Stories
Slash Boxes
Comments

SoylentNews is people

Log In

Log In

Create Account  |  Retrieve Password


Site News

Join our Folding@Home team:
Main F@H site
Our team page


Funding Goal
For 6-month period:
2022-07-01 to 2022-12-31
(All amounts are estimated)
Base Goal:
$3500.00

Currently:
$438.92

12.5%

Covers transactions:
2022-07-02 10:17:28 ..
2022-10-05 12:33:58 UTC
(SPIDs: [1838..1866])
Last Update:
2022-10-05 14:04:11 UTC --fnord666

Support us: Subscribe Here
and buy SoylentNews Swag


We always have a place for talented people, visit the Get Involved section on the wiki to see how you can make SoylentNews better.

On my linux machines, I run a virus scanner . . .

  • regularly
  • when I remember to enable it
  • only when I want to manually check files
  • only on my work computers
  • never
  • I don't have any linux machines, you insensitive clod!

[ Results | Polls ]
Comments:40 | Votes:345

posted by janrinok on Sunday November 16, @08:28PM   Printer-friendly

I have been playing YouTube videos, despite the obvious risk to my mental health.

I am using Firefox on Linux and tend to have the "volume control" on my desktop because I use an external sound card to record or drive headphones.

I notice that each time an ad comes on, the volume setting jumps up. Its not that the ad sound level is higher (although it IS).

The actual volume setting is bumped up and remains so after I have skipped the advert.

Is this not illegal interference with my computer? An offence against some law?

[Editor's Comment: Has anyone else witnessed this? I watch Youtube but rarely see any ads in the video's that I watch. As for 'legal advice' - if it is happening we have probably signed our lives away somewhere that permits it. ]


Original Submission

posted by hubie on Sunday November 16, @03:45PM   Printer-friendly
from the you-can-use-it-to-sweeten-your-poop-coffee dept.

https://edition.cnn.com/travel/mad-honey-deli-bal-turkey-black-sea

In the little wooden hut perched high on metal-wrapped stilts, the drone is high, loud and insistent.

With his beekeeping suit on, but hands uncovered, Hasan Kutluata squeezes the bellows on his pine-filled bee smoker. Pale wreaths swirl in the air, mirroring the mist that drifts over the slopes of the densely forested Kaçkar mountains outside.

The smoke is to calm the bees, masking the pheromone they release when they sense danger and which warns other bees to attack.

When Kutluata lifts the lid off the round lindenwood hives, the hum rises to a crescendo — but these bees aren't angry, it's just their honey that's mad.

We're here to harvest deli bal — bal means "honey" and deli means "crazy" or "mad" — and Turkey's Black Sea region is one of only two places in the world to produce it, the other being Nepal's Hindu Kush Himalayan mountain range.

"In our untouched forests, the purple rhododendron blooms in spring," Kutluata tells CNN. "The bees collect nectar from those flowers, and that's how we get the mad honey."

The nectar contains a naturally occurring toxin called grayanotoxin. The amount that makes it into the honey varies per season and what other flowers the bees have been feasting on, but a spoonful can pack enough buzz to deliver a gently soporific high — while a jar would land you in a hospital.

For millennia, deli bal has been used as folk medicine, a spoonful taken daily to lower blood pressure or used as a sexual stimulant. Today, this potentially dangerous delicacy sells at a premium price.

[...] Deli bal is a dark amber red and its scent is sharp. The taste is earthy with subtle barnyard notes. There are telltale sensations that announce the presence of grayanotoxin: A herbal bitterness underlies the sweetness of the honey and a burning heat catches the back of the throat.

[...] This is a food that has felled armies. In the 4th century BCE, the Greek military leader Xenophon wrote of soldiers traveling near Trabzon on the Black Sea coast who overindulged on the sweet treat: "Not one of them could stand up, but those who had eaten a little were like people exceedingly drunk, while those who had eaten a great deal seemed like crazy, or even, in some cases, dying men. So they lay there in great numbers as though the army had suffered a defeat, and great despondency prevailed."

[...] "The longer the honey stays in the hive, the higher its quality becomes. The quality is determined by the promille value," he explains. Promille refers to the concentration of the honey. "The higher the promille value, the higher the quality."

"Chestnut honey can be found everywhere, but it really makes a difference," adds Emine. "In terms of the promille value, it can be 600, 700, 800, but elsewhere, it might be 500 in terms of quality."

[...] To Emine, honey "represents health. If my throat is sore, I turn to honey. If I'm coughing, I turn to honey. If I'm feeling weak, I turn to honey again."

[...] Deli bal can be sold legally in Turkey and is legal in many countries. However, the US Food and Drug Administration does not recommend its consumption.

"Consumers should check labeling of honey to ensure it is not labeled as 'mad honey' or marketed for intoxicating qualities," an FDA spokesperson told CNN.

"Eating honey with a high amount of this toxin can lead to 'mad honey' poisoning, with symptoms such as nausea, vomiting, or dizziness. This type of poisoning is rare."


Original Submission

posted by hubie on Sunday November 16, @10:58AM   Printer-friendly

AI resistance: Who says no to AI and why? – Digital Society Blog:

A poisoned dataset. A writers' strike that froze Hollywood for 148 days. Street protests against data centres. Behind each of these acts lies a growing global pushback against artificial intelligence. Drawing on the recent report, "From Rejection to Regulation: Mapping the Landscape of AI Resistance," by Can Simsek and Ayse Gizem Yasar, this article examines how artists, workers, activists, and scholars challenge the design, deployment, and governance of AI systems. It explores the drivers behind AI resistance and outlines a research agenda that treats these acts not as obstacles, but as vital contributions to democratic AI governance.

Artificial intelligence is catalysing a radical sociotechnical transformation, reshaping not only our technological infrastructures but also the institutions that organise society. In the midst of this shift, crucial questions arise: Who determines the direction of this change and the future we want to build? Who remains unheard in the conversation? Are we passive observers of increasingly deployed powerful algorithms, or do we have the agency and responsibility to challenge and reshape them?

Acts of pushback are already unfolding across diverse domains and geographies. While heterogeneous in form and motivation, these interventions share a critical orientation towards the pace, purpose, and underlying power structures of contemporary AI development. Rather than isolated incidents, they constitute elements of a broader landscape of AI resistance that demands closer attention.

To see today's pushback against AI in context, it helps to remember that resistance to new technology is nothing new. Technological paradigm shifts have consistently triggered societal concern and resistance, from the 19th century Luddites who opposed textile machinery due to labor displacement, to current debates on digital surveillance and algorithmic bias. As artificial intelligence emerges as a major transformative force, public reactions continue to alternate between optimism and concern. On the one hand, governments and private firms are committing unprecedented levels of investment in AI development; on the other, a growing amount of "AI resistance" raises fundamental objections to how these technologies are being designed, produced, deployed, and governed. But what exactly is AI resistance?

The concept of "resistance" in the context of AI encompasses a wide spectrum of actions and discourses that may be overt or subtle, organised or diffuse, individual or collective, oppositional or reformist. Drawing on insights from critical theory and science and technology studies, resistance to artificial intelligence can be understood as a form of agency exercised within existing systems of power. In this framing, the object of resistance is not technology per se, but the sociotechnical arrangements and asymmetries that both shape and are shaped by the development and application of AI.

Such resistance can manifest in diverse forms, including public protest, legal action, digital subversion, scholarly critique, and grassroots advocacy. Comparable to civil disobedience, these practices reflect a principled commitment to ethical, legal, or democratic norms perceived to be undermined by the development or deployment of certain AI systems. The term "AI resistance" therefore covers a broad range of actions and is open to multiple interpretations, given that both "resistance" and "artificial intelligence" are expansive and inherently abstract concepts. But what does AI resistance look like in practice?

In the report, we recorded numerous instances of AI resistance, including protests against the environmental impacts of data centers, opposition from big tech employees over military applications of AI, public outcry over the UK's A-level grading fiasco. While not intended to be exhaustive, we surveyed six key areas where such resistance has been particularly active:

  1. creative industries
  2. migration and border control
  3. medical AI
  4. higher education
  5. defense and security sectors and
  6. environmental activism

Thereby, we highlighted key actors in AI resistance, with particular emphasis on the role of civil society in mobilising public opposition. The report also looks at how governments have turned some forms of resistance into law. One example is the EU AI Act, which prohibits certain AI systems like deliberately manipulative AI practices.

The report also points to five main reasons why people push back against AI, each illustrated with real-world examples:

  1. First, there are socio-economic concerns, visible for example in the creative industries, where the 2023 Writers Guild of America strike took aim at AI's potential to replace human jobs
  2. Second, ethical issues arise when AI systems are opaque or biased, such as migration risk-assessment tools that can unfairly influence decisions about people's futures
  3. Third, safety risks are a concern, especially in healthcare, where flawed AI diagnostic results have led medical professionals to speak out
  4. Fourth, there are threats to democracy and sovereignty, including the use of AI for large-scale societal manipulation
  5. And finally, there's the environmental impact: climate-focused NGOs have highlighted research showing the significant carbon footprint of training large AI models

Journal Reference: Şimşek and Yasar (2025). From Rejection to Regulation: Mapping the Landscape of AI Resistance. Available here: https://papers.ssrn.com/sol3/papers.cfm?abstract_id=5287068


Original Submission

posted by hubie on Sunday November 16, @06:17AM   Printer-friendly

A new scheme will help to share the benefits of solar power in the daytime:

Australian households will be able to access free electricity for three hours every day, in an effort to encourage energy use when excess solar power is being fed into the grid.

The federal government scheme will require retailers to offer free electricity to households for at least three hours in the middle of the day, when there is often more electricity generated than is being used, leading to very cheap or even negative wholesale prices.

The Solar Sharer scheme will initially be introduced to consumers in default market offer regions like NSW, south-east Queensland and South Australia from July next year, with consultation to extend the scheme to other jurisdictions by 2027.

Households with smart meters will be able to run washers and dryers, air conditioning or any other appliances for free within the three-hour window.

Climate Change Minister Chris Bowen said the scheme would share around the benefits of solar panels, including to those without panels or who rented their homes.

"There is so much power in the middle of the day now that often the prices are very cheap or negative and this should be something, by our analysis, that energy companies can incorporate and offer," Mr Bowen told the ABC.

"It's not a silver bullet, and it is part of a suite of measures, but it's a good one. No one would claim that one particular policy solves all the challenges in the energy market."

Mr Bowen added that modern technology had made it easier for people to schedule appliances to start in the middle of the day, when electricity would be free.

"We want to see the benefits of renewable energy flow to all, even those without solar panels or batteries," he said.

But retailers have reacted with surprise to the announcement, saying it had not been raised in consultations on reforms to the network.

"This lack of consultation risks damaging industry confidence, as well as creating the potential for unintended consequences," the Australian Energy Council's chief executive Louisa Kinnear said in a statement.

[...] The government said the shift in demand was expected to lower costs for everyone by reducing peak demand in the evening, which would also minimise the need for "costly" network upgrades to ensure grid stability.

The federal government has been under pressure to address power price concerns, as state and federal rebates come off, and with a recent uptick in inflation as a consequence.

Akaysha Energy bags AU$460 million for 1,244MWh BESS in Victoria, Australia:

The financing is underpinned by a 15-year virtual tolling agreement with Snowy Hydro, representing the state-owned generator's first battery offtake agreement.

With a contracted capacity of 220MW, the arrangement constitutes the largest four-hour virtual toll agreement in the Australian market. Snowy Hydro has been active in securing battery storage capacity, with the company signing multiple offtake deals for over 2GWh of battery energy storage across Australia.

Located in southwest Victoria, the Elaine BESS will connect to the National Electricity Market (NEM) through existing transmission infrastructure. The strategic positioning will enable the battery system to manage transmission outage risks and support the integration of renewable energy sources, particularly wind and solar generation, into the grid.

[...] Akaysha Energy has established itself as a leading developer and operator of utility-scale battery storage systems in Australia. The company recently achieved commercial operation of Stage 1 of the 850MW/1,680MWh Waratah Super Battery.

See also:


Original Submission

posted by hubie on Sunday November 16, @01:36AM   Printer-friendly

Moving From Windows To FreeBSD As The Linux Chaos Alternative

https://hackaday.com/2025/11/11/moving-from-windows-to-freebsd-as-the-linux-chaos-alternative/

Back in the innocent days of Windows 98 SE, I nearly switched to Linux on account of how satisfied I was with my Windows experience. This started with the Year of the Linux Desktop in 1999 that started with me purchasing a boxed copy of SuSE Linux and ended with me switching to Windows 2000. After this I continued tinkering with non-Windows OSes including QNX, BeOS, various BSDs, as well as Linux distributions that promised a 'Windows-like' desktop experience, such as Lindows.

Now that Windows 2000's proud legacy has seen itself reduced to a rusting wreck resting on cinderblocks on Microsoft's dying front lawn, the quiet discomfort that many Windows users have felt since Windows 7 was forcefully End-Of-Life-d has only increased. With it comes the uncomfortable notion that Windows as a viable desktop OS may be nearing its demise. Yet where to from here?

Although the recommendations from the peanut gallery seem to coalesce around Linux or Apple's MacOS (formerly OS X), there are a few dissenting voices extolling the virtues of FreeBSD over both. There are definitely compelling reasons to pick FreeBSD over Linux, in addition to it being effectively MacOS's cousin. Best of all is not having to deal with the Chaos Vortex that spawns whenever you dare to utter the question of 'which Linux distro?'. Within the world of FreeBSD there is just FreeBSD, which makes for a remarkably coherent experience.

[...] In case you're more into the 'just add water' level of a desktop OS installation process, the GhostBSD project provides the ready to go option for a zero fuss installation like you would see with Linux Mint, Manjaro Linux and kin. Although I have done the hard mode path previously with FreeBSD virtual machines, to save myself the time and bother I opted for the GhostBSD experience here.

[...] Since any open source software of note that runs on Linux tends to have a native FreeBSD build, the experience here is rather same-ish. Where things can get interesting is with things related to the GPU, especially gaming. These days that of course means getting Steam and ideally the GoG Galaxy client running, which cracks open a pretty big can of proprietary worms.

[...] The two available options here are to either try one's chances with the linuxulator-steam-utils workarounds that tries to stuff the Linux client into a chroot, or to go Wine all the way with the Windows Steam client and add more Windows to your OSS.

[...] As it turns out, the low-fuss method to get Steam and GoG Galaxy working is via the the Mizutamari Wine GUI frontend. Simply install it with pkg install mizuma or via the package center, open it from the Games folder in the start menu, then select the desired application's name and then the Install button. Within minutes I had both Steam and the 'classic' GoG Galaxy clients installed and running. The only glitch was that the current GoG Galaxy client didn't want to work, but that might have been a temporary issue. Since I only ever use the GoG Galaxy 1.x client on Windows, this was fine for me.

[...] Aside from gaming, there are many possible qualifications for what might make a 'Windows desktop replacement'. As far as FreeBSD goes, the primary annoyance is having to constantly lean on the Linux or Windows versions of software. This is also true for things like DaVinci Resolve for video editing, where since there's no official FreeBSD version, you have to stuff the Linux version into a chroot once again to run it via the Linux compatibility layer.

Although following the requisite steps isn't rocket science for advanced users, it would simply be nice if a native version existed and you could just install the package. Based on my own experiences porting a non-trivial application like the FFmpeg- and SDL-based NymphCast to FreeBSD – among other OSes – such porting isn't complicated at all, assuming your code doesn't insist on going around POSIX and doing pretty wild Linux-specific things.

FreeBSD now builds reproducibly and without root privilege

The FreeBSD Foundation is pleased to announce that it has completed work to build FreeBSD without requiring root privilege. We have implemented support for all source release builds to use no-root infrastructure, eliminating the need for root privileges across the FreeBSD release pipeline. This work was completed as part of the program commissioned by the Sovereign Tech Agency.

↫ FreeBSD Foundation blog

This is great news in and of itself, but there's more: FreeBSD has also improved build reproducability. This means that given the same source input, you should end up with the same binary output, which is an important part of building a verifiable chain of trust. These two improvements combined further add to making FreeBSD a trustworthy, secure option – something it already is anyway.

In case you haven't noticed, the FreeBSD project and its countless contributors are making a ton of tangible progress lately on a wide variety of topics, from improving desktop use, to solidifying Wi-Fi support, to improving the chain of trust. I think the time is quite right for FreeBSD to make some inroads in the desktop UNIX-y space, especially for people to whom desktop Linux has strayed too far from the traditional UNIX philosphy (whatever that means).

- https://www.osnews.com/story/143733/freebsd-now-builds-reproducibly-and-without-root-privilege/


Original Submission #1Original Submission #2

posted by jelizondo on Saturday November 15, @08:51PM   Printer-friendly

https://www.the-independent.com/life-style/lego-star-trek-uss-enterprise-d-b2861107.html

The set will be available in Lego stores and online November 28

Lego is releasing its first-ever Star Trek -inspired model — with an incredible recreation of the signature ship from the '80s TV series.

Made from 3,600 pieces, the Lego set is of the U.S.S. Enterprise NCC-1701-D, the spaceship that serves as the main setting of Star Trek: The Next Generation series, which ran for seven seasons, as well as the 1994 film, Star Trek Generations.

"[It] allows builders to craft a detailed replica of the iconic starship, complete with a detachable command saucer, secondary hull, and warp nacelles with distinctive red and blue detailing," according to a press release from Lego. "The model also features an opening shuttlebay and two mini shuttlepods, perfect for recreating classic scenes."

The set comes with nine mini-figures of Star Trek: The Next Generation characters, including Captain Jean-Luc Picard, Commander William Riker, Lieutenant Worf, Lieutenant Commander Data, Dr. Beverly Crusher, Lieutenant Commander Geordi La Forge, Counsellor Deanna Troi, Bartender Guinan, and Wesley Crusher.

Figurines also have some themed accessories, like an engineering case, phaser, or portable tractor beam generator.

Once the spaceship has been built, it can be placed on an angled display stand complete with an information plaque that is included in the kit. There is also a display tile, with Star Trek: The Next Generation branding, for the mini-figures.

However, fans should not expect to get their hands on the set before Black Friday, which falls this year on November 28. The set will be sold on Lego's website and in stores for $399.99.

In addition, customers who get the new Star Trek set will receive a special gift while supplies last: The Lego Icons Star Trek: Type-15 Shuttlepod. The set includes everything needed to make a mini-figure-scale model of the Type-15 Shuttlepod, a small two-person craft from the franchise.

Actor Jonathan Frakes, who starred in Star Trek: The Next Generation, celebrated the new U.S.S. Enterprise set from Lego in a statement.

"As Commander Riker, I spent a lot of time on the bridge of the Enterprise, and now fans can take the helm themselves... in LEGO brick form!" he said. "This set is a fantastic way to relive the adventures of the crew, piece by piece. Look out for a cameo in the livestream with an offer to win a signed Enterprise set!"

This isn't the first time that Lego has brought the setting of a beloved franchise to life. In September, the company launched the two-foot-tall Lego Star Wars Death Star, made up of a whopping 9,023 pieces. It also features the most mini-figures ever in a Lego set.

Priced at $999.99, the model recreates a busy cross-section of the Galactic Empire's infamous moon-sized planet destroyer from Star Wars.


Original Submission

posted by jelizondo on Saturday November 15, @04:08PM   Printer-friendly

https://arstechnica.com/gaming/2025/11/new-project-brings-strong-linux-compatibility-to-more-classic-windows-games/

For years now, Valve has been slowly improving the capabilities of the Proton compatibility layer that lets thousands of Windows games work seamlessly on the Linux-based SteamOS. But Valve's Windows-to-Linux compatibility layer generally only extends back to games written for Direct3D 8, the proprietary Windows graphics API Microsoft released in late 2000.

Now, a new open source project is seeking to extend Linux interoperability further back into PC gaming history. The d7vk project describes itself as "a Vulkan-based translation layer for Direct3D 7 [D3D7], which allows running 3D applications on Linux using Wine."
[...]
Wine's own built-in WineD3D compatibility layer has supported D3D7 in some form or another for at least two decades now. But the new d7vk project instead branches off the existing dxvk compatibility layer, which is already used by Valve's Proton for SteamOS and which reportedly offers better performance than WineD3D on many games.
[...]
The D3D7 games list predictably includes a lot of licensed shovelware, but there are also well-remembered games like Escape from Monkey Island, Arx Fatalis, and the original Hitman: Codename 47. WinterSnowfall writes that the project was inspired by a desire to play games like Sacrifice and Disciples II on top of the existing dxvk framework.
[...]
Don't expect this project to expand to include support for even older DirectX APIs, either, WinterSnowfall warns. "D3D7 is enough of a challenge and a mess as it is," the author writes. "The further we stray from D3D9, the further we stray from the divine."


Original Submission

posted by jelizondo on Saturday November 15, @11:23AM   Printer-friendly

How conspiracy theories led to the hacking of NASA servers and ruined a sysadmin's life: Gary McKinnon's story

He was looking for aliens - and became the No. 1 enemy of the state for the United States and started a diplomatic war between the United States and the United Kingdom

It's a good article with photos. Unlike most of the older articles covering Gary, this article was published 14.05.2025.

Imagine an IT guy who wanted to find traces of UFOs and instead found himself at the centre of the most high-profile hacking case of the 2000s. In 2002, Gary McKinnon, an ordinary sysadmin from Scotland, broke into NASA and the Pentagon computers under the nickname Solo. The United States immediately called it "the largest military hack of all time" and squeezed the most out of this formula - media, diplomatically, legally.

Ten years of trials, extradition requests, an autism diagnosis, an activist mother, hysteria around human rights, conspiracies, spaceships - all this is not a Netflix scriptwriter's invention, but a real story of a British man who just wanted to know if the US government was really hiding information about aliens.


Original Submission

posted by jelizondo on Saturday November 15, @06:36AM   Printer-friendly
from the AI-FOMO dept.

Draft proposals obtained by POLITICO show EU is breaking sacred privacy regime to placate industry:

European Union officials are ready to sacrifice some of their most prized privacy rules for the sake of AI, as they seek to turbocharge business in Europe by slashing red tape.

The European Commission will unveil a "digital omnibus" package later this month to simplify many of its tech laws. The executive has insisted that it is only trimming excess fat through "targeted" amendments, but draft documents obtained by POLITICO [paywalled] show that officials are planning far-reaching changes to the General Data Protection Regulation (GDPR) to the benefit of artificial intelligence developers.

The proposed overhaul will come as a boon to businesses working with AI, as Europe scrambles to stay economically competitive on the world stage.

But touching the flagship privacy law — seen as the "third rail" of EU tech policy — is expected to trigger a massive political and lobbying storm in Brussels.

"Is this the end of data protection and privacy as we have signed it into the EU treaty and fundamental rights charter?" said German politician Jan Philipp Albrecht, who as a former European Parliament member was one of the chief architects of the GDPR. "The Commission should be fully aware that this is undermining European standards dramatically."

Brussels' shift on privacy comes as it frets over Europe's waning economic power. Former Italian Prime Minister Mario Draghi namechecked the General Data Protection Regulation as holding back European innovation on artificial intelligence in his landmark competitiveness report last year.

[...] In past months, Commission officials have sought to preempt worries [41:53 --JE] that it was overhauling the privacy rulebook. It insisted that its simplification proposals wouldn't touch the underlying principles of the GDPR.

Now that draft plans are out, civil society campaigners have begun sounding the alarm.

The Commission is "secretly trying to overrun everyone else in Brussels," said Max Schrems, founder of Austrian privacy group Noyb — and Europe's infamous privacy campaigner who was behind court cases that brought down major data transfer deals with the United States in the past. "This disregards every rule on good lawmaking, with terrible results," he said.

One line of attack from privacy groups is to poke holes in what they say is a rushed omnibus process. While the GDPR took years to negotiate, public consultation on the digital omnibus only ended in October. The Commission has not prepared impact assessments to accompany its proposals, as it says the changes are only targeted and technical.

The Commission's tunnel vision on the AI race has resulted in a "poorly drafted 'quick shot' in a highly complex and sensitive area," said Schrems.

[...] Draft changes would create new exceptions for AI companies that would allow them to legally process special categories of data (like a person's religious or political beliefs, ethnicity or health data) to train and operate their tech. The Commission is also planning to reframe the definition of such special category data, which are afforded extra protections under the privacy rules.

Officials also want to redefine what constitutes as personal data, saying that pseudonymized data (where personal details have been obscured so a person can't be identified) might not always be subject to the GDPR's protections, a change that reflects a recent ruling from the EU's top court.

Finally, it wants to reform Europe's pesky cookie banner rules by inserting a provision into the GDPR that would give website and app owners more legal grounds to justify tracking users beyond simply obtaining their consent.


Original Submission

posted by jelizondo on Saturday November 15, @01:54AM   Printer-friendly
from the resistance-is-logical dept.

https://arstechnica.com/gadgets/2025/11/what-i-do-to-clean-up-a-clean-install-of-windows-11-23h2-and-edge/

It's that time of year again—temperatures are dropping, leaves are changing color, and Microsoft is gradually rolling out another major yearly update to Windows 11.

The Windows 11 25H2 update is relatively minor compared to last year's 24H2 update
[...]
The 24H2 update came with some major under-the-hood overhauls of core Windows components and significant performance improvements for the Arm version; 25H2 is largely 24H2, but with a rolled-over version number to keep it in line with Microsoft's timeline for security updates and tech support.
[...]
To keep things current, we've combed through our Windows cleanup guide, updating it for the current build of Windows 11 25H2 (26200.7019) to help anyone who needs a fresh Windows install or who is finally updating from Windows 10 now that Microsoft is winding down support for it.
[...]
As before, this is not a guide about creating an extremely stripped-down, telemetry-free version of Windows; we stick to the things that Microsoft officially supports turning off and removing. There are plenty of experimental hacks and scripts that take it a few steps farther, and/or automate some of the steps we outline here—NTDev's Tiny11 project is one—but removing built-in Windows components can cause unexpected compatibility and security problems, and Tiny11 has historically had issues with basic table-stakes stuff like "installing security updates."
[...]
The most contentious part of Windows 11's setup process relative to earlier Windows versions is that it mandates a Microsoft account sign-in, with none of the readily apparent "limited account" fallbacks that existed in Windows 10. As of Windows 11 22H2, that's true of both the Home and Pro editions.
[...]
During Windows 11 Setup, after selecting a language and keyboard layout but before connecting to a network, hit Shift+F10 to open the command prompt (depending on your keyboard, you may also need to hit the Fn key before pressing F10). Type OOBE\BYPASSNRO, hit Enter, and wait for the PC to reboot.

When it comes back, click "I don't have Internet" on the network setup screen, and you'll have recovered the option to use "limited setup" (aka a local account) again, like older versions of Windows 10 and 11 offered.

This option has been removed from some Windows 11 testing builds, but it still works as of this writing in 25H2. We may see this option removed in a future update to Windows.
[...]
Rather than tell you what I remove, I'll tell you everything that can be removed from the Installed Apps section of the Settings app (also quickly accessible by right-clicking the Start button in the taskbar). You can make your own decisions here; I generally leave the in-box versions of classic Windows apps like Sound Recorder and Calculator while removing things I don't use, like To Do or Clipchamp.
[...]
Microsoft has been on a yearslong crusade against unused space in the Start menu and taskbar, which means there's plenty here to turn off.
[...]

Microsoft has steadily been adding image and text generation capabilities to some of the bedrock in-box Windows apps, from Paint and Photos to Notepad.

Exactly which AI features you're offered will depend on whether you've signed in with a Microsoft account or not or whether you're using a Copilot+ PC with access to more AI features that are executed locally on your PC rather than in the cloud (more on those in a minute).

But the short version is that it's usually not possible to turn off or remove these AI features without uninstalling the entire app. Apps like Notepad and Edge do have toggles for shutting off Copilot and other related features, but no such toggles exist in Paint, for example.

Even if you can find some Registry key or another backdoor way to shut these things off, there's no guarantee the settings will stick as these apps are updated; it's probably easier to just try to ignore any AI features within these apps that you don't plan to use.
[...]
One Copilot+ feature that can be fully removed, in part because of the backlash it initially caused, is the data-scraping Recall feature. Recall won't be enabled on your Copilot+ system unless you're signed in with a Microsoft account and you explicitly opt in. But if fully removing the feature gives you extra peace of mind, then by all means, remove it.
[...]
Apps like Paint or Photos may also prompt you to install an extension for AI-powered image generation from the Microsoft Store. This extension—which weighs in at well over a gigabyte as of this writing—is not installed by default. If you have installed it, you can remove it by opening Settings > Apps > Installed apps and removing "ImageCreationHostApp."
[...]
The main problem with Edge on a new install of Windows is that even more than Windows, it exists in a universe where no one would ever want to switch search engines or shut off any of Microsoft's "value-added features" except by accident. Case in point: Signing in with a Microsoft account will happily sync your bookmarks, extensions, and many kinds of personal data. But many settings for search engine changes or for opting out of Microsoft services do not sync between systems and require a fresh setup each time.
[...]
The most time-consuming part of installing a fresh, direct-from-Microsoft copy of Windows XP or Windows 7 was usually reinstalling all the apps you wanted to run on your PC, from your preferred browser to Office, Adobe Reader, Photoshop, and the VLC player. You still need to do all of that in a new Windows 11 installation. But now more than ever, most people will want to go through the OS and turn off a bunch of stuff to make the day-to-day experience of using the operating system less annoying.
[...]
The settings changes we've recommended here may not fix everything, but they can at least give you some peace, shoving Microsoft into the background and allowing you to do what you want with your PC without as much hassle. Ideally, Microsoft would insist on respectful, user-friendly defaults itself. But until that happens, these changes are the best you can do.


Original Submission

posted by jelizondo on Friday November 14, @09:12PM   Printer-friendly

What Do We Do If SETI Is Successful?

The Search For Extra Terrestrial Intelligence (SETI) is evolving. We've moved on from the limited thinking of monitoring radio waves to checking for interstellar pushing lasers or even budding Dyson swarms around stars. To match our increased understanding of the ways we might find intelligence elsewhere in the galaxy, the International Academy of Astronautics (IAA) is working through an update to its protocols for what researchers should do after a confirmed detection of intelligence outside of Earth. Their new suggestions are available in a pre-print paper on arXiv, but were also voted on at the 2025 International Astronautical Congress (IAC) in Sydney, with potential full adoption early next year.

This updated protocol marks the largest change in the 36 years there has been a protocol. THe IAA first created a "Declaration of Principles" in 1989 that was intended to suggest how humanity should react to a confirmed signal from an alien world. This protocol was updated in 2010, but those changes were largely just streamlining with little substantive differences.

The update being put forth now, though, is significantly different in a number of important ways. It is intended to reflect the growing complexity of dealing with highly sensitive topics in the modern world, especially when dealing with social media. A big part of its intent is to protect the researchers who announce the discovery from online harassment, or worse.

But perhaps the most important single change is the suggestion of whether humanity should respond to a direct message. Previous versions of the protocol have suggested that yes, we should, and put few restrictions on doing so. The updated one suggests that the researchers should absolutely not send any reply until after the issue is discussed at the United Nations, which makes sense, though getting the UN itself to agree to anything at this point seems like a hard ask.

[...] If the signal happens to be electromagnetic, which is what started the SETI search in the first place, the paper suggests petitioning the International Telecommunications Union (ITU), the governing body of the world's wireless channel distribution, to free up the bandwidth it was detected on. That would lessen any interference, intentional or otherwise, from manmade sources - or at least give legal recourse to stopping the interference.

Overall the message from the update is that the world has gotten much more complex in the last fifteen years - ranging from the political and social environment on Earth to our understanding of what a SETI discovery might look like. While no organization claims to have all the answers to what to do should we find a signal indicating alien intelligence, the way the IAA has been handling this update process, which has been ongoing with multiple rounds of revisions over the last two years, has been exemplary. The final step in its ratification, assuming it passed the simple majority vote in Sydney, is to have the IAA's board ratify it, allowing the sub-committee that developed it to continue its underappreciated, but one day potentially vital, work.

arXiv paper: SETI Post-Detection Protocols: Progress Towards a New Version


Original Submission

posted by hubie on Friday November 14, @04:31PM   Printer-friendly

Google confirms AI search will have ads, but they may look different:

Google Ads are not going anywhere. Eventually, AI Search results on Google and likely other properties will have ads.

Google recently reported $56.57 billion in revenue from ads on Search and YouTube. You obviously can't expect ads to disappear from its search business.

Right now, Google has two AI features.

The first is AI Overviews, which appears at the top of the search results with answers scraped from publishers that Google does not want to pay.

The second and more powerful feature is AI Mode, which offers a ChatGPT-like personalized experience.

Google has already confirmed it plans to integrate services like Gmail and Drive into Google AI Mode to create a new personalized experience where AI knows everything about you.

In a podcast [28:12 --JE], Google's Robby Stein argued that the Google Ads business is not going anywhere, but it will evolve to support the new landscape.

Robby Stein says Google does not see them [ads] going away, but the experience could change.

"...you could take a picture of your shoes and say, 'Hey, these are my shoes. What are other cool shoes like this?' And we could answer that now or help provide you context with that. Or you could ask about this really cool restaurant question. It can be five sentences about all your allergies, issues with this. I have this big group. I want to make sure it's got light. What can I book in advance? And you can put that into Google now too," Robby argues while explaining where ads could fit into the AI experience.

"I think that's an opportunity for the future to be even more helpful for you, particularly in an advertising context. And so we started some experiments on ads within AI Mode and within Google AI experiences," he added.

At this point, it looks like Google wants you to use AI Mode for personal questions, and based on those questions, it could show personalized ads.

Google is already testing ads in AI Search in a limited form, and we'll likely learn more about its plans next year.

Related: Google's Gemini Deep Research Can Now Read Your Gmail and Rummage Through Google Drive


Original Submission

posted by hubie on Friday November 14, @11:47AM   Printer-friendly
from the linux-is-everywhere dept.

https://www.bleepingcomputer.com/news/security/russian-hackers-abuse-hyper-v-to-hide-malware-in-linux-vms/

The Russian hacker group Curly COMrades is abusing Microsoft Hyper-V in Windows to bypass endpoint detection and response solutions by creating a hidden Alpine Linux-based virtual machine to run malware.

Inside the virtual environment, the threat actor hosted its custom tools, the CurlyShell reverse shell and the CurlCat reverse proxy, which enabled operational stealth and communication.

Curly COMrades is a cyber-espionage threat group believed to be active since mid-2024. Its activities are closely aligned with Russian geopolitical interests.

[...] The researchers found that in early July, after gaining remote access to two machines, Curly COMrades executed commands to enable Hyper-V and disable its management interface.

Microsoft includes the Hyper-V native hypervisor technology that provides hardware virtualization capabilities in Windows (Pro and Enterprise) and Windows Server operating systems, allowing users to run virtual machines (VMs).

"The attackers enabled the Hyper-V role on selected victim systems to deploy a minimalistic, Alpine Linux-based virtual machine. This hidden environment, with its lightweight footprint (only 120MB disk space and 256MB memory), hosted their custom reverse shell, CurlyShell, and a reverse proxy, CurlCat," Bitdefender explains in a report shared with BleepingComputer.

By keeping the malware and its execution inside a virtual machine (VM), the hackers were able to bypass traditional host-based EDR detections, which lacked network inspection capabilities that could detect the threat actor's command and control (C2) traffic from the VM.

Although relying on virtualization to evade detection is not a new technique, the fragmented coverage of security tools makes it an effective approach on networks that lack a holistic, multi-layered protection.

In the Curly COMrades attacks, evasion was achieved by using the name 'WSL' for the VM, alluding to the Windows Subsystem for Linux feature in the operating system, in the hope of slipping unobserved.

The Alpine Linux VM was configured in Hyper-V to use the Default Switch network adapter, which passed all the traffic through the host's network stack.

"In effect, all malicious outbound communication appears to originate from the legitimate host machine's IP address," Bitdefender researchers explain.

The two custom implants deployed in the VM are ELF binaries based on libcurl and are used for command execution and traffic tunneling:

[...] The researchers note that the sophistication level of the investigated Curly COMrades attacks reveal an activity tailored for stealth and operational security. The hackers encrypted the embedded payloads and abused PowerShell capabilities, which led to minimum forensic traces on the compromised hosts.

Based on the observations in these attacks, Bitdefender suggests that organizations should monitor for abnormal Hyper-V activation, LSASS access, or PowerShell scripts deployed via Group Policy that trigger local account password resets, or creating new ones.


Original Submission

posted by hubie on Friday November 14, @06:59AM   Printer-friendly

https://www.makeuseof.com/worn-out-keyboard-keys-reveal-more-than-you-think/

If you've been using the same keyboard for a while, you must have noticed some patterns coming up. That faded E key on your keyboard isn't just wear and tear, it's your fingerprint in plastic.

Deep cleaning your keyboard may be worth the effort, but it doesn't hide the massive amount of information your keyboard can give away. The worn-out keys on your keyboard know more about you than you think, and they can easily reveal that information.

What most people don't realize is that your keyboard doesn't deteriorate randomly. It's a direct reflection of how you use it and, by extension, of your digital life. If you're a writer cranking out articles for hours on end, your vowels are going to take the most beating. The letter E, the most frequently used letter in English, gets hammered so relentlessly that it is often the first casualty.

[...] Researchers have known for decades that typing patterns can reveal identities. Even all the way back in the 1860s, experienced telegraph operators realized they could recognize each other by everyone's unique tapping rhythm. The same concept applies to modern-day keyboards.

[...] Over time, the repeated friction of millions of keystrokes literally wears away the paint, leaving behind shiny, faded letters that give your keyboard that worn-out look. But it gets more interesting when you start looking at which keys wear out for different people.

For example, a programmer's keyboard will look entirely different from the one used by a writer. Their most used keys might be backspace, brackets, colons, and semicolons—the unglamorous tools of code. Meanwhile, the gamer's keyboard will show a disproportionate amount of wear on the WASD keys. These four keys are the most commonly used control keys for most games, and if you look at a keyboard a gamer has used for a while, you'll easily be able to tell the difference.

The timing of wear matters too. Heavy users don't just show more wear overall—they show specific patterns that can reveal work habits. Even in the same trade, keyboard wear can tell apart separate occupations.

For example, a writer may have their spacebar way more worn out than their backspace key. It makes sense—they're probably typing long streams of sentences without editing much. However, for an editor who's constantly going back and tinkering with text, the wear is going to look a lot different.

Physical wear is only one factor. Another, perhaps more pronounced factor is the shiny keys on your keyboard. As you type, oil from your skin combines with the mechanical friction of your finger pressing the key and deposits on the key's surface.

[...] There's something oddly personal about a worn keyboard. It's evidence of time spent, work completed, words written, bugs debugged, or games conquered. That faded keyboard you retired after years of use knows a lot more about you than you'd think.

[...] The next time you glance down at your keyboard during work or play, take a moment to notice which keys are the most worn. That pattern isn't just cosmetic damage; it's a visual record of your digital life, a map of your habits, and a testament to the thousands of hours you've spent at that keyboard.


Original Submission

posted by hubie on Friday November 14, @02:12AM   Printer-friendly
from the AI-overlords-or-adpocalypse?-Why-not-both? dept.

https://arstechnica.com/tech-policy/2025/11/bombshell-report-exposes-how-meta-relied-on-scam-ad-profits-to-fund-ai/

Internal documents have revealed that Meta has projected it earns billions from ignoring scam ads that its platforms then targeted to users most likely to click on them.

In a lengthy report, Reuters exposed five years of Meta practices and failures that allowed scammers to take advantage of users of Facebook, Instagram, and WhatsApp.
[...]
Instead of promptly removing bad actors, Meta allowed "high value accounts" to "accrue more than 500 strikes without Meta shutting them down," Reuters reported. The more strikes a bad actor accrued, the more Meta could charge to run ads, as Meta's documents showed the company "penalized" scammers by charging higher ad rates. Meanwhile, Meta acknowledged in documents that its systems helped scammers target users most likely to click on their ads.
[...]
Internally, Meta estimates that users across its apps in total encounter 15 billion "high risk" scam ads a day. That's on top of 22 billion organic scam attempts that Meta users are exposed to daily, a 2024 document showed. Last year, the company projected that about $16 billion, which represents about 10 percent of its revenue, would come from scam ads.
[...]
"Hey it's me," one scam advertisement using Elon Musk's photo read. "I have a gift for you text me." Another using Donald Trump's photo claimed the US president was offering $710 to every American as "tariff relief." Perhaps most depressingly, a third posed as a real law firm, offering advice on how to avoid falling victim to online scams.

Meta removed these particular ads after Reuters flagged them, but in 2024, Meta earned about $7 billion from "high risk" ads like these alone, Reuters reported.
[...]
Meta spokesperson Andy Stone told Reuters that its collection of documents—which were created between 2021 and 2025 by Meta's finance, lobbying, engineering, and safety divisions—"present a selective view that distorts Meta's approach to fraud and scams."
[...]
"We aggressively fight fraud and scams because people on our platforms don't want this content, legitimate advertisers don't want it, and we don't want it either," Stone said.

Despite those efforts, this spring, Meta's safety team "estimated that the company's platforms were involved in a third of all successful scams in the US," Reuters reported.
[...]
Eventually, Meta "substantially expanded" its teams that track scam ads, Stone told Reuters. But Meta also took steps to ensure they didn't take too hard a hit while needing vast resources—$72 billion—to invest in AI, Reuters reported.

For example, in February, Meta told "the team responsible for vetting questionable advertisers" that they weren't "allowed to take actions that could cost Meta more than 0.15 percent of the company's total revenue," Reuters reported. That's any scam account worth about $135 million, Reuters noted. Stone pushed back, saying that the team was never given "a hard limit" on what the manager described as "specific revenue guardrails."

"Let's be cautious," the team's manager wrote, warning that Meta didn't want to lose revenue by blocking "benign" ads mistakenly swept up in enforcement.
[...]
Meta appeared to be less likely to ramp up enforcement from police requests. Documents showed that police in Singapore flagged "146 examples of scams targeting that country's users last fall," Reuters reported. Only 23 percent violated Meta's policies, while the rest only "violate the spirit of the policy, but not the letter," a Meta presentation said.

Scams that Meta failed to flag offered promotions like crypto scams, fake concert tickets, or deals "too good to be true," like 80 percent off a desirable item from a high-fashion brand. Meta also looked past fake job ads that claimed to be hiring for Big Tech companies.

Rob Leathern previously led Meta's business integrity unit that worked to prevent scam ads but left in 2020. He told Wired that it's hard to "know how bad it's gotten or what the current state is" since Meta and other social media platforms don't provide outside researchers access to large random samples of ads.
[...]
"These scammers aren't getting people's money on day one, typically. So there's a window to take action," he said, recommending that platforms donate ill-gotten gains from running scam ads to "fund nonprofits to educate people about how to recognize these kinds of scams or problems."

"There's lots that could be done with funds that come from these bad guys," Leathern said.


Original Submission