WTF! Telegram messaging app CEO Durov arrested in France

PARIS, Aug 24 (Reuters) – Pavel Durov, the Russian-French billionaire founder and CEO of the Telegram messaging app, was arrested at Bourget airport outside Paris on Saturday evening, TF1 TV and BFM TV said, citing unidentified sources.
Durov was travelling aboard his private jet, TF1 said on its website, adding he had been targeted by an arrest warrant in France as part of a preliminary police investigation.
TF1 and BFM both said the investigation was focused on a lack of moderators on Telegram, and that police considered that this situation allowed criminal activity to go on undeterred on the messaging app.
Durov faces possible indictment on Sunday, according to French media.
The encrypted Telegram, with close to one billion users, is particularly influential in Russia, Ukraine and the republics of the former Soviet Union. It is ranked as one of the major social media platforms after Facebook, YouTube, WhatsApp, Instagram, TikTok and Wechat.
Telegram did not immediately respond to a Reuters request for comment. The French Interior Ministry and police had no comment.
Russian-born Durov founded Telegram with his brother in 2013. He left Russia in 2014 after refusing to comply with government demands to shut down opposition communities on his VKontakte social media platform, which he sold.
“I would rather be free than to take orders from anyone,” Durov told U.S. journalist Tucker Carlson in April about his exit from Russia and search for a home for his company which included stints in Berlin, London, Singapore and San Francisco.
After Russia launched its invasion of Ukraine in 2022, Telegram has become the main source of unfiltered – and sometimes graphic and misleading – content from both sides about the war and the politics surrounding the conflict.
The platform has become what some analysts call ‘a virtual battlefield’ for the war, used heavily by Ukraine’s President Volodymyr Zelenskiy and his officials, as well as the Russian government.
Telegram – which allows users to evade official scrutiny – has also become one of the few places where Russians can access independent news about the war after the Kremlin increased curbs on independent media following its invasion of Ukraine.
The Russian foreign ministry said its embassy in Paris was clarifying the situation around Durov and called on Western non-governmental organisations to demand his release.
[…]
F1 said Dubai-based Durov had been travelling from Azerbaijan and was arrested at around 8 p.m. (1800 GMT).
Durov, whose fortune was estimated by Forbes at $15.5 billion, said some governments had sought to pressure him but the app should remain a “neutral platform” and not a “player in geopolitics”.
Telegram’s increasing popularity, however, has prompted scrutiny from several countries in Europe, including France, on security and data breach concerns.
Russia’s representative to international organisations in Vienna, Mikhail Ulyanov, and several other Russian politicians were quick on Sunday to accuse France of acting as a dictatorship – the same criticism that Moscow faced when putting demands on Durov in 2014 and trying to ban Telegram in 2018.
[…]

Source: Telegram messaging app CEO Durov arrested in France | Reuters

Telegram – unlike twitter, extwitter, or ex or whatever that moron is calling it today – is a place where you actually can be anonymous and free and for a European country to heavy-handidly slamming on the brakes like this hearkens more to a totalitarian Russia than a free France. France should be ashamed of itself and Europeans should be worried.

Good sleep habits important for overweight adults, different effects for men and women

New research from Oregon Health & Science University reveals negative health consequences for people who are overweight and ignore their body’s signals to sleep at night, with specific differences between men and women.

The study published this week in The Journal of Clinical Endocrinology & Metabolism.

“This study builds support for the importance of good sleep habits,” said lead author Brooke Shafer, Ph.D., a postdoctoral researcher in the Sleep, Chronobiology and Health Laboratory in the OHSU School of Nursing. “Sleep practices, like going to bed when you’re tired or setting aside your screen at night, can help to promote good overall health.”

The study recruited 30 people, split evenly between men and women. All had a body mass index above 25, which put them into an overweight or obese category.

[…]

Generally healthy participants contributed a saliva sample every 30 minutes until late in the night at a sleep lab on OHSU’s Marquam Hill campus to determine the time at which their body started naturally producing the hormone melatonin. Melatonin is generally understood to begin the process of falling asleep, and its onset varies with an individual’s internal biological clock.

Participants then went home and logged their sleep habits over the following seven days.

Researchers assessed the time difference between melatonin onset and average sleep timing for each participant, categorizing them into two groups: those who had a narrow window, with a short time duration between melatonin onset and sleep, and those with a wide window, with a longer duration between melatonin onset and sleep. A narrow window suggests someone who is staying awake too late for their internal body clock and is generally associated with poorer health outcomes.

The new study confirmed a variety of potentially harmful health measures in the group that went to sleep closer to melatonin onset.

It also found key differences between men and women. Men in this group had higher levels of belly fat and fatty triglycerides in the blood, and higher overall metabolic syndrome risk scores than the men who slept better. Women in this group had higher overall body fat percentage, glucose and resting heart rates.

[…]

Source: Good sleep habits important for overweight adults | ScienceDaily

SolarWinds left hardcoded credentials in helpdesk product

SolarWinds left hardcoded credentials in its Web Help Desk product that can be used by remote, unauthenticated attackers to log into vulnerable instances, access internal functionality, and modify sensitive data

The software maker has now issued an update to address that critical oversight; its users are encouraged to install the fix, which presumably removes the baked-in creds.

The security blunder, tracked as CVE-2024-28987, received a 9.1-out-of-10 CVSS severity rating. It affects Web Help Desk 12.8.3 HF1 and all previous versions, and has been fixed in 12.8.3 HF2. The hotfix patch, issued yesterday, has to be manually installed.

WHD is SolarWinds’ IT help desk ticketing and asset management software

[…]

Yes, we’re talking about the same supplier that had a backdoor silently added to its IT monitoring suite Orion by Russian spies so that the snoops could then infiltrate SolarWinds’ customer networks including US government departments.

[…]

Source: SolarWinds left hardcoded credentials in helpdesk product • The Register

World-first lung mRNA cancer vaccine trials launched across seven countries

Doctors have begun trialling the world’s first mRNA lung cancer vaccine in patients, as experts hailed its “groundbreaking” potential to save thousands of lives.

Lung cancer is the world’s leading cause of cancer death, accounting for about 1.8m deaths every year. Survival rates in those with advanced forms of the disease, where tumours have spread, are particularly poor.

Now experts are testing a new jab that instructs the body to hunt down and kill cancer cells – then prevents them ever coming back. Known as BNT116 and made by BioNTech, the vaccine is designed to treat non-small cell lung cancer (NSCLC), the most common form of the disease.

The phase 1 clinical trial, the first human study of BNT116, has launched across 34 research sites in seven countries: the UK, US, Germany, Hungary, Poland, Spain and Turkey.

[…]

The jab uses messenger RNA (mRNA), similar to Covid-19 vaccines, and works by presenting the immune system with tumour markers from NSCLC to prime the body to fight cancer cells expressing these markers.

The aim is to strengthen a person’s immune response to cancer while leaving healthy cells untouched, unlike chemotherapy.

[…]

six consecutive injections five minutes apart over 30 minutes at the National Institute for Health Research UCLH Clinical Research Facility on Tuesday.

Each jab contained different RNA strands. He will get the vaccine every week for six consecutive weeks, and then every three weeks for 54 weeks.

Lee said: “We hope adding this additional treatment will stop the cancer coming back because a lot of time for lung cancer patients, even after surgery and radiation, it does come back.”

[…]

Source: World-first lung cancer vaccine trials launched across seven countries | Lung cancer | The Guardian

Google is shoving its apps onto new Windows laptops

Google is making a new desktop app called Essentials that packages a few Google services, like Messages and Photos, and includes links to download many others. The app will be included with many new Windows laptops, with the first ones coming from HP.

[…]

The Essentials app lets you “discover and install many of our best Google services,” according to Google’s announcement, and lets you browse Google Photos as well as send and receive Google Messages in the app. A full list of apps has not yet been announced, but Google’s announcement art showcases icons including Google Sheets, Google Drive, Nearby Share, and Google One (a two-month free trial is offered through Essentials for new subscribers).

HP will start including Google Essentials across its computer brands, like Envy, Pavilion, Omen, and more. Google says you’re “in control of your experience” and can uninstall any part of Essentials or the whole thing. It’s not yet clear whether you’ll be able to download the app to your current PC, in case you’re into Google-ifying your Windows experience.

Essentials also includes Google’s Play Games app

[…]

Google says that it will bring Essentials to other Windows PCs in the future.

[…]

Source: Google is shoving its apps onto new Windows laptops – The Verge

Microplastics are infiltrating brain tissue, studies show

[…] The paper also found the quantity of microplastics in brain samples from 2024 was about 50% higher from the total in samples that date to 2016, suggesting the concentration of microplastics found in human brains is rising at a similar rate to that found in the environment. Most of the organs came from the office of the medical investigator in Albuquerque, New Mexico, which investigates untimely or violent deaths.

[…]

Many other papers have found microplastics in the brains of other animal species, so it’s not entirely surprising the same could be true for humans

[…]

When it comes to these insidious particles, “the blood-brain barrier is not as protective as we’d like to think”

[…]

researchers say that individuals should try to reduce their exposure by avoiding the use of plastic in preparing food, especially when microwaving; drinking tap water instead of bottled water; and trying to prevent the accumulation of dust, which is contaminated with plastics. Some researchers advise eating less meat, especially processed products.

[…]

Source: Microplastics are infiltrating brain tissue, studies show: ‘There’s nowhere left untouched’ | Pollution | The Guardian

Peloton to charge $95 activation fee for used bikes

Peloton on Thursday said it will start charging new subscribers a one-time $95 activation fee if they bought their hardware on the secondary market as more consumers snag lightly used equipment for a fraction of the typical retail price.

[…]

During its fiscal fourth quarter, which ended June 30, Peloton said it saw a “steady stream of paid connected fitness subscribers” who bought hardware on the secondary market. The company said the segment grew 16% year over year.

“We believe a meaningful share of these subscribers are incremental, and they exhibit lower net churn rates than rental subscribers,” the company said in a letter to shareholders.

“It’s also worth highlighting that this activation fee will be a source of incremental revenue and gross profit for us, helping to support our investments in improving the fitness experience for our members,” interim co-CEO Christopher Bruzzo later added on a call with analysts.

[…]

Bruzzo said that those who buy a used Bike or Bike+ have access to a virtual custom fitting ahead of their first ride, as well as a history summary that shows how many rides those bikes had before they were resold.

“We’re also offering these new members discounts on accessories such as bike shoes, bike mats and spare parts,”

[…]

Source: Peloton to charge $95 activation fee for used bikes

corporate greed at its best – notice that what you get for this extra fee is basically nothing or the ability to buy more stuff.

Study of 18 million people finds increased mental illnesses incidence following severe COVID-19, especially in unvaccinated people

A new study that examined health data on 18 million people reveals higher incidence of mental illnesses for up to a year following severe COVID-19 in unvaccinated people. Vaccination appeared to mitigate the adverse effects of COVID-19 on mental illnesses. The University of Bristol-led study, published in JAMA Psychiatry today [21 August], investigated associations of COVID-19 with mental illnesses according to time since diagnosis and vaccination status.

[…]

Among the 18,648,606 adults in the cohort studied during the period before vaccination was available, the average age was 49 years, 50.2 per cent were female (9,363,710) and 1,012,335 adults had a confirmed COVID-19 diagnosis (recorded in testing data, by a GP, in hospital or in their death record).

The authors also studied a vaccinated cohort including 14,035,286 adults, of whom 866,469 had a confirmed COVID-19 diagnosis, with an average age of 53 years and 52.1 per cent female (7,308,556), and an unvaccinated cohort including 3,242,215 adults, of whom 149,745 had a confirmed COVID-19 diagnosis, with an average age of 35 years and 42.1 per cent female (1,363,401).

Using these data, the researchers compared the incidence of mental illnesses in people before and after a COVID-19 diagnosis, in each cohort. Mental illnesses included in this study comprised depression, serious mental illness, general anxiety, post-traumatic stress disorder, eating disorders, addiction, self-harm, and suicide.

The team found that the incidence of most of these conditions was higher one to four weeks after COVID-19 diagnosis, compared to the incidence before or without COVID-19. This elevation in the incidence of mental illnesses, was mainly seen after severe COVID-19 that led to hospitalisation and remained higher for up to a year following severe COVID-19 in unvaccinated people.

[…]

Story Source:

Materials provided by University of Bristol. Note: Content may be edited for style and length.

Source: Study of 18 million people finds increased mental illnesses incidence following severe COVID-19, especially in unvaccinated people | ScienceDaily

For first time, DNA tech offers both data storage and computing functions

Researchers from North Carolina State University and Johns Hopkins University have demonstrated a technology capable of a suite of data storage and computing functions—repeatedly storing, retrieving, computing, erasing or rewriting data—that uses DNA rather than conventional electronics. Previous DNA data storage and computing technologies could complete some but not all of these tasks.

The paper, titled “A Primordial DNA Store and Compute Engine,” appears in the journal Nature Nanotechnology.

[…]

“DNA computing has been grappling with the challenge of how to store, retrieve and compute when the data is being stored in the form of nucleic acids,”

[…]

we have created polymer structures that we call dendricolloids—they start at the microscale, but branch off from each other in a hierarchical way to create a network of nanoscale fibers,

[…]

“This morphology creates a structure with a , which allows us to deposit DNA among the nanofibrils without sacrificing the data density that makes DNA attractive for data storage in the first place.”

“You could put a thousand laptops’ worth of data into DNA-based storage that’s the same size as a pencil eraser,” Keung says.

“The ability to distinguish DNA information from the nanofibers it’s stored on allows us to perform many of the same functions you can do with electronic devices,”

[…]

“We can copy DNA information directly from the material’s surface without harming the DNA. We can also erase targeted pieces of DNA and then rewrite to the same surface, like deleting and rewriting information stored on the hard drive. It essentially allows us to conduct the full range of DNA data storage and computing functions. In addition, we found that when we deposit DNA on the dendricolloid material, the material helps to preserve the DNA.”

[…]

 

Source: For first time, DNA tech offers both data storage and computing functions

Study explains why laws are written in an incomprehensible style

Legal documents are notoriously difficult to understand, even for lawyers. This raises the question: Why are these documents written in a style that makes them so impenetrable?

MIT cognitive scientists believe they have uncovered the answer to that question. Just as “magic spells” use special rhymes and archaic terms to signal their power, the convoluted language of legalese acts to convey a sense of authority, they conclude.

In a study that will appear in the journal of the Proceedings of the National Academy of Sciences, the researchers found that even non-lawyers use this type of language when asked to write laws.

“People seem to understand that there’s an implicit rule that this is how laws should sound, and they write them that way,” says Edward Gibson, an MIT professor of brain and cognitive sciences and the senior author of the study.

Eric Martinez PhD ’24 is the lead author of the study. Francis Mollica, a lecturer at the University of Melbourne, is also an author of the paper.

Casting a legal spell

Gibson’s research group has been studying the unique characteristics of legalese since 2020, when Martinez came to MIT after earning a law degree from Harvard Law School. In a 2022 study, Gibson, Martinez, and Mollica analyzed legal contracts totaling about 3.5 million words, comparing them with other types of writing, including movie scripts, newspaper articles, and academic papers.

That analysis revealed that legal documents frequently have long definitions inserted in the middle of sentences — a feature known as “center-embedding.” Linguists have previously found that this kind of structure can make text much more difficult to understand.

“Legalese somehow has developed this tendency to put structures inside other structures, in a way which is not typical of human languages,” Gibson says.

In a follow-up study published in 2023, the researchers found that legalese also makes documents more difficult for lawyers to understand. Lawyers tended to prefer plain English versions of documents, and they rated those versions to be just as enforceable as traditional legal documents.

“Lawyers also find legalese to be unwieldy and complicated,” Gibson says. “Lawyers don’t like it, laypeople don’t like it, so the point of this current paper was to try and figure out why they write documents this way.”

[…]

“We thought it was plausible that what happens is you start with an initial draft that’s simple, and then later you think of all these other conditions that you want to include. And the idea is that once you’ve started, it’s much easier to center-embed that into the existing provision,” says Martinez, who is now a fellow and instructor at the University of Chicago Law School.

However, the findings ended up pointing toward a different hypothesis, the so-called “magic spell hypothesis.” Just as magic spells are written with a distinctive style that sets them apart from everyday language, the convoluted style of legal language appears to signal a special kind of authority, the researchers say.

[…]

Source: Study explains why laws are written in an incomprehensible style

Florida data broker NPD says it was ransacked by cyber-thieves

A Florida firm has all but confirmed that millions of people’s sensitive personal info was stolen from it by cybercriminals and publicly leaked.

That information, totaling billions of records, includes the names, Social Security numbers, physical and email addresses, and phone numbers of folks in the United States, UK, and Canada. It’s the sort of records data brokers regularly buy and sell.

And it is now available via the dark web for anyone to download and use for fraud.

Back in April, crooks using the online handle USDoD wrote on a cyber-crime forum that they were selling for $3.5 million what was alleged to be 2.9 billion records, across multiple files in a 277GB archive, on US, Canadian, and British citizens, including their aforementioned names and phone and Social Security numbers where relevant, as well as their address histories going back 30 years and details of their parents and relatives.

That silo of personal info was stolen from an outfit called National Public Data, or NPD, a small information broker based in Coral Springs that offers API lookups to other companies for things like background checks. According to USDoD, the stolen data was collected by NPD between 2019 and 2024. The firm likely sourced that info at least from public records at the local, state, and federal level.

A cyber-thief using the handle SXUL pilfered the information and passed it to USDoD to sell, which sparked a lawsuit against NPD at the start of this month.

Some of the stolen information had been leaking out via the dark web in bits and pieces, though last week, someone using the handle Fenice dumped what’s claimed to be 2.7 billion records from that collection onto the internet for anyone to download for free if they know where to look. Note that it is a database with billions of rows, not billions of individuals; there are a lot of inaccuracies in the data, as well as a lot of dead people, and duplication.

After weeks of silence, and countless people starting to get alerts from privacy and anti-fraud services that their personal info has been leaked, NPD has, in cagey language, confirmed it was compromised and that its data was stolen and shared. According to the biz, it was ransacked in December, and the leaks started in April, leading up to now.

[…]

Source: Florida data broker says it was ransacked by cyber-thieves • The Register

Bicycles Can Be Hacked Easily Now

[…] New research suggests that certain brands of bike parts have vulnerabilities that could allow them to be remotely compromised during competitions.

The research was unveiled this week at the Usenix Workshop on Offensive Technologies by researchers from Northeastern University and UC San Diego. In their paper, researchers note that, much like modern cars, today’s bicycles are “cyber-physical systems that contain embedded computers and wireless links to enable new types of telemetry and control.” One of the more common cyber-connected systems is the wireless gear shifter, which uses electronic switches instead of traditional control levers to allow bikers shift gears.

Researchers tested shifters sold by Shimano, a Japanese company that is one of the larger cycling parts sellers in the world. Unfortunately, researchers found that Shimano’s shifters are vulnerable to simple “replay attacks” of the sort that are frequently targeted at car fobs. Such attacks, which utilize a radio signal manipulation, allow attackers to capture and weaponize data wirelessly exchanged by hardware parts. In this case, attackers could use such an attack to “unexpectedly shift gears or to jam its shifters and lock the bike into the wrong gear,” Wired writes. Radio hardware necessary to carry out such an attack is relatively inexpensive.

“Security vulnerabilities in wireless gear-shifting systems can critically impact rider safety and performance, particularly in professional bike races,” researchers’ paper notes. “In these races, attackers could exploit these weaknesses to gain an unfair advantage, potentially causing crashes or injuries by manipulating gear shifts or jamming the shifting operation.”

Obviously cheating is common in athletic competitions, so a hackable bicycle would definitely be something to worry about for competitive racers. Researchers highlight this point: “The history of professional cycling’s struggles with illegal performance-enhancing drugs underscores the appeal of such undetectable attacks, which could similarly compromise the sport’s integrity,” they write. “Given these risks, it is essential to adopt an adversary’s viewpoint and ensure that this technology can withstand motivated attackers in the highly competitive environment of professional cycling.”

Gizmodo reached out to Shimano for comment. Last year, the company was the victim of a ransomware attack and, after refusing to pay, had several terabytes of its corporate data spilled onto the internet by the hackers.

[…]

Source: Bicycles Can Be Hacked Now

Anova Smart sous vide cooker to start charging $2/month for 10-year-old companion app, stop Bluetooth functionality

Anova, a company that sells smart sous vide cookers, is getting backlash from customers after announcing that it will soon charge a subscription fee for the device’s companion app.

[…]

In a blog post on Thursday, Anova CEO and cofounder Stephen Svajian announced that starting on August 21, people who sign up to use the Anova Culinary App with the cooking devices will have to pay $2 per month, or $10 per year. The app does various things depending on the paired cooker, but it typically offers sous vide cooking guides, cooking notifications, and the ability to view, save, bookmark, and share recipes.

The subscription fee will only apply to people who make an account after August 21. Those who downloaded the app and made an account before August 21 won’t have to pay. But everyone will have to make an account; some people have been using the app without one until now.

[…]

As Digital Trends pointed out, the announcement follows an Anova statement saying it will no longer let users remotely control their kitchen gadgets via Bluetooth starting on September 28, 2025. This means that remote control via the app will only be possible for models offering and using Wi-Fi connectivity.

[…]

Changing or removing features of a tech gadget people have already purchased is a risky move that can anger customers who have paid for a device they expected to work a certain way indefinitely.

[…]

You can also find angry users lamenting the changes on Reddit (examples here and here).

The announcement seems to have forced users to question the value of the Anova app entirely.

[…]

The commenter also challenged the idea of people sharing recipes with an app that will monetize them, saying, “Why would I ever publish a recipe I made to the app if they’re going to charge others to view it?

[…]

Users can avoid the subscription fee and still use the gadget, but it may be hard to swallow the lost functionality for a device you paid three figures for. Customers who can’t stomach the loss may consider alternatives, including those without Wi-Fi connectivity.

Source: Smart sous vide cooker to start charging $2/month for 10-year-old companion app | Ars Technica

Scientists find humans age dramatically in two bursts – at 44, then 60

[…] The study, which tracked thousands of different molecules in people aged 25 to 75, detected two major waves of age-related changes at around ages 44 and again at 60. The findings could explain why spikes in certain health issues including musculoskeletal problems and cardiovascular disease occur at certain ages.

“We’re not just changing gradually over time. There are some really dramatic changes,”

[…]

The research tracked 108 volunteers, who submitted blood and stool samples and skin, oral and nasal swabs every few months for between one and nearly seven years. Researchers assessed 135,000 different molecules (RNA, proteins and metabolites) and microbes (the bacteria, viruses and fungi living in the guts and on the skin of the participants).

The abundance of most molecules and microbes did not shift in a gradual, chronological fashion. When the scientists looked for clusters of molecules with the largest shifts, they found these transformations tended to occur when people were in their mid-40s and early 60s.

[…]

The first wave of changes included molecules linked to cardiovascular disease and the ability to metabolise caffeine, alcohol and lipids. The second wave of changes included molecules involved in immune regulation, carbohydrate metabolism and kidney function. Molecules linked to skin and muscle ageing changed at both time points. Previous research suggested that a later spike in ageing may occur around the age of 78, but the latest study could not confirm this because the oldest participants were 75.

The pattern fits with previous evidence that the risk of many age-related diseases does not increase incrementally, with Alzheimer’s and cardiovascular disease risk showing a steep uptick after 60.

[…]

Source: Scientists find humans age dramatically in two bursts – at 44, then 60 | Medical research | The Guardian

Texas AG Latest To Sue GM For Covertly Selling Driver Data To Insurance Companies

Last year Mozilla released a report showcasing how the auto industry has some of the worst privacy practices of any tech industry in America (no small feat). Massive amounts of driver behavior is collected by your car, and even more is hoovered up from your smartphone every time you connect. This data isn’t secured, often isn’t encrypted, and is sold to a long list of dodgy, unregulated middlemen.

Last March the New York Times revealed that automakers like GM routinely sell access to driver behavior data to insurance companies, which then use that data to justify jacking up your rates. The practice isn’t clearly disclosed to consumers, and has resulted in 11 federal lawsuits in less than a month.

Now Texas AG Ken Paxton has belatedly joined the fun, filing suit (press release, complaint) in the state district court of Montgomery County against GM for “false, deceptive, and misleading business practices”:

“Companies are using invasive technology to violate the rights of our citizens in unthinkable ways. Millions of American drivers wanted to buy a car, not a comprehensive surveillance system that unlawfully records information about every drive they take and sells their data to any company willing to pay for it.”

Paxton notes that GM’s tracking impacted 1.8 million Texans and 14 million vehicles, few if any of whom understood they were signing up to be spied on by their vehicle. This is, amazingly enough, the first state lawsuit against an automaker for privacy violations, according to Politico.

The sales pitch for this kind of tracking and sales is that good drivers will be rewarded for more careful driving. But as publicly-traded companies, everybody in this chain — from insurance companies to automakers — are utterly financially desensitized from giving anybody a consistent break for good behavior. That’s just not how it’s going to work. Everybody pays more and more. Always.

But GM and other automakers’ primary problem is they weren’t telling consumers this kind of tracking was even happening in any clear, direct way. Usually it’s buried deep in an unread end user agreement for roadside assistant apps and related services. Those services usually involve a free trial, but the user agreement to data collection sticks around.

[…]

Source: Texas AG Latest To Sue GM For Covertly Selling Driver Data To Insurance Companies | Techdirt

Singing from memory shows most people can actually sing pitch perfect or very very close

Psychologists from UC Santa Cruz wanted to study “earworms,” the types of songs that get stuck in your head and play automatically on a loop. So they asked people to sing out any earworms they were experiencing and record them on their phones when prompted at random times throughout the day.

When researchers analyzed the recordings, they found that a remarkable proportion of them perfectly matched the of the original songs they were based upon.

More specifically, 44.7% of recordings had a pitch error of 0 semitones, and 68.9% were accurate within 1 semitone of the original . These findings were published in the journal Attention, Perception, & Psychophysics.

“What this shows is that a surprisingly large portion of the population has a type of automatic, hidden ‘perfect pitch’ ability,”

[…]

“Interestingly, if you were to ask people how they thought they did in this task, they would probably be pretty confident that they had the melody right, but they would be much less certain that they were singing in the right key,” Evans said.

“As it turns out, many people with very strong pitch memory may not have very good judgment of their own accuracy, and that may be because they don’t have the labeling ability that comes with true perfect pitch.”

Evans explained that true perfect pitch is the ability to accurately produce or identify a given note on the first try and without a reference pitch. […] scientists are increasingly finding that accurate pitch memory is much more common.

[…]

“People who study memory often think about long-term memories as capturing the gist of something, where the brain takes shortcuts to represent information, and one way our brains could try to represent the gist of music would be to forget what the original key was,” explained Professor Davidenko.

“Music sounds very similar in different keys, so it would be a good shortcut for the brain to just ignore that information, but it turns out that it’s not ignored.

[…]

He noted that the pitch accuracy of participants in the study was not predicted by any objective measures of singing ability, and none of the participants were musicians or reported having perfect pitch. In other words, you don’t have to have special abilities to demonstrate this foundational musical skill.

[…]

Source: Singing from memory unlocks a surprisingly common musical superpower

Researchers figure out how to keep clocks on the Earth, Moon in sync

[…] Our communications and GPS networks all depend on keeping careful track of the precise timing of signals—including accounting for the effects of relativity. The deeper into a gravitational well you go, the slower time moves, and we’ve reached the point where we can detect differences in altitude of a single millimeter. Time literally flows faster at the altitude where GPS satellites are than it does for clocks situated on Earth’s surface. Complicating matters further, those satellites are moving at high velocities, an effect that slows things down.

[…]

It would be easy to set up an equivalent system to track time on the Moon, but that would inevitably see the clocks run out of sync with those on Earth—a serious problem for things like scientific observations

[…]

Ashby and Patla worked on developing a system where anything can be calculated in reference to the center of mass of the Earth/Moon system. Or, as they put it in the paper, their mathematical system “enables us to compare clock rates on the Moon and cislunar Lagrange points with respect to clocks on Earth by using a metric appropriate for a locally freely falling frame such as the center of mass of the Earth–Moon system in the Sun’s gravitational field.”

[…]

The paper’s body has 55 of them, and there are another 67 in the appendices.

[…]

Things get complicated because there are so many factors to consider. There are tidal effects from the Sun and other planets. Anything on the surface of the Earth or Moon is moving due to rotation; other objects are moving while in orbit. The gravitational influence on time will depend on where an object is located.

[…]

he researchers say that their approach, while focused on the Earth/Moon system, is still generalizable. Which means that it should be possible to modify it and create a frame of reference that would work on both Earth and anywhere else in the Solar System. Which, given the pace at which we’ve sent things beyond low-Earth orbit, is probably a healthy amount of future-proofing.

The Astronomical Journal, 2024. DOI: 10.3847/1538-3881/ad643a  (About DOIs).

Source: Researchers figure out how to keep clocks on the Earth, Moon in sync | Ars Technica

Patreon will have to use Apple’s in-app purchase system or be removed from the App Store. Also only subscriptions now.

Apple takes a lot of strong positions, but their ultimate hill to die on might just be requiring apps to make purchases through the tech giant. The latest example comes from Patreon, which announced that Apple is requiring it to switch over to the iOS in-app purchase system or risk expulsion. Patreon’s entire purpose is to allow creators to offer “patrons” memberships in exchange for content. While some tiers are unpaid, creators offer paid options to make money — something this shift could impact.

Patreon users need to know about two main changes. By this November, all creators can only offer a subscription-based plan on iOS as the app store doesn’t support other formats, such as first-of-the-month or per-creation plans. As a result, Patreon is rolling out a 16-month-long migration process that will shift all memberships to subscriptions by November 2025. At that point, subscription-based plans will be the only option available, unfortunately proving Apple’s far-reaching power.

Apple will also be taking a 30 percent cut on all subscriptions made on the Patreon iOS app after November of this year — something its done for Patreon in-app commerce purchases since early 2024. Patreon has designed a tool that allows creators to increase their prices on the iOS app and leave them as is on the browser site and Android devices. However, creators can turn it off if they’d rather leave their rates as is.

Source: Patreon will have to use Apple’s in-app purchase system or be removed from the App Store

Stratasys sues Bambu Lab over patents used widely by consumer 3D printers | Ars Technica

[…]

In two complaints, (1, 2, PDF) filed in the Eastern District of Texas, Marshall Division, against six entities related to Bambu Lab, Stratasys alleges that Bambu Lab infringed upon 10 patents that it owns, some through subsidiaries like Makerbot (acquired in 2013). Among the patents cited are US9421713B2, “Additive manufacturing method for printing three-dimensional parts with purge towers,” and US9592660B2, “Heated build platform and system for three-dimensional printing methods.”

There are not many, if any, 3D printers sold to consumers that do not have a heated bed, which prevents the first layers of a model from cooling during printing and potentially shrinking and warping the model. “Purge towers” (or “prime towers” in Bambu’s parlance) allow for multicolor printing by providing a place for the filament remaining in a nozzle to be extracted and prevent bleed-over between colors. Stratasys’ infringement claims also target some fundamental technologies around force detection and fused deposition modeling (FDM) that, like purge towers, are used by other 3D-printer makers that target entry-level and intermediate 3D-printing enthusiasts.

[…]

Source: Stratasys sues Bambu Lab over patents used widely by consumer 3D printers | Ars Technica

UK Once Again Denies A Passport Over Applicant’s Name Due To Intellectual Property Concerns – again

I can’t believe this, but it happened again. Almost exactly a decade ago, Tim Cushing wrote about a bonkers story out of the UK in which a passport applicant who’s middle name was “Skywalker” was denied the passport due to purported trademark or copyright concerns. The question that ought to immediately leap to mind should be: wait, nothing about a name or its appearance on a passport amounts to either creative expression being copied, nor use in commerce, meaning that neither copyright nor trademark law ought to apply in the slightest.

And you would have thought that coming out of that whole episode, proper guidance would have been given to the UK’s passport office so that this kind of stupidity doesn’t happen again. Unfortunately, it did happen again. A UK woman attempted to get a passport for her daughter, who she named Khaleesi, only to have it refused over the trademark for the Game of Thrones character that held the same fictional title.

Lucy, 39, from Swindon in Wiltshire, said the Passport Office initially refused the application for Khaleesi, six.

Officials said they were unable to issue a passport unless Warner Brothers gave permission because it owned the name’s trademark. But the authority has since apologised for the error.

“I was absolutely devastated, we were so looking forward to our first holiday together,” Lucy said.

While any intellectual property concerns over a passport are absolutely silly, I would argue that trademark law makes even less sense here than copyright would. Again, trademark law is designed specifically to protect the public from being confused as to the source of a good or service in commerce. There is no good or service nor commerce here. Lucy would simply like to take her own child across national borders. That’s it. Lucy had to consult with an attorney due to this insanity, which didn’t initially yield the proper result.

After seeking legal advice, her solicitors discovered that while there is a trademark for Game of Thrones, it is for goods and services – but not for a person’s name.

“That information was sent to the Passport Office who said I would need a letter from Warner Brothers to confirm my daughter is able to use that name,” she said.

This amounts to a restriction on the rights and freedoms of a child in a free country as a result of the choice their parent’s made about their name. Whatever your thoughts on IP laws in general, that simply cannot be the aim of literally any of them.

Now, once the media got a hold of all of this, the Passport Office eventually relented, said it made an error in denying the passport, and has put the application through. But even the government’s explanation doesn’t fully make sense.

Official explained there had been a misunderstanding and the guidance staff had originally given applies only to people changing their names.

“He advised me that they should be able to process my daughter’s passport now, ” she said.

Why would the changing of a name be any different? My name is my name, not a creative expression, nor a use in commerce. If I elect to change my name from “Timothy Geigner” to “Timothy Mickey Mouse Geigner”, none of that equates to an infringement of Disney’s rights, copyright nor trademark. It’s just my name. It would only be if I attempted to use my new name in commerce or as part of an expression that I might run afoul of either trademark or copyright law.

What this really is is the pervasive cancer that is ownership culture. It’s only with ownership culture that you get a passport official somehow thinking that Warner Bros. production of a fantasy show means a six year old can’t get a passport.

Source: UK Once Again Denies A Passport Over Applicant’s Name Due To Intellectual Property Concerns | Techdirt

Amazon-Anthropic Investment Investigated by UK Government – is it a stealth merger?

The U.K. government has launched a preliminary investigation into the partnership between Amazon and Anthropic to see if it will significantly lessen competition. This comes days after a similar probe was announced into Alphabet’s collaboration with the AI startup.

In March, Amazon concluded its $4 billion (£3.16 billion) investment in Anthropic, the company behind the Claude LLM family, some of the only viable competitors to OpenAI’s ChatGPT and Google’s Gemini. It was founded by former OpenAI employees, including siblings Daniela and Dario Amodei, who were both execs.

In return for the investment, Anthropic committed to using Amazon Web Services as its primary cloud provider for “mission critical workloads, including safety research and future foundation model development.” It also agreed to use Amazon’s Trainium and Inferentia chips to build, train, and deploy its models and host them on the AI app development platform Amazon Bedrock.

However, the Competition and Markets Authority believes that this partnership could result in a “substantial lessening of competition” within the U.K. tech markets.

[…]

Complete mergers and acquisitions often trigger extensive regulatory scrutiny and potential antitrust actions for this reason, which can delay or block proceedings. To avoid this situation, Big Tech instead makes strategic investments in the most promising startups and hires their top talent, allowing them to gain influence and access to innovative technologies unchecked.

In an April report on how the CMA is looking into AI foundational models, the CMA said, “Without fair, open, and effective competition and strong consumer protection, underpinned by these principles, we see a real risk that the full potential of organisations or individuals to use AI to innovate and disrupt will not be realised, nor its benefits shared widely across society.

[…]

The CMA is looking to identify “relevant merger situation(s)” that allow large tech companies to “shield themselves from competition” in the U.K. It says that “a range of different kinds of transactions and arrangements” could represent a relevant merger with the provisions of the Enterprise Act 2002.

The Digital Markets, Competition, and Consumers Bill that was passed in May also “anticipates new powers for the CMA.” According to the April report, the CMA can “enforce consumer protection law against infringing firms” and apply non-compliance penalties of up to 10% of a firm’s worldwide turnover.

“We are ready to use these new powers to raise standards in the market and, if necessary, to tackle firms that do not play by the rules through enforcement action,” it said.

[…]

Source: Amazon-Anthropic Merger Investigated by UK Government

New U.N. Cybercrime Treaty Could Threaten Human Rights

The United Nations approved its first international cybercrime treaty yesterday. The effort succeeded despite opposition from tech companies and human rights groups, who warn that the agreement will permit countries to expand invasive electronic surveillance in the name of criminal investigations. Experts from these organizations say that the treaty undermines the global human rights of freedom of speech and expression because it contains clauses that countries could interpret to internationally prosecute any perceived crime that takes place on a computer system.

[…]

among the watchdog groups that monitored the meeting closely, the tone was funereal. “The U.N. cybercrime convention is a blank check for surveillance abuses,” says Katitza Rodriguez, the Electronic Frontier Foundation’s (EFF’s) policy director for global privacy. “It can and will be wielded as a tool for systemic rights violations.”

In the coming weeks, the treaty will head to a vote among the General Assembly’s 193 member states. If it’s accepted by a majority there, the treaty will move to the ratification process, in which individual country governments must sign on.

The treaty, called the Comprehensive International Convention on Countering the Use of Information and Communications Technologies for Criminal Purposes, was first devised in 2019, with debates to determine its substance beginning in 2021. It is intended to provide a global legal framework to prevent and respond to cybercrimes.

[…]

experts have expressed that the newly adopted treaty lacks such safeguards for a free Internet. A major concern is that the treaty could be applied to all crimes as long as they involve information and communication technology (ICT) systems. HRW has documented the prosecution of LGBTQ+ people and others who expressed themselves online. This treaty could require countries’ governments to cooperate with other nations that have outlawed LGBTQ+ conduct or digital forms of political protest, for instance.

“This expansive definition effectively means that when governments pass domestic laws that criminalize a broad range of conducts, if it’s committed through an ICT system, they can point to this treaty to justify the enforcement of repressive laws,” said HRW executive director Tirana Hassan in a news briefing late last month.

[…]

“The treaty allows for cross-border surveillance and cooperation to gather evidence for serious crimes, effectively transforming it into a global surveillance network,” Rodriguez says. “This poses a significant risk of cross-border human rights abuses and transnational repression.”

[…]

Source: New U.N. Cybercrime Treaty Could Threaten Human Rights | Scientific American

For a more complete look at the threats presented by this treaty, also see: UN Cybercrime Treaty does not define cybercrime, allows any definition and forces all signatories to secretly surveil their own population on request by any other signatory (think totalitarian states spying on people in democracies with no recourse)

Apple tries again to make EU officials happy with new fees for in-app purchases

Apple this week revised its alternative contractual terms for devs selling apps in the European Union – a revision that was immediately dismissed by critics as more “malicious compliance.”

[…]

Essentially, Apple has allowed developers in the EU to choose whether they want to use its own In‑App Purchase system for App Store transactions or an alternative payment processor for In-App transactions. EU app developers can also choose to sell their apps through a third-party storefront.

The Alternative Terms contract covers: 1) In‑App Purchase system from the App Store; 2) alternative payment processors; and 3) linking out from apps.

The StoreKit addendum covers just linking out – it “allows the ability to link out for purchases of digital goods or services for apps distributed in the EU and includes new business terms for those transactions.” It’s not for in-app transactions.

The StoreKit contract doesn’t include the Core Technology fee – assessed for devs using the Alternative Terms contract on app installs beyond one million at €0.50 for each app installed.

But it does come with two new fees: a 5 percent “Initial Acquisition Fee” and a 10/20 percent “Store Services Fee.”

On iOS, under the Alternative Terms contract, Apple demands a 17 percent commission for apps sold in EU storefronts of the App Store, or 10 percent for App Store Small Business Program participants. Then there’s the 3 percent payment processing fee, and the Core Technology fee is applicable.

There’s also an Initial acquisition fee of 5 percent “for sales of digital goods and services, made on any platform, that occur within a 12-month period after an initial install.” And there’s a Store services fee of 10 percent “for sales of digital goods and services, made on any platform, that occur within a fixed 12-month period from the date of an install, including app updates and reinstalls.”

Under the StoreKit Contract, the Initial acquisition fee is the same – 5 percent – but the Store service fee is 20 percent. For App Store Small Business Program participants or auto-renewal subscriptions beyond one year, that drops to 7 percent.

Fee calculation is complicated enough that Apple has built a web-based calculator for the task.

In a statement provided to The Register, Spotify said, “We are currently assessing Apple’s deliberately confusing proposal. At first glance, by demanding as much as a 25 percent fee for basic communication with users, Apple once again blatantly disregards the fundamental requirements of the Digital Markets Act (DMA). The European Commission has made it clear that imposing recurring fees on basic elements like pricing and linking is unacceptable. We call on the Commission to expedite its investigation, implement daily fines and enforce the DMA.”

[…]

United Kingdom’s Competition and Markets Authority – as part of its Mobile Browsers and Cloud Gaming Market investigation – is contemplating uncomfortable remedies [PDF] against the fruiterer.

[…]

Among the issues that concern the CMA are: Apple’s requirement that all browsers on its mobile devices use its own WebKit rendering engine; Apple’s and Google’s dominance of browser engines; and Apple’s rules that limit in-app browsers.

Some of the options being considered include: “Requirement for Apple to grant access to alternative browser engines to iOS”; “Requirement for Apple to grant equivalent access to iOS to browsers using alternative browser engines”; and “Requirement for Apple to grant equivalent access to APIs used by WebKit and Safari to browsers using alternative browser engines.”

[…]

Source: Apple tries again to make EU officials happy – with new fees • The Register

‘Sinkclose’ Flaw in Hundreds of Millions of AMD Chips Allows Deep, Virtually Unfixable Infections

Security flaws in your computer’s firmware, the deep-seated code that loads first when you turn the machine on and controls even how its operating system boots up, have long been a target for hackers looking for a stealthy foothold. But only rarely does that kind of vulnerability appear not in the firmware of any particular computer maker, but in the chips found across hundreds of millions of PCs and servers. Now security researchers have found one such flaw that has persisted in AMD processors for decades, and that would allow malware to burrow deep enough into a computer’s memory that, in many cases, it may be easier to discard a machine than to disinfect it.

At the Defcon hacker conference tomorrow, Enrique Nissim and Krzysztof Okupski, researchers from the security firm IOActive, plan to present a vulnerability in AMD chips they’re calling Sinkclose. The flaw would allow hackers to run their own code in one of the most privileged modes of an AMD processor, known as System Management Mode

[…]

an attacker could infect the computer with malware known as a “bootkit” that evades antivirus tools and is potentially invisible to the operating system, while offering a hacker full access to tamper with the machine and surveil its activity. For systems with certain faulty configurations in how a computer maker implemented AMD’s security feature known as Platform Secure Boot—which the researchers warn encompasses the large majority of the systems they tested—a malware infection installed via Sinkclose could be harder yet to detect or remediate, they say, surviving even a reinstallation of the operating system.

[…]

Only opening a computer’s case, physically connecting directly to a certain portion of its memory chips with a hardware-based programming tool known as SPI Flash programmer and meticulously scouring the memory would allow the malware to be removed, Okupski says.

Nissim sums up that worst-case scenario in more practical terms: “You basically have to throw your computer away.”

In a statement shared with WIRED, AMD acknowledged IOActive’s findings, thanked the researchers for their work, and noted that it has “released mitigation options for its AMD EPYC datacenter products and AMD Ryzen PC products, with mitigations for AMD embedded products coming soon.” (The term “embedded,” in this case, refers to AMD chips found in systems such as industrial devices and cars.) For its EPYC processors designed for use in data-center servers, specifically, the company noted that it released patches earlier this year. AMD declined to answer questions in advance about how it intends to fix the Sinkclose vulnerability, or for exactly which devices and when, but it pointed to a full list of affected products that can be found on its website’s security bulletin page.

[…]

Nissim and Okupski respond that while exploiting Sinkclose requires kernel-level access to a machine, such vulnerabilities are exposed in Windows and Linux practically every month

[…]

Nissim and Okupski’s Sinkclose technique works by exploiting an obscure feature of AMD chips known as TClose. (The Sinkclose name, in fact, comes from combining that TClose term with Sinkhole, the name of an earlier System Management Mode exploit found in Intel chips in 2015.) In AMD-based machines, a safeguard known as TSeg prevents the computer’s operating systems from writing to a protected part of memory meant to be reserved for System Management Mode known as System Management Random Access Memory or SMRAM. AMD’s TClose feature, however, is designed to allow computers to remain compatible with older devices that use the same memory addresses as SMRAM, remapping other memory to those SMRAM addresses when it’s enabled. Nissim and Okupski found that, with only the operating system’s level of privileges, they could use that TClose remapping feature to trick the SMM code into fetching data they’ve tampered with, in a way that allows them to redirect the processor and cause it to execute their own code at the same highly privileged SMM level.

[…]

Nissim and Okupski say they agreed with AMD not to publish any proof-of-concept code for their Sinkclose exploit for several months to come, in order to provide more time for the problem to be fixed.

[…]

Source: ‘Sinkclose’ Flaw in Hundreds of Millions of AMD Chips Allows Deep, Virtually Unfixable Infections | WIRED