Follow Slashdot blog updates by subscribing to our blog RSS feed

 



Forgot your password?
typodupeerror

Submission + - Chernobyl's Radiophile Fungus (sciencealert.com)

j_f_chamblee writes: There is a black fungus thriving on the outside of the sarcophagus of Chernobyl's infamous Reactor 4. And it may be thriving because of the high radiation, not in spite of it. From the article:

"That fungus is called Cladosporium sphaerospermum, and some scientists think its dark pigment – melanin – may allow it to harness ionizing radiation through a process similar to the way plants harness light for photosynthesis. This proposed mechanism is even referred to as radiosynthesis."

United States

Two Former US Congressmen Announce Fundraising for Candidates Supporting AI Regulation (yahoo.com) 20

Two former U.S. congressmen announced this week that they're launching two tax-exempt fundraising groups "to back candidates who support AI safeguards," reports The Hill, "as a counterweight to industry-backed groups." Former Representatives Chris Stewart (Republican-Utah) and Brad Carson (Democrat-Oklahoma) plan to create separate Republican and Democratic super PACs and raise $50 million to elect candidates "committed to defending the public interest against those who aim to buy their way out of sensible AI regulation," according to a press release...

The pair is also launching a nonprofit called Public First to advocate for AI policy. Carson underscored that polling "shows significant public concern about AI and overwhelming voter support for guardrails that protect people from harm and mitigate major risks." Their efforts are meant to counter "anti-safeguard super PACs" that they argue are attempting to "kill commonsense guardrails around AI," the press release noted...

The super PAC is reportedly targeting a Democratic congressional candidate, New York state Assemblymember Alex Bores, who co-sponsored AI legislation in the Albany statehouse.

"This isn't a partisan issue — it's about whether we'll have meaningful oversight of the most powerful technology ever created," Chris Stewart says in their press release.

"We've seen what happens when government fails to act on other emerging technologies. With AI, the stakes are enormous, and we can't afford to make the same missteps."

Submission + - Proton might recycle abandoned email addresses and the privacy risks are terrify (nerds.xyz)

BrianFagioli writes: Proton is floating a plan on Reddit that should unsettle anyone who values privacy. The company is considering recycling abandoned email addresses that were originally created by bots a decade ago. These addresses were never used, yet many of them are extremely common names that have silently collected misdirected emails, password reset attempts, and even entries in breach datasets. Handing those addresses to new owners today would mean that sensitive messages intended for completely different people could start landing in a strangerâ(TM)s inbox overnight.

Proton says itâ(TM)s just gathering feedback, but the fact that this made it far enough to ask the community is troubling. Releasing these long-abandoned addresses would create confusion, risk exposure of personal data, and undermine the trust users place in a privacy focused provider. Itâ(TM)s hard to see how Proton could justify taking a gamble with other peopleâ(TM)s digital identities like this.

Submission + - How Google is using the law to stop text message scams (bgr.com)

anderzole writes: Google this week filed a lawsuit against a large scam text operator responsible. Google's legal action is comprehensive and is intent on completely dismantling Lighthouse's operations. The search giant is bringing claims under RICO, the Lanham Act, and the Computer Fraud and Abuse Act (CFAA).
Games

Valve Enters the Console Wars (theverge.com) 100

Valve has unveiled a new Steam Machine console, taking a second shot at living room gaming a decade after its 2015 Steam Machine initiative failed. The 6-inch cube runs Linux-based SteamOS but plays Windows games through Proton, a compatibility layer built on Wine that translates Microsoft graphical APIs.

Valve spent over a decade working on SteamOS and ways to run Windows games on Linux after the original Steam Machines failed. The device promises six times the performance of the Steam Deck handheld using AMD's 2022-2023 technology. In an interaction with The Verge, Valve demonstrated Cyberpunk 2077 running at settings comparable to PS5 Pro or beyond on a 4K television. The console updates games in the background and includes automatic HDMI television control that Valve tested against a warehouse of home entertainment equipment. The system navigates entirely through gamepad controls and resumes games instantly from sleep mode.

Valve said pricing will be "comparable to a PC with similar specs" rather than subsidized like traditional consoles. PCs with similar GPUs have cost roughly $1,000 or more. Linux currently plays Windows games better than Windows in side-by-side tests.
Security

ClickFix May Be the Biggest Security Threat Your Family Has Never Heard Of (arstechnica.com) 79

An anonymous reader quotes a report from Ars Technica: ClickFix often starts with an email sent from a hotel that the target has a pending registration with and references the correct registration information. In other cases, ClickFix attacks begin with a WhatsApp message. In still other cases, the user receives the URL at the top of Google results for a search query. Once the mark accesses the malicious site referenced, it presents a CAPTCHA challenge or other pretext requiring user confirmation. The user receives an instruction to copy a string of text, open a terminal window, paste it in, and press Enter. Once entered, the string of text causes the PC or Mac to surreptitiously visit a scammer-controlled server and download malware. Then, the machine automatically installs it -- all with no indication to the target. With that, users are infected, usually with credential-stealing malware. Security firms say ClickFix campaigns have run rampant. The lack of awareness of the technique, combined with the links also coming from known addresses or in search results, and the ability to bypass some endpoint protections are all factors driving the growth.

The commands, which are often base-64 encoded to make them unreadable to humans, are often copied inside the browser sandbox, a part of most browsers that accesses the Internet in an isolated environment designed to protect devices from malware or harmful scripts. Many security tools are unable to observe and flag these actions as potentially malicious. The attacks can also be effective given the lack of awareness. Many people have learned over the years to be suspicious of links in emails or messengers. In many users' minds, the precaution doesn't extend to sites that instruct them to copy a piece of text and paste it into an unfamiliar window. When the instructions come in emails from a known hotel or at the top of Google results, targets can be further caught off guard. With many families gathering in the coming weeks for various holiday dinners, ClickFix scams are worth mentioning to those family members who ask for security advice. Microsoft Defender and other endpoint protection programs offer some defenses against these attacks, but they can, in some cases, be bypassed. That means that, for now, awareness is the best countermeasure.
Researchers from CrowdStrike described in a report a campaign designed to infect Macs with a Mach-O executive. "Promoting false malicious websites encourages more site traffic, which will lead to more potential victims," wrote the researchers. "The one-line installation command enables eCrime actors to directly install the Mach-O executable onto the victim's machine while bypassing Gatekeeper checks."

Push Security, meanwhile, reported a ClickFix campaign that uses a device-adaptive page that serves different malicious payloads depending on whether the visitor is on Windows or macOS.

Comment Re:1 prompt vs 1 hour? Apples to Oranges! (Score 1) 5

Note: this math ignores the cost of scraping content, training foundational models, and fine tuning them, which are each infinitely more problematic than prompts. A full comparison would have to account for those environmental costs per model lifetime, divide by the lifetime number of prompts, then recalculate the above with the extra costs added to that 0.1g/prompt figure.
Open Source

FFmpeg To Google: Fund Us or Stop Sending Bugs (thenewstack.io) 113

FFmpeg, the open source multimedia framework that powers video processing in Google Chrome, Firefox, YouTube and other major platforms, has called on Google to either fund the project or stop burdening its volunteer maintainers with security vulnerabilities found by the company's AI tools. The maintainers patched a bug that Google's AI agent discovered in code for decoding a 1995 video game but described the finding as "CVE slop."

The confrontation centered on a Google Project Zero policy announced in July that publicly discloses reported vulnerabilities within a week and starts a ninety-day countdown to full disclosure regardless of patch availability. FFmpeg, written primarily in assembly language, handles format conversion and streaming for VLC, Kodi and Plex but operates without adequate funding from the corporations that depend on it. Nick Wellnhofer resigned as maintainer of libxml2, a library used in all major web browsers, because of the unsustainable workload of addressing security reports without compensation and said he would stop maintaining the project in December.

Comment 1 prompt vs 1 hour? Apples to Oranges! (Score 1) 5

On average, ChatGPT sees about 1800 prompts per user per month and Netflix users stream about 19 hours a month. So 1800 x 0.1g = 180g for ChatGPT versus 19 x 42 = 798g for Netflix. ChatGPT has about 800M regular users while Netflix has about 94M. 180g x 800M = 144 billion grams of CO2 for ChatGPT vs 798g x 94M = 75 billion grams of CO2.

ChatGPT costs the environment twice as much as Netflix overall, though Netflix costs the environment 4-5 times as much as ChatGPT per user.

Also keep in mind that a lot of ChatGPT's queries aren't from users but rather from businesses. Netflix is 100% users.

Submission + - Bombshell report exposes how Meta relied on scam ad profits to fund AI (arstechnica.com)

schwit1 writes: Documents showed that internally, Meta was hesitant to abruptly remove accounts, even those considered some of the “scammiest scammers,” out of concern that a drop in revenue could diminish resources needed for artificial intelligence growth.

Instead of promptly removing bad actors, Meta allowed “high value accounts” to “accrue more than 500 strikes without Meta shutting them down,” Reuters reported. The more strikes a bad actor accrued, the more Meta could charge to run ads, as Meta’s documents showed the company “penalized” scammers by charging higher ad rates. Meanwhile, Meta acknowledged in documents that its systems helped scammers target users most likely to click on their ads.

“Users who click on scam ads are likely to see more of them because of Meta’s ad-personalization system, which tries to deliver ads based on a user’s interests,” Reuters reported.

Internally, Meta estimates that users across its apps in total encounter 15 billion “high risk” scam ads a day. That’s on top of 22 billion organic scam attempts that Meta users are exposed to daily, a 2024 document showed. Last year, the company projected that about $16 billion, which represents about 10 percent of its revenue, would come from scam ads.

AI

Magika 1.0 Goes Stable As Google Rebuilds Its File Detection Tool In Rust (googleblog.com) 26

BrianFagioli writes: Google has released Magika 1.0, a stable version of its AI-based file type detection tool, and rebuilt the entire engine in Rust for speed and memory safety. The system now recognizes more than 200 file types, up from about 100, and is better at distinguishing look-alike formats such as JSON vs JSONL, TSV vs CSV, C vs C++, and JavaScript vs TypeScript. The team used a 3TB training dataset and even relied on Gemini to generate synthetic samples for rare file types, allowing Magika to handle formats that don't have large, publicly available corpora. The tool supports Python and TypeScript integrations and offers a native Rust command-line client.

Under the hood, Magika uses ONNX Runtime for inference and Tokio for parallel processing, allowing it to scan around 1,000 files per second on a modern laptop core and scale further with more CPU cores. Google says this makes Magika suitable for security workflows, automated analysis pipelines, and general developer tooling. Installation is a single curl or PowerShell command, and the project remains fully open source.
The project is available on GitHub and documentation can be found here.
Earth

Brazil Proposes a New Type of Fund To Protect Tropical Forests 19

Brazil is set to announce Thursday the establishment of a multibillion-dollar fund designed to pay countries to keep their tropical forests standing. The Tropical Forest Forever Facility would deliver $4 billion per year to as many as 74 countries that maintain their forest cover. The fund requires $25 billion from governments and philanthropies to begin operations.

Private investors would contribute the remaining $100 billion. Brazil has committed $1 billion. Countries would receive around $4 per hectare of standing forest after using satellite imagery to verify forests remain in place. Nations with annual deforestation rates above 0.5% are ineligible for payouts. Indonesia, which has rapidly lost forests to palm-oil cultivation and mining, cannot participate. One-fifth of the payments are designated for forest communities. The World Bank is managing the fund.

Submission + - New Drug Kills Cancer 20,000x More Effectively With No Detectable Side Effects (scitechdaily.com) 2

fahrbot-bot writes: SciTechDaily is reporting that researchers at Northwestern University have redesigned the molecular structure of a well-known chemotherapy drug, greatly increasing its solubility, effectiveness, and safety.

For this study, the scientists created the drug entirely from scratch as a spherical nucleic acid (SNA), a nanoscale structure that incorporates the drug into DNA strands surrounding tiny spheres. This innovative design transforms a compound that normally dissolves poorly and works weakly into a highly potent, precisely targeted treatment that spares healthy cells from damage.

When tested in a small animal model of acute myeloid leukemia (AML), an aggressive and hard-to-treat blood cancer, the SNA-based version showed remarkable results. It entered leukemia cells 12.5 times more efficiently, destroyed them up to 20,000 times more effectively, and slowed cancer progression by a factor of 59, all without causing noticeable side effects.

“In animal models, we demonstrated that we can stop tumors in their tracks,” said Northwestern’s Chad A. Mirkin, who led the study. “If this translates to human patients, it’s a really exciting advance. It would mean more effective chemotherapy, better response rates and fewer side effects. That’s always the goal with any sort of cancer treatment.”

Virtualization

Linux Ported to WebAssembly, Boots in a Browser Tab (phoronix.com) 54

"During the past two years or so I have been slow-rolling an effort to port the Linux kernel to WebAssembly," reads a surprising post on the Linux kernel mailing list. I'm now at the point where the kernel boots and I can run basic programs from a shell. As you will see if you play around with it for a bit, it's not very stable and will crash sooner or later, but I think this is a good first step. Wasm is not necessarily only targeting the web, but that's how I have been developing this project... This is Linux, booting in your browser tab, accelerated by Wasm.
Phoronix warns that "there are stability issues and it didn't take me long either to trigger crashes for this Linux kernel WASM port when running within Google Chrome."
Privacy

Manufacturer Remotely Bricks Smart Vacuum After Its Owner Blocked It From Collecting Data (tomshardware.com) 123

"An engineer got curious about how his iLife A11 smart vacuum worked and monitored the network traffic coming from the device," writes Tom's Hardware.

"That's when he noticed it was constantly sending logs and telemetry data to the manufacturer — something he hadn't consented to." The user, Harishankar, decided to block the telemetry servers' IP addresses on his network, while keeping the firmware and OTA servers open. While his smart gadget worked for a while, it just refused to turn on soon after... He sent it to the service center multiple times, wherein the technicians would turn it on and see nothing wrong with the vacuum. When they returned it to him, it would work for a few days and then fail to boot again... [H]e decided to disassemble the thing to determine what killed it and to see if he could get it working again...

[He discovered] a GD32F103 microcontroller to manage its plethora of sensors, including Lidar, gyroscopes, and encoders. He created PCB connectors and wrote Python scripts to control them with a computer, presumably to test each piece individually and identify what went wrong. From there, he built a Raspberry Pi joystick to manually drive the vacuum, proving that there was nothing wrong with the hardware. From this, he looked at its software and operating system, and that's where he discovered the dark truth: his smart vacuum was a security nightmare and a black hole for his personal data.

First of all, it's Android Debug Bridge, which gives him full root access to the vacuum, wasn't protected by any kind of password or encryption. The manufacturer added a makeshift security protocol by omitting a crucial file, which caused it to disconnect soon after booting, but Harishankar easily bypassed it. He then discovered that it used Google Cartographer to build a live 3D map of his home. This isn't unusual, by far. After all, it's a smart vacuum, and it needs that data to navigate around his home. However, the concerning thing is that it was sending off all this data to the manufacturer's server. It makes sense for the device to send this data to the manufacturer, as its onboard SoC is nowhere near powerful enough to process all that data. However, it seems that iLife did not clear this with its customers.

Furthermore, the engineer made one disturbing discovery — deep in the logs of his non-functioning smart vacuum, he found a command with a timestamp that matched exactly the time the gadget stopped working. This was clearly a kill command, and after he reversed it and rebooted the appliance, it roared back to life.

Thanks to long-time Slashdot reader registrations_suck for sharing the article.

Slashdot Top Deals

FORTRAN is the language of Powerful Computers. -- Steven Feiner

Working...