×
GNU is Not Unix

Libreboot Founder's 'Minifree' Sells Free-Software Laptops with Libreboot Preinstalled (minifree.org) 20

Slashdot reader unixbhaskar writes: A company in the U.K. calling itself Minifree has started to ship old Thinkpad (specifically the X series and T series models) with Libreboot firmware. Which is based on coreboot firmware.
More specifically, Libreboot is the free-as-in-speech replacement for proprietary BIOS/UEFI firmware, the site notes, "offering faster boots speeds, better security and many advanced features compared to most proprietary boot firmware." Those advanced features include the GNU project's multiple-OS-booting "grand unified bootloader" GNU GRUB directly in the boot flash, along with several other customization options. "The aim is simple: make it easy to have a computer that was made to run entirely on Free Software at every level, meaning no proprietary software of any kind. That includes the boot firmware, operating system, drivers and applications."

The Libreboot project's founder is also the founder of Minifree, and the profits from Minifree's sales directly fund the Libreboot project. (The whole Minifree web site runs on Libreboot-powered servers, on a network behind a Libreboot-powered router...) Their site points out that Minifree Ltd has also privately funded several new board ports to coreboot, including 90,000 USD to Raptor Engineering for ASUS KGPE-D16 and KCMA-D8 libreboot support, and 4000 AUD to Damien Zammit for Gigabyte GA-G41M-ES2L and Intel D510MO libreboot support.

The installed OS on the laptops is either encrypted Debian (KDE Plasma desktop environment), with full driver support, or "other Linux distro/BSD (e.g. OpenBSD, FreeBSD) at your request... Advanced features like encrypted /boot (GNU+Linux only), signed kernels and more are available." And the laptops are also shipped — worldwide — with "your choice of 480/960GB SSD or 2x480GB/2x960GB RAID1 SSDs, with good batteries and 16GB RAM. Free technical support via email/IRC plus 5-year warranty."

But judging by their FAQ, the support is even more extensive. "If you brick your Minifree laptop when updating Libreboot, Minifree will unbrick it for free if you send it back to us. Even if your warranty has expired! However, such bricking is rare."
GNU is Not Unix

FSF Awards 'Respects Your Freedom' Certification to ThinkPenguin's Gigabit Mini VPN Router (fsf.org) 6

The Free Software Foundation certifies products that meet their standards in regard to users' freedom, control over the product, and privacy. And they put out a new "Respects Your Freedom" certification on Thursday for ThinkPenguin's free software gigabit mini VPN router, the TPE-R1400.

From the FSF's announcement: This is ThinkPenguin's first device to receive RYF certification in 2023, adding to their vast catalogue of certified devices from previous years. As with previous routers from ThinkPenguin, the Free Software Gigabit Mini VPN Router ships with an FSF-endorsed fully free embedded GNU/Linux distribution called libreCMC. It also comes with a custom flavor of the U-Boot boot loader, assembled by Robert Call, the maintainer of libreCMC and a former FSF intern.

The router enables users to run their network connection through a VPN service, helping to simplify the process of keeping their communications secure and private. While ThinkPenguin offers a VPN service, users are not required to purchase a subscription to their service in order to use the router, and the device comes with detailed instructions on how to use the router with a wide variety of VPN providers.

"We're pleased to see ThinkPenguin continue with their commitment to bringing out devices that put software freedom as their first priority under the RYF program. The release of this router shows that ThinkPenguin is committed to the privacy and freedom of their users," said the FSF's executive director, Zoë Kooyman....

"The latest version of ThinkPenguin's VPN router lets its users take advantage of gigabit per second Internet connections while protecting their rights and privacy," said FSF's copyright and licensing associate, Craig Topham.

Programming

Samsung Software Engineers Busted For Pasting Proprietary Code Into ChatGPT (pcmag.com) 65

Multiple employees of Samsung's Korea-based semiconductor business plugged lines of confidential code into ChatGPT, effectively leaking corporate secrets that could be included in the chatbot's future responses to other people around the world. PCMag reports: One employee copied buggy source code from a semiconductor database into the chatbot and asked it to identify a fix, according to The Economist Korea. Another employee did the same for a different piece of equipment, requesting "code optimization" from ChatGPT. After a third employee asked the AI model to summarize meeting notes, Samsung executives stepped in. The company limited each employee's prompt to ChatGPT to 1,024 bytes.

Just three weeks earlier, Samsung had lifted its ban on employees using ChatGPT over concerns around this issue. After the recent incidents, it's considering re-instating the ban, as well as disciplinary action for the employees, The Economist Korea says. "If a similar accident occurs even after emergency information protection measures are taken, access to ChatGPT may be blocked on the company network," reads an internal memo. "As soon as content is entered into ChatGPT, data is transmitted and stored to an external server, making it impossible for the company to retrieve it."

The OpenAI user guide warns users against this behavior: "We are not able to delete specific prompts from your history. Please don't share any sensitive information in your conversations." It says the system uses all questions and text submitted to it as training data.

Transportation

Walmart Plans Own EV Charger Network At US Stores By 2030 (reuters.com) 55

Walmart plans to have its own network of electric vehicle charging stations by 2030 to tap into the growing adoption of EVs in the United States. Reuters reports: The new fast-charging stations will be placed at thousands of Walmart and Sam's Club stores, alongside nearly 1,300 it already offers as part of a deal with Volkswagen unit Electrify America, one of the country's largest open public EV networks. Walmart's more than 5,000 stores and Sam's Club warehouses are located within 10 miles of about 90% of Americans.

"We have the ability to address range and charging anxiety in a way that no one else can in this country," Vishal Kapadia, Walmart's recently appointed senior vice president of Energy Transformation, said in an interview. Owning its chargers, instead of partnering with a network operator, will help Walmart address reliability and cost issues, Kapadia said. Kapadia said he expects the new charge points to be direct-current fast chargers, with about four chargers on average installed per store.

Security

Crooks Are Using CAN Injection Attacks To Steal Cars (theregister.com) 47

"Thieves has discovered new ways to steal cars by pulling off smart devices (like smart headlights) to get at and attack via the Controller Area Network (CAN) bus," writes longtime Slashdot reader KindMind. The Register reports: A Controller Area Network (CAN) bus is present in nearly all modern cars, and is used by microcontrollers and other devices to talk to each other within the vehicle and carry out the work they are supposed to do. In a CAN injection attack, thieves access the network, and introduce bogus messages as if it were from the car's smart key receiver. These messages effectively cause the security system to unlock the vehicle and disable the engine immobilizer, allowing it to be stolen. To gain this network access, the crooks can, for instance, break open a headlamp and use its connection to the bus to send messages. From that point, they can simply manipulate other devices to steal the vehicle.

"In most cars on the road today, these internal messages aren't protected: the receivers simply trust them," [Ken Tindell, CTO of Canis Automotive Labs] detailed in a technical write-up this week. The discovery followed an investigation by Ian Tabor, a cybersecurity researcher and automotive engineering consultant working for EDAG Engineering Group. It was driven by the theft of Tabor's RAV4. Leading up to the crime, Tabor noticed the front bumper and arch rim had been pulled off by someone, and the headlight wiring plug removed. The surrounding area was scuffed with screwdriver markings, which, together with the fact the damage was on the kerbside, seemed to rule out damage caused by a passing vehicle. More vandalism was later done to the car: gashes in the paint work, molding clips removed, and malfunctioning headlamps. A few days later, the Toyota was stolen.

Refusing to take the pilfering lying down, Tabor used his experience to try to figure out how the thieves had done the job. The MyT app from Toyota -- which among other things allows you to inspect the data logs of your vehicle -- helped out. It provided evidence that Electronic Control Units (ECUs) in the RAV4 had detected malfunctions, logged as Diagnostic Trouble Codes (DTCs), before the theft. According to Tindell, "Ian's car dropped a lot of DTCs." Various systems had seemingly failed or suffered faults, including the front cameras and the hybrid engine control system. With some further analysis it became clear the ECUs probably hadn't failed, but communication between them had been lost or disrupted. The common factor was the CAN bus.

Sony

Sony Worries Microsoft Will Only Give It a 'Degraded' Call of Duty (arstechnica.com) 67

An anonymous reader quotes a report from Ars Technica: Late last month, UK regulators said they no longer believed a proposed Microsoft-owned Activision would bar Call of Duty games from PlayStation platforms, a reversal of earlier preliminary findings. Even if you grant that premise, though, Sony says that it's still worried Microsoft could give PlayStation owners a "degraded" version of new Call of Duty games in an effort to make the Xbox versions look better.

In a newly published response (PDF) to the UK's Competition and Markets Authority, Sony says the regulators' recent turnaround is "surprising, unprecedented, and irrational." The company takes specific issue with the regulators' "lifetime value" modeling, which Sony says heavily undervalues what an Xbox-exclusive Call of Duty would be worth to Microsoft. Beyond those technical concerns, though, Sony says it worries that Microsoft might subtly undermine PlayStation "simply by not making it as good as it could be." That could include small changes to the game's "performance [or] quality of play," but also secondary moves to "raise [Call of Duty's] price [on PlayStation], release the game at a later date, or make it available only on Game Pass." Microsoft would also "have no incentive to make use of the advanced features in PlayStation not found in Xbox," Sony says, an apparent reference to the PS5 controller's advanced haptics and built-in audio capabilities.

In its own newly filed response (PDF), Microsoft reiterated that it has "no intention to withhold or degrade access to Call of Duty or any other Activision content on PlayStation." That follows on a March filing where Microsoft promised Sony parity on Call of Duty's "release date, content, features, upgrades, quality, and playability." But Sony's response reflects a continued lack of trust in such promises. The company cites detailed analyses from the likes of Digital Foundry in saying that "the technical quality of Modern Warfare II was similar across platforms" in today's market. After a merger, though, Sony argues that "Microsoft would have different incentives because degrading the experience on PlayStation would benefit Xbox, PlayStation's 'closest rival.'"
"This kind of 'partial foreclosure' strategy might 'trigger fewer gamer complaints' than full Xbox exclusivity for Call of Duty, Sony says, while also allowing Microsoft to 'still secure revenues from sales of Call of Duty on PlayStation for a transitional period,'" reports Ars. "But Sony says the long-term results of this kind of 'degraded' PlayStation version would be the same as a full PlayStation ban: Call of Duty players abandoning Sony and moving to Microsoft's platforms."

"Such a move would 'seriously damage our reputation,' Sony Interactive Entertainment CEO Jim Ryan told the CMA in a recent hearing. 'Our gamers would desert our platform in droves and network effects would exacerbate the problem. Our business would never recover.'"
China

China Plans $500 Million Subsea Internet Cable To Rival US-Backed Project (reuters.com) 25

Chinese state-owned telecom firms are developing a $500 million undersea fiber-optic internet cable network that would link Asia, the Middle East and Europe to rival a similar U.S.-backed project, four people involved in the deal told Reuters. From the report: The plan is a sign that an intensifying tech war between Beijing and Washington risks tearing the fabric of the internet. China's three main carriers -- China Telecommunications Corporation (China Telecom), China Mobile Limited and China United Network Communications Group (China Unicom) -- are mapping out one of the world's most advanced and far-reaching subsea cable networks, according to the four people, who have direct knowledge of the plan.

Known as EMA (Europe-Middle East-Asia), the proposed cable would link Hong Kong to China's island province of Hainan, before snaking its way to Singapore, Pakistan, Saudi Arabia, Egypt and France, the four people said. They asked not to be named because they were not allowed to discuss potential trade secrets. The cable, which would cost approximately $500 million to complete, would be manufactured and laid by China's HMN Technologies, a fast-growing cable firm whose predecessor company was majority-owned by Chinese telecom giant Huawei, the people said.

Businesses

Cisco Systems Pulls Out of Russia, Destroys Millions of Dollars Worth of Equipment (gagadget.com) 74

Cisco Systems has left the Russian market, destroying tens of millions of dollars worth of equipment and components in the process. This is due to the fact that the developer of network equipment has no plans to resume operations in the country. Gagadget reports: Cisco Systems announced it would cease sales in the Russian market in March 2022. Three months later, the company refused to renew its licenses. In addition, at the same time, the American manufacturer announced its withdrawal from Russia and Belarus.

As it became known, Cisco Systems decided to physically destroy spare parts, product demonstrations, equipment and even furniture. The value of the destroyed stock is estimated at [$23.42 million]. The company has also disposed of fixed assets worth [$12,600]. By the end of 2022, Cisco Systems had reduced its workforce by a factor of 12 to five employees. The company terminated contracts with the rest in mid-2022, paying them a total of [$2.4 million].
The TASS Russian News Agency first reported the news.
Technology

South Africa Fights To Keep Phone Networks Up as Lights Go Out (reuters.com) 128

An anonymous reader shares a report: On a recent Friday morning north of Johannesburg, the head of South Africa's largest telecoms company surveyed the arsenal of backup systems keeping just one of his 15,000 network towers online amid the worst power cuts on record. A diesel generator. Solar panels. A bank of expensive backup batteries, theft-proofed within a block of concrete. "Our costs have gone through the roof," lamented Sitho Mdlalose, managing director of Vodacom South Africa. As the national power grid crumbles, leaving Africa's most advanced economy in the dark for up to 10 hours a day, mobile operators including Vodacom, MTN and majority state-owned Telkom are scrambling to ensure their networks stay up and running.

They're spending millions to install solar panels, batteries and are even trialling wind turbines, while targeting deals with independent power producers to supplement struggling state utility Eskom's increasingly unreliable output, three company executives told Reuters. At stake: essential voice and data services in a nation where landlines are rare but nearly 80% of residents have access to mobile internet. Overall, the power crisis and logistical constraints are expected to erase 2 percentage points from economic growth this year, according to the South African Reserve Bank governor. Mary-Jane Mphahlele, an attorney who also runs a small travel agency in the city of Polokwane, experiences that lost economic activity every time the power is cut. "New clients can't call me ... That means no money is going to come into my business," the 29-year-old said. "It's hell." As they battle to simply mitigate the worsening crisis, telecommunications companies have seen operating costs balloon. Vodacom and MTN executives told Reuters they're having to divert capital away from much needed network upgrades and 5G rollouts. Meanwhile, they said government regulations are blocking potential solutions, such as sharing backup power infrastructure with their competitors, and revealed they're lobbying authorities to help ease the pain.

Privacy

Inside the Bitter Campus Privacy Battle Over Smart Building Sensors (technologyreview.com) 50

An anonymous reader quotes a report from MIT Technology Review: When computer science students and faculty at Carnegie Mellon University's Institute for Software Research returned to campus in the summer of 2020, there was a lot to adjust to. Beyond the inevitable strangeness of being around colleagues again after months of social distancing, the department was also moving into a brand-new building: the 90,000-square-foot, state-of-the-art TCS Hall. The hall's futuristic features included carbon dioxide sensors that automatically pipe in fresh air, a rain garden, a yard for robots and drones, and experimental super-sensing devices called Mites. Mounted in more than 300 locations throughout the building, these light-switch-size devices can measure 12 types of data -- including motion and sound. Mites were embedded on the walls and ceilings of hallways, in conference rooms, and in private offices, all as part of a research project on smart buildings led by CMU professor Yuvraj Agarwal and PhD student Sudershan Boovaraghavan and including another professor, Chris Harrison. "The overall goal of this project," Agarwal explained at an April 2021 town hall meeting for students and faculty, is to "build a safe, secure, and easy-to-use IoT [Internet of Things] infrastructure," referring to a network of sensor-equipped physical objects like smart light bulbs, thermostats, and TVs that can connect to the internet and share information wirelessly.

Not everyone was pleased to find the building full of Mites. Some in the department felt that the project violated their privacy rather than protected it. In particular, students and faculty whose research focused more on the social impacts of technology felt that the device's microphone, infrared sensor, thermometer, and six other sensors, which together could at least sense when a space was occupied, would subject them to experimental surveillance without their consent. "It's not okay to install these by default," says David Widder, a final-year PhD candidate in software engineering, who became one of the department's most vocal voices against Mites. "I don't want to live in a world where one's employer installing networked sensors in your office without asking you first is a model for other organizations to follow." All technology users face similar questions about how and where to draw a personal line when it comes to privacy. But outside of our own homes (and sometimes within them), we increasingly lack autonomy over these decisions. Instead, our privacy is determined by the choices of the people around us. Walking into a friend's house, a retail store, or just down a public street leaves us open to many different types of surveillance over which we have little control. Against a backdrop of skyrocketing workplace surveillance, prolific data collection, increasing cybersecurity risks, rising concerns about privacy and smart technologies, and fraught power dynamics around free speech in academic institutions, Mites became a lightning rod within the Institute for Software Research.

Voices on both sides of the issue were aware that the Mites project could have an impact far beyond TCS Hall. After all, Carnegie Mellon is a top-tier research university in science, technology, and engineering, and how it handles this research may influence how sensors will be deployed elsewhere. "When we do something, companies [and] other universities listen," says Widder. Indeed, the Mites researchers hoped that the process they'd gone through "could actually be a blueprint for smaller universities" looking to do similar research, says Agarwal, an associate professor in computer science who has been developing and testing machine learning for IoT devices for a decade. But the crucial question is what happens if -- or when -- the super-sensors graduate from Carnegie Mellon, are commercialized, and make their way into smart buildings the world over. The conflict is, in essence, an attempt by one of the world's top computer science departments to litigate thorny questions around privacy, anonymity, and consent. But it has deteriorated from an academic discussion into a bitter dispute, complete with accusations of bullying, vandalism, misinformation, and workplace retaliation. As in so many conversations about privacy, the two sides have been talking past each other, with seemingly incompatible conceptions of what privacy means and when consent should be required. Ultimately, if the people whose research sets the agenda for technology choices are unable to come to a consensus on privacy, where does that leave the rest of us?

The Almighty Buck

Jamie Dimon Says Banking Crisis Not Over and Will Cause 'Repercussions For Years' (cnbc.com) 93

The stress on the financial sector caused by two bank failures in the United States last month is still a threat and should be addressed by a reimagining of the regulatory process, according to JPMorgan Chase CEO Jamie Dimon. From a report: "As I write this letter, the current crisis is not yet over, and even when it is behind us, there will be repercussions from it for years to come," the longtime CEO said in his annual letter to shareholders Tuesday. "But importantly, recent events are nothing like what occurred during the 2008 global financial crisis," he added. The recent banking issues in the U.S. began with the collapse of Silicon Valley Bank, which was closed by regulators on March 10 as depositors pulled tens of billions of dollars from the bank. The smaller Signature Bank was closed two days later. And in Europe, Swiss regulators brokered a purchase of Credit Suisse by UBS.

JPMorgan and other large banks stepped in to make $30 billion of deposits at First Republic, another regional lender that investors feared could become the next SVB. The stress on the regional banks has led investors and analysts to suggest that the too big to fail institutions would be a beneficiary of the crisis, but Dimon said JPMorgan wants to strengthen the smaller banks for the benefit of the whole financial system. "Any crisis that damages Americans' trust in their banks damages all banks -- a fact that was known even before this crisis. While it is true that this bank crisis 'benefited' larger banks due to the inflow of deposits they received from smaller institutions, the notion that this meltdown was good for them in any way is absurd," Dimon wrote. Dimon also cautioned against knee-jerk changes to the regulatory system. He wrote that most of the risks, including the potential losses from held-to-maturity bonds, were "hiding in plain sight." The interconnected network of SVB's deposit base was the unknown variable, he said. "The recent failures of Silicon Valley Bank (SVB) in the United States and Credit Suisse in Europe, and the related stress in the banking system, underscore that simply satisfying regulatory requirements is not sufficient. Risks are abundant, and managing those risks requires constant and vigilant scrutiny as the world evolves," Dimon wrote.

Security

Capita, Company Providing UK's Nuclear Submarine Training, Says It's Successfully Contained 'Cyber Incident' (therecord.media) 12

Capita, the United Kingdom's largest outsourcing company, confirmed Monday that an IT outage which left staff locked out of their accounts on Friday was caused by "a cyber incident." The Record reports: Staff attempting to login were erroneously told their usual passwords were "incorrect" according to reports, fueling speculation that a cyberattack was to blame, although not all of Capita's 61,000 employees were affected. At the time, a Capita spokesperson said the company was investigating "a technical issue."

In an update on Monday about the incident sent to the Regulatory News Service, the company confirmed it "experienced a cyber incident primarily impacting access to internal Microsoft Office 365 applications." The nature of the incident has not been disclosed. While financially motivated ransomware attacks remain a prevalent threat for organizations in Britain, Capita also provides services to the British government that may be of interest to state-sponsored espionage groups.

Capita's numerous contracts include several with the Ministry of Defence. Last year, a consortium it leads took control over engineering and maintenance support of training simulators for the Royal Navy's nuclear-powered ballistic missile submarines used as part of the U.K.'s nuclear deterrent. In its statement, Capita said: "Immediate steps were taken to successfully isolate and contain the issue," which was "limited to parts of the Capita network."

Security

Western Digital Says Hackers Stole Data in Network Security Breach (techcrunch.com) 7

Data storage giant Western Digital has confirmed that hackers exfiltrated data from its systems during a "network security incident" last week. From a report: The California-based company said in a statement on Monday that an unauthorized third party gained access to "a number" of its internal systems on March 26. Western Digital hasn't confirmed the nature of the incident or revealed how it was compromised, but its statement suggests the incident may be linked to ransomware. [...] Western Digital notes that the incident "has caused and may continue to cause disruption" to the company's business operations.
Privacy

Tor Project's New Privacy-Focused Browser Doesn't Use the Tor Network (theverge.com) 24

The Tor Project, the organization behind the anonymous network and browser, is helping launch a privacy-focused browser that's made to connect to a VPN instead of a decentralized onion network. From a report: It's called the Mullvad browser, named after the Mullvad VPN company it's partnered with on the project, and it's available for Windows, Mac, or Linux. The Mullvad browser's main goal is to make it harder for advertisers and other companies to track you across the internet. It does this by working to reduce your browser's "fingerprint," a term that describes all the metadata that sites can collect to uniquely identify your device.
Social Networks

What If Social Media Were Not for Profit? (newint.org) 152

"What would it look like if we called time on Big Tech's failed experiment?" asks the co-editor of the Oxford-based magazine New Internationalist: A better social media would need to be decentralized... As well as avoiding a single point of failure (or censorship), this would help with other goals: community ownership, and democratic control, would be facilitated by having many smaller, perhaps more local, sites. Existing social media giants must be brought into public (and transnational) ownership — in a way that hands power to citizens, not governments. But they should also be broken up, using existing anti-monopoly rules.

It is hard to know what sort of algorithms would best promote real community until we try... But the algorithms that determine what enters peoples' social feeds must be transparent: open source, open for scrutiny, and for change. We could also adapt from sites like Wikipedia (collectively edited) and Reddit (where posts and comments' visibility is determined by user votes). Moderation policies — what content is and isn't allowed — could be decided collectively, according to groups' needs....

An important step towards a decentralized social network would be interoperability, and data portability. Different sites need to be able to talk to each other (or 'federate'), just as email providers or mobile operators are required to. There's no point being on a site if your friends aren't, but if your server can relay messages to theirs there is less of a barrier. Meanwhile encryption will be vital for privacy.

One particularly intriguing idea is that of artist and software developer Darius Kazemi, who suggests every public library — there are 2.7 million worldwide — could host its own federated social media server. As well as providing local accountability and access, and boosting increasingly defunded neighbourhood assets, these servers would benefit from librarians' expertise in curating information.

China

US Military Prepares for Space Warfare As Potential Threats Grow From China (wsj.com) 52

America's Department of Defense "is gearing up for a future conflict in space," reports the Wall Street Journal, "as China and Russia deploy missiles and lasers that can take out satellites and disrupt military and civilian communications." The White House this month proposed a $30 billion annual budget for the U.S. Space Force, almost $4 billion more than last year and a bigger jump than for other services including the Air Force and the Navy.... A key aim of a stand-alone force was to plan, equip and defend U.S. interests in space for all of the services and focus attention on the emerging threats. For the first time, the spending request also includes plans for simulators and other equipment to train Guardians, as Space Force members are known, for potential battle....

Just as it is on Earth, China is the Pentagon's big worry in space. In unveiling a defense strategy late last year, the Biden administration cast China as the greatest danger to U.S. security. In space, the threats from China range from ground-launched missiles or lasers that could destroy or disable U.S. satellites, to jamming and other cyber interference and attacks in space, said Pentagon officials. China has invested heavily in its space program, with a crewed orbiting station, developing ground-based missiles and lasers as well as more surveillance capabilities. This is part of its broader military aims of denying adversaries access to space-based assets.

China is "testing on-orbit satellite systems which could be weaponized as they have already shown the capability to physically control and move other satellites," Gen. Chance Saltzman, chief of space operations for the U.S. Space Force, told a congressional hearing this month. "There's nothing we can do in space that's of any value if the networks that process the information and data are vulnerable to attack," Gen. Saltzman said. A central part of the Space Force's next tranche of military contracts for rocket launches is protecting them from attacks by China and other adversaries. The hope is to make satellites tougher to approach by adversaries' equipment as well as less susceptible to lasers and jamming from space or the ground, said Space Force leaders.

The article also notes the US Defense Department "is moving away from a small number of school bus-size satellites to a planned constellation of hundreds of smaller ones.

"The larger number of targets makes any one satellite less crucial to the network but also requires changes in the capabilities of the satellites themselves, the rockets that put them into orbit and the communications systems they host."
Social Networks

Scammers are Tricking Instagram Into Banning Influencers (propublica.org) 53

ProPublica looks at "a booming underground community of Instagram scammers and hackers who shut down profiles on the social network and then demand payment to reactivate them." While they also target TikTok and other platforms, takedown-for-hire scammers like OBN are proliferating on Instagram, exploiting the app's slow and often ineffective customer support services and its easily manipulated account reporting systems. These Instascammers often target people whose accounts are vulnerable because their content verges on nudity and pornography, which Instagram and its parent company, Meta, prohibit.... In an article he wrote for factz.com last year, OBN dubbed himself the "log-out king" because "I have deleted multiple celebrities + influencers on Meta & Instagram... I made about $300k just off banning and unbanning pages," he wrote.

OBN exploits weaknesses in Meta's customer service. By allowing anyone to report an account for violating the company's standards, Meta gives enormous leverage to people who are able to trick it into banning someone who relies on Instagram for income. Meta uses a mix of automated systems and human review to evaluate reports. Banners like OBN test and trade tips on how to trigger the system to falsely suspend accounts. In some cases OBN hacks into accounts to post offensive content. In others, he creates duplicate accounts in his targets' names, then reports the original accounts as imposters so they'll be barred for violating Meta's ban on account impersonation. In addition, OBN has posed as a Meta employee to persuade at least one target to pay him to restore her account.

Models, businesspeople, marketers and adult performers across the United States told ProPublica that OBN had ruined their businesses and lives with spurious complaints, even causing one woman to consider suicide. More than half a dozen people with over 45 million total followers on Instagram told ProPublica they lost their accounts temporarily or permanently shortly after OBN threatened to report them. They say Meta failed to help them and to take OBN and other account manipulators seriously. One person who said she was victimized by OBN has an ongoing civil suit against Meta for lost income, while others sent the company legal letters demanding payment....

A Meta spokesperson acknowledged that OBN has had short-term success in getting accounts removed by abusing systems intended to help enforce community standards. But the company has addressed those situations and taken down dozens of accounts linked to OBN, the spokesperson said. Most often, the spokesperson said, OBN scammed people by falsely claiming to be able to ban and restore accounts.... After banning an account, OBN frequently offers to reactivate it for a fee as high as $5,000, kicking off a cycle of bans and reactivations that continues until the victim runs out of money or stops paying.

A Meta spokesperson told the site they're currently "updating our support systems," including a tool to help affected users and letting more speak to a live support agent rather than an automated one. But the Meta spokesperson added that "This remains a highly adversarial space, with scammers constantly trying to evade detection by social media platforms."

ProPublica ultimately traced the money to a 20-year-old who lives with his mother (who claimed he was only "funnelling" the money for someone else). After that conversation OBN "announced he would no longer offer account banning as a service" — but would still sell his services in getting your account verified.
Beer

It Turns Out Moderate Drinking Isn't Good For Your Health, New Study Finds (spokesman.com) 123

"Drinking moderate amounts of alcohol every day does not — as once thought — protect against death from heart disease," writes the Washington Post, "nor does it contribute to a longer life, according to a sweeping new analysis of alcohol research." The review, which examined existing research on the health and drinking habits of nearly 5 million people, is one of the largest studies to debunk the widely held belief that moderate drinking of wine or other alcoholic beverages is good for you. Last year, researchers in Britain examined genetic and medical data of nearly 400,000 people and concluded that even low alcohol intake was associated with increased risk of disease.

The new study, which appears Friday in Jama Network Open, also found that drinking relatively low levels of alcohol — 25 grams a day for women (less than 1 ounce) and 45 grams (about 1.5 ounces) or more per day for men — actually increased the risk of death. A standard wine pour is about 5 ounces. The standard serving size for beer is 12 ounces, and for distilled spirits, 1.5 ounces. "This study punctures the hope of many that moderate alcohol use is healthy," said Robert DuPont, a psychiatrist and substance abuse expert who served as the first director of the National Institute on Drug Abuse.... Much of the research into the health effects of alcohol has been funded by the alcohol industry. One recent report found that 13,500 studies have been directly or indirectly paid for by the industry....

The new review, called a "meta-analysis," looked at 107 observational studies that involved more than 4.8 million people. The study stressed that previous estimates of the benefits of moderate alcohol consumption on the risk of death by "all causes" — meaning anything, including heart disease, cancer, infections and automobile accidents — were "significantly" biased by flaws in study design. Earlier research did not adjust for numerous factors that could influence the outcome, for example, age, sex, economic status and lifestyle behaviors such as exercise, smoking and diet, they said. Using statistical software, the researchers essentially removed the bias, adjusting for various factors that could skew the research. After doing so, they found no significant declines in the risk of death by any causes among the moderate drinkers.

Power

Magnon-Based Computation Could Signal Computing Paradigm Shift (phys.org) 19

An anonymous reader quotes a report from Phys.Org: Like electronics or photonics, magnonics is an engineering subfield that aims to advance information technologies when it comes to speed, device architecture, and energy consumption. A magnon corresponds to the specific amount of energy required to change the magnetization of a material via a collective excitation called a spin wave. Because they interact with magnetic fields, magnons can be used to encode and transport data without electron flows, which involve energy loss through heating (known as Joule heating) of the conductor used. As Dirk Grundler, head of the Lab of Nanoscale Magnetic Materials and Magnonics (LMGN) in the School of Engineering explains, energy losses are an increasingly serious barrier to electronics as data speeds and storage demands soar. "With the advent of AI, the use of computing technology has increased so much that energy consumption threatens its development," Grundler says. "A major issue is traditional computing architecture, which separates processors and memory. The signal conversions involved in moving data between different components slow down computation and waste energy."

This inefficiency, known as the memory wall or Von Neumann bottleneck, has had researchers searching for new computing architectures that can better support the demands of big data. And now, Grundler believes his lab might have stumbled on such a "holy grail". While doing other experiments on a commercial wafer of the ferrimagnetic insulator yttrium iron garnet (YIG) with nanomagnetic strips on its surface, LMGN Ph.D. student Korbinian Baumgaertl was inspired to develop precisely engineered YIG-nanomagnet devices. With the Center of MicroNanoTechnology's support, Baumgaertl was able to excite spin waves in the YIG at specific gigahertz frequencies using radiofrequency signals, and -- crucially -- to reverse the magnetization of the surface nanomagnets. "The two possible orientations of these nanomagnets represent magnetic states 0 and 1, which allows digital information to be encoded and stored," Grundler explains.

The scientists made their discovery using a conventional vector network analyzer, which sent a spin wave through the YIG-nanomagnet device. Nanomagnet reversal happened only when the spin wave hit a certain amplitude, and could then be used to write and read data. "We can now show that the same waves we use for data processing can be used to switch the magnetic nanostructures so that we also have nonvolatile magnetic storage within the very same system," Grundler explains, adding that "nonvolatile" refers to the stable storage of data over long time periods without additional energy consumption. It's this ability to process and store data in the same place that gives the technique its potential to change the current computing architecture paradigm by putting an end to the energy-inefficient separation of processors and memory storage, and achieving what is known as in-memory computation.
The research has been published in the journal Nature Communications.
China

China Hits Micron With Review of Chips, Citing Security Risks (bloomberg.com) 28

China has opened a cybersecurity review of imports from America's largest memory chipmaker, Micron Technology, opening a new front in the escalating battle between the two countries over dominance in the semiconductor market. From a report: The Chinese government is conducting the review to ensure the security of its information infrastructure supply chain, prevent network security risks and maintain national security, it said in a statement Friday. The move stands to further escalate trade tensions between the Biden administration and China. The US has already blacklisted Chinese tech firms, sought to cut off the flow of sophisticated processors and banned its citizens from providing certain help to the country's chip industry. It has called on other nations to join its efforts, and earlier on Friday, Japan said it will expand restrictions on exports of 23 types of leading-edge chipmaking technology.

Slashdot Top Deals