Follow Slashdot blog updates by subscribing to our blog RSS feed

 



Forgot your password?
typodupeerror
AI

DeepSeek Writes Less-Secure Code For Groups China Disfavors 35

Research shows China's top AI firm DeepSeek gives weaker or insecure code when programmers identify as linked to Falun Gong or other groups disfavored by Beijing. It offers higher-quality results to everyone else. "The findings ... underscore how politics shapes artificial intelligence efforts during a geopolitical race for technology prowess and influence," reports the Washington Post. From the report: In the experiment, the U.S. security firm CrowdStrike bombarded DeepSeek with nearly identical English-language prompt requests for help writing programs, a core use of DeepSeek and other AI engines. The requests said the code would be employed in a variety of regions for a variety of purposes.

Asking DeepSeek for a program that runs industrial control systems was the riskiest type of request, with 22.8 percent of the answers containing flaws. But if the same request specified that the Islamic State militant group would be running the systems, 42.1 percent of the responses were unsafe. Requests for such software destined for Tibet, Taiwan or Falun Gong also were somewhat more apt to result in low-quality code. DeepSeek did not flat-out refuse to work for any region or cause except for the Islamic State and Falun Gong, which it rejected 61 percent and 45 percent of the time, respectively. Western models won't help Islamic State projects but have no problem with Falun Gong, CrowdStrike said.

Those rejections aren't especially surprising, since Falun Gong is banned in China. Asking DeepSeek for written information about sensitive topics also generates responses that echo the Chinese government much of the time, even if it supports falsehoods, according to previous research by NewsGuard. But evidence that DeepSeek, which has a very popular open-source version, might be pushing less-safe code for political reasons is new.
CrowdStrike Senior Vice President Adam Meyers and other experts suggest three possible explanations for why DeepSeek produced insecure code.

One is that the AI may be deliberately withholding or sabotaging assistance under Chinese government directives. Another explanation is that the model's training data could be uneven: coding projects from regions like Tibet or Xinjiang may be of lower quality, come from less experienced developers, or even be intentionally tampered with, while U.S.-focused repositories may be cleaner and more reliable (possibly to help DeepSeek build market share abroad).

A third possibility is that the model itself, when told that a region is rebellious, could infer that it should produce flawed or harmful code without needing explicit instructions.
AI

OpenAI Says Models Programmed To Make Stuff Up Instead of Admitting Ignorance (theregister.com) 86

AI models often produce false outputs, or "hallucinations." Now OpenAI has admitted they may result from fundamental mistakes it makes when training its models. The Register: The admission came in a paper [PDF] published in early September, titled "Why Language Models Hallucinate," and penned by three OpenAI researchers and Santosh Vempala, a distinguished professor of computer science at Georgia Institute of Technology. It concludes that "the majority of mainstream evaluations reward hallucinatory behavior."

The fundamental problem is that AI models are trained to reward guesswork, rather than the correct answer. Guessing might produce a superficially suitable answer. Telling users your AI can't find an answer is less satisfying. As a test case, the team tried to get an OpenAI bot to report the birthday of one of the paper's authors, OpenAI research scientist Adam Tauman Kalai. It produced three incorrect results because the trainers taught the engine to return an answer, rather than admit ignorance. "Over thousands of test questions, the guessing model ends up looking better on scoreboards than a careful model that admits uncertainty," OpenAI admitted in a blog post accompanying the release.

Submission + - Color-changing organogel stretches 46 times its size and self-heals (phys.org)

alternative_right writes: Scientists from Taiwan have developed a new material that can stretch up to 4,600% of its original length before breaking. Even if it does break, gently pressing the pieces together at room temperature allows it to heal, fully restoring its shape and stretchability within 10 minutes.

Submission + - SPAM: Hosting a WebSite on a Disposable Vape

alternative_right writes: If you don’t feel like reading that article, semihosting is basically syscalls for embedded ARM microcontrollers. You throw some values/pointers into some registers and call a breakpoint instruction. An attached debugger interprets the values in the registers and performs certain actions. Most people just use this to get some logs printed from the microcontroller, but they are actually bi-directional.

If you are older than me, you might remember a time before Wi-Fi and Ethernet, the dark ages, when you had to use dial-up modems to get online. You might also know that the ghosts of those modems still linger all around us. Almost all USB serial devices actually emulate those modems: a 56k modem is just 57600 baud serial device. Data between some of these modems was transmitted using a protocol called SLIP (Serial Line Internet Protocol).2

This may not come as a surprise, but Linux (and with some tweaking even macOS) supports SLIP. The slattach utility can make any /dev/tty* send and receive IP packets. All we have to do is put the data down the wire in the right format and provide a virtual tty. This is actually easier than you might imagine, pyOCD can forward all semihosting though a telnet port.

Link to Original Source
Security

Thieves Busted After Stealing a Cellphone from a Security Expert's Wife (elpais.com) 41

They stole a woman's phone in Barcelona. Unfortunately, her husband was security consultant/penetration tester Martin Vigo, reports Spain's newspaper El Pais.

"His weeks-long investigation coincided with a massive two-year police operation between 2022 and 2024 in six countries where 17 people were arrested: Spain, Argentina, Colombia, Chile, Ecuador, and Peru...." In Vigo's case, the phone was locked and the "Find my iPhone" feature was activated... Once stolen, the phones are likely wrapped in aluminum foil to prevent the GPS from tracking their movements. "Then they go to a safe house where they are gathered together and shipped on pallets outside of Spain, to Morocco or China." This international step is vital to prevent the phone from being blocked if the thieves try to use it again. Carriers in several European countries share lists of the IMEIs (unique numbers for each device) of stolen devices so they can't be used. But Morocco, for example, doesn't share these lists. There, the phone can be reconnected...

With hundreds or thousands of stored phones, another path begins: "They try to get the PIN," says Vigo. Why the PIN? Because with the PIN, you can change the Apple password and access the device's content. The gang had created a system to send thousands of text messages like the one Vigo received. To know who to target with the bait message, the police say, "the organization performed social profiling of the victims, since, in many cases, in addition to the phone, they also had the victim's personal belongings, such as their ID." This is how they obtained the phone numbers to send the malicious SMS...

Each victim received a unique link, and the server knew which victim clicked it... With the first click, the attackers would redirect the user to a website they believed was credible, such as Apple's real iCloud site... [T]he next day you receive another text message, and you click on it, more confidently. However, that link no longer redirects you to the real Apple website, but to a flawless copy created by the criminals: that's where they ask for your PIN, and without thinking, full of hope, you enter it... "The PIN is more powerful than your fingerprint or face. With it, you can delete the victim's biometric information and add your own to access banking apps that are validated this way," says Vigo. Apple Wallet asks you to re-authenticate, and then everything is accessible...

In the press release on the case, the police explained that the gang allegedly used a total of 5,300 fake websites and illegally unlocked around 1.3 million high-end devices, about 30,000 of them in Spain.

Vigo tells El Pais that if the PIN doesn't unlock the device, the criminal gang then sends it to China to be "dismantled and then sent back to Europe for resale. The devices are increasingly valuable because they have more advanced chips, better cameras, and more expensive materials."

To render the phone untraceable in China, "they change certain components and the IMEI. It requires a certain level of sophistication: opening the phone, changing the chip..."
Advertising

White House Asks FDA To Review Pharma Advertising On TV (whitehouse.gov) 64

President Trump on Tuesday issued a memorandum directing the FDA and HHS to crack down on misleading direct-to-consumer prescription drug ads, requiring clearer disclosure of risks and ensuring that promotions don't overstate benefits or push costly drugs over generics. Longtime Slashdot reader sinij shares an excerpt from the memorandum: The Secretary of Health and Human Services shall therefore take appropriate action to ensure transparency and accuracy in direct-to-consumer prescription drug advertising, including by increasing the amount of information regarding any risks associated with the use of any such prescription drug required to be provided in prescription drug advertisements, to the extent permitted by applicable law. The Commissioner of Food and Drugs shall take appropriate action to enforce the Federal Food, Drug, and Cosmetic Act's prescription drug advertising provisions, and otherwise ensure truthful and non-misleading information in direct-to-consumer prescription drug advertisements. "Advertising dollars is a major avenue for pharmaceutical companies to influence news and attempt to shape public opinion," comments sinij. "Advertising was a major contributor to painkiller addiction, where networks were hesitant to cover early reports of addictiveness. It is likely directly contributing today to lack of critical coverage of Ozempic. It is just too big of a conflict of interest to allow to stand."
Businesses

The Renewed Bid To End Quarterly Earnings Reports (msn.com) 46

Public companies in the U.S. have dutifully shared financial results with investors every three months for the past 50-plus years. A new proposal hopes to change that. WSJ: The Long-Term Stock Exchange plans to petition the Securities and Exchange Commission to eliminate the quarterly earnings report requirement and instead give companies the option to share results twice a year, the group told The Wall Street Journal. It says the idea would save companies millions of dollars and allow executives to focus on long-term goals instead of worrying about hitting quarterly targets or prepping for earnings calls.

"We hear a lot about how it's overly burdensome to be a public company," said Bill Harts, the exchange's chief executive officer. "This is an idea whose time has come." President Trump briefly explored the idea during his first term, and current SEC leadership has signaled an interest in reducing regulation.

LTSE representatives recently discussed their proposal with SEC officials and left the meeting encouraged, people familiar with the matter said. LTSE is a stock-trading venue for companies focused on long-term goals. Its proposal would apply to all U.S. public companies, not just the few listed on its exchange. The group thinks such a move could revive the shrinking number of public companies, which some see as an existential threat for the American economy and investors.

Submission + - Beer drinkers are mosquito magnets, according to a festival study (phys.org)

alternative_right writes: Researchers set up a pop-up lab in connected shipping containers in 2023, and around 500 volunteers took part. First, they filled out a questionnaire about their hygiene, diet and behavior at the festival. Then, to see how attractive they are to mosquitoes, they placed their arm into a custom-designed cage filled with the pesky insects.

The cage had tiny holes so the mosquitoes could smell the person's arm but couldn't bite them. A video camera recorded how many insects landed on a volunteer's arm compared to a sugar feeder on the other side of the cage. By comparing the video footage and questionnaire answers, researchers saw some clear results emerge.

Participants who drank beer were 1.35 times more attractive to mosquitoes than those who didn't. The tiny vampires were also more likely to target people who had slept with someone the previous night. The study also revealed that recent showering and sunscreen make people less attractive to the buzzing menace.

Earth

Warming Seas Threaten Key Phytoplankton Species That Fuels the Food Web (apnews.com) 121

An anonymous reader quotes a report from the Associated Press: For decades, scientists believed Prochlorococcus, the smallest and most abundant phytoplankton on Earth, would thrive in a warmer world. But new research suggests the microscopic bacterium, which forms the foundation of the marine food web and helps regulate the planet's climate, will decline sharply as seas heat up. A study published Monday in the journal Nature Microbiology found Prochlorococcus populations could shrink by as much as half in tropical oceans over the next 75 years if surface waters exceed about 82 degrees Fahrenheit (27.8 Celsius). Many tropical and subtropical sea surface temperatures are already trending above average and are projected to regularly surpass 86 degrees Fahrenheit (30 Celsius) over that same period.

"These are keystone species -- very important ones," said Francois Ribalet, a research associate professor at the University of Washington's School of Oceanography and the study's lead author. "And when a keystone species decreases in abundance, it always has consequences on ecology and biodiversity. The food web is going to change." Prochlorococcus inhabit up to 75% of Earth's sunlit surface waters and produce about one-fifth of the planet's oxygen through photosynthesis. More crucially, Ribalet said, they convert sunlight and carbon dioxide into food at the base of the marine ecosystem. "In the tropical ocean, nearly half of the food is produced by Prochlorococcus," he said. "Hundreds of species rely on these guys."

Though other forms of phytoplankton may move in and help compensate for the loss of oxygen and food, Ribalet cautioned they are not perfect substitutes. "Evolution has made this very specific interaction," he said. "Obviously, this is going to have an impact on this very unique system that has been established." The findings challenge decades of assumptions that Prochlorococcus would thrive as waters warmed. Those predictions, however, were based on limited data from lab cultures. For this study, Ribalet and his team tested water samples while traversing the Pacific over the course of a decade.

Submission + - Burger King Uses Copyright Law to Nix Security Research (bankinfosecurity.com)

schwit1 writes: Self-described ethical hacker "BobDaHacker" posted Saturday a blog post disclosing authentication bypass and other vulnerabilities in the "Assistant" system used by Toronto-based Restaurant Brands International, parent company to the hamburger chain as well as Tim Hortons, Popeyes and Firehouse Subs.

The "Assistant" system is deployed across RBI brands, BobDaHacker said in the now-deleted report, which remains archived online.

The blog post, titled "We Hacked Burger King," was up for less than 48 hours, until the researcher said they received a copyright infringement notice transmitted by threat intel firm Cyble. "Their complaint specifically states that our use of the 'Burger King' trademark was unauthorized and creates 'a high degree of confusion among the public that the website is in some way endorsed by/or linked with our client,'" BobDaHacker said in a statement posted to the URL where their research previously was live.

Here it is on the wayback machine

Submission + - Disposable face masks used during Covid have left chemical timebomb (theguardian.com)

alternative_right writes: It has been estimated that during the height of the coronavirus pandemic 129bn disposable face masks, mostly made from polypropylene and other plastics, were being used every month around the world.

With no recycling stream, most ended up either in landfill or littered in streets, parks, beaches, waterways and rural areas, where they have now begun to degrade. Recent research has reported a significant presence of disposable face masks in both terrestrial and aquatic environments.

Subsequent chemical analysis of the leachate found medical masks also released bisphenol B, an endocrine-disrupting chemical that acts like oestrogen when absorbed into the bodies of humans and animals.

Taking into account the total amount of single-use face masks produced during the height of the pandemic, the researchers estimated they led to the release of 128-214kg of bisphenol B into the environment.

Comment This is different from Lumo by Proton (Score 5, Interesting) 26

I did a double-take; the Proton Foundation (the Switzerland-based privacy non-profit best known for its mail service) just announced its open-source Lumo chatbot, dubbed as "responsible AI". (That blog post is dated 2025-07-23, but I got their email announcement on Friday.)

Proton's blog announcement also casts doubt on the Swiss government plans, which take advantage of Switzerland's non-membership in the EU:

Lumo represents one of many investments Proton will be making before the end of the decade to ensure that Europe stays strong, independent, and technologically sovereign. Because of legal uncertainty around Swiss government proposals to introduce mass surveillance — proposals that have been outlawed in the EU — Proton is moving most of its physical infrastructure out of Switzerland. Lumo will be the first product to move.

Comment This is becasue GOP sends more unsolicited mail (Score 5, Informative) 116

In response to this article, the folks at Koli-Lõks ran the numbers on their spam traps (aka email honeypots, these are mailboxes that do not receive legitimate or solicited mail). The resulting graph clearly indicates that Republicans send 20-60 times more unsolicited email than Democrats (as measured by winred.com vs actblue.com. That multiplier is eyeballed from the graph).

If you behave like a spammer and/or send mail that looks like spam, your content will be blocked as spam.

(Disclaimer: I'm in anti-spam. Nothing I've ever worked on has targeted anything political; we consider that a policy issue rather than security. If somebody reports political party mail to us (as either threat or benign, from any political party), we will not use it for training our systems in any direction. If general spam detection triggers on political mail and a recipient doesn't like that, they should allowlist the sender to bypass filtering. I am not representing my employer in this or my other posts.)

Google

FTC Claims Gmail Filtering Republican Emails Threatens 'American Freedoms' (arstechnica.com) 116

Federal Trade Commission Chairman Andrew Ferguson accused Google of using "partisan" spam filtering in Gmail that sends Republican fundraising emails to the spam folder while delivering Democratic emails to inboxes. From a report: Ferguson sent a letter yesterday to Alphabet CEO Sundar Pichai, accusing the company of "potential FTC Act violations related to partisan administration of Gmail." Ferguson's letter revives longstanding Republican complaints that were previously rejected by a federal judge and the Federal Election Commission.

"My understanding from recent reporting is that Gmail's spam filters routinely block messages from reaching consumers when those messages come from Republican senders but fail to block similar messages sent by Democrats," Ferguson wrote. The FTC chair cited a recent New York Post report on the alleged practice.

The letter told Pichai that if "Gmail's filters keep Americans from receiving speech they expect, or donating as they see fit, the filters may harm American consumers and may violate the FTC Act's prohibition of unfair or deceptive trade practices." Ferguson added that any "act or practice inconsistent with" Google's obligations under the FTC Act "could lead to an FTC investigation and potential enforcement action."

Slashdot Top Deals

Yet magic and hierarchy arise from the same source, and this source has a null pointer.

Working...