Stories
Slash Boxes
Comments

SoylentNews is people

Log In

Log In

Create Account  |  Retrieve Password


Site News

Join our Folding@Home team:
Main F@H site
Our team page


Funding Goal
For 6-month period:
2022-07-01 to 2022-12-31
(All amounts are estimated)
Base Goal:
$3500.00

Currently:
$438.92

12.5%

Covers transactions:
2022-07-02 10:17:28 ..
2022-10-05 12:33:58 UTC
(SPIDs: [1838..1866])
Last Update:
2022-10-05 14:04:11 UTC --fnord666

Support us: Subscribe Here
and buy SoylentNews Swag


We always have a place for talented people, visit the Get Involved section on the wiki to see how you can make SoylentNews better.

Idiosyncratic use of punctuation - which of these annoys you the most?

  • Declarations and assignments that end with }; (C, C++, Javascript, etc.)
  • (Parenthesis (pile-ups (at (the (end (of (Lisp (code))))))))
  • Syntactically-significant whitespace (Python, Ruby, Haskell...)
  • Perl sigils: @array, $array[index], %hash, $hash{key}
  • Unnecessary sigils, like $variable in PHP
  • macro!() in Rust
  • Do you have any idea how much I spent on this Space Cadet keyboard, you insensitive clod?!
  • Something even worse...

[ Results | Polls ]
Comments:50 | Votes:95

posted by janrinok on Sunday December 31 2023, @11:00PM   Printer-friendly

From the Staff of SoylentNews.Org, may we wish every member of our community a very Happy and Prosperous New Year.

In a little over 1 month's time we will have been active as a site for 10 years. Hopefully by then we will also have created the new site and will be looking at another 10 years or more ahead of us. That still requires some more work from everyone as it is the community who will be deciding how the site is run, what the new policies will be, what subjects are discussed and how we grow our community in the future. The entire Board will consist of volunteers elected from the community by the community.

But for now let us all look forward to the new year and celebrate together!

posted by hubie on Sunday December 31 2023, @07:41PM   Printer-friendly
from the whistle-while-you-work dept.

The honeyguide recognizes calls made by different human groups:

With all the technological advances humans have made, it may seem like we've lost touch with nature—but not all of us have. People in some parts of Africa use a guide more effective than any GPS system when it comes to finding beeswax and honey. This is not a gizmo, but a bird.

The Greater Honeyguide (highly appropriate name), Indicator indicator (even more appropriate scientific name), knows where all the beehives are because it eats beeswax. The Hadza people of Tanzania and Yao people of Mozambique realized this long ago. Hadza and Yao honey hunters have formed a unique relationship with this bird species by making distinct calls, and the honeyguide reciprocates with its own calls, leading them to a hive.

Because the Hadza and Yao calls differ, zoologist Claire Spottiswoode of the University of Cambridge and anthropologist Brian Wood of UCLA wanted to find out if the birds respond generically to human calls, or are attuned to their local humans. They found that the birds are much more likely to respond to a local call, meaning that they have learned to recognize that call.

[...] How did this interspecies communication evolve? Other African cultures besides the Hadza and Yao have their own calls to summon a honeyguide. Why do the types of calls differ? The researchers do not think these calls came about randomly.

Both the Hadza and Yao people have their own unique languages, and sounds from them may have been incorporated into their calls. But there is more to it than that. The Hadza often hunt animals when hunting for honey. Therefore, the Hadza don't want their calls to be recognized as human, or else the prey they are after might sense a threat and flee. This may be why they use whistles to communicate with honeyguides—by sounding like birds, they can both attract the honeyguides and stalk prey without being detected.

In contrast, the Yao do not hunt mammals, relying mostly on agriculture and fishing for food. This, along with the fact that they try to avoid potentially dangerous creatures such as lions, rhinos, and elephants, and can explain why they use recognizably human vocalizations to call honeyguides. Human voices may scare these animals away, so Yao honey hunters can safely seek honey with their honeyguide partners. These findings show that cultural diversity has had a significant influence on calls to honeyguides.

While animals might not literally speak our language, the honeyguide is just one of many species that has its own way of communicating with us. They can even learn our cultural traditions.

I wonder if that's why it's called the Honeyguide bird?

Journal Reference:
Claire N. Spottiswoode and Brian Wood, Culturally determined interspecies communication between humans and honeyguides, Science Vol. 382, No. 6675, DOI: 10.1126/science.adh412


Original Submission

posted by Fnord666 on Sunday December 31 2023, @02:53PM   Printer-friendly

You're Supposed To Be Glad Your Tesla Is A Brittle Heap Of Junk:

Tesla cars are shoddily built pieces of shit liable to fall apart and malfunction in dangerous ways at inopportune moments. No, this is not a blog from 2012! It is also not a blog from 2015 or 2018 or 2022. It is not even a blog from two weeks ago about Tesla's self-driving systems killing people all over the place. It is a blog from today, Dec. 21, 2023.

On Wednesday, Reuters published a big, thorough investigative story documenting a pattern of major parts failures on low-mileage Tesla vehicles—and Tesla's organized years-long effort to obscure the pattern and offload its costs onto drivers, so as to sustain the illusion that it is a profitable company making cars that are not piece-of-shit death traps. By "major parts failures," I should specify here that we are not talking about, like, a faulty turn signal, or an unreliable trunk latch. We are talking about stuff like a whole-ass wheel falling off of your Model 3 while it travels at highway speeds, or the suspension collapsing while you make a left turn, causing the body of the car to crunch down onto the road, or an axle half-shaft fucking snapping while you accelerate, or the power steering suddenly failing while you are zooming along at 60 miles per hour.

We are talking, in short, about engineering failures—failures that anyone would find alarming if they encountered them in a soap box derby racer made out of literally a soap box—happening, abruptly and without warning, to Tesla cars that are for all practical purposes brand new. Moreover, they're happening to lots of them, because of manufacture and assembly problems the company knew about, and hid, and lied about, and blamed on the poor suckers who bought its crappy cars.

The Reuters piece is quite long, and earns its length with an incredible wealth of damning receipts, including internal Tesla communications making clear that the company has known about its own shoddy work for a long time, even as it deceived investors, regulators, and drivers. [...]

All the upside-down incentives and warped prerogatives of the startup world are on display here (including a preference for lying and monkeying with data over actually doing good work). They're also, in turn, mere appendages of a deeper and more profound decadence. In 2023, discovery, exploration, and invention are just vibes you rent, by investing in a future-costumed effort to ignore all of what's already been learned and pretend "making a car that works" (or tunnels, or spaceships, or social media) is a new frontier. What matters isn't whether any of this has been done before, and more authentically, and well enough to be built upon—what matters is that this particular rich man-child hasn't done it yet, from scratch, for himself and for his own dream of being The Most Special Boy. In the absence of any real opportunity to envision a brighter future, you sign up to support some inheritance goober's personal fantasy camp by dumping money into his company or buying his stupid-looking car. In this way, you are meant to understand, you have participated in the great grand adventure of discovering tomorrow.

The Reuters piece: Tesla blamed drivers for failures of parts it long knew were defective


Original Submission

posted by Fnord666 on Sunday December 31 2023, @10:08AM   Printer-friendly

'Our licenses aren't working anymore,' says free software pioneer:

Bruce Perens, one of the founders of the Open Source movement, is ready for what comes next: the Post-Open Source movement.

"I've written papers about it, and I've tried to put together a prototype license," Perens explains in an interview with The Register. "Obviously, I need help from a lawyer. And then the next step is to go for grant money."

Perens says there are several pressing problems that the open source community needs to address.

"First of all, our licenses aren't working anymore," he said. "We've had enough time that businesses have found all of the loopholes and thus we need to do something new. The GPL is not acting the way the GPL should have done when one-third of all paid-for Linux systems are sold with a GPL circumvention. That's RHEL."

RHEL stands for Red Hat Enterprise Linux, which in June, under IBM's ownership, stopped making its source code available as required under the GPL.

[...] "They aren't really Red Hat any longer, they're IBM," Perens writes in the note he shared with The Register. "And of course they stopped distributing CentOS, and for a long time they've done something that I feel violates the GPL, and my defamation case was about another company doing the exact same thing: They tell you that if you are a RHEL customer, you can't disclose the GPL source for security patches that RHEL makes, because they won't allow you to be a customer any longer. IBM employees assert that they are still feeding patches to the upstream open source project, but of course they aren't required to do so.

"This has gone on for a long time, and only the fact that Red Hat made a public distribution of CentOS (essentially an unbranded version of RHEL) made it tolerable. Now IBM isn't doing that any longer. So I feel that IBM has gotten everything it wants from the open source developer community now, and we've received something of a middle finger from them.

"Obviously CentOS was important to companies as well, and they are running for the wings in adopting Rocky Linux. I could wish they went to a Debian derivative, but OK. But we have a number of straws on the Open Source camel's back. Will one break it?"

Another straw burdening the Open Source camel, Perens writes, "is that Open Source has completely failed to serve the common person. For the most part, if they use us at all they do so through a proprietary software company's systems, like Apple iOS or Google Android, both of which use Open Source for infrastructure but the apps are mostly proprietary. The common person doesn't know about Open Source, they don't know about the freedoms we promote which are increasingly in their interest. Indeed, Open Source is used today to surveil and even oppress them."

Free Software, Perens explains, is now 50 years old and the first announcement of Open Source occurred 30 years ago. "Isn't it time for us to take a look at what we've been doing, and see if we can do better? Well, yes, but we need to preserve Open Source at the same time. Open Source will continue to exist and provide the same rules and paradigm, and the thing that comes after Open Source should be called something else and should never try to pass itself off as Open Source. So far, I call it Post-Open."

Post-Open, as he describes it, is a bit more involved than Open Source. It would define the corporate relationship with developers to ensure companies paid a fair amount for the benefits they receive. It would remain free for individuals and non-profit, and would entail just one license.

He imagines a simple yearly compliance process that gets companies all the rights they need to use Post-Open software. And they'd fund developers who would be encouraged to write software that's usable by the common person, as opposed to technical experts.

Pointing to popular applications from Apple, Google, and Microsoft, Perens says: "A lot of the software is oriented toward the customer being the product – they're certainly surveilled a great deal, and in some cases are actually abused. So it's a good time for open source to actually do stuff for normal people."

The reason that doesn't often happen today, says Perens, is that open source developers tend to write code for themselves and those who are similarly adept with technology. The way to avoid that, he argues, is to pay developers, so they have support to take the time to make user-friendly applications.

Companies, he suggests, would foot the bill, which could be apportioned to contributing developers using the sort of software that instruments GitHub and shows who contributes what to which products. Merico, he says, is a company that provides such software.

Perens acknowledges that a lot of stumbling blocks need to be overcome, like finding an acceptable entity to handle the measurements and distribution of funds. What's more, the financial arrangements have to appeal to enough developers.

"And all of this has to be transparent and adjustable enough that it doesn't fork 100 different ways," he muses. "So, you know, that's one of my big questions. Can this really happen?"


Original Submission

posted by hubie on Sunday December 31 2023, @05:21AM   Printer-friendly

Brands are turning to hyper-realistic, AI-generated influencers for promotions:

Pink-haired Aitana Lopez is followed by more than 200,000 people on social media. She posts selfies from concerts and her bedroom, while tagging brands such as hair care line Olaplex and lingerie giant Victoria's Secret.

Brands have paid about $1,000 a post for her to promote their products on social media—despite the fact that she is entirely fictional.

Aitana is a "virtual influencer" created using artificial intelligence tools, one of the hundreds of digital avatars that have broken into the growing $21 billion content creator economy.

Their emergence has led to worry from human influencers their income is being cannibalized and under threat from digital rivals. That concern is shared by people in more established professions that their livelihoods are under threat from generative AI—technology that can spew out humanlike text, images and code in seconds.

But those behind the hyper-realistic AI creations argue they are merely disrupting an overinflated market.

"We were taken aback by the skyrocketing rates influencers charge nowadays. That got us thinking, 'What if we just create our own influencer?'" said Diana Núñez, co-founder of the Barcelona-based agency The Clueless, which created Aitana. "The rest is history. We unintentionally created a monster. A beautiful one, though."

"It is not influencing purchase like a human influencer would, but it is driving awareness, favourability and recall for the brand," said Becky Owen, global chief marketing and innovation officer at Billion Dollar Boy, and former head of Meta's creator innovations team.

[...] "For a brand, they have total control versus a real person who comes with potential controversy, their own demands, their own opinions," McGrath added.

[...] "A lot of companies are coming out with virtual influencers they have generated in a day, and they are not really putting that human element [into the messaging] . . . and I don't think that is going to be the long-term strategy," she added.

[...] The Clueless's creations, among other virtual influencers, have also been criticized for being overly sexualised, with Aitana regularly appearing in underwear. The agency said sexualisation is "prevalent with real models and influencers" and that its creations "merely mirror these established practices without deviating from the current norms in the industry."

Mercer, the human influencer, argued: "It feels like women in recent years have been able to take back some agency, through OnlyFans, through social media, they have been able to take control of their bodies and say 'for so long men have made money off me, I am going to make money for myself'."

But she said AI-generated creations, often made by men, were once again profiting from female sexuality. "That is the reason behind growing these accounts. It is to make money."


Original Submission

posted by hubie on Sunday December 31 2023, @12:36AM   Printer-friendly
from the it's-a-love-in-for-the-Victory-Wagon dept.

Arthur T Knackerbracket has processed the following story:

Volkswagen has ranked as the world's second-best selling automaker for three years running, trailing only Toyota with between 8.2 million and 9.3 million vehicles sold each year between 2020 and 2022. The Volkswagen group now includes 10 European brands including Porsche, Audi, Lamborghini, Bentley, and Ducati. However, the company almost didn't survive World War II. The auto group got its start and name from Adolf Hitler in May of 1937. He wanted a "people's car" and enlisted Ferdinand Porsche to design the brand's first model. In 1938, Hitler established the city of Stadt des KdF-Wagens ("City of the KdF Wagon"), now called Wolfsburg, which was home to the Volkswagen factory there.

During the war, the factory was used to make bombs and military vehicles. When the plant was captured by Allied forces in April of 1945, nearly 8,000 forced laborers were freed. The damaged factory and city were then handed over to the British after U.S. troops withdrew following Hitler's suicide and Germany's surrender.

British Maj. Ivan Hirst took command of the factory and convinced his superiors that Vollkswagens would work well as light transport. The British Army then responded with an order of 20,000 vehicles — including 1,785 Type Is — in 1945.

The Type I was the car eventually dubbed the Beetle. It would become the most-produced model in automotive history, surpassing the Ford Model T in 1972. According to Autoweek, the Brits found the Type I obnoxious and "quite unattractive to the average motorcar buyer." They even tried to give Volkswagen away to Ford, but Ford's board chairman Ernest Breech declined, saying, "I don't think what we're being offered here is worth a damn!" 

[...] It wasn't until four years after the war's end that the first Type I Beetle made its way to North America, thanks to Dutch importer Ben Pon. He brought the first Beetles across the Atlantic in January of 1949 and drove one of them fruitlessly up and down the Eastern Seaboard, looking for a buyer, eventually selling it for $800 to help pay off a hotel bill. By the year's end, however, he had only sold two of the vehicles that reporters dubbed "Hitler's car," which Pon tried to re-label as the "Victory Wagon." 

Pon returned to Europe, and importer Max Hoffman stepped in as the first official stateside Volkswagen dealer. Hoffman earned the exclusive right to sell Volkswagens east of the Mississippi, and by 1960 he had placed 300,000 American buyers behind their wheels.

[...] Disney took advantage of the Beetle's popularity and unique style, making it the star of the 1969 film "Herbie the Love Bug," along with several movie sequels and a 1982 television series. 

According to the Disney website D23, writer and producer Bill Walsh conducted a multi-car audition to select the right car to star as Herbie. "As the employees passed by on their way to lunch," Walsh said, "they looked at the little cars, kicked the tires, and turned the steering wheels. But everybody who went by patted the Volkswagen. The VW had a personality of its own that reached out and embraced people."

[...] By 1974, Volkswagen had moved production of the Beetle from Wolfsburg to its new plants in Mexico and Brazil, and, beginning in 1977, only sold the Type I Beetle in the U.S. in convertible form. Throughout the 1970s, the Type I gradually grew more powerful and driver-friendly, getting a larger windshield, automatic transmission, and electronic fuel injection.

Volkswagen introduced the New Beetle in 1998, with the familiar rounded shape but proper 20th-century features like a sunroof, air bags, and a turbocharger. While the early New Beetles had these modern features, VW tried to maintain the link to the car's hippie roots by including a flower vase as a dealer accessory.  Car and Driver clocked the 1999 New Beetle as capable of going from zero to 60 in 7.3 seconds.

The last Type I came off the assembly line in Mexico in 2003, and the new version of the Beetle saw several updates and revisions before it was finally dropped for good in 2019.


Original Submission

posted by hubie on Saturday December 30 2023, @07:51PM   Printer-friendly

"Triangulation" infected dozens of iPhones belonging to employees of Moscow-based Kaspersky:

Researchers on Wednesday presented intriguing new findings surrounding an attack that over four years backdoored dozens if not thousands of iPhones, many of which belonged to employees of Moscow-based security firm Kaspersky. Chief among the discoveries: the unknown attackers were able to achieve an unprecedented level of access by exploiting a vulnerability in an undocumented hardware feature that few if anyone outside of Apple and chip suppliers such as ARM Holdings knew of.

"The exploit's sophistication and the feature's obscurity suggest the attackers had advanced technical capabilities," Kaspersky researcher Boris Larin wrote in an email. "Our analysis hasn't revealed how they became aware of this feature, but we're exploring all possibilities, including accidental disclosure in past firmware or source code releases. They may also have stumbled upon it through hardware reverse engineering."

[...] The mass backdooring campaign, which according to Russian officials also infected the iPhones of thousands of people working inside diplomatic missions and embassies in Russia, according to Russian government officials, came to light in June. Over a span of at least four years, Kaspersky said, the infections were delivered in iMessage texts that installed malware through a complex exploit chain without requiring the receiver to take any action.

With that, the devices were infected with full-featured spyware that, among other things, transmitted microphone recordings, photos, geolocation, and other sensitive data to attacker-controlled servers. Although infections didn't survive a reboot, the unknown attackers kept their campaign alive simply by sending devices a new malicious iMessage text shortly after devices were restarted.

[...] The most intriguing new detail is the targeting of the heretofore-unknown hardware feature, which proved to be pivotal to the Operation Triangulation campaign. A zero-day in the feature allowed the attackers to bypass advanced hardware-based memory protections designed to safeguard device system integrity even after an attacker gained the ability to tamper with memory of the underlying kernel. On most other platforms, once attackers successfully exploit a kernel vulnerability they have full control of the compromised system.

On Apple devices equipped with these protections, such attackers are still unable to perform key post-exploitation techniques such as injecting malicious code into other processes, or modifying kernel code or sensitive kernel data. This powerful protection was bypassed by exploiting a vulnerability in the secret function. The protection, which has rarely been defeated in exploits found to date, is also present in Apple's M1 and M2 CPUs.

[...] The researchers found that several of MMIO addresses the attackers used to bypass the memory protections weren't identified in any device tree documentation, which acts as a reference for engineers creating hardware or software for iPhones. Even after the researchers further scoured source codes, kernel images, and firmware, they were still unable to find any mention of the MMIO addresses.

[...] The findings presented Wednesday also detail the intricacies of the exploit chain that underpinned the Triangulation infections. As noted earlier, the chain exploited four zero-days to ensure that the Triangulation malware ran with root privileges and gained complete control over the device and user data stored on it.

[...] Wednesday's presentation, titled What You Get When You Attack iPhones of Researchers, is a further reminder that even in the face of innovative defenses like the one protecting the iPhone kernel, ever more sophisticated attacks continue to find ways to defeat them.

"We discover and analyze new exploits and attacks using them on a daily basis," Larin wrote. "We've discovered and reported more than thirty in the wild zero-days in Adobe/Apple/Google/Microsoft products, but this is definitely the most sophisticated attack chain we've ever seen."


Original Submission

posted by hubie on Saturday December 30 2023, @03:05PM   Printer-friendly
from the measuring-contest dept.

Arthur T Knackerbracket has processed the following story:

Intel CEO Pat Gelsinger has claimed that its upcoming 18A process node (essentially 1.8nm) could outperform TSMC's 2nm chips despite launching a year earlier. The comments contradict recent claims from the Taiwanese competitor. Gelsinger made the remarks in an interview with Barrons.

[...] Additionally, TSMC is confident that its 2nm N2 node, slated for 2025, will outperform N3P and 18A. Following the company's inaugural 3nm process pattern, Apple could get first dibs on N2 and utilize it for the iPhone 17 Pro.

Much of Gelsinger's confidence in 20A and 18A lies in their introduction of the RibbonFET architecture – the company's take on gate-all-around (GAA) transistors and backside power delivery. These technologies will become crucial for companies manufacturing 2nm chips, enabling higher logic densities and clock speeds with reduced power leakage. Meanwhile, TSMC's N3P and other upcoming 3nm nodes will continue utilizing the mature FinFET architecture until it migrates to GAA with N2 a year after Intel.

Intel and TSMC aren't the only companies preparing to build 2nm semiconductors. Samsung also wants to enter 2nm mass production in 2025, while Japanese fabricator Rapidus plans to introduce prototypes by 2025, with mass production beginning in 2027.


Original Submission

posted by hubie on Saturday December 30 2023, @10:23AM   Printer-friendly

Tests in animals show the material works like the body's own system:

People with type I diabetes have to inject themselves multiple times a day with manufactured insulin to maintain healthy levels of the hormone, as their bodies do not naturally produce enough. The injections also have to be timed in response to eating and exercise, as any consumption or use of glucose has to be managed.

Research into glucose-responsive insulin, or "smart" insulin, hopes to improve the quality of life for people with type I diabetes by developing a form of insulin that needs to be injected less frequently, while providing control of blood-glucose levels over a longer period of time.

A team at Zhejiang University, China, has recently released a study documenting an improved smart insulin system in animal models—the current work doesn't involve any human testing. Their insulin was able to regulate blood-glucose levels for a week in diabetic mice and minipigs after a single subcutaneous injection.

[...] The new smart insulin is based on a form of insulin modified with gluconic acid, which forms a complex with a polymer through chemical bonds and strong electrostatic attraction. When insulin is trapped in the polymer, its signaling function is blocked, allowing a week's worth of insulin to be given via a single injection without a risk of overdose.

Crucial to the "glucose responsive" nature of this system is the fact that the chemical structures of glucose and gluconic acid are extremely similar, meaning the two molecules bind in very similar ways. When glucose meets the insulin-polymer complex, it can displace some of the bound insulin and form its own chemical bonds to the polymer. Glucose binding also disrupts the electrostatic attraction and further promotes insulin release.

[...] This system mimics the body's natural process, in which insulin is also released in response to glucose.

[...] The study is not without its limitations. Although long-term glucose regulation was seen in the mice and minipigs examined, only a few animals were involved in the study—five mice and three minipigs. And of course, there's always the risk that the results of animal studies don't completely track over to clinical trials in humans. "We have to accept that these are animal studies, and so going across to humans is always a bit of an issue," said Bain.

Although more research is required before this smart insulin system can be tested in humans, this work is a promising step forward in the field.

Journal Reference:
Zhang, Juan, Wei, Xiangqian, Liu, Wei, et al. Week-long norm glycaemia in diabetic mice and minipigs via a subcutaneous dose of a glucose-responsive insulin complex, Nature Biomedical Engineering (DOI: 10.1038/s41551-023-01138-7)


Original Submission

posted by hubie on Saturday December 30 2023, @05:36AM   Printer-friendly

Arthur T Knackerbracket has processed the following story:

Plasma could be wrangled to collide photons and yield matter, according to physicists who ran simulations to explore the practical applications of a world-famous equation.

The equation at work here is Einstein’s E = mc^2, which establishes a relationship between energy and mass; specifically, the equation holds that energy and mass are equivalent when the latter is multiplied by the speed of light, squared.

A team led by scientists at Osaka University and UC San Diego recently simulated the collisions of photons using lasers; their results suggest that the collisions would yield pairs of electrons and positrons. The positrons—the antiparticle of the electron—could then be accelerated by the laser’s electric field to produce a positron beam. Their results are published in Physical Review Letters.

“We feel that our proposal is experimentally feasible, and we look forward to real-world implementation,” said Alexey Arefiev, a physicist at UC San Diego and co-author of the paper, in a University of Osaka release.

The experimental set-up is possible, the release added, at laser intensities that currently exist. The researchers used simulations to test potential experimental set-ups and found a compelling one. The photon-photon collider uses the Breit-Wheeler process to produce matter, meaning it annihilates gamma-rays to produce electron-positron pairs.

[...] “This research shows a potential way to explore the mysteries of the universe in a laboratory setting,” said Vyacheslav Lukin, a program director at the National Science Foundation, which supported the recent research. “The future possibilities at today’s and tomorrow’s high-power laser facilities just became even more intriguing.”

The experiment could provide a way to peer into the universe’s composition, by bringing some far-out physics much closer to home. But for that to happen, an experiment will actually need to be built.

Journal Reference:
K. Sugimoto, Y. He, N. Iwata, et al., Positron Generation and Acceleration in a Self-Organized Photon Collider Enabled by an Ultraintense Laser Pulse, Phys. Rev. Lett. 131, 065102 – Published 9 August 2023. https://doi.org/10.1103/PhysRevLett.131.065102


Original Submission

posted by hubie on Saturday December 30 2023, @12:51AM   Printer-friendly
from the it's-databases-all-the-way-down dept.

Arthur T Knackerbracket has processed the following story:

Celebrating his 80th birthday this year, Michael Stonebraker continues with his work in database research, but his mark on the industry has been cemented with PostgreSQL, the open source relational database system which, for the first time, became the most popular choice of database among developers this year, according to the 2023 Stack Overflow survey. As well as a popular open source DBMS, vendors including the cloud hyperscalers, CockroachDB and YugabyteDB all offer database services with a PostgreSQL compatible front end.

Stonebraker's first influential work started with Ingres, the early relational database system, which began as his research topic following his appointment as an assistant professor at UC Berkeley in 1971.

Speaking to The Register, he says: "My PhD thesis was on an aspect of Markov chains, and that, I realized, had no practical value whatsoever. I went to Berkeley, and you've got five years to make a contribution and get tenure. I knew it was not going to be my thesis topic. Then Eugene Wong, who was another faculty member at Berkeley, said, 'Why don't we look at databases?'"

The two read a then-recent proposal about relational databases from IBM researcher Edgar Codd called "A Relational Model of Data for Large Shared Data Banks."

Stonebraker and Wong thought the Englishman's idea was elegant and simple. "The obvious question was to try and build a relational database system. Both Eugene and I had no experience building system software but, like academics, we thought, let's try it and see what happens. So, based on no experience, we set out to build Ingres. And that was what got me my tenure."

[...] But Stonebraker acknowledges the commercial codebase for Ingres was way ahead of the open source research project — other researchers could get the code for a nominal fee covering the tape required to store and the postal costs — so his team decided to push the code over a cliff and start all over again. What comes after Ingres? Postgres, obviously.

In 1986, a 28-page paper [PDF] — co-written with Larry Rowe — announced the design for Postgres, as it was then known, setting out six guiding ambitions. Among them were two that would prove pertinent to the database system's longevity. One was to provide better support for complex objects. The second was to provide user extendibility for data types, operators and access methods.

[...] Nonetheless it was Oracle that made a decision which provided a boost to open source PostgreSQL. It bought open source MySQL, which some of the community did not trust in the hands of the proprietary software giant. At the same time Illustra and other companies commercialized Postgres, Berkeley released the code for POSTGRES under the MIT license, allowing other developers to work on it.

In 1994, Andrew Yu and Jolly Chen, both Berkeley graduates, replaced query language POSTQUEL with SQL. The resulting Postgres95 was made freely available and modifiable under a more permissive license and renamed PostgreSQL.

"What ended up happening was Illustra kind of gaining traction, but the big kicker was when this group of totally unrelated people I didn't even know, picked up the open source Postgres code, which was still around, and ran with it, totally unbeknownst to me. That was a wonderful accident," he says.

"When MySQL was bought by Oracle, developers got suspicious in droves, and defected to PostgreSQL. It was another happy accident. It's commercial success is wonderful, but it was largely serendipitous," Stonebraker adds.

[...] Despite many of his ideas being so widely used in the database industry, which Gartner said was worth $91 billion in 2022, Stonebraker is laid back about other people using his ideas.

"I've done well financially. I knew Ted Codd, who was very magnanimous about saying you guys should all run the [ideas]. You want to change the world; any particular person is only part of that. I've always done open source code and shared code with anybody who wanted it. In the process, I've done well financially so yeah, I have no regrets at all," he says.

But that's not to say he is ready to retire. In his latest project, Stonebraker is ready to change the world again.

The idea for DBOS, a Database-Oriented Operating System, came from a conversation with Matei Zaharia, the author of Apache Spark who is also co-founder of analytics and ML company Databricks and associate professor at Berkeley.

[...] The new project replaced Linux and Kubernetes with a new operating system stack at the bottom of which is a database system, the prototype multi-node multi-core, transactional, highly-available VoltDB, which Stonebraker started.

"Basically, the operating system is an application to the database, rather than the other way around," he says.

A paper Stonebraker co-authored with Zaharia and others explains: "All operating system state should be represented uniformly as database tables, and operations on this state should be made via queries from otherwise stateless tasks. This design makes it easy to scale and evolve the OS without whole-system refactoring, inspect and debug system state, upgrade components without downtime, manage decisions using machine learning, and implement sophisticated security features."

Successful or otherwise, the OS-as-a-database application idea is unlikely to be Stonebraker's last. After turning 80 in October, he tells The Register he is not about to slow down.

"I can't imagine playing golf three days a week. I like what I do, and I will do it as long as I can be intellectually competitive," he says.


Original Submission

posted by martyb on Friday December 29 2023, @08:04PM   Printer-friendly
from the Hurry!-Get-them-while-you-still-can! dept.

Appeals court pauses ban on patent-infringing Apple Watch imports:

Just before Christmas, Apple pulled two of its latest smartwatches from stores. The cause was not an unwelcome visit from the ghost of mechanical timepieces past but the International Trade Commission, which found that the California-based computer maker had infringed on some patents, resulting in the ITC banning the import of said watches. Yesterday, Reuters reported that Apple filed an emergency request for the courts to lift the ban and will appeal the ITC ruling.

And today, the US Court of Appeals for the Federal Circuit granted Apple's wish, pausing the ban while it considers the tech company's argument.

Apple's watch problems started back in January. That's when a court found that the light-based pulse oximetry sensor (found on the back of the watches) infringed patents held by Masimo, a medical device manufacturer also based in California.

At the time, Apple said since Masimo was not a consumer-focused company, it chose not to collaborate or acquire the medical device maker. Masimo, for its part, said that Apple led it on in discussions then took its idea and hired away Masimo engineers.

In October, the ITC upheld the ruling of infringement and started the process to ban imports of the watches, giving US President Joe Biden's administration 60 days to review the case and possibly veto the ruling.

But the Biden administration has chosen not to interfere, unlike in 2013 when the Obama administration vetoed a ban on iPhones and iPads during a patent dispute between Apple and Samsung. Although the ITC's import ban on Apple Watch Series 9 and Ultra 2 models was supposed to go into effect on December 26, Apple pulled the watches from sale a few days early. The older Apple Watch SE, which doesn't use the infringing blood oxygen sensor, remains on sale.

"We strongly disagree with the USITC decision and resulting exclusion order, and are taking all measures to return Apple Watch Series 9 and Apple Watch Ultra 2 to customers in the US as soon as possible," Apple said in a statement.

Apple had asked the CAFC [United States Court of Appeals for the Federal Circuit] to pause the ban until US Customs and Border Protection decides whether redesigned Apple Watches no longer infringe on Masimo's patents, a decision that should be reached by January 12. Now the court has given the ITC a deadline of January 10 to respond to Apple.

This article was updated shortly after publication to reflect the court pausing the import ban.


Original Submission

posted by martyb on Friday December 29 2023, @03:13PM   Printer-friendly

New York Times Sues Microsoft, ChatGPT Maker OpenAI Over Copyright Infringement

The New York Times on Wednesday filed a lawsuit against Microsoft and OpenAI, the company behind popular AI chatbot ChatGPT, accusing the companies of creating a business model based on "mass copyright infringement," stating their AI systems "exploit and, in many cases, retain large portions of the copyrightable expression contained in those works:"

Microsoft both invests in and supplies OpenAI, providing it with access to the Redmond, Washington, giant's Azure cloud computing technology.

The publisher said in a filing in the U.S. District Court for the Southern District of New York that it seeks to hold Microsoft and OpenAI to account for the "billions of dollars in statutory and actual damages" it believes it is owed for the "unlawful copying and use of The Times's uniquely valuable works."

[...] The Times said in an emailed statement that it "recognizes the power and potential of GenAI for the public and for journalism," but added that journalistic material should be used for commercial gain with permission from the original source.

"These tools were built with and continue to use independent journalism and content that is only available because we and our peers reported, edited, and fact-checked it at high cost and with considerable expertise," the Times said.

"Settled copyright law protects our journalism and content. If Microsoft and OpenAI want to use our work for commercial purposes, the law requires that they first obtain our permission. They have not done so."

[...] OpenAI has tried to allay news publishers concerns. In December, the company announced a partnership with Axel Springer — the parent company of Business Insider, Politico, and European outlets Bild and Welt — which would license its content to OpenAI in return for a fee.

Also at CNBC and The Guardian.

Previously:

NY Times Sues Open AI, Microsoft Over Copyright Infringement

NY Times sues Open AI, Microsoft over copyright infringement:

In August, word leaked out that The New York Times was considering joining the growing legion of creators that are suing AI companies for misappropriating their content. The Times had reportedly been negotiating with OpenAI regarding the potential to license its material, but those talks had not gone smoothly. So, eight months after the company was reportedly considering suing, the suit has now been filed.

The Times is targeting various companies under the OpenAI umbrella, as well as Microsoft, an OpenAI partner that both uses it to power its Copilot service and helped provide the infrastructure for training the GPT Large Language Model. But the suit goes well beyond the use of copyrighted material in training, alleging that OpenAI-powered software will happily circumvent the Times' paywall and ascribe hallucinated misinformation to the Times.

Journalism is expensive

The suit notes that The Times maintains a large staff that allows it to do things like dedicate reporters to a huge range of beats and engage in important investigative journalism, among other things. Because of those investments, the newspaper is often considered an authoritative source on many matters.

All of that costs money, and The Times earns that by limiting access to its reporting through a robust paywall. In addition, each print edition has a copyright notification, the Times' terms of service limit the copying and use of any published material, and it can be selective about how it licenses its stories. In addition to driving revenue, these restrictions also help it to maintain its reputation as an authoritative voice by controlling how its works appear.

The suit alleges that OpenAI-developed tools undermine all of that. "By providing Times content without The Times's permission or authorization, Defendants' tools undermine and damage The Times's relationship with its readers and deprive The Times of subscription, licensing, advertising, and affiliate revenue," the suit alleges.

Part of the unauthorized use The Times alleges came during the training of various versions of GPT. Prior to GPT-3.5, information about the training dataset was made public. One of the sources used is a large collection of online material called "Common Crawl," which the suit alleges contains information from 16 million unique records from sites published by The Times. That places the Times as the third most references source, behind Wikipedia and a database of US patents.

OpenAI no longer discloses as many details of the data used for training of recent GPT versions, but all indications are that full-text NY Times articles are still part of that process. [...] Expect access to training information to be a major issue during discovery if this case moves forward.

Not just training

A number of suits have been filed regarding the use of copyrighted material during training of AI systems. But the Times' suite goes well beyond that to show how the material ingested during training can come back out during use. "Defendants' GenAI tools can generate output that recites Times content verbatim, closely summarizes it, and mimics its expressive style, as demonstrated by scores of examples," the suit alleges.


Original Submission #1Original Submission #2Original Submission #3

posted by hubie on Friday December 29 2023, @10:05AM   Printer-friendly
from the Tazed-and-Confused? dept.

This is a long, interesting investigative report from Reuters:
Taser maker Axon has a moving backstory. It's mostly a myth

Mostly more of "corporations behaving badly," but with a dastardly twist on why the company was formed.

Axon CEO Rick Smith claims his highly successful Taser company was inspired by the death of two school friends gunned down years ago. But much of the tale is false, Reuters found, part of a pattern of misrepresentations and self-serving behavior among top Axon executives.
...
He started the company, he said, after "two of my high school friends were shot and killed." Projected behind him were photographs of the slain youths, marked with the dates of their short lives.
...
Smith was not friends with the deceased, Todd Bogers and Cory Holmes, according to three immediate family members and a close friend of the young men. They were gunned down after a road rage incident in 1991, not 1990, as indicated on Smith's slide in Las Vegas. Smith played on the same football team as the boys at Chaparral in Scottsdale, Arizona – but not at the same time, according to school yearbooks seen by Reuters. The boys who were killed graduated in 1986. Smith does not appear in the yearbooks until the school year that ended in 1987.
Axon "ran a whole advertising campaign based on the murder of my son," Todd's father John Bogers said in an interview, recalling feelings of bereavement that the ads triggered. "They profited off that, and they didn't ask for permission."
...
Shelby Bogers and Christopher Holmes, siblings of the football players Todd and Cory, said the story came as news to them: They did not learn about Smith's narrative until more than 15 years after their brothers' deaths, they said. Smith wasn't close with Todd or Cory, didn't attend their joint funeral and never offered a hand during the four-year search for the killer, Shelby Bogers said. Now Axon is "calling them his childhood friends," she said. "That word pisses me off."
...
Smith's wife ...was employed by the company in the role of "CEO Support" and "Personal Assistant,"


Original Submission

posted by hubie on Friday December 29 2023, @05:20AM   Printer-friendly
from the proprietary-standards-are-always-dangerous dept.

UEFI Failing: What to Know About LogoFAIL Attacks

UEFI Failing: What to Know About LogoFAIL Attacks:

  • Multiple UEFI vulnerabilities can lead to Linux, Windows, and Mac exploits
  • LogoFAIL persists across operating system reinstallations
  • It also extends the supply chain risks to the hardware itself

Security researchers, known for their inquisitive and unconventional methods, have recently scrutinized UEFI (Unified Extensible Firmware Interface), revealing significant vulnerabilities called LogoFAIL vulnerabilities. These experts, who investigate systems to uncover unusual ways to exploit them, discovered that UEFI, the modern replacement for traditional BIOS, is susceptible to certain failures – which have wide-ranging impacts.

Specifically, researchers found that the libraries used by various system integrators and vendors in their motherboards' UEFI are vulnerable. These libraries can be manipulated to perform unforeseen operations through specially crafted images displayed during system boot-up, such as logos and banners. This manipulation effectively circumvents security features like Secure Boot, misleading the subsequent operating system.

[...] UEFI stands for Unified Extensible Firmware Interface, an advanced version of the old BIOS. It is essentially a compact operating system that manages hardware initialization and preliminary system security before transitioning control to the main operating system. UEFI oversees numerous functions, including CPU frequency, power and thermal management, memory timings, and peripheral operations. Some UEFI systems even offer network connectivity for firmware updates without an operating system being required.

Unlike BIOS, UEFI provides a consistent visual experience by displaying an image during boot-up, which remains visible throughout the UEFI initialization and into the operating system's boot phase. This differs from BIOS, which typically involves screen resolution changes and text mode resets before operating system drivers are activated.

[...] It is important to note that, despite the hype, to exploit these vulnerabilities it is necessary to have access to the system in the first place, and in that access, to have privileges to write to the EFI partition and UEFI non-volatile ram (nvram). The keen-eyed reader will realize that, if you already have that level of access, then it's not necessarily the LogoFAIL exploit itself that is the problem, but rather the persistence that it enables for other malware to abuse. Consider, for example, a ransomware that persists even system reimaging attempts after an infrastructure-wide attack. It would cripple recovery operations.

Adding insult to injury, the vulnerabilities exist across multiple platforms and architectures. It impacts both x86 and ARM-based devices. BIOS vendors like AMI, Phoenix, and others, create firmware that is affected by LogoFAIL. In turn, this makes motherboards using that firmware to also be affected by it – it doesn't matter if server-grade or consumer-grade hardware, as the same BIOS vendors will provide software for all of them. Vendors like Intel, Dell, Supermicro, Acer, and many others are therefore affected.

[...] These findings highlight another dimension of software supply chain risks. Directly targeting hardware adds to the already complex array of threats affecting software supply chains, from developer tools to source code repositories.

The fact that a given workload is potentially affected by vulnerabilities all throughout this large dependency and environment chain is something that we seem to turn a blind eye to – either through a lack of awareness or an inability to effectively prevent it – but which doesn't make it any more secure.

Just About Every Windows and Linux Device Vulnerable to New LogoFAIL Firmware Attack

UEFIs booting Windows and Linux devices can be hacked by malicious logo images:

Hundreds of Windows and Linux computer models from virtually all hardware makers are vulnerable to a new attack that executes malicious firmware early in the boot-up sequence, a feat that allows infections that are nearly impossible to detect or remove using current defense mechanisms.

The attack—dubbed LogoFAIL by the researchers who devised it—is notable for the relative ease in carrying it out, the breadth of both consumer- and enterprise-grade models that are susceptible, and the high level of control it gains over them. In many cases, LogoFAIL can be remotely executed in post-exploit situations using techniques that can't be spotted by traditional endpoint security products. And because exploits run during the earliest stages of the boot process, they are able to bypass a host of defenses, including the industry-wide Secure Boot, Intel's Secure Boot, and similar protections from other companies that are devised to prevent so-called bootkit infections.

Game over for platform security

LogoFAIL is a constellation of two dozen newly discovered vulnerabilities that have lurked for years, if not decades, in Unified Extensible Firmware Interfaces responsible for booting modern devices that run Windows or Linux. The vulnerabilities are the product of almost a year's worth of work by Binarly, a firm that helps customers identify and secure vulnerable firmware.

[...] As its name suggests, LogoFAIL involves logos, specifically those of the hardware seller that are displayed on the device screen early in the boot process, while the UEFI is still running. Image parsers in UEFIs from all three major IBVs are riddled with roughly a dozen critical vulnerabilities that have gone unnoticed until now. By replacing the legitimate logo images with identical-looking ones that have been specially crafted to exploit these bugs, LogoFAIL makes it possible to execute malicious code at the most sensitive stage of the boot process, which is known as DXE, short for Driver Execution Environment.

"Once arbitrary code execution is achieved during the DXE phase, it's game over for platform security," researchers from Binarly, the security firm that discovered the vulnerabilities, wrote in a whitepaper. "From this stage, we have full control over the memory and the disk of the target device, thus including the operating system that will be started."

From there, LogoFAIL can deliver a second-stage payload that drops an executable onto the hard drive before the main OS has even started. The following video demonstrates a proof-of-concept exploit created by the researchers. The infected device—a Gen 2 Lenovo ThinkCentre M70s running an 11th-Gen Intel Core with a UEFI released in June—runs standard firmware defenses, including Secure Boot and Intel Boot Guard.

Detecting LogoFAIL Vulnerabilities and Exploits at Enterprise Scale

Detecting LogoFAIL Vulnerabilities and Exploits at Enterprise Scale - Eclypsium:

IT security teams are assessing new UEFI vulnerabilities that affect Windows and Linux systems. The vulnerabilities are collectively called LogoFAIL because they exist in UEFI image parsers that display the manufacturer logo when the system boots up.

Affected vendors include UEFI suppliers AMI, Insyde, and Phoenix and device manufacturers such as Lenovo, Dell, and HP. Some vendors have already issued advisories, but we should expect the list to expand as more vendors assess their exposure.

[...] Defenders need to know which systems are affected by LogoFAIL vulnerabilities and the associated severity. The CERT Coordination Center at Carnegie Mellon has a dynamic list of affected vendors and associated security advisories.

So far, it is difficult to determine the severity as no public exploit has been published, and some of the now public vulnerabilities have been scored differently by the researchers from Binarly who discovered the LogoFAIL vulnerabilities, the UEFI firmware vendors (Phoenix Technologies, Insyde, and AMI), and the National Vulnerability Database (NVD). The severity and exploitability of each LogoFAIL vulnerability will likely depend on how affected firmware vendors and equipment manufacturers (OEMs) store and process logo images. An attacker's ability to modify these logo images or paths to them may depend on malicious software running locally on a system (with administrative or root-level privileges), by an attacker remotely accessing the system, or by an attacker who gained physical access to a target.

You should monitor and apply patches as they become available from each OEM for each product model. As of the time of this writing, the list of affected products that have associated CVE identifiers includes the following:

Insyde has issued INSYDE-SA-2023053 and assigned it a CVSS score of 4.4. The associated CVE is CVE-2023-40238 and has been scored a CVSS 5.5 (Medium) by the NVD. The aforementioned CVE correlates to Binarly's vulnerability identifier BRLY-LOGOFAIL-2023-006 with an assigned CVSS of 8.2 (High). The difference in CVSS score appears to result from differences in perceived potential impact on confidentiality, integrity, and availability.

AMI has issued AMI-SA-2023009 and assigned a score of 7.5 to each of the associated CVEs, while the NVD has assigned a score of 7.8:

The severity rating for the AMI vulnerabilities is higher than the CVE in Insyde firmware due to stated impact on confidentiality and integrity.


Original Submission #1Original Submission #2