Julian Assange Extradition to US Approved by UK Government

Julian Assange—founder of the whistleblowing website WikiLeaks—can now be extradited from the United Kingdom to the United States, where he will face charges of espionage.

In April, a London court filed a formal extradition order for Assange, and the UK Home Secretary approved the order today, meaning that Assange can be extradited back to the United States. According to CNBC , Assange is facing 18 charges of espionage for his involvement with WikiLeaks, the website that published hundreds of thousands of classified military documents in 2010 and 2011.

Assange has been in prison or the Ecuadorian Embassy in London for much of the last decade. He’s currently being held in a high-security prison in London. Assange has the right to appeal today’s decision within 14 days, and WikiLeaks indicated it would be doing just that in a statement posted on Twitter this morning.

“This is a dark day for press freedom and for British democracy,” WikiLeaks said. “Julian did nothing wrong. He has committed no crime and is not a criminal. He is a journalist and a publisher, and he is being punished for doing his job.”

[…]

Source: Julian Assange Extradition to US Approved by UK Government

The Earth moves far under our feet: A new study shows that the inner core oscillates

USC scientists have found evidence that the Earth’s inner core oscillates, contradicting previously accepted models that suggested it consistently rotates at a faster rate than the planet’s surface.

Their study, published today in Science Advances, shows that the inner core changed direction in the six-year period from 1969–74, according to the analysis of seismic data. The scientists say their model of inner core movement also explains the variation in the length of day, which has been shown to oscillate persistently for the past several decades.

“From our findings, we can see the Earth’s surface shifts compared to its inner core, as people have asserted for 20 years,” said John E. Vidale, co-author of the study and Dean’s Professor of Earth Sciences at USC Dornsife College of Letters, Arts and Sciences. “However, our latest observations show that the inner core spun slightly slower from 1969–71 and then moved the other direction from 1971–74. We also note that the length of day grew and shrank as would be predicted.

“The coincidence of those two observations makes oscillation the likely interpretation.”

[…]

Utilizing data from the Large Aperture Seismic Array (LASA), a U.S. Air Force facility in Montana, researcher Wei Wang and Vidale found the inner core rotated slower than previously predicted, approximately 0.1 degrees per year. The study analyzed waves generated from Soviet underground nuclear bomb tests from 1971–74 in the Arctic archipelago Novaya Zemlya using a novel beamforming technique developed by Vidale.

The new findings emerged when Wang and Vidale applied the same methodology to a pair of earlier atomic tests beneath Amchitka Island at the tip of the Alaskan archipelago—Milrow in 1969 and Cannikin in 1971. Measuring the compressional waves resulting from the , they discovered the inner core had reversed direction, sub-rotating at least a tenth of a degree per year.

[…]

The study does support the speculation that the inner core oscillates based on variations in the length of day—plus or minus 0.2 seconds over six years—and geomagnetic fields, both of which match the theory in both amplitude and phase. Vidale says the findings provide a compelling theory for many questions posed by the research community.

“The inner core is not fixed—it’s moving under our feet, and it seems to going back and forth a couple of kilometers every six years,” Vidale said. “One of the questions we tried to answer is, does the inner core progressively move or is it mostly locked compared to everything else in the long term? We’re trying to understand how the formed and how it moves over time—this is an important step in better understanding this process.”

Source: The Earth moves far under our feet: A new study shows that the inner core oscillates

US Copyright Office sued for denying AI model authorship

The US Copyright Office and its director Shira Perlmutter have been sued for rejecting one man’s request to register an AI model as the author of an image generated by the software.

You guessed correct: Stephen Thaler is back. He said the digital artwork, depicting railway tracks and a tunnel in a wall surrounded by multi-colored, pixelated foliage, was produced by machine-learning software he developed. The author of the image, titled A Recent Entrance to Paradise, should be registered to his system, Creativity Machine, and he should be recognized as the owner of the copyrighted work, he argued.

(Owner and author are two separate things, at least in US law: someone who creates material is the author, and they can let someone else own it.)

Thaler’s applications to register and copyright the image behalf of Creativity Machine, however, have been turned down by the Copyright Office twice. Now, he has sued the government agency and Perlmutter. “Defendants’ refusal to register the copyright claim in the work is contrary to law,” Thaler claimed in court documents [PDF] filed this month in a federal district court in Washington DC.

“The agency actions here were arbitrary, capricious, an abuse of discretion and not in accordance with the law, unsupported by substantial evidence, and in excess of Defendants’ statutory authority,” the lawsuit claimed.

Thaler’s lawyer, Ryan Abbott, believes the Copyright Office should overturn its previous decision and process Thaler’s original application. “The refusal to register the copyright claim in the work should be set aside and the application reinstated,” he argued.

[…]

Source: US Copyright Office sued for denying AI model authorship • The Register

Scientists covered a robot finger in living human skin

[…] At the moment, robots are sometimes coated in silicone rubber to give them a fleshy appearance, but the rubber lacks the texture of human skin, he says.

To make more realistic-looking skin, Takeuchi and his colleagues bathed a plastic robot finger in a soup of collagen and human skin cells called fibroblasts for three days. The collagen and fibroblasts adhered to the finger and formed a layer similar to the dermis, which is the second-from-top layer of human skin.

Next, they gently poured other human skin cells called keratinocytes onto the finger to recreate the upper layer of human skin, called the epidermis.

The resulting 1.5-millimetre-thick skin was able to stretch and contract as the finger bent backwards and forwards. As it did this, it wrinkled like normal skin, says Takeuchi. “It is much more realistic than silicone.”

The robot skin could also be healed when it was cut by grafting a collagen sheet onto the wound.

However, the skin began to dry out after a while since it didn’t have blood vessels to replenish it with moisture.

In the future, it may be possible to incorporate artificial blood vessels into the skin to keep it hydrated, as well as sweat glands and hair follicles to make it more realistic, says Takeuchi.

It should also be possible to make different skin colours by adding melanocytes, he says.

The researchers now plan to try coating a whole robot in the living skin. “But since this research field has the potential to build a new relationship between humans and robots, we need to carefully consider the risks and benefits of making it too realistic,” says Takeuchi.

Source: Scientists covered a robot finger in living human skin | New Scientist

Planting Undetectable Backdoors in Machine Learning Models

We show how a malicious learner can plant an undetectable backdoor into a classifier. On the surface, such a backdoored classifier behaves normally, but in reality, the learner maintains a mechanism for changing the classification of any input, with only a slight perturbation. Importantly, without the appropriate “backdoor key”, the mechanism is hidden and cannot be detected by any computationally-bounded observer. We demonstrate two frameworks for planting undetectable backdoors, with incomparable guarantees.
First, we show how to plant a backdoor in any model, using digital signature schemes. The construction guarantees that given black-box access to the original model and the backdoored version, it is computationally infeasible to find even a single input where they differ. This property implies that the backdoored model has generalization error comparable with the original model. Second, we demonstrate how to insert undetectable backdoors in models trained using the Random Fourier Features (RFF) learning paradigm or in Random ReLU networks. In this construction, undetectability holds against powerful white-box distinguishers: given a complete description of the network and the training data, no efficient distinguisher can guess whether the model is “clean” or contains a backdoor.
Our construction of undetectable backdoors also sheds light on the related issue of robustness to adversarial examples. In particular, our construction can produce a classifier that is indistinguishable from an “adversarially robust” classifier, but where every input has an adversarial example! In summary, the existence of undetectable backdoors represent a significant theoretical roadblock to certifying adversarial robustness.

Source: [2204.06974] Planting Undetectable Backdoors in Machine Learning Models

Testing firm Cignpost can profit from sale of Covid swabs with customer DNA

A large Covid-19 testing provider is being investigated by the UK’s data privacy watchdog over its plans to sell swabs containing customers’ DNA for medical research.

Source: Testing firm can profit from sale of Covid swabs | News | The Sunday Times

Find you: an airtag which Apple can’t find in unwanted tracking

[…]

In one exemplary stalking case, a fashion and fitness model discovered an AirTag in her coat pocket after having received a tracking warning notification from her iPhone. Other times, AirTags were placed in expensive cars or motorbikes to track them from parking spots to their owner’s home, where they were then stolen.

On February 10, Apple addressed this by publishing a news statement titled “An update on AirTag and unwanted tracking” in which they describe the way they are currently trying to prevent AirTags and the Find My network from being misused and what they have planned for the future.

[…]

Apple needs to incorporate non-genuine AirTags into their threat model, thus implementing security and anti-stalking features into the Find My protocol and ecosystem instead of in the AirTag itself, which can run modified firmware or not be an AirTag at all (Apple devices currently have no way to distinguish genuine AirTags from clones via Bluetooth).

The source code used for the experiment can be found here.

Edit: I have been made aware of a research paper titled “Who Tracks the Trackers?” (from November 2021) that also discusses this idea and includes more experiments. Make sure to check it out as well if you’re interested in the topic!

[…]

Survey of Alternative Displays

[Blair Nearl] has been working on an information database for artists and hackers – a collection of non-conventional display technologies available to us. We’ve covered this repository before, six years ago – since then, it’s moved to a more suitable platform, almost doubled in size, and currently covers over 40+ display technology types and related tricks. This database is something you should check out even if you’re not looking for a new way to display things right now, however, for its sheer educational and entertainment value alone.

[…]

If you’re ever wondered about the current state of technology when it comes to flexible or transparent displays, or looked for good examples of volumetric projection done in a variety of ways, this is the place to go. It also talks about interesting experimental technologies, like drone displays, plasma combustion or scanning fiber optics. Overall, if you’re looking to spend about half an hour learning about all the ways there are to visualize something, this database is worth a read. And, if there’s a display technology the author might’ve missed and you know something about, contributions are welcome!

Someone setting out to compile information about an extensive topic is always appreciated, and helps many hackers on their path. We’ve seen that done with 3D printer resin settings and SMD part codes, to name just a few. What’s your favourite hacker-maintained database?

Source: Alternative Display Technologies And Where To Find Them

Things like Transparent displays, volumetric displays, modified polarizers, e-ink, flexible displays, lasers and projectors, lightfield displays, head mounted displays, projection on water or fog, diffusion and distortion, switchable glass, drone displays, electrochromic paint, acoustic levitation display, plasma combustion and many more

The survey itself is here

Some of Canon’s wireless Pixma printers are stuck in reboot loops

Over the last day or two, there have been a growing number of reports by people who own certain Canon Pixma printers that the devices either won’t turn on at all or, once turned on, get stuck in a reboot loop, cycling on and off as long as they’re plugged in. Verge reader Jamie pointed us to posts on Reddit about the problem and Canon’s own support forum, citing problems with models including the MX490, MX492, MB2010, and MG7520.

Some believe their problem is due to a software update Canon pushed to the printers, but that hasn’t been confirmed yet. In response to an inquiry from The Verge, corporate communications senior director and general manager Christine Sedlacek said, “We are currently investigating this issue and hope to bring resolution shortly as customer satisfaction is our highest priority.”

Until there is an official update or fix, some people in the forums have found that disconnecting the printers from the internet is enough to keep them from rebooting, with control still possible via USB.

To get the printers to work while maintaining your connection to the internet and their connection to local network devices, one reply from a customer on Canon’s support forum suggests a method that many people report has worked for them. If you’re experienced with network setups, DNS servers, and IP addresses, it could be worth trying, but for most people, I’d recommend waiting for an official solution.

To follow their steps, then, after taking your internet offline, turn on the printer, go into its network settings, and, under web service setup, select DNS server setup and choose manual setup. In that section, input an internal network address (192.168.X.X, with numbers replacing X that aren’t in use by any other devices on your local network), press “OK,” and then press “no” for a secondary DNS server. This keeps the printer connected to your router without accessing the wider internet, and, for some reason, has been enough to stop the devices from rebooting.

Source: Some of Canon’s wireless Pixma printers are stuck in reboot loops – The Verge

What Is Pegasus Spyware? Why is it important? Infographic

If you’ve been following the latest news on government surveillance scandals around the world, the name Pegasus may have popped up in your feed. It’s a complex story, so we’ve put together an infographic explainer that covers all the basics.

How does Pegasus work? Check. Which world leaders were targeted? Check. Astonishing subscription costs? Check. Gasp. Check. Our infographic should help you understand why NSO’s Pegasus software is in the news so much.

Check it out below, or download it in full here.

Source: What Is Pegasus? All About the Infamous Software (Infographic) – CyberGhost Privacy Hub

Fan’s Rare Recordings Of Lost 1963 Beatles’ Performances Can’t Be Heard, Because … Copyright

There’s a story in the Daily Mail that underlines why it is important for people to make copies. It concerns the re-surfacing of rare recordings of the Beatles:

In the summer of 1963, the BBC began a radio series called Pop Go The Beatles which went out at 5pm on Tuesdays on the Light Programme.

Each show featured the Beatles performing six or seven songs, recorded in advance but as live, in other words with no or minimal post-production.

The BBC had not thought it worth keeping the original recordings, even though they consisted of rarely heard material – mostly covers of old rock ‘n’ roll numbers. Fortunately, a young fan of the Beatles, Margaret Ashworth, used her father’s modified radio connected directly to a reel-to-reel tape recorder to make recordings of the radio shows, which meant they were almost of broadcast quality.

When the recording company EMI was putting together an album of material performed by the Beatles for the BBC, it was able to draw on these high-quality recordings, some of which were much better than the other surviving copies. In this case, it was just chance that Margaret Ashworth had made the tapes. The general message is that people shouldn’t do this, because “copyright”. There are other cases where historic cultural material would have been lost had people not made copies, regardless of what copyright law might say.

Margaret Ashworth thought it would be fun to put out the old programmes she had recorded on a Web site, for free, recreating the weekly schedules she had heard back in the 1960s. So she contacted the BBC for permission, but was told it would “not approve” the upload of her recordings to the Internet. As she writes:

after all these years, with the Beatles still extremely popular, it seems mean-spirited of the BBC not to allow these little time capsules to be broadcast, either by me or by the Corporation. I cannot believe there are copyright issues that cannot be solved.

Readers of this blog probably can.

Source: Fan’s Rare Recordings Of Lost Beatles’ Performances Can’t Be Heard, Because Copyright Ruins Everything | Techdirt

Microsoft’s free Top Gun ‘Flight Simulator’ expansion is finally here

Now that Top Gun: Maverick is finally reaching theaters, the matching Microsoft Flight Simulator expansion is launching as well. Microsoft and Asobo Studio have released the free add-on to both hype up the Tom Cruise movie and give you a taste of the US Navy’s real-world flight training. You’ll get a “Maverick Edition” livery for the F/A-18E Super Hornet fighter jet, but you’ll also learn how to land on an aircraft carrier, perform combat maneuvers and navigate challenging terrain at low altitude.

[…]

Source: Microsoft’s free Top Gun ‘Flight Simulator’ expansion is finally here | Engadget

Now Amazon to put creepy AI cameras in UK delivery vans

Amazon is installing AI-powered cameras in delivery vans to keep tabs on its drivers in the UK.

The technology was first deployed, with numerous errors that reportedly denied drivers’ bonuses after malfunctions, in the US. Last year, the internet giant produced a corporate video detailing how the cameras monitor drivers’ driving behavior for safety reasons. The same system is now being rolled out to vehicles in the UK.

Multiple cameras are placed under the front mirror. One is directed at the person behind the wheel, one faces the road, and two are located on either side to provide a wider view. The cameras do not record constant video, and are monitored by software built by Netradyne, a computer-vision startup focused on driver safety. This code uses machine-learning algorithms to figure out what’s going on in and around the vehicle. Delivery drivers can also activate the cameras to record footage if they want to, such as if someone’s trying to rob them or run them off the road. There is no microphone, for what it’s worth.

Audio alerts are triggered by some behaviors, such as if a driver fails to brake at a stop sign or is driving too fast. Other actions are silently logged, such as if the driver doesn’t wear a seat-belt or if a camera’s view is blocked. Amazon, reportedly in the US at least, records workers and calculates from their activities a score that affects their pay; drivers have previously complained of having bonuses unfairly deducted for behavior the computer system wrongly classified as reckless.

[…]

Source: Now Amazon to put ‘creepy’ AI cameras in UK delivery vans • The Register

GM Discloses Data Breach of Cars’ Locations, Mileage, Service

General Motors suffered a hack that exposed a significant amount of sensitive personal information on car owners—names, addresses, phone numbers, locations, car mileage, and maintenance history.

The Detroit-based automaker revealed details of the incident in a breach disclosure filed with the California Attorney General’s Office on May 16. The disclosure explains that malicious login activity was detected on an unspecified number of GM online user accounts between April 11 and 29. Further investigation revealed that the company had been hit with a credential stuffing attack, which saw hackers infiltrate user accounts to steal customer reward points, which they then redeemed for gift cards

[…]

In addition to the reward points theft, the incident also exposed a significant amount of user information. GM’s breach notification lays out a full list of the information that may have been compromised by the hackers:

  • first and last name
  • personal email address
  • home address
  • username
  • phone number
  • last known and saved favorite location
  • OnStar package (if applicable)
  • family members’ avatars and photos
  • profile picture
  • search and destination information
  • reward card activity
  • fraudulently redeemed reward points

[…]

Source: GM Discloses Data Breach of Cars’ Locations, Mileage, Service

Cheap gel film pulls buckets of drinking water per day from thin air

Water scarcity is a major problem for much of the world’s population, but with the right equipment drinking water can be wrung out of thin air. Researchers at the University of Texas at Austin have now demonstrated a low-cost gel film that can pull many liters of water per day out of even very dry air.

The gel is made up of two main ingredients that are cheap and common – cellulose, which comes from the cell walls of plants, and konjac gum, a widely used food additive. Those two components work together to make a gel film that can absorb water from the air and then release it on demand, without requiring much energy.

First, the porous structure of the gum attracts water to condense out of the air around it. The cellulose, meanwhile, is designed to respond to a gentle heat by turning hydrophobic, releasing the captured water.

Making the gel is also fairly simple, the team says. The basic ingredients are mixed together then poured into a mold, where it sets in two minutes. After that it’s freeze-dried, then peeled out of the mold and ready to get to work. It can be made into basically any shape needed, and scaled up fairly easily and at low-cost.

The gel film can be cut and molded into whatever shape is needed

The gel film can be cut and molded into whatever shape is needed
University of Texas at Austin

In tests, the gel film was able to wring an astonishing amount of water out of the air. At a relative humidity of 30 percent, it could produce 13 L (3.4 gal) of water per day per kilogram of gel, and even when the humidity dropped to just 15 percent – which is low, even for desert air – it could still produce more than 6 L (1.6 gal) a day per kilogram.

[…]

Source: Cheap gel film pulls buckets of drinking water per day from thin air

MGM Resorts’ 142m person customer data now leaked on Telegram for free

Miscreants have dumped on Telegram more than 142 million customer records stolen from MGM Resorts, exposing names, postal and email addresses, phone numbers, and dates of birth for any would-be identity thief.

The vpnMentor research team stumbled upon the files, which totaled 8.7 GB of data, on the messaging platform earlier this week, and noted that they “assume at least 30 million people had some of their data leaked.” MGM Resorts, a hotel and casino chain, did not respond to The Register‘s request for comment.

The researchers reckon this information is linked to the theft of millions of guest records, which included the details of Twitter’s Jack Dorsey and pop star Justin Bieber, from MGM Resorts in 2019 that was subsequently distributed via underground forums.

But while crooks initially sold those 142 million records on a dark-web marketplace for about $3,000 as a packaged deal, this time the data is freely available on Telegram, which vpnMentor rightly describes as “much more accessible for even the least tech-savvy people.”

Perhaps the recent takedown of stolen-data market RaidForums and the Hydra dark-web souk has something to do with this? Or that the info is no longer worth selling, or no one’s interested in buying it, perhaps.

According to the VPN services company, the data dumped on Telegram includes the following customer information from before 2017:

  • Full names
  • Postal addresses
  • Over 24 million unique email addresses
  • Over 30 million unique phone numbers
  • Dates of birth

[…]

Source: MGM Resorts’ customer data now leaked on Telegram for free • The Register

Twitter fined $150 million after selling 2FA phone numbers + email addresses to targeting advertisers

Twitter has agreed to pay a $150 million fine after federal law enforcement officials accused the social media company of illegally using peoples’ personal data over six years to help sell targeted advertisements.

In court documents made public on Wednesday, the Federal Trade Commission and the Department of Justice say Twitter violated a 2011 agreement with regulators in which the company vowed to not use information gathered for security purposes, like users’ phone numbers and email addresses, to help advertisers target people with ads.

Federal investigators say Twitter broke that promise.

“As the complaint notes, Twitter obtained data from users on the pretext of harnessing it for security purposes but then ended up also using the data to target users with ads,” said FTC Chair Lina Khan.

Twitter requires users to provide a telephone number and email address to authenticate accounts. That information also helps people reset their passwords and unlock their accounts when the company blocks logging in due to suspicious activity.

But until at least September 2019, Twitter was also using that information to boost its advertising business by allowing advertisers access to users’ phone numbers and email addresses. That ran afoul of the agreement the company had with regulators.

[…]

Source: Twitter will pay a $150 million fine over accusations it improperly sold user data : NPR

GitHub saved plaintext passwords of npm users in log files

GitHub has revealed it stored a “number of plaintext user credentials for the npm registry” in internal logs following the integration of the JavaScript package registry into GitHub’s logging systems.

The information came to light when the company today published the results of its investigation into April’s unrelated OAuth token theft attack, where it described how an attacker grabbed data including the details of approximately 100,000 npm users.

The code shack went on to assure users that the relevant log files had not been leaked in any data breach; that it had improved the log cleanup; and that it removed the logs in question “prior to the attack on npm.”

GitHub already sent out notifications for “known victims of third-party OAuth token theft” in April but today said it planned to “directly notify affected users of the plaintext passwords and GitHub Personal Access Tokens based on our available logs.”

Credentials in plaintext, eh? How very last century.

The number of users affected and how long the plaintext storage took place was not mentioned, but we’ve asked Github for more information. GitHub completed its acquisition of NPM Inc on 15 April 2020. Techies have already taken to the Hacker News messaging board to detail emails they received from npm.

[…]

Source: GitHub saved plaintext passwords of npm users in log files • The Register

Smart Contact Lenses with AR screens

 

[…]The BBC recently covered Mojo, a company developing smart contact lenses that not only correct vision but can show a display. You can see a video from CNET on the technology below.

The lenses have microLED displays, smart sensors, and solid-state batteries similar to those found in pacemakers. The company claims to have a “feature-complete prototype” and are going to start testing, according to the BBC article. We imagine you can’t get much of a battery crammed into a contact lens, but presumably, that’s one of the things that makes it so difficult to develop this sort of tech.

The article mentions other smart contacts under development, too, including a University of Surrey lens that can monitor eye health using various sensors integrated into the lens. You have to wonder how this would be in real life. Presumably, the display turns off and you see nothing, but it is annoying enough having your phone beep constantly without getting messages across your field of vision all the time.

It seems like this is a technology that will come, of course. If not this time, then sometime in the future. While we usually think the hacker community should lead the way, we aren’t sure we want to hack on something that touches people’s eyeballs.[…]

 

[…]

Source: Smart Contact Lenses Put You Up Close To The Screen | Hackaday

Clearview AI Ordered to Purge U.K. Face Scans, Pay GBP 7.5m Fine

The United Kingdom has had it with creepy facial recognition firm Clearview AI. Under a new enforcement rule from the U.K.’s Information Commissioner’s office, Clearview must cease the collection and use of publicly available U.K. data and delete all data of U.K. residents from their database. The order, which will also require the company to pay a £7,552,800 ($9,507,276) fine, effectively calls on Clearview to purge U.K. residents from its massive face database reportedly consisting of over 20 billion images scrapped from publicly available social media sites.

The ICO ruling which determined Clearview violated U.K. privacy laws, comes on the heels of a multi-year joint investigation with the Australian Information Commissioner. According to the ICO ruling, Clearview failed to use U.K. resident data in a way that was fair and transparent and failed to provide a lawful reason for collecting the data in the first place. Clearview also failed, the ICO notes, to put in place measures to stop U.K resident data from having their data collected indefinitely and supposedly didn’t meet higher data protection standards outlined in the EU’s General Data Protection Regulation.

[…]

Source: Clearview AI Ordered to Purge U.K. Face Scans, Pay Fine

Hashed Takes $3.5B Hit, Delphi Digital Discloses Loss After Terra’s LUNA Collapse

The collapse of the tokens linked to the Terra ecosystem, stablecoin terraUSD (UST) and Luna (LUNA), has led to some major investors coming clean and detailing their losses. Two more backers of Terra are disclosing exactly how their balance sheets have been affected.

Delphi Digital, a research firm and boutique investor, said in a blog post that it always had concerns about the structure of UST and LUNA, but believed that the sizable reserves in the Luna Foundation Guard, a nonprofit that supports the Terra network, would prevent the unthinkable from happening.

[…]

The firm wrote that in the first quarter of 2021, Delphi Ventures Master Fund purchased a small amount of LUNA, worth 0.5% of its net asset value (NAV) at the time. That position grew as LUNA’s value increased and the fund increased its holdings, including a $10 million investment in the LFG’s funding round in February. That investment is now worthless.

While Delphi said that it didn’t sell any LUNA, it’s now sitting on “a large unrealized loss.”

[…]

One of Terra’s other prominent backers is Hashed, an early-stage venture fund based in Seoul, South Korea. The company invested in TerraForm Labs’ $25 million venture round in 2021, according to Crunchbase data.

[…]

Hashed didn’t immediately respond to a request for comment, but on-chain data shows that the firm had staked over 27 million in LUNA on the Columbus 3 mainnet, 9.7 million in LUNA for the Columbus 4 mainnet and 13.2 million in LUNA on the current Columbus 5 mainnet.

CoinDesk - Unknown

Terra’s blockexporer for the Columbus-3 mainnet shows Hashed had significant holdings of Luna (Hubble blockexplorer)

All in all, Hashed’s losses amount to over $3.5 billion using pricing data from early April.

Local media in South Korea report that more than 200,000 investors in the country hold Terra-related tokens.

[…]

Source: Hashed Wallet Takes $3.5B Hit, Delphi Digital Discloses Loss After Terra’s LUNA Collapse

Boeing’s Starliner successfully docks to the International Space Station for the first time

This evening, Boeing’s new passenger spacecraft, the CST-100 Starliner, successfully docked itself to the International Space Station — demonstrating that the vehicle can potentially bring humans to the ISS in the future. It’s a crucial capability that Starliner has finally validated in space after years of delays and failures.

Starliner is in the midst of a key test flight for NASA called OFT-2, for Orbital Flight Test-2. The capsule, developed by Boeing for NASA’s Commercial Crew Program, was made to transport NASA’s astronauts to and from the space station. But before anyone climbs on board, NASA tasked Boeing with conducting an uncrewed flight demonstration of Starliner to show that the capsule can hit all of the major milestones it’ll need to hit when it is carrying passengers.

Boeing has struggled to showcase Starliner’s ability until now. This mission is called OFT-2 since it’s technically a do-over of a mission that Boeing attempted back in 2019, called OFT. During that flight, Starliner launched to space as planned, but a software glitch prevented the capsule from getting in the right orbit it needed to reach to rendezvous with the ISS. Boeing had to bring the vehicle home early, and the company never demonstrated Starliner’s ability to dock with the ISS.

[…]

At 6:54PM ET, Starliner successfully launched to space on top of an Atlas V rocket, built and operated by the United Launch Alliance. Once Starliner separated from the Atlas V, it had to fire its own thrusters to insert itself into the proper orbit for reaching the space station. However, after that maneuver took place, Boeing and NASA revealed that two of the 12 thrusters Starliner uses for the procedure failed and cut off too early. The capsule’s flight control system was able to kick in and rerouted to a working thruster, which helped get Starliner into a stable orbit.

Ultimately, NASA and Boeing claimed that the issue should not impact the rest of Starliner’s mission. “There’s really no need to resolve them,” Steve Stich, NASA’s program manager for the Commercial Crew Program, said in a press conference after the flight. “But I know what the teams will do, and what we always do is we’ll go look at the data, try to understand what happened.” Today, Boeing revealed that a drop in chamber pressure had caused the early cutoff of the thruster, but that system behaved normally during follow-up burns of the thrusters. And with redundancies on the spacecraft, the issue “does not pose a risk to the rest of the flight test,” according to Boeing.

Boeing also noted today that the Starliner team is investigating some weird behavior of a “thermal cooling loop” but said that temperatures are stable on the spacecraft.

[…]

Source: Boeing’s Starliner successfully docks to the International Space Station for the first time

Wait, with the record on their 777 aircraft they are saying things like they don’t need to resolve issues?!

Total Commander forced to stop letting you install APKs

One of the handiest features on Android that sets it apart from the mobile competition is the ability to install apps from outside the Play Store. APK installation is why you can still play Fortnite — even as Epic’s legal battle with Google continues — and it’s how you can skip the wait for automatic updates to bring the latest features to your favorite apps. Unfortunately, one of Android’s most trusted file browsers has removed the ability to install APK files after receiving takedown warnings from Google.

Total Commander has been around since the 90s, eventually expanding into Android after the platform launched over a decade ago. The app has more than 10 million downloads on the Play Store, still supporting OS versions as far back as Android 2.2. With a new update, developer Christian Ghisler has removed the ability to install APK files on Android, blaming Google Play policies in the patch notes for the app. It’s a shocking twist for the service and, seemingly, a bad omen of things to come for other mobile file managers.

A forum post from Ghisler sheds some more light on what’s going on here, as Google sent him a notice warning of his app’s removal from the Play Store within a week if the app went unmodified. The company’s automated response pointed the developer to the “Device and Network Abuse” policy — specifically, these two sections:

An app distributed via Google Play may not modify, replace, or update itself using any method other than Google Play’s update mechanism. Likewise, an app may not download executable code (e.g., dex, JAR, .so files) from a source other than Google Play. This restriction does not apply to code that runs in a virtual machine or an interpreter where either provides indirect access to Android APIs (such as JavaScript in a webview or browser).

Apps or third-party code (e.g., SDKs) with interpreted languages (JavaScript, Python, Lua, etc.) loaded at run time (e.g., not packaged with the app) must not allow potential violations of Google Play policies.

Based on these rules, the Play Store’s moderation system might believe Total Commander is attempting to update itself, thereby passing Google Play’s update service altogether. Ghisler says he did attempt to block Total Commander’s own APK from installing when you click on it, but automated systems checking his app for potential abuse didn’t catch the change. He resubmitted, only to receive this vague message in return:

As mentioned previously, your app (APK versions 1031, 1032, 1033, 1034, 1035 and 1036) causes users to download or install applications from unknown sources outside of Google Play.

According to Ghisler, he then made the decision to remove APK installations altogether, for fear of losing access to his account after a third warning — as has happened to other developers in a similar situation.

It’s possible that this block could have wide-reaching ramifications on file and web browsers in the Play Store, though the language used — not to mention Google’s poor reputation on false takedowns — seems to hint at something less insidious. Based on the information provided by Ghisler, it seems like Google either thinks Total Commander is updating itself from within, is accidentally linking to specific APK-hosting websites, or is using a custom app installation process before navigating the user to Android’s default installer. Either way, this sounds like a situation that needs some clarification from the company. Google should either spell out exactly what Total Commander is doing wrong that other file browsers have avoided, or should allow the app back on the Play Store in its previous state.

[…]

Source: Total Commander forced to stop letting you install APKs

Acer Debuts External Monitors With Stereoscopic 3D

[…]

Two products revealed today, the SpatialLabs View and SpatialLabs View Pro, are standalone external monitors with 15.6-inch, 4K displays with glasses-free stereoscopic 3D technology. We’ve seen this tech from Acer before when it debuted in ConceptD notebooks where it was meant for designers, but never in this format.

Acer SpartialLabs View
Acer SpartialLabs View
Image: Acer

Distinguishing these two monitors is their audience; the standard model is meant for entertainment (watching movies, gaming, etc) whereas the Pro edition is for commercial users. For the former, SpatialLabs TrueGame is a portal for playing games in 3D. The app gives each of the 50 or so 3D-compatible games a pre-configured profile so gamers can feel more immersed. The list of games that Acer shared by email includes some big titles like Forza Horizon 5, God of War, and The Witcher 3: Wild Hunt.

To use it, gamers need to launch the app then go to the game they want to play and press “play.” That’s it! The app does the rest, automatically launching the game file while activating its associated TrueGame 3D profile so it can boot in Stereoscopic 3D mode. It’s not just games, though. With SpatialLabs Go, you can turn just about anything into a 3D image, including photos and videos taken on your device. And designers can use plug-ins to render creations into stereoscopic 3D so the digital versions appear closer to the physical product

[…]

Source: Acer Debuts Pricey External Monitors With Stereoscopic 3D

Your data’s auctioned off up to 987 times a day, NGO reports

The average American has their personal information shared in an online ad bidding war 747 times a day. For the average EU citizen, that number is 376 times a day. In one year, 178 trillion instances of the same bidding war happen online in the US and EU.

That’s according to data shared by the Irish Council on Civil Liberties in a report detailing the extent of real-time bidding (RTB), the technology that drives almost all online advertising and which it said relies on sharing of personal information without user consent.

The RTB industry was worth more than $117 billion last year, the ICCL report said. As with all things in its study, those numbers only apply to the US and Europe, which means the actual value of the market is likely much higher.

Real-time bidding involves the sharing of information about internet users, and it happens whenever a user lands on a website that serves ads. Information shared with advertisers can include nearly anything that would help them better target ads, and those advertisers bid on the ad space based on the information the ad network provides.

That data can be practically anything based on the Interactive Advertising Bureau’s (IAB) audience taxonomy. The basics, of course, like age, sex, location, income and the like are included, but it doesn’t stop there. All sorts of websites fingerprint their visitors – even charities treating mental health conditions – and those fingerprints can later be used to target ads on unrelated websites.

Google owns the largest ad network that was included in the ICCL’s report, and it alone offers RTB data to 4,698 companies in just the US. Other large advertising networks include Xandr, owned by Microsoft since late 2021, Verizon, PubMatic and more.

Not included in ICCL’s report are Amazon or Facebook’s RTB networks, as the industry figures it used for its report don’t include their ad networks. Along with only surveying part of the world that likely means that the scope of the RTB industry is, again, much larger.

Also, it’s probably illegal

The ICCL describes RTB as “the biggest data breach ever recorded,” but even that may be giving advertisers too much credit: Calling freely-broadcast RTB data a breach implies action was taken to bypass defenses, of which there aren’t any.

So, is RTB violating any laws at all? Yes, claims Gartner Privacy Research VP Nader Henein. He told The Register that the adtech industry justifies its use of RTB under the “legitimate interest” provision of the EU’s General Data Protection Regulation (GDR).

“Multiple regulators have rejected that assessment, so the answer would be ‘yes,’ it is a violation [of the GDPR],” Henein opined.

As far back as 2019, Google and other adtech giants were accused by the UK of knowingly breaking the law by using RTB, a case it continues to investigate. Earlier this year, the Belgian data protect authority ruled that RTB practices violated the GDPR and required organizations working with the IAB to delete all the data collected through the use of TC strings, a type of coded character used in the RTB process.

[…]

Source: Privacy. Ad bidders haven’t heard of it, report reveals