Stories
Slash Boxes
Comments

SoylentNews is people

SoylentNews is powered by your submissions, so send in your scoop. Only 16 submissions in the queue.

Log In

Log In

Create Account  |  Retrieve Password


Site News

Join our Folding@Home team:
Main F@H site
Our team page


Funding Goal
For 6-month period:
2022-07-01 to 2022-12-31
(All amounts are estimated)
Base Goal:
$3500.00

Currently:
$438.92

12.5%

Covers transactions:
2022-07-02 10:17:28 ..
2022-10-05 12:33:58 UTC
(SPIDs: [1838..1866])
Last Update:
2022-10-05 14:04:11 UTC --fnord666

Support us: Subscribe Here
and buy SoylentNews Swag


We always have a place for talented people, visit the Get Involved section on the wiki to see how you can make SoylentNews better.

Do you put ketchup on the hot dog you are going to consume?

  • Yes, always
  • No, never
  • Only when it would be socially awkward to refuse
  • Not when I'm in Chicago
  • Especially when I'm in Chicago
  • I don't eat hot dogs
  • What is this "hot dog" of which you speak?
  • It's spelled "catsup" you insensitive clod!

[ Results | Polls ]
Comments:88 | Votes:246

posted by hubie on Friday October 25 2024, @09:07PM   Printer-friendly
from the will-the-real-satoshi-please-stand-up dept.

https://arstechnica.com/tech-policy/2024/10/peter-todd-in-hiding-after-being-unmasked-as-bitcoin-creator/

When Canadian developer Peter Todd found out that a new HBO documentary, Money Electric: The Bitcoin Mystery, was set to identify him as Satoshi Nakamoto, the creator of Bitcoin, he was mostly just pissed. "This was clearly going to be a circus," Todd told WIRED in an email.
[...]
The mystery has proved all the more irresistible for the trove of bitcoin Satoshi is widely believed to have controlled, suspected to be worth many billions of dollars today. When the documentary was released on October 8, Todd joined a long line of alleged Satoshis.
[...]
Since the documentary aired, Todd has repeatedly and categorically denied that he created Bitcoin: "For the record, I am not Satoshi," he alleges. "I think Cullen made the Satoshi accusation for marketing. He needed a way to get attention for his film."
[...]
The search for the creator of Bitcoin has dragged into its orbit a colorful cast of characters, among them Hal Finney, recipient of the first ever bitcoin transaction; Adam Back, designer of a precursor technology cited in the Bitcoin white paper; and cryptographer Nick Szabo, to name just a few. Journalists at Newsweek, The New York Times, and WIRED, among others, have all taken stabs at solving the Satoshi riddle. But irrefutable proof has never been unearthed.
[...]
The case for Sassaman was first outlined in 2021 by Evan Hatch, founder of crypto gaming platform Worlds. Whenever speculation about Sassaman bubbles periodically to the surface, the spotlight is thrown on his widow, software developer Meredith Patterson, who believes the theory is unfounded.

"People used to be really fucking nosy and entitled. I'd get people writing me with a two-page list of dates and locations, asking where I was at such and such a time or place," says Patterson. "Where do you get off? A complete stranger walking up to a widow and trying to interrogate her. It's like, fuck off Sergeant Joe Friday."
[...]
"I was relieved for myself and my family that they named Peter Todd," says Patterson. "But I feel sorry for Peter Todd. Frankly, nobody deserves getting a target painted on their back."
[...]
Todd expects that "continued harassment by crazy people" will become the indefinite status quo. But he says the potential personal safety implications are his chief concern—and the reason he has gone into hiding.
[...]
Hoback sees things very differently. Though there have been cases where violent extortionists have targeted crypto holders, plenty of people have been unmasked as Satoshi before—and nothing terrible is known to have happened to them, he argues. "I think the idea that it puts their life [at risk] is a little overblown," says Hoback.

[...]
The main evidence presented by Hoback in support of the theory that Todd created Bitcoin is a forum thread from December 2010 in which Todd appears to be "finishing Satoshi's sentences," as Hoback puts it. The topic of that thread—a way to prioritize transactions based on the fee paid—is something Todd would later go on to build into Bitcoin as a contributing developer, responding to a request posted by another forum user, John Dillon, whom Hoback alleges to be another of Todd's alter egos.
[...]
It was Todd's reaction to being confronted with the theory that ultimately solidified Hoback's conviction in the conclusion he had reached. "The end scene is really about his body language—his expressions. Were you ever caught in a lie? That's what Peter's reaction reads like to me," says Hoback.
[...]
"[Todd] throws so much shit at the wall that nothing sticks," alleges Hoback. "It's a pretty effective technique—it's hard to pin down someone who's a contrarian and constantly makes opposite statements." (Todd rejects Hoback's assessment as "wooly conspiracy thinking.")
[...]
"If you assume a sophisticated enough Satoshi, practically any theory is possible," says Todd. "It's a useless question, because Satoshi would simply deny it."

Previously on SoylentNews: (Hunt for Satoshi Nakamoto.)
Blogger Claims NSA Knows Who Satoshi Is/Are - 20170901
Former Bitcoin Developer Shares Early Satoshi Nakamoto Emails - 20170813
Craig Wright Revealed As Bitcoin Creator Satoshi Nakamoto - 20160502
Cornell Prof: How to Find Satoshi Nakamoto - 20151212
Wired and Gizmodo "Out" Possible Bitcoin Inventor, Who is then Raided Over "Unrelated" Matter - 20151210
Bitcoin Inventor Satoshi Nakamoto Nominated for Nobel Prize - 20151108
Decoding the Enigma of Satoshi Nakamoto - 20150517
"The Man Behind Bitcoin Has Been Found" - Newsweek - 20140306

Previously on SoylentNews: (Bitcoin in General)
How A 27-Year-Old Busted The Myth Of Bitcoin's Anonymity - 20240118
The Kingdom of Bhutan Has Been Quietly Mining Bitcoin for Years - 20230501
Key Bitcoin Developer Calls on FBI to Recover $3.6M in Digital Coin - 20230109
US Government Seizes $3.6 Billion in Bitcoin Tied to 2016 Hack of Crypto Exchange Bitfinex - 20220210
Nvidia's Anti-Cryptomining GPUs Have Finally Been 100% Unlocked - 20220509
Almost All Cryptocurrencies Hammered in Bloodbath - 20210609
EPFL Researchers Invent Low-Cost Alternative to Bitcoin - 20190930
A 'Blockchain Bandit' Is Guessing Private Keys And Scoring Millions - 20190425
Digital Exchange Loses $137M as Founder Takes Passwords to the Grave - 20190204
Blockchain: What's Not To Like? - 20181212
Bitcoin's Earliest Adopter Is Cryonically Freezing His Body To See The Future - 20140829


Original Submission

posted by hubie on Friday October 25 2024, @04:19PM   Printer-friendly
from the "somebody's-watching-me" dept.

https://arstechnica.com/tech-policy/2024/10/lawsuit-city-cameras-make-it-impossible-to-drive-anywhere-without-being-tracked/

Police use of automated license-plate reader cameras is being challenged in a lawsuit alleging that the cameras enable warrantless surveillance in violation of the Fourth Amendment. The city of Norfolk, Virginia, was sued yesterday by plaintiffs represented by the Institute for Justice, a nonprofit public-interest law firm.

Norfolk, a city with about 238,000 residents, "has installed a network of cameras that make it functionally impossible for people to drive anywhere without having their movements tracked, photographed, and stored in an AI-assisted database that enables the warrantless surveillance of their every move. This civil rights lawsuit seeks to end this dragnet surveillance program," said the complaint filed in US District Court for the Eastern District of Virginia.

Like many other cities, Norfolk uses cameras made by the company Flock Safety. A 404 Media article said Institute for Justice lawyer Robert Frommer "told 404 Media that the lawsuit could have easily been filed in any of the more than 5,000 communities where Flock is active, but that Norfolk made sense because the Fourth Circuit of Appeals—which Norfolk is part of—recently held that persistent, warrantless drone surveillance in Baltimore is unconstitutional under the Fourth Amendment in a case called Beautiful Struggle v Baltimore Police Department."


Original Submission

posted by hubie on Friday October 25 2024, @11:30AM   Printer-friendly
from the I'm-not-a-doctor-I'm-a-paleontologist dept.

https://arstechnica.com/science/2024/10/effort-to-bring-back-the-tasmanian-tiger-builds-steam/

Colossal, the company founded to try to restore the mammoth to the Arctic tundra, has also decided to tackle a number of other species that have gone extinct relatively recently: the dodo and the thylacine. Because of significant differences in biology, not the least of which is the generation time of Proboscideans, these other efforts may reach many critical milestones well in advance of the work on mammoths.
[...]
Colossal has branched out from its original de-extinction mission to include efforts to keep species from ever needing its services. In the case of marsupial predators, the de-extinction effort is incorporating work that will benefit existing marsupial predators: generating resistance to the toxins found on the cane toad, an invasive species that has spread widely across Australia.
[...]
For the de-extinction process, the goal would be to ensure that the thylacine could survive in the presence of the cane toad. But Colossal has also begun a conservation effort, called the Colossal foundation, that aims to keep threatened species from needing its services in the future.
[...]
Colossal has obtained a nearly complete genome sequence from a thylacine sample that was preserved in ethanol a bit over a century ago. According to Pask, this sample contains both the short fragments typical of older DNA samples (typically just a few hundred base pairs long), but also some DNA molecules that were above 10,000 bases long. This allowed them to do both short- and long-read sequencing, leaving them with just 45 gaps in the total genome sequence, which the team expects to close shortly.
[...]
The final thing the company announced was that it was working on getting dunnart embryos to develop outside of the womb.
[...]
At this point, they've got immature neural cells and have started forming the cells that will go on to form muscles and the vertebrae. But many critical events need to happen in the remaining one-third of the pregnancy, and Colossal isn't ready to talk about what goes wrong to stop development here.
[...]
Hopefully, over time, the company will continue to submit some of its work to peer-reviewed journals.

In the meantime, the clear indications of progress suggest that some of the unique features of the marsupials—relatively rapid generation times, accessible reproductive system, and many similarities to well-studied placental mammals—are helping this project move ahead at a reasonably rapid clip.

Previously on SoylentNews:
Scientists Try to Bring Australian 'Tiger' Back From Extinction - 20220531
Tasmanian Tigers Were in Poor Genetic Health Prior to Extinction - 20171212


Original Submission

posted by hubie on Friday October 25 2024, @06:45AM   Printer-friendly
from the Schrödinger's-RAM dept.

Arthur T Knackerbracket has processed the following story:

It’s not easy to study quantum systems — collections of particles that follow the counterintuitive rules of quantum mechanics. Heisenberg’s uncertainty principle, a cornerstone of quantum theory, says it’s impossible to simultaneously measure a particle’s exact position and its speed — pretty important information for understanding what’s going on.

In order to study, say, a particular collection of electrons, researchers have to be clever about it. They might take a box of electrons, poke at it in various ways, then take a snapshot of what it looks like at the end. In doing so, they hope to reconstruct the internal quantum dynamics at work.

But there’s a catch: They can’t measure all the system’s properties at the same time. So they iterate. They’ll start with their system, poke, then measure. Then they’ll do it again. Every iteration, they’ll measure some new set of properties. Build together enough snapshots, and machine learning algorithms can help reconstruct the full properties of the original system — or at least get really close.

This is a tedious process. But in theory, quantum computers could help. These machines, which work according to quantum rules, have the potential to be much better than ordinary computers at modeling the workings of quantum systems. They can also store information not in classic binary memory, but in a more complex form called quantum memory. This allows for far richer and more accurate descriptions of particles. It also means that the computer could keep multiple copies of a quantum state in its working memory.

[...] Now, two independent teams have come up with ways of getting by with far less quantum memory. In the first paper, Sitan Chen, a computer scientist at Harvard University, and his co-authors showed that just two copies of the quantum state could exponentially reduce the number of times you need to take a snapshot of your quantum system. Quantum memory, in other words, is almost always worth the investment.

“These two- or three-copy measurements, they’re more powerful than one might think,” said Richard Kueng, a computer scientist at Johannes Kepler University Linz in Austria.

[...] The combined results also speak to a more fundamental goal. For decades, the quantum computing community has been trying to establish quantum advantage — a task that quantum computers can do that a classical one would struggle with. Usually, researchers understand quantum advantage to mean that a quantum computer can do the task in far fewer steps.

The new papers show that quantum memory lets a quantum computer perform a task not necessarily with fewer steps, but with less data. As a result, researchers believe this in itself could be a way to prove quantum advantage. “It allows us to, in the more near term, already achieve that kind of quantum advantage,” said Hsin-Yuan Huang, a physicist at Google Quantum AI.

But researchers are excited about the practical benefits too, as the new results make it easier for researchers to understand complex quantum systems.

“We’re edging closer to things people would really want to measure in these physical systems,” said Jarrod McClean, a computer scientist at Google Quantum AI.


Original Submission

posted by hubie on Friday October 25 2024, @02:02AM   Printer-friendly
from the four-reallys-bad dept.

Arthur T Knackerbracket has processed the following story:

First came the nanny cams and home assistants, then came the security doorbells, now it's the age of the hacked vacuums.

First reported by ABC News Australia, owners of robot vacuums across multiple U.S. states experienced invasive hacking of their devices by individuals who took physical control of the cleaning bots and used their internal audio features to shout racial slurs at people in their homes. Owners first heard garbled voices coming from their devices, then noticed the vacuum's live feed camera and remote controls were turned on via the device's app.

All of the affected devices were manufactured by brand Ecovac, specifically the company's Deebot X2 model. The hack was confirmed to one customer after they filed a complaint through customer support.

Smart devices have long worried security experts and users for their potential vulnerabilities. In August, cyber security researchers uncovered multiple vulnerabilities in Ecovacs products (including lawn mowers) that could allow hackers to take control of microphones and cameras via mobile Bluetooth connections — to put it simply, researchers concluded the company's security was "really, really, really, really bad."

Design elements intended to protect users, like an audio alert that lets individuals know the vacuum's camera is on, could be easily switched off.


Original Submission

posted by hubie on Thursday October 24 2024, @09:17PM   Printer-friendly

Arthur T Knackerbracket has processed the following story:

Intel had a solution ready to add 64-bit features to the "classic" 32-bit x86 ISA, but the company chose to push forward with the Itanium operation instead. A new snippet of technology history has recently emerged from a year-old Quora discussion. Intel's former "chief x86 architect," Bob Colwell, provides a fascinating tidbit of previously unknown information.

AMD engineer Phil Park was researching the history behind the x86-64 transition, when he discovered the conversation. Colwell revealed that Intel had an inactive internal version of the x86-64 ISA embedded in Pentium 4 chips. The company's management forced the engineering team to "fuse off" the features.

The functionality was there, but users could not access it. Intel decided to focus on the 64-bit native architecture developed for Itanium instead of x86-64. The company felt that a 64-bit Pentium 4 would have damaged Itanium's chances to win the PC market. Management allegedly told Colwell "not once, but twice" to stop going on about 64-bits on x86 if he wanted to keep his job.

The engineer decided to compromise, leaving the logic gates related to x86-64 features "hidden" in the hardware design. Colwell bet that Intel would need to chase after AMD and quickly implement its version of the x86-64 ISA, and he was right. Itanium CPUs had no native backward compatibility with 16-bit and 32-bit x86 software, so the architecture was one of the worst commercial (and technology) failures in Intel's history.

[...] Bob Colwell made significant contributions to Intel's history, managing the development of popular PC CPUs such as Pentium Pro, Pentium II, Pentium III, and Pentium 4 before retiring in 2000. Meanwhile, today's x86 chips marketed by Intel and AMD still retain full backward hardware compatibility with nearly every program developed for the x86 architecture.


Original Submission

posted by hubie on Thursday October 24 2024, @04:30PM   Printer-friendly

Arthur T Knackerbracket has processed the following story:

A new concept from Hyundai's parts division, Hyundai Mobis, developed in partnership with optics specialists Zeiss, aims to transform your entire windshield into one massive display. Dubbed the "Holographic Windshield Display," it takes the modest head-up displays we've seen for decades and dramatically expands their scope.

Rather than just projecting basic information like speed or turn-based directions onto a small part of the windshield, this system envisions menus, apps, videos, and even games spanning the full width of the glass in front of you.

In the concept render shown, there's no central touchscreen – everything is displayed on the windshield. This suggests that voice and gesture controls will likely be the primary input methods, since you can't exactly reach out and touch your windshield.

Mobis describes the technology as "navigation and driving information unfolding like a panorama across the wide, transparent windshield" in its press release. Meanwhile, passengers could watch movies or video call friends, who appear as holograms on the glass.

To prevent distractions, what's displayed to the driver would differ from what passengers see. For example, the driver may only see directions and essential info, while passengers could binge-watch their favorite shows.


Original Submission

posted by hubie on Thursday October 24 2024, @11:47AM   Printer-friendly

Arthur T Knackerbracket has processed the following story:

Last week, the California Coastal Commission rejected a plan for SpaceX to launch up to 50 rockets this year at the Vandenberg Space Force Base in Santa Barbara County. The company responded yesterday with a lawsuit, alleging that the state agency's denial was overreaching its authority and discriminating against its CEO.

The Commission's goal is to protect California's coasts and beaches, as well as the animals living in them. The agency has control over private companies' requests to use the state coastline, but it can't deny activities by federal departments. The denied launch request was actually made by the US Space Force on behalf of SpaceX, asking that the company be allowed to launch 50 of its Falcon 9 rockets, up from 36.

While the commissioners did raise concerns about SpaceX CEO Elon Musk's political screed and the spotty safety records at his companies during their review of the launch request, the assessment focused on the relationship between SpaceX and Space Force. The Space Force case is that "because it is a customer of — and reliant on — SpaceX’s launches and satellite network, SpaceX launches are a federal agency activity," the Commission review stated. "However, this does not align with how federal agency activities are defined in the Coastal Zone Management Act’s regulations or the manner in the Commission has historically implemented those regulations." The California Coastal Commission claimed that at least 80 percent of the SpaceX rockets contain payloads for Musk's Starlink company rather than payloads for government clients.

The SpaceX suit filed with the Central District of California court is seeking an order to designate the launches as federal activity, which would cut the Commission's oversight out of its future launch plans.


Original Submission

posted by hubie on Thursday October 24 2024, @07:05AM   Printer-friendly
from the Qualcomm-Inside dept.

Arthur T Knackerbracket has processed the following story:

As Intel struggles with a falling stock price and revenue failing to meet expectations, there were reports last month that Qualcomm had approached Chipzilla with an acquisition offer.

According to people familiar with the matter who spoke to Bloomberg, Qualcomm has decided to wait until after the election before deciding its next move. Such a massive deal would undoubtedly face intense scrutiny from regulators, both domestic and globally. The company wants to see how the next administration's policies affect factors that could impact the acquisition, such as antitrust rules and US-China relations.

China is an important market for both Qualcomm and Intel. In the same month that it first approached Intel, Qualcomm met with antitrust regulators in China to gauge any potential response to the deal. The company hasn't received any feedback from Chinese authorities, who are apparently waiting to see if Qualcomm makes a formal offer for Intel.

In the US, where Intel is the key player in the government's plan to reignite the country's domestic chip manufacturing industry, White House support for the deal would be crucial.

Intel is set to become the biggest beneficiary of the Chips act, receiving $8.5 billion in grants as well as $11 billion in low-interest loans, provided it proceeds with its factory construction plans. It's been six months since the government announced the award and Intel is still waiting for the funding. Qualcomm has been in discussions with US regulators and believes that an all-American merger could alleviate any concerns, according to the report.


Original Submission

posted by Fnord666 on Thursday October 24 2024, @02:17AM   Printer-friendly
from the cool-stuff-or-freezing-air? dept.

Recent headlines have proclaimed that Chinese scientists have hacked "military-grade encryption" using quantum computers, sparking concern and speculation about the future of cybersecurity. The claims, largely stemming from a recent South China Morning Post article about a Chinese academic paper published in May, was picked up by many more serious publications.

However, a closer examination reveals that while Chinese researchers have made incremental advances in quantum computing, the news reports are a huge overstatement:

"Factoring a 50-bit number using a hybrid quantum-classical approach is a far cry from breaking 'military-grade encryption'," said Dr. Erik Garcell, Head of Technical Marketing at Classiq, a quantum algorithm design company.

While advancements have indeed been made, the progress represents incremental steps rather than a paradigm-shifting breakthrough that renders current cryptographic systems obsolete.

"This kind of overstatement does more harm than good," Dr. Garcell said. "Misrepresenting current capabilities as 'breaking military-grade encryption' is not just inaccurate—it's potentially damaging to the field's credibility."

Originally spotted on Schneier on Security. Dept. stolen from AC.

Previously: Chinese Researchers Claim Quantum Encryption Attack


Original Submission

posted by janrinok on Wednesday October 23 2024, @09:32PM   Printer-friendly
from the 2-3-5-7-11-13-17-19-23-29-... dept.

https://www.mersenne.org/primes/?press=M136279841

The Great Internet Mersenne Prime Search (GIMPS) has discovered the largest known prime number, 2136,279,841-1, having 41,024,320 decimal digits. Luke Durant, from San Jose, California, found the prime on October 12th.

The new prime number, also known as M136279841, is calculated by multiplying together 136,279,841 twos, and then subtracting 1. It is over 16 million digits larger than the previous record prime number, in a special class of extremely rare prime numbers known as Mersenne primes. It is only the 52nd known Mersenne prime ever discovered, each increasingly more difficult to find. Mersenne primes were named for the French monk Marin Mersenne, who studied these numbers more than 350 years ago. GIMPS, founded in 1996, has discovered the last 18 Mersenne primes. Volunteers download a free program to search for these primes, with a $3000 award offered to anyone lucky enough to find a new prime. Prof. Chris Caldwell founded an authoritative web site on the largest known primes which is now maintained by volunteers, and has an excellent history of Mersenne primes.


Original Submission

posted by janrinok on Wednesday October 23 2024, @04:46PM   Printer-friendly

Researchers cut to the chase on the physics of paper cuts:

If you have ever been on the receiving end of a paper cut, you will know how painful they can be.

[...] To find out why paper is so successful at cutting skin, Jensen and fellow DTU colleagues carried out over 50 experiments with a range of paper thicknesses to make incisions into a piece of gelatine at various angles.

Through these experiments and modelling, they discovered that paper cuts are a competition between slicing and "buckling". Thin paper with a thickness of about 30 microns, or 0.03 mm, doesn't cut so well because it buckles – a mechanical instability that happens when a slender object like paper is compressed. Once this occurs, the paper can no longer transfer force to the tissue, so is unable to cut.

Thick paper, with a thickness greater than around 200 microns, is also ineffective at making an incision. This is because it distributes the load over a greater area, resulting in only small indentations.

The team found, however, a paper cut "sweet spot" at around 65 microns and when the incision was made at an angle of about 20 degrees from the surface. This paper thickness just happens to be close to that of the paper used in print magazines, which goes some way to explain why it annoyingly happens so often.

[...] ensen notes that the findings are interesting for two reasons. "First, it's a new case of soft-on-soft interactions where the deformation of two objects intertwines in a non-trivial way," he says. "Traditional metal knives are much stiffer than biological tissues, while paper is still stiffer than skin but around 100 times weaker than steel."

The second is that it is a "great way" to teach students about forces given that the experiments are straightforward to do in the classroom. "Studying the physics of paper cuts has revealed a surprising potential use for paper in the digital age: not as a means of information dissemination and storage, but rather as a tool of destruction," the researchers write.

Journal Reference: Sif Fink Arnbjerg-Nielsen, Matthew D. Biviano, and Kaare H. Jensen, Competition between slicing and buckling underlies the erratic nature of paper cuts, Phys. Rev. E 110, 025003 – Published 23 August 2024 DOI: https://doi.org/10.1103/PhysRevE.110.025003


Original Submission

posted by hubie on Wednesday October 23 2024, @11:01AM   Printer-friendly
from the people-in-wood-skyscrapers-shouldn't-throw-woodpeckers dept.

Arthur T Knackerbracket has processed the following story:

A report by Knowable Magazine provides a rather insightful glimpse into the rise of mass timber and its benefits. The technique basically uses massive engineered wood elements instead of concrete and steel to build higher than ever before. As of 2024, mass timber buildings have climbed to almost unbelievable heights, with the 25-story Ascent tower in Milwaukee leading the pack.

The building is far from the only one in the category. The report states that there were 84 completed or under-construction mass timber buildings of eight stories or higher worldwide by 2022, with another 55 proposed. Europe dominates with 70% of these, but North America is catching up with around 20%.

As for what's driving this wooden renaissance, there are multiple reasons. For starters, mass timber could be an answer for reducing concrete and steel's massive carbon footprint, which alone makes up a whopping 15% of global emissions.

[...] But what about issues like raw strength and fire resistance, which have historically held wooden buildings back? Well, mass timber uses elements like cross-laminated timber (CLT) panels that can match steel's strength pound-for-pound, thanks to layering and high-pressure gluing techniques.

Modern mass timber also passes rigorous fire testing. In the event of a fire, a protective char layer forms on the wood's surface, insulating the interior from flames long enough for evacuation and firefighter response.

Likely taking these perks into account, a 2021 update to the International Building Code gave mass timber a huge vote of confidence, allowing such constructions up to 18 stories in many places.

Of course, moisture poses risks that need careful management to prevent fungus and pests. But proponents are confident mass timber can be a sustainable solution if done right.


Original Submission

posted by hubie on Wednesday October 23 2024, @06:18AM   Printer-friendly

Arthur T Knackerbracket has processed the following story:

A Chinese industry group has accused Intel of backdooring its CPUs, in addition to other questionable security practices while calling for an investigation into the chipmaker, claiming its products pose "serious risks to national security."

The Cybersecurity Association of China (CSAC), in a lengthy post on its WeChat account on Wednesday described Intel's chips as being riddled with vulnerabilities, adding that the American company's "major defects in product quality and security management show its extremely irresponsible attitude towards customers."

The CSAC also accused Intel of embedding a backdoor "in almost all" of its CPUs since 2008 as part of a "next-generation security defense system" developed by the US National Security Agency. 

This allowed Uncle Sam to "build an ideal monitoring environment where only the NSA is protected and everyone else is 'naked,'" the post continued. "This poses a huge security threat to the critical information infrastructure of countries around the world, including China," the industry group claims.

The infosec org also recommends the Cyberspace Administration of China open an investigation into the security of Intel's products sold in the country "to effectively safeguard China's national security and the legitimate rights and interests of Chinese consumers."

[...] The calls for a government investigation into the American chipmaker follow a series of accusations from the White House accusing Chinese spies of burrowing into US networks and critical infrastructure systems, all of which China has denied, and a proposed ban on Chinese connected vehicle technology.

[...] Intel this year inked deals with several Chinese state-linked agencies for its Xeon processors to be used in AI workloads, according to Reuters. Considering a little over a quarter of Intel's revenue last year came from China, a security review of its products — and potential restrictions — could be a major blow to its ongoing recovery efforts.


Original Submission

posted by hubie on Wednesday October 23 2024, @01:29AM   Printer-friendly

Arthur T Knackerbracket has processed the following story:

As exciting as genAI software might be, it also has side effects that we all need to be aware of. Since AI programs also offer human-like voice modes, it might be easy to have one of these AI models make calls for nefarious purposes.

One such scenario involves an AI impersonating a “very polite and professional” Google representative calling you from a spoofed number. The call is part of a hacker’s attempt to take over your Gmail account. The hack also involves creating fake Gmail recovery emails and fake support emails meant to further convince the victim they’re the target of an ongoing attack.

You might avoid falling prey to the attack if you’re tech-savvy enough. But unsuspecting Gmail users afraid that their account is in danger might end up giving the hacker their password by eventually “verifying” their Gmail account on a fraudulent site.

Sam Mitrovic was one of the targets of a Gmail account takeover hack. Luckily for him, he’s an experienced IT engineer who knew what to look for when prompted with the “evidence” that his account was in danger. He detailed his experience on his blog (via PCMag), explaining the simple steps you should take to reduce the risk of falling for the scam.

Initially, the engineer received a notification to approve a Gmail account recovery attempt that he ignored. Some 40 minutes later, he had a missed call with a “Google Sydney” caller ID.

Exactly a week later, the same thing happened. This was when he decided to pick up the call without realizing he might be talking to an AI made to sound like a human:

It’s an American voice, very polite and professional. The number is Australian.

He introduces himself and says that there is suspicious activity on my account.

He asks if I’m travelling, when I said no, he asks if I logged in from Germany to which I reply no.

He says that someone has had access to my account for a week and that they have downloaded the account data (I then get a flashback of the recovery notification a week before).

Tech-savvy or not, I’m sure this is the step when panic starts creeping in. Mitrovic asked the Google support person to send him an email. The voice said he would:

In the background, I can hear someone typing on the keyboard and throughout the call there is some background noise reminiscent of a call centre.

He tells me that he has sent the email. After a few moments, the email arrives and at a first glance the email looks legit – the sender is from a Google domain.

Thankfully for the IT specialist, he was careful enough to start checking things. While the phone number seemed legit, the email domain looked suspicious. It did not come from a Google server. That’s when he realized he must have been talking to an AI:

[...] The point of the whole thing is for the victim to eventually trust the Google rep and agree to verify their account. They would have probably clicked on a link taking them to a Google-like website. But it would have been a scam website meant to grab the password associated with the email account.

The engineer explains the “giveaways” that he was the target of a Gmail account takeover:

  1. I received account recovery notifications which I didn't initiate.
  2. Google doesn't call Gmail users if you don't have Google Business Profile connected.
  3. The email contained a To email address not connected to a Google domain.
  4. There were no other active sessions on my Google account apart from my own.
  5. Email headers showed how the email was spoofed.
  6. Reverse number search showed others who received the same scam call.

Original Submission