the control room. The broad task in this case is to compare the actual handling against predictions from the models to determine if the model is accurate. We do this as incremental step ups in envelope expansion, and when the reality and the model start to diverge, that’s when we hit pause because we don’t understand the system itself or the model is wrong. An AI assistant in the control room could really help with real-time monitoring of tests and we are looking at this right now. It has a huge impact with respect to digital engineering and digital material management.”

“I was the project test pilot on the Greek Peace Xenia F-16 program. One example of that work was that we had to test a configuration with 600-gallon wing tanks and conformal tanks, which equated to 22,000 pounds of gas on a 20,000-pound airplane, so a highly overloaded F-16. We were diving at 1.2 mach, and we spent four hours trying to hit a specific test point. We never actually  managed to hit it. That’s incredibly low test efficiency, but you’re doing it in a very traditional way – here’s a test point, go out and fly the test point, with very tight tolerances. Then you get the results and compare them to the model. Sometimes we do that real time, linked up with the control room, and it can typically take five or 10 minutes for each one. So, there’s typically a long time between test points before the engineer can say that the predictions are still good, you’re cleared to the next test point.”

A heavily-instrumented F-16D returns to Edwards AFB after a mission. Jamie Hunter

“AI in the control room can now do comparison work in real time, with predictive analysis and digital modeling. Instead of having a test card that says you need to fly at six Gs plus or minus 1/10th of a G, at 20,000 feet plus or minus 400 feet pressure altitude, at 0.8 mach plus or minus 0.05, now you can just fly a representative maneuver somewhere around 20,000 feet and make sure you get through 0.8 mach and just do some rollercoaster stuff and a turn. In real time in the control room you’re projecting the continuous data that you’re getting via the aircraft’s telemetry onto a reduced order model, and that’s the product.”

“When Dr Will Roper started trumpeting digital engineering, he was very clear that in the old days we graduated from a model to test. In the new era of digital engineering, we graduate from tests to a validated model. That’s with AI as an assistant, being smarter about how we do tests, with the whole purpose of being able to accelerate because the warfighter is urgently asking for the capability that we are developing.”

[…]

Source: Flight Test Boss Details How China Threat Is Rapidly Changing Operations At Edwards AFB

Now the copyright industry wants to apply deep, automated blocking to the Internet’s core routers

A central theme of Walled Culture the book (free digital versions available) and this blog is that the copyright industry is never satisfied. Now matter how long the term of copyright, publishers and recording companies want more. No matter how harsh the punishments for infringement, the copyright intermediaries want them to be even more severe.

Another manifestation of this insatiability is seen in the ever-widening use of Internet site blocking. What began as a highly-targeted one-off in the UK, when a court ordered the Newzbin2 site to be blocked, has become a favoured method of the copyright industry for cutting off access to thousands of sites around the world, including many blocked by mistake. Even more worryingly, the approach has led to blocks being implemented in some key parts of the Internet’s infrastructure that have no involvement with the material that flows through them: they are just a pipe. For example, last year we wrote about courts ordering the content delivery network Cloudflare to block sites. But even that isn’t enough it seems. A post on TorrentFreak reports on a move to embed site blocking at the very heart of the Internet. This emerges from an interview about the Brazilian telecoms regulator Anatel:

In an interview with Tele.Sintese, outgoing Anatel board member Artur Coimbra recalls the lack of internet infrastructure in Brazil as recently as 2010. As head of the National Broadband Plan under the Ministry of Communications, that’s something he personally addressed. For Anatel today, blocking access to pirate websites and preventing unauthorized devices from communicating online is all in a day’s work.

Here’s the key revelation spotted by TorrentFreak:

“The second step, which we still need to evaluate because some companies want it, and others are more hesitant, is to allow Anatel to have access to the core routers to place a direct order on the router,” Coimbra reveals, referencing IPTV [Internet Protocol television] blocking.

“In these cases, these companies do not need to have someone on call to receive the [blocking] order and then implement it.”

Later on, Coimbra clarifies how far along this plan is:

“Participation is voluntary. We are still testing with some companies. So, it will take some time until it actually happens,” Coimbra says. “I can’t say [how long]. Our inspection team is carrying out tests with some operators, I can’t say which ones.”

Even if this is still in the testing phase, and only with “some” companies, it’s a terrible precedent. It means that blocking – and thus censorship – can be applied automatically, possibly without judicial oversight, to some of the most fundamental parts of the Internet’s plumbing. Once that happens, it will spread, just as the original single site block in the UK has spread worldwide. There’s even a hint that might already be happening. Asked if such blocking is being applied anywhere else, Coimbra replies:

“I don’t know. Maybe in Spain and Portugal, which are more advanced countries in this fight. But I don’t have that information,” Coimbra responds, randomly naming two countries with which Brazil has consulted extensively on blocking matters.

Although it’s not clear from that whether Spain and Portugal are indeed taking this route, the fact that Coimbra suggests that they might be is deeply troubling. And even if they aren’t, we can be sure that the copyright industry will keep demanding Internet blocks and censorship at the deepest level until they get them.

Source: Now the copyright industry wants to apply deep, automated blocking to the Internet’s core routers – Walled Culture

Judge: Just Because AI Trains On Your Publication, Doesn’t Mean It Infringes On Your Copyright. Another case thrown out.

I get that a lot of people don’t like the big AI companies and how they scrape the web. But these copyright lawsuits being filed against them are absolute garbage. And you want that to be the case, because if it goes the other way, it will do real damage to the open web by further entrenching the largest companies. If you don’t like the AI companies find another path, because copyright is not the answer.

So far, we’ve seen that these cases aren’t doing all that well, though many are still ongoing.

Last week, a judge tossed out one of the early ones against OpenAI, brought by Raw Story and Alternet.

Part of the problem is that these lawsuits assume, incorrectly, that these AI services really are, as some people falsely call them, “plagiarism machines.” The assumption is that they’re just copying everything and then handing out snippets of it.

But that’s not how it works. It is much more akin to reading all these works and then being able to make suggestions based on an understanding of how similar things kinda look, though from memory, not from having access to the originals.

Some of this case focused on whether or not OpenAI removed copyright management information (CMI) from the works that they were being trained on. This always felt like an extreme long shot, and the court finds Raw Story’s arguments wholly unconvincing in part because they don’t show any work that OpenAI distributed without their copyright management info.

For one thing, Plaintiffs are wrong that Section 1202 “grant[ s] the copyright owner the sole prerogative to decide how future iterations of the work may differ from the version the owner published.” Other provisions of the Copyright Act afford such protections, see 17 U.S.C. § 106, but not Section 1202. Section 1202 protects copyright owners from specified interferences with the integrity of a work’s CMI. In other words, Defendants may, absent permission, reproduce or even create derivatives of Plaintiffs’ works-without incurring liability under Section 1202-as long as Defendants keep Plaintiffs’ CMI intact. Indeed, the legislative history of the DMCA indicates that the Act’s purpose was not to guard against property-based injury. Rather, it was to “ensure the integrity of the electronic marketplace by preventing fraud and misinformation,” and to bring the United States into compliance with its obligations to do so under the World Intellectual Property Organization (WIPO) Copyright Treaty, art. 12(1) (“Obligations concerning Rights Management Information”) and WIPO Performances and Phonograms Treaty….

Moreover, I am not convinced that the mere removal of identifying information from a copyrighted work-absent dissemination-has any historical or common-law analogue.

Then there’s the bigger point, which is that the judge, Colleen McMahon, has a better understanding of how ChatGPT works than the plaintiffs and notes that just because ChatGPT was trained on pretty much the entire internet, that doesn’t mean it’s going to infringe on Raw Story’s copyright:

Plaintiffs allege that ChatGPT has been trained on “a scrape of most of the internet,” Compl. , 29, which includes massive amounts of information from innumerable sources on almost any given subject. Plaintiffs have nowhere alleged that the information in their articles is copyrighted, nor could they do so. When a user inputs a question into ChatGPT, ChatGPT synthesizes the relevant information in its repository into an answer. Given the quantity of information contained in the repository, the likelihood that ChatGPT would output plagiarized content from one of Plaintiffs’ articles seems remote.

Finally, the judge basically says, “Look, I get it, you’re upset that ChatGPT read your stuff, but you don’t have an actual legal claim here.”

Let us be clear about what is really at stake here. The alleged injury for which Plaintiffs truly seek redress is not the exclusion of CMI from Defendants’ training sets, but rather Defendants’ use of Plaintiffs’ articles to develop ChatGPT without compensation to Plaintiffs. See Compl. ~ 57 (“The OpenAI Defendants have acknowledged that use of copyright-protected works to train ChatGPT requires a license to that content, and in some instances, have entered licensing agreements with large copyright owners … They are also in licensing talks with other copyright owners in the news industry, but have offered no compensation to Plaintiffs.”). Whether or not that type of injury satisfies the injury-in-fact requirement, it is not the type of harm that has been “elevated” by Section 1202(b )(i) of the DMCA. See Spokeo, 578 U.S. at 341 (Congress may “elevate to the status of legally cognizable injuries, de facto injuries that were previously inadequate in law.”). Whether there is another statute or legal theory that does elevate this type of harm remains to be seen. But that question is not before the Court today.

While the judge dismisses the case with prejudice and says they can try again, it would appear that she is skeptical they could do so with any reasonable chance of success:

In the event of dismissal Plaintiffs seek leave to file an amended complaint. I cannot ascertain whether amendment would be futile without seeing a proposed amended pleading. I am skeptical about Plaintiffs’ ability to allege a cognizable injury but, at least as to injunctive relief, I am prepared to consider an amended pleading.

I totally get why publishers are annoyed and why they keep suing. But copyright is the wrong tool for the job. Hopefully, more courts will make this clear and we can get past all of these lawsuits.

Source: Judge: Just Because AI Trains On Your Publication, Doesn’t Mean It Infringes On Your Copyright | Techdirt

Mapping the ionosphere with millions of phones

The ionosphere is a layer of weakly ionized plasma bathed in Earth’s geomagnetic field extending about 50–1,500 kilometres above Earth1. The ionospheric total electron content varies in response to Earth’s space environment, interfering with Global Satellite Navigation System (GNSS) signals, resulting in one of the largest sources of error for position, navigation and timing services2. Networks of high-quality ground-based GNSS stations provide maps of ionospheric total electron content to correct these errors, but large spatiotemporal gaps in data from these stations mean that these maps may contain errors3. Here we demonstrate that a distributed network of noisy sensors—in the form of millions of Android phones—can fill in many of these gaps and double the measurement coverage, providing an accurate picture of the ionosphere in areas of the world underserved by conventional infrastructure. Using smartphone measurements, we resolve features such as plasma bubbles over India and South America, solar-storm-enhanced density over North America and a mid-latitude ionospheric trough over Europe. We also show that the resulting ionosphere maps can improve location accuracy, which is our primary aim. This work demonstrates the potential of using a large distributed network of smartphones as a powerful scientific instrument for monitoring Earth.

[…]

Although measurements from individual mobile phones are noisier than those from conventional monitoring stations, we have shown that millions of phones in concert yield valuable measurements of ionospheric TEC. Other recent work has shown that phone accelerometers can detect earthquakes to provide early warning33 and that phone barometers can improve weather forecasting34. Building on these examples, our work continues to illuminate the potential for mobile phone sensors as a powerful tool to improve the scientific understanding of our planet.

Source: Mapping the ionosphere with millions of phones | Nature

Ubisoft Facing Lawsuit Over Shutting Down Online Game

In 2014, Ubisoft launched The Crew as an open-world, always-online racing game with a campaign and multiplayer mode. It was a fairly successful game for Ubisoft, spawning two sequels—The Crew 2 and Crew: Motorfest. But in December 2023, Ubisoft suddenly delisted the racing game from digital stores and, in April 2024, completely shut off its servers. This means that even if you bought a physical copy of the game, you can no longer play it. Now, two gamers in the United States who weren’t happy about this are filing a lawsuit against Ubisoft.

As reported by Polygon, on November 4 Matthew Cassell and Alan Liu filed a lawsuit in federal court. The main complaint of the recently filed lawsuit is that the two plaintiffs believe Ubisoft has “duped” consumers by telling them they are buying a game when in reality they are only “renting” a “limited license.” The lawsuit also says that Ubisoft rubbed “salt on the wound” by not making the single-player portion of The Crew playable offline.

[…]

Earlier this year, Ubisoft’s decision to kill The Crew’s servers and make them unplayable led to a firestorm online, and fueled a movement dedicated to fighting back against the ongoing practice of companies killing online games and making them unplayable after people have bought them. Currently, that group is looking for signatures to force European Union lawmakers to address the issue directly.

[…]

Funnily enough, Ubisoft announced in September that it was planning to make sure The Crew 2 and Motorfest get offline modes that will let people keep playing the games even after the servers are shut down. I wonder why they scrambled to announce that?

[…]

Source: Ubisoft Facing Lawsuit Over Shutting Down Always Online Game

LG’s New Stretchable Screen Can Morph like a Piece of Laffy Taffy

Imagine a display as flexible as plastic wrap—so malleable you could stretch it over your face in a futuristic impression of expert Saran-wrapping serial killer Dexter. LG is supposing the future will be full of such flexible displays, and its latest rendition of the concept screen is capable of stretching up to 50% of its normal length, mainly thanks to the same material used in contact lenses.

[…]

microLED. Like OLED, this display type allows for its self-emitting glow without any kind of backlight. MicroLED is so minuscule, it allows researchers to come up with some unique use cases, such as LG’s prototype.

Lg Bendy Display 1
© Image: LG

The Laffy Taffy screen uses a “special silicon material substrate,” according to LG. It’s the same kind of material used in soft contact lenses, and it’s wired in such a way that you can morph it without fear of breaking it. LG said it can be folded and stretched “over 10,000 times” and still maintain a clear image.

[…]

LG said this new display is 100 ppi (pixels per inch)

[…]

 

Source: LG’s New Stretchable Screen Can Morph like a Piece of Laffy Taffy

Pakistan limits outdoor activities, market hours to curb air pollution-related illness – attacks symptom but not cause

Pakistan’s Punjab province banned most outdoor activities and ordered shops, markets and malls in some areas to close early from Monday to curb illnesses caused by intense air pollution.
The province has closed educational institutions and public spaces like parks and zoos until Nov. 17 in places including Lahore, the world’s most polluted city in terms of air quality, according to Swiss group IQAir’s live ratings.
The districts of Lahore, Multan, Faisalabad and Gujranwala have seen an unprecedented rise in patients with respiratory diseases, eye and throat irritation, and pink eye disease, the Punjab government said in an order issued late on Sunday.
The new restrictions will also remain in force until Nov. 17.
“The spread of conjunctivitis/ pink eye disease due to bacterial or viral infection, smoke, dust or chemical exposure is posing a serious and imminent threat to public health,” the Punjab government said.
[…]
Lahore’s air quality remained hazardous on Monday, with an index score of more than 600, according to IQAir, but this was significantly lower than the 1,900 that it touched in places earlier this month.
A score of 0-50 is considered good.
[…]
Punjab has blamed its toxic air this year on pollution wafting in from India, where northern parts have also been battling hazardous air, and has said it will take the issue up with the neighbouring country through its foreign ministry.
India’s Supreme Court on Monday directed the Delhi government to decide by Nov. 25 on imposing a perpetual ban on firecrackers, legal news portal Bar and Bench reported.
Firecrackers set off by revellers on Diwali, the Hindu festival of lights celebrated on Oct. 31 this year despite a ban, have aggravated the region’s pollution problem.

Source: Pakistan limits outdoor activities, market hours to curb air pollution-related illness | Reuters

A hint – it’s not just the firecrackers mate. Look at the horrible 2 cylinder engines on the mopeds in the pictures for a start.

Retailers Eye Radio emitting ink on fibres to Stop Shoplifting

[…] small Spanish technology company, Myruns, and telecommunications operator Telefónica SA about the possible application of a system based on an anti-theft alarm product so thin it’s imperceptible to the naked eye

[…]

The technology from Myruns, in San Sebastian, Spain, may be just one of the efforts to curb thefts that have been studied by Inditex, which declined to comment on specific projects. Myruns’ product, which one of the people says is five times thinner than a human hair, or about a thousandth of an inch, uses a conductive ink derived from cellulose to transmit signals. It can set off alarms if someone walks out of a shop with items whose woven-in tags haven’t been deactivated, according to the people. The novel ink replaces aluminum, the main material used in most alarms. That would mean retailers wouldn’t need to rely on the metal for alarms, making the devices potentially biodegradable and supporting the garments’ recyclability.

Competitors that make threadlike radio-frequency identification (RFID) technology containing metals include Primo1D, an offshoot of a research center in Grenoble, France; and RFID Threads Ltd., in Nottingham, England, formerly known as Adetex.ID.

[…]

Pressure to improve profitability and reduce losses has pushed many retailers to step up their traditional anti-theft efforts. Inditex rival Hennes & Mauritz AB, or H&M, has increased the number of security guards at its stores, including in the US. Associated British Foods Plc’s Primark has also hired more security staff, in addition to investing in closed-circuit television systems and body cameras worn by staff. And in the UK, retailers such as John Lewis, Sainsbury’s and Tesco have teamed up with law enforcement to help fund a team of police and intelligence officers targeting shoplifters.

The lack of visible security can encourage shoplifting, but more drastic measures can impede sales, says Martin Gill, a UK-based consultant whose work involves testing retailers’ security by trying to steal things.

“Certain retail strategies, which aim to boost sales, have made it much easier to steal,” he says. “The key for good security is not to stop theft from happening at all costs, but do as much as possible to reduce the number of offenses. It’s always about the balance between sales and security.”

Source: Retailers Eye High-Tech Tags to Stop Shoplifting – Bloomberg

The Open Source Project DeFlock Is Mapping License Plate Surveillance Cameras All Over the World

[…] Flock is one of the largest vendors of automated license plate readers (ALPRs) in the country. The company markets itself as having the goal to fully “eliminate crime” with the use of ALPRs and other connected surveillance cameras, a target experts say is impossible.

In Huntsville, Freeman noticed that license plate reader cameras were positioned in a circle at major intersections, forming a perimeter that could track any car going into or out of the city’s downtown. He started to look for cameras all over Huntsville and the surrounding areas, and soon found that Flock was not the only game in town. He found cameras owned by Motorola, and a third, owned by a company called Avigilon (a subsidiary of Motorola). Flock and automated license plate reader cameras owned by other companies are now in thousands of neighborhoods around the country. Many of these systems talk to each other and plug into other surveillance systems, making it possible to track people all over the country.

[…]

And so he made a map, and called it DeFlock. DeFlock runs on Open Street Map, an open source, editable mapping software. He began posting signs for DeFlock to the posts holding up Huntsville’s ALPR cameras, and made a post about the project to the Huntsville subreddit, which got good attention from people who lived there.

[…]

When I first talked to Freeman, DeFlock had a few dozen cameras mapped in Huntsville and a handful mapped in Southern California and in the Seattle suburbs. A week later, as I write this, DeFlock has crowdsourced the locations of thousands of cameras in dozens of cities across the United States and the world.

“It still just scratches the surface,” Freeman said. “I added another page to the site that tracks cities and counties who have transparency reports on Flock’s site, and many of those don’t have any reported ALPRs though, so it’ll help people focus on where to look for them.”

[…]

He said so far more than 1,700 cameras have been reported in the United States and more than 5,600 have been reported around the world. He has also begun scraping parts of Flock’s website to give people a better idea of where to look to map them. For example, Flock says that Colton, California, a city with just over 50,000 people outside of San Bernardino, has 677 cameras.

A ring of Flock cameras in Huntsville’s downtown, pointing outward.

People who submit cameras to DeFlock have the ability to note the direction that they are pointing in, which can help people understand how these cameras are being positioned and the strategies that companies and police departments are using when deploying them.

[…]

Freeman also said he eventually wants to find a way to offer navigation directions that will allow people to avoid known ALPR cameras. The fact that it is impossible to drive in some cities without being passing ALPR cameras that track and catalog your car’s movements is one of the core arguments in a Fourth Amendment challenge to Flock’s existence in Norfolk, Virginia; this project will likely show how infeasible traveling without being tracked actually is in America. Knowing where they are is the first step toward resisting them.

Source: The Open Source Project DeFlock Is Mapping License Plate Surveillance Cameras All Over the World

Spotify’s Car Thing, Due For Bricking, Is Getting an Open Source Second Life

If you have Spotify’s soon-to-be-bricked Car Thing, there are a few ways you can give it a new lease on life. YouTuber Dammit Jeff has showcased modifications to Car Thing that makes the device useful as a desktop music controller, customizable shortcut tool, or a simple digital clock. Ars Technica’s Kevin Purdy reports: Spotify had previously posted the code for its uboot and kernel to GitHub, under the very unassuming name “spsgsb” and with no announcement (as discovered by Josh Hendrickson). Jeff has one idea why the streaming giant might not have made much noise about it: “The truth is, this thing isn’t really great at running anything.” It has half a gigabyte of memory, 4GB of internal storage, and a “really crappy processor” (Amlogic S905D2 SoC) and is mostly good for controlling music.

How do you get in? The SoC has a built-in USB “burning mode,” allowing for a connected computer, running the right toolkit, to open up root access and overwrite its firmware. Jeff has quite a few issues getting connected (check his video description for some guidance), but it’s “drag and drop” once you’re in. Jeff runs through a few of the most popular options for a repurposed Car Thing:

DeskThing, which largely makes Spotify desk-friendly, but adds a tiny app store for weather (including Jeff’s own WeatherWave), clocks, and alternate music controls
GlanceThing, which keeps the music controls but also provides some Stream-Deck-like app-launching shortcuts for your main computer.
Nocturne, currently invite-only, is a wholly redesigned Spotify interface that restores all its Spotify functionality.

Source: Spotify’s Car Thing, Due For Bricking, Is Getting an Open Source Second Life

Formula 1 drivers ask FIA to treat them like adults after swearing punishments

Formula 1 drivers have urged the sport’s governing body to treat them like adults after Max Verstappen and Charles Leclerc were punished for swearing.

The Grand Prix Drivers’ Association (GPDA) has also criticised FIA president Mohammed Ben Sulayem for his “tone and language” when addressing the topic.

An open letter from the GPDA said: “There is a difference between swearing intended to insult others and more casual swearing, such as you might use to describe bad weather, or indeed an inanimate object such as an F1 car, or a driving situation.

“We urge the FIA president to consider his own tone and language when talking to our member drivers, or indeed about them, whether in a public forum or otherwise.

“Further, our members are adults. They do not need to be given instructions by the media about matters as trivial as the wearing of jewellery or underpants.”

[…]

Source: Formula 1 drivers ask FIA to treat them like adults after swearing punishments – BBC Sport

Formula 1 has seen a crackdown on explicit language—the latest in a string of regulations enforced by the FIA in recent seasons. From restrictions on jewelry to mandates on underwear, F1’s governing body, the FIA, has implemented rules that some drivers feel have strayed too far into “trivial” territory.

In the wake of penalties imposed on drivers like Max Verstappen and Charles Leclerc for swearing, drivers are openly questioning the FIA’s governance, urging the organization to treat them as professionals and adults. They’re also calling for greater transparency, asking pointedly, “How are the FIA’s financial fines allocated and where are the funds spent?”

[…]

At the Singapore Grand Prix press conference, Max Verstappen used a swear word to bluntly describe what the car felt like, his frustrations deep. Within a day, the FIA summoned him, citing a violation of the International Sporting Code, ultimately imposing a community service penalty.

[…]

Even Lewis Hamilton weighed in, saying Verstappen should refuse the community service requirement because his penalty was too harsh. “I think it’s a bit of a joke, to be honest,” said Hamilton. “This is the pinnacle of the sport. Mistakes are made…I certainly [wouldn’t] be doing it and I hope Max doesn’t do it,” said the Briton.

[…]

Most recently, Charles Leclerc also found himself in hot water after he swore during a press conference post-Mexican Grand Prix. The Monegasque apologized immediately after so was let off with a fine of €10,000, half of which will be suspended for a year and no community service.

[…]

Perhaps the move for stricter decorum in Formula 1 also has to do with wider broadcast decency standards. With Formula 1’s recent reportedly $90 million per year broadcast deal with ESPN, the sport is increasingly aligning with the United States’ strict media standards, where explicit language is heavily monitored—a move indicating that the sport is trying to align with American market demands and more conservative media norms.

[…]

Source: F1 Drivers Draw A Line: What’s Behind The FIA’s Swearing Crackdown?

Remember, the drivers voices are not broadcast real time and the swearing is usually bleeped out (which is disappointing as well)

LignoSat: First wood-panelled satellite launched into space

The world’s first wood-panelled satellite has been launched into space to test the suitability of timber as a renewable building material in future exploration of destinations like the Moon and Mars.

Made by researchers in Japan, the tiny satellite weighing just 900g is heading for the International Space Station […]. It will then be released into orbit above the Earth.

Named LignoSat, after the Latin word for wood, its panels have been built from a type of magnolia tree, using a traditional technique without screws or glue.

Researchers at Kyoto University who developed it hope it may be possible in the future to replace some metals used in space exploration with wood.

“Wood is more durable in space than on Earth because there’s no water or oxygen that would rot or inflame it,” Kyoto University forest science professor Koji Murata told Reuters news agency.

[…]

Dr Barber said it wasn’t the first time that wood had been used on spacecraft.

“We use wood – cork – on the re-entry, outer shell of vessels of spacecraft to help them survive re-entry into Earth’s atmosphere.”

Russian and Soviet lunar landers used cork to help the rover have grip as it was descending to the surface, he added.

“There’s nothing wrong with using wood in space – it’s using the right material for the right task.”

He pointed out that wood has properties that are hard to control.

“So from an engineering point of view it’s quite a difficult material to work with… I think wood’s always going to have a problem to make critical structures like parts of spacecraft where you need to predict how strong it’s going to be.”

The researchers at Kyoto University hope using wood in making spacecraft could also be much less polluting than metal ones when they burn-up on re-entry at the end of their life.

[…]

Source: LignoSat: First wood-panelled satellite launched into space

Corning facing EU antitrust suit over Gorilla Glass seals

Corning’s Gorilla Glass is found in countless tech products, from smartphones and wearables to automobile windshields, and the European Commission has an inkling its success is due in part to the US-based business cutting anticompetitive deals.

The EC announced a formal antitrust investigation into Corning yesterday, accusing the company of abusing its dominant position as a maker of glass screens for mobile electronics, claiming the end result was the exclusion of rival glass manufacturers from the market.

The strategy ultimately caused consumers to pay higher prices, has made repairs tougher and reduced manufacturer innovation, the EC argued.

“It is very frustrating and costly experience to break a mobile phone screen,” said EC competition chief Margrethe Vestager. “Therefore, strong competition in the production of the cover glass used to protect such devices is crucial to ensure low prices and high-quality glass.

“We are investigating if Corning, a major producer of this special glass, may have tried to exclude rival glass producers, thereby depriving consumers from cheaper and more break-resistant glass,” Vestager added.

Gorilla Glass is Corning’s branding for its alkali-aluminosilicate (alkali-AS) glass screens, a chemical composite that’s more break-resistant than other types of glass, making it particularly suited for use on smartphones, wearables, laptops and tablets. Gorilla Glass can be found on devices from manufacturers including Google, Samsung, Sony, Apple and other globally recognized brands.

The Commission is concerned that Corning has abused its position with both mobile OEMs and companies that process raw glass, known as finishers. According to the EC, Corning’s OEM agreements included requirements that companies source their alkali-AS glass exclusively from Corning, for which they would receive rebates, and that OEMs report all competitive offers from rivals to Corning to give it a chance to match the price.

Pertaining to finishers, the EC alleges Corning pressed them into similar sourcing exclusivity obligations, as well as including clauses that prevented finishers from challenging Corning patents.

As this is just an opening of proceedings against Corning, the EC said Corning hasn’t been proven guilty yet. With Corning accused of violating Article 102 of the Treaty of the Functioning of the EU, the business could face fines of up to 10 percent of its annual turnover if found guilty of abusing its market dominance.

Source: Corning facing EU antitrust suit over Gorilla Glass seals • The Register

Plastic pollution is changing entire Earth system, scientists find

[…]

In 2022 at least 506m tonnes of plastics were produced worldwide, but only 9% gets recycled globally. The rest is burned, landfilled or dumped where it can leach into the environment. Microplastics are now everywhere, from the top of Mount Everest to the Mariana Trench, the deepest point on earth.

The new study of plastic pollution examined the mounting evidence of the effects of plastics on the environment, health and human wellbeing. The authors are urging delegates at the UN talks to stop viewing plastic pollution as merely a waste problem, and instead to tackle material flows through the whole life pathway of plastic, from raw material extraction, production and use, to its environmental release and its fate, and the Earth system effects.

“It’s necessary to consider the full life cycle of plastics, starting from the extraction of fossil fuel and the primary plastic polymer production” said the article’s lead author, Patricia Villarrubia-Gómez, at Stockholm Resilience Centre.

The research team showed that plastics pollution was changing the processes of the entire Earth system, and affected all pressing global environmental problems, including climate change, biodiversity loss, ocean acidification, and the use of freshwater and land.

“Plastics are seen as those inert products that protect our favourite products, or that make our lives easier that can be “easily cleaned-up” once they become waste,” Villarrubia-Gómez said. “But this is far from reality. Plastics are made out of the combination of thousands of chemicals. Many of them, such as endocrine disruptors and forever chemicals, pose toxicity and harm to ecosystems and human health. We should see plastics as the combination of these chemicals with which we interact on a daily basis.”

[…]

“We now find plastics in the most remote regions of the planet and in the most intimate, within human bodies. And we know that plastics are complex materials, released to the environment throughout the plastics life cycle, resulting in harm in many systems.

“The solutions we strive to develop must be considered with this complexity in mind, addressing the full spectra of safety and sustainability to protect people and the planet.”

Source: Plastic pollution is changing entire Earth system, scientists find | Plastics | The Guardian

Things no one wants: Microsoft rolls out bloated AI-enabled Notepad

Windows Insiders will soon get firsthand experience of Microsoft’s AI ambitions for Paint and Notepad: the image editor is getting Generative Fill and Erase and the text editor is getting a Rewrite function.

We’d been hearing since January that Microsoft Notepad would get an AI makeover – and yesterday it was confirmed Microsoft will roll out a new version of the text editor with generative AI options.

Dubbed “Rewrite,” the function takes a text selection and rewrites it based on the user’s selections of tone, format, and length. So if, for example, a user has text that they think is too wordy or casual, Rewrite will provide three variations they can pick from. Alternatively, the user can opt to revert to the original text.

[…]

Source: Microsoft rolls out AI-enabled Notepad to Windows Insiders • The Register

Notepad was useful because it was small. Very small. And fast. All these extra features slow it down. It should be simple. Bring back wordpad if you want this kind of feature bloat.

Hacker bans thousands of Call of Duty gamers through anti-cheat software, shows how dangerous this poorly written kernel acces junk is.

In October, video game giant Activision said it had fixed a bug in its anti-cheat system that affected “a small number of legitimate player accounts,” who were getting banned because of the bug.

In reality, according to the hacker who found the bug and was exploiting it, they were able to ban “thousands upon thousands” of Call of Duty players, who they essentially framed as cheaters. The hacker, who goes by Vizor, spoke to TechCrunch about the exploit, and told their side of the story.

“I could have done this for years and as long as I target random players and no one famous it would have gone without notice,” said Vizor, who added that it was “funny to abuse the exploit.”

[…]

In 2021, Activision released its Ricochet anti-cheat system, which runs at the kernel level in an attempt to make it even harder for cheat developers to get around it.

Vizor said they were able to find a unique way to exploit Ricochet, and use it against the players it was supposed to protect. The hacker realized Ricochet was using a list of specific hardcoded strings of text as “signatures” to detect hackers. For example, Vizor said, one of the strings was the words “Trigger Bot,” which refers to a type of cheat that automatically triggers a cheater’s weapon when their crosshair is over a target.

Vizor said they could simply send a private message — known as a “whisper” in the game — that included one of these hardcoded strings, such as “Trigger Bot,” and get the player they were messaging banned from the game.

“I realized that Ricochet anti-cheat was likely scanning players’ devices for strings to determine who was a cheater or not. This is fairly normal to do but scanning this much memory space with just an ASCII string and banning off of that is extremely prone to false positives,” said Vizor, referring to how the game was effectively scanning for banned keywords, regardless of context.

[…]

“If you know what signature the anti-cheat is looking for, I find a mechanism to get those bytes in your game process and you get banned,” said the person, who asked to remain anonymous. “I can’t believe [Activision] are banning people on a memory scan of ‘trigger bot.’ That is so incredibly stupid. And they should have been protecting the signatures. That’s amateur hour.”

Apart from random players, Vizor said they targeted some well-known players, too. In the period of time Vizor was using the exploit, some video game streamers posted on X that they had been banned, and then unbanned, once Activision fixed the bug.

The company was alerted of the existence of the bug when Zebleer published details of the exploit on X.

“It was nice to see it get fixed and see unbans,” said Vizor. “I had my fun.”

Source: Hacker says they banned ‘thousands’ of Call of Duty gamers by abusing anti-cheat flaw | TechCrunch

What this article misses is that anti-cheat programs have kernel level access to your system. This means that they are able to not only read anything anywhere on your system, but they are also able to alter whatever they like on your system. It’s not just spyware, but a potential virus or ransomware application just waiting to be hijacked. The ease with which this was exploited shows how dangerous these programs are. Expect more exploits through this route, as they are coded extremely poorly, apparently.

Singapore to increase road capacity by GPS tracking all vehicles. Because location data is not sensitive and will never be hacked *cough*

Singapore’s Land Transport Authority (LTA) estimated last week that by tracking all vehicles with GPS it will be able to increase road capacity by 20,000 over the next few years.

The densely populated island state is moving from what it calls Electric Road Pricing (ERP) 1.0 to ERP 2.0. The first version used gantries – or automatic tolls – to charge drivers a fee through an in-car device when they used specific roadways during certain hours.

ERP 2.0 sees the vehicle instead tracked through GPS, which can tell where a vehicle is at all operating times.

“ERP 2.0 will provide more comprehensive aggregated traffic information and will be able to operate without physical gantries. We will be able to introduce new ‘virtual gantries,’ which allow for more flexible and responsive congestion management,” explained the LTA.

But the island’s government doesn’t just control inflow into urban areas through toll-like charging – it also aggressively controls the total number of cars operating within its borders.

Singapore requires vehicle owners to bid for a set number of Certificates of Entitlement – costly operating permits valid for only ten years. The result is an increase of around SG$100,000 ($75,500) every ten years, depending on that year’s COE price, on top of a car’s usual price. The high total price disincentivizes mass car ownership, which helps the government manage traffic and emissions.

[…]

Source: Singapore to increase road capacity by GPS tracking vehicles • The Register

Synology and QNAP hurry out patches for zero-days exploited at Pwn2Own

S

Synology, a Taiwanese network-attached storage (NAS) appliance maker, patched two critical zero-days exploited during last week’s Pwn2Own hacking competition within days.

Midnight Blue security researcher Rick de Jager found the critical zero-click vulnerabilities (tracked together as CVE-2024-10443 and dubbed RISK:STATION) in the company’s Synology Photos and BeePhotos for BeeStation software.

As Synology explains in security advisories published two days after the flaws were demoed at Pwn2Own Ireland 2024 to hijack a Synology BeeStation BST150-4T device, the security flaws enable remote attackers to gain remote code execution as root on vulnerable NAS appliances exposed online.

“The vulnerability was initially discovered, within just a few hours, as a replacement for another Pwn2Own submission. The issue was disclosed to Synology immediately after demonstration, and within 48 hours a patch was made available which resolves the vulnerability,” Midnight Blue said.

“However, since the vulnerability has a high potential for criminal abuse, and millions of devices are affected, a media reach-out was made to inform system owners of the issue and to stress the point that immediate mitigative actions are required.”

Synology says it addressed the vulnerabilities in the following software releases; however, they’re not automatically applied on vulnerable systems, and customers are advised to update as soon as possible to block potential incoming attacks:

  • BeePhotos for BeeStation OS 1.1: Upgrade to 1.1.0-10053 or above
  • BeePhotos for BeeStation OS 1.0: Upgrade to 1.0.2-10026 or above
  • Synology Photos 1.7 for DSM 7.2: Upgrade to 1.7.0-0795 or above.
  • Synology Photos 1.6 for DSM 7.2: Upgrade to 1.6.2-0720 or above.

QNAP, another Taiwanese NAS device manufacturer, patched two more critical zero-days exploited during the hacking contest within a week (in the company’s SMB Service and Hybrid Backup Sync disaster recovery and data backup solution).

[…]

Source: Synology hurries out patches for zero-days exploited at Pwn2Own

Usually the POC is given to the company around 30 days before disclosure. That is what makes it ‘responsible disclosure’.

Fake job postings proliferate in layoff-hit tech industry

f you didn’t hear back about that great-looking tech position you applied for, it might not be because there were too many applicants scrambling to find a job amid rolling layoffs. There’s a distinct possibility the posting was fake to begin with.

We’re talking here about “ghost jobs” a practice of posting openings for positions that are fake, already filled, or intended for internal applicants and only opened to the public for legal purposes.

[…]

According to research published in August by MyPerfectResume, 81 percent of recruiters admitted to posting ghost jobs, with 41 percent saying half or more of the jobs they post are straight-up fake. Resume Builder similarly found by speaking to more than a thousand hiring managers that 40 percent of companies posted fake jobs in the past year, and that three in ten had active fake openings posted as of June, when it published its report.

Resumes, ghost openings are the lash

According to those two reports, the reasons companies post ghost jobs are, frankly, insidious. While some ghost posts are about collating a list of outside talent for future roles or making it appear like a company is growing when it isn’t, the other justifications basically boil down to torturing employees into working harder.

Resume Builder found that 63 percent of hiring managers posted ghost jobs to signal to overworked employees that relief was on the way, while 62 percent said they did it to make employees feel replaceable. MyPerfectResume found similar justifications, in addition to maintaining a presence on job boards while not hiring, “assess how difficult it would be to replace certain employees,” and “make the company look viable during a hiring freeze.”

[…]

Legal news site Above The Law noted earlier this year that there aren’t any laws against posting ghost jobs, meaning the practice is likely to continue as more tech workers find themselves adrift from a job and frantically looking for a safe harbor.

“It’s a concerning scenario, particularly when these misleading postings originate from HR departments — the very entities entrusted with shaping accurate perceptions of their organizations,” said Stacie Haller, chief career advisor at Resume Builder. “Whether it’s to create an illusion of company expansion or to foster a sense of replaceability among employees, such practices are not acceptable.”

Creating laws to eliminate ghost job postings may be easier said than done, Above The Law noted. It’s likely a state matter, tax attorney Steven Chung wrote, but he noted that any legislation would need to toe a fine line between enforcing fair postings and leaving companies in a position to have to hire people that might not be the right fit.

“Businesses have incentives to post job openings they do not intend to fill,” Chung said. “Governments should investigate this to make sure that job seekers are not led on wild goose chases while giving enough flexibility to allow businesses to hire anyone based on good business judgment.”

[…]

Apologies to the laid-off masses in the tech industry and beyond, but it looks like you’ll end up wasting time in your job hunt applying for fake positions, and it’s all perfectly legal. ®

Source: Fake job postings proliferate in layoff-hit tech industry • The Register

How The Army Will Use Its Super Integrated Air Defense System

Developed in partnership with Northrop Grumman, the Integrated Battle Command System, or IBCS, is the beating heart of the U.S. Army’s future air and missile defense architecture.

[…]

This system networks with current and future sensors and weapons platforms – regardless of source, service, or domain – to create an integrated fire control network that identifies and engages air and missile threats. Its modular, open and scalable architecture allows users a sensor-fused, highly accurate, rapidly actionable ‘picture’ of the full battlespace.

IBCS tackles evolving air and missile threats, from incoming drone swarms to hypersonic weapons, while creating a ‘any sensor, best shooter’ strategy. This enables operators to select the optimal effector for the situation.

[…]

The challenge lies in detecting and optimally engaging these diverse threats with all available defense systems.

Over the years, the U.S. Army has made significant investments in systems like Patriot, which is a medium-range air defense system, and THAAD, which is a system for intercepting short, medium, and intermediate-range ballistic missiles. These systems were traditionally designed to be tightly coupled between the command-and-control [C2], the sensors, and the effectors, making interoperability with other systems very difficult.

IBCS’s big idea is a network-enabled, Modular Open System Approach [MOSA]-designed command-and-control architecture, which essentially componentizes systems like Patriot. Meaning you remove the command and control – and then adapt the sensor [the Patriot radar] and adapt the launcher effector onto an integrated fire-control network.

The IBCS architecture integrates various sensors and effectors into a unified network. It is capable of collecting data from across the domains of ground, air, maritime, and space, to create a single integrated air picture that identifies all inbound threats.

An IBCS Engagement Operations Center is unloaded from a C-5 Galaxy transport aircraft. U.S. Army

[…]

There are essentially three major equipment items in IBCS. There’s the Engagement Operations Center [EOC], which you can think of as a shelter that mounts on the back of a five-ton truck and it’s got an antenna mast and has the communications onboard. The EOC is where the soldiers plan and fight the battle. This remotes into something that we call the Integrative Collaborative Environment [ICE], which is essentially a standard Army AirBeam tent. The ICE is where soldiers plan and fight the air battle. IBCS provides for remoting up to 10 operator workstations into the ICE. Within the EOC, you have two operator workstations which affords the capability for operators to employ and fight the system while the ICE is being established.
[…]

Today, with a standard U.S. Army Patriot, if you lose the Engagement Control Station at the battery level, then that battery is out of action. So culturally, this is a big change. Patriot was designed in the 1970s and was fielded in the 1980s, so employment thinking is still dominated by experience with Patriot. IBCS genuinely changes the paradigm for deploying whole battalions through its network architecture design that enables tailoring to enable employment of air and missile defense task forces. This means that rather than deploying a complete Patriot battalion, a commander could deploy a task force encompassing multiple types of sensors and effectors tailored for a specific mission. This provides commanders with a high degree of operational flexibility.

It’s also worth underlining the power of this open systems architecture. Traditionally, to perform a PAC-3 missile engagement, the uplink to the missile has to be performed through the radar. That’s very limiting because it means you have to deploy launchers in a position where they’re in proximity to the radar to be able to affect that uplink. This means you’re effectively constraining the range of the missile and the battlespace for performing engagements.

The Army has developed a capability called Remote Interceptor Guidance 360, or RIG-360, which is essentially an antenna uplink device that can be positioned at various locations on the battlefield. It removed the need to physically tether launchers and effectors to the location of the radar, so it’s an additional decoupling and dependency from a sensor.

[…]

IBCS is designed to communicate with other platforms and command-and control systems across a number of data links to include Link 16 datalink and MADL [Multifunction Advanced Data Link]. In flight testing, IBCS has demonstrated the capability to integrate with F-35. In addition, one of the engineering initiatives the Army has pursued with the Missile Defense Agency, and which we have supported, is a bridging technology known as the Joint Track Management Capability, or JTMC bridge.

The U.S. Navy has a very similar kind of system like IBCS called Cooperative Engagement Capability [CEC]. CEC takes data from multiple platforms, such as SPY-6 radar on AEGIS-class ships, E-2D Hawkeye, U.S. Marine Corps’ G/ATOR radar [AN/TPS-80 Ground/Air Task-Oriented Radar], and and integrates the data to create a high-fidelity quality track that is distributed across the network. The bridge enables the passing of data back and forth between the two networks to create a single integrated air picture.

TWZ: How does IBCS physically connect to the distributed systems at long ranges, and how might it plug into JADC2 in the future?

Lamb: IBCS is capable of being connected over long distances via fiber optics and satellite communications. We’ve demonstrated its ability to link with airborne platforms and sensors across various domains, with data displayed in command centers thousands of miles away.

[…]

over the last year or so we’ve been integrating the Army’s Lower Tier Air and Missile Defense Sensor, known as LTAMDS. The Army also has plans to integrate the latest Sentinel A4 radar, and it announced plans to integrate THAAD [Terminal High-Altitude Air Defense]. There’s also a budget for deeper integration of the F-35 fighter as well as with passive sensors.

[…]

Source: How The Army Will Use Its Super Integrated Air Defense System

TL;DR – this system takes all sensors into a central network and allows the what is detected to be fed to any weapons system, develop a firing solution and then engage. This means that if a hugely expensive patriot detects a tiny drone, you don’t need to engage the drone with that but can easily hand off the target to a cheaper weapons system and engage with that instead.

Using mathematics to better understand cause and effect

Consider an example from climate science. Experts studying large atmospheric circulation patterns and their impacts on global weather would like to know how these systems might change with warming climates. Here, many variables come into play: ocean and air temperatures and pressures, ocean currents and depths, and even details of the earth’s rotation over time. But which variables cause which measured effects?

That is where information theory comes in as the framework to formulate causality. Adrián Lozano-Durán, an associate professor of aerospace at Caltech, and members of his group both at Caltech and MIT have developed a method that can be used to determine causality even in such complex systems.

The new mathematical tool can tease out the contributions that each variable in a system makes to a measured effect — both separately and, more importantly, in combination. The team describes its new method, called synergistic-unique-redundant decomposition of causality (SURD), in a paper published today, November 1, in the journal Nature Communications.

The new model can be used in any situation in which scientists are trying to determine the true cause or causes of a measured effect. That could be anything from what triggered the downturn of the stock market in 2008, to the contribution of various risk factors in heart failure, to which oceanic variables affect the population of certain fish species, to what mechanical properties are responsible for the failure of a material.

“Causal inference is very multidisciplinary and has the potential to drive progress across many fields,” says Álvaro Martínez-Sánchez, a graduate student at MIT in Lozano-Durán’s group, who is lead author of the new paper.

For Lozano-Durán’s group, SURD will be most useful in designing aerospace systems. For instance, by identifying which variable is increasing an aircraft’s drag, the method could help engineers optimize the vehicle’s design.

“Previous methods will only tell you how much causality comes from one variable or another,” explains Lozano-Durán. “What is unique about our method is its ability to capture the full picture of everything that is causing an effect.”

The new method also avoids the incorrect identification of causalities. This is largely because it goes beyond merely quantifying the effect produced by each variable independently. In addition to what the authors refer to as “unique causality,” the method incorporates two new categories of causality, namely redundant and synergistic causality.

Redundant causality occurs when more than one variable produces a measured effect, but not all the variables are needed to arrive at the same outcome. For example, a student can get a good grade in class because she is very smart or because she is a hard worker. Both could result in the good grade, but only one is necessary. The two variables are redundant.

Synergistic causality, on the other hand, involves multiple variables that must work together to produce an effect. Each variable on its own will not yield the same outcome. For instance, a patient takes medication A, but he does not recuperate from his illness. Similarly, when he takes medication B, he sees no improvement. But when he takes both medications, he fully recovers. Medications A and B are synergistic.

SURD mathematically breaks down the contributions of each variable in a system to its unique, redundant, and synergistic components of causality. The sum of all these contributions must satisfy a conservation-of-information equation that can then be used to figure out the existence of hidden causality, i.e., variables that could not be measured or that were thought not to be important. (If the hidden causality turns out to be too large, the researchers know they need to reconsider the variables they included in their analysis.)

To test the new method, Lozano-Durán’s team used SURD to analyze 16 validation cases — scenarios with known solutions that would normally pose significant challenges for researchers trying to determine causality.

“Our method will consistently give you a meaningful answer across all these cases,” says Gonzalo Arranz, a postdoctoral researcher in the Graduate Aerospace Laboratories at Caltech, who is also an author of the paper. “Other methods mix causalities that should not be mixed, and sometimes they get confused. They get a false positive identifying a causality that doesn’t exist, for example.”

In the paper, the team used SURD to study the creation of turbulence as air flows around a wall. In this case, air flows more slowly at lower altitudes, close to the wall, and more quickly at higher altitudes. Previously, some theories of what is happening in this scenario have suggested that the higher-altitude flow influences what is happening close to the wall and not the other way around. Other theories have suggested just the opposite — that the air flow near the wall affects what is happening at higher altitudes.

“We analyzed the two signals with SURD to understand in which way the interactions were happening,” says Lozano-Durán. “As it turns out, causality comes from the velocity that is far away. In addition, there is some synergy where the signals interact to create another type of causality. This decomposition, or breaking into pieces of causality, is what is unique for our method.”


Story Source:

Materials provided by California Institute of Technology. Note: Content may be edited for style and length.


Journal Reference:

  1. Álvaro Martínez-Sánchez, Gonzalo Arranz, Adrián Lozano-Durán. Decomposing causality into its synergistic, unique, and redundant components. Nature Communications, 2024; 15 (1) DOI: 10.1038/s41467-024-53373-4

Source: Using mathematics to better understand cause and effect | ScienceDaily

The Prompt Report: A Systematic Survey of AI Prompting Techniques

Generative Artificial Intelligence (GenAI) systems are being increasingly deployed across all parts of industry and research settings. Developers and end users interact with these systems through the use of prompting or prompt engineering. While prompting is a widespread and highly researched concept, there exists conflicting terminology and a poor ontological understanding of what constitutes a prompt due to the area’s nascency. This paper establishes a structured understanding of prompts, by assembling a taxonomy of prompting techniques and analyzing their use. We present a comprehensive vocabulary of 33 vocabulary terms, a taxonomy of 58 text-only prompting techniques, and 40 techniques for other modalities. We further present a meta-analysis of the entire literature on natural language prefix-prompting.

Source: [2406.06608] The Prompt Report: A Systematic Survey of Prompting Techniques

An International Hackerspace Map

If you’re looking for a hackerspace while on your travels, there is more than one website which shows them on a map, and even tells you whether or not they are open. This last feature is powered by SpaceAPI, a standard way for hackerspaces to publish information about themselves, including whether or not they are closed.

Given such a trove of data then it’s hardly surprising that [S3lph] would use it to create a gigantic map of central Europe with lights in the appropriate places (German language, Google Translate link) to show the spaces and their status.

The lights are a set of addressable LEDs and the brain is an ESP32, making this an accessible project for most hackers with the time to assemble it. Unsurprisingly then it’s not the first such map we’ve seen, though it’s considerably more ambitious than the last one. Meanwhile if your hackerspace doesn’t have SpaceAPI yet or you’re simply curious about the whole thing, we took a look at it back in 2021.

Thanks [Dave] for the tip.

Source: An International Hackerspace Map | Hackaday

Bezos’ fear of Trump costs Washington Post: cancellations hit 250,000 – 10% of subscribers

Deterioration of the Washington Post’s subscriber base continued on Tuesday, hours after its proprietor, Jeff Bezos, defended the decision to forgo formally endorsing a presidential candidate as part of an effort to restore trust in the media.

The publication has now shed 250,000 subscribers, or 10% of the 2.5 million customers it had before the decision was made public on Friday, according to the NPR reporter David Folkenflik.

A day earlier, 200,000 had left according to the same outlet.

[…]

Source: Washington Post cancellations hit 250,000 – 10% of subscribers | Washington Post | The Guardian

See also: Washington Post and NYTimes suppressed by fascist Trump Through Billionaire Cowardice