×
Cellphones

The FBI Is Using Push Notifications To Catch Sexual Predators (gizmodo.com) 34

According to the Washington Post (paywalled), the FBI is using mobile push notification data to unmask people suspected of serious crimes, such as pedophilia, terrorism, and murder. Gizmodo reports: The Post did a little digging into court records and found evidence of at least 130 search warrants filed by the feds for push notification data in cases spanning 14 states. In those cases, FBI officials asked tech companies like Google, Apple, and Facebook to fork over data related to a suspect's mobile notifications, then used the data to implicate the suspect in criminal behavior linked to a particular app, even though many of those apps were supposedly anonymous communication platforms, like Wickr.

How exactly is this possible? Push notifications, which are provided by a mobile operating system provider, include embedded metadata that can be examined to understand the use of the mobile apps on a particular phone. Apps come laced with a quiet identifier, a "push token," which is stored on the corporate servers of a company like Apple or another phone manufacturer after a user signs up to use a particular app. Those tokens can later be used to identify the person using the app, based on the information associated with the device on which the app was downloaded. Even turning off push notifications on your device doesn't necessarily disable this feature, experts contend. [...]

If finding new ways to catch pedophiles and terrorists doesn't seem like the worst thing in the world, the Post article highlights the voices of critics who fear that this kind of mobile data could be used to track people who have not committed serious crimes -- like political activists or women seeking abortions in states where the procedure has been restricted.

United States

US Will Investigate National Security Risks Posed By Chinese-made 'Smart Cars' (nbcnews.com) 68

Citing potential national security risks, the Biden administration says it will investigate Chinese-made "smart cars" that can gather sensitive information about Americans driving them. From a report: The probe could lead to new regulations aimed at preventing China from using sophisticated technology in electric cars and other so-called connected vehicles to track drivers and their personal information. Officials are concerned that features such as driver assistance technology could be used to effectively spy on Americans.

While the action stops short of a ban on Chinese imports, President Joe Biden said he is taking unprecedented steps to safeguard Americans' data. "China is determined to dominate the future of the auto market, including by using unfair practices," Biden said in a statement Thursday. "China's policies could flood our market with its vehicles, posing risks to our national security. I'm not going to let that happen on my watch." Biden and other officials noted that China has imposed wide-ranging restrictions on American autos and other foreign vehicles.
Commerce Secretary Gina Raimondo said connected cars "are like smart phones on wheels" and pose a serious national security risk.
Software

John Walker, Founder of Autodesk, Dies At 74 19

John Walker, the founder of computer-aided design software company Autodesk and co-author of AutoCAD, passed away on February 2nd. He was 74. Consultant and programmer Owen Wengerd shared the news on behalf of John's family (via Scanalyst, a website created by John): It is with great sadness that we announce John's death on Friday, February 2, 2024. He was born in Maryland, USA to William and Bertha Walker, who preceded him in death. John is survived by his wife Roxie Walker and a brother, Bill Walker of West Virginia. Declining to follow in his family tradition of becoming a medical doctor, John attended Case Western Reserve University (CWRU) to pursue a future in astronomy. However, after he discovered the brave new world of computers, he never looked back. John worked at the university's Project Chi (X) computing center where he studied computer science and earned a degree in electrical engineering.

John met Roxie on Thanksgiving Day in 1972, and they married the following year. Roxie and John drove cross-country a few months later for John's new job in California. Eventually he left that first job and worked at various others in the bay area. In late 1976, John designed his own circuit board based on the then-new Texas Instruments TMS9900 microprocessor. This venture became Marinchip Systems, and eventually led to Autodesk. The beginnings of Autodesk are well documented by John himself in The Autodesk File 2.0k and from there John's story is best told by John himself in his prodigious work, which is all methodically organized and available to the public at his website Fourmilab 1.4k.
Security

3 Million Malware-Infected Smart Toothbrushes Used In Swiss DDoS Attacks [UPDATE] (tomshardware.com) 56

An anonymous reader quotes a report from Tom's Hardware: According to a recent report published by the Aargauer Zeitung (h/t Golem.de), around three million smart toothbrushes have been infected by hackers and enslaved into botnets. The source report says this sizable army of connected dental cleansing tools was used in a DDoS attack on a Swiss company's website. The firm's site collapsed under the strain of the attack, reportedly resulting in the loss of millions of Euros of business. In this particular case, the toothbrush botnet was thought to have been vulnerable due to its Java-based OS. No particular toothbrush brand was mentioned in the source report. Normally, the toothbrushes would have used their connectivity for tracking and improving user oral hygiene habits, but after a malware infection, these toothbrushes were press-ganged into a botnet.

Stefan Zuger from the Swiss branch of the global cybersecurity firm Fortinet provided the publication with a few tips on what people could do to protect their own toothbrushes -- or other connected gadgetry like routers, set-top boxes, surveillance cameras, doorbells, baby monitors, washing machines, and so on. "Every device that is connected to the Internet is a potential target -- or can be misused for an attack," Zuger told the Swiss newspaper. The security expert also explained that every connected device was being continually probed for vulnerabilities by hackers, so there is a real arms race between device software/firmware makers and cyber criminals. Fortinet recently connected an 'unprotected' PC to the internet and found it took only 20 minutes before it became malware-ridden.
UPDATE 1/7/24: This attack "didn't actually happen," writes Jason Koebler via 404 Media. "There are no additional details about this apparent attack, and most of the article cites general research by a publicly traded cybersecurity company called Fortinet which has detected malicious, hijacked internet of things devices over the years. A search on Fortinet's website shows no recent published research about hacked smart toothbrushes."

The cybersecurity firm Fortinet said in a statement: "To clarify, the topic of toothbrushes being used for DDoS attacks was presented during an interview as an illustration of a given type of attack, and it is not based on research from Fortinet or FortiGuard Labs. It appears that due to translations the narrative on this topic has been stretched to the point where hypothetical and actual scenarios are blurred. FortiGuard Labs has not observed Mirai or other IoT botnets target toothbrushes or similar embedded devices."
Science

Cern Aims To Build $21 Billion Collider To Unlock Secrets of Universe (theguardian.com) 103

Researchers at Cern have submitted plans for a next-generation particle accelerator that's at least three times the size of the Large Hadron Collider. The Guardian reports: The Large Hadron Collider, built inside a 27km circular tunnel beneath the Swiss-French countryside, smashes together protons and other subatomic particles at close to the speed of light to recreate the conditions that existed fractions of a second after the big bang. The machine, the world's largest collider, was used in the discovery of the Higgs boson in 2012, nearly 50 years after the particle was proposed by Peter Higgs, the theoretical physicist at the University of Edinburgh, and several other researchers. The feat was honored with the Nobel prize in physics the following year.

But since the discovery of the Higgs boson, the collider has not revealed any significant new physics that might shed light on some of the deepest mysteries of the universe, such as the nature of dark matter or dark energy, why matter dominates over antimatter, and whether reality is permeated with hidden extra dimensions. Cern drew up plans for the next machine, the Future Circular Collider (FCC), in 2019. The $21.5 billion (20 billion euro) machine would have a 91km circumference and aim to smash subatomic particles together at a maximum energy of 100 teraelectronvolts (TeV). The Large Hadron Collider achieves maximum energies of 14TeV.

On Friday, the Cern council discussed a midterm review of a feasibility study for the FCC. If the plans go ahead, the organization would ask for approval in the next five years and hope to have the machine built and ready for operations in the 2040s when the LHC has completed its runs. Prof Fabiola Gianotti, the director general of Cern, said: "If approved, the FCC would be the most powerful microscope ever built to study the laws of nature at the smallest scales and highest energies, with the goal of addressing some of the outstanding questions in today's fundamental physics and our understanding of the universe."

Cellphones

Could Apostrophy OS Be the Future of Cellphone Privacy? (stuff.co.za) 100

"Would you pay $15 a month so Android doesn't track you and send all of that data back to Google?" asks Stuff South Africa: A new Swiss-based privacy company thinks $15 is a fair fee for that peace of mind. "A person's data is the original digital currency," argues Apostrophy, which has created its own operating system, called Apostrophy OS.

It's based on Android — don't panic — but the version that has already been stripped of Google's intrusiveness by another privacy project called GrapheneOS, which used to be known as CopperheadOS. Launched in 2014, it which was briefly known as the Android Hardening project, before being rebranded as GrapheneOS in 2019. Apostrophy OS is "focused on empowering our users, not leveraging them," it says and is "purposely Swiss-based, so we can be champions of data sovereignty".

What it does, they say, is separate the apps from the underlying architecture of the operating system and therefore prevent apps from accessing miscellaneous personal data, especially the all-important location data so beloved of surveillance capitalism... Apostrophy OS has its own app store, but also cleverly allows users to access the Google Play Store. If you think that is defeating the point, Apostrophy argues that those apps can't get to the vitals of your digital life. Apostrophy OS has "partitioned segments prioritising application integrity and personal data privacy".

The service is free for one year with the purchase of the new MC02 phone from Swiss manufacturer Punkt, according to PC Magazine. "The phone costs $749 and is available for preorder now. It will ship at the end of January." Additional features include a built-in VPN called Digital Nomad based on the open-source Wireguard framework to secure your activity against outside snooping, which includes "exit addresses" in the US, Germany, and Japan with the base subscription.
Science

Seeing Blue At Night May Not Be What's Keeping You Up After All (sciencealert.com) 52

We already know that a precise range of wavelengths within daylight triggers a light-sensitive photoreceptor in the back of your eye, causing the body's internal clock to reset.

Those receptors are called "intrinsically photosensitive retinal ganglion cells" (or ipRGCs), according to Science Alert — although the actual color is perceived by some nearby cones (which then send information back to those rceptors).

But are our bodies really affected specifically by the perceived color? Chronobiologist Christine Blume investigated with a team from Switzerland's University of Basel and Germany's Max Planck Institute for Biological Cybernetics: Modern scientific wisdom advises us to avoid devices that emit a significant amount of blue radiance, such as our smartphones, computer monitors, and tablets, when we ought to be wrapping ourselves in darkness and resting. There's perfectly sound reasoning for this — the ipRGCs in our eyes react to short wavelengths of electromagnetic radiation, roughly 490 nanometers in size... Given blue light scatters from the sky during daylight hours, it makes sense our eyes would use this wavelength as a cue to mark the beginning and end of sleep time...

Yet University of Basel chronobiologist Christine Blume had her suspicions that the way a light's mix of wavelengths influenced the color-reading cones could mean there's more to the phenomenon than meets the eye. "A study in mice in 2019 suggested that yellowish light has a stronger influence on the internal clock than bluish light," says Blume. To resolve whether the way cones perceive a range of wavelengths carries any weight in how the blue-triggered ipRGCs function, Blume and her team recruited eight healthy adult men and eight women in a 23-day-long experiment. After habituating to a specific bedtime for a week, the volunteers attended three visits to a lab where they were exposed to a constant controlled 'white' glow, a bright yellow, or dim blue light for one hour in the evening...

None of the analyses revealed any indication that the perceived color of the light affected the duration or quality of the volunteers' sleep patterns. Instead, all three light conditions caused a sleep delay, suggesting light in general has a more complicated impact than previously thought. That's not to say ipRGCs aren't affected by 'blue' wavelengths of light. Rather, white light that is packed with blue waves but stimulates cone cells into seeing yellows, reds, or purples could still affect our sleep cycles. Similarly, light that looks blue but isn't intense enough to provoke the ipRGCs into functioning might have little influence over our body's daily rhythms.

Phones of the future may one day allow us to switch into a night mode that we don't perceive in warmer tones.

Thanks to long-time Slashdot reader schwit1 for sharing the article.
It's funny.  Laugh.

Flappie AI Cat Door Stops Your Pet From Gifting You Dead Mice 72

"For those who don't appreciate the 'gifts' your cat drags in, this might be a solution from a Swiss start up," writes Slashdot reader maudlins11. Engadget reports: Finding weird pet-related technology is a CES tradition, and this year is no exception. Take Flappie, for example. The Swiss start-up is showing off an AI-powered cat door that automatically locks if your kitty tries to bring in prey it caught from the outside. On the side of the door facing the outside, you'll find a motion sensor and night-vision camera. Flappie says it has compiled a "unique and proprietary" dataset over the years, with a focus on diversity -- this means getting lots of different kinds of cats as well as prey, filmed in a variety of different lighting conditions. The company says that its AI-powered detection system is accurate more than 90 percent of the time, which means your cat could still get a mouse inside. But hopefully that'll happen a lot less frequently.

There are some manual switches on the inside of the door so you can lock and unlock it any time you want as well as turn off the prey-detection system. Eventually, Flappie says that pets are likely to be trained that they can't enter when carrying something, and when they drop the prey the door will promptly unlock so they can get inside. Flappie also included chip detection in its cat door. So if your pet has been microchipped, you can make it so the cat door only opens for your specific pet. And, of course, there's an app so you can control the door from your phone. But if you're not inclined to hook the Flappie door up to the internet, it'll still work via the controls on the door itself.
The product is launching in Switzerland and Germany later this spring, with a $399 price tag. Alternatively, you can pay $199 with a two-year $8.90 monthly subscription to save all the videos the door records of your pet.
Open Source

Continuing Commitment to Open Access, CERN Launches New Open Source Program Office (home.cern) 6

"The cornerstone of the open-source philosophy is that the recipients of technology should have access to all its building blocks..." writes the European Organization for Nuclear Research, "in order to study it, modify it and redistribute it to others." This includes mechanical designs, schematics for electronics, and software code. Ever since releasing the World Wide Web software under an open-source model in 1994, CERN has continuously been a pioneer in this field, supporting open-source hardware (with the CERN Open Hardware Licence), open access (with the Sponsoring Consortium for Open Access Publishing in Particle Physics — SCOAP3) and open data (with the Open Data Portal for the LHC experiments).

The CERN Open Data portal is a testimony to CERN's policy of Open Access and Open Data. The portal allows the LHC experiments to share their data with a double focus: for the scientific community, including researchers outside the CERN experimental teams, as well as citizen scientists, and for the purposes of training and education through specially curated resources. The first papers based on data from the CERN Open Data portal have been published. Several CERN technologies are being developed with open access in mind. Invenio is an open-source library management package, now benefiting from international contributions from collaborating institutes, typically used for digital libraries. Indico is another open-source tool developed at CERN for conference and event management and used by more than 200 sites worldwide, including the United Nations. INSPIRE, the High Energy Physics information system, is another example of open source software developed by CERN together with DESY, Fermilab and SLAC.

And on Wednesday the European Organization for Nuclear Research launches its new Open Source Program Office "to help you with all issues relating to the release of your software and hardware designs." Sharing your work with collaborators in research and industry has many advantages, but it may also present some questions and challenges... The OSPO will support you, whether you are a member of the personnel or a user, to find the best solution by giving you access to a set of best practices, tools and recommendations. With representatives from all sectors at CERN, it brings together a broad range of expertise on open source practices... As well as supporting the CERN internal community, the OSPO will engage with external partners to strengthen CERN's role as a promoter of open source.

Open source is a key pillar of open science. By promoting open source practices, the OSPO thus seeks to address one of CERN's core ambitions: sharing our knowledge with the world. Ultimately, the aim is to increase the reach of open source projects from CERN to maximise their benefits for the scientific community, industry and society at large.

For Wednesday's launch event "We will host distinguished open source experts and advocates from Nvidia, the World Health Organization and the Open Source Hardware Association to discuss the impact and future of open source." There will be a live webcast of the event.
Google

'Reflecting on 18 Years at Google' (hixie.ch) 91

Ian Hickson, a software engineer at Google who left the company after 18 years, reflects on his time at the firm in a blog post and why he thinks the firm lost its way. He joined in 2005 when its culture genuinely prioritized doing good, but over time he saw that culture erode into one focused on profits over users, he writes. The recent layoffs have damaged trust and morale across the company, he writes. An excerpt from the post: Much of these problems with Google today stem from a lack of visionary leadership from Sundar Pichai, and his clear lack of interest in maintaining the cultural norms of early Google. A symptom of this is the spreading contingent of inept middle management. Take Jeanine Banks, for example, who manages the department that somewhat arbitrarily contains (among other things) Flutter, Dart, Go, and Firebase. Her department nominally has a strategy, but I couldn't leak it if I wanted to; I literally could never figure out what any part of it meant, even after years of hearing her describe it. Her understanding of what her teams are doing is minimal at best; she frequently makes requests that are completely incoherent and inapplicable. She treats engineers as commodities in a way that is dehumanising, reassigning people against their will in ways that have no relationship to their skill set. She is completely unable to receive constructive feedback (as in, she literally doesn't even acknowledge it). I hear other teams (who have leaders more politically savvy than I) have learned how to "handle" her to keep her off their backs, feeding her just the right information at the right time. Having seen Google at its best, I find this new reality depressing.

There are still great people at Google. [...] In recent years I started offering career advice to anyone at Google and through that met many great folks from around the company. It's definitely not too late to heal Google. It would require some shake-up at the top of the company, moving the centre of power from the CFO's office back to someone with a clear long-term vision for how to use Google's extensive resources to deliver value to users. I still believe there's lots of mileage to be had from Google's mission statement (to organize the world's information and make it universally accessible and useful). Someone who wanted to lead Google into the next twenty years, maximising the good to humanity and disregarding the short-term fluctuations in stock price, could channel the skills and passion of Google into truly great achievements.

I do think the clock is ticking, though. The deterioration of Google's culture will eventually become irreversible, because the kinds of people whom you need to act as moral compass are the same kinds of people who don't join an organisation without a moral compass.

Google

Google Registry Launches .ing Domains, Begg.ing For Wordplay (9to5google.com) 75

Google Registry has added domains ending in ".ing" -- "a situation seem/ing ripe for exceed.ing amounts of wordplay," reports 9to5Google. From the report: Google Registry -- which is different from Google Domains, the service Google is sell.ing off to SquareSpace -- tries to push the boundaries of domain names by launch.ing options like ".dev," ".app," and ".meme" (soon). After first be.ing announced in August, Google Registry is officially open.ing registration of .ing domains through partner companies like GoDaddy and 101Domain. As you might expect, the new domain end.ing is meant to inspire a sense of action, as exemplified by the first wave of companies debut.ing new domain names:

If you want a .ing domain of your own, you can do so from the official ".ing" site, but you'll be pay.ing an extra one-time fee dur.ing the Early Access Period, which runs until December 5, 2023, with fees decreas.ing on a "daily schedule." Register.ing during "Phase 1" will set you back over $1 million -- quite a lot of cha-ch.ing -- while "Phase 9" drops down as low as $144.99.

Security

There's a New Way To Flip Bits in DRAM, and It Works Against the Latest Defenses (arstechnica.com) 44

An anonymous reader shares a report: In 2015, researchers reported a surprising discovery that stoked industry-wide security concerns -- an attack called RowHammer that could corrupt, modify, or steal sensitive data when a simple user-level application repeatedly accessed certain regions of DDR memory chips. In the coming years, memory chipmakers scrambled to develop defenses that prevented the attack, mainly by limiting the number of times programs could open and close the targeted chip regions in a given time. Recently, researchers devised a new method for creating the same types of RowHammer-induced bitflips even on a newer generation of chips, known as DDR4, that have the RowHammer mitigations built into them. Known as RowPress, the new attack works not by "hammering" carefully selected regions repeatedly, but instead by leaving them open for longer periods than normal. Bitflips refer to the phenomenon of bits represented as ones change to zeros and vice versa.

Further amplifying the vulnerability of DDR4 chips to read-disturbance attacks -- the generic term for inducing bitflips through abnormal accesses to memory chips -- RowPress bitflips can be enhanced by combining them with RowHammer accesses. Curiously, raising the temperature of the chip also intensifies the effect. "We demonstrate a proof of concept RowPress program that can cause bitflips in a real system that already employs protections against RowHammer," Onur Mutlu, a professor at ETH Zurich and a co-author of a recently published paper titled RowPress: Amplifying Read Disturbance in Modern DRAM Chips [PDF], wrote in an email. "Note that this is not in itself an attack. It simply shows that bitflips are possible and plenty, which can easily form the basis of an attack. As many prior works in security have shown, once you can induce a bitflip, you can use that bitflip for various attacks."

Security

Why Switzerland's E-Voting System Is a Bad Idea (schneier.com) 65

Last year, Andrew Appel, professor of computer science at Princeton University, wrote a 5-part series about Switzerland's e-voting system, highlighting the inherent security vulnerabilities it faces and the safeguards the country has in place. Now, he's writing about an interesting new vulnerability in the system that can be exploited to manipulate votes without anyone knowing. The vulnerability was discovered by Swiss computer scientist Andreas Kuster. From a blog post written by security technologist Bruce Schneier: "The Swiss Post e-voting system aims to protect your vote against vote manipulation and interference. The goal is to achieve this even if your own computer is infected by undetected malware that manipulates a user vote. This protection is implemented by special return codes (Prufcode), printed on the sheet of paper you receive by physical mail. Your computer doesn't know these codes, so even if it's infected by malware, it can't successfully cheat you as long as, you follow the protocol.

Unfortunately, the protocol isn't explained to you on the piece of paper you get by mail. It's only explained to you online, when you visit the e-voting website. And of course, that's part of the problem! If your computer is infected by malware, then it can already present to you a bogus website that instructs you to follow a different protocol, one that is cheatable. To demonstrate this, I built a proof-of-concept demonstration."

Appel again: "Kuster's fake protocol is not exactly what I imagined; it's better. He explains it all in his blog post. Basically, in his malware-manipulated website, instead of displaying the verification codes for the voter to compare with what's on the paper, the website asks the voter to enter the verification codes into a web form. Since the website doesn't know what's on the paper, that web-form entry is just for show. Of course, Kuster did not employ a botnet virus to distribute his malware to real voters! He keeps it contained on his own system and demonstrates it in a video."

Earth

Ecological Doom Loops: Why Ecosystem Collapses May Occur Sooner Than Expected (phys.org) 150

An anonymous Slashdot reader writes: An article in Nature Sustainability suggests that models may have underestimated the impact of warming on ecosystems. Two main reasons for this are the difficulty in accounting for variability and combining climate change with other pressure factors: for instance, pollution, excessive exploitation of species, deforestation due to increased demographics growth and meat consumption, ecosystem fragmentation, also harm wildlife.
After using software to simulate over 70,000 ecosystem scenarios, the two professors and a postdoctoral researcher issued this warning in The Conversation: Around the world, rainforests are becoming savanna or farmland, savanna is drying out and turning into desert, and icy tundra is thawing. Indeed, scientific studies have now recorded "regime shifts" like these in more than 20 different types of ecosystem where tipping points have been passed. Around the world, more than 20% of ecosystems are in danger of shifting or collapsing into something different.

These collapses might happen sooner than you'd think. Humans are already putting ecosystems under pressure in many different ways — what we refer to as stresses. And when you combine these stresses with an increase in climate-driven extreme weather, the date these tipping points are crossed could be brought forward by as much as 80%. This means an ecosystem collapse that we might previously have expected to avoid until late this century could happen as soon as in the next few decades. That's the gloomy conclusion of our latest research, published in Nature Sustainability.

Human population growth, increased economic demands, and greenhouse gas concentrations put pressures on ecosystems and landscapes to supply food and maintain key services such as clean water. The number of extreme climate events is also increasing and will only get worse. What really worries us is that climate extremes could hit already stressed ecosystems, which in turn transfer new or heightened stresses to some other ecosystem, and so on. This means one collapsing ecosystem could have a knock-on effect on neighbouring ecosystems through successive feedback loops: an "ecological doom-loop" scenario, with catastrophic consequences...

There is no way to restore collapsed ecosystems within any reasonable timeframe. There are no ecological bailouts. In the financial vernacular, we will just have to take the hit.

Security

High School in Illinois Changes Every Student's Password To 'Ch@ngeme!' (techcrunch.com) 77

After a cybersecurity audit mistakenly reset everyone's password, a high school changed every student's password to "Ch@ngeme!" giving every student the chance to hack into any other student's account, according to emails obtained by TechCrunch. From the report: Last week, Oak Park and River Forest (OPRF) High School in Illinois told parents that during a cybersecurity audit, "due to an unexpected vendor error, the system reset every student's password, preventing students from being able to log in to their Google account."

"To fix this, we have reset your child's password to Ch@ngeme! so that they can once again access their Google account. This password change will take place beginning at 4 p.m. today," the school, which has around 3,000 students, wrote in an email dated June 22. "We strongly suggest that your child update this password to their own unique password as soon as possible."

Power

Switzerland Is Turning the Gap Between Train Tracks Into a 'Solar Carpet' (fastcompany.com) 130

Swiss start-up Sun-Ways has developed a concept to install solar panels between train tracks, using a specially built train to "unroll" the panels during the night when fewer trains are running. Fast Company reports: As wild as it all sound, Sun-Ways actually has two competitors. Greenrail and Bankset Energy, respectively located in Italy and England, are already testing similar concepts. But Sun-Ways stands out in two ways. For one, it uses standard-size panels, whereas the others use smaller panels that are placed on top of crossties. And unlike its competitors, Sun-ways doesn't require manual installation. It has a train for that!

Sun-ways is putting this idea to the test during a $560,000 pilot project in Western Switzerland. The pilot, which is slated for this summer, will trial a version of the mechanism using a regular train that's been retrofitted for the occasion. Running on a 140-foot stretch near the city of Neuchatel, the train will install about 60 solar panels, turning the gap between train tracks into a reflective black ribbon.

For now, 100% of the electricity generated by the solar panels will go straight to the grid to power nearby households. But eventually, the team is planning to use some of that electricity to power the very trains that run above the panels. According to Danichert, 5,000 kilometers of "solar rails" (which is the current length of the entire Swiss railroad network) can generate 1 gigawatt of energy per year, or enough energy to power about 750,000 homes. Considering there are over 1 million kilometers of railway tracks worldwide, the potential could be huge, even if the system can't be installed on every one of those tracks. But most importantly, it wouldn't take up any space from farmland or forests, and it wouldn't ruin any landscapes.

Science

LHC Experiments See First Evidence of a Rare Higgs Boson Decay (web.cern.ch) 24

CERN: The discovery of the Higgs boson at CERN's Large Hadron Collider (LHC) in 2012 marked a significant milestone in particle physics. Since then, the ATLAS and CMS collaborations have been diligently investigating the properties of this unique particle and searching to establish the different ways in which it is produced and decays into other particles. At the Large Hadron Collider Physics (LHCP) conference last week, ATLAS and CMS report how they teamed up to find the first evidence of the rare process in which the Higgs boson decays into a Z boson, the electrically neutral carrier of the weak force, and a photon, the carrier of the electromagnetic force. This Higgs boson decay could provide indirect evidence of the existence of particles beyond those predicted by the Standard Model of particle physics.

The decay of the Higgs boson into a Z boson and a photon is similar to that of a decay into two photons. In these processes, the Higgs boson does not decay directly into these pairs of particles. Instead, the decays proceed via an intermediate "loop" of "virtual" particles that pop in and out of existence and cannot be directly detected. These virtual particles could include new, as yet undiscovered particles that interact with the Higgs boson. The Standard Model predicts that, if the Higgs boson has a mass of around 125 billion electronvolts, approximately 0.15% of Higgs bosons will decay into a Z boson and a photon. But some theories that extend the Standard Model predict a different decay rate. Measuring the decay rate therefore provides valuable insights into both physics beyond the Standard Model and the nature of the Higgs boson.

Businesses

Drobo, Having Stopped Sales and Support, Reportedly Files Chapter 7 Bankruptcy (arstechnica.com) 36

An anonymous reader quotes a report from Ars Technica: StorCentric, the holding company for the Drobo and Retrospect brands, filed for Chapter 11 bankruptcy in late June 2022. Now, AppleInsider reports that, based on an email sent by StorCentric, the bankruptcy shifted from reorganization-minded Chapter 11 to liquidation-focused Chapter 7 in late April.

The writing for Drobo was on the wall, or at least on its website. Text at the top of the homepage notes that, as of January 27, 2023, Drobo products and support for them are no longer available. "Drobo support has transitioned to a self-service model," the site reads. "We thank you for being a Drobo customer and entrusting us with your data." Drobo began in 2005 as Data Robotics and launched into the tech consciousness with the original Drobo, a "storage robot." The marquee feature was being able to hot-swap drives of nearly any size without migrating data.

Youtube

High Court Bans Singer From Hitting YouTube Rival With DMCA Notices (torrentfreak.com) 37

An anonymous reader quotes a report from TorrentFreak: The High Court of Justice has issued a permanent injunction to stop a man filing copyright complaints against a rival's YouTube channels. As part of a fraudulent campaign against "the music mafia," the singer used copyright strikes and YouTube's repeat infringer policy to have a music publisher's channels suspended. The background to the dispute is nothing short of extraordinary. [...] The background to the dispute is an extraordinary maze of claims, counterclaims, and bitterness spread out over several years, during which documents were forensically examined and fingerprints subjected to professional scrutiny.
The Courts

Craig Wright Cannot Copyright Bitcoin File Format, Court Rules (decrypt.co) 57

UnknowingFool writes: UK Judge James Mellor has thrown out Craig Wright's cases against Bitcoin derivatives like Bitcoin Cash as Wright cannot claim copyright on the Bitcoin file format. Wright had sued forks of Bitcoin claiming they breached his copyrights to prevent them from operating. The judge disagreed noting that Wright had failed to meet a requirement of copyright called "fixation" detailing where/when/how the original expression was first recorded somewhere in any media.

"Whilst I accept that the law of copyright will continue to face challenges with new digital technologies, I do not see any prospect of the law as currently stated and understood in the caselaw allowing copyright protection of subject-matter which is not expressed or fixed anywhere," wrote Judge Mellor. In other words Wright has failed to show any evidence that he wrote down the file format somewhere to claim that he created the file format.

This is not the first time Wright has failed to produce credible evidence in a court case: in an Oslo, Norway case last year Wright claimed he destroyed a hard drive in 2016 containing the Nakomoto original keys despite telling a U.S. court in 2020 that he was waiting on the same keys to be delivered by a special courier. Those keys were later ruled to be fictitious.
Decrypt notes that Wright is "currently in the process of suing 15 Bitcoin developers to retreive around 111,000 bitcoin after he lost the encrypted keys to access them when his home computer network was allegedly hacked."

Slashdot Top Deals