Hertz Shells Out $168 Million To Settle 364 False Theft Reports

[…]

Months of reporting tied to lawsuits filed by Hertz renters falsely accused of theft should now come to a halt. Maybe.

Here’s the company’s statement on the multi-million dollar settlement, which doesn’t say much about Hertz’s culpability, nor any plans it has in place to prevent something that has only occurred with this rental company from happening again.

Hertz Global Holdings, Inc. (NASDAQ: HTZ) today announced the settlement of 364 pending claims relating to vehicle theft reporting, bringing resolution to more than 95% of its pending theft reporting claims. The company will pay an aggregate amount of approximately $168 million by year-end to resolve these disputes. The company believes it will recover a meaningful portion of the settlement amount from its insurance carriers.  

[…]

First, it’s only “95%” of pending theft reporting claims, which means the company is still somewhat tied up in litigation.

Second, while it may hurt Hertz a bit to cough up roughly a half-million per bogus theft claim, it appears it won’t hurt much. Apparently, its insurance carrier will be footing the bill, which means as long as its insurers are willing to cover costs related to horrendous inventory control practices, there’s really no deterrent in place to prevent this sort of thing (a sort of thing extremely particular to Hertz) from happening again.

Third, the CEO’s statement portrays the false arrest of people as a commonplace customer service failure, rather than the potentially deadly, life disrupting experience it is.

Fourth, the plans for “moving forward” do not address the underlying issues. Instead, the CEO touts a future full of app usage and electric vehicles, something that’s apparently meant to make us forgive its recent past full of sloppy inventory control, outsourcing of repo work to local cops, and a reputation for converting honest renters into criminals.

The statement also says nothing about the company’s unwillingness to drop bogus prosecutions of renters despite being sued multiple times.

[…]

The CEO promised to clean this mess up, but he’s the same person who hasn’t explained why his company has allowed prosecutions over bogus theft reports to proceed even though Hertz was aware the reports were false.

[…]

Source: Hertz Shells Out $168 Million To Settle 364 False Theft Reports | Techdirt

Z-Wave Alliance Announces Z-Wave Source Code Project is Complete, Now Open and Widely Available to Members

The Z-Wave Alliance, the Standards Development Organization (SDO) dedicated to advancing the smart home and Z-Wave® technology, today announced the completion of the Z-Wave Source Code project, which has been published and made available on GitHub to Alliance members.

The Z-Wave Source Code Project opens development of Z-Wave and enables members to contribute code to shape the future of the protocol under the supervision of the new OS Work Group (OSWG).

[…]

For more information on joining the Z-Wave Alliance, please visit http://z-wavealliance.org.

Source: Z-Wave Alliance Announces Z-Wave Source Code Project is Complete, Now Open and Widely Available to Members – z-wavealliance

So Open Source but not FOSS

Epic Cutting Off Online Service, Servers For Some Old Games

Fortnite developer Epic Games announced today that it will no longer provide online service or servers for 17 older games, including six from the Unreal series dating back as far as 1998, and it will end access to some additional games entirely.

[…]

The full list of affected games is as follows:

  • 1000 Tiny Claws
  • Dance Central 1
  • Dance Central 2
  • Dance Central 3 (Epic notes that Dance Central VR online multiplayer “will remain available”)
  • Green Day: Rock Band
  • Monsters (Probably) Stole My Princess
  • Rock Band 1
  • Rock Band 2
  • Rock Band 3 (Epic notes that Rock Band 4 online multiplayer “will remain available”)
  • The Beatles: Rock Band
  • Supersonic Acrobatic Rocket-Powered Battle-Cars
  • Unreal Gold
  • Unreal II: The Awakening
  • Unreal Tournament 2003
  • Unreal Tournament 2004
  • Unreal Tournament 3 (Epic notes that it has “plans to bring back online features via Epic Online Services in the future.”)
  • Unreal Tournament: Game of the Year Edition

[…]

On top of changing online service, Epic wrote that it has already removed Mac and Linux versions of bird dating sim Hatoful Boyfriend, first released in 2011, Hatoful Boyfriend: Holiday Star, and mobile game DropMix, only five years old, from digital storefronts. As of writing, though, the former two are still available on Steam.

And the last Band-Aid: though you can play those previous games if you own them, Epic is performing a few total shutdowns. Players will lose access to the following titles on their specified removal dates:

  • Battle Breakers on December 30 (“We will automatically refund players for any in-game purchases made via Epic direct payment 180 days prior to today,” Epic said in its blog)
  • Unreal Tournament (Alpha) on January 24
  • Rock Band Blitz on January 24
  • Rock Band Companion app on January 24
  • SingSpace on January 24

For some fans, Epic’s seemingly sudden decision to stop servicing games or obliterate them entirely comes as a disappointing shock, and serves as writing on the wall for the state of digital game preservation. All I can say is this is your last chance to top your Rock Band high score.

Source: Epic Cutting Off Online Service, Servers For Some Old Games

U.S. authorities charge 8 social media influencers in pump and dump plan

U.S. prosecutors on Wednesday said they have charged eight individuals in a securities fraud scheme, alleging they reaped about $114 million from by using Twitter and Discord to manipulate stocks.

The eight men allegedly purported to be successful traders on the social media platforms and then engaged in a so-called “pump and dump” scheme by hyping particular stocks to their followers with the intent to dump them once prices had risen, according to prosecutors in the Southern District of Texas.

The U.S. Securities and Exchange Commission (SEC) said it has filed related civil charges against the defendants in the scheme, claiming that seven of the defendants used Twitter and Discord to boost stocks. It said the eighth was charged with aiding and abetting the scheme with his podcast.

[…]

The individuals charged were Texas residents Edward Constantinescu, Perry Matlock, John Rybarczyk and Dan Knight, along with California residents Gary Deel and Tom Cooperman, Stefan Hrvatin of Miami and Mitchell Hennessey of Hoboken, New Jersey.

[…]

Source: U.S. authorities charge 8 social media influencers in securities fraud scheme | Reuters

Only 8? How about the ones on CNBC?

Large Hadron Collider Beauty releases first set of data to the public

[…] While all scientific results from the LHCb collaboration are already publicly available through open access papers, the data used by the researchers to produce these results is now accessible to anyone in the world through the CERN open data portal. The data release is made in the context of CERN’s Open Science Policy, reflecting the values of transparency and international collaboration enshrined in the CERN Convention for more than 60 years.

[…]

The data sample made available amounts to 20% of the total data set collected by the LHCb experiment in 2011 and 2012 during LHC Run 1. It comprises 200 terabytes containing information obtained from proton–proton collision events filtered and recorded with the detector.

[…]

The analysis of LHC data is a complex and time-consuming exercise. Therefore, to facilitate the analysis, the samples are accompanied by extensive documentation and metadata, as well as a glossary explaining several hundred special terms used in the preprocessing. The data can be analyzed using dedicated LHCb algorithms, which are available as .

[…]

More information: CERN open data portal

Source: Large Hadron Collider Beauty releases first set of data to the public

Google must delete search results about you if they’re fake, EU court rules

People in Europe can get Google to delete search results about them if they prove the information is “manifestly inaccurate,” the EU’s top court ruled Thursday.

The case kicked off when two investment managers requested Google to dereference results of a search made on the basis of their names, which provided links to certain articles criticising that group’s investment model. They say those articles contain inaccurate claims.

Google refused to comply, arguing that it was unaware whether the information contained in the articles was accurate or not.

But in a ruling Thursday, the Court of Justice of the European Union opened the door to the investment managers being able to successfully trigger the so-called “right to be forgotten” under the EU’s General Data Protection Regulation.

“The right to freedom of expression and information cannot be taken into account where, at the very least, a part – which is not of minor importance – of the information found in the referenced content proves to be inaccurate,” the court said in a press release accompanying the ruling.

People who want to scrub inaccurate results from search engines have to provide sufficient proof that what is said about them is false. But it doesn’t have to come from a court case against a publisher, for instance. They have “to provide only evidence that can reasonably be required of [them] to try to find,” the court said.

[…]

Source: Google must delete search results about you if they’re fake, EU court rules – POLITICO

JetBlue no longer plans to offset emissions from domestic flights, will use sustainable fuel instead

[…] Back in 2020, JetBlue became the first US airline to voluntarily offset greenhouse gas emissions from all of its domestic flights. That effort ends in 2023, the company announced this week.

The airline now plans to effectively cut its per-seat emissions in half by 2035. For flights to take off without generating as much pollution, JetBlue says its planes will need to run on sustainable aviation fuels [SAF].

“JetBlue views SAF as the most promising avenue for addressing aviation emissions in a meaningful and rapid way – once cost-effective SAF is made available commercially at scale,” the company said in a December 6th press release

Since 2020, JetBlue’s routes between San Francisco and Los Angeles have regularly run on sustainable aviation fuels. But the company’s eventually going to need a lot more SAF, which can be made from waste or crops like corn. It’s seen as a potential “bridge fuel” while electric planes and hydrogen-powered jets are still in development. JetBlue has inked deals with several companies to purchase more SAF, but it’s still in pretty limited supply and is more expensive than conventional kerosene jet fuel.

There are environmental challenges with SAF, too. Making and burning SAF still generates CO2 emissions. A lot of that CO2 is supposed to be canceled out by crops grown to produce the fuel, but there are also concerns about those crops leading to more deforestation.

[…]

In October, a report found that eight of Europe’s biggest airlines use carbon offsets to make customers think their flights are greener than they actually are. The airlines purchased poor-quality carbon offsets unlikely to actually reduce carbon dioxide emissions, according to the report.

Carbon offsets are supposed to cancel out the pollution from burning aviation fuel by reducing emissions elsewhere — usually through investments in renewable energy or forestry projects that rely on trees’ ability to trap carbon dioxide. But years of investigations and research have found that most carbon offsets on the market don’t actually represent real-world reductions in pollution.

[…]

Source: JetBlue no longer plans to offset emissions from domestic flights – The Verge

Debate Continues Over What To Do About The Fact That Starlink, Other Low-Earth-Orbit Satellite Systems Are Causing Research-Harming Light Pollution

For years, scientific researchers have warned that Elon Musk’s Starlink low Earth orbit (LEO) satellite broadband constellations are harming scientific research. Simply put, the light pollution Musk claimed would never happen in the first place is making it far more difficult to study the night sky, a problem researchers say can be mitigated somewhat but never fully eliminated.

Musk and company claim they’re working on upgraded satellites that are less obtrusive to scientists, but it’s Musk, so who knows if those solutions actually materialize. Musk isn’t alone in his low-orbit satellite ambitions. Numerous other companies, including Jeff Bezos’ Blue Origin, are planning to fling tens of thousands of these low-orbit satellite “megaconstallations” into the heavens.

One 2020 paper argued that the approval of these low-orbit satellites by the FCC technically violated the environmental law embedded in the 1970 U.S. National Environmental Policy Act (NEPA). Scientific American notes how the FCC has thus far sidestepped NEPA’s oversight, thanks to a “categorical exclusion” the agency was granted in 1986 — long before LEO satellites were a threat.

Last week yet another study emerged from the U.S. Government Accountability Office (GAO, full study here), recommending that the FCC at least revisit the issue:

“We think they need to revisit [the categorical exclusion] because the situation is so different than it was in 1986,” says Andrew Von Ah, a director at the GAO and one of the report’s two lead authors. The White House Council on Environmental Quality (CEQ) recommends that agencies “revisit things like categorical exclusions once every seven years,” Von Ah says. But the FCC “hasn’t really done that since 1986.”

Despite the fact that low-earth orbit solutions like Starlink generally lack the capacity to be meaningfully disruptive to the country’s broadband monopolies, and are, so far, too expensive to address one of the biggest obstacles to adoption (high prices due to said monopolies), the FCC has generally adopted a “we’re too bedazzled by the innovation to bother” mindset until recently.

The FCC this year did recently decide to roll back nearly a billion in Trump-era subsidies for Starlink (in part because the company misled regulators about coverage, but also because the FCC doubted they’d be able to deliver promised speeds and coverage). And the FCC did recently enact laws tightening up requirements for discarding older, failed satellites to address “space junk.”

But taking a tougher stand here would require the FCC taking a bold stance on whether or not NEPA actually applies to the “environment” of outer space and low-Earth orbit, which remains in debate. This is an agency that can’t even be bothered to publicly declare with any confidence that telecom monopolies exist or are a problem, so it seems pretty unlikely they’d want to wade into such controversy.

Like a lot of Musk efforts (like the fatal public potential of misrepresented “full self driving” technology), the issue has been simplistically framed as one of innovation versus mean old pointless government bureaucracy. This simplistic distortion has resulted in zero meaningful oversight as problems mount, something that impacts not just the U.S. (where most launches occur), but every nation on the planet:

“Our society needs space,” says Didier Queloz, an astronomer and Nobel laureate at the University of Cambridge. “I have no problem with space being used for commercial purposes. I just have a problem that it’s out of control. When we started to see this increase in satellites, I was shocked that there are no regulations. So I was extremely pleased to hear that there has been an awareness that it cannot continue like that.”

I’d expect this issue gets punted into the bowels of agency policy purgatory. Even if the agency does act it will be years from now, and unlikely to apply to the satellite licenses already doled out to companies like Starlink and Amazon. And while there are several bills aimed at tightening up restrictions in the space, it seems unlikely any of them are going to survive a dysfunctional and corrupt Congress.

That means that the light pollution caused by LEO satellites will continue to harm scientific researchers, who’ve been forced to embrace expensive, temporary solutions to the problem that are very unlikely to scale effectively as even more LEO companies set their sights on the heavens.

Source: Debate Continues Over What To Do About The Fact That Starlink, Other Low-Earth-Orbit Satellite Systems Are Causing Irreversible, Research-Harming Light Pollution | Techdirt

Polestar 2 gets a 68HP power boost through a paid update, no subscription required – but you are still charged twice what you already bought

Polestar is delivering a not-so-subtle snub to Mercedes’ subscription performance upgrade. The automaker has released an update that gives the Polestar 2’s long range dual motor variant a 68HP power boost (plus 15lb. ft. of torque) in the US and Canada for a one-time $1,195 fee. That’s far from a trivial expense, but it’s a decidedly better value than Merc’s $1,200 annual fee for EQS and EQE acceleration improvements.

The software tuning gives the Polestar 2 a total 476HP with 502lb. ft. of torque. That’s enough to cut the 0-60MPH time to 4.2 seconds (normally 4.5), and it shaves half a second off the 50-70MPH dash (now 2.2 seconds). Polestar says you’ll mainly notice the added grunt in the 44MPH to 80MPH range, so this update may be most helpful when you’re overtaking someone on the highway.

You can buy the update through the Polestar web shop, and it will apply over the air. It’s included with a new vehicle if you opt for the $5,000 Performance pack. You won’t have to visit a store, then. There’s no word of a comparable upgrade for the single motor Polestar 2 variant, or availability in other regions.

[…]

Source: Polestar 2 gets a 68HP power boost through a paid update, no subscription required | Engadget

It’s incredible that people (BMW, Mercedes, now Polestar) are getting away with charging you twice for something you bought.

Why is the EU not doing something about this?

Scammers Are Scamming Other Scammers Out of Millions of Dollars

Nobody is immune to being scammed online—not even the people running the scams. Cybercriminals using hacking forums to buy software exploits and stolen login details keep falling for cons and are getting ripped off thousands of dollars at a time, a new analysis has revealed. And what’s more, when the criminals complain that they are being scammed, they’re also leaving a trail of breadcrumbs of their own personal information that could reveal their real-world identities to police and investigators.

[…]

“Scammers scamming scammers on criminal forums and marketplaces is much bigger than we originally thought it was,” says Matt Wixey, a researcher with Sophos X-Ops who studied the marketplaces.

Wixey examined three of the most prominent cybercrime forums: the Russian-language forums Exploit and XSS, plus the English-language BreachForums, which replaced RaidForums when it was seized by US law enforcement in April. While the sites operate in slightly different ways, they all have “arbitration” rooms where people who think they’ve been scammed or wronged by other criminals can complain. For instance, if someone purchases malware and it doesn’t work, they may moan to the site’s administrators.

The complaints sometimes lead to people getting their money back, but more often act as a warning for other users, Wixey says. In the past 12 months—the period the research covers—criminals on the forums have lost more than $2.5 million to other scammers, the analysis says. Some people complain about losing as little as $2, while the median scams on each of the sites ranges from $200 to $600, according to the research, which is being presented at the BlackHat Europe security conference.

The scams come in multiple forms. Some are simple, others are more sophisticated. Frequently, there are “rip-and-run” scams, Wixey says, where the buyer doesn’t pay for what they’ve received or the seller gets the money but doesn’t send across what they sold. (These are often known as “rippers.”) Other types of scams involve faked data or security exploits that don’t work: One person on BreachForums claimed a seller tried to send them Facebook data that was already public.

In one extreme incident on the Exploit forum, an account posted a lengthy complaint that they had provided someone with a Windows kernel exploit and hadn’t been paid the $130,000 they had agreed for it.

[…]

In some scams, multiple accounts or people appeared to work together, the research says. A user with a good reputation can introduce one person to another. This accomplice then directs the victim to a scam website. In one instance, Wixey says, a user wanted to buy a fake copy of the NFT-focused game Axie Infinity. “They wanted a fake copy of it with the intent of basically siphoning off legitimate user’s funds,” Wixey says. “They bought this fake copy from someone else, and the fake copy contained a backdoor which then stole the stolen cryptocurrency.” The scammer was essentially being scammed through their own scam.

[…]

In 2017, security firm Digital Shadows pointed out a database that had been created to name and shame known rippers. Similarly, in 2021, the firm found that some administrators on cybercrime forums are scamming their own customers. In the past decade, there have been thousands of complaints about criminals scamming each other, according to threat intelligence firm Analyst1. Meanwhile, a previous analysis from TrendMicro concluded that while forums and marketplaces have rules, they don’t deter scammers. “The perpetrators are typically those who go for quick profits over reputation,” the firm’s 2019 research says.

[…]

Because those complaining about scams need to post evidence to back up their claims, they often share screenshots containing more personal information than they may have intended. Sophos says it saw a “treasure trove” of data, including cryptocurrency addresses, transaction IDs, email addresses, victims’ names, some malware source code, and other information. All these details may help to uncover more information about the people behind the usernames or provide clues about how they operate.

In one scamming complaint, a user shared a screenshot that showed someone’s Telegram usernames, email addresses, Jabber chat names, plus Skype and Discord usernames. In others, IP addresses and countries where users may be situated are displayed.

[…]

 

Source: Scammers Are Scamming Other Scammers Out of Millions of Dollars

Telegram is auctioning phone numbers to let users sign up to the service without any SIM

After putting unique usernames on the auction on the TON blockchain, Telegram is now putting anonymous numbers up for bidding. These numbers could be used to sign up for Telegram without needing any SIM card.

Just like the username auction, you can buy these virtual numbers on Fragment, which is a site specially created for Telegram-related auctions. To buy a number, you will have to link your TON wallet (Tonkeeper) to the website.

You can buy a random number for as low as 9 toncoins, which is equivalent to roughly $16.50 at the time of writing. Some of the premium virtual numbers — such as +888-8-888 — are selling for 31,500 toncoins (~$58,200).

Notably, you can only use this number to sign up for Telegram. You can’t use it to receive SMS or calls or use it to register for another service.

For Telegram, this is another way of asking its most loyal supporters to support the app by helping it make some money. The company launched its premium subscription plan earlier this year. On Tuesday, the chat app’s founder Pavel Durov said that Telegram has more than 1 million paid users just a few months after the launch of its premium features. While Telegram offers features like cross-device sync and large groups, it’s important to remember that chats are not protected by end-to-end encryption.

As for folks who want anonymization, Telegram already offers you to hide your phone number. Alternatively, there are tons of virtual phone number services out there — including Google Voice, Hushed, and India-based Doosra — that allow you receive calls and SMS as well.

Source: Telegram is auctioning phone numbers to let users sign up to the service without any SIM

Senator Urges Automakers to Keep Making Cars with AM Radio

he Boston Globe reports that U.S. Senator Ed. Markey just sent a letter to more than 20 car manufacturers asking them to continue including AM radios in future car models — including electric vehicles: Some EV manufacturers have raised concerns even as far back as 2016 about how the battery power of an EV can interfere with AM radio signals. However, Markey addressed these concerns saying, “car manufacturers appear to have developed innovative solutions to this problem.”
“The last time I listened to AM radio was in the late 1970s,” writes long-time Slashdot reader non-e-moose. “And then it was mostly because there were either no FM stations in reception range, or I was riding my bicycle and only had a transistor radio.”

But the Senator sees it differently: AM radio has long been an important source of information for consumers. Before the COVID-19 pandemic, nearly 90 percent of Americans ages 12 and older — totaling hundreds of millions of people — listened to AM or FM radio each week, higher than the percentage that watch television (56 percent) or own a computer (77 percent)…. Moreover, 33 percent of new car buyers say that AM radio is a very important feature in a vehicle — higher than dedicated Wi-Fi (31 percent), SiriusXM satellite radio (27 percent), and personal assistants such as Google Assistant (12 percent) and Amazon Alexa (9 percent). In other words, broadcast AM and FM radio remain an essential vehicle feature for consumers.

Moreover, broadcast AM radio, in particular, is a critical mechanism for government authorities to communicate with the public during natural disasters, extreme weather events, and other emergencies. AM radio operates at lower frequencies and has longer wavelengths than FM radio, so AM radio waves more easily pass through solid objects. As a result, AM radio signals can travel long distances, making them well-suited for broadcasting emergency alerts….

Despite innovations such as the smartphone and social media, AM/FM broadcast radio remains the most dependable, cost-free, and accessible communication mechanism for public officials to communicate with the public during times of emergency. As a result, any phase-out of broadcast AM radio could pose a significant communication problem during emergencies…. Given AM radio’s importance for emergency communications and continued consumer demand, I urge your company to maintain the feature in its new vehicles…

Source: Senator Urges Automakers to Keep Making Cars with AM Radio – Slashdot

Microsoft mistake took down Exchange Online and Teams on 2/12/22

Microsoft’s flagship cloudy productivity services are down across the Asia-Pacific region.

“Our initial investigation indicates that there our service infrastructure is performing at a sub-optimal level, resulting in impact to general service functionality” states an advisory time-stamped 12:41PM on December 2.

The incident means customers of Exchange Online may not be able to access the service, send email and/or files, or use what Microsoft described as “General functionality”.

The impact on Teams means:

  • Users may experience issues scheduling/editing meetings and/or live meetings;
  • People Picker/Search function may not work as expected;
  • Users may be unable to search Microsoft Teams;
  • Users may be unable to load the Assignments tab in Microsoft Teams.

Messaging, chat, channels, and other core Teams services appear to be available.

Microsoft appears not to know what’s wrong.

[…]

Updated at 22:00 UTC, December 2nd The incident has ended! An update to Microsoft’s incident report time-stamped 2314 on December 2 offers the description of the preliminary root cause:

Processing components were not performing within optimal performance thresholds because of a legacy process that required tokens to be processed on specific components. In isolation this process wasn’t problematic, but combined with the large number of requests, this resulted in resource saturation, causing impact across multiple Microsoft 365 apps

Microsoft tested transitioning away from the problematic legacy process and restarting affected infrastructure.

Which worked, so the company did the same thing in its live environment.

The incident ran for nine hours and 59 minutes, from 1355 UTC on December 1st to 0954 UTC on December 2.

[…]

Source: Microsoft mistake took down Exchange Online and Teams • The Register

Crucial Computer Program for Particle Physics at Risk of Obsolescence

Recently, I watched a fellow particle physicist talk about a calculation he had pushed to a new height of precision. His tool? A 1980s-era computer program called FORM

[…]

Developed by the Dutch particle physicist Jos Vermaseren, FORM is a key part of the infrastructure of particle physics, necessary for the hardest calculations. However, as with surprisingly many essential pieces of digital infrastructure, FORM’s maintenance rests largely on one person: Vermaseren himself. And at 73, Vermaseren has begun to step back from FORM development. Due to the incentive structure of academia, which prizes published papers, not software tools, no successor has emerged

[…]

Since 2000, a particle physics paper that cites FORM has been published every few days, on average. “Most of the [high-precision] results that our group obtained in the past 20 years were heavily based on FORM code,” said Thomas Gehrmann, a professor at the University of Zurich.

Some of FORM’s popularity came from specialized algorithms that were built up over the years, such as a trick for quickly multiplying certain pieces of a Feynman diagram, and a procedure for rearranging equations to have as few multiplications and additions as possible. But FORM’s oldest and most powerful advantage is how it handles memory.

[…]

FORM bypasses swapping and uses its own technique. When you work with an equation in FORM, the program assigns each term a fixed amount of space on the hard disk. This technique lets the software more easily keep track of where the pieces of an equation are. It also makes it easy to bring those pieces back to main memory when they are needed without accessing the rest.

Memory has grown since FORM’s early days, from 128 kilobytes of RAM in the Atari 130XE in 1985 to 128 gigabytes of RAM in my souped-up desktop — a millionfold improvement. But the tricks Vermaseren developed remain crucial. As particle physicists pore through petabytes of data from the Large Hadron Collider to search for evidence of new particles, their need for precision, and thus the length of their equations, grows longer.

[…]

As crucial as software like FORM is for physics, the effort to develop it is often undervalued. Vermaseren was lucky in that he had a permanent position at the National Institute for Subatomic Physics in the Netherlands, and a boss who appreciated the project. But such luck is hard to come by. Stefano Laporta, an Italian physicist who developed a crucial simplification algorithm for the field, has spent most of his career without funding for students or equipment. Universities tend to track scientists’ publication records, which means those who work on critical infrastructure are often passed over for hiring or tenure.

“I have seen over the years, consistently, that people who spend a lot of time on computers don’t get a tenure job in physics,” said Vermaseren.

[…]

Without ongoing development, FORM will get less and less usable — only able to interact with older computer code, and not aligned with how today’s students learn to program. Experienced users will stick with it, but younger researchers will adopt alternative computer algebra programs like Mathematica that are more user-friendly but orders of magnitude slower. In practice, many of these physicists will decide that certain problems are off-limits — too difficult to handle. So particle physics will stall, with only a few people able to work on the hardest calculations.

In April, Vermaseren is holding a summit of FORM users to plan for the future. They will discuss how to keep FORM alive: how to maintain and extend it, and how to show a new generation of students just how much it can do. With luck, hard work and funding, they may preserve one of the most powerful tools in physics.

Source: Crucial Computer Program for Particle Physics at Risk of Obsolescence | Quanta Magazine

Grad Students Analyze, Hack, and Remove Under-Desk Surveillance Devices Designed to Track Them – at  a privacy institute!

[…]

graduate students at Northeastern University were able to organize and beat back an attempt at introducing invasive surveillance devices that were quietly placed under desks at their school.

Early in October, Senior Vice Provost David Luzzi installed motion sensors under all the desks at the school’s Interdisciplinary Science & Engineering Complex (ISEC), a facility used by graduate students and home to the “Cybersecurity and Privacy Institute” which studies surveillance. These sensors were installed at night—without student knowledge or consent—and when pressed for an explanation, students were told this was part of a study on “desk usage,” according to a blog post by Max von Hippel, a Privacy Institute PhD candidate who wrote about the situation for the Tech Workers Coalition’s newsletter.

[…]

In response, students began to raise concerns about the sensors, and an email was sent out by Luzzi attempting to address issues raised by students.

[…]

“The results will be used to develop best practices for assigning desks and seating within ISEC (and EXP in due course).”

To that end, Luzzi wrote, the university had deployed “a Spaceti occupancy monitoring system” that would use heat sensors at groin level to “aggregate data by subzones to generate when a desk is occupied or not.” Luzzi added that the data would be anonymized, aggregated to look at “themes” and not individual time at assigned desks, not be used in evaluations, and not shared with any supervisors of the students. Following that email, an impromptu listening session was held in the ISEC.

At this first listening session, Luzzi asked that grad student attendees “trust the university since you trust them to give you a degree,” Luzzi also maintained that “we are not doing any science here” as another defense of the decision to not seek IRB approval.

“He just showed up. We’re all working, we have paper deadlines and all sorts of work to do. So he didn’t tell us he was coming, showed up demanding an audience, and a bunch of students spoke with him,”

[…]

After that, the students at the Privacy Institute, which specialize in studying surveillance and reversing its harm, started removing the sensors, hacking into them, and working on an open source guide so other students could do the same. Luzzi had claimed the devices were secure and the data encrypted, but Privacy Institute students learned they were relatively insecure and unencrypted.

[…]

After hacking the devices, students wrote an open letter to Luzzi and university president Joseph E. Aoun asking for the sensors to be removed because they were intimidating, part of a poorly conceived study, and deployed without IRB approval even though human subjects were at the center of the so-called study.

“Resident in ISEC is the Cybersecurity and Privacy Institute, one of the world’s leading groups studying privacy and tracking, with a particular focus on IoT devices,” the letter reads. “To deploy an under-desk tracking system to the very researchers who regularly expose the perils of these technologies is, at best, an extremely poor look for a university that routinely touts these researchers’ accomplishments.

[…]

Another listening session followed, this time for professors only, and where Luzzi claimed the devices were not subject to IRB approval because “they don’t sense humans in particular – they sense any heat source.” More sensors were removed afterwards and put into a “public art piece” in the building lobby spelling out NO!

[…]

Afterwards, von Hippel took to Twitter and shares what becomes a semi-viral thread documenting the entire timeline of events from the secret installation of the sensors to the listening session occurring that day. Hours later, the sensors are removed

[…]

This was a particularly instructive episode because it shows that surveillance need not be permanent—that it can be rooted out by the people affected by it, together.

[…]

“The most powerful tool at the disposal of graduate students is the ability to strike. Fundamentally, the university runs on graduate students.

[…]

“The computer science department was able to organize quickly because almost everybody is a union member, has signed a card, and are all networked together via the union. As soon as this happened, we communicated over union channels.

[…]

This sort of rapid response is key, especially as more and more systems adopt sensors for increasingly spurious or concerning reasons. Sensors have been rolled out at other universities like Carnegie Mellon University, as well as public school systems. They’ve seen use in more militarized and carceral settings such as the US-Mexico border or within America’s prison system.

These rollouts are part of what Cory Doctrow calls the “shitty technology adoption curve” whereby horrible, unethical and immoral technologies are normalized and rationalized by being deployed on vulnerable populations for constantly shifting reasons. You start with people whose concerns can be ignored—migrants, prisoners, homeless populations—then scale it upwards—children in school, contractors, un-unionized workers. By the time it gets to people whose concerns and objections would be the loudest and most integral to its rejection, the technology has already been widely deployed.

[…]

Source: ‘NO’: Grad Students Analyze, Hack, and Remove Under-Desk Surveillance Devices Designed to Track Them

RIVM Study: ‘Perception of General Aviation in Netherlands’

The Ministry of Infrastructure and Water Management wants to know how residents aged 16 and older in the Netherlands experience their living environment. In that context, it was investigated whether people experience nuisance from the noise caused by GA (“small aviation”). T

he research shows that people experience little inconvenience from small aircraft. Most of the questions in the survey were asked of people who experience noise from GA (so-called “observers”). They are hardly concerned about their safety due to this type of air traffic, except about drones. They do worry about that.

Nearly two thirds of the observers can also enjoy overflying light aircraft. RIVM advises to continue to monitor the impact of helicopters and drones on the perceived quality of the living environment.

Source: Onderzoek RIVM ‘Beleving van kleine luchtvaart in Nederland’ · Aopa Netherlands

There you go. Stop trying to kill GA – it’s the feed for the airlines and transporters and people like it!

As US, UK Embrace ‘Age Verify Everyone!’ French Data Protection Agency Says Age Verification Is Unreliable And Violates Privacy Rights

[…]

We’ve already spent many, many words explaining how age verification technology is inherently dangerous and actually puts children at greater risk. Not to mention it’s a privacy nightmare that normalizes the idea of mass surveillance, especially for children.

But, why take our word for it?

The French data protection agency, CNIL, has declared that no age verification technology in existence can be deemed as safe and not dangerous to privacy rights.

Now, there are many things that I disagree with CNIL about, especially its views that the censorial “right to be forgotten in the EU” should be applied globally. But one thing we likely agree on is that CNIL does not fuck around when it comes to data protection stuff. CNIL is generally seen as the most aggressive and most thorough in its data protection/data privacy work. Being on the wrong side of CNIL is a dangerous place for any company to be.

So I’d take it seriously when CNIL effectively notes that all age verification is a privacy nightmare, especially for children:

The CNIL has analysed several existing solutions for online age verification, checking whether they have the following properties: sufficiently reliable verification, complete coverage of the population and respect for the protection of individuals’ data and privacy and their security.

The CNIL finds that there is currently no solution that satisfactorily meets these three requirements.

Basically, CNIL found that all existing age verification techniques are unreliable, easily bypassed, and are horrible regarding privacy.

Despite this, CNIL seems oddly optimistic that just by nerding harder, perhaps future solutions will magically work. However, it does go through the weaknesses and problems of the various offerings being pushed today as solutions. For example, you may recall that when I called out the dangers of the age verification in California’s Age Appropriate Design Code, a trade group representing age verification companies reached out to me to let me know there was nothing to worry about, because they’d just scan everyone’s faces to visit websites. CNIL points out some, um, issues with this:

The use of such systems, because of their intrusive aspect (access to the camera on the user’s device during an initial enrolment with a third party, or a one-off verification by the same third party, which may be the source of blackmail via the webcam when accessing a pornographic site is requested), as well as because of the margin of error inherent in any statistical evaluation, should imperatively be conditional upon compliance with operating, reliability and performance standards. Such requirements should be independently verified.

This type of method must also be implemented by a trusted third party respecting precise specifications, particularly concerning access to pornographic sites. Thus, an age estimate performed locally on the user’s terminal should be preferred in order to minimise the risk of data leakage. In the absence of such a framework, this method should not be deployed.

Every other verification technique seems to similarly raise questions about effectiveness and how protective (or, well, how not protective it is of privacy rights).

So… why isn’t this raising alarm bells among the various legislatures and children’s advocates (many of whom also claim to be privacy advocates) who are pushing for these laws?

Source: As US, UK Embrace ‘Age Verify Everyone!’ French Data Protection Agency Says Age Verification Is Unreliable And Violates Privacy Rights | Techdirt

Square Enix paid mobile games To Be Completely Disappeared With Studio Shutdown

It’s a lesson that apparently keeps needing to be re-learned over and over again: for far too many types of digital purchases, you simply don’t own the thing you bought. The arena for this perma-lesson are varied: movies, books, music. And, of course, video games. The earliest lesson in that space may have been when Sony removed a useful feature on its PlayStation 3 console after the public had already begun buying it, which is downright insane. But while that was an entire console being impacted, the lesson has been repeated in instances where games and mobile apps simply stop working when the maker decides to shut their servers down, or purchased DLC disappearing for the same reason.

And here we are again, with the announcement that Onoma, previously Square Enix Montreal, is going to be shuttering some of its mobile games. The end result is not that new purchases won’t be available. Instead, the game will just not be a thing anymore. Anywhere.

Arena Battle Champions, Deus Ex GO, Hitman Sniper: The Shadows and Space Invaders: Hidden Heroes will be shutting down on January 4th. The games will be removed from the App Store/Google Play Store on December 1st, and current players will not be able to access the games past January 4th.

Effective immediately, in-game purchases are stopped. We encourage prior in-game purchases to be used before January 4th, as they will not be refunded. On behalf of the development team, we would like to thank you for playing our games.

Deus Ex Go costs $6 on the Google Play Store. You can go buy it right damned now if you wanted to. But why would you, given that the game will simply brick and no longer function in five weeks? And, more importantly, did any of the 500k-plus people who downloaded the game over the years know that it disappearing was a possibility? I mean, I’m sure that buried in the ToS is the standard “you’re just licensing this for as long as we let you” language exists, but I’m also sure that the vast majority of the people who paid for the game didn’t realize this would be a possibility.

[…]

Source: ‘Deus Ex Go’ To Be Completely Disappeared With Studio Shutdown | Techdirt

Scientists simulate ‘baby’ wormhole in quantum computer

[…]

Researchers have announced that they simulated two miniscule black holes in a quantum computer and transmitted a message between them through what amounted to a tunnel in space-time.

They said that based on the quantum information teleported, a traversable wormhole appeared to have emerged, but that no rupture of space and time was physically created in the experiment, according to the study published in the journal Nature on Wednesday.

[…]

Caltech physicist Maria Spiropulu, a co-author of the research, described it as having the characteristics of a “baby wormhole”, and now hopes to make “adult wormholes and toddler wormholes step-by-step”. The wormhole dynamics were observed on a quantum device at Google called the Sycamore quantum processor.

Experts who were not involved in the experiment cautioned that it was important to note that a physical wormhole had not actually been created, but noted the future possibilities.

Daniel Harlow, a physicist at MIT, told the New York Times the experiment was based on a modelling that was so simple that it could just as well have been studied using a pencil and paper.

“I’d say that this doesn’t teach us anything about quantum gravity that we didn’t already know,” Harlow wrote. “On the other hand, I think it is exciting as a technical achievement, because if we can’t even do this (and until now we couldn’t), then simulating more interesting quantum gravity theories would certainly be off the table.”

The study authors themselves made clear that scientists remain a long way from being able to send people or other living beings through such a portal.

[…]

“These ideas have been around for a long time and they’re very powerful ideas,” Lykken said. “But in the end, we’re in experimental science, and we’ve been struggling now for a very long time to find a way to explore these ideas in the laboratory. And that’s what’s really exciting about this. It’s not just, ‘Well, wormholes are cool.’ This is a way to actually look at these very fundamental problems of our universe in a laboratory setting.”

Source: Scientists simulate ‘baby’ wormhole without rupturing space and time | Space | The Guardian

LastPass breached again

In keeping with our commitment to transparency, I wanted to inform you of a security incident that our team is currently investigating. 

We recently detected unusual activity within a third-party cloud storage service, which is currently shared by both LastPass and its affiliate, GoTo. We immediately launched an investigation, engaged Mandiant, a leading security firm, and alerted law enforcement. 

We have determined that an unauthorized party, using information obtained in the August 2022 incident, was able to gain access to certain elements of our customers’ information. Our customers’ passwords remain safely encrypted due to LastPass’s Zero Knowledge architecture. 

We are working diligently to understand the scope of the incident and identify what specific information has been accessed. In the meantime, we can confirm that LastPass products and services remain fully functional.

[…]

Source: Notice of Recent Security Incident – The LastPass Blog

Scientists produce nanobodies in plant cells that block emerging pathogens – using plants to grow bodies that block Covid (and more?)

Scientists at the U.S. Department of Agriculture’s (USDA) Agricultural Research Service (ARS) recently announced that plants could be used to produce nanobodies that quickly block emerging pathogens in human medicine and agriculture. These nanobodies represent a promising new way to treat viral diseases, including SARS-CoV-2.

Nanobodies are small antibody proteins naturally produced in specific animals like camels, alpacas, and llamas.

ARS researchers turned to evaluating nanobodies to prevent and treat citrus greening disease in citrus trees. These scientists are now using their newly developed and patented SymbiontTM technology to show that nanobodies can be easily produced in a plant system with broad agricultural and public health applications.

As a proof-of-concept, researches showed that nanobodies targeting the SARS-CoV-2 virus could be made in plant cells and remain functional in blocking the binding of the SARS-CoV-2 spike protein to its receptor protein: the process responsible for initiating viral infection in human cells.

“We initially wanted to develop to pathogens in ,” said ARS researcher Robert Shatters, Jr. “The results of that research are indeed successful and beneficial for the nation’s agricultural system. But now we are aware of an even greater result—the benefits of producing therapeutics in plants now justify the consideration of using to mass produce COVID-19 protein-based therapies.”

AgroSource, Inc. collaborated with USDA-ARS to develop the plant-based production system. They are currently taking the necessary steps to see how they can move this advancement into the commercial sector.

“This is a huge breakthrough for science and innovative solutions to agricultural and public health challenges,” said ARS researcher Michelle Heck. “This cost-efficient, plant-based system proves that there are alternative ways to confront and prevent the spread of emerging pathogens. The approach has the potential to massively expand livelihood development opportunities in rural agricultural areas of the nation and in other countries.”

The findings are published on the bioRxiv preprint server.

More information: Marco Pitino et al, Plant production of high affinity nanobodies that block SARS-CoV-2 spike protein binding with its receptor, human angiotensin converting enzyme, bioRxiv (2022). DOI: 10.1101/2022.09.03.506425

Source: Scientists produce nanobodies in plant cells that block emerging pathogens

Disney Made an AI Tool That Automatically De-Ages Actors

[…]

To make an age-altering AI tool that was ready for the demands of Hollywood and flexible enough to work on moving footage or shots where an actor isn’t always looking directly at the camera, Disney’s researchers, as detailed in a recently published paper, first created a database of thousands of randomly generated synthetic faces. Existing machine learning aging tools were then used to age and de-age these thousands of non-existent test subjects, and those results were then used to train a new neural network called FRAN (face re-aging network).

A step-by-step illustration of how FRAN generates aging/de-aging changes which are applied to the original input face.
Screenshot: YouTube – DisneyResearchHub

When FRAN is fed an input headshot, instead of generating an altered headshot, it predicts what parts of the face would be altered by age, such as the addition or removal of wrinkles, and those results are then layered over the original face as an extra channel of added visual information. This approach accurately preserves the performer’s appearance and identity, even when their head is moving, when their face is looking around, or when the lighting conditions in a shot change over time. It also allows the AI generated changes to be adjusted and tweaked by an artist, which is an important part of VFX work: making the alterations perfectly blend back into a shot so the changes are invisible to an audience.

 


Source: Disney Made an AI Tool That Automatically De-Ages Actors

Players are boycotting Nintendo and Panda events in the wake of Smash Bros tournaments being instacanceled by Nintendo

n the wake of Nintendo being Nintendo and unceremoniously canceling the Smash World Tour, one of the year’s biggest esports tournaments dedicated to all things Super Smash Bros., copious folks in the game’s community have come out in protest. Casual fans, pro players, long-time commentators, and even other tournament organizers, from AITX eSports to Beyond the Summit, have all publicly denounced not just Nintendo for its asinine decision but also Panda Global for allegedly causing the Smash World Tour to get shut down. Now, it appears many of those people are boycotting all of Nintendo’s officially licensed tournaments as well.

[…]

Super Smash Bros. fans aren’t happy about what’s going on, with many posting their frustrations on Twitter. Some pointed fingers at Panda Global CEO and co-founder Dr. Alan Bunney for allegedly trying to recruit tournaments to the Panda Cup by threatening to get Nintendo involved to shut the Smash World Tour down and reportedly attempting to create a monopoly by requesting exclusive streaming rights to the Panda Cup. Others fear this may hurt their careers and livelihoods. The main consensus is to never watch, support, or attend a Panda Global event ever again. A lot of people seem to feel this way.

[…]

The future of Super Smash Bros.’s competitive fighting game scene is looking quite precarious, with Video Game Boot Camp admitting in the statement that it’s “currently navigating budget cuts, internal communications with our team and partners, commitments/contracts, as well as sponsorship negotiations that will inevitably be affected by all of this.” It’s possible that smaller tournaments will continue without Nintendo’s blessing, but, as has been done time and again, it’s likely only a matter of time until Nintendo comes a-knocking.

[…]

Source: Smash Bros. Fans Are Totally Done With Nintendo And Tournaments

The article says that Smash Bros tournaments were cancelled due to Nintendo not sponsoring them, but the tournaments were cancelled due to Nintendo throwing cease and desist letters at the organisers. Also see: Nintendo Shuts Down Smash World Tour – worlds largest e-sports tournament – out of the blue

Telegram shares users’ data in copyright violation lawsuit to Indian court

Telegram has disclosed names of administrators, their phone numbers and IP addresses of channels accused of copyright infringement in compliance with a court order in India in a remarkable illustration of the data the instant messaging platform stores on its users and can be made to disclose by authorities.

The app operator was forced by a Delhi High Court order to share the data after a teacher sued the firm for not doing enough to prevent unauthorised distribution of her course material on the platform. Neetu Singh, the plaintiff teacher, said a number of Telegram channels were re-selling her study materials at discounted prices without permission.

An Indian court earlier had ordered Telegram to adhere to the Indian law and disclose details about those operating such channels.

Telegram unsuccessfully argued that disclosing user information would violate the privacy policy and the laws of Singapore, where it has located its physical servers for storing users’ data. In response, the Indian court said the copyright owners couldn’t be left “completely remediless against the actual infringers” because Telegram has chosen to locate its servers outside the country.

In an order last week, Justice Prathiba Singh said Telegram had complied with the earlier order and shared the data.

“Let copy of the said data be supplied to Id. Counsel for plaintiffs with the clear direction that neither the plaintiffs nor their counsel shall disclose the said data to any third party, except for the purposes of the present proceedings. To this end, disclosure to the governmental authorities/police is permissible,” said the court (PDF) and first reported by LiveLaw.

[…]

Source: Telegram shares users’ data in copyright violation lawsuit | TechCrunch

More Details On China’s Exotic Orbital Hypersonic Weapon Come To Light

[…]

This information was included in the Defense Department’s annual Military and Security Developments Involving the People’s Republic of China report, more commonly known as the China Military Power Report (CMPR), which serves as an assessment of China’s current defense strategy and military capabilities. While the CMPR analyzes a wide array of Chinese military advancements, it was especially beneficial in clarifying what exactly occurred during the country’s highly intriguing hypersonic weapon test that took place on July 27, 2021, which can be read about in detail here.

[…]

“On July 27, 2021, China conducted the first fractional orbital launch of an ICBM [intercontinental ballistic missile] with an HGV [hypersonic glide vehicle],” the CMPR revealed. “The HGV flew around the world and impacted inside China. This demonstrated the greatest distance flown (~40,000 km) and longest flight time (~100+ minutes) of any land-attack PRC [People’s Republic of China] weapons system to date. According to senior U.S. military officials, the HGV did not strike its target, but came close.”

[…]

As The War Zone discussed in this previous breakdown of the FOB concept, the depressed flight profile and capacity to strike really any target near its orbital path pose quite the challenge for an opponent’s tracking and missile defense networks. The FOB system could attack from vectors that its opponent’s radars are not looking toward, affecting its ability to anticipate where and when a strike may occur, let alone counter one.

An infographic depicting the flight path of a FOB system. Credit: Wikimedia Commons

China’s FOB-like system, though, instead carries a maneuverable hypersonic glide vehicle as opposed to a traditional nuclear-armed reentry vehicle, allowing it to change course dynamically and fly at lower altitudes, even porpoising as it goes, during its flight through the atmosphere. This allows it to hit targets much farther off its orbital flight path and makes interception nearly impossible. As noted earlier, reports that China’s hypersonic glide vehicle had also released its own projectile while on its very high-speed descent complicates things further, as The War Zone explained in detail in this past article.

The Financial Times, which was the first to report on the test, even emphasized how caught off-guard the Pentagon was by this development considering how technically complex it would be for anything moving at high hypersonic speeds to launch its own projectile.

[…]

The Pentagon throughout the CMPR cited the U.S. military’s own advancements in the hypersonic realm as the predominant driving factor behind China’s innovations while admitting that most of China’s missile systems are “comparable in quality to systems of other international top-tier producers.” An underlying fear that the proliferation of hypersonic technology could soon “blur the line between nuclear and conventional escalation” was also highlighted as a potential motivator behind these advancements. These influences are being reflected in other Chinese strategic developments, as well.

Regardless, it is important to note that U.S. missile defenses, as they exist now, aren’t anywhere capable of deflecting a massive nuclear strike from a near-peer like China or Russia, which is something The War Zone has previously touched on. Defending against hypersonic weapons, especially ones that can attack from unpredictable vectors like this FOB-capable system would be able to, is an even more challenging proposition.

[…]

Source: More Details On China’s Exotic Orbital Hypersonic Weapon Come To Light