Join our Folding@Home team:
Main F@H site
Our team page
Support us: Subscribe Here
and buy SoylentNews Swag
We always have a place for talented people, visit the Get Involved section on the wiki to see how you can make SoylentNews better.
Arthur T Knackerbracket has processed the following story:
The digital break-in was discovered in June, according to Bloomberg, citing "two people familiar with the matter" who told the news outlet that the Singtel breach was "a test run by China for further hacks against US telecommunications companies."
In February, the feds and other nations' governments warned that the Beijing-backed crew had compromised "multiple" critical infrastructure orgs' IT networks in America and globally, and were "disruptive or destructive cyberattacks" against those targets.
Volt Typhoon's targets include communications, energy, transportation systems, and water and wastewater systems.
"Volt Typhoon's choice of targets and pattern of behavior is not consistent with traditional cyber espionage or intelligence gathering operations, and the US authoring agencies assess with high confidence that Volt Typhoon actors are pre-positioning themselves on IT networks to enable lateral movement to OT assets to disrupt functions," the US, Canada, UK, Australia, and New Zealand said at the time.
More recently, another Chinese-government-backed group Salt Typhoon was accused of breaking into US telecom companies' infrastructure. These intrusions came to light in October with the spies reportedly breaching Verizon, AT&T, and Lumen Technologies, although all three have thus far declined to comment to The Register about the hacks.
Salt Typhoon also reportedly targeted phones belonging to people affiliated with US Democratic presidential candidate Kamala Harris, along with Republican candidate Donald Trump and his running mate, JD Vance.
Arthur T Knackerbracket has processed the following story:
China's Volt Typhoon crew and its botnet are back, compromising old Cisco routers once again to break into critical infrastructure networks and kick off cyberattacks, according to security researchers.
The alert comes nearly ten months after the Feds claimed a victory against the Chinese government-linked miscreants, when the FBI infiltrated the operation and then remotely wiped the botnet.
At the time, the US Justice Department warned that Volt Typhoon had infected "hundreds" of outdated Cisco and Netgear boxes with malware so that the devices could be used to break into US energy, water, and other vital facilities. Plus, the crew had been targeting American critical organizations as far back as 2021.
Just last week, news reports emerged that the same cyber espionage crew had breached Singapore Telecommunications over the summer as a "test run by China for further hacks against US telecommunications companies."
"Once thought dismantled, Volt Typhoon has returned, more sophisticated and determined than ever," declared Ryan Sherstobitoff, SVP of threat research and intelligence at SecurityScorecard.
In a Tuesday report, Sherstobitoff revealed that the security shop's Threat Research, Intelligence, Knowledge, and Engagement (STRIKE) Team had spotted Volt Typhoon exploiting outdated Cisco RV320/325 routers and Netgear ProSafe routers.
"These end-of-life devices become perfect entry points, and in just 37 days, Volt Typhoon compromised 30 percent of visible Cisco RV320/325 routers," Sherstobitoff wrote.
When asked about specific vulnerabilities being abused, Sherstobitoff told The Register: "There are no clear CVEs that Volt is exploiting in current Cisco devices."
But, he added, because the routers are end-of-life, the vendor no longer issues security updates. "This leads to increased exploitation of existing ones," Sherstobitoff warned.
Since the disruption and subsequent rebuilding of the botnet, the threat hunters have seen "a few dozen" compromised devices, he told us. However, he noted, "we have observed changes in command and control servers being deployed into other network providers."
The FBI declined to comment on Volt Typhoon's reported resurgence, and the US government's Cybersecurity and Infrastructure Agency did not immediately response toThe Register's inquiries.
The Chinese crew's botnet first came to light in 2023, after Microsoft and intelligence agencies from the Five Eyes nations disclosed that Volt Typhoon had accessed networks belonging to US critical infrastructure organizations.
The spy gang, we're told, had built a botnet from Cisco and Netgear routers identified by a self-signed SSL certificate named JDYFJ. This botnet, according to SecurityScorecard, used command-and-control (C2) infrastructure in the Netherlands, Latvia, and Germany to disguise its malicious traffic.
By October 2023, Volt Typhoon had taken up occupancy, rent-free, on a compromised VPN device in New Caledonia. This created "a covert bridge between Asia-Pacific and the Americas" that kept "their network alive, hidden from standard detection," Sherstobitoff wrote.
In January 2024, the FBI-led effort disrupted some of Volt Typhoon's infrastructure. However, in the Tuesday report, Sherstobitoff explains the Chinese spies rapidly set up new C2 servers on Digital Ocean, Quadranet, and Vultr and also registered fresh SSL certificates to avoid the prying eyes of law enforcement.
As of September, "the botnet persists," he wrote. It uses the JDYFJ cluster to route traffic globally. "Connections from New Caledonia and router nodes remain active for over a month, reinforcing Volt Typhoon's infrastructure."
This report comes as government officials and private security firms alike have noted an uptick in Chinese cyber spy activity on US and global networks.
Last week, Bloomberg said Volt Typhoon had broken into Singtel's networks before being spotted in June, and had used a web shell in that security breach.
https://discuss.privacyguides.net/t/manjaro-is-experimenting-with-opt-out-telemetry/22305
Manjaro (a Linux distro) has requested feedback regarding their proposal to collect what they claim is 'anonymized' data.
We're currently testing a new open-source tool for Manjaro, that will help us with the development of Manjaro. It's called MDD 26 and it collects some anonymous and impersonal statistics about Manjaro systems.
One user has commented:
"This is a bit problematic, as they include a lot of info in those reports : all your machine hardware, timezeone, country, etc."
Another has also made his views clear:
... you have to get a individual permission and have to ask every single user independent, which is ending in a "license-agreement" similar to ms-windows. otherwise this application is a dead-horse that is violating all and especially the european-data-security-laws. this is something that you have to figure out with @philm and all the other responsible persons at manjaro.
Manjaro dismisses this claim without actually considering EU laws which do cover this very topic. Opt-Out is not permitted.
MDD - Opt-in vs Opt-out
- Testers needed: Manjaro Data Donor
https://forum.manjaro.org/t/testers-needed-manjaro-data-donor/170163/48
So, Soylentils, what is your view on this subject? Do you think system metrics are required for anyone producing a distro, even it the information is as anonymized as they claim it is? Or is this overstepping the mark?
Apple accused of trapping and ripping off 40m iCloud customers:
Apple accused of trapping and ripping off 40m iCloud customers
Consumer group Which? says the legal action - which it has launched - could result in a £3bn payout if it is successful, with the average customer getting around £70.
Apple has rejected the suggestion its practices are anti-competitive, saying users are not required to use iCloud. It said many customers rely on third-party alternatives, and insists it "works hard to make data transfer as easy as possible".
It is another example of the "growing tide of large class actions against big tech" which has "operated without sufficient constraint", Toby Starr from legal firm Humphries Kerstetter told the BBC.
Facebook, Google, gaming giant Steam and the UK's leading mobile providers are among the others facing legal claims at the same court, the Competition Appeal Tribunal.
"Although most of these claims are in their infancy and take a long time to resolve, there will be more decisions coming out over the next couple of years and there will be settlements - these will start to affect the tech giants' businesses," said Mr Starr.
Users of Apple products get a small amount of digital storage for free – and after that are encouraged to pay to use its iCloud service to back up photos, videos, messages, contacts and all the other content which lives on their device.
Prices for this storage range from £0.99 a month for 50GB of space to £54.99 a month for 12TB.
Apple does not allow rival storage services full access to its products.
It says that is for security reasons - but it also contributes to the company's enormous revenues.
Which? says over a period of nine years dating back to 2015 Apple has been effectively locking people into its services - and then overcharging them.
"By bringing this claim, Which? is showing big corporations like Apple that they cannot rip off UK consumers without facing repercussions," the body's chief executive Anabel Hoult said.
"Taking this legal action means we can help consumers to get the redress that they are owed, deter similar behaviour in the future and create a better, more competitive market."
Apple has strongly denied Which's accusations.
"We reject any suggestion that our iCloud practices are anti-competitive and will vigorously defend against any legal claim otherwise," it said in a statement.
The Guardian has announced it will no longer post content on Elon Musk's social media platform, X, from its official accounts.
In an announcement to readers, the news organisation said it considered the benefits of being on the platform formerly called Twitter were now outweighed by the negatives, citing the "often disturbing content" found on it.
"We wanted to let readers know that we will no longer post on any official Guardian editorial accounts on the social media site X," the Guardian said.
...
Responding to the announcement, Musk posted on X that the Guardian was "irrelevant" and a "laboriously vile propaganda machine".Last year National Public Radio (NPR), the non-profit US media organisation, stopped posting on X after the social media platform labelled it as "state-affiliated media". PBS, a US public TV broadcaster, suspended its posts for the same reason.
This month the Berlin film festival said it was quitting X, without citing an official reason, and last month the North Wales police force said it had stopped using X because it was "no longer consistent with our values".
In August the Royal National orthopaedic hospital said it was leaving X, citing an "increased volume of hate speech and abusive commentary" on the platform.
New Elliptic Curve Breaks 18-Year-Old Record:
In August, a pair of mathematicians discovered an exotic, record-breaking curve. In doing so, they tapped into a major open question about one of the oldest and most fundamental kinds of equations in mathematics.
Elliptic curves, which date back to at least ancient Greece, are central to many areas of study. They have a rich underlying structure that mathematicians have used to develop powerful techniques and theories. They were instrumental in Andrew Wiles' famous proof of Fermat's Last Theorem in 1994, at the time one of the most important unsolved problems in number theory. And they play a key role in modern cryptography.
Yet mathematicians still can't answer some of the most basic questions about them. For example, they often try to characterize elliptic curves by studying the special "rational points" that live on them. On a given curve, these points form clear and meaningful patterns. But it's not yet known whether there's a limit to how varied and complicated these patterns can get.
Answering this question would allow mathematicians to make sense of the vast and diverse world of elliptic curves, much of which remains uncharted. So they've set out to explore the outer fringes of that world, hunting down outlier curves with stranger and stranger patterns. It's a painstaking process, requiring both creativity and sophisticated computer programs.
Now, two mathematicians — Noam Elkies of Harvard University and Zev Klagsbrun of the Center for Communications Research in La Jolla, California — have found an elliptic curve with the most complicated pattern of rational points to date, breaking an 18-year-old record. "It was a big question whether this barrier could be broken," said Andrej Dujella of the University of Zagreb in Croatia. "It's a very exciting result for all of us working and interested in elliptic curves."
The discovery lays bare an ongoing debate over what mathematicians think they know about elliptic curves.
Elliptic curves don't appear particularly exotic. They're just equations of the form y2 = x3 + Ax + B, where A and B are rational numbers (any number that can be written as a fraction). When you graph the solutions to these equations, they look like this:
Mathematicians are particularly interested in a given elliptic curve's rational solutions — points on the curve whose x– and y-values are both rational numbers. "It's literally one of the oldest math problems in the history of humanity," said Jennifer Park of Ohio State University.
While it's relatively straightforward to find rational solutions to simpler types of equations, elliptic curves are "the first class of equations where there are really a lot of open questions," said Joseph Silverman of Brown University. "It's just two variables in a cubic equation, and that's already complicated enough."
To get a handle on the rational solutions of an elliptic curve, mathematicians often turn to the curve's rank, a number that measures how closely packed the rational points are along the curve. A rank 0 elliptic curve has only a finite number of rational points. A rank 1 elliptic curve has infinitely many rational points, but all of them line up in a simple pattern, so that if you know one, you can follow a well-known procedure to find the rest.
Higher-rank elliptic curves also have infinitely many rational points, but these points have more complicated relationships to each other. For example, if you know one rational solution of a rank 2 elliptic curve, you can use the same procedure you used in the rank 1 case to find a whole family of rational points. But the curve also has a second family of rational points.
The rank of an elliptic curve tells mathematicians how many "independent" points — points from different families — they need in order to define its set of rational solutions. The higher the rank, the richer in rational points the curve will be. A rank 2 and a rank 3 curve both have infinitely many rational solutions, but the rank 3 curve packs in rational points from an additional family, meaning that on average, a given stretch of it will contain more of them.
Almost all elliptic curves are known to be either rank 0 or rank 1. But there are still infinitely many oddballs with higher rank — and they're exceedingly difficult to find.
As a result, mathematicians aren't sure if there's a limit to how high the rank can get. For a while, most experts thought it was theoretically possible to construct a curve of any rank. Recent evidence suggests otherwise. Without a proof either way, mathematicians are left to debate the true nature of elliptic curves, illustrating just how much they have yet to understand about these equations.
Elkies, a prominent number theorist, didn't intend to break rank records. In the mid-2000s, he was studying seemingly unrelated objects called K3 surfaces. To understand them, he sliced them up and looked at the pieces.
Imagine starting with a simple surface, a flat plane. You can slice it into infinitely many straight lines, laid side by side. Depending on how you make your slices, the lines you end up with will be defined by different equations.
Similarly, there are more complicated, curvy surfaces that, when sliced up, yield infinitely many elliptic curves. Mathematicians have been using these surfaces to find higher-rank elliptic curves since the 1950s.
Elkies realized that his K3 surfaces were strange enough to give him access to even more exotic curves. In 2006, he sliced a particular K3 surface in just the right way and found among the slices an elliptic curve that he could show had a rank of at least 28 — beating the previous record of 24. It was an exciting moment for elliptic curve experts, who believed an explosion of record breakers might follow.
Instead, nothing happened. Elkies' record stood for nearly two decades — a noticeable departure from the relatively steady record-setting rate that mathematicians had enjoyed since the 1970s.
Was it perhaps a sign that rank could be limited after all — that the hunters were beginning to close in on their last few prey? Or was it just a reflection of the difficulty of the task?
When Elkies announced his discovery in 2006, Zev Klagsbrun was an undergraduate student at Queens College in New York. One of his professors, who had competed against Elkies in a high school math competition in the 1980s — Elkies won — told him about the new record-breaking curve during office hours.
Klagsbrun was intrigued. Years later, he returned to the result, proving that so long as a widely believed conjecture is true, Elkies' curve has a rank of precisely 28. So when he ran into Elkies at a conference in 2019, he saw an opportunity to push the result even further. Though a bit intimidated — "It's difficult to keep up with him," Klagsbrun said — he convinced Elkies to return to the search for new curves.
"I was like, 'Hey, I've got access to some computing power. I'm willing to write fast code. Search with me! Show me your secrets!'" Klagsbrun said.
They went back to Elkies' K3 surface. Eighteen years earlier, he had sliced it up in a way that gave him a pile of infinitely many curves. These curves were already quite exotic, but he could only guarantee that they had a rank of at least 17. He still needed an outlier to break the record of 24. Since he couldn't just calculate the rank of every curve in his pile, he used a well-known computational method to determine which among millions of them seemed most likely to have an anomalously high rank. He then calculated those ranks by hand, one by one, until he found his rank 28 winner.
Klagsbrun could now offer a faster computational method for sifting through the contenders. While Elkies had only been able to look through millions of curves, Klagsbrun could handle tens of trillions.
This wider search unearthed many curves in Elkies' old pile that exhibited some unusual properties, but none of them broke his 2006 record. The pair decided to move on.
Four years passed. Then, a few months ago, Elkies and Klagsbrun crossed paths once more at a conference and got to talking.
They set out to slice the K3 surface in a different way, getting a new pile of curves to work with. But there were hundreds of ways they could slice it, and most of those slicing methods seemed unlikely to produce the curve they sought.
Then, entirely by accident, they found a slicing method that, like Elkies' previous one, gave them a pile of curves, all guaranteed to have a rank of at least 17. It seemed more likely than the other approaches to contain a hidden gem. Sure enough, using Klagsbrun's more powerful computational technique, they found within that pile an elliptic curve with a rank of at least 29. This elliptic curve has the most complicated set of rational solutions ever seen: Mathematicians need at least 29 independent points to characterize them.
The curve's equation, when written as y2 = x3 + Ax + B, has values of A and B that are each over 60 digits long. The 29 independent rational solutions that Elkies and Klagsbrun pinpointed involve numbers that are similarly huge.
I know many Soylentils are sick of AI, but I found this to be clever and actually doing something useful:
The Best Use of AI Ever: A 'Grandma' Built To Waste Telescammers' Time
https://decrypt.co/291711/the-best-use-of-ai-ever-a-grandma-built-to-waste-telescammers-time
British telecom giant O2 announced what could be the first deployment of conversational AI specifically designed to counter telephone fraud in the UK telecommunications sector.
The hero: a clueless grandma who endlessly and frustratingly digresses while idiot scammers attempt to hoodwink her out of money.
The system, dubbed "Daisy," uses AI models to snare fraudsters in meandering conversations lasting up to 40 minutes, potentially preventing millions in losses across the network's 24 million mobile customers. The tool operates autonomously around the clock, requiring no human intervention to maintain conversations with suspected scammers.
"Stop calling me dear, you stupid [expletive deleted]!" one exasperated tele-scammer shouted in a video O2 aired to show off its new tool.
"Got it, dear!" the kindly AI grandma replied.
Here's how it works. When a user receives a scam call, they forward the call to the number 7726, which had been used as a hotline to report fraud. From there, Daisy employs a custom large language model with a "personality layer" that generates real-time responses to the scammers.
The system transcribes incoming voice to text, processes it through the AI model so responses are context-relevant, and converts the text output back to speech, creating natural-sounding conversations that can include fictional personal details and bank information.
It's designed to exploit fraudsters' targeting of elderly victims by presenting as a chatty grandmother, complete with meandering stories about family and knitting.
Arthur T Knackerbracket has processed the following story:
Digital software locks have just become flimsier in Canada with the passage of a pair of laws allowing for their bypass for repair and interoperability purposes.
Royal assent was granted to two right to repair bills last week that amend Canada's Copyright Act to allow the circumvention of technological protection measures (TPMs) if this is done for the purposes of "maintaining or repairing a product, including any related diagnosing," and "to make the program or a device in which it is embedded interoperable with any other computer program, device or component."
The pair of bills allow device owners to not only repair their own stuff regardless of how a program is written to prevent such non-OEM measures, but said owners can also make their devices work with third-party components without needing to go through the manufacturer to do so.
[...] TPMs can take a number of forms, from simple administrative passwords to encryption, registration keys, or even the need for a physical object like a USB dongle to unlock access to copyrighted components of a device's software. Most commercially manufactured devices with proprietary embedded software include some form of TPM, and neither C-244 nor C-294 place any restrictions on the use of such measures by manufacturers.
As iFixit points out, neither Copyright Act amendments do anything to expand access to the tools needed to circumvent TPMs. That puts Canadians in a similar position to US repair advocates, who in 2021 saw the US Copyright Office loosen DMCA restrictions to allow limited repairs of some devices despite TPMs, but without allowing access to the tools needed to do so.
[...] "While it's now legal to circumvent the digital locks on these machines, the ruling does not allow us to share or distribute the tools necessary to do so," iFixit director of sustainability Elizabeth Chamberlain said last month. "The ruling doesn't change the underlying statute making it illegal to share or sell tools that bypass software locks. This leaves most of the repair work inaccessible to the average person, since the technical barriers remain high."
Pizza Hut has melded the disparate worlds of bready, cheesy foodstuffs and console gaming with the new PIZZAWRMR. This innovation is designed to sit atop your Sony PlayStation 5 console and keep your takeaway of choice piping hot while you enjoy your heated gaming session. This isn't a new retail product or a giveaway, though. Pizza Hut Canada has made the 3D printing source files free for anyone who signs up to download, modify, and print.
The PIZZAWRMR design is inspired by the pizza-centric restaurant's red roof. The lid opens laptop-style for convenient pizza slice access. According to Pizza Hut, several slices of pizza can fit into the top box. Diagrams show that the hot exhaust from the console is channeled under and into the pizza area, which is the appliance of "science and engineering for the greater good," says the Pizza Hut marketing team.
It's that time of the year again. A compilation of the most common passwords. Nothing has changed. No lessons have been learned. Either people don't care or they, still, just doesn't know any better.
There is the common list but it can also be shown on a per country level. It doesn't really make it better. Idiocy is evenly spread across the lands.
It's our sixth year—this time, in collaboration with NordStellar—analyzing people's password habits, and guess what? They're still really bad.
And we're not just talking about personal passwords here. This time, we also put together a list of the most common corporate passwords to see how they compare to those used in everyday life.
So, check out all the dishonorable winners on both lists and learn what the latest trends are.
https://nordpass.com/most-common-passwords-list/
President-elect Donald Trump today announced that a new Department of Government Efficiency—or "DOGE"—will be led by Elon Musk and former Republican presidential candidate Vivek Ramaswamy.
[...] DOGE apparently will not be an official federal agency, as Trump said it will provide advice "from outside" of government. But Musk, who has frequently criticized government subsidies despite seeking public money and obtaining various subsidies for his own companies, will apparently have significant influence over spending in the Trump administration.
[...] Trump's statement said the department, whose name is a reference to the Doge meme, "will drive out the massive waste and fraud which exists throughout our annual $6.5 Trillion Dollars of Government Spending." Trump said DOGE will "liberate our Economy" and that its "work will conclude no later than July 4, 2026" because "a smaller Government, with more efficiency and less bureaucracy, will be the perfect gift to America on the 250th Anniversary of The Declaration of Independence."
[...] The Wall Street Journal wrote today that "Musk isn't expected to become an official government employee, meaning he likely wouldn't be required to divest from his business empire."
Obligatory SolyentNews Articles:
Elon Musk Reveals Real Reason He Supports Dogecoin, Says Many People at Tesla and Spacex Own DOGE - 20211030
Dogecoin: Inside the Joke Cryptocurrency That Somehow Became Real - 20210222
Hacker Exploits Synology NAS Box Vulnerabity, Mines $620k in Dogecoin - 20140620
https://apnews.com/article/onion-buys-infowars-alex-jones-6496f198d141c991087dcd937b3588e9
https://theonion.com/heres-why-i-decided-to-buy-infowars/
Make no mistake: This is a coup for our company and a well-deserved victory for multinational elites the world over.
The Onion won the bidding for Alex Jones' Infowars at a bankruptcy auction. Plans to turn the site into a parody and satire site. It will probably be hard to tell apart from the old site then?
One assumes there is a large overlap of readers between the two. People with a strained connection to reality.
The Onion buys InfoWars in bankruptcy auction - NewsBreak:
The satirical website The Onion purchased InfoWars on Thursday, a capstone on years of litigation and bankruptcy proceedings following InfoWars founder Alex Jones' defamation of families associated with the Sandy Hook Elementary School massacre.
Those families backed The Onion's bid to purchase InfoWars' intellectual property, including its website, customer lists and inventory, certain social media accounts and the production equipment used to put Jones on the air. The Connecticut families agreed to forgo a portion of their recovery to increase the overall value of The Onion's bid, enabling its success.
MORE: Alex Jones still must pay $1B judgment: Judge
The families said the purchase would put an end to Jones' misinformation campaign.
"We were told this outcome would be nearly impossible, but we are no strangers to impossible fights. The world needs to see that having a platform does not mean you are above accountability -- the dissolution of Alex Jones' assets and the death of Infowars is the justice we have long awaited and fought for," said Robbie Parker, whose daughter Emilie was killed in the Sandy Hook shooting.
In 2022, the families that brought the case against Jones in Connecticut secured a $1.4 billion verdict in their defamation lawsuit. A Texas bankruptcy court ruled on the liquidation of Jones' assets in June of this year, handing over control to an independent trustee tasked with selling them off to generate the greatest possible value for the families.
"From day one, these families have fought against all odds to bring true accountability to Alex Jones and his corrupt business. Our clients knew that true accountability meant an end to Infowars and an end to Jones' ability to spread lies, pain and fear at scale. After surviving unimaginable loss with courage and integrity, they rejected Jones' hollow offers for allegedly more money if they would only let him stay on the air because doing so would have put other families in harm's way," said Chris Mattei, attorney for the Connecticut plaintiffs and partner at Koskoff Koskoff & Bieder.
Jones had filed for bankruptcy last year in a bid to avoid paying the billion-dollar judgment, but a judge ruled he still had to settle with the Sandy Hook families.
Bankruptcy often staves off legal judgments but not if they are the result of willful and malicious injury. U.S. Bankruptcy Court Judge Christopher Lopez in Houston decided that standard was satisfied in Jones' case.
"[I]n Jones's case, the language of the jury instruction confirms that the damages awarded flow from the allegation of intent to harm the Plaintiffs – not allegations of recklessness," Lopez wrote in his ruling.
Jones had claimed on his InfoWars show that the shooting at Sandy Hook Elementary School -- which killed 26 people, including 20 elementary students -- was performed by actors following a script written by government officials to bolster the push for gun control.
From the source: Here's Why I Decided To Buy 'InfoWars'
canopic jug [onion-not-the-onion] writes:
—Here's Why I Decided To Buy 'InfoWars', The Onion.
—The Onion wins auction for Alex Jones' media company, NPR.
—Satirical news site The Onion buys Alex Jones' Infowars with help from Sandy Hook families, Voice of America.
—The Onion buys Alex Jones' Infowars with help from Sandy Hook families, The Associated Press.
After almost 2 years and a lot of hard work by many people, we have finally achieved what we set out to do. On Wednesday, the Linode servers were decommissioned, and the site is now completely independent and running on its own hardware. All the site data and the domains belong to the community - yes, you own this site.
It could not have been possible without the dedication of quite a few people - some of whom have not made it to today. It wasn't pleasant and it wasn't easy. There were numerous meetings to create a new set of Bylaws. That in itself took many months of often acrimonious debate. Everyone wanted the same end, but they were not happy with how it was being achieved. In the end, as is always the case, it required a lot of compromise, and it meant we needed to say goodbye to the old way of doing things. So to all of those who participated in those meetings: mechanicjay, AudioGuy, Deucalion, Fnord666, MartyB, Separatrix, cmn32480, kolie, hubie, mrpg, requerdanos, fab23, chromas, fliptop, dx3bydt3, tedious, cosurgi, Runaway1956, and even aristarchus, and many that I have probably missed out, a huge thank you from me. And if I have missed you out then that is entirely my fault and I apologise!
The Bylaws dictate how the business will be managed. They do not contain any rules about how the site will be used, or what is permitted in submissions or discussions and what is not, or any of those things that tend to interest the community. But there are some unique differences in our Bylaws from those previously. The Board (which I will get to in a moment) manage this site on your behalf. While they handle routine matters as appropriate to their post, many actions require them to seek the agreement of the community. You will have a say in major decisions. After all, you own the site. The data cannot be used for any purpose other than maintaining this site without a majority decision of the community.
So having created the Bylaws, we could apply to create a company. This was necessary so that the new company (Soylent Phoenix) could receive whatever assets the original company (SoylentNews PBC) was prepared to transfer. For legal reasons, the Board members cannot be anonymous; they have to sign various pieces of legal documentation to create the company. So I asked for volunteers from the community. More than we needed stepped forward and so the business was created. The Chairman of the Board is OregonJohn (6105), the Treasurer is Dale (539) (and he is actually a qualified accountant!), and the Secretary is holeinone (17639). They have also been working hard on your behalf setting up the company, creating Stripe accounts, managing the current funds, and filling in the paperwork that is associated with a business. Technically the Board is a temporary one because they do not yet have the approval of the community. But that is built into the Bylaws, and it allows us to keep moving forward until their posts are confirmed by the community, or challenged by someone else who believes they should be allowed to do the job.
Next came the transfer of assets. Like all things this did not go as smoothly as everyone had hoped it would. Quite understandably, it was necessary for everything to be accountable and legal, and to look after everyone's interests. Again, it was only by having some tough discussions and making compromises on both sides that anything has actually been achieved. So another thank-you to NCommander and Matt Angel. I think we have a solution which, while not meeting all of our initial dreams, is one that we can live with for the future. The site never squandered money and there is nothing to suggest that your donations have been misused.
You will probably now all be aware that two people have donated hardware and a data connection at no cost to the site. Those people are kolie and fliptop, and they have my sincere thanks. Kolie's server is the one that you are using at the moment to read this Meta. In fact, it is handling all of the site including email, IRC, DNS, Varnish, the database, etc. etc. Fliptop's server is currently an off-site backup for our data but will probably require a bit of expansion before it will cope with the full Docker installation. You will also be aware that, over the recent weeks and months, kolie has built the entire software infrastructure into Docker containers, moving each function one by one from the Linode servers and incrementally adding it to our own hardware. He has put many man hours into this task and I for one have enjoyed working with him - although my contribution has been considerably less than his! Again, I offer my grateful thanks.
Finally, none of this would have been possible without the community being tolerant and understanding as we have encountered each unexpected obstacle. The community has, in fact, grown slightly in the last 2 years, but it remains at roughly 10% of what it once was. I thank you all for making this possible. Welcome to your site.
And now for something completely different....
To provide the community with more visibility regarding the actions of staff and the reason and justification for those actions, we have created 3 posts which will act as Community Representatives. Their prime role is to provide the community with the assurance that management is behaving responsibly and within the rules governing the site, and for the community to have a focus when they have concerns regarding what is going on behind the 'curtains'. They will act as your voice in discussions and decisions. They will have full access to staff discussions but will only have limited access, and then only when absolutely necessary, to the data stored in the database. We have had 3 volunteers for these posts for many months, but I will provide more details once I have confirmed that they are still volunteering for the role, and when we have hammered out the working procedures that must be adopted for this system to function correctly.
We now have TOR up and running again - we had it quite a few years ago and then it disappeared. Eventually, the link will be in the SoylentNews side panel on your screen, but for now it is cut and paste:
http://soylentqarvi3ikkzpp7fn4m5pxeeonbv6kr4akgkczqethjfhmalhid.onion
As I mentioned earlier, technically the current board is temporary. If you wish to stand for a post then you may do so. We will be asking for nominations in the near future. However, remember that you cannot remain anonymous as your name has to be recorded on the official business records.
We will provide you with a Meta page should you wish to explain to the community why you believe that they should vote for you. The method of voting will be 1 vote per active account, which must be in good standing (i.e. meet a minimum karma level and not be currently banned). The software that will be used is still under consideration as the original voting software was written and operated by audioguy who is not currently taking an active part in the site management.
You cannot nominate someone else for a post. They have to put themselves forward as a candidate. You can of course vote for them should they do so.
Accounts that have been dormant for over 5 years quickly attract attention when they suddenly re-appear. In recent years we have seen attempts to resurrect old accounts, sometimes by people other than the original owner. There is an option built in to Rehash which is named "Force User to Verify Account" (FUVA) and it appears on the user's administration page. It simply resets the password and sends the new password to the email address that we hold for that account in the database. The account holder can then reset the password to something of their own choosing and everything works as it should. Currently, it is invoked automatically after the 5-year point if the account becomes active again. About a week ago the "realDonaldTrump" (rDT) account suddenly sprang back into life, having been dormant since 2019, and for the most part it was welcomed by the community. However, by making a comment the FUVA triggered.
I think that the account holder has either forgotten how to access his email or the email address has lapsed for some other reason. So the account is now stuck in limbo. Without a working email contact we cannot send the new password to the account holder. I do NOT want to know who the account owner is. However, they must provide a working email address, which can be a temporary or throw-away address, and they must provide sufficient detail about the account to prove that they are the true account owners. The site can be reactivated as a parody account which will have specific restrictions associated with it.
Although the site is now independent and 'under new management' there is still much that remains to be done.
Over the last week or two the level of spamming and abuse has significantly reduced. However, the reasons for this are unclear, and it might not indicate a permanent or even long-lasting change. If the low level continues for a significant period (certainly into the New Year) then it might be possible to re-admit ACs to the whole site again. This is something that is we all want to see, and it would be a welcome enhancement to the site. However, it depends entirely on those few individuals who account for the vast majority of the spam and abuse.
If ACs are allowed back onto the full site then any permanent return is entirely dependent on the spamming remaining at a very low level, and for personal attacks to be rare events.
Withdrawn - It didn't even last until we got this Meta out. JR
Bluesky adds 700,000 new members as users flee X after the US election
Bluesky adds 700,000 new members as users flee X after the US election
Social media platform has become a 'refuge' from the far-right activism on X, experts say, after Elon Musk teamed up with Donald Trump
Luca Ittimani
Tue 12 Nov 2024 13.44 AEDTSocial media platform Bluesky has picked up more than 700,000 new users in the week since the US election, as users seek to escape misinformation and offensive posts on X.
The influx, largely from North America and the UK, has helped Bluesky reach 14.5 million users worldwide, up from 9 million in September, the company said.
Social media researcher Axel Bruns said the platform offered an alternative to X, formerly Twitter, including a more effective system for blocking or suspending problematic accounts and policing harmful behaviour.
...
"It's become a refuge for people who want to have the kind of social media experience that Twitter used to provide, but without all the far-right activism, the misinformation, the hate speech, the bots and everything else," he said.
...
The platform has previously benefited from dissatisfaction with X and its billionaire owner, Elon Musk, who is closely tied to US president-elect Donald Trump's successful election campaign. Twitter shed millions of users after rebranding to X and usage in the US slumped by more than a fifth in the subsequent seven months.Bluesky reported picking up 3 million new users in the week after X was suspended in Brazil in September and a further 1.2 million in the two days after X announced it would allow users to view posts from people who had blocked them.
Bluesky is a decentralized microblogging social networking service primarily operated by Bluesky Social, PBC. It was created as a proof of concept for the AT Protocol, a communication protocol for decentralized social networks. The platform is analogous to Twitter, where users can share short text posts, images, and video, and can like, repost, or reply to any given post. Bluesky Social claims the social app was "designed to not be controlled by a single company" through the use of the AT Protocol as its foundation. Bluesky Social promotes a composable user experience and algorithmic choice as core features of Bluesky, offering a "marketplace of algorithms" where users can choose or create feeds to customize their experience. Bluesky offers a DNS-based domain name handle system through the AT Protocol, allowing users to verify an account's legitimacy and identity after signing up by proving ownership of a domain name without involving Bluesky Social in the verification process.
Bluesky was originally created as a research initiative in 2019 by then-Twitter CEO Jack Dorsey to investigate the possibility of decentralizing the platform. This initiative resulted in the hiring of Jay Graber in August 2021 to lead the Bluesky project and what is now the AT Protocol, with initial funding provided by Twitter. After the acquisition of Twitter by Elon Musk, Twitter severed all legal and financial ties with Bluesky Social. This led to the rapid development of the Bluesky social app and the AT Protocol as a minimum viable product, initially launching as an invite-only beta. The social app opened registrations to the general public in February 2024. Bluesky is considered a major competitor to Twitter following the acquisition of the platform by Elon Musk, alongside Threads and Mastodon
The history of Heathkit, part 1 and part 2
If you came of age in the 1960s or 1970s and then later became an EE, chances are you're more than casually acquainted with Heathkit. Many engineers started their budding careers by building one or more kits made by the Heath Company. I certainly did. When I stumbled across a brief interview with Chas Gilmore, who joined the Heath Company in 1966 as a design engineer and worked at the Heath Company on and off for more than two decades, eventually becoming VP of product development, marketing, and sales, I knew I needed to interview him.
Teenage me built a shortwave radio and a HAM transmitter for myself, and a TV for a neighbor.
Arthur T Knackerbracket has processed the following story:
The funding is part of a total of €380m and falls under the Chips Joint Undertaking.
The European Union is set to invest €133m in production facilities for photonic semiconductors in the Netherlands.
The PIXEurope consortium, which consists of parties from 11 countries including the Netherlands, has been selected for contract negotiations to develop a European pilot plant for photonic chips.
It follows one month after Italy-based start-up Ephos had raised $8.5m to create glass-based photonic chips at scale.
Photonic semiconductors use light rather than electrons to perform calculations, with advantages in speed and power consumption. As a result, this makes them ideal for use in areas such as data centres and also in motoring.
[...] The investment forms part of a total amount of €380m aimed at setting up pilot photonic semiconductor production plants throughout Europe, under the Chips Joint Undertaking, which centres around a European public-private partnership to promote research and development in the semiconductor industry.
Work on the Dutch facilities is expected to start in 2025, and will be led by the universities of Eindhoven and Twente, in association with the Dutch knowledge institute TNO.
Europe has been making a concerted effort over the past few years to be a leader in the semiconductor space. In 2023, the region adopted the EU Chips Act, which aims to increase the EU’s share of global chip production from 10pc to at least 20pc by the end of the decade.