Join our Folding@Home team:
Main F@H site
Our team page
Support us: Subscribe Here
and buy SoylentNews Swag
We always have a place for talented people, visit the Get Involved section on the wiki to see how you can make SoylentNews better.
Arthur T Knackerbracket has processed the following story:
The Information Technology Organization of Iran (ITOI), the government body that develops and implements IT services for the country, is looking for suppliers of cloud computing.
The org[anisation] recently posted a notification of its desire to evaluate, grade, and rank cloud players to assess their suitability to host government services.
At the end of the exercise, the organization hopes to have a panel of at least three cloud operators capable of handling government services.
The government agency will base its assessments on compliance with standards such as ISO 27017 and ISO 27018, which define controls for secure cloud computing and protection of personally identifiable information.
ITOI also expects companies that participate in its evaluation to be compliant with the NIST SP 800-145 definition of cloud computing.
Yes, Iran recognizes that NIST – the USA’s National Institute of Standards and Technology – despite regarding America as a trenchant enemy.
ITOI has cast the net wide, by seeking cloud operators with the capacity to deliver IaaS, PaaS, or SaaS. Service providers that deliver private, public, hybrid or community clouds are also welcome, as are service providers who specialize in security, monitoring, support services, or cloud migration.
Organizations that pass ITOI’s tests will earn a “cloud service rating certificate” that makes them eligible for inclusion on a list of authorized cloud services providers.
https://lists.archlinux.org/archives/list/aur-general@lists.archlinux.org/thread/7EZTJXLIAQLARQNTMEW2HBWZYE626IFJ/
https://archive.ph/jwPRg
On the 16th of July, at around 8pm UTC+2, a malicious AUR package was
uploaded to the AUR. Two other malicious packages were uploaded by the
same user a few hours later. These packages were installing a script
coming from the same GitHub repository that was identified as a Remote
Access Trojan (RAT).The affected malicious packages are:
- librewolf-fix-bin
- firefox-patch-bin
- zen-browser-patched-binThe Arch Linux team addressed the issue as soon as they became aware of
the situation. As of today, 18th of July, at around 6pm UTC+2, the
offending packages have been deleted from the AUR.We strongly encourage users that may have installed one of these
packages to remove them from their system and to take the necessary
measures in order to ensure they were not compromised.
/r/linux Discussion: http://old.reddit.com/r/linux/comments/1m3wodv/malware_found_in_the_aur/
/r/archlinux Discussion: https://old.reddit.com/r/archlinux/comments/1m387c5/aurgeneral_security_firefoxpatchbin/
https://distrowatch.com/dwres.php?resource=showheadline&story=20030
Clear Linux is a rolling release, highly optimized distribution developed by Intel. Or, it is now more accurate to say it "was", since Intel has decided to abruptly discontinue the project. Just one day after the project's latest snapshot, the following announcement was published on the distribution's forum: "Effective immediately, Intel will no longer provide security patches, updates, or maintenance for Clear Linux OS, and the Clear Linux OS GitHub repository will be archived in read-only mode. So, if you're currently using Clear Linux OS, we strongly recommend planning your migration to another actively maintained Linux distribution as soon as possible to ensure ongoing security and stability."
An Anonymous Coward writes:
Microsoft's Copilot finally comes into its own with new AI features like Recall
Buy any new Windows PC and you might notice an unfamiliar key: the Copilot key. Launched in January, it promised quick access to Microsoft's AI Copilot. Yet features were limited, causing critics to wonder: Is this it?
Microsoft Build 2024, the company's annual developer conference, had a reply: No. On 20 May, the company revealed Copilot+ PCs, a new class of Windows computers that exclusively use Qualcomm chips (for now, at least) to power a host of AI features that run on-device. Copilot+ PCs can quickly recall tasks you've completed on the PC, refine simple sketches in Paint, and translate languages in a real-time video call. Microsoft's Surface Laptop and Surface Pro will showcase these features, but they're joined by Copilot+ PCs from multiple laptop partners including Acer, Asus, Dell, HP, Lenovo, and Samsung.
"We wanted to put the best foot forward," said Brett Ostrum, corporate vice president of Surface devices at Microsoft. "When we started this journey, the goal was that Surface was going to ship relevant volumes on [Qualcomm] silicon. And people need to love it."
Windows' Recall is a new way to search
Microsoft revealed several AI features at Build 2024, but the highlight was Recall. Similar to Rewind, an app for the Mac I tried in December 2023, Recall can help Windows users find anything they've seen, heard, or opened on their PC. This includes files, documents, and apps, but also images, videos, and audio. Recall defaults to a scrollable timeline, which is broken up into discrete events detected by Recall, but users can also browse with semantic text search.
It's a simple feature to use, but its implications are vast. If Recall works as advertised, it could fundamentally change how people interact with Windows PCs. There's arguably little need to organize photos from a vacation or carefully file away notes if Recall can find anything, and everything, you've opened on your PC.
"It used to be if you interacted with your PC, you used a command line. Then we came up with the graphical user interface," said Ostrum. "Now, how do you find the things that you are looking for? Recall is a much more natural and richer way to interact with your files."
There's one unavoidable caveat: It's too early to know if Recall will do what Microsoft says. I tried the feature firsthand, and found that it could recall a fictional recipe I asked Microsoft Copilot to create. It did so immediately, and also after several hours had passed. Whether it can do the same next month, or next year, remains to be seen.
While Recall was the star, it was joined by several additional AI features. These include Cocreator, a new feature for Microsoft Paint that uses AI to convert simple sketches into more elaborate digital art, and Live Captions, which captions and translates video in real time. Like Recall, both features lean on a Copilot+ PC's neural processing unit (NPU). That means these features, again like Recall, won't be available on older PCs.
These features are intriguing, but they're shadowed by a concern: privacy. Recall could help you find lost documents, and live translation could lower language barriers, but they only work if Microsoft's AI captures what's happening on your PC. The company hopes to ease these concerns by running AI models on-device and encrypting any data that's stored.
Qualcomm partnership leaves Intel, AMD in the cold
Of course, running an AI model on-device isn't easy. CPUs can handle some AI models, but performance often isn't ideal, and many AI models aren't optimized for the hardware. GPUs are better fit for AI workloads but can draw a lot of power, which shortens battery life.
That's where Qualcomm comes into the picture. Its latest laptop chip, the Snapdragon X Elite, was designed by many of the same engineers responsible for Apple's M1 chip and includes an NPU.
Microsoft's two Copilot+ PCs, the Surface Laptop and Surface Pro, both have Snapdragon X Elite processors, and both quote AI performance of up to 45 trillion operations per second. Intel's current Intel Core Ultra processors are a step behind, with quoted AI performance up to 34 trillion operations per second.
That's apparently not enough for Microsoft: All Copilot+ PCs available at launch on 18 June will have Qualcomm chips inside. And many new AI features, including Windows' Recall, only work on Copilot+ PCs. Put simply: If you want to use Recall, you must buy Qualcomm.
Intel and AMD chips will appear in Copilot+ PCs eventually, but Ostrum said that may not happen until the end of 2024 or early 2025.
"We will continue to partner with [Intel and AMD] when it makes sense," said Ostrum. "There is both an element of how much performance there is, but there's also an element of how efficient that performance is [...] we don't want [AI] to be taxing multiple hours of battery life at a given time." Ostrum says activating AI features like Windows' Recall on a Copilot+ PC shaves no more than 30 to 40 minutes off a laptop's battery life, and all of Microsoft's battery-life quotes for Surface devices (which promise up to 15 hours of Web browsing and 22 hours of video playback) assume Copilot+ AI features are turned on.
It's unusual to see a major Windows product launch without Intel at the forefront of it, but that underscores Microsoft's belief that features like Recall only work on hardware that prioritizes AI performance and efficiency. If Microsoft has it their way, the Copilot key won't be a fad. It'll be the most important key on every Windows PC.
So, are you getting one or staying as far as away as you can?
Not much more to say than, damn.
Most of the companies in the list don't ring a bell. I do remember moving dBase data into FoxPro for a company I worked for in the early 90's. And of course the Skype, Nokia and GitHub deals were big news.
I suppose once Bill Gates completes his acquisition of all the farmland in the U.S. he can die happy?
[Editor's Note: There is a suggestion that the reason this has surfaced (again) at this time is an attempt to attract more people to VPNs rather than relying on Tor. This is most evident from the later stages of this document. However, from our own experience we have noted that Tor is not a reliable way of maintaining true anonymity. --JR]
There is a lot of misinformation being promoted in various privacy circles about Tor. This article will examine some facts about Tor and assess whether it is the infallible privacy tool it's made out to be by some.
There is a growing chorus of people who blindly recommend Tor to anyone looking for online anonymity. This recommendation often ignores mountains of evidence suggesting that Tor is not the "privacy tool" it's made out to be.
No privacy tool is above criticism or scrutiny, and each has pros and cons. Unfortunately, Tor has garnered a cult-like following in recent years among people who pretend it's infallible. Honest criticism of Tor is often met with accusations of "FUD" and ad-hominem attacks, so as not to disrupt the collective Groupthink.
Never mind the fact that the Tor network is a popular hangout for pedophiles and drug dealers – along with the law enforcement these types attract. Today, Tor is being marketed as some kind of grass-roots privacy tool that will protect you against government surveillance and various bad actors.
According to Roger Dingledine (Tor co-founder) and other key Tor developers, getting people (outside the US government) to widely adopt Tor is very important for the US government's ability to use Tor for its own purposes. In this goal, they have largely succeeded with Tor being widely promoted in various privacy circles by people who don't know any better.
But is Tor really a secure and trustworthy privacy tool?
Here are the facts.
1. Tor is compromised (and not anonymous)
That governments can de-anonymize Tor users is another well-known point that's been acknowledged for years. In 2013 the Washington Post broke an article citing reports that US government agencies had figured out how to de-anonymize Tor users on a "wide scale". From the Washington Post:
Since 2006, according to a 49-page research paper titled simply "Tor," the agency has worked on several methods that, if successful, would allow the NSA to uncloak anonymous traffic on a "wide scale" — effectively by watching communications as they enter and exit the Tor system, rather than trying to follow them inside. One type of attack, for example, would identify users by minute differences in the clock times on their computers.
There are also reports of government agencies cooperating with researchers to "break" or somehow exploit Tor to de-anonymize users:
Then in July, a much anticipated talk at the Black Hat hacking conference was abruptly canceled. Alexander Volynkin and Michael McCord, academics from Carnegie Mellon University (CMU), promised to reveal how a $3,000 piece of kit could unmask the IP addresses of Tor hidden services as well as their users.
Its description bore a startling resemblance to the attack the Tor Project had documented earlier that month. Volynkin and McCord's method would deanonymize Tor users through the use of recently disclosed vulnerabilities and a "handful of powerful servers." On top of this, the pair claimed they had tested attacks in the wild.
For $3,000 worth of hardware, this team from Carnegie Mellon could effectively "unmask" Tor users. And this was in 2015. But a 2017 court case proves FBI can de-anonymize Tor users. "The means by which the FBI is able to de-anonymize Tor users and discover their real IP address remains classified information. In a 2017 court case, the FBI refused to divulge how it was able to do this, which ultimately led to child abusers on the Tor network going free."
From the Tech Times:
In this case, the FBI managed to breach the anonymity Tor promises and the means used to collect the evidence from the dark web make up a sensitive matter. The technique is valuable to the FBI, so the government would rather compromise this case rather than release the source code it used. "The government must now choose between disclosure of classified information and dismissal of its indictment," federal prosecutor Annette Hayes said in a court filing on Friday.
The cat is out of the bag. The FBI (and presumably other government agencies) has proven to be fully capable of de-anonymizing Tor users. Most Tor promoters simply ignore these different cases and the obvious implications.
2. Tor developers are cooperating with US government agencies
Some Tor users may be surprised to know the extent to which Tor developers are working directly with US government agencies. After all, Tor is often promoted as a grass-roots privacy effort to help you stay "anonymous" against Big Brother. One journalist was able to clarify this cooperation through FOIA requests, which revealed many interesting exchanges.
Here is one email correspondence in which Roger Dingledine discusses cooperation with the DOJ (Department of Justice) and FBI (Federal Bureau of Investigation), while also referencing "backdoors" being installed.
Tor developer Steven Murdoch discovered a vulnerability with the way Tor was handling TLS encryption. This vulnerability made it easier to de-anonymize Tor users, and as such, it would be valuable to government agencies. Knowing the problems this could cause, Steven suggested keeping the document internal,
...it might be a good to delay the release of anything like 'this attack is bad; I hope nobody realizes it before we fix it'.
Eight days later, Roger Dingledine alerted two government agents about this vulnerability. While there is disagreement as to the seriousness of these issues, one thing remains clear. Tor developers are closely working with the US government. [...] Whether or not you agree with the ultimate conclusion of this researcher, the facts remain for anyone who wants to acknowledge them. The big issue is the close cooperation between Tor developers and US government agencies.
And if you really want to dive in, check out the full FOIA cache here.
3. When you use Tor, you stand out like a glow stick
Meet Eldo Kim. He was the Harvard student who assumed Tor would make him "anonymous" when sending bomb threats. Kim didn't realize that when he connected to Tor on the university network, he would stand out like a [...]glow stick. The FBI and the network admins at Harvard were able to easily pinpoint Kim because he was using Tor around the time the bomb threat email was sent through the Tor network. From the criminal complaint:
Harvard University was able to determine that, in the several hours leading up to the receipt of the e-mail messages described above, ELDO KIM accessed TOR using Harvard's wireless network.
Eldo Kim is just one of many, many examples of people who have bought into the lie that Tor provides blanket online anonymity – and later paid the price. Had Kim used a bridge or VPN before accessing the Tor network, he probably would have gotten away with it (we'll discuss this more below).
4. Anybody can operate Tor nodes and collect your data and IP address
Many proponents of Tor argue that its decentralized nature is a benefit. While there are indeed advantages to decentralization, there are also some major risks. Namely, that anybody can operate the Tor nodes through which your traffic is being routed. There have been numerous examples of people setting up Tor nodes to collect data from gullible Tor users who thought they would be safe and secure. Take for example Dan Egerstad, a 22-year-old Swedish hacker. Egerstad set up a few Tor nodes around the world and collected vast amounts of private data in just a few months:
In time, Egerstad gained access to 1000 high-value email accounts. He would later post 100 sets of sensitive email logins and passwords on the internet for criminals, spies or just curious teenagers to use to snoop on inter-governmental, NGO and high-value corporate email.
The question on everybody's lips was: how did he do it? The answer came more than a week later and was somewhat anti-climactic. The 22-year-old Swedish security consultant had merely installed free, open-source software – called Tor – on five computers in data centres around the globe and monitored it. Ironically, Tor is designed to prevent intelligence agencies, corporations and computer hackers from determining the virtual – and physical – location of the people who use it.
People think they're protected just because they use Tor. Not only do they think it's encrypted, but they also think 'no one can find me'.
To not assume government agencies are doing this right now would be extremely naive. Commenting on this case, security consultant Sam Stover emphasized the risks of someone snooping traffic through Tor nodes:
Domestic, or international . . . if you want to do intelligence gathering, there's definitely data to be had there. (When using Tor) you have no idea if some guy in China is watching all your traffic, or some guy in Germany, or a guy in Illinois. You don't know.
In fact, that is exactly how Wikileaks got started. The founders simply setup Tor nodes to siphon off more than a million private documents. According to Wired:
WikiLeaks, the controversial whistleblowing site that exposes secrets of governments and corporations, bootstrapped itself with a cache of documents obtained through an internet eavesdropping operation by one of its activists, according to a new profile of the organization's founder.
The activist siphoned more than a million documents as they traveled across the internet through Tor, also known as "The Onion Router," a sophisticated privacy tool that lets users navigate and send documents through the internet anonymously.
Are governments running Tor nodes for bulk data collection?
Egerstad also suggests Tor nodes may be controlled by powerful agencies (governments) with vast resources:
In addition to hackers using Tor to hide their origins, it's plausible that intelligence services had set up rogue exit nodes to sniff data from the Tor network. "If you actually look in to where these Tor nodes are hosted and how big they are, some of these nodes cost thousands of dollars each month just to host because they're using lots of bandwidth, they're heavy-duty servers and so on," Egerstad says. "Who would pay for this and be anonymous?"
Back in 2014, government agencies seized a number of different Tor relays in what is known as "Operation Onymous". From the Tor Project blog:
Over the last few days, we received and read reports saying that several Tor relays were seized by government officials. We do not know why the systems were seized, nor do we know anything about the methods of investigation which were used. Specifically, there are reports that three systems of Torservers.net disappeared and there is another report by an independent relay operator.
This issue continues to gain attention. In this Gizmodo article from 2021, we find the same problems. Bad actors can and do operate Tor nodes. Additional reading: A mysterious threat actor is running hundreds of malicious Tor relays
The fundamental issue here is there is no real quality control mechanism for vetting Tor relay operators. Not only is there no authentication mechanism for setting up relays, but the operators themselves can also remain anonymous. Assuming that some Tor nodes are data collection tools, it would also be safe to assume that many different governments are involved in data collection, such as the Chinese, Russian, and US governments.
See also: Tor network exit nodes found to be sniffing passing traffic
5. Malicious Tor nodes do exist
If government-controlled Tor nodes weren't bad enough, you also have to consider malicious Tor nodes.
In 2016 a group of researchers presented a paper titled "HOnions: Towards Detection and Identification of Misbehaving Tor HSDirs" [PDF], which described how they identified 110 malicious Tor relays:
Over the last decade privacy infrastructures such as Tor proved to be very successful and widely used. However, Tor remains a practical system with a variety of limitations and open to abuse. Tor's security and anonymity is based on the assumption that the large majority of the its relays are honest and do not misbehave. Particularly the privacy of the hidden services is dependent on the honest operation of Hidden Services Directories (HSDirs). In this work we introduce, the concept of honey onions (HOnions), a framework to detect and identify misbehaving and snooping HSDirs. After the deployment of our system and based on our experimental results during the period of 72 days, we detect and identify at least 110 such snooping relays. Furthermore, we reveal that more than half of them were hosted on cloud infrastructure and delayed the use of the learned information to prevent easy traceback.
The malicious HSDirs identified by the team were mostly located in the United States, Germany, France, United Kingdom and the Netherlands. Just a few months after the HSDir issue broke, a different researcher identified a malicious Tor node injecting malware into file downloads.
Use at your own risk.
See also:
OnionDuke APT Malware Distributed Via Malicious Tor Exit Node
6. No warrant necessary to spy on Tor users
Another interesting case highlighting the flaws of Tor comes form 2016 when the FBI was able to infiltrate Tor to bust another pedophile group. According to Tech Times:
The U.S. Federal Bureau of Investigation (FBI) can still spy on users who use the Tor browser to remain anonymous on the web. Senior U.S. District Court Judge Henry Coke Morgan, Jr. has ruled that the FBI does not need a warrant to hack into a U.S. citizen's computer system. The ruling by the district judge relates to FBI sting called Operation Pacifier, which targeted a child pornography site called PlayPen on the Dark web. The accused used Tor to access these websites. The federal agency, with the help of hacking tools on computers in Greece, Denmark, Chile and the U.S., was able to catch 1,500 pedophiles during the operation.
While it's great to see these types of criminals getting shut down, this case also highlights the severe vulnerabilities of Tor as a privacy tool that can be trusted by journalists, political dissidents, whistleblowers, etc. The judge in this case officially ruled [PDF] that Tor users lack "a reasonable expectation of privacy" in hiding their IP address and identity. This essentially opens the door to any US government agency being able to spy on Tor users without obtaining a warrant or going through any legal channels.
This, of course, is a serious concern when you consider that journalists, activists, and whistleblowers are encouraged to use Tor to hide from government agencies and mass surveillance.
7. Tor was created by the US government (and not for your "right to privacy")
If you think Tor was created for "privacy rights" or some other noble-sounding cause, then you would be mistaken. The quote below, from the co-founder of Tor, speaks volumes.
I forgot to mention earlier, probably something that will make you look at me in a new light. I contract for the United States Government to build anonymity technology for them and deploy it. They don't think of it as anonymity technology, though we use that term. They think of it as security technology. They need these technologies so that they can research people they're interested in, so that they can have anonymous tip lines, so that they can buy things from people without other countries figuring out what they are buying, how much they are buying and where it is going, that sort of thing.
— Roger Dingledine, co-founder of Tor, 2004 speech
This quote alone should convince any rational person to never use the Tor network, unless of course you want to be rubbing shoulders with government spooks on the Dark Web.
The history of Tor goes back to the 1990s when the Office of Naval Research and DARPA were working to create an online anonymity network in Washington, DC. This network was called "onion routing" and bounced traffic across different nodes before exiting to the final destination.
In 2002, the Alpha version of Tor was developed and released by Paul Syverson (Office of Naval Research), as well as Roger Dingledine and Nick Mathewson, who were both on contract with DARPA. This three-person team, working for the US government, developed Tor into what it is today.
The quote above was taken from a 2004 speech by Roger Dingledine, which you can also listen to here.
After Tor was developed and released for public use, it was eventually spun off as its own non-profit organization, with guidance coming from the Electronic Frontier Foundation (EFF):
At the very end of 2004, with Tor technology finally ready for deployment, the US Navy cut most of its Tor funding, released it under an open source license and, oddly, the project was handed over to the Electronic Frontier Foundation.
8. Tor is funded by the US government
It's no secret that Tor is funded by various US government agencies. The key question is whether US government funding negatively affects Tor's independence and trustworthiness as a privacy tool.
Some journalists have closely examined the financial relationship between Tor and the US government:
Tor had always maintained that it was funded by a "variety of sources" and was not beholden to any one interest group. But I crunched the numbers and found that the exact opposite was true: In any given year, Tor drew between 90 to 100 percent of its budget via contracts and grants coming from three military-intel branches of the federal government: the Pentagon, the State Department and an old school CIA spinoff organization called the BBG.
Put simply: the financial data showed that Tor wasn't the indie-grassroots anti-state org that it claimed to be. It was a military contractor. It even had its own official military contractor reference number from the government.
Here are some of the different government funding sources for the Tor Project over the years:
Broadcasting Board of Governors:
"Broadcasting Board of Governors (BBG) [now called U.S. Agency for Global Media], a federal agency that was spun off from the CIA and today oversees America's foreign broadcasting operations, funded Tor to the tune of $6.1 million in the years from 2007 through 2015." (source)
State Department:
"The State Department funded Tor to the tune of $3.3 million, mostly through its regime change arm — State Dept's "Democracy, Human Rights and Labor" division." (source)
The Pentagon:
"From 2011 through 2013, the Pentagon funded Tor to the tune of $2.2 million, through a U.S. Department of Defense / Navy contract — passed through a defense contractor called SRI International." (source)
The grant is called: "Basic and Applied Research and Development in Areas Relating to the Navy Command, Control, Communications, Computers, Intelligence, Surveillance, and Reconnaissance."
We can also see what the Tor project has to say about the matter. When soliciting funds in 2005, Tor claimed that donors would be able to "influence" the direction of the project:
We are now actively looking for new contracts and funding. Sponsors of Tor get personal attention, better support, publicity (if they want it), and get to influence the direction of our research and development!
There you have it. Tor claims donors influence the direction of research and development – a fact that the Tor team even admits. Do you really think the US government would invest millions of dollars into a tool that stifled its power?
9. When you use Tor, you help the US government do spooky stuff
The United States government can't simply run an anonymity system for everybody and then use it themselves only. Because then every time a connection came from it people would say, "Oh, it's another CIA agent looking at my website," if those are the only people using the network. So you need to have other people using the network so they blend together.
—Roger Dingledine, co-founder of the Tor Network, 2004 speech
The implications of this statement are quite serious. When you use Tor, you are literally helping the US government. Your traffic helps to conceal CIA agents who are also using Tor, as Dingledine and journalists are pointing out.
Just as Roger Dingledine asserted in the opening quote to this section, Paul Syverson (Tor co-founder) also emphasized the importance of getting other people to use Tor, thereby helping government agents perform their work and not stand out as the only Tor users:
If you have a system that's only a Navy system, anything popping out of it is obviously from the Navy. You need to have a network that carries traffic for other people as well.
Tor is branded by many different individuals and groups as a grassroots project to protect people from government surveillance. In reality, however, it is a tool for government agents who are literally using it for military and intelligence operations (including spying on those who think they are "anonymous" on Tor).
Tor's utility for the military-surveillance apparatus is explained well in the following quote:
Tor was created not to protect the public from government surveillance, but rather, to cloak the online identity of intelligence agents as they snooped on areas of interest. But in order to do that, Tor had to be released to the public and used by as diverse a group of people as possible: activists, dissidents, journalists, paranoiacs, kiddie porn scum, criminals and even would-be terrorists — the bigger and weirder the crowd, the easier it would be for agents to mix in and hide in plain sight.
According to these Tor developers and co-founders, when you use Tor you are helping US government agents in doing whatever they do on the Tor network. Why would anyone who advocates for privacy and human rights want to do that?
10. IP address leaks when using Tor
Another recurring problem with Tor is IP address leaks – a serious issue that will de-anonymize Tor users, even if the leak is brief.
In November 2017 a flaw was discovered that exposed the real IP address of Tor users if they clicked on a local file-based address, such as file://., rather than http:// or https://.
This issue illustrates a larger problem with Tor: it only encrypts traffic through the Tor browser, thereby leaving all other (non-Tor browser) traffic exposed.
Unlike a VPN that encrypts all traffic on your operating system, the Tor network only works through a browser configured for Tor. (See the 'what is a VPN' guide for an overview.)
This design leaves Tor users vulnerable to leaks which will expose their identity in many different situations:
- Tor offers no protection when torrenting and will leak the user's IP address with torrent clients.
- Tor may leak IP addresses when accessing files, such as PDFs or other documents, which will likely bypass proxy settings.
- Windows users are also vulnerable to different types of leaks that will expose the user's real IP address.
It's important to note, however, that oftentimes de-anonymization is due to user error or misconfiguration. Therefore blame does not lie with Tor itself, but rather with people not using Tor correctly.
Dan Eggerstad emphasized this issue as well when he stated:
People think they're protected just because they use Tor. Not only do they think it's encrypted, but they also think 'no one can find me'. But if you've configured your computer wrong, which probably more than 50 per cent of the people using Tor have, you can still find the person (on) the other side.
Once again, non-technical users would be better off using a good VPN service that provides system-wide traffic encryption and an effective kill switch to block all traffic if the VPN connection drops.
11. Using Tor can make you a target
As we saw above with the bomb threat hoax, Eldo Kim was targeted because he was on the Tor network when the bomb threat was sent. Other security experts also warn about Tor users being targeted merely for using Tor.
In addition, most really repressive places actually look for Tor and target those people. VPNs are used to watch Netflix and Hulu, but Tor has only one use case – to evade the authorities. There is no cover. (This is assuming it is being used to evade even in a country incapable of breaking Tor anonymity.)
In many ways Tor can be riskier than a VPN:
- VPNs are (typically) not actively malicious
- VPNs provide good cover that Tor simply cannot – "I was using it to watch Hulu videos" is much better than – "I was just trying to buy illegal drugs online"
As we've pointed out here before, VPNs are more widely used than Tor – and for various (legitimate) reasons, such as streaming Netflix with a VPN.
So maybe you still need (or want?) to use Tor. How can you do so with more safety?
How hide your IP address when using Tor
Given that Tor is compromised and bad actors can see the real IP address of Tor users, it would be wise to take extra precautions. This includes hiding your real IP address before accessing the Tor network.
To hide your IP address when accessing Tor, simply connect to a VPN server (through a VPN client on your computer) and then access Tor as normal (such as through the Tor browser). This will add a layer of encryption between your computer and the Tor network, with the VPN server's IP address replacing your real IP address.
Note: There are different ways to combine VPNs and Tor. I am only recommending the following setup: You VPN Tor Internet (also called "Tor over VPN" or "Onion over VPN").
With this setup, even if a malicious actor was running a Tor server and logging all connecting IP addresses, your real IP address would remain hidden behind the VPN server (assuming you are using a good VPN with no leaks).
Here are the benefits of routing your traffic through a secure VPN before the Tor network:
- Your real IP address remains hidden from the Tor network (Tor cannot see who you are)
- Your internet provider (ISP) or network admin will not be able to see you are using Tor (because your traffic is being encrypted through a VPN server).
- You won't stand out as much from other users because VPNs are more popular than Tor.
- You are distributing trust between Tor and a VPN. The VPN could see your IP address and Tor could see your traffic (sites you visit), but neither would have both your IP address and browsing activities.
For anyone distrustful of VPNs, there are a handful of verified no logs VPN services that have been proven to be truly "no logs".
You can sign up for a VPN with a secure anonymous email account (not connected to your identity). For the truly paranoid, you can also pay with Bitcoin or any other anonymous payment method. Most VPNs do not require any name for registration, only a valid email address for account credentials. Using a VPN in a safe offshore jurisdiction (outside the 14 Eyes) may also be good, depending on your threat model.
For those seeking the highest levels of anonymity, you can chain multiple VPNs through Linux virtual machines (using Virtualbox, which is FOSS). You could also use VPN1 on your router, VPN2 on your computer, and then access the regular internet (or the Tor network) through two layers of encryption via two separate VPN services. This allows you to distribute trust across different VPN services and ensure neither VPN could have both your incoming IP address and traffic. This is discussed more in my guide on multi-hop VPN services.
Note: The claim that "VPN is fully, 100%, a single point/entity that you must trust" is false. This claim comes from this Tor promoter who coincidentlyworks for the US government's Naval Research Lab.
When you chain VPNs, you can distribute trust across different VPN services and different jurisdictions around the world, all paid for anonymously and not linked to your identity. With Tor alone, you put all your trust in The Onion Router...
Tor vulnerabilities and VPNs
There are other attacks that the Tor Project admits will de-anonymize Tor users (archived):
As mentioned above, it is possible for an observer who can view both you and either the destination website or your Tor exit node to correlate timings of your traffic as it enters the Tor network and also as it exits. Tor does not defend against such a threat model.
Once again, a VPN can help to mitigate the risk of de-anonymization by hiding your source IP address before accessing the guard node in the Tor circuit.
Can exit nodes eavesdrop on communications? From the Tor Project:
Yes, the guy running the exit node can read the bytes that come in and out there. Tor anonymizes the origin of your traffic, and it makes sure to encrypt everything inside the Tor network, but it does not magically encrypt all traffic throughout the Internet.
However, a VPN can not do anything about a bad Tor exit node eavesdropping on your traffic, although it will help hide who you are (but your traffic can also give you away).
Conclusion
No privacy tool is above criticism.
Just like with Tor, I have also pointed out numerous problems with VPNs, including VPNs that were caught lying about logs, VPN scams, and dangerous free VPN services. All privacy tools come with pros and cons. Selecting the best tool for the job all boils down to your threat model and unique needs.
Unfortunately, for many in the privacy community, Tor is now considered to be an infallible tool for blanket anonymity, and to question this dogma means you are "spreading FUD". This is pathetic.
In closing, for regular users seeking more security and online anonymity, I'd simply avoid Tor altogether. A VPN will offer system-wide encryption, much faster speeds, and user-friendly clients for various devices and operating systems. This will also prevent your ISP from seeing what you're up to online.
Additionally, VPNs are more mainstream and there are many legitimate (and legal!) reasons for using them. Compared to Tor, you definitely won't stand out as much with a VPN.
For those who still want to access the Tor network, doing so through a reliable VPN service will add an extra layer of protection while hiding your real IP address.
Further Reading:
Tor and its Discontents: Problems with Tor Usage as Panacea
Users Get Routed: Traffic Correlation on Tor by Realistic Adversaries
Tor network exit nodes found to be sniffing passing traffic
On the Effectiveness of Traffic Analysis Against Anonymity Networks Using Flow Records
Judge confirms what many suspected: Feds hired CMU to break Tor
The Guardian has a long and very interesting article about pain and its psychology and physiology. Some gripping anecdotes like the soldier who picks his torn arm from the ground and walks to receive medical attention or the woman who worked and walked around for 10 hours with a burst cyst and a "a belly full of blood."
Why some people can withstand high pain while others cry over a little knock in their knee?
Some say it was John Sattler's own fault. The lead-up to the 1970 rugby league grand final had been tense; the team he led, the South Sydney Rabbitohs, had lost the 1969 final. Here was an opportunity for redemption. The Rabbitohs were not about to let glory slip through their fingers again.
Soon after the starting whistle, Sattler went in for a tackle. As he untangled – in a move not uncommon in the sport at the time – he gave the Manly Sea Eagles' John Bucknall a clip on the ear.
Seconds later – just three minutes into the game – the towering second rower returned favour with force: Bucknall's mighty right arm bore down on Sattler, breaking his jaw in three places and tearing his skin; he would later need eight stitches. When his teammate Bob McCarthy turned to check on him, he saw his captain spurting blood, his jaw hanging low. Forty years later Sattler would recall that moment. One thought raged in his shattered head: "I have never felt pain like this in my life."
But he played on. Tackling heaving muscular players as they advanced. Being tackled in turn, around the head, as he pushed forward. All the while he could feel his jaw in pieces.
At half-time the Rabbitohs were leading. In the locker room, Sattler warned his teammates, "Don't play me out of this grand final."
McCarthy told him, "Mate, you've got to go off."
He refused. "I'm staying."
Sattler played the whole game. The remaining 77 minutes. At the end, he gave a speech and ran a lap of honour. The Rabbitohs had won. The back page of the next day's Sunday Mirror screamed "BROKEN JAW HERO".
[...]
How can a person bitten by a shark calmly paddle their surfboard to safety, then later liken the sensation of the predator clamping down on their limb to the feeling of someone giving their arm "a shake"? How is it that a woman can have a cyst on her ovary burst, her abdomen steadily fill with blood, but continue working at her desk for six hours? Or that a soldier can have his legs blown off then direct his own emergency treatment? [16:06 and quite moving.]
Each one of us feels pain. We all stub our toes, burn our fingers, knock our knees. And worse. The problem with living in just one mind and body is that we can never know whether our six out of 10 on the pain scale is the same as the patient in the chair next to us.
[...] But what is happening in the body and mind of a person who does not seem to feel the pain they "should" be feeling. Do we all have the capacity to be one of these heroic freaks?
And how did John Sattler play those 77 minutes?
Questions like these rattled around the mind of Lorimer Moseley when he showed up at Sydney's Royal North Shore hospital years ago as an undergraduate physiotherapy student. He wanted to interrogate a quip made by a neurology professor as he left the lecture theatre one day, that the worst injuries are often the least painful. So Moseley sat in the emergency room and watched people come in, recording their injuries and asking them how much they hurt.
"And this guy came in with a hammer stuck in his neck – the curly bit had got in the back and was coming out the front and blood was pouring all down," Moseley recalls. "But he was relaxed. He just walked in holding the hammer, relaxed. Totally fine."
Then the man turned around, hit his knee on a low table and began jumping up and down at the pain of the small knock.
"And I think, 'Whoa, what is happening there?'"
The curious student ruled out drugs, alcohol, shock. He realised that the reason the man did not feel pain from his hammer injury was due to the very point of pain itself.
"Pain is a feeling that motivates us to protect ourselves," says Moseley, now the chair in physiotherapy and a professor of clinical neurosciences at the University of South Australia.
"One of the beautiful things about pain is that it will motivate us to protect the body part that's in danger, really anatomically specific – it can narrow it right down to a tiny little spot."
[...] Prof Michael Nicholas is used to stories like these. "You can see it in probably every hospital ward. If you stay around long enough you'll hear comments like 'this person has more pain than they should have' or 'you might be surprised that they're not in pain'," he says. "What that highlights to me is the general tendency for all of us to think there should be a close relationship between a stimulus like an injury or a noxious event and the degree of pain the person feels.
"In fact, that's generally wrong. But it doesn't stop us believing it."
The reason we get it wrong, Nicholas says, "is that we have a sort of mind-body problem".
Eastern medicine and philosophy has long recognised the interconnectedness of body and mind, and so too did the west in early civilisations. In ancient Greece the Algea, the gods of physical pain, were also gods associated with psychic pain – with grief and distress. But in the 1600s the French philosopher René Descartes set western thinking on a different course, asserting that the mind and body were separate entities.
"When people come to see me, they're often worried they're being told it's all in their head," Nicholas says.
"Of course pain is in your head. It's in your brain. You know, it's the brain that is where you get that experience ... It's never all physical."
This is true of people who tolerate acute pain. It's never all physical. And it has little to do with heroism or freakishness.
[...] And so the experience of acute pain is caught in the realm of mystery and mythology; where we can understand much of what is happening in a body and part of what is happening in a brain but never actually know what another person feels.
The legend of John Sattler goes that after that fateful right hook from Bucknall, the bloodied captain turned to his teammate Matthew Cleary. That no one knew, perhaps not even himself, the damage that had been done to him became his mythological power.
"Hold me up," he said. "So they don't know I'm hurt."
FuguIta has been mentioned here recently.
The creator has released a, "FuguIta desktop environment demo version" featuring:
Desktop environment: xfce-4.20.0
- Web browser: firefox-137.0
- Mailer: thunderbird-128.9.0
- Office: libreoffice-25.2.1.2v0
- Media player: vlc-3.0.21p2
- Audio player: audacious-4.4.2
- Fonts: noto-cjk-20240730, noto-emoji-20240730, noto-fonts-24.9.1v0
From the creator:
I made a demo version of FuguIta with a desktop environment. This demo version demonstrates that FuguIta can be used with a desktop environment as easily as a regular live system.
This demo version uses the following features of Fuguita and OpenBSD.
- Automatic file saving at shutdown using the /etc/rc.shutdown file
- Automatic startup using the noasks file
- Automatic login using the xenodm-config file
- Additional partition mounting using the /etc/fuguita/fstab.tail file
- Initialization only at first startup using /etc/rc.firsttime
There's also the example on how to setup the Fluxbox Window Manager, too, for example.
Arthur T Knackerbracket has processed the following story:
Satellite data suggests cloud darkening is responsible for much of the warming since 2001, and the good news is that it is a temporary effect due to a drop in sulphate pollution
Clouds have been getting darker and reflecting less sunlight as a result of falling sulphate air pollution, and this may be responsible for a lot of recent warming beyond that caused by greenhouse gases.
“Two-thirds of the global warming since 2001 is SO2 reduction rather than CO2 increases,” says Peter Cox at the University of Exeter in the UK.
Some of the sunshine that reaches Earth is reflected and some is absorbed and later radiated as heat. Rising carbon dioxide levels trap more of that radiant heat – a greenhouse effect that causes global warming. But the planet’s albedo – how reflective it is – also has a big influence on its temperature.
Since 2001, satellite instruments called CERES have been directly measuring how much sunlight is reflected versus how much is absorbed. These measurements show a fall in how much sunlight is being reflected, meaning the planet is getting darker – its albedo is falling – and this results in additional warming.
There are many reasons for the falling albedo, from less snow and sea ice to less cloud cover. But an analysis of CERES data from 2001 to 2019 by Cox and Margaux Marchant, also at Exeter, suggests the biggest factor is that clouds are becoming darker.
It is known that sulphate pollution from industry and ships can increase the density of droplets in clouds, making them brighter or more reflective. This is the basis of one proposed form of geoengineering, known as marine cloud brightening. But these emissions have been successfully reduced in recent years, partly by moving away from high-sulphur fuels such as coal.
So Marchant and Cox looked at whether the decline in cloud brightness corresponded with areas with falling levels of SO2 pollution, and found that it did. The pair presented their preliminary results at the Exeter Climate Forum earlier this month.
The results are encouraging because the rapid warming in recent years has led some researchers to suggest that Earth’s climate sensitivity – how much it warms in response to a given increase in atmospheric CO2 – is on the high side of estimates. As it turns out, extra warming due to falling pollution will be short-lived, whereas if the cloud darkening was a feedback caused by rising CO2, it would mean ever more warming due to this as CO2 levels keep rising.
“If this darkening is a change in cloud properties due to the recent decrease in SO2 emissions, rather than a change in cloud feedbacks that indicate a higher-than-anticipated climate sensitivity, then this is great news,” says Laura Wilcox at the University of Reading in the UK, who wasn’t involved in the study.
There are some limitations with the datasets Marchant and Cox used, says Wilcox. For instance, the data on SO2 pollution has been updated since the team did their analysis.
And two recent studies have suggested the darkening is mainly due to a reduction in cloud cover, rather than darker clouds, she says. “The drivers of the recent darkening trends are a hotly debated topic at the moment.”
Overall, though, Wilcox says her own work also supports the conclusion that the recent acceleration in global warming has been primarily driven by the decrease in air pollution, and that it is likely to be a temporary effect.
Brothers-in-law use construction knowledge to compete against Comcast in Michigan:
Samuel Herman and Alexander Baciu never liked using Comcast's cable broadband. Now, the residents of Saline, Michigan, operate a fiber Internet service provider that competes against Comcast in their neighborhoods and has ambitions to expand.
[...] "Many times we would have to call Comcast and let them know our bandwidth was slowing down... then they would say, 'OK, we'll refresh the system.' So then it would work again for a week to two weeks, and then again we'd have the same issues," he said.
Herman, now 25, got married in 2021 and started building his own house, and he tried to find another ISP to serve the property. He was familiar with local Internet service providers because he worked in construction for his father's company, which contracts with ISPs to build their networks.
But no fiber ISP was looking to compete directly against Comcast where he lived, though Metronet and 123NET offer fiber elsewhere in the city, Herman said. He ended up paying Comcast $120 a month for gigabit download service with slower upload speeds. Baciu, who lives about a mile away from Herman, was also stuck with Comcast and was paying about the same amount for gigabit download speeds.
Herman said he was the chief operating officer of his father's construction company and that he shifted the business "from doing just directional drilling to be a turnkey contractor for ISPs." Baciu, Herman's brother-in-law (having married Herman's oldest sister), was the chief construction officer. Fueled by their knowledge of the business and their dislike of Comcast, they founded a fiber ISP called Prime-One.
Now, Herman is paying $80 a month to his own company for symmetrical gigabit service. Prime-One also offers 500Mbps for $75, 2Gbps for $95, and 5Gbps for $110. The first 30 days are free, and all plans have unlimited data and no contracts.
[...] Comcast seems to have noticed, Herman said. "They've been calling our clients nonstop to try to come back to their service, offer them discounted rates for a five-year contract and so on," he said.
A Comcast spokesperson told Ars that "we have upgraded our network in this area and offer multi-gig speeds there, and across Michigan, as part of our national upgrade that has been rolling out."
Meanwhile, Comcast's controversial data caps are being phased out. With Comcast increasingly concerned about customer losses, it recently overhauled its offerings with four plans that come with unlimited data. The Comcast data caps aren't quite dead yet because customers with caps have to switch to a new plan to get unlimited data.
Comcast told us that customers in Saline "have access to our latest plans with simple and predictable all-in pricing that includes unlimited data, Wi-Fi equipment, a line of Xfinity Mobile, and the option for a one or five-year price guarantee."
https://www.eff.org/deeplinks/2025/07/radio-hobbyists-rejoice-good-news-lora-mesh
A set of radio devices and technologies are opening the doorway to new and revolutionary forms of communication. These have the potential to break down the over-reliance on traditional network hierarchies, and present collaborative alternatives where resistance to censorship, control and surveillance are baked into the network topography itself. Here, we look at a few of these technologies and what they might mean for the future of networked communications.
The idea of what is broadly referred to as mesh networking isn't new: the resilience and scalability of mesh technology has seen it adopted in router and IoT protocols for decades. What's new is cheap devices that can be used without a radio license to communicate over (relatively) large distances, or LOng RAnge, thus the moniker LoRa.
Although using different operating frequencies in different countries, LoRa works in essentially the same way everywhere. It uses Chirp Spread Spectrum to broadcast digital communications across a physical landscape, with a range of several kilometers in the right environmental conditions. When other capable devices pick up a signal, they can then pass it along to other nodes until the message reaches its destination—all without relying on a single centralized host.
These communications are of very low bit-rate—often less than a few KBps (kilobytes per second) at a distance—and use very little power. You won't be browsing the web or streaming video over LoRa, but it is useful for sending messages in a wide range of situations where traditional infrastructure is lacking or intermittent, and communication with others over dispersed or changing physical terrain is essential. For instance, a growing body of research is showing how Search and Rescue (SAR) teams can greatly benefit from the use of LoRa, specifically when coupled with GPS sensors, and especially when complimented by line-of-sight LoRa repeaters.
The most popular of these indie LoRa communication systems is Meshtastic by far. For hobbyists just getting started in the world of LoRa mesh communications, it is the easiest way to get up, running, and texting with others in your area that also happen to have a Meshtastic-enabled device. It also facilitates direct communication with other nodes using end-to-end encryption. And by default, a Meshtastic device will repeat messages to others if originating from 3 or fewer nodes (or "hops") away. This means messages tend to propagate farther with the power of the mesh collaborating to make delivery possible. As a single-application use of LoRa, it is an exciting experiment to take part in.
While Reticulum is often put into the same category as Meshtastic, and although both enable communication over LoRa, the comparison breaks down quickly after that. Reticulum is not a single application, but an entire network stack that can be arbitrarily configured to connect through existing TCP/IP, the anonymizing I2P network, directly through a local WiFi connection, or through LoRa radios. The Reticulum network's LXMF transfer protocol allows arbitrary applications to be built on top of it, such as messaging, voice calls, file transfer, and light-weight, text-only browsing. And that's only to name a few applications which have already been developed—the possibilities are endless.
[...] On a more somber note, let's face it: we live in an uncertain world. With the frequency of environmental disasters, political polarization, and infrastructure attacks increasing, the stability of networks we have traditionally relied upon is far from assured.
Yet even with the world as it is, developers are creating new communications networks that have the potential to help in unexpected situations we might find ourselves in. Not only are these technologies built to be useful and resilient, they are also empowering individuals by circumventing censorship and platform control— allowing a way for people to empower each other through sharing resources.
In that way, it can be seen as a technological inheritor of the hopefulness and experimentation—and yes, fun!—that was so present in the early internet. These technologies offer a promising path forward for building our way out of tech dystopia.
The Wall Street Journal published a look at new automation for farms, as reported by Mint
In the verdant hills of Washington state's Palouse region, Andrew Nelson's tractor hums through the wheat fields on his 7,500-acre farm. Inside the cab, he's not gripping the steering wheel—he's on a Zoom call or checking messages.
A software engineer and fifth-generation farmer, Nelson, 41, is at the vanguard of a transformation that is changing the way we grow and harvest our food. The tractor isn't only driving itself; its array of sensors, cameras, and analytic software is also constantly deciding where and when to spray fertilizer or whack weeds.
Many modern farms already use GPS-guided tractors and digital technology such as farm-management software systems. Now, advances in artificial intelligence mean that the next step—the autonomous farm, with only minimal human tending—is finally coming into focus.
Imagine a farm where fleets of autonomous tractors, drones and harvesters are guided by AI that tweaks operations minute by minute based on soil and weather data. Sensors would track plant health across thousands of acres, triggering precise sprays or irrigation exactly where needed. Farmers could swap long hours in the cab for monitoring dashboards and making high-level decisions. Every seed, drop of water and ounce of fertilizer would be optimized to boost yields and protect the land—driven by a connected system that gets smarter with each season.
[...] "We're just getting to a turning point in the commercial viability of a lot of these technologies," says David Fiocco, a senior partner at McKinsey & Co. who leads research on agricultural innovation.
[...] Automation, now most often used on large farms with wheat or corn laid out in neat rows, is a bigger challenge for crops like fruits and berries, which ripen at different times and grow on trees or bushes. Maintaining and harvesting these so-called specialty crops is labor-intensive. "In specialty crops, the small army of weeders and pickers could soon be replaced by just one or two people overseeing the technology. That may be a decade out, but that's where we're going," says Fiocco of McKinsey.
Fragile fruits like strawberries and grapes pose a huge challenge. Tortuga, an agriculture tech startup in Denver, developed a robot to do the job. Tortuga was acquired in March by vertical farming company Oishii. The robot resembles NASA's Mars Rover with fat tires and extended arms. It rolls along a bed of strawberries or grapes and uses a long pincher arm to reach into the vine and snip off a single berry or a bunch of grapes, placing them gingerly into a basket.
[...] A crop is only as healthy as its soil. Traditionally, farmers send topsoil samples to a lab to have them analyzed. New technology that uses sensors to scan the soil on-site is enabling a precise diagnosis covering large areas of farms rather than spot checks.
The diagnosis includes microbial analysis as well as identifying areas of soil compaction, when the soil becomes dense, hindering water infiltration, root penetration and gas exchange. Knowing this can help a farmer plan where to till and make other decisions about the new season.
New technology is also changing livestock management. The creation of virtual fences, which are beginning to be adopted in the U.S., Europe and Australia, has the potential to help ranchers save money on expensive fencing and help them better manage their herds.
Livestock are given GPS-enabled collars, and virtual boundaries are drawn on a digital map. If an animal approaches the virtual boundary, it first gets an auditory warning. If it continues, it gets zapped with a mild but firm electric shock.
Is this what Bill Gates is doing with all the farmland he owns?
DOGE staffer with access to Americans' personal data leaked private xAI API key:
A DOGE staffer with access to the private information on millions of Americans held by the U.S. government reportedly exposed a private API key used for interacting with Elon Musk's xAI chatbot.
Independent security journalist Brian Krebs reports that Marko Elez, a special government employee who in recent months has worked on sensitive systems at the U.S. Treasury, the Social Security Administration, and Homeland Security, recently published code to his GitHub containing the private key. The key allowed access to dozens of models developed by xAI, including Grok.
Philippe Caturegli, founder of consultancy firm Seralys, alerted Elez to the leak earlier this week. Elez removed the key from his GitHub but the key itself was not revoked, allowing continued access to the AI models.
"If a developer can't keep an API key private, it raises questions about how they're handling far more sensitive government information behind closed doors," Caturegli told KrebsOnSecurity.
Arthur T Knackerbracket has processed the following story:
Despite claims that layoffs target mostly mid-level managers.
Intel this month officially began to cut down its workforce in the U.S. and other countries, thus revealing actual numbers of positions to be cut. The Oregonian reports that the company will cut as many as 2,392 positions in Oregon and around 4,000 positions across its American operations, including Arizona, California, and Texas.
To put the 2,392 number into context, Intel is the largest employer in Oregon with around 20,000 of workers there. 2,392 is around 12% of the workforce, which is a lower end of layoff expectations, yet 2,400 is still a lot of people. The Oregon reduction rose sharply from an initial count of around 500 to a revised figure of 2,392, making it one of the largest layoffs in the state’s history. Intel began reducing staff earlier in the week but confirmed the larger number by Friday evening through a filing with Oregon state authorities.
Intel's Oregon operations have already seen 3,000 jobs lost over the past year through earlier buyouts and dismissals. This time around, Intel does not offer voluntarily retirement or buyouts, it indeed lays off personnel in Aloha (192) and Hillsboro (2,200).
Although Intel officially says that it is trying to get rid of mid-level managers to flatten the organization and focus on engineers, the list of positions that Intel is cutting is led by module equipment technicians (325), module development engineers (302), module engineers (126), and process integration development engineers (88). In fact, based on the Oregon WARN filing, a total of 190 employees with 'Manager' in their job titles (8% of personnel being laid off) were included among those laid off by Intel. These comprised various software, hardware, and operational management roles across the affected sites.
[...] Interestingly, Intel is implementing a new approach to workforce reductions, allowing individual departments to decide how to meet financial goals rather than announcing large, centralized cuts. This decentralized process has led to ongoing job losses across the company, with marketing functions being outsourced to Accenture and the automotive division completely shut down.
Engineering the Origin of the Wheel:
Some historians believe the wheel is the most significant invention ever created. Historians and archeologists have artifacts from the wheel's history that go back thousands of years, but knowing that the wheel first originated back in 3900 B.C. doesn't tell the entire story of this essential technology's development.
A recent study [2024] by Daniel Guggenheim School of Aerospace Engineering Associate Professor Kai James, Lee Alacoque, and Richard Bulliet analyzes the wheels' invention and its evolution. Their analysis supports a new theory that copper miners from the Carpathian Mountains in southeastern Europe may have invented the wheel. However, the study also recognizes that the wheel's evolution occurred incrementally over time — and likely through considerable trial and error. The findings suggest that the original developers of the wheel benefited from uniquely favorable environmental conditions that augmented their human ingenuity. The study, published in the journal Royal Society Open Science, has gained the worldwide attention of experts and more than 58 media outlets, including Popular Mechanics, Interesting Engineering, and National Geographic en Español.
"The way technology evolves is very complex. It's never as simple as somebody having an epiphany, going to their lab, drawing up a perfect prototype, and manufacturing it — and then end of story," said James. "The evidence, even before our theory, suggests that the wheel evolved over centuries, across a very broad geographical range, with contributions from many different people, and that's true of all engineering systems. Understanding this complexity and seeing the process as a journey, rather than a moment in time, is one of the main outcomes of our study."
[...] James and his team use computational analysis and design as a forensic tool to learn about the past, studying engineered systems designed by prehistoric people. Computational analysis offers a deeper understanding of how these systems were created.
"We have to interpret clues from ancient societies without a writing system — artifacts like bows and arrows, flutes, or boats — but we need to use additional tools to do this," James explained. "Carbon dating tells us when, but it doesn't tell us how or why. Using solid mechanics and computational modeling to recreate these environments and scenarios that gave rise to these technologies is a potential game-changer."
Their theory suggests that the wheel evolved from simple rollers, which took the form of a series of untethered cylinders, poles, or tree trunks. These rollers were arranged side-by-side in a row on the ground, and the workers would transport their cargo on top of the rollers to avoid the friction caused by dragging. "Over time, the shape of these rollers evolved such that the central portion of the cylinder grew progressively narrower, eventually leaving only a slender axle capped on either end by round discs, which we now refer to as wheels," James explained.
The researchers derived a series of mathematical equations that describe the physics of the rollers. They then created a computer algorithm that simulates the progression from roller to wheel-and-axle by repeatedly solving these equations.
"Our investigation also indicates that environmental conditions played a key role in this evolutionary process," he said. "Previous studies have shown that rollers are only effective under very specific circumstances. They require flat, firm, and level terrain, as well as a straight path. Neolithic mines, with their human-made tunnels and covered terrain would have offered an environment highly conducive to roller-based transport."
Journal Reference:Alacoque, L. R., Bulliet, R. W., & James, K. A. (2024). Reconstructing the invention of the wheel using computational structural analysis and Design. Royal Society Open Science, 11(10). https://doi.org/10.1098/rsos.240373