Stories
Slash Boxes
Comments

SoylentNews is people

Log In

Log In

Create Account  |  Retrieve Password


Site News

Join our Folding@Home team:
Main F@H site
Our team page


Funding Goal
For 6-month period:
2022-07-01 to 2022-12-31
(All amounts are estimated)
Base Goal:
$3500.00

Currently:
$438.92

12.5%

Covers transactions:
2022-07-02 10:17:28 ..
2022-10-05 12:33:58 UTC
(SPIDs: [1838..1866])
Last Update:
2022-10-05 14:04:11 UTC --fnord666

Support us: Subscribe Here
and buy SoylentNews Swag


We always have a place for talented people, visit the Get Involved section on the wiki to see how you can make SoylentNews better.

How long have you had your current job?

  • less than 1 year
  • 1 year up to 2 years
  • 2 years up to 3 years
  • 3 years up to 5 years
  • 5 years up to 10 years
  • 10 or more years
  • work is for suckers
  • I haven't got a job you insensitive clod!

[ Results | Polls ]
Comments:116 | Votes:437

posted by janrinok on Thursday August 21, @08:49PM   Printer-friendly

Uncovering the fraudsters and their schemes responsible for polluting the scientific literature:

The extent of fraudulent papers in the scientific literature is growing exponentially and goes far beyond isolated events, new research has revealed. 'You can see a scenario in a decade or less where you could have more than half of [studies being published] each year being fraudulent,' says Reese Richardson, one of the study's key researchers at Northwestern University, US.

Scientific integrity and honesty are key pillars of science and research, yet in recent years large organisations – known as paper mills – have been threatening these ideals by facilitating systemic scientific fraud.

Each year, paper mills produce and sell thousands of often poor-quality or fake scientific studies, sometimes using entirely made-up or doctored data and images. Growing pressure for researchers to 'publish or perish' has contributed to an increasingly competitive scientific community, leading some to turn to these businesses to pad their publication record. 'It becomes sort of a snowball situation where the optimum strategy is you have to start to cheat in order to win out,' says Richardson.

Previous studies have exposed paper mills using specific cases, rather than looking at the issue systematically. To gain a sense of the scale of the problem, the team, led by Luís Nunes Amaral, analysed a collection of paper-milled manuscripts discovered by science sleuths and found that the problem is even worse and more widespread than thought. 'There are networks of individuals and entities that are producing scientific fraud at scale,' says Amaral.

Analysis of 2213 articles flagged for image duplication – a hallmark of fraudulent science – revealed that such articles are published in large batches. The researchers also suggest that paper mills cooperate with brokers, a small number of dishonest editors who control some of the publishing decisions at select journals. Even a small number of brokers can lead to the publication of huge numbers of counterfeit articles, with publisher Frontiers recently announcing that they are retracting a batch of 122 articles.

Despite efforts to curb paper mills, Amaral and his team found that suspected paper-milled articles are growing exponentially, doubling every 1.5 years. In comparison, the total number of all publications is only doubling every 15 years.

'I'm not sure that [the researchers] are being clear enough why this is happening. It's about money and the need for publications. [But] in scientific research those shouldn't be the key factors,' says Jana Christopher, an expert in image integrity who works for the publisher FEBS Press.

The team's analysis of articles published by Plos One – a peer-reviewed open-access mega-journal that discloses the handling editor – identified 45 editors who accepted articles that were more likely to be retracted or receive post-publication comments on PubPeer than chance would predict. These individuals comprised just 0.25% of the journal's editors, handling 1.3% of Plos One articles published in 2024, yet they oversaw 30.2% of the journal's retracted articles.

Network analysis revealed that these editors send most of their submissions to one another over other editors. The team found the same trend when analysing data from 10 Hindawi journals – another open-access publisher – and the Institute of Electronics and Electrical Engineers' (IEEE) conference proceedings.

These paper mills continue to churn out fraudulent papers and few fraudsters are ever caught and shut down. As a result, the scientific community has become increasingly concerned by paper mills, leading to efforts to curb their influence. Consequentially, paper mills must now adapt to guarantee publication for their clients, 'hopping' between journals as they become de-indexed or fall out of favour with customers.

Amaral and his team found evidence of a fraudulent publishing service – known as the Academic Research and Development Association (ARDA) – that demonstrates this behaviour. The researchers found that the list of the association's journals evolves to continue guaranteed publication for customers, with it changing in direct response to de-indexing by academic databases such as Scopus or Web of Science. While this is just one case, the team notes that the rapid rise in the number of papers some journals publish is consistent with 'hopping', highlighting that this is a widespread practice.

Fraudulent scientific activity is not consistent within each scientific field, with the researchers highlighting that fraudsters preferentially select certain sub-fields over others. The team found that within six sub-fields of RNA biology the retraction rate – a sign of the number of fraudulent articles – was inconsistent. 'Some subfields of RNA [biology] are now so polluted by fraudulent research that it essentially becomes impossible for legitimate researchers to even enter the field,' says Amaral.

The solution to this issue remains divisive. Current strategies involve using artificial intelligence and tools to identify non-standard phrases and duplicate or doctored images, post-publication peer review and retracting fraudulent articles after publication. Christopher notes that 'it's going to be increasingly difficult to distinguish between genuine research and low quality or made up content', especially as the number of fraudulent articles increases.

Amaral believes that the situation needs collective action from institutions, such as the learned societies and national academies. 'You cannot have a system where you are trying to detect fraud after it's created. You actually have to prevent people from putting these things into the system,' he says.

He adds that restricting researchers engaging with paper mills and fraudulent papers would be beneficial and create a fairer scientific community. However, Richardson believes that penalising the clients of paper mills is not the answer and calls for systemic change. 'We need to make the scientific [community] much less competitive, fairer and more equal. Inequality, locally and globally, has led to this problem,' he says.

Journal Reference: The entities enabling scientific fraud at scale are large, resilient, and growing rapidly, (DOI: 10.1073/pnas.2420092122)


Original Submission

posted by janrinok on Thursday August 21, @04:09PM   Printer-friendly

Physics of badminton's new killer spin serve:

Serious badminton players are constantly exploring different techniques to give them an edge over opponents. One of the latest innovations is the spin serve, a devastatingly effective method in which a player adds a pre-spin just before the racket contacts the shuttlecock (aka the birdie). It's so effective—some have called it "impossible to return" [YouTube 4:15 --JE] —that the Badminton World Federation (BWF) banned the spin serve in 2023, at least until after the 2024 Paralympic Games in Paris.

The sanction wasn't meant to quash innovation but to address players' concerns about the possible unfair advantages the spin serve conferred. The BWF thought that international tournaments shouldn't become the test bed for the technique, which is markedly similar to the previously banned "Sidek serve." The BWF permanently banned the spin serve earlier this year. Chinese physicists have now teased out the complex fundamental physics of the spin serve, publishing their findings in the journal Physics of Fluids.

Shuttlecocks are unique among the various projectiles used in different sports due to their open conical shape. Sixteen overlapping feathers protrude from a rounded cork base that is usually covered in thin leather. The birdies one uses for leisurely backyard play might be synthetic nylon, but serious players prefer actual feathers.

Those overlapping feathers give rise to quite a bit of drag, such that the shuttlecock will rapidly decelerate as it travels and its parabolic trajectory will fall at a steeper angle than its rise. The extra drag also means that players must exert quite a bit of force to hit a shuttlecock the full length of a badminton court. Still, shuttlecocks can achieve top speeds of more than 300 mph. The feathers also give the birdie a slight natural spin around its axis, and this can affect different strokes. For instance, slicing from right to left, rather than vice versa, will produce a better tumbling net shot.

The cork base makes the birdie aerodynamically stable: No matter how one orients the birdie, once airborne, it will turn so that it is traveling cork-first and will maintain that orientation throughout its trajectory. A 2015 study examined the physics of this trademark flip, recording flips with high-speed video and conducting free-fall experiments in a water tank to study how its geometry affects the behavior. The latter confirmed that shuttlecock feather geometry hits a sweet spot in terms of an opening inclination angle that is neither too small nor too large. And they found that feather shuttlecocks are indeed better than synthetic ones, deforming more when hit to produce a more triangular trajectory.

While many studies have extensively examined the physics of the shuttlecock's trajectory, the Chinese authors of this latest paper realized that nobody had yet investigated the effects of the spin serve on that trajectory. "We were interested in the underlying aerodynamics," said co-author Zhicheng Zhang of Hong Kong University of Science and Technology. "Moreover, revealing the effects of pre-spin on the trajectory and aerodynamics of a shuttlecock can help players learn the art of delivering a spin serve, and perhaps help players on the other side of the net to return the serve."

So the authors created a digital shuttlecock model based on the commercially available Li-Ning D8 feather shuttlecock, treating it as a smooth and rigid object but ignoring surface roughness and feather porosity as variables. Then they ran 3D fluid dynamics simulations under three different conditions: without pre-spin, with a pre-spin in the direction of the birdie's natural spin, and with a pre-spin in the opposite direction of the natural spin.

Zhang et al. were able to identify three distinct phases of the shuttlecock's trajectory: the "turnover" phase (when the birdie flips to its preferred orientation), the oscillation phase, and the stabilization phase. If a player uses a pre-spin in the opposite direction of the natural spin, this prolongs the oscillation phase, producing a "dip and sway" pattern. The authors attribute this to a high-pressure region that forms on the side facing the flight direction, which produces a larger decay in the birdie's velocity in the horizontal direction. The oscillation also produces a significant variation in pressure on the shuttlecock's feathers.

The authors acknowledge that different shuttlecock shapes could alter the trajectory and orientation results and plan to study different configurations in the future. They also hope to conduct motion capture studies of various badminton serves, including the spin serve, that they hope will help badminton players further refine their serving skills.

Journal Reference:
Shuttlecock trajectory during spin serves, (DOI: 10.1063/5.0275494)


Original Submission

posted by janrinok on Thursday August 21, @11:24AM   Printer-friendly

https://www.bleepingcomputer.com/news/legal/mozilla-warns-germany-could-soon-declare-ad-blockers-illegal/

A recent ruling from Germany's Federal Supreme Court (BGH) has revived a legal battle over whether browser-based ad blockers infringe copyright, raising fears about a potential ban of the tools in the country.

The case stems from online media company Axel Springer's lawsuit against Eyeo - the maker of the popular Adblock Plus browser extension.

Axel Springer says that ad blockers threaten its revenue generation model and frames website execution inside web browsers as a copyright violation.

This is grounded in the assertion that a website's HTML/CSS is a protected computer program that an ad blocker intervenes in the in-memory execution structures (DOM, CSSOM, rendering tree), this constituting unlawful reproduction and modification.

Previously, this claim was rejected by a lower-level court in Hamburg, but a new ruling by the BGH found the earlier dismissal flawed and overturned part of the appeal, sending the case back for examination.

Mozilla's Senior IP & Product Counsel, Daniel Nazer, delivered a warning last week, noting that due to the underlying technical background of the legal dispute, the ban could also impact other browser extensions and hinder users' choices.

"There are many reasons, in addition to ad blocking, that users might want their browser or a browser extension to alter a webpage," Nazer says, explaining that some causes could stem from the need "to improve accessibility, to evaluate accessibility, or to protect privacy."

As per BGH's ruling, Springer's argument needs to be re-examined to determine if DOM, CSS, and bytecode count as a protected computer program and whether the ad blocker's modifications are lawful.

"It cannot be excluded that the bytecode, or the code generated from it, is protected as a computer program, and that the ad blocker, through modification or modifying reproduction, infringed the exclusive right thereto," reads BGH's statement (automated translation).

While ad blockers haven't been outlawed, Springer's case has been revived now, and there's a real possibility that things may take a different turn this time.

Mozilla noted that the new proceedings could take up to a couple of years to reach a final conclusion. As the core issue is not settled, there is a future risk of extension developers to be held liable for financial losses.

Mozilla explains that, in the meantime, the situation could cause a chilling effect on browser users' freedom, with browser developers locking down their apps further, and extension developers limiting the functionality of their tools to avoid legal troubles.


Original Submission

posted by jelizondo on Thursday August 21, @06:38AM   Printer-friendly

If AI takes most of our jobs, money as we know it will be over. What then?:

[Disclosure statement: Ben Spies-Butcher is co-director of the Australian Basic Income Lab, a research collaboration between Macquarie University, University of Sydney and Australian National University.]

It's the defining technology of an era. But just how artificial intelligence (AI) will end up shaping our future remains a controversial question.

For techno-optimists, who see the technology improving our lives, it heralds a future of material abundance.

That outcome is far from guaranteed. But even if AI's technical promise is realised – and with it, once intractable problems are solved – how will that abundance be used?

We can already see this tension on a smaller scale in Australia's food economy. According to the Australian government, we collectively waste around 7.6 million tonnes of food a year. That's about 312 kilograms per person.

At the same time, as many as one in eight Australians are food-insecure, mostly because they do not have enough money to pay for the food they need.

What does that say about our ability to fairly distribute the promised abundance from the AI revolution?

As economist Lionel Robbins articulated when he was establishing the foundations of modern market economics, economics is the study of a relationship between ends (what we want) and scarce means (what we have) which have alternative uses.

Markets are understood to work by rationing scarce resources towards endless wants. Scarcity affects prices – what people are willing to pay for goods and services. And the need to pay for life's necessities requires (most of) us to work to earn money and produce more goods and services.

The promise of AI bringing abundance and solving complex medical, engineering and social problems sits uncomfortably against this market logic.

It is also directly connected to concerns that technology will make millions of workers redundant. And without paid work, how do people earn money or markets function?

It is not only technology, though, that causes unemployment. A relatively unique feature of market economies is their ability to produce mass want, through unemployment or low wages, amid apparent plenty.

As economist John Maynard Keynes revealed, recessions and depressions can be the result of the market system itself, leaving many in poverty even as raw materials, factories and workers lay idle.

In Australia, our most recent experience of economic downturn wasn't caused by a market failure. It stemmed from the public health crisis of the pandemic. Yet it still revealed a potential solution to the economic challenge of technology-fuelled abundance.

Changes to government benefits – to increase payments, remove activity tests and ease means-testing – radically reduced poverty and food insecurity [PDF], even as the productive capacity of the economy declined.

Similar policies were enacted globally [PDF], with cash payments introduced in more than 200 countries. This experience of the pandemic reinforced growing calls to combine technological advances with a "universal basic income".

This is a research focus of the Australian Basic Income Lab, a collaboration between Macquarie University, the University of Sydney and the Australian National University.

If everyone had a guaranteed income high enough to cover necessities, then market economies might be able to manage the transition, and the promises of technology might be broadly shared.

When we talk about universal basic income, we have to be clear about what we mean. Some versions of the idea would still leave huge wealth inequalities.

My Australian Basic Income Lab colleague, Elise Klein, along with Stanford Professor James Ferguson, have called instead for a universal basic income designed not as welfare, but as a "rightful share".

They argue the wealth created through technological advances and social cooperation is the collective work of humanity and should be enjoyed equally by all, as a basic human right. Just as we think of a country's natural resources as the collective property of its people.

These debates over universal basic income are much older than the current questions raised by AI. A similar upsurge of interest in the concept occurred in early 20th-century Britain, when industrialisation and automation boosted growth without abolishing poverty, instead threatening jobs.

Even earlier, Luddites sought to smash new machines used to drive down wages. Market competition might produce incentives to innovate, but it also spreads the risks and rewards of technological change very unevenly.

Rather than resisting AI, another solution is to change the social and economic system that distributes its gains. UK author Aaron Bastani offers a radical vision of "fully automated luxury communism".

He welcomes technological advances, believing this should allow more leisure alongside rising living standards. It is a radical version of the more modest ambitions outlined by the Labor government's new favourite book – Abundance.

Bastani's preferred solution is not a universal basic income. Rather, he favours universal basic services.

Instead of giving people money to buy what they need, why not provide necessities directly – as free health, care, transport, education, energy and so on?

Of course, this would mean changing how AI and other technologies are applied – effectively socialising their use to ensure they meet collective needs.

Proposals for universal basic income or services highlight that, even on optimistic readings, by itself AI is unlikely to bring about utopia.

Instead, as Peter Frase outlines, the combination of technological advance and ecological collapse can create very different futures, not only in how much we collectively can produce, but in how we politically determine who gets what and on what terms.

The enormous power of tech companies run by billionaires may suggest something closer to what former Greek finance minister Yanis Varoufakis calls "technofeudalism", where control of technology and online platforms replaces markets and democracy with a new authoritarianism.

Waiting for a technological "nirvana" misses the real possibilities of today. We already have enough food for everyone. We already know how to end poverty. We don't need AI to tell us.

Journal Reference:
Marguerit, David. Augmenting or Automating Labor? The Effect of AI Development on New Work, Employment, and Wages, (DOI: 10.2139/ssrn.5169611)
The future of work for young people – early occupational pathways and the risk of automation in Australia, (DOI: 10.1080/13676261.2022.2112161)


Original Submission

posted by hubie on Thursday August 21, @01:52AM   Printer-friendly

Designer, anthropologist, and developer, Maggie Appleton has written a treatise on how chatbot sycophancy and passivity undermine the Enlightenment by undermining the original values of active intellectual engagement, skeptical inquiry, and challenging received wisdom.

As an expert on the Enlightenment, he's clearly been roped into developing an opinion on whether we're in an AI-fuelled "second Enlightenment."

Remember the first Enlightenment? That ~150 year period between 1650-1800 that we retroactively constructed and labelled as a unified historical event? The age of reason. Post-scientific revolution. The main characters are a bunch of moody philosophers like Locke, Descartes, Hume, Kant, Montesquieu, Rousseau, Diderot, and Voltaire. The vibe is reading pamphlets by candlelight, penning treatises, sporting powdered wigs and silk waistcoats, circulating ideas in Parisian salons and London coffee houses, sipping laudanum, and retreating to the seaside when you contracted tuberculosis. Everyone is big on ditching tradition, questioning political and religious authority, embracing scepticism, and educating the masses.

Anyway, Professor Bell's thesis is that our current AI chatbots contradict and undermine the original Enlightenment values. Values that are implicitly sacred in our modern culture; active intellectual engagement, sceptical inquiry, and challenging received wisdom.

Previously:
(2025) Book Documents the Rise and Fall of the Concept of the Private Life


Original Submission

posted by hubie on Wednesday August 20, @09:08PM   Printer-friendly
from the where-are-my-backups? dept.

https://www.bleepingcomputer.com/news/microsoft/microsoft-august-security-updates-break-windows-recovery-reset/

Microsoft has confirmed that the August 2025 Windows security updates are breaking reset and recovery operations on systems running Windows 10 and older versions of Windows 11.

"After installing the August 2025 Windows security update [..] on any of the client versions mentioned below in the 'Affected platforms' section, attempts to reset or recover the device might fail," the company said in a new Windows release health update.

Installing this month's security updates will cause issues for users who want to reinstall their system while keeping their files using the Reset my PC feature, or reinstall it and keep their files, apps, and settings using the Fix problems using Windows Update tool.

The known issue may also impact users who want to remotely reset devices using the RemoteWipe configuration service provider (RemoteWipe CSP).

According to Redmond, the bug only impacts client platforms after installing the following updates, including:

  • Windows 11 23H2 and Windows 11 22H2 (KB5063875),
  • Windows 10 22H2, Windows 10 Enterprise LTSC 2021, Windows 10 IoT Enterprise LTSC 2021 (KB5063709),
  • Windows 10 Enterprise LTSC 2019, Windows 10 IoT Enterprise LTSC 2019 (KB5063877).

The company is currently working on a fix for this known issue, which will be delivered via out-of-band updates for all impacted platforms over the coming days.


Original Submission

posted by hubie on Wednesday August 20, @04:22PM   Printer-friendly
from the slooooooooooowtv dept.
posted by hubie on Wednesday August 20, @11:35AM   Printer-friendly
from the next-time-do-Belgium-beer dept.

How Chefs and Scientists Are Using Kombucha and Kimchi to Study Microbiology:

Scientists and chefs have collaborated on a new study that demonstrates how fermented foods can be used to drive participatory science projects that both engage the public and advance our understanding of microbial ecology. The study focused on working with food experts and the public to examine the microbial communities associated with kombucha, kimchi and chow chow.

"One of the things we demonstrated here is that this approach works, it's relatively inexpensive, and it is easy to scale," says Erin McKenney, co-lead author of a paper on the work and an assistant professor of applied ecology at North Carolina State University.

"This proof-of-concept study focused on questions that have been answered using conventional approaches, allowing us to determine that the findings from our approach are consistent with established findings," McKenney says. "But now that we have that proof of concept, we can begin using this technique to address additional questions."

For the study, the researchers hosted three participatory science workshops at the North Carolina Museum of Natural Sciences in which scientists and chefs instructed K-12 teachers and members of the public on how to make fermented foods. Each workshop focused on a specific fermented food: kimchi, chow chow and kombucha.

While workshop participation varied, the researchers ended up with 18-23 samples of each fermented product.

Liquid samples were taken from each of the fermented foods at different points, to see how the microbial communities in each sample changed as the fermentation progressed. Samples were taken from chow chow and kimchi on days 3 and 10; kombucha samples were taken on days 4 and 8.

The researchers conducted DNA sequencing of each sample to get a snapshot of both the diversity and overall abundance of microbes in the sample.

"The findings were interesting," says Hanna Berman, co-lead author of the paper and a postdoctoral researcher at NC State. "For example, we found kimchi made with cabbage fosters very different microbial communities compared to kimchi made with daikon radishes. In kombucha, on the other hand, there were no microbial species associated specifically with green tea versus black tea – which come from the same species of plant but are processed differently.

"These findings are in line with previous studies, and it was exciting to see that we were able to answer scientific questions accurately using methods that are also effective at engaging the public," Berman says.

[...] "We included the recipes that were used for the study in the paper, so if anyone wants to try their hand at making chow chow, kombucha or kimchi, that could serve as a good starting point," says Roche.

Journal Reference: Berman HL, McKenney EA, Roche CE, et al. Cooking-class style fermentation as a context for co-created science and engagement. [OPEN] Microbiol Spectr 0:e02660-24. https://doi.org/10.1128/spectrum.02660-24


Original Submission

posted by janrinok on Wednesday August 20, @06:48AM   Printer-friendly

Sni5Gect research crew targets sweet spot during device / network handshake pause

https://www.theregister.com/2025/08/18/sni5gect/
https://archive.ph/buKXp

Security [scientists] have released an open source tool for poking holes in 5G mobile networks, claiming it can do up- and downlink sniffing and a novel connection downgrade attack - plus "other serious exploits" they're keeping under wraps, for now.

"Sni5Gect [is] a framework that sniffs messages from pre-authentication 5G communication in real-time," the researchers from the Singapore University of Technology and Design explained of their work, presented this week at the 34th USENIX security bash, "and injects targeted attack payload in downlink communication towards the UE [User Equipment, i.e. a phone]."

Designed to take advantage of the period just after a device connects to a 5G network and is still in the process of handshaking and authentication - which, the team points out, can occur when entering or leaving a lift, disembarking a plane and turning aeroplane mode off, or even passing through a tunnel or parking garage - Sni5Gect takes advantage of unencrypted messaging between the base station and a target handset.

"Since messages exchanged between the gNB [Next-Generation Node B, the base station] and the UE are not encrypted before the security context is established (pre-authentication state)," the researchers wrote, "an attacker does not require knowledge of the UE's credentials to sniff uplink/downlink [traffic] nor to inject messages without integrity protection throughout the UE connection procedure."

That's a flaw, and one the framework is designed to exploit. The team's testing showed it capable of sniffing both uplink and downlink traffic with more than 80 percent accuracy, at ranges of up to 20 meters between an off-the-shelf software-defined radio and the target mobile. For packet injection, the success rate varied between 70-90 percent - and delivered, among other things, proof of a novel downgrade attack by which a ne'er-do-well equipped with Sni5Gect could downgrade a connection from 5G to 4G to reduce its security and carry out further surveillance and attacks.

As Sni5Gect works in real-time, its creators have claimed, and can inject attack payloads, including multi-stage attacks, based on protocol state, it's suited to fingerprinting, denial-of-service attacks, and downgrading.

"To the best of our knowledge," they wrote in their paper's introduction [PDF], "Sni5Gect is the first framework that empowers researchers with both over-the-air sniffing and stateful injection capabilities, without requiring a rogue gNB [base station]."

Given the scope of the tool, the researchers communicated with the GSM Association (GSMA), the organization responsible for the 5G standard, prior to presenting their findings; the GSMA confirmed their discovery of the novel downgrade attack, which leans on the tool's ability to inject dynamically modified messages at different stages of the connection process, and assigned it CVD-2024-0096 under its common vulnerabilities and disclosures programme.
Some features limited to trusted pen testers

Not all of the capabilities claimed in the team's paper have been fully disclosed, however. The team has kept private "other serious exploits leveraging the framework," in order to "avoid abusing SNI5Gect to launch attacks against people's smartphones[s]." These exploits, it is claimed, will be made available only to "trusted institutions like universities and research institutions" upon application and verification of their legitimate interest.

The Sni5Gect framework itself is available in full, alongside the exploits discussed in the team's paper, on GitHub, under the GNU Affero General Public Licence 3, with the disclaimer that it's "for research and educational purposes only" and that use on live networks "may violate local laws and regulations."

More information, including a link to the open-access paper, is available on the project website.


Original Submission

posted by janrinok on Wednesday August 20, @02:06AM   Printer-friendly
from the Here-we-go-again dept.

The Guardian recently published a couple of articles about digital streaming services and piracy. The first one reads:

With a trip to Florence booked, all I want is to rewatch Medici. The 2016 historical drama series tells of the rise of the powerful Florentine banking dynasty, and with it, the story of the Renaissance. Until recently, I could simply have gone to Netflix and found it there, alongside a wide array of award-winning and obscure titles. But when I Google the show in 2025, the Netflix link only takes me to a blank page. I don't see it on HBO Max, Disney+, Apple TV+, or any of the smaller streaming platforms. On Amazon Prime I am required to buy each of the three seasons or 24 episodes separately, whereupon they would be stored in a library subject to overnight deletion. Raised in the land of The Pirate Bay, the Swedish torrent index, I feel, for the first time in a decade, a nostalgia for the high seas of digital piracy. And I am not alone.

For my teenage self in the 00s, torrenting was the norm. Need the new Coldplay album on your iPod? The Pirate Bay. The 1968 adaptation of Romeo and Juliet? The Pirate Bay. Whatever you needed was accessible with just a couple of clicks. But as smartphones proliferated, so did Spotify, the music streaming platform that is also headquartered in Sweden. The same Scandinavian country had become a hub of illegal torrenting and simultaneously conjured forth its solution.

"Spotify would never have seen the light of day without The Pirate Bay," Per Sundin, the then managing director of Universal Music Sweden, reflected in 2011 [in Swedish]. But music torrenting died out as we all either listened with ads or paid for the subscription. And when Netflix launched in Sweden in late 2012, open talk of torrenting moving images also stopped. Most of the big shows and a great collection of award-winning films could all be found for just 79 SEK (£6) a month. Meanwhile, the three founders of The Pirate Bay were arrested and eventually jailed. Pirating faded into the history books as far as I was concerned.

A decade and a half on from the Pirate Bay trial, the winds have begun to shift. On an unusually warm summer's day, I sit with fellow film critics by the old city harbour, once a haven for merchants and, rumour has it, smugglers. Cold bigstrongs in hand (that's what they call pints up here), they start venting about the "enshittification" of streaming – enshittification being the process by which platforms degrade their services and ultimately die in the pursuit of profit. Netflix now costs upwards of 199 SEK (£15), and you need more and more subscriptions to watch the same shows you used to find in one place.

A fellow film critic confides anonymously: "I never stopped pirating, and my partner also does it if he doesn't find the precise edition he is looking for on DVD." While some people never abandoned piracy, others admit they have recently returned – this time turning to unofficial streaming platforms. One commonly used app is legal but can, through community add-ons, channel illicit streams. "Downloading is too difficult. I don't know where to start," says one film viewer. "The shady streams might bombard me with ads, but at least I don't have to worry about getting hacked or caught."

According to London‑based piracy monitoring and content‑protection firm MUSO, unlicensed streaming is the predominant source of TV and film piracy, accounting for 96% [PDF] in 2023. Piracy reached a low in 2020, with 130bn website visits. But by 2024 that number had risen to 216bn. In Sweden, 25% of people [PDF] surveyed reported pirating in 2024, a trend mostly driven by those aged 15 to 24. Piracy is back, just sailing under a different flag.

"Piracy is not a pricing issue," Gabe Newell, the co-founder of Valve, the company behind the world's largest PC gaming platform, Steam, observed in 2011. "It's a service issue." Today, the crisis in streaming makes this clearer than ever. With titles scattered, prices on the rise, and bitrates throttled depending on your browser, it is little wonder some viewers are raising the jolly roger again. Studios carve out fiefdoms, build walls and levy tolls for those who wish to visit. The result is artificial scarcity in a digital world that promised abundance.

Whether piracy today is rebellion or resignation is almost irrelevant; the sails are hoisted either way.

A second, related article deals with other aspects of the issues:

In the 2000s, I arrived at university to vast libraries, thousands of strangers and the riches of academic life – plus a gigabit broadband connection that would be used on downloading pirated versions of every piece of entertainment ever made. In between essays, I watched classic movies, listened to vast discographies, and binged the entire run of Buffy the Vampire Slayer. That particular choice might mark this story out as one that belongs firmly in the past, but piracy itself is far from dead.

We are living in a golden age of streaming. Netflix, Disney+, Amazon Prime Video and Apple TV+ are pumping out award-winning shows. If you have a niche interest, someone is streaming it for you somewhere: Sony's Crunchyroll for anime fans, BFI Player for film buffs, Sky's History Play for those who really like ancient aliens.

But as the new releases keep coming, the bills start growing. If your interests are decidedly mainstream, the basic tiers of the five largest paid-for streaming services in the UK – the aforementioned US giants, plus Sky's Now TV – will cost you almost £40 a month. Drop any one of them, and you will inevitably miss out on the pop culture craze of the month: no Now TV means no The White Lotus; no Disney+ means no Marvel.

This wasn't how it was supposed to be. Piracy was meant to follow the path set by the music industry: where technological change initially enabled new forms of copyright infringement, then spurred rejuvenation, settling into a new equilibrium.

Napster, and then peer-to-peer filesharing, were the innovations that rocked music. Global recorded music sales peaked in 1999, at $25.2bn, then bottomed out 14 years later at barely half that. Illegal downloading wasn't just cheaper than buying CDs, it was also more convenient than traipsing to the high street. But music streaming, arriving with the launch of Spotify, changed everything. Streaming meant instant access and a better user experience than piracy. Where legal downloads peaked at 27% of the industry's total revenue in 2014, last year streaming made up 62% of music revenue, with 2020 seeing the highest earnings since 2003.

"In any phase of technological development, you see rapid changes in the illegal market, which are quicker than the changes in the legal market," says Kieron Sharp, chief executive of the UK anti-piracy group Fact (it of the "You wouldn't steal a car" adverts). "If you don't continually fight the pirates and those stealing your content, it's going to be a bit of a free-for-all."

Netflix's 2013 adaptation of the Michael Dobbs novel [House of Cards] starring Kevin Spacey was the streaming service's first in-house production, and an enormous hit. Winning three Emmys, it suggested a future for the streaming service very different from that of Spotify, still two years from facing its first serious competition in the form of Apple Music. Where music streaming services competed to have the fullest libraries possible, Netflix leaned hard on having exclusive, acclaimed shows. As a business strategy, it paid off. For Netflix, and the other streaming services that followed, the upfront cost of an exclusive show is huge – but so is the incentive for new users to hop on board.

That is until the system breaks down. Andy Chatterley, chief executive of the piracy analytics firm Muso, thinks this began in the pandemic: "In 2020 there was this massive increase in piracy at the start of the pandemic, where everyone suddenly found themselves working from home. That's unusual – we normally see big spikes up on things like 1 January, holidays, but the average is smooth."

But if the pandemic and a fragmented market are driving people to piracy, it is having less of an impact on what they're watching. Muso's data shows that the most popular pirated shows in the UK in July included a few that are available on free-to-air TV, such as Rick and Morty and Love Island. Yes, Disney+ exclusives such as Loki and Star Wars: The Bad Batch are in the Top 10, as is the CW hit Superman & Lois, which is still yet to be legally available in the UK. But the data suggests people are choosing to pirate first, and what to watch second. That's not surprising, Chatterley says, given the ease of modern piracy. "When people actually apply piracy, they're completely satisfied in their viewing experience. They're using a streaming platform with extremely sophisticated user experience."

And after just a few years of streaming, we now have streaming fatigue: too many different services and not enough time. The problem is particularly acute in the US, where many big broadcasters have brought out their own streaming services – HBO Max, Paramount+ and NBC's Peacock – each with monthly fees to pay. Analysts are predicting a wave of failures and consolidation over the next few years, likely to drive even more piracy.

When there are things to pay for, there will always be people looking for ways to get them for nothing. The question now is whether, having come so close to being pushed underground, piracy could rear its head not as the only option for thieves but as the simpler alternative for everyone.

So what is your take on the matter? Do you subscribe to multiple streaming services? Have you ever "rented" a movie on YouTube or another digital outlet? Is piracy a way to defend your God-given right to watch movies and series against greedy Hollywood?


Original Submission

posted by jelizondo on Tuesday August 19, @09:21PM   Printer-friendly

Attorneys General, HCA Settle Over Nurse Training Repayment Provisions:

California Attorney General Rob Bonta has announced a settlement with HCA Healthcare Inc. and Health Trust Workforce Solutions LLC (together, HCA), resolving allegations that HCA unlawfully required entry-level nurse employees to repay the cost of a mandatory training program if they did not remain employed with the company for two years.

One of the nation's largest hospital systems, for-profit HCA has several hospitals in California.

Today's settlement is the result of a years-long investigation by attorneys general in California, Colorado and Nevada, working in partnership with the Biden Administration's Consumer Financial Protection Bureau. The states' investigation found that HCA violated California employment and consumer protection laws as well as the federal consumer financial protection laws by using training repayment agreement provisions (TRAPs) in nurses' employment contracts. These TRAPs are a form of employer-driven debt, or debt obligations incurred by individuals through employment arrangements.

Here is how the California attorney general' s office described HCA's nursing training program and the settlement: As a condition of employment at an HCA hospital, HCA generally requires that entry-level nurse employees complete the Specialty Training Apprenticeship for Registered Nurses (StaRN) Residency Program. The company has advertised StaRN as an avenue for entry-level RNs to get the education and training they need to land their first nursing jobs in an acute-care hospital setting, although StaRN does not provide nurses with education or training necessary for licensure as an RN.

Until the spring of 2023, HCA required that RNs hired through the StaRN program at facilities in several states, including California, sign a TRAP agreement in their new-hire paperwork. The TRAPs purported to require nurses to repay a prorated portion of the StaRN "value" if they did not work for HCA for two years. If a nurse left HCA before the end of the two-year period, then the TRAP loan was typically sent to debt collection.

HCA imposed TRAPs on nurses who worked at their five hospitals in California: Good Samaritan Hospital in San Jose; Regional Medical Center in San Jose; Los Robles Regional Medical Center in Thousand Oaks; Riverside Community Hospital in Riverside; and West Hills Hospital & Medical Center in West Hills (no longer under HCA ownership).

Under California's settlement, HCA will:
• Pay approximately $83,000 to provide full restitution to California nurses who made payments on their TRAP debt to HCA.
• Be prohibited from imposing TRAPs on nurse employees and attempting to collect on the approximately $288,000 in outstanding TRAP debt incurred by California nurses who signed TRAPs with HCA.
• Pay $1,162,900 in penalties to California.
• 
HCA will pay a total of $2,900,000 in penalties under settlements filed in California, Colorado, and Nevada today.

"All too often, employer-driven debt forces workers to remain in jobs that they would otherwise leave. That's not just wrong; it's illegal under state and federal law. Workers must be able to pursue better pay and better working conditions — not be trapped by debt that their employer makes them take out," said Attorney General Bonta in a statement. "I'm grateful to my fellow attorneys general in Colorado and Nevada for their partnership. With today's settlement, we are taking a stand for workers in our states by holding HCA Healthcare accountable — ensuring that all affected nurses are made whole financially, that the company pays a penalty for its wrongdoing, and that the company is subject to strong injunctive terms to deter future misconduct."

Nursing unions applauded the settlement. "California Nurses Association and our national union, National Nurses United, want to thank Attorney General Bonta for his leadership in addressing this growing trend of employers, such as HCA, using debt repayment contracts to lock nurses and other workers into jobs," said Sandy Reding, R.N., president of the California Nurses Association, in a statement. "HCA, the largest for-profit hospital system in the country, has a shameful track record of using predatory stay-or-pay contracts, or Training Repayment Agreement Provisions (TRAPS), which handcuff nurses to our employers through the threat of serious financial consequences or ruin. No nurses and no other workers should be locked into a job under the weight of debt to their employer."


Original Submission

posted by janrinok on Tuesday August 19, @07:23PM   Printer-friendly

Nothing much to say that hasn't already been said. We need submissions please.

posted by jelizondo on Tuesday August 19, @04:35PM   Printer-friendly

Politico reports on a hack affecting Federal Courts in the USA:

The identities of confidential court informants are feared compromised in a series of breaches across multiple U.S. states.

The electronic case filing system used by the federal judiciary has been breached in a sweeping cyber intrusion that is believed to have exposed sensitive court data across multiple U.S. states, according to two people with knowledge of the incident.

The hack, which has not been previously reported, is feared to have compromised the identities of confidential informants involved in criminal cases at multiple federal district courts, said the two people, both of whom were granted anonymity because they were not authorized to speak publicly about the hack.

The Administrative Office of the U.S. Courts — which manages the federal court filing system — first determined how serious the issue was around July 4, said the first person. But the office, along with the Justice Department and individual district courts around the country, is still trying to determine the full extent of the incident.

It is not immediately clear who is behind the hack, though nation-state-affiliated actors are widely suspected, the people said. Criminal organizations may also have been involved, they added.

The Administrative Office of the U.S. Courts declined to comment. Asked whether it is investigating the incident, the FBI referred POLITICO to the Justice Department. The Justice Department did not immediately reply to a request for comment.

It is not immediately clear how the hackers got in, but the incident is known to affect the judiciary's federal core case management system, which includes two overlapping components: Case Management/Electronic Case Files, or CM/ECF, which legal professionals use to upload and manage case documents; and PACER, a system that gives the public limited access to the same data.

In addition to records on witnesses and defendants cooperating with law enforcement, the filing system includes other sensitive information potentially of interest to foreign hackers or criminals, such as sealed indictments detailing non-public information about alleged crimes, and arrests and search warrants that criminal suspects could use to evade capture.
Chief judges of the federal courts in the 8th Circuit — which includes Arkansas, Iowa, Minnesota, Missouri, Nebraska, North Dakota, and South Dakota — were briefed on the hack at a judicial conference last week in Kansas City, said the two people. It is unclear who delivered the brief, though the Director of the Administrative Office of the U.S. Courts, Judge Robert J. Conrad, Jr., was in attendance, per the first person. Supreme Court Justice Brett Kavanaugh was also in attendance but didn't address the breach in his remarks.

Staff for Conrad, a district judge in the Western District of North Carolina, declined to comment.

The hack is the latest sign that the federal court filing system is struggling to keep pace with a rising wave of cybersecurity threats.

Michael Scudder, who chairs the Committee on Information Technology for the federal courts' national policymaking body, told the House Judiciary Committee in June that CM/ECF and Pacer are "outdated, unsustainable due to cyber risks, and require replacement."
He also said that because the federal Judiciary holds such sensitive information, it faces "unrelenting security threats of extraordinary gravity."

As of July 2022, the Justice Department was investigating another hack of the federal court system that then-House Judiciary Committee Chair

Jerrold Nadler (D-N.Y.) described as "startling." The incident involved three foreign hacking groups and dated back to early 2020, Nadler also said. It is not clear who the foreign hackers were or whether these incidents are connected.
"It's the first time I've ever seen a hack at this level," said the first of the two people, who has spent more than two decades on the federal judiciary.

The second person said that roughly a dozen court dockets were tampered with in one court district as a result of the hack. The first person was not aware of any tampering but said it was theoretically possible.

The incident does not appear to have exposed the most highly protected federal court witnesses, since the real identities of those thought to face exceptional risk for cooperating are held on separate systems maintained by the Justice Department, according to the first person.
During his testimony before the House Judiciary Committee, Scudder said that replacing CM/ECF and PACER was a "top priority" for the federal judiciary, but that developing a more modernized system would have to "be developed and rolled out on an incremental basis."

He also called CM/ECF and Pacer the "backbone system federal courts depend on for mission-critical, day-to-day operation."


Original Submission

posted by jelizondo on Tuesday August 19, @11:53AM   Printer-friendly

Charged Drops Don't Splash:

When a droplet falls on a surface, it spreads itself horizontally into a thin lamella. Sometimes — depending on factors like viscosity, impact speed, and air pressure — that drop splashes, breaking up along its edge into myriad smaller droplets. But a new study finds that a small electrical charge is enough to suppress a drop's splash, as seen below.

The drop's electrical charge builds up along the drop's surface, providing an attraction that acts somewhat like surface tension. As a result, charged drops don't lift off the surface as much and they spread less overall; both factors inhibit splashing.* The effect could increase our control of droplets in ink jet printing, allowing for higher resolution printing.

*Note that this only works for non-conductive surfaces. If the surface is electrically conductive, the charge simply dissipates, allowing the splash to occur as normal.

Journal Reference:
Fanfei Yu, Aaron D. Ratschow, Ran Tao, et al. Why Charged Drops Do Not Splash, Physical Review Letters (DOI: 10.1103/PhysRevLett.134.134001)


Original Submission

posted by hubie on Tuesday August 19, @07:05AM   Printer-friendly

3D printing just went there:

Ever since the popularity of 3D-printing skyrocketed in the mid-aughts, people have manufactured everything from chocolate to rocket fuel—and that list now includes a microscopic elephant inside of a living cell (which you can see here). Technology has really leveled up since 2005.

As new biological opportunities for 3D printing keep emerging, a team of researchers—from the J. Stefan Institute, University of Ljubljana, and CENN Nanocenter in Slovenia—have found a way to pull the process off within a cell's cytoplasm. They were successfully able to print not only an elephant, but several other impossibly small structures using a liqiud polymer and a hyperfocused petawatt laser.

"Intracellular 3D printing offers an unprecedented degree of control over the cellular interior, allowing the integration of synthetic structures with native biological functions," the team said in a study recently posted to the preprint server arXiv. "This platform could allow for reconfiguration of cellular architecture, embed logic or mechanical components within the cytoplasm, and design cells with enhanced or entirely new properties."

For this experiment, the team used a negative photoresist (a material that changes when exposed to certain wavelengths of energy), which became insoluble when exposed to light. It was also the most biocompatible formula possible. After a droplet of photoresist was injected into the cell, an object was printed using a process called two-photon photolithography, which involves targeting an area inside the droplet with a laserto create a microstructure. Anything zapped with two photons from the laser hardens, while any remaining photoresist that has not been lasered into a structure dissolves.

Along with the ironically tiny 10-micrometer elephant, the research team printed other microstructures, like barcodes and a sphere that acted as a micro-laser. The former could eventually allow scientists to track what is going on inside individual cells, and give experts much more detailed insight into cellular function than is currently possible. The latter could be produced in various sizes that all emit light slightly differently, labeling cells with specific light signatures.

Surviving cells continued to go on as if nothing had happened. When a few of them divided, the microstructure inside was passed down to one of the daughter cells. Viability was still an issue, however—even the biocompatible photoresist was still somewhat toxic, and injecting liquid polymer damaged the cell membrane and sometimes caused cell death. How likely cells were to survive depended on the type of cell, and in total, about half of the cells that had microstructures printed in them made it through the experiment.

See also:


Original Submission