×
Security

A Cyberattack Has Disrupted Hospitals and Health Care in Several States (apnews.com) 20

A cyberattack has disrupted hospital computer systems in several states, forcing some emergency rooms to close and ambulances to be diverted, and many primary care services remained closed on Friday as security experts worked to determine the extent of the problem and resolve it. From a report: The "data security incident" began Thursday at facilities operated by Prospect Medical Holdings, which is based in California and has hospitals and clinics there and in Texas, Connecticut, Rhode Island and Pennsylvania. "Upon learning of this, we took our systems offline to protect them and launched an investigation with the help of third-party cybersecurity specialists," the company said in a statement Friday. "While our investigation continues, we are focused on addressing the pressing needs of our patients as we work diligently to return to normal operations as quickly as possible." In Connecticut, the emergency departments at Manchester Memorial and Rockville General hospital were closed for much of Thursday and patients were diverted to other nearby medical centers.

[...] The FBI in Connecticut issued a statement saying it is working with "law enforcement partners and the victim entities" but could not comment further on an ongoing investigation. Elective surgeries, outpatient appointments, blood drives and other services were suspended, and while the emergency departments reopened late Thursday, many primary care services were closed on Friday, according to the Eastern Connecticut Health Network, which runs the facilities. Patients were being contacted individually, according to the network's website. Similar disruptions also were reported at other facilities system-wide.

Transportation

The Boring Company Will Dig a 68-Mile Tunnel Network Under Las Vegas (arstechnica.com) 142

An anonymous reader quotes a report from Ars Technica: Elon Musk's tunneling company has permission to significantly expand its operations under the city of Las Vegas. Last month, the Las Vegas City Council voted unanimously to approve the Boring Company's plan to dig more tunnels under the city, following in the steps of Clark County, which in May gave a similar thumbs-up to the tunneling concern. The company's plan calls for 68 miles of tunnels and 81 stations, served by a fleet of Tesla electric vehicles, each able to carry three passengers at a time.

Despite the unanimous approval, Mayor Carolyn Goldman had a litany of concerns, including safety, low throughput of passengers, and a lack of accessibility. However, she said that "hotels are begging for transportation options." [...] Should the Boring Company see this project through to completion, 60 of the stations would be in Clark County, mostly concentrated down the Strip and the major casinos, with the remaining 21 in the city of Las Vegas.

It's funny.  Laugh.

Excel's Esports Revolution is Coming Back To ESPN This Week (theverge.com) 24

The Excel World Championship is coming back to ESPN this week. On Friday morning at 7AM ET, as part of ESPN's annual "The Ocho" event, a few of the world's foremost Excel experts will battle to solve puzzles on the biggest stage in sports. From a report: The Ocho is an ESPN event designed to show off otherwise un-televised sports -- Excel is on the docket alongside "2023 Slippery Stairs," the "Pillow Fight Championship," and competitions in everything from belt-sanding to sign spinning -- but it's still a big deal. When competitive Excel showed up on the network last year, the sport found a whole new audience. More than 800,000 people have since watched the full 2.5-hour competition on YouTube (ESPN showed a 30-minute edit of the battle), and the folks who started the World Championship say it changed the event's trajectory forever.
Australia

Australians Fight for the Right To Work From Home Permanently (reuters.com) 75

As corporate leaders call for an end to pandemic-era remote work arrangements, unions in Australia are setting a precedent and fighting back, taking to court the country's biggest bank and wrangling with the federal government to demand WFH, as it is known, to become the norm. From a report: "All the deep changes in the Australian labour market have come out of crises. When you have a jolt, you never return to the way the world was," said John Buchanan, head of the University of Sydney's Health and Work Research Network. "We're always ahead of the pack in the English-speaking world, say compared to the UK, US, New Zealand." Empowered by the lowest unemployment rate in half a century, staff at Commonwealth Bank of Australia took the A$170 billion ($114 billion) lender to the industrial tribunal to challenge a directive to work from the office half of the time.
Printer

Canon Warns Printer Users To Manually Wipe Wi-Fi Settings Before Discarding 37

Printer manufacturer Canon is warning that sensitive Wi-Fi settings don't automatically get wiped during resets, so customers should manually delete them before selling, discarding, or getting them repaired to prevent the settings from falling into the wrong hands. From a report: "Sensitive information on the Wi-Fi connection settings stored in the memories of inkjet printers (home and office/large format) may not be deleted by the usual initialization process," company officials wrote in an advisory on Monday. They went on to say that manual wiping should occur "when your printer may be in the hand of any third party, such as when repairing, lending or disposing the printer."

Like many printers these days, those from Canon connect to networks over Wi-Fi. To do this, users must provide the SSID name, the password preventing unauthorized access to the network, and in some cases, additional information such as Wi-Fi network type, the local network IP address, the MAC address, and network profile. It would be reasonable to assume that performing a simple factory reset that returns all settings to their defaults would be enough to remove these settings, but Monday's advisory indicated that isn't necessarily the case. In the event this information is exposed, malicious actors could use them to gain unauthorized access to a network hosting a Canon printer.
Encryption

Cult of Dead Cow Hacktivists Design Encryption System for Mobile Apps (washingtonpost.com) 22

Once known for distributing hacking tools and shaming software companies into improving their security, a famed group of technology activists is now working to develop a system that will allow the creation of messaging and social networking apps that won't keep hold of users' personal data. From a report: The group, Cult of the Dead Cow, has developed a coding framework that can be used by app developers who are willing to embrace strong encryption and forsake revenue from advertising that is targeted to individuals based on detailed profiles gleaned from the data most apps now routinely collect. The team is building on the work of such free products as Signal, which offers strong encryption for text messages and voice calls, and Tor, which offers anonymous web surfing by routing traffic through a series of servers to disguise the location of the person conducting the search.

The latest effort, to be detailed at the massive annual Def Con hacking conference in Las Vegas next week, seeks to provide a foundation for messaging, file sharing and even social networking apps without harvesting any data, all secured by the kind of end-to-end encryption that makes interception hard even for governments. Called Veilid, and pronounced vay-lid, the code can be used by developers to build applications for mobile devices or the web. Those apps will pass fully encrypted content to one another using the Veilid protocol, its developers say. As with the file-sharing software BitTorrent, which distributes different pieces of the same content simultaneously, the network will get faster as more devices join and share the load, the developers say. In such decentralized "peer-to-peer" networks, users download data from each other instead of from a central machine.

Piracy

Reddit Beats Film Industry, Won't Have To Identify Users Who Admitted Torrenting (arstechnica.com) 55

An anonymous reader quotes a report from Ars Technica: Film companies lost another attempt to force Reddit to identify anonymous users who discussed piracy. A federal court on Saturday quashed a subpoena (PDF) demanding users' names and other identifying details, agreeing with Reddit's argument that the film companies' demands violate the First Amendment. The plaintiffs are 20 producers of popular movies who are trying to prove that Internet service provider Grande is liable for its subscribers' copyright infringement because the ISP allegedly ignores piracy on its network. Reddit isn't directly involved in the copyright case. But the film companies filed a motion to compel Reddit to respond to a subpoena demanding "basic account information including IP address registration and logs from 1/1/2016 to present, name, email address and other account registration information" for six users who wrote comments on Reddit threads in 2011 and 2018.

"The issue is whether that discovery is permissible despite the users' right to speak anonymously under the First Amendment," US Magistrate Judge Laurel Beeler wrote in her ruling against the film copyright holders. "The court denies the motion because the plaintiffs have not demonstrated a compelling need for the discovery that outweighs the users' First Amendment right to anonymous speech." The film companies seeking Reddit users' identities include After II Movie LLC, Bodyguard Productions, Hitman 2 Productions, Millennium Funding, Nikola Productions, Rambo V Productions, and Dallas Buyers Club LLC. As Beeler's ruling on Saturday noted, they sought the identities of two users who wrote about torrenting on Grande's network in 2018 [...]. The companies also sought identities of four users who commented in a 2011 thread. "I have grande. No issues with torrent or bandwidth caps," one user comment said. Another Reddit user wrote, "I have torrented like a motherfucker all over grande and have never seen anything." Reddit's filing (PDF) pointed out that the statute of limitations for copyright infringement is three years. The film companies said (PDF) the statute of limitations is irrelevant to whether the comments can provide evidence in the case against Grande.

XBox (Games)

Microsoft Now Offers Xbox Wireless Controller Replacement Parts For DIY Repairs (neowin.net) 28

Microsoft is extending the repairability program it introduced for its Surface PC products to include replacement parts for its Xbox Wireless Controller and Xbox Elite Controller Series 2 products. Neowin reports: The page on the Microsoft Store site shows that replacement parts are available for the top case for both versions of the controller, along with replacement buttons. In addition, Microsoft is selling Replacement Input PCBA boards for those Xbox controllers, along with the Replacement PCBA and Motor Assembly parts as well. The parts do come with a one-year warranty.

In a new support page, Microsoft makes it clear that these parts should only be purchased and used for Xbox controllers that are out of their normal warranty period. On another support page, the company adds: "These types of repairs require moderate technical skill, and are suited for enthusiasts, professionals, or those with prior experience in electronic disassembly. If this is your first attempt at performing a repair, use caution and follow our safety recommendations and step-by-step instructions."

Microsoft also says that certain tools, which are not directly sold by the company, will be needed to replace and repair the controllers. They include a plastic pry tool, TR8 and T5 Torx screwdriver bits and plastic tweezers. Microsoft does offer PDF files (PDF) and even offers YouTube video tutorials for repairing the Xbox Wireless Controller and the Xbox Elite Wireless Controller Series 2.

The Internet

AWS To Start Charging For Public IPv4 Addresses (theregister.com) 140

Long-time Slashdot reader nairnr shares a report from The Register: Cloud giant AWS will start charging customers for public IPv4 addresses from next year, claiming it is forced to do this because of the increasing scarcity of these and to encourage the use of IPv6 instead. It is now four years since we officially ran out of IPv4 ranges to allocate, and since then, those wanting a new public IPv4 address have had to rely on address ranges being recovered, either from from organizations that close down or those that return addresses they no longer require as they migrate to IPv6.

If Amazon's cloud division is to be believed, the difficulty in obtaining public IPv4 addresses has seen the cost of acquiring a single address rise by more than 300 percent over the past five years, and as we all know, the business is a little short of cash at the moment, so is having to pass these costs on to users. "This change reflects our own costs and is also intended to encourage you to be a bit more frugal with your use of public IPv4 addresses and to think about accelerating your adoption of IPv6 as a modernization and conservation measure,' writes AWS Chief Evangelist Jeff Barr, on the company news blog.

The update will come into effect on February 1, 2024, when AWS customers will see a charge of $0.005 (half a cent) per IP address per hour for all public IPv4 addresses. These charges will apparently apply whether the address is attached to a service or not, and like many AWS charges, appear inconsequential at first glance but can mount up over time if a customer is using many of them. These charges will apply to all AWS services including EC2, Relational Database Service (RDS) database instances, Elastic Kubernetes Service (EKS) nodes, and will apply across all AWS regions, the company said. However, customers will not be charged for IP addresses that they own and bring to AWS using Amazon's BYOIP feature. AWS offers a free tier for EC2, and this will include 750 hours of public IPv4 address usage per month for the first 12 months, starting from the same date the charges do.

Businesses

Amazon Achieved Its 'Fastest Prime Speeds Ever' Last Quarter (techcrunch.com) 45

An anonymous reader quotes a report from TechCrunch: Amazon achieved its "fastest Prime speeds ever" last quarter, the online retail giant announced on Monday. The company says it has delivered more than 1.8 billion units to U.S. Prime members so far this year, nearly four times what it delivered at those speeds by this point in 2019. Across the top 60 largest U.S. metro areas, more than half of Prime member orders arrived the same or next day. Same-day delivery is currently available on millions of items for customers across more than 90 U.S. metro areas, and Amazon plans to double the number of delivery sites in the coming years.

Amazon notes that the average time from picking a customer's items to positioning the customer's package on the outbound dock is 11 minutes in same-day facilities, more than an hour faster than its traditional fulfillment centers. For context, same-day facilities are stocked with what customers in those areas are purchasing, while traditional facilities are larger and include a more vast assortment of items. "As we make these changes, we are seeing that they have the added benefit of reducing costs, too," Doug Herrington, CEO of Worldwide Amazon Stores, wrote in a blog post. "Regionalizing our network reduces miles traveled and handoffs. Since the beginning of this year alone, the distance between our sites and the customer decreased by 15%, with 12% fewer touchpoints within our middle mile network. Improved product placement gets items even closer to customers, making our delivery system more efficient. And our Same-Day Delivery network is not only our fastest way to get products to customers, it is also one of our lowest cost ways."

Power

Seven Major Automakers Plan 30,000 More High-Speed Chargers in North America by 2030 (theverge.com) 72

"A new group of automotive super friends is banding together," reports the Verge, "promising to build the next big North American electric vehicle charging network." These worldwide automakers — BMW, General Motors, Honda, Hyundai, Kia, Mercedes-Benz, and Stellantis — announced a planned joint venture Wednesday to erect easy-to-activate DC fast chargers along US and Canadian highways and in urban environments.

The grand plan for the currently unnamed partnership is to install "at least" 30,000 high-speed EV chargers by 2030, with the first ones to open summer 2024 in the US. The collective plans to leverage National Electric Vehicle Infrastructure (NEVI) funding in the US and will also use other private and public funding from state and federal sources to build out the network... The new stations will connect and charge EV models made by the partnered automakers without having to fumble with another charging station app. The companies also plan to integrate the developing "Plug and Charge" standard that the Federal Highway Administration is attempting to standardize... All stations will include the standardized Tesla North American Charging Standard (NACS) ports and also the current widely used Combined Charging System (CCS) plugs.

"The new joint venture is also planned to be entirely powered by renewable energy," the article adds.

But "It's not known if renewable energy will directly power them or if the companies plan to buy credits like Rivian announced Tuesday."
Red Hat Software

AlmaLinux Discovers Working with Red Hat (and CentOS Stream) Isn't Easy (zdnet.com) 73

After Red Hat's decision to only share RHEL source code with subscribers, AlmaLinux asked their bug report submitters to "attempt to test and replicate the problem in CentOS Stream as well, so we can focus our energy on correcting it in the right place."

Red Hat told Ars Technica they are "eager to collaborate" on their CentOS Stream distro, "even if we ultimately compete in a business sense. Differentiated competition is a sign of a healthy ecosystem."

But Red Hat still managed to ruffled some feathers, reports ZDNet: AlmaLinux Infrastructure Team Leader Jonathan Wright recently posted a CentOS Stream fix for CVE-2023-38403, a memory overflow problem in iperf3. Iperf3 is a popular open-source network performance test. This security hole is an important one, but not a huge problem.

Still, it's better by far to fix it than let it linger and see it eventually used to crash a server. That's what I and others felt anyway. But, then, a senior Red Hat software engineer replied, "Thanks for the contribution. At this time, we don't plan to address this in RHEL, but we will keep it open for evaluation based on customer feedback."

That went over like a lead balloon.

The GitLab conversation proceeded:

AlmaLinux: "Is customer demand really necessary to fix CVEs?"

Red Hat: "We commit to addressing Red Hat defined Critical and Important security issues. Security vulnerabilities with Low or Moderate severity will be addressed on demand when [a] customer or other business requirements exist to do so."

AlmaLinux: "I can even understand that, but why reject the fix when the work is already done and just has to be merged?"

At this point, Mike McGrath, Red Hat's VP of Core Platforms, AKA RHEL, stepped in. He explained, "We should probably create a 'what to expect when you're submitting' doc. Getting the code written is only the first step in what Red Hat does with it. We'd have to make sure there aren't regressions, QA, etc. ... So thank you for the contribution, it looks like the Fedora side of it is going well, so it'll end up in RHEL at some point."

Things went downhill rapidly from there...

On Reddit, McGrath said, "I will admit that we did have a great opportunity for a good-faith gesture towards Alma here and fumbled."

Finally, though the Red Hat Product Security team rated the CVE as "'Important,' the patch was merged.

Coincidentally, last month AlmaLinux announced that its move away from 1:1 compatibility with RHEL meant "we can now accept bug fixes outside of Red Hat's release cycle."

This Thursday AlmaLinux also reiterated that they're "fully committed to delivering the best possible experience for the community, no matter where or what you run." And in an apparent move to beef up compatibility testing, they announced they'd be bringing openQA to the RHEL ecosystem. (They describe openQA as a tool using virtual machines that "simplifies automated testing of the whole installation process of an operating system in a wide combination of software and hardware configurations.")
Piracy

Italian Pirate IPTV Customers Risk a 5,000 Euro Fine Starting August 8, 2023 (torrentfreak.com) 45

An anonymous reader quotes a report from TorrentFreak: Italy's brand new anti-piracy law has just received full approval from telecoms regulator AGCOM. In a statement issued Thursday, AGCOM noted its position "at the forefront of the European scene in combating online piracy." The new law comes into force on August 8 and authorizes nationwide ISP blocking of live events and enables the state to issue fines of up to 5,000 euros to users of pirate streams .

In a statement published Thursday, AGCOM welcomed the amendments to Online Copyright Enforcement regulation 680/13/CONS, which concern measures to counter the illegal distribution of live sports streams, as laid out in Resolution 189/23/CONS. The new provisions grant AGCOM the power to issue "dynamic injunctions" against online service providers of all kinds, a privilege usually reserved for judges in Europe's highest courts. The aim is to streamline blocking measures against unlicensed IPTV services, with the goal of rendering them inaccessible across all of Italy.

"With such measures, it will be possible to disable access to pirated content in the first 30 minutes of the event broadcast by blocking DNS resolution of domain names and blocking the routing of network traffic to IP addresses uniquely intended for illicit activities," AGCOM says. "With this amendment, in perfect synchrony with the changes introduced by Parliament, AGCOM is once again at the forefront of the European scene in combating online piracy activity," says AGCOM Commissioner Massimiliano Capitanio.

NASA

NASA's Voyager 2 Is Experiencing an Unplanned 'Communications Pause' (gizmodo.com) 60

A routine sequence of commands has triggered a 2-degree change in Voyager 2's antenna orientation, preventing the iconic spacecraft from receiving commands or transmitting data back to Earth, NASA announced earlier today. Mission controllers transmitted the commands to Voyager 2 on July 21. Gizmodo reports: Voyager 2, one of two twin probes launched in the 1970s to explore planets in the outer solar system, is located some 12.4 billion miles (19.9 billion kilometers) from Earth and is continually moving deeper into interstellar space. The glitch has disrupted the probe's ability to communicate with ground antennas operated by the Deep Space Network (DSN), and it's unable to receive commands from the mission team on Earth, NASA explained.

The communications pause is expected to be just that -- a pause. Voyager 2 is "programmed to reset its orientation multiple times each year to keep its antenna pointing at Earth," the space agency says. This procedure should -- fingers crossed -- re-establish the lost connection and allow routine communications to resume. The next reset is scheduled for October 15, which is 79 days from now. Undoubtedly, this will be 79 agonizing days for NASA and the Voyager team. Despite the current communication hiatus, the mission team remains confident that Voyager 2 will stay on its planned trajectory. Voyager 1, situated nearly 15 billion miles (24 billion kilometers) away from Earth, "continues to operate normally," NASA added.

AI

AI Helps Crack Salt Water's Curious Electrical Properties (science.org) 11

sciencehabit shares a report from Science: Water is a near-universal solvent, able to dissolve substances ranging from limestone to the sugar in your coffee. That chemical superpower originates, oddly enough, in water's electrical properties. It can oppose and almost entirely cancel electric fields -- including attractions among dissolved ions that might otherwise pull them together. Curiously, dissolving salt in water weakens that electrical response. Now, a team of physicists has figured out exactly why this happens, using state-of-the-art computer simulations bolstered by artificial intelligence (AI).

'This is a fundamental property of water and one can finally do a calculation in which this can be entirely predicted from first principles,' says Roberto Car, a physicist at Princeton University who was not involved in the work. The AI-aided approach should allow physicists to probe in other settings, he says, such as batteries and fuel cells. [...] The results show that most of the salinity effect comes from the disruption of the clustering and correlations produced by hydrogen bonding, the team reports in a paper in press at Physical Review Letters. The researchers can pull out even more detail, explaining exactly how disruptions propagating through the network of water molecules make the dielectric constant vary with the salt concentration in a complex, nonlinear way.

"They can distinguish all the different contributions and identify which effect is dominant over the other," Car says. Yuki Nagata, a physicist at the Max Planck Institute for Polymer Research, says, "This is more or less conclusive." More important than this specific result may be the AI-based method, Nagata adds. It could be used for more practical problems, such as analyzing the interactions of water with membranes or surfaces. Zhang says she's doing just that, analyzing the splitting of water into hydrogen and oxygen along the surface of a titanium dioxide catalyst, one potential way to generate hydrogen for fuel.

The Internet

'Tor's Shadowy Reputation Will Only End If We All Use It' (engadget.com) 65

Katie Malone writes via Engadget: "Tor" evokes an image of the dark web; a place to hire hitmen or buy drugs that, at this point, is overrun by feds trying to catch you in the act. The reality, however, is a lot more boring than that -- but it's also more secure. The Onion Router, now called Tor, is a privacy-focused web browser run by a nonprofit group. You can download it for free and use it to shop online or browse social media, just like you would on Chrome or Firefox or Safari, but with additional access to unlisted websites ending in .onion. This is what people think of as the "dark web," because the sites aren't indexed by search engines. But those sites aren't an inherently criminal endeavor.

"This is not a hacker tool," said Pavel Zoneff, director of strategic communications at The Tor Project. "It is a browser just as easy to use as any other browser that people are used to." That's right, despite common misconceptions, Tor can be used for any internet browsing you usually do. The key difference with Tor is that the network hides your IP address and other system information for full anonymity. This may sound familiar, because it's how a lot of people approach VPNs, but the difference is in the details. VPNs are just encrypted tunnels hiding your traffic from one hop to another. The company behind a VPN can still access your information, sell it or pass it along to law enforcement. With Tor, there's no link between you and your traffic, according to Jed Crandall, an associate professor at Arizona State University. Tor is built in the "higher layers" of the network and routes your traffic through separate tunnels, instead of a single encrypted tunnel. While the first tunnel may know some personal information and the last one may know the sites you visited, there is virtually nothing connecting those data points because your IP address and other identifying information are bounced from server to server into obscurity.

Accessing unindexed websites adds extra perks, like secure communication. While a platform like WhatsApp offers encrypted conversations, there could be traces that the conversation happened left on the device if it's ever investigated, according to Crandall. Tor's communication tunnels are secure and much harder to trace that the conversation ever happened. Other use cases may include keeping the identities of sensitive populations like undocumented immigrants anonymous, trying to unionize a workplace without the company shutting it down, victims of domestic violence looking for resources without their abuser finding out or, as Crandall said, wanting to make embarrassing Google searches without related targeted ads following you around forever.

Intel

Intel Returns To Profitability After Two Quarters of Losses (cnbc.com) 21

Intel reported second-quarter earnings on Thursday, including a return to profitability after two straight quarters of losses, and a stronger-than-expected forecast. CNBC reports: For the third quarter, Intel expects earnings of $0.20 per share, adjusted, on revenue of $13.4 billion at the midpoint, versus analyst expectations of 16 cents per share on $13.23 billion in sales. Intel posted net income of $1.5 billion, or earnings of $0.35 per share, versus a net loss of $454 million, or a loss of 11 cents per share, in the same quarter last year.

Intel CFO David Zinsner said in a statement that part of the reason that Intel's report was stronger than expected was because of the progress it has made towards slashing $3 billion in costs this year. Earlier this year, Intel slashed its dividend and announced plans to save $10 billion per year by 2025, including through layoffs. Revenue fell to $12.9 billion from $15.3 billion a year ago, marking the sixth consecutive quarter of declining sales for the company.

Here's how Intel's business units performed:
- Intel's Client Computing group, which includes the company's laptop and desktop processor shipments, fell 12% annually to $6.8 billion.The overall PC market has been slumping for over a year.
- Intel's server chip division, which is reported as Data Center and AI, declined 15% to $4.0 billion in sales.
- Intel's Network and Edge division, which sells networking products for telecommunications, declined 28% to $1.4 billion.
- Mobileye, a publicly-traded Intel subsidiary focusing on self-driving cars, saw sales down 1% on an annual basis to $454 million.
- It reported $232 million in revenue for its foundry business, Intel Foundry Services, that makes chips for other companies.

IOS

Android Phones Can Now Tell You If There's an AirTag Following You 63

An anonymous reader quotes a report from Ars Technica: When Google announced that trackers would be able to tie in to its 3 billion-device Bluetooth tracking network at its Google I/O 2023 conference, it also said that it would make it easier for people to avoid being tracked by trackers they don't know about, like Apple AirTags. Now Android users will soon get these "Unknown Tracker Alerts." Based on the joint specification developed by Google and Apple, and incorporating feedback from tracker-makers like Tile and Chipolo, the alerts currently work only with AirTags, but Google says it will work with tag manufacturers to expand its coverage.

For now, if an AirTag you don't own "is separated from its owner and determined to be traveling with you," a notification will tell you this and that "the owner of the tracker can see its location." Tapping the notification brings up a map tracing back to where it was first seen traveling with you. Google notes that this location data "is always encrypted and never shared with Google." Further into the prompts, you can make the tracker play a sound, "without the owner of the tracker knowing," Google says. If you bring the tracker to the back of your phone (presumably within NFC range), some trackers may provide their serial number and information about their owner, "like the last four digits of their phone number." Google indicates it will also link to information about how to physically disable a tracker. Finally, Google is offering a manual scan feature, if you're suspicious that your Android phone isn't catching a tracker or want to see what's nearby. The alerts are rolling out through a Google Play services update to devices on Android 6.0 and above over the coming weeks.
Google is working to finish the joint tracking specification "by the end of this year."

The company added: "At this time, we've made the decision to hold the rollout of the Find My Device network until Apple has implemented protections for iOS."
AI

LinkedIn Seems To Be Working on an AI 'Coach' for Job Applications (theverge.com) 14

LinkedIn appears to be developing a new AI tool that can help ease the effectively robotic task of looking for and applying to jobs. From a report: According to a new leak, the Microsoft-owned company seems to have a new "LinkedIn Coach" assistant in testing that could support you through the application processes, teach you new skills, and help you network on your LinkedIn network. The news comes from app researcher Nima Owji, who uncovers features from various developers that haven't been deployed yet. In an email, LinkedIn spokesperson Amanda Purvis tells The Verge the company is "always exploring" new ways to improve user experience on the platform. Purvis adds that the company "will have more to share soon."
Communications

Arrival of eSIM is Altering How Consumers Interact With Operators (opensignal.com) 106

OpenSignal blog: While eSIM adoption in the mobile market has been arriving for some time, Apple's move to make eSIM the only option for iPhone 14 range in the U.S. is propelling the worldwide shift towards eSIM technology. Opensignal's latest analysis reveals a significant surge in the proportion of users switching their operator among those who use an eSIM across seven examined markets -- Brazil, Indonesia, Singapore, South Korea, Taiwan, the U.K. and the U.S.

The switch from physical to embedded SIM cards threatens to alter how consumers switch operators and encourages operators to adopt new tactics to retain and acquire users, for example operators can offer network trials from within an app that provisions an eSIM immediately. eSIM also means the risks to operators of dual SIM devices that have long been common in many international markets are arriving in operator-controlled markets too, such as the U.S. and South Korea. Even on smartphones sold by operators, eSIM support is usually present in addition to a physical SIM, making them dual-SIM devices.

Google added eSIM-support to the Pixel range in 2017, Samsung added eSIM support to 2019's Galaxy S20 flagship. While Apple first added eSIM to their phones in 2018 with the iPhone Xs, it switched to selling exclusively eSIM models in the U.S. with the iPhone 14 range in late 2022. South Korea is also a special case -- eSIM support for domestic customers only began in mid-2022, before this point it was only available to international travelers. Notably, Samsung responded by introducing eSIM to a selection of its flagship devices in the home market, which had not been previously available there.

Slashdot Top Deals