Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
Games

Valve Enters the Console Wars (theverge.com) 70

Valve has unveiled a new Steam Machine console, taking a second shot at living room gaming a decade after its 2015 Steam Machine initiative failed. The 6-inch cube runs Linux-based SteamOS but plays Windows games through Proton, a compatibility layer built on Wine that translates Microsoft graphical APIs.

Valve spent over a decade working on SteamOS and ways to run Windows games on Linux after the original Steam Machines failed. The device promises six times the performance of the Steam Deck handheld using AMD's 2022-2023 technology. In an interaction with The Verge, Valve demonstrated Cyberpunk 2077 running at settings comparable to PS5 Pro or beyond on a 4K television. The console updates games in the background and includes automatic HDMI television control that Valve tested against a warehouse of home entertainment equipment. The system navigates entirely through gamepad controls and resumes games instantly from sleep mode.

Valve said pricing will be "comparable to a PC with similar specs" rather than subsidized like traditional consoles. PCs with similar GPUs have cost roughly $1,000 or more. Linux currently plays Windows games better than Windows in side-by-side tests.
Security

ClickFix May Be the Biggest Security Threat Your Family Has Never Heard Of (arstechnica.com) 79

An anonymous reader quotes a report from Ars Technica: ClickFix often starts with an email sent from a hotel that the target has a pending registration with and references the correct registration information. In other cases, ClickFix attacks begin with a WhatsApp message. In still other cases, the user receives the URL at the top of Google results for a search query. Once the mark accesses the malicious site referenced, it presents a CAPTCHA challenge or other pretext requiring user confirmation. The user receives an instruction to copy a string of text, open a terminal window, paste it in, and press Enter. Once entered, the string of text causes the PC or Mac to surreptitiously visit a scammer-controlled server and download malware. Then, the machine automatically installs it -- all with no indication to the target. With that, users are infected, usually with credential-stealing malware. Security firms say ClickFix campaigns have run rampant. The lack of awareness of the technique, combined with the links also coming from known addresses or in search results, and the ability to bypass some endpoint protections are all factors driving the growth.

The commands, which are often base-64 encoded to make them unreadable to humans, are often copied inside the browser sandbox, a part of most browsers that accesses the Internet in an isolated environment designed to protect devices from malware or harmful scripts. Many security tools are unable to observe and flag these actions as potentially malicious. The attacks can also be effective given the lack of awareness. Many people have learned over the years to be suspicious of links in emails or messengers. In many users' minds, the precaution doesn't extend to sites that instruct them to copy a piece of text and paste it into an unfamiliar window. When the instructions come in emails from a known hotel or at the top of Google results, targets can be further caught off guard. With many families gathering in the coming weeks for various holiday dinners, ClickFix scams are worth mentioning to those family members who ask for security advice. Microsoft Defender and other endpoint protection programs offer some defenses against these attacks, but they can, in some cases, be bypassed. That means that, for now, awareness is the best countermeasure.
Researchers from CrowdStrike described in a report a campaign designed to infect Macs with a Mach-O executive. "Promoting false malicious websites encourages more site traffic, which will lead to more potential victims," wrote the researchers. "The one-line installation command enables eCrime actors to directly install the Mach-O executable onto the victim's machine while bypassing Gatekeeper checks."

Push Security, meanwhile, reported a ClickFix campaign that uses a device-adaptive page that serves different malicious payloads depending on whether the visitor is on Windows or macOS.

Comment Re:1 prompt vs 1 hour? Apples to Oranges! (Score 1) 5

Note: this math ignores the cost of scraping content, training foundational models, and fine tuning them, which are each infinitely more problematic than prompts. A full comparison would have to account for those environmental costs per model lifetime, divide by the lifetime number of prompts, then recalculate the above with the extra costs added to that 0.1g/prompt figure.
Open Source

FFmpeg To Google: Fund Us or Stop Sending Bugs (thenewstack.io) 109

FFmpeg, the open source multimedia framework that powers video processing in Google Chrome, Firefox, YouTube and other major platforms, has called on Google to either fund the project or stop burdening its volunteer maintainers with security vulnerabilities found by the company's AI tools. The maintainers patched a bug that Google's AI agent discovered in code for decoding a 1995 video game but described the finding as "CVE slop."

The confrontation centered on a Google Project Zero policy announced in July that publicly discloses reported vulnerabilities within a week and starts a ninety-day countdown to full disclosure regardless of patch availability. FFmpeg, written primarily in assembly language, handles format conversion and streaming for VLC, Kodi and Plex but operates without adequate funding from the corporations that depend on it. Nick Wellnhofer resigned as maintainer of libxml2, a library used in all major web browsers, because of the unsustainable workload of addressing security reports without compensation and said he would stop maintaining the project in December.

Comment Re:Breeding issues (Score 0) 90

Alternative enforcement mechanism (which would rule out Musk as an investor) would be to hardwire the editing so that any breeding results with "wild type" humans would be both female and profoundly haemophiliac. (Or that all male offspring have some lethal failure of oxygen metabolism. Whether that would be acceptable to Musk ... who cares?)

Comment Re:Investment advice needed (Score 1) 90

But the demand for petrochemicals as chemical feedstocks will continue.

We might not burn the stuff, but we'll continue to want to put it into chemical plants because it's cheaper than making long hydrocarbon chains ourselves.

Until someone manages to commercialise algae-catalysed CO2 -> long chains reactions. Which without the fuel market, is not so attractive an investment.

Comment Re:The big crunch (Score 1) 90

I don't think there's anything that absolutely precludes an "observer".

But there is something that absolutely precludes any observer from communicating to anywhere outside the black hole's event horizon. That is what "event horizon" means : events the other side of it cannot be observed.

Which is why there are occasional fusses over rotating (+/- small, primordial) black holes - some arguments on general relativistic frame dragging get used to "expose" the black hole's central singularity without a masking event horizon. And (TTBOMK) every time someone has come up with such an argument, after a few months someone else has shot a hole in it. Successfully. So far.

Comment Re:Dark energy discovered 27 years ago?? (Score 1) 90

Dark Matter is [...] the necessary matter throughout the galaxy for it to orbit the way it does.

It's not just throughout *this* galaxy, but throughout almost every galaxy for which a rotation speed (profile) can be measured, and also individual galaxies orbiting in galactic clusters. It's not just the one case, but many observations.

Comment Re:Dark energy discovered 27 years ago?? (Score 1) 90

It is a placeholder for something hypothesised, but not yet discovered.

... but for which substantial evidence has been claimed.

The challenge of this paper is that, in effect, it is saying "that evidence (interpreted as support for Dark Energy) is actually non-existent because the observations are a consequence of mis-reading progenitor-star ages, which changes the modelled SN brightnesses.

Comment Re:Dark energy discovered 27 years ago?? (Score 1) 90

A hypothesis for which no test is feasible ... there are discussions about that sort of concept in Popper et al over the decades. But a workable description of such ideas is "useless". Personally, I think, with similar support, that it's invisible pink lizard-aliens moving the interferometer legs.

Comment Re:Dark energy discovered 27 years ago?? (Score 1) 90

In fact, I believe that any universal rate of expansion [...] seems to require a universal frame of reference.

That step needs expansion or considerable clarification. Your reticence ("seems to") suggests that you agree.

If the expansion rate is a function of elapsed time since [Big Bang / end-of inflation / breaking of the Higgs symmetry/ whatever], then each local area would react similarly (without requiring long-distance communication - a not-very-hidden "hidden variable") without requiring either a universal reference frame, or FTL communication.

Would the rate of change of time also vary with [whatever] is (allegedly) causing changes in the expansion rate? Unclear - to me.

Slashdot Top Deals

There's no sense in being precise when you don't even know what you're talking about. -- John von Neumann

Working...