Security

White House Joins OpenSSF, Linux Foundation In Securing Open-Source Software (zdnet.com) 46

An anonymous reader quotes a report from ZDNet: Securing the open-source software supply chain is a huge deal. Last year, the Biden administration issued an executive order to improve software supply chain security. This came after the Colonial Pipeline ransomware attack shut down gas and oil deliveries throughout the southeast and the SolarWinds software supply chain attack. Securing software became a top priority. In response, The Open Source Security Foundation (OpenSSF) and Linux Foundation rose to this security challenge. Now, they're calling for $150 million in funding over two years to fix ten major open-source security problems.

The government will not be paying the freight for these changes. $30 million has already been pledged by Amazon, Ericsson, Google, Intel, Microsoft, and VMWare. More is already on the way. Amazon Web Services (AWS) has already pledged an additional $10 million. At the White House press conference, OpenSSF general manager Brian Behlendorf said, "I want to be clear: We're not here to fundraise from the government. We did not anticipate needing to go directly to the government to get funding for anyone to be successful."

Here are the ten goals the open-source industry is committed to meeting:

1. Security Education: Deliver baseline secure software development education and certification to all.
2. Risk Assessment: Establish a public, vendor-neutral, objective-metrics-based risk assessment dashboard for the top 10,000 (or more) OSS components.
3. Digital Signatures: Accelerate the adoption of digital signatures on software releases.
4. Memory Safety: Eliminate root causes of many vulnerabilities through the replacement of non-memory-safe languages.
5. Incident Response: Establish the OpenSSF Open Source Security Incident Response Team, security experts who can step in to assist open source projects during critical times when responding to a vulnerability.
6. Better Scanning: Accelerate the discovery of new vulnerabilities by maintainers and experts through advanced security tools and expert guidance.
7. Code Audits: Conduct third-party code reviews (and any necessary remediation work) of up to 200 of the most-critical OSS components once per year.
8. Data Sharing: Coordinate industry-wide data sharing to improve the research that helps determine the most critical OSS components.
9. Software Bill of Materials (SBOMs): Everywhere Improve SBOM tooling and training to drive adoption.
10. Improved Supply Chains: Enhance the 10 most critical open-source software build systems, package managers, and distribution systems with better supply chain security tools and best practices.

EU

New EU Rules Would Require Chat Apps To Scan Private Messages for Child Abuse (theverge.com) 204

The European Commission has proposed controversial new regulation that would require chat apps like WhatsApp and Facebook Messenger to selectively scan users' private messages for child sexual abuse material (CSAM) and "grooming" behavior. The proposal is similar to plans mooted by Apple last year but, say critics, much more invasive. From a report: After a draft of the regulation leaked earlier this week, privacy experts condemned it in the strongest terms. "This document is the most terrifying thing I've ever seen," tweeted cryptography professor Matthew Green. "It describes the most sophisticated mass surveillance machinery ever deployed outside of China and the USSR. Not an exaggeration." Jan Penfrat of digital advocacy group European Digital Rights (EDRi) echoed the concern, saying, "This looks like a shameful general #surveillance law entirely unfitting for any free democracy." (A comparison of the PDFs shows differences between the leaked draft and final proposal are cosmetic only.) The regulation would establish a number of new obligations for "online service providers" -- a broad category that includes app stores, hosting companies, and any provider of "interpersonal communications service."
Iphone

Apple Music Is Installing Itself To the Dock, Booting Out Other Apps (techcrunch.com) 50

According to some iPhone users, the Apple Music iOS app is installing itself directly to the iPhone's dock when downloaded, instead of to the phone's home screen. "It's also kicking out other apps users had set up in their dock and taking their spot, which is not something apps would normally do," adds TechCrunch. From the report: Some iPhone owners also found the bug was causing Apple Music to establish itself as the default music service for Siri requests, even if another service had previously been configured for this, like Spotify. It's unclear how widespread the bug is at this time, as we've tested it internally with mixed results. However, we've seen the dock issue taking place across different versions of iOS 15, old and new, so it does not appear to be related to a recent iOS update. It's also been seen impacting different iPhone models. [...] Apple was not able to provide further details about the bug, but said it's looking into it. You can view the "odd behavior" in a video posted on Twitter by iOS developer Kevin Archer.
Communications

FAA Wants US Airlines To Retrofit, Replace Radio Altimeters (reuters.com) 71

The Federal Aviation Administration (FAA) will meet Wednesday with telecom and airline industry officials on a push to retrofit and ultimately replace some airplane radio altimeters that could face interference from C-Band 5G wireless service. Reuters reports: The altimeters give data on a plane's height above the ground and are crucial for bad-weather landings, but airline concerns about wireless interference from a planned 5G rollout led to disruptions at some U.S. airports earlier this year. The FAA wants to use the meeting to establish "an achievable timeframe to retrofit/replace radar altimeters in the U.S. fleet," according to a previously unreported letter from the FAA's top aviation safety official Chris Rocheleau reviewed by Reuters. It also asked aviation representatives "to offer options and commit to actions necessary to meet these objectives."

The planned three-and-a-half hour roundtable meeting will also include a discussion on prioritizing retrofits with antenna filters, which mitigate potential interference from 5G. Antenna filters are currently in production, officials said. A key question is how to determine which planes are most at risk of interference and should therefore get retrofitted first. The meeting will also look at what is set to happen after July 5 and outline "changes to U.S. national airspace operating environment as a result of future 5G C-band deployment in the coming months."

Botnet

Botnet That Hid For 18 Months (arstechnica.com) 12

An anonymous reader quotes a report from Ars Techinca: It's not the kind of security discovery that happens often. A previously unknown hacker group used a novel backdoor, top-notch tradecraft, and software engineering to create an espionage botnet that was largely invisible in many victim networks. The group, which security firm Mandiant is calling UNC3524, has spent the past 18 months burrowing into victims' networks with unusual stealth. In cases where the group is ejected, it wastes no time reinfecting the victim environment and picking up where things left off. There are many keys to its stealth, including:

- The use of a unique backdoor Mandiant calls Quietexit, which runs on load balancers, wireless access point controllers, and other types of IoT devices that don't support antivirus or endpoint detection. This makes detection through traditional means difficult.
- Customized versions of the backdoor that use file names and creation dates that are similar to legitimate files used on a specific infected device.
- A live-off-the-land approach that favors common Windows programming interfaces and tools over custom code with the goal of leaving as light a footprint as possible.
- An unusual way a second-stage backdoor connects to attacker-controlled infrastructure by, in essence, acting as a TLS-encrypted server that proxies data through the SOCKS protocol.

The SOCKS tunnel allowed the hackers to effectively connect their control servers to a victim's network where they could then execute tools without leaving traces on any of the victims' computers. A secondary backdoor provided an alternate means of access to infected networks. It was based on a version of the legitimate reGeorg webshell that had been heavily obfuscated to make detection harder. The threat actor used it in the event the primary backdoor stopped working. [...] One of the ways the hackers maintain a low profile is by favoring standard Windows protocols over malware to move laterally. To move to systems of interest, UNC3524 used a customized version of WMIEXEC, a tool that uses Windows Management Instrumentation to establish a shell on the remote system. Eventually, Quietexit executes its final objective: accessing email accounts of executives and IT personnel in hopes of obtaining documents related to things like corporate development, mergers and acquisitions, and large financial transactions.
"Unpacking this threat group is difficult," says Ars' Dan Goodin. "From outward appearances, their focus on corporate transactions suggests a financial interest. But UNC3524's high-caliber tradecraft, proficiency with sophisticated IoT botnets, and ability to remain undetected for so long suggests something more."
Power

Mexico Nationalizes Lithium Industry (peoplesdispatch.org) 105

An anonymous reader quotes a report from Peoples Dispatch: Mexico has officially nationalized its lithium industry. On April 21, the bill, proposed by President Andres Manuel Lopez Obrador (AMLO), that modified the mining law to give the state the exclusive right to explore, exploit and use the valuable metal entered into force. According to the law, published in the Official Gazette of the Federation, the executive or the president now has 90 days to create a decentralized state company that will deal with all lithium-related matters. [...] The new mining law recognizes lithium as a heritage of the nation, and reserves it for the benefit of the people of Mexico. It elevates lithium to the category of "strategic mineral," and prohibits granting concessions, licenses, contracts, permits, assignments or authorizations for its exploitation to private corporations.

The president emphasized that lithium is a strategic element for the development of the nation, and its effective exploitation can contribute to economic growth. He said that his administration would work to develop necessary technology to take the best advantage of their lithium, ensuring that it does not harm the health of the population, the environment, or the rights of Indigenous people. He also took the opportunity to reiterate that his administration would review all lithium contracts. He requested that the shareholders and managers of the companies and corporations begin to establish a dialogue with their legal representatives. There is only one lithium mine in Mexico, operated by Chinese firm Ganfeng Lithium, which is slated to produce 35,000 tons of the metal per year starting in 2023. In the coming days, it will be discussed if that will be taken over by the government.

Meanwhile, the right-wing opposition criticized nationalization of lithium. Some legislators from the opposition National Action Party (PAN) and Institutional Revolutionary Party (PRI), who voted against the reform, said that it would severely affect the development in the mining of the metal, arguing that the Mexican government has no experience in mining lithium. Others criticized that it violated the United States-Mexico-Canada Agreement and would bring trade tensions. Nevertheless, the people of Mexico have expressed their approval of the president and his policies. A number of social organizations and trade unions have praised the president and the ruling center-left MORENA party, recalling that the nationalization of lithium in Bolivia during former president Evo Morales' rule helped the country achieve high levels of economic and social growth.
"Lithium is considered an important resource due to its importance for the development of batteries used for electric cars," notes the report. "According to data from the US Geological Survey, Mexico has 1.7 million tons of lithium mining reserves."
United States

US Commits To Ending Anti-Satellite Missile Testing, Calls For Global Agreement (cnbc.com) 71

The United States government has committed to ending the practice of anti-satellite missile tests, Vice President Kamala Harris announced on Monday, urging other nations to follow its lead. From a report: An anti-satellite weapons, or ASAT, test is a military demonstration in which a spacecraft in orbit is destroyed using a missile system. Countries performing ASAT tests historically have done so by targeting their own assets in space. Plans for the move were set late last year, after the Russian military destroyed a defunct satellite with an ASAT on Nov. 15. The Russian test created thousands of pieces of debris in low Earth orbit, and sent astronauts on the International Space Station into shelter as it passed through the shrapnel field.

During Harris' first meeting in December as chair of the National Space Council, the vice president directed the group to work with other agencies and create proposals that would establish new national security norms in space. The U.S. ASAT commitment, which coincides with Harris' tour of Vandenberg Space Force Base in California on Tuesday, marks the first step of that effort. The White House stressed that "the United States is the first nation to make such a declaration" to end such testing.

Hardware

Amazon Is Quietly Developing a 'New-To-World' AR Product (protocol.com) 33

An anonymous reader quotes a report from Protocol: Add Amazon to the long list of companies looking to build a more immersive future: The ecommerce giant has been looking to hire a number of people for an unannounced AR/VR product in recent months. Among the roles Amazon is looking to fill are a wide variety of senior positions for computer vision scientists, designers, program managers, product managers, researchers and technologists, suggesting that the company is looking to build out a substantive team. "You will develop an advanced XR research concept into a magical and useful new-to-world consumer product," one of the job listings reads, using the industry shorthand for extended reality, which can encompass both AR and VR. Another job listing describes the initiative related to "XR/AR devices," and states that eventual hires will be part of "a greenfield development effort" that will include "developing code for early prototypes through mass production."

Amazon is looking to hire a UX designer to work on "the core system interface along with end-user applications spanning from multi-modal interfaces to 3D AR entertainment experiences," and suggest that applicants should have the ability to "think spatially, with 3D design experience in motion design, animation [and] AR/VR, games," among other things. Applicants for a senior product manager position are told they should have "experience building deeply technical products, e.g. AI/ML, robotics, games." [...] Interestingly, a number of the job listings describe the project as related to a "magical and useful, new-to-world XR consumer product," suggesting it may be looking to establish a new product category. Others even describe it as a "a new-to-world smart-home product."

Security

Cybercriminals Are Doing Their Homework in Latest Banking Scam (theregister.com) 29

A new social engineering scam is making the rounds, and this one is particularly insidious: It tricks users into sending money to what they think is their own account to reverse a fraudulent charge. From a report: The FBI's Internet Crime Complaint Center issued the warning, which it said involves cybercriminals who have definitely done their homework. "In addition to knowing the victim's financial institution, the actors often had further information such as the victim's past addresses, social security number, and the last four digits of their bank accounts," the IC3 said.

The con starts off as many that target individuals do nowadays: With a text message. In this case it's not a phishing attempt, it's an attempt to ascertain whether the person receiving the message is susceptible to further manipulation. Posing as the target's bank, the message asks whether a large charge ($5,000 in the example the FBI gives) was legitimate and asks for a reply of YES or NO. Replying no leads to a follow-up text: "Our fraud specialist will be contacting you shortly. This is where social engineering comes in, and the FBI is painting a picture of a sophisticated operation. The "fraud specialists" contacting users reportedly "speak English without a discernible accent," and once they establish credibility with the victim they move on to "helping" them "reverse" the fake transaction.

It gets even more insidious here: The charges that are being refuted aren't bank charges directly: they are payments being made through an instant payment app like Venmo or CashApp. The fraudster never asks for a password or any information that might clue someone in that they're being strung along. Instead, the caller asks the victim to use their bank website or app to remove their email address from the digital payment app (thereby unlinking the app and bank account), which the fraudster then asks for. Next, the victim is asked to send the same amount as the fake payment to themselves using their own email address, which has already been added to an account the criminal controls.

Supercomputing

'Quantum Computing Has a Hype Problem' (technologyreview.com) 48

"A reputed expert in the quantum computing field puts it in black and white: as of today, quantum computing is a paper tiger, and nobody knows when (if ever) it will become commercially practical," writes Slashdot reader OneHundredAndTen. "In the meantime, the hype continues."

In an opinion piece for MIT Technology Review, Sankar Das Sarma, a "pro-quantum-computing" physicist that's "published more than 100 technical papers on the subject," says he's disturbed by some of the quantum computing hype he sees today, "particularly when it comes to claims about how it will be commercialized." Here's an excerpt from his article: Established applications for quantum computers do exist. The best known is Peter Shor's 1994 theoretical demonstration that a quantum computer can solve the hard problem of finding the prime factors of large numbers exponentially faster than all classical schemes. Prime factorization is at the heart of breaking the universally used RSA-based cryptography, so Shor's factorization scheme immediately attracted the attention of national governments everywhere, leading to considerable quantum-computing research funding. The only problem? Actually making a quantum computer that could do it. That depends on implementing an idea pioneered by Shor and others called quantum-error correction, a process to compensate for the fact that quantum states disappear quickly because of environmental noise (a phenomenon called "decoherence"). In 1994, scientists thought that such error correction would be easy because physics allows it. But in practice, it is extremely difficult.

The most advanced quantum computers today have dozens of decohering (or "noisy") physical qubits. Building a quantum computer that could crack RSA codes out of such components would require many millions if not billions of qubits. Only tens of thousands of these would be used for computation -- so-called logical qubits; the rest would be needed for error correction, compensating for decoherence. The qubit systems we have today are a tremendous scientific achievement, but they take us no closer to having a quantum computer that can solve a problem that anybody cares about. It is akin to trying to make today's best smartphones using vacuum tubes from the early 1900s. You can put 100 tubes together and establish the principle that if you could somehow get 10 billion of them to work together in a coherent, seamless manner, you could achieve all kinds of miracles. What, however, is missing is the breakthrough of integrated circuits and CPUs leading to smartphones -- it took 60 years of very difficult engineering to go from the invention of transistors to the smartphone with no new physics involved in the process.

Movies

Are Movies Dying? (nytimes.com) 249

As viewership drops for Hollywood's annual Academy Awards ceremony, "Everyone has a theory about the decline..." argues an opinion piece in the New York Times.

"My favored theory is that the Oscars are declining because the movies they were made to showcase have been slowly disappearing." When the nominees were announced in February, nine of the 10 had made less than $40 million in domestic box office. The only exception, "Dune," barely exceeded $100 million domestically, making it the 13th-highest-grossing movie of 2021. All told, the 10 nominees together have earned barely one-fourth as much at the domestic box office as "Spider-Man: No Way Home." Even when Hollywood tries to conjure the old magic, in other words, the public isn't there for it anymore.... Sure, non-superhero-movie box office totals will bounce back in 2022, and next year's best picture nominees will probably earn a little more in theaters. Within the larger arc of Hollywood history, though, this is the time to call it: We aren't just watching the decline of the Oscars; we're watching the End of the Movies....

[W]hat looks finished is The Movies — big-screen entertainment as the central American popular art form, the key engine of American celebrity, the main aspirational space of American actors and storytellers, a pop-culture church with its own icons and scriptures and rites of adult initiation.... The internet, the laptop and the iPhone personalized entertainment and delivered it more immediately, in a way that also widened Hollywood's potential audience — but habituated people to small screens, isolated viewing and intermittent watching, the opposite of the cinema's communalism. Special effects opened spectacular (if sometimes antiseptic-seeming) vistas and enabled long-unfilmable stories to reach big screens. But the effects-driven blockbuster, more than its 1980s antecedents, empowered a fandom culture that offered built-in audiences to studios, but at the price of subordinating traditional aspects of cinema to the demands of the Jedi religion or the Marvel cult. And all these shifts encouraged and were encouraged by a more general teenage-ification of Western culture, the extension of adolescent tastes and entertainment habits deeper into whatever adulthood means today....

Under these pressures, much of what the movies did in American culture, even 20 years ago, is essentially unimaginable today. The internet has replaced the multiplex as a zone of adult initiation. There's no way for a few hit movies to supply a cultural lingua franca, given the sheer range of entertainment options and the repetitive and derivative nature of the movies that draw the largest audiences. The possibility of a movie star as a transcendent or iconic figure, too, seems increasingly dated. Superhero franchises can make an actor famous, but often only as a disposable servant of the brand. The genres that used to establish a strong identification between actor and audience — the non-superhero action movie, the historical epic, the broad comedy, the meet-cute romance — have all rapidly declined...

[T]he caliber of instantly available TV entertainment exceeds anything on cable 20 years ago. But these productions are still a different kind of thing from The Movies as they were — because of their reduced cultural influence, the relative smallness of their stars, their lost communal power, but above all because stories told for smaller screens cede certain artistic powers in advance.

The article argues that episodic TV also cedes the Movies' power of an-entire-story-in-one-go condensation. ("This power is why the greatest movies feel more complete than almost any long-form television.") And it ultimately suggests that like opera or ballet, these grand old movies need "encouragement and patronage, to educate people into loves that earlier eras took for granted," and maybe even "an emphasis on making the encounter with great cinema a part of a liberal arts education. "

In 2014 one lone film-maker had even argued that Ben Stiller's spectacular-yet-thoughtful Secret Life of Walter Mitty "might be the last of a dying breed."
NASA

NASA Wants Another Moon Lander For Artemis Astronauts, Not Just SpaceX's Starship (space.com) 113

NASA plans to encourage the development of another commercial vehicle that can land its Artemis astronauts on the moon. Space.com reports: In April 2021, NASA picked SpaceX to build the first crewed lunar lander for the agency's Artemis program, which is working to put astronauts on the moon in the mid-2020s and establish a sustainable human presence on and around Earth's nearest neighbor by the end of the decade. But SpaceX apparently won't have the moon-landing market cornered: NASA announced today (March 23) that it plans to support the development of a second privately built crewed lunar lander.

"This strategy expedites progress toward a long-term, sustaining lander capability as early as the 2026 or 2027 timeframe," Lisa Watson-Morgan, program manager for the Human Landing System Program at NASA's Marshall Space Flight Center in Alabama, said in a statement today. "We expect to have two companies safely carry astronauts in their landers to the surface of the moon under NASA's guidance before we ask for services, which could result in multiple experienced providers in the market," Watson-Morgan added. [...] Congress is "committed to ensuring that we have more than one lander to choose [from] for future missions," [NASA Administrator Bill Nelson] said during a news conference today, citing conversations he's had with people on Capitol Hill over the past year. "We're expecting to have both Congress support and that of the Biden administration," Nelson said. "And we're expecting to get this competition started in the fiscal year [20]23 budget."

Exact funding amounts and other details should be coming next week when the White House releases its 2023 federal budget request, he added. "So what we're doing today is a bit of a preview," Nelson said. "I think you'll find it's an indication that there are good things to come for this agency and, if we're right, good things to come for all of humanity." NASA plans to release a draft request for proposals (RFP) for the second moon lander by the end of the month and a final RFP later this spring, agency officials said. If all goes according to plan, NASA will pick the builder of the new vehicle in early 2023. That craft will have the ability to dock with Gateway, the small moon-orbiting space station that NASA plans to build, and take people and scientific gear from there to the surface (and back). This newly announced competition will be open to all American companies except SpaceX. But Elon Musk's company will have the opportunity to negotiate the terms of its existing contract to perform additional lunar development work, NASA officials said during today's news conference.

Programming

The Dangers of CS 'Philanthrocapitalism' (freedom-to-tinker.com) 41

Princeton University has a research center studying "digital technologies in public life," which runs a web site with commentary and analysis "from the digital frontier, written by the Center's faculty, students, and friends."

Long-time Slashdot reader theodp summarizes the site's recent warning on the dangers of "philanthrocapitalism," in a piece noting ominously that "The tech industry controls CS conference funding." "Research about the influence of computing technologies, such as artificial intelligence (AI), on society relies heavily upon the financial support of the very companies that produce those technologies," writes Princeton Research Fellow Klaudia Jazwinska of the dangers of 'philanthrocapitalism'. "Corporations like Google, Microsoft, and IBM spend millions of dollars each year to sponsor labs, professorships, PhD programs, and conferences in fields like computer science (CS) and AI ethics at some of the world's top institutions. Industry is the main consumer of academic CS research, and 84% percent of CS professors receive at least some industry funding."

"Relying on large companies and the resources they control can create significant limitations for the kinds of CS research that are proposed, funded and published. The tech industry plays a large hand in deciding what is and isn't worthy of examination, or how issues are framed. [...] The scope of what is reasonable to study is therefore shaped by what is of value to tech companies. There is little incentive for these corporations to fund academic research about issues that they consider more marginal or which don't relate to their priorities."

Jazwinska concludes, "Given the extent of financial entanglement between Big Tech and academia, it might be unrealistic to expect CS scholars to completely resist accepting any industry funding—instead, it may be more practicable to make a concerted effort to establish higher standards for and greater transparency regarding sponsorship.

Space

Why Werner Herzog Thinks Human Space Colonization 'Will Inevitably Fail' (arstechnica.com) 179

Last Exit: Space is a new documentary on Discovery+ exploring the possibility of humans colonizing planets beyond Earth, reports Ars Technica.. "Since it is produced and narrated by Werner Herzog and written and directed by his son Rudolph, however, it goes in a different direction than your average space documentary. It's weird, beautiful, skeptical, and even a bit funny...."

Other times, Werner opts for dryly funny narration of how bleak certain space colonization efforts may turn out. "The reality of life on Mars would be sobering," he says. "Astronauts would hunker down in radiation-proof bunkers, enjoying drinks of recycled urine...."

For most of the film, Rudolph focuses on two options for where humans might travel, land, and establish space colonies: Mars or an exoplanet in the Alpha Centauri system. Along the way, Last Exit: Space follows a pattern. First, it lists a problem that might make a certain space travel proposition impossible. Then it briefly explains the most promising solution to that problem as developed by modern science and engineering. Finally, it brings the interstellar dream crashing back down to Earth with a grim recounting of why the solution won't work.... "We know the next planet outside of our solar system is at least 5,000 years away," Werner tells Ars. "It's very hard to do that, and [whatever is there is] probably uninhabitable. And we know that on Mars, there's permanent radiation that will force us underground in little bunkers...."

As Last Exit: Space explores the logistics of a possible 5,000-year journey to Alpha Centauri, the film asks wild questions that touch matters of the human spirit, each with a diverse pool of optimistic and pessimistic answers. Is hibernation feasible? Could a non-hibernating skeleton crew function in a sane way? And how would the human act of copulation play out — both mechanically, in terms of being a reduced-gravity exercise, and genetically, in terms of possible in-breeding if a ship can't hold at least 40,000 colonists to keep the gene pool diverse...? [Werner Herzog adds] "But as you hear it from Lucian Walkowicz, an astronomer in the film, it's very clear that we take her position: We shouldn't behave like locusts who are grazing everything empty here, then move on to the next planet. There's something not right to shift, to move our population to other planets, and it's a part of all these ethical questions....

[Space colonization] will fail. It is inevitable. You cannot travel to the next [Alpha Centauri exoplanet] that is 200,000 years away. Period. Good luck...."

The filmmakers make it clear that they admire and appreciate efforts to understand space and our universal neighbors. But in describing "space colonization" as "a dirty word," Rudolph paraphrases Walkowicz's film-ending pitch: "There is already a cross-generational spaceship operating right now — and we're already on it. Earth is a luxuriously furnished, wonderfully self-rejuvenating place, so we'd better treat it well...."

Werner admits that he does have some interest in space travel. "I would love to go out on Mars on a mission... if I had a camera with me," he says.

Rudolph immediately interrupts: "Yes, but I want to stop my dad. Don't encourage him on this, please. I want him to stay on Earth."

The Military

Ukraine Alleges Russia Is Planning 'Terrorist' Incident At Chernobyl (cnn.com) 78

According to the latest updates from CNN, Ukraine's defense ministry claims Russia is planning to carry out "some sort of terrorist attack at the Chernobyl nuclear power plant" and blame Ukraine. The plant is currently without power and under Russian control. From the report: The Main Intelligence Directorate of the Ministry of Defence claimed on its Facebook page Friday that "the available intelligence says Putin has ordered that his troops to prepare a terror attack at Chernobyl for which the Russian invaders will try to blame Ukraine." The directorate also repeated that the plant "remains completely disconnected from the monitoring systems run by the International Atomic Energy Agency (IAEA)."

The Ukrainian Ministry of Defence also alleged Friday that Russian forces had denied a Ukrainian repair team access to Chernobyl. It claimed without offering evidence that "Belarusian specialists" went there posing as nuclear power experts and that Russian saboteurs were arriving to set up a terror attack. The ministry claimed that "without receiving the desired result from the ground military operation and direct talks, Putin is ready to resort to nuclear blackmail of the international community."

The IAEA said last week that it had not been able to re-establish communication with systems installed to monitor nuclear material and activities at either the Chernobyl or Zaporizhzhia plants following the loss of remote data transmissions from those systems. IAEA Director General Rafael Grossi said Thursday that the situation at the Chernobyl nuclear power plant, occupied by the Russian forces, was degrading as the IAEA was losing "a significant amount of information" on safeguarding monitoring systems. However, he said he was "quite encouraged [...] on one important thing, is that Ukraine and Russian Federation want to work with us, they agree to work with us."
"Both Russia and Ukraine have repeatedly claimed without substantiation that the other side is planning to provoke an incident involving nuclear, chemical or biological agents," notes CNN.

On Wednesday, Russian's foreign ministry claimed that the U.S. operates a biowarfare lab in Ukraine, "an accusation that has been repeatedly denied by Washington and Kyiv," reports Reuters.
Bug

Millions of Palm-Sized, Flying Spiders Could Invade the East Coast (scientificamerican.com) 53

An anonymous reader quotes a report from Scientific American: New research, published in the journal Physiological Entomology, suggests that the palm-sized Joro spider, which swarmed North Georgia by the millions last September, has a special resilience to the cold. This has led scientists to suggest that the 3-inch (7.6 centimeters) bright-yellow-striped spiders -- whose hatchlings disperse by fashioning web parachutes to fly as far as 100 miles (161 kilometers) -- could soon dominate the Eastern Seaboard. Since the spider hitchhiked its way to the northeast of Atlanta, Georgia, inside a shipping container in 2014, its numbers and range have expanded steadily across Georgia, culminating in an astonishing population boom last year that saw millions of the arachnids drape porches, power lines, mailboxes and vegetable patches across more than 25 state counties with webs as thick as 10 feet (3 meters) deep, Live Science previously reported.

Common to China, Taiwan, Japan and Korea, the Joro spider is part of a group of spiders known as "orb weavers" because of their highly symmetrical, circular webs. The spider gets its name from Jorgumo, a Japanese spirit, or Ykai, that is said to disguise itself as a beautiful woman to prey upon gullible men. True to its mythical reputation, the Joro spider is stunning to look at, with a large, round, jet-black body cut across with bright yellow stripes, and flecked on its underside with intense red markings. But despite its threatening appearance and its fearsome standing in folklore, the Joro spider's bite is rarely strong enough to break through the skin, and its venom poses no threat to humans, dogs or cats unless they are allergic. That's perhaps good news, as the spiders are destined to spread far and wide across the continental U.S., researchers say.

The scientists came to this conclusion after comparing the Joro spider to a close cousin, the golden silk spider, which migrated from tropical climates 160 years ago to establish an eight-legged foothold in the southern United States. By tracking the spiders' locations in the wild and monitoring their vitals as they subjected caught specimens to freezing temperatures, the researchers found that the Joro spider has about double the metabolic rate of its cousin, along with a 77% higher heart rate and a much better survival rate in cold temperatures. Additionally, Joro spiders exist in most parts of their native Japan -- warm and cold -- which has a very similar climate to the U.S. and sits across roughly the same latitude. [...] While most invasive species tend to destabilize the ecosystems they colonize, entomologists are so far optimistic that the Joro spider could actually be beneficial, especially in Georgia where, instead of lovesick men, they kill off mosquitos, biting flies and another invasive species -- the brown marmorated stink bug, which damages crops and has no natural predators. In fact, the researchers say that the Joro is much more likely to be a nuisance than a danger, and that it should be left to its own devices.

Patents

Open Source Zone Grinds Away At Patent Trolls (zdnet.com) 30

For the last two years, Unified Patents, an international organization of over 200 businesses, has been winning the battle against patent trolls "to keep them from stealing from the companies and organizations that actually use patents' intellectual property (IP)," writes ZDNet's Steven Vaughan Nichols. "This is their story to date." From the report: Unified Patents brings the fight to the trolls. It deters patent trolls from attacking its members by making it too expensive for the troll to win. The group does this by examining troll patents and their activities in various technology sectors (Zones). The United Patents Open Source Software Zone (OSS Zone) is the newest of these Zones. [...] Even before OSS Zone was formally launched, Unified Patents along with the Open Invention Network (OIN), the world's largest patent non-aggression group, launched legal cases against poor quality PAE-owned (Patent Assertion Entities) patents. The Linux Foundation and Microsoft have also joined the OSS Zone to battle these bad patents. [...]

Together, United Patents uses open-source software evidence as proof to establish that the trolls often don't have a case. This is done using Inter Partes Review (IPR), a 2012 legal tool for showing that a bad patent never should have been granted in the first place. [Linux Foundation Executive Director Jim Zemlin] notes, "The Patent Trial and Appeal Board (PTAB)'s discretionary rulings on IPRs have changed the landscape around NPEs. These cases take a long time to be resolved. Typically, it takes from 12 to 24 months. That also makes them expensive for both the OSS Zone and the trolls. Keith Bergelt, the OIN's CEO, said "In other technology areas when patents go through the IPR process or are reexamined, there is a settlement around 20% of the time. In the OSS Zone, there are few settlements. This makes it more costly and difficult to administer, but also is difficult on the PAEs. When the success rate against their patents is over 95%, certain PAEs that would otherwise hope to settle have essentially given up on defending their patents." Still, with such a high success rate, it's worth the expense.

To date, Unified has overseen and managed 43 challenges. Of these, 12 patents were found invalid, another 23 cases have been instituted, and six are still in process. This has led to multiple settlements for Unified Patents members. These, in turn directly pass through to OIN's 3,600+ community members. For example, an Accelerated Memory Tech patent 6,513,062, was used by the troll IP Investments Group to claim that the open-source Redis, which manages cache resources on the cloud, violated the patent. Redis, not having any money, IP Investments Group instead went after Hulu, Citrix Systems, Barracuda Networks, Kemp Technologies, and F5 Networks for their use of Redis software. IP Investments Group gave up rather than fighting it out. Everyone who uses Redis wins. It's one small victory, but that's how the patent troll wars are won. And, with the United Patents' high-success rate in knocking out bad patents, slowly but surely the patent trolls are being driven back from not only open-source software but all software.

News

Brazilian Academics Create Automated Fake News Detection Platform (zdnet.com) 35

An anonymous reader quotes a report from ZDNet: A group of Brazilian researchers has created a web platform that is able to identify false information online in an automated manner. Developed by academics at the Center for Mathematical Sciences Applied to Industry (CeMEAI), the system uses a combination of statistical models and machine learning techniques to establish whether a specific content in Brazilian Portuguese is likely to be false. Initial tests suggest the platform is able to detect fake news with a 96% accuracy. The CeMEAI is a research center based in the mathematics and computer science department of the University of Sao Paulo, in the Sao Paulo state city of Sao Carlos. The center is supported by grants from the Sao Paulo Research Agency (FAPESP). In an interview with FAPESP's news agency, project coordinator and technology transfer director Francisco Louzada Neto said the goal of the project is "to offer society an additional tool to identify, not only subjectively, whether a news item is false or not."

The system uses statistical methods to analyze writing characteristics, such as words used or more frequently used grammatical classes. These are then fed into a machine learning-based classifier, which is able to distinguish patterns of language, vocabulary and semantics of fake and real news, and automatically infer whether the content submitted to the platform is false. The models were trained with a massive database of real and false news and were exposed to the vocabulary used in over 100,000 articles published over the last five years. The researchers will aim to use the false news related to the upcoming presidential elections, as well as content related to the Covid-19 pandemic to further calibrate the models. The researchers also commented on the potential risks of the system in the interview, including the potential that the system could be used by fake news creators to assess the potential for false content to pass for real before it is published. "That's a risk we're going to have to deal with," Louzada noted.

Businesses

How ByteDance Became the World's Most Valuable Startup (hbr.org) 15

Roger Chen and Rui Max from Harvard Business Review explain how ByteDance became the world's most valuable startup. What's the secret? According to the editors, it's the company's shared-service platform, or SSP, which it uses to power innovation. From the report: Bytedance uses its SSP platform differently from most companies. The company's product teams or units don't control their own operating resources. Instead, many common business, technology, and operating functions (among them HR and legal) are centralized and organized into corresponding teams. The teams are highly specialized, so that the right people can be found and flexibly deployed as needed to each new venture. Cloud and shared operational tools, some of which have been developed in house, allow ByteDance to maintain this seemingly complex organizational setup. Product and related teams still focus on serving customer needs, but they rely on different SSP teams to accelerate development and growth. For example, when ByteDance tasks a new venture team with investigating user needs and market opportunities, the team can go to the user-research specialists at the SSP for data support, saving time on market analysis. In other companies, these tasks are undertaken by the product team, which is rarely best equipped for such information gathering. Subsequently, when a use case has been identified that justifies developing a new app or product feature, the product team is paired with engineers at the SSP level to develop the new product or feature.

In some cases, product teams customize existing technologies that have already been developed by the SSP. Algorithms are a case in point. Product teams at ByteDance work with SSP algorithm engineers to fine-tune their enormously powerful recommendation engines. The SSP has also brought together other important teams: user-growth teams, which help identify and acquire desired users; content teams, which establish partnerships to acquire new content; analytics teams, which help to develop deeper user insights; and sales teams, which drive monetization. As expected, because so many capabilities have been centralized into this large SSP, the actual product teams tend to be small and focused, especially in the exploration stage. Douyin, for example, began with just a handful of employees, and the education team began with just two. Importantly, the relationship between the SSP and market-facing teams is symbiotic and mutually beneficial. It's this virtuous loop of continued discovery and improvement that has enabled ByteDance's success.

Relying on its SSP, ByteDance has developed unique innovation and growth strategies. These strategies have five main characteristics: [broad exploration, rapid iteration, selective focus, maximum-capability cross-pollination, and productizing platform services]. [...] ByteDance's SSP strategy -- accelerate new projects by providing instant access to best in class technology and operations -- has been so successful that one would expect many other companies to have embraced it. Yet few companies have managed to replicate ByteDance's success with the strategy. Why? Because they have not put in the organizational enablers that helped ByteDance overcome fiefdom mindsets, which inhibit collaboration. Three of these organizational enablers are particularly important: [OKR system, explicitly flattened hierarchy, and data-driven culture]. [...]

ByteDance's SSP-based innovation strategy has clearly played a key role in its first decade of explosive growth. It has allowed the company to incubate rapidly and broadly and to scale efficiently, by using centralized but flexibly deployed technical and operational stacks. This strategy has served the company well in part because of the similarity among its various algorithm-driven products. ByteDance is now exploring other product categories and is refining its strategy to be more suitable for its evolving organizational model and processes, but no matter how the company evolves, its SSP-based innovation strategy is sure to play an important role.

The Almighty Buck

Crypto Enthusiasts' DAO Tries Raising $4 Billion to Buy a Football Team (cnbc.com) 48

In NFL news, an American football team — the Denver Broncos — "are up for sale," reports CNBC, "and a group of crypto enthusiasts is aiming to raise more than $4 billion using a decentralized autonomous organization, or DAO, to make it their own...." This group includes an eclectic mix of attorneys, accountants, software developers, pro athletes, and at least one mathematician. One of the people spearheading the cause is Sean O'Brien, who spent over a decade in Cisco's legal department, before leaving the corporate world to run a few small businesses with his wife. "We know it sounds a bit crazy, but it's also a bit badass," said O'Brien. "The purpose essentially is to establish an infrastructure so that fans from all walks of life can be owners of the Denver Broncos."

The pro football team is valued at just under $4 billion, and it is expected to garner the biggest price tag in North American sports history, according to ESPN....

DAOs take coordination of resources on the internet to a new level, according to Auston Bunsen, co-founder of QuikNode, which provides blockchain infrastructure to developers and companies. "They represent a new kind of organization moving at hyper speed," said Bunsen. Investor Cooper Turley, who has helped build several popular DAOs, says they're like an "internet community with a shared bank account."

"Basically, a small group of people come together to form a chat group, and then they decide to pull capital together, [typically] using an Ethereum wallet," Turley previously told CNBC....

Though the group will still fundraise in cryptocurrency, the idea is to give people partial ownership, in which they will participate in deciding how the team is run... The BuyTheBroncos group also has a pretty solid plan B. Organizers tell CNBC the more realistic goal is to raise around 25% of the money needed to place the winning bid, and from there, join forces with a consortium of more traditional buyers to make up the difference.

The group's Twitter account had less than 50 followers before CNBC's article — but 390 followers after the article ran. And O'Brien tells CBNC his ultimate goal is "to essentially open up peoples' eyes to what a DAO can do in the real world and make a tangible connection between this web3 life and the real world.

"Our thought is that it accelerates DAO adoption for solving real-world problems such as food scarcity or unhoused peoples."

Slashdot Top Deals