Facebook

Zuckerberg Coldly Explains To Facebook Staff They Are Now To Be Known As 'Metamates' (boingboing.net) 208

In an all-hands meeting at Meta "explaining the company's updated values," Mark Zuckerberg says employees are not supposed to "nice ourselves to death," adding that they are now to be known as "Metamates."

According to the Daily Beast, citing long-time executive Andrew Bosworth, "the term was coined by the cognitive scientist Douglas Hofstadter and is a play on the naval-inspired slogan used at Instagram: 'ship, shipmates, self.'"
The Media

Major US News Publisher Breached, Chinese Supply-Chain Attack Suspected (kentucky.com) 73

The Associated Press reports: News Corp., publisher of The Wall Street Journal, said Friday that it had been hacked and had data stolen from journalists and other employees, and a cybersecurity firm investigating the intrusion said Chinese intelligence-gathering was believed behind the operation.

The Journal, citing people briefed on the intrusion, reported that it appeared to date back to February 2020 and that scores of employees were impacted. It quoted them as saying the hackers were able to access reporters' emails and Google Docs, including drafts of articles. News Corp., whose publications and businesses include the New York Post and Journal parent Dow Jones, said it discovered the breach on Jan. 20. It said customer and financial data were so far not affected and company operations were not interrupted. But the potential impact on news reporting and sources was a serious concern.

News organizations are prime targets for the world's intelligence agencies because their reporters are in constant contact with sources of sensitive information. Journalists and newsrooms from Mexico and El Salvador to Qatar, where Al-Jazeera is based, have been hacked with powerful spyware.

Mandiant, the cybersecurity firm examining the hack, said in a statement that it "assesses that those behind this activity have a China nexus, and we believe they are likely involved in espionage activities to collect intelligence to benefit China's interests...." FBI Director Christopher Wray said in a speech this week that the bureau opens investigations tied to suspected Chinese espionage operations about every 12 hours, and has more than 2,000 such probes. He said Chinese government hackers have been pilfering more personal and corporate data than all other countries combined. While state-backed Russian hacking tends to get more headlines, U.S. officials say China has been stealthily stealing far more valuable commercial and personal data over the past few decades as digital technology took hold.

CBS News reports that "preliminary findings point to a supply chain hack," since News Corp wrote in its report that they'd discovered one of the third-party providers supporting their technology and "cloud-based" systems "was the target of persistent cyberattack activity."

The Associated Press adds that major newsrooms have also been compromised previously, including a 2013 cyberespionage attack against the New York Times in 2013. A former information security executive at the paper explaining "that while major newsrooms have shown a lot of progress in the last few years in helping their journalists navigate an increasingly hostile digital world, those efforts are not adequate to defend against a skilled and determined adversary like China."
Bitcoin

Crypto Co-Founder Revealed To Be Infamous Fraudster, Investors Shaken (vice.com) 73

An anonymous reader quotes a report from Motherboard: Investors are shaken after the co-founder of a multi-billion dollar cryptocurrency protocol was accused of being a serial scammer with a record of conviction and deportation, and the co-founder of a fraudulent Canadian exchange that imploded. On Thursday, a Twitter user who goes by zachxbt.eth "with a track record of unmasking crypto scams and nefarious behavior," according to CoinDesk, accused "Sifu," a core member of the founding team behind the popular Avalanche-based Wonderland DeFi (or decentralized finance) protocol and its TIME token, of actually being Michael Patryn.

Patryn, who changed his legal name twice, was the co-founder of QuadrigaCX, a Canadian exchange that shut down after Patryn's partner Gerald Cotten suddenly died in India in 2018 while owing users around $190 million in crypto at the time's exchange rate. Patryn and Cotten reportedly parted ways in 2016. Later, investigators determined that Cotten was operating QuadrigaCX as a Ponzi scheme near the end of its life. Patryn has been convicted of several crimes, including computer fraud and bank and credit fraud, as Bloomberg reported in 2019. After the original tweets that revealed Sifu is Patryn, Daniele Sestagalli, the founder of Wonderland, confirmed the allegation. Sestagalli is a prolific developer who is behind multiple DeFi projects, including Abracadabra's Magic Internet Money (MIM) token.

"I want everyone to know that I was aware of this and decided that the past of an individual doesn't determine their future. I choose to value the time we spent together without knowing his past more than anything," Sestagalli wrote on Twitter. He later posted a statement explaining that he found out about Sifu's real identity a month ago, and has now decided to ask Patryn to step down. "I am of the opinion of giving second chances, as I have mentioned on Twitter. I've seen the community very divided about my choice of maintaining him as the treasury manager after finding out who he was and his past," Sestagali wrote. "Regardless, what has happened has happened. Now having taken some time to reflect, I have decided that he needs to step down till a vote for his confirmation is in place. Wonderland has the say to who manages its treasury not me or the rest of the wonderland team."

The Military

FedEx Asks FAA To Let It Install Anti-Missile Lasers On Its Cargo Planes (gizmodo.com) 104

With the right military equipment, a single person can target a plane from three miles away using a heat-seeking missile. While such a nightmare is a rare occurrence, FedEx has applied to the FAA seeking approval to install a laser-based, anti-missile defense system on its cargo planes as an added safety measure. Gizmodo reports: FedEx's request to the Federal Aviation Administration, filed on Jan. 4, didn't come completely out of left field, however. In 2008, the company worked with Northrop Grumman to test its anti-missile laser-based defense systems on 12 of the shipping company's cargo planes for over a year. At the time, Northrop Grumman announced that its "system is ready to be deployed on civilian aircraft," although no commercial orders had been placed at the time, according to a company spokesperson. That may have changed, however.

FedEx's application to the FAA (PDF) to allow it to install and use anti-missile systems on its Airbus Model A321-200 cargo planes doesn't specifically mention Northrop Grumman's hardware, so the shipping company could now be working with another company, but the proposed hardware is basically the same as what was tested back in 2008. In the application document (PDF), which is "scheduled to be published in the Federal Register on Jan. 18," FedEx cites "several incidents abroad" where "civilian aircraft were fired upon by man-portable air defense systems" which are nearly impossible to detect given their range of operation, but undoubtedly a serious threat when operating aircraft in some parts of the world.

The biggest problem with FedEx's application seems to be that the FAA's "design standards for transport category airplanes did not envisage that a design feature could project infrared laser energy outside the airplane" and that the "FAA's design standards are inadequate to address this capability." As a result, the defense system is being considered a "novel or unusual design feature" and as such will be subjected to several special safety regulations given how dangerous intense infrared light can be to the skin and eyes of "persons on the aircraft, on the ground, and on other aircraft." These regulations will include the ability to completely disable the system while the airplane is on the ground to prevent "inadvertent operation," a design that prevents inflight use from ever damaging the aircraft itself or risking the safety of the crew and passengers, even in the event of a system failure or accidental operation. They also require extensive markings, labels, warnings, and documentation for everyone from maintenance staff to ground crew, to pilots, warning them of the laser's class and risks, including an addendum to the flight manual explaining the complete use of the system.

Games

You Can Now Play Video Games Developed Behind the Iron Curtain (vice.com) 15

An anonymous reader quotes a report from Motherboard: The Cold War couldn't stop gaming from thriving in the Eastern Bloc. From the late 1980s through the early 1990s, a generation of young people living behind the Iron Curtain designed and released their own video games and arcade cabinets. Now, you can play English translations of some of these lost classics of early gaming. One is a text adventure where a Soviet military officer hunts and kills Rambo. The translated games all come from Slovakia and are a collaboration between the Slovak Game Developers Association and the Slovak Design Museum.

According to Stanislav Hrda, one of the programmers who created the games on offer, making video games was something only kids did. "The games were not sold in shops and the authors were not entitled to remuneration," he said in the post explaining the project. "Therefore, practically no one could engage in video game programming as a business activity, and adult programmers worked at most in state institutions on large mainframe computers. Thus, video game programmers became mainly teenagers." The computing power was limited and the teenagers' technological knowhow almost non-existent so many of these early games were text adventures. "These could also be programmed in the simpler Basic language that every home computer had built in," Hrda said. "Text-based games offered the opportunity to imprint one's fantasies into a world of characters, locations, descriptions of reality or fantasy at will. That is why hundreds of such video games were created in the 1980s in Czechoslovakia. The authors from the ranks of teenagers portrayed their friends, but also heroes from films that were distributed on VHS tapes or from the pop-cultural world of the West from the occasionally available comics, films, TV series and books."

Hrda loved American action movies and programmed the video game Satochin, a text adventure where a Soviet officer hunts John Rambo. "The game was very hard to win," Hrda told Ars Technica. "Whenever you made a small mistake, you would die. So before you win, you are killed ten times by Rambo." [...] The project has localized ten games for Western audiences, including Satochin, with plans to tackle more over the next few years. "The games translated over the next 2-3 years after the end of the project will represent almost the complete video game production from the period of 8-bit computers in Slovakia, with an emphasis on text adventure games," the site said. English versions are available here and can be played in the Fuse emulator. The Slovak versions can be played online through the project's website.

NASA

NASA's Next-Generation Asteroid Impact Monitoring System Goes Online (nasa.gov) 11

"To date, nearly 28,000 near-Earth asteroids have been found by survey telescopes that continually scan the night sky, adding new discoveries at a rate of about 3,000 per year..." according to an article from NASA:

"The first version of Sentry was a very capable system that was in operation for almost 20 years," said Javier Roa Vicens, who led the development of Sentry-II while working at JPL as a navigation engineer and recently moved to SpaceX. "It was based on some very smart mathematics: In under an hour, you could reliably get the impact probability for a newly discovered asteroid over the next 100 years — an incredible feat."
But RockDoctor (Slashdot reader #15,477), summarizes some new changes: For nearly 20 years, newly discovered asteroids had orbital predictions processed by a system called "Sentry", resulting in quick estimates on the impact risk they represent with Earth. Generally this has worked well, but several things in the future required updates, and a new system adds a number of useful features too.

The coming wave of big survey telescopes which will check the whole sky every few days is going to greatly increase the number of discoveries. That requires streamlining of the overall system to improve processing speed. The new system can also automatically incorporate factors which previously required manual intervention to calculate, particularly the effect of asteroid rotation creating non-gravitational forces on a new discovery's future orbit. Objects like asteroid Bennu (recently subject of a sampling mission) had significant uncertainty on their future path because of these effects. That doesn't mean that Bennu can possibly hit us in the next few centuries, but it became harder to say over the next few millennia. As NASA puts it:

Popular culture often depicts asteroids as chaotic objects that zoom haphazardly around our solar system, changing course unpredictably and threatening our planet without a moment's notice. This is not the reality. Asteroids are extremely predictable celestial bodies that obey the laws of physics and follow knowable orbital paths around the Sun.

But sometimes, those paths can come very close to Earth's future position and, because of small uncertainties in the asteroids' positions, a future Earth impact cannot be completely ruled out. So, astronomers use sophisticated impact monitoring software to automatically calculate the impact risk....

[T]he researchers have made the impact monitoring system more robust, enabling NASA to confidently assess all potential impacts with odds as low as a few chances in 10 million.



The article includes videos explaining the future uncertainties on the orbits of potentially hazardous asteroids Bennu and Apophis.

Security

New Windows Zero-Day With Public Exploit Lets You Become An Admin (bleepingcomputer.com) 57

A security researcher has publicly disclosed an exploit for a new Windows zero-day local privilege elevation vulnerability that gives admin privileges in Windows 10, Windows 11, and Windows Server. BleepingComputer reports: As part of the November 2021 Patch Tuesday, Microsoft fixed a 'Windows Installer Elevation of Privilege Vulnerability' vulnerability tracked as CVE-2021-41379. This vulnerability was discovered by security researcher Abdelhamid Naceri, who found a bypass to the patch and a more powerful new zero-day privilege elevation vulnerability after examining Microsoft's fix. Yesterday, Naceri published a working proof-of-concept exploit for the new zero-day on GitHub, explaining that it works on all supported versions of Windows.

"This variant was discovered during the analysis of CVE-2021-41379 patch. the bug was not fixed correctly, however, instead of dropping the bypass," explains Naceri in his writeup. "I have chosen to actually drop this variant as it is more powerful than the original one." Furthermore, Naceri explained that while it is possible to configure group policies to prevent 'Standard' users from performing MSI installer operations, his zero-day bypasses this policy and will work anyway. BleepingComputer tested Naceri's 'InstallerFileTakeOver' exploit, and it only took a few seconds to gain SYSTEM privileges from a test account with 'Standard' privileges, as demonstrated in [this video]. When BleepingComputer asked Naceri why he publicly disclosed the zero-day vulnerability, we were told he did it out of frustration over Microsoft's decreasing payouts in their bug bounty program.
A Microsoft spokesperson said in a statement: "We are aware of the disclosure and will do what is necessary to keep our customers safe and protected. An attacker using the methods described must already have access and the ability to run code on a target victim's machine."

Naceri recommends users wait for Microsoft to release a security patch, as attempting to patch the binary will likely break the installer.
Piracy

Is 'The NFT Bay' Just a Giant Hoax? (clubnft.com) 74

Recently Australian developer Geoffrey Huntley announced they'd created a 20-terabyte archive of all NFTs on the Ethereum and Solana blockchains.

But one NFT startup company now says they tried downloading the archive — and discovered most of it was zeroes. Many of the articles are careful to point out "we have not verified the contents of the torrent," because of course they couldn't. A 20TB torrent would take several days to download, necessitating a pretty beefy internet connection and more disk space to store than most people have at their disposal. We at ClubNFT fired up a massive AWS instance with 40TB of EBS disk space to attempt to download this, with a cost estimate of $10k-20k over the next month, as we saw this torrent as potentially an easy way to pre-seed our NFT storage efforts — not many people have these resources to devote to a single news story.

Fortunately, we can save you the trouble of downloading the entire torrent — all you need is about 10GB. Download the first 10GB of the torrent, plus the last block, and you can fill in all the rest with zeroes. In other words, it's empty; and no, Geoff did not actually download all the NFTs. Ironically, Geoff has archived all of the media articles about this and linked them on TheNFTBay's site, presumably to preserve an immutable record of the spread and success of his campaign — kinda like an NFT...

We were hoping this was real... [I]t is actually rather complicated to correctly download and secure the media for even a single NFT, nevermind trying to do it for every NFT ever made. This is why we were initially skeptical of Geoff's statements. But even if he had actually downloaded all the NFT media and made it available as a torrent, this would not have solved the problem... a torrent containing all the NFTs does nothing to actually make those NFTs available via IPFS, which is the network they must be present on in order for the NFTs to be visible on marketplaces and galleries....

[A]nd this is a bit in the weeds: in order to reupload an NFT's media to IPFS, you need more than just the media itself. In order to restore a file to IPFS so it can continue to be located by the original link embedded in the NFT, you must know exactly the settings used when that file was originally uploaded, and potentially even the exact version of the IPFS software used for the upload.

For these reasons and more, ClubNFT is working hard on an actual solution to ensure that everybody's NFTs can be safely secured by the collectors themselves. We look forward to providing more educational resources on these and other topics, and welcome the attention that others, like Geoff, bring to these important issues.

Their article was shared by a Slashdot reader (who is one of ClubNFT's three founders). I'd wondered suspiciously if ClubNFT was a hoax, but if this PR Newswire press release is legit, they've raised $3 million in seed funding. (And that does include an investment from Drapen Dragon, co-founded by Tim Draper which shows up on CrunchBase). The International Business Times has also covered ClubNFT, identifying it as a startup whose mission statement is "to build the next generation of NFT solutions to help collectors discover, protect, and share digital assets." Co-founder and CEO Jason Bailey said these next-generation tools are in their "discovery" phase, and one of the first set of tools that is designed to provide a backup solution for NFTs will roll out early next year. Speaking to International Business Times, Bailey said, "We are looking at early 2022 to roll out the backup solution. But between now and then we should be feeding (1,500 beta testers) valuable information about their wallets." Bailey says while doing the beta testing, he realized that there are loopholes in the NFT storage systems and only 40% of the NFTs were actually pointing to the IPFS, while 40% of them were at risk — pointing to private servers.

Here is the problem explained: NFTs are basically a collection of metadata, that define the underlying property that is owned. Just like in the world of internet documents, links point to the art and any details about it that are being stored. But links can break, or die. Many NFTs use a system called InterPlanetary File System, or IPFS, which let you find a piece of content as long as it is hosted somewhere on the IPFS network. Unlike in the world of internet domains, you don't need to own the domain to really make sure the data is safe. Explaining the problem which the backup tool will address, Bailey said, "When you upload an image to IPFS, it creates a cryptographic hash. And if someone ever stops paying to store that image on IPFS, as long as you have the original image, you can always restore it. That's why we're giving people the right to download the image.... [W]e're going to start with this protection tool solution that will allow people to click a button and download all the assets associated with their NFT collection and their wallet in the exact format that they would need it in to restore it back up to IPFS, should it ever disappear. And we're not going to charge any money for that."

The idea, he said, is that collectors should not have to trust any company; rather they can use ClubNFT's tool, whenever it becomes available, to download the files locally... "One of the things that we're doing early around that discovery process, we're building out a tool that looks in your wallet and can see who you collect, and then go a level deeper and see who they collect," Bailey said. Bailey said that the rest of the tools will process after gathering lessons based on user feedback on the first set of solutions. He, however, seemed positive that the talks of the next set of tools will begin in the Spring of next year as the company has laid a "general roadmap."

Cloud

NVIDIA's Cloud Gaming Service Quietly Capped Frame Rates on 12 Games (theverge.com) 24

Nvidia's "GeForce Now" cloud gaming service has been quietly capping the frame rates for a handful of 12 specific games on certain tiers "to ensure consistent performance," reports the Verge.

"Nvidia says the vast majority of games run at 60fps, but not these 12." Nvidia's GeForce Now cloud gaming service just leapfrogged Google Stadia in performance, with a new $200-a-year tier that practically gives you the power of an RTX 3080 desktop graphics card in the cloud. But if you're grandfathered into the original $4.99 a month "Founders" tier, or pay $100 a year for "Priority" access, you may not be getting quite what you expected...

Nvidia now has an official support page (via 9to5Google) explaining the practice, after Redditors and others revealed that a variety of games were locked to frame rates lower than 60fps. It appears that Nvidia's been doing this for quite a while but only for a handful of demanding games. I did a little searching, and some people were already complaining about being locked to 45fps in Cyberpunk 2077 in December 2020, just as Nvidia admits here.

Assassin's Creed Odyssey and Immortals Fenyx Rising are the other games that have sub-50fps frame rates, while others run a bit higher.

"For our Priority Members, the maximum frames rendered per second is generally set to 60, or higher, for most of the 1,100+ games we've onboarded so far," NVIDIA explains on its official support page. "There are some exceptions that we determined do not run well enough at 60 FPS on the GPUs used by Priority members. So the default OPS for these specific graphics-intensive games cannot be overridden.

"This is to ensure all Priority members are running a consistent, high-quality experience."
Games

Rockstar Pulls 'Grand Theft Auto: Definitive Edition' After Unintentionally Including Files (pcgamer.com) 33

Shortly after Thursday's release of Grand Theft Auto: The Definitive Edition, the Rockstar Games Launcher on PC went down, leaving most Rockstar titles unplayable, reports PC Gamer.

They also identified possible issues explaining why: Firstly, the Trilogy has shipped with internal developer comments visible on the code, such as... "This shit doesn't work the way they wrote it below so we'll just show the text and place the blip at the beginning of the mission...."

Coders leaving funny comments is one thing: even if you might not want the public to see it, who really cares. However some dataminers have found that Vice City and San Andreas may have shipped with songs that have technically been 'removed' from the game because the licenses have expired... The presence of unlicensed music could in theory be a big headache for Rockstar. While the music may not be accessible to the average user, it is in the product's files and can be accessed using certain tools. And, oh yeah, without the appropriate license.

One dataminer told the site that the audio codec used in these games is the open source OGG-VORBIS, and for Grand Theft Auto: San Andreas, "EVERY song is there." And then Thursday the official Twitter feed for Rockstar Support announced their Games Launcher was "temporarily offline for maintenance." PC Gamer reported it remained down for more than 16 hours.

Friday night Rockstar Support announced their Launcher was now back online — but that GTA: The Trilogy — The Definitive Edition "is unavailable to play or purchase as we remove files unintentionally included in these versions.

"We're sorry for the disruption and hope to have correct ones up soon."
Science

Oxford Scientists Find Gene That Doubles Risk of Dying From Covid-19 (bloomberg.com) 100

Scientists identified a specific gene that doubles the risk of respiratory failure from Covid-19 and may go some way to explaining why some ethnic groups are more susceptible to severe disease than others. From a report: Researchers from the University of Oxford found that a higher-risk version of the gene most likely prevents the cells lining airways and the lungs from responding to the virus properly. About 60% of people with South Asian ancestry carry this version of the gene, compared with 15% of people with European heritage, according to the study published Thursday. The findings help explain why higher rates of hospitalization and death may have been seen in certain communities and on the Indian subcontinent. The authors cautioned that the gene cannot be used as a sole explanation as many other factors, such as socioeconomic conditions, play a role. Despite a significant impact from the virus to people with Afro-Caribbean ancestry, only 2% carry the higher-risk genotype. People with the gene, known as LZTFL1, would particularly benefit from vaccination, which remains the best method of protection, the authors said. The findings raise the possibility of research into treatments specific to patients with this gene, though no tailored drugs are currently available.
Education

Code.org and Scratch Access Yanked By Chicago Schools Due To Student Privacy Law 76

theodp writes: Chicago Public School (CPS) teachers were 'blindsided' after access to popular classroom software was yanked due to CPS's interpretation of Illinois' Student Online Personal Protection Act (SOPPA), the Chicago Sun-Times reports. Sneha Dey writes, "Among the software products that violate the law, CPS now says, are programs like Code.org, which is widely used in computer science classes, and Adobe applications used for artistic design and newspaper page layouts. That left has many high school newspapers unable to produce their print editions. Also off limits is Scratch, software to create interactive stores, animations and games. CPS had partnered with the Scratch Foundation to hold family coding nights, among other events."

The Blueprint's Karen Buecking has more on how the new student data protection law has upended the computer science curriculum at CPS, noting that CPS teachers received an email from tech-backed Code.org explaining the situation: "We've already signed student data protection agreements with over 150 districts across the state to comply with the new law," said the Code.org representative. "The bad news is CPS's agreement and application process contains onerous requirements unrelated to student privacy that make it prohibitive for organizations like Code.org to agree to CPS's requirements as written."
Television

Sinclair Workers Say TV Channels Are In 'Pandemonium' After Ransomware Attack (vice.com) 33

An anonymous reader quotes a report from Motherboard: In the early hours of Sunday morning, hackers took down the corporate servers and systems of Sinclair Broadcast Group, a giant U.S. TV conglomerate that owns or operates more than 600 channels across the country. Days later, inside the company, "it's pandemonium and chaos," as one current employee, who asked to remain anonymous as they were not authorized to speak to the press, told Motherboard. Sinclair has released very few details about the attack since it was hacked Sunday. On Wednesday, Bloomberg reported that the group behind the attack is the infamous Evil Corp., a ransomware gang that is believed to be based in Russia and which was sanctioned by the U.S. Treasury department in 2019.

The ransomware attack interfered with several channels' broadcast programming, preventing them from airing ads or NFL games, as reported by The Record, a news site owned by cybersecurity firm Recorded Future. It has also left employees confused and wondering what's going on, according to current Sinclair workers. "Whoever did this, they either by accident or by design did a very good job," a current employee said in a phone call, explaining that there are some channels that haven't been able to air commercials since Sunday. "We're really running in the blind [...] you really can't do your job." The employee said that he was working on Sunday and was able to get two emails out to colleagues. "And one of them got it, and the other one didn't," they said.

Employees did not have access to their emails until Tuesday morning, according to the two employees and text messages seen by Motherboard. The office computers, however, are still locked by the company out of precaution, and Sinclair told employees not to log into their corporate VPN, which they usually used to do their jobs. Until Thursday, the company was communicating with employees via text, according to the sources, who shared some of the texts sent by the company. In one of them, they called for an all hands meeting. The meeting, according to the two current employees, was quick and vague. Both sources said that the company should be more transparent with its own employees.

Iphone

Robotics Engineer Adds a Working USB-C Port To An iPhone (appleinsider.com) 32

Ken Pillonel, a robotics engineer on YouTube, replaced an iPhone's Lightning port with a working USB-C port. AppleInsider reports: In a YouTube Short titled "World's First USB-C iPhone," Ken Pillonel claims to have installed the component into the iPhone X, replacing Lightning in the process. In the video, the iPhone is said to receive power via the connection, as well as being able to handle data transfers over a USB-C cable. In the description of the video, Pillonel says he reverse-engineered Apple's C94 connector, in order to make a PCB with a female USB-C port. After the schematics were set in place, it then became a challenge to shrink it down and install it into an iPhone.

Pillonel has spent a few months on his creation, with a blog post from May showing the thinking behind the replacement, and the challenges of replacing the Lightning port itself. A video at that time showed a DIY prototype that worked and laid out the work ahead to make it small enough to work within an iPhone enclosure. A late September update advised he had designed and ordered a flexible PCB, a key component in enabling the port switch to occur. He adds a future video is in production, explaining how the board was made and squeezed into the iPhone itself.

Transportation

The First Reviews of Rivian's R1T Electric Pickup (techcrunch.com) 118

Rivian held a three-day press event in Colorado last week where a number of journalists, including TechCrunch's Kirsten Korosec, were able to take the R1T electric truck for a spin. Today, the embargo lifted and we're able to hear about their experience." An anonymous reader shares an excerpt from Korosec's report: On its first try, Rivian produced the Goldilocks of pickup trucks. The Rivian R1T electric truck is neither too big nor small. It handles rock crawling and off-camber trails with ease, can zip from zero to 60 miles per hour on a dirt road in just a few seconds without the typical back-end slippage -- although there is an option to provide that drifting effect -- and it can crank through winding mountain roads, pushing the edge of each corner without body roll. It's loaded with the kind of interior and exterior touches that put it firmly in the premium zone -- and yet the Rivian R1T is no delicate flower.

The company's designers and engineers helped the truck steer clear of pretension by combining form and function from tip to tail. Some of the added surprises -- the location of functional details like tie-downs, an air compressor and outlets -- suggest that numerous Rivian employees tested the truck in real-world conditions, including camping, mountain biking and even more mundane tasks like grocery-fetching. The result is a vehicle that feels right for all seasons and ready for anything. And, importantly, it's a joy to drive.

On a press drive over three days, a near-production-spec R1T proved to be the electric truck none of us knew we needed. That's not to say every choice landed perfectly. There are a few hardware details and elements on the software user interface side of things that could use a nip here and a tuck there. I'm looking at you, odd notch that is maybe a pen holder, but certainly the soon-to-be dust collector by the wireless charging pad. To be clear, far more time and miles are required to provide a full review. Still, as a total package, the Rivian R1T impresses. [Continue reading to hear about Korosec's thoughts on the nuts and bolts, circuit, handling and performance, user interface(s), and hardware accessories.]
For a technical in-depth review of the Rivian R1T, Quinn Nelson from Snazzy Labs has produced an excellent video explaining his thoughts on the driving dynamics, vehicle functions, user interface design, and more. Fair warning: it's nearly 30 minutes long.

Further reading:
Autoblog: 2022 Rivian R1T First Drive Review: An Electric Truck Is a Better Truck
Car and Driver: The 2022 Rivian R1T Electric Pickup Embraces Duality
Business Insider: Rivian R1T: Hitting the Trails In the New Electric Pickup
Fox News: Test Drive: The 2022 Rivian R1T Electric Pickup Is a Game-Changing Truck
Apple

Leaked Apple Training Videos Show How the iPhone-Maker Undermines Third-Party Repair (vice.com) 133

em1ly shares a report from Motherboard, which obtained leaked training videos Apple made for its authorized repair partners, showing how the company trains repair technicians to undermine third party companies and talk customers into buying more expensive first party repairs. From the report: "I cracked the glass on my phone and I'm comparing costs. How much for just that part?" One man acting the part of the customer asks in one of the videos.
"I can show you the cost for just the part before we begin," another man, playing the part of repair technician says.
"Whoa," the customer says, holding out his hands. "That's way more than the shop down the street. Why is it so expensive here?"
"This quote's for a genuine Apple part," the technician says.
"What do you mean by genuine?" the customer asks, his hands making scare quotes. "I'd like to save some money. Aren't they really the same part?"

After this, the technician launches into an explanation of why it's best for people to replace broken iPhone parts with genuine Apple products. "A genuine Apple part has to pass AppleCare engineering criteria," the technician says, explaining that a screen from Apple will be tested as if it had just come off the factory floor. "With a genuine Apple display, all the features you've come to rely on behave seamlessly...that's not the case with third party displays."

Six of the eight videos are dedicated to training repair techs on how to deal with customers worried about the huge costs of repairing an Apple device. One three-minute video is dedicated to helping customers understand why a genuine Apple screen is often better than one from a third party.

Education

Code.org, Tech Giants Enlist Teachers To Sell Kids and Parents On 'CS Journeys' 89

theodp writes: On Monday, tech-bankrolled Code.org announced the CS Journeys program, which the nonprofit explains is designed to help teachers "excite, encourage, and empower your students to continue their CS journeys in and beyond your class." Besides live, virtual field trips to Amazon's Fulfillment Centers, kids aged 5-and-up will also participate in live, weekly classroom conversations with professionals from the likes of Google and Amazon, where they "will learn about a number of ways they can use computer science to have a positive impact, as well as different journeys that people have taken to get to meaningful careers and achieve their goals." A Googler will speak to kindergartners and other younger students about Developing responsible artificial intelligence on Sep. 22nd. Teachers are also being asked to show students inspiring Careers in Tech videos featuring employees from Facebook/Instagram, Microsoft, and Google.

Explaining that "students who hear from parents that they would be good at computer science are 2-3 times more likely to be interested in learning it," Code.org urges teachers to also "connect with parents and recruit their help in encouraging students to learn and continue on their computer science journey." Code.org even provides teachers with talking points to include in emails and letters home. A sample: "Computer science teaches students critical thinking and problem solving. In fact, studies show that students who learn computer science do better in other subjects, excel at problem solving, and are more likely to go to college. [...] Parent/guardian encouragement is critical to student success and interest in learning and success. So ask your student to see something they created in class."

The launch of CS Journeys comes less than a year after Google VP Maggie Johnson -- a long-time Code.org Board member -- reported that a Google-commissioned Gallup report showed that "students are generally unconvinced that computer science is important for them to learn," adding that "Interventions from parents, educators, community leaders, policymakers, nonprofits and the technology industry are needed to encourage girls, Black students and Hispanic students to take computer science courses. These students also need to be shown how CS knowledge can help them meet their goals in a variety of fields including the humanities, medicine and the arts." According to the report, only 22% of boys and 9% of girls "believe it is very important to learn CS."
Encryption

Web Creator Tim Berners-Lee Joins ProtonMail's Advisory Board (zdnet.com) 30

The inventor of the World Wide Web, Tim Berners-Lee, has joined the advisory board of hosted email service provider ProtonMail. From a report: In a statement, ProtonMail CEO and founder Andy Yen said the addition of Berners-Lee to the company's advisory board was aligned with its goal to "create an internet where people are in control of their information at all times. Our vision is to build an internet where privacy is the default by creating an ecosystem of services accessible to everyone, everywhere, every day," Yen said. Yen said the company already had a past relationship with Berners-Lee, explaining that the idea of ProtonMail was initially conceived at CERN, the European Organization for Nuclear Research, where the World Wide Web was created.

The addition of Berners-Lee comes almost immediately after ProtonMail received flak for giving a climate activist's IP address to French authorities to comply with a Swiss court order. Addressing the logging of the IP address in a blog post earlier this week, Yen said all companies have to comply with laws, such as court orders, if they operate within 15 miles of land. "No matter what service you use, unless it is based 15 miles offshore in international waters, the company will have to comply with the law," Yen said.

IT

The Verge's 'Infamous' PC Build Gets Fixed (kotaku.com) 51

Luke Plunkett, writing at Kotaku: Back in 2018, The Verge released a guide to building a new PC that was, well, from where I was sitting it was not ideal. From where some angry PC nerds were sitting, though, it was an outrage. How bad was the video? It has its own knowyourmeme page, that's how bad. The guide was full of glaring omissions and bizarre tips, from a strange obsession with power usage to the most liberal use of thermal paste you've ever seen. The original video guide was eventually removed by The Verge (though you can see it here, and the written portion remains online), with the site claiming that it didn't meet their "editorial standards." Things took a turn for the worse when folks' initial bemusement with the guide quickly morphed into outright harassment from others, with author Stefan Etienne receiving a ton of racial abuse and The Verge issuing takedown notices on a couple of videos critical of the situation.

Anyway, that was 2018. We're not here to drag up bad old content and the ramblings of internet shitheads, we're here for the redemptive arc in this tale. That comes in the form of this new Linus Tech Tips video, where the host gets Etienne on to "fix" his old build, going through the same basic overall process as the original, making some changes (or just adding some extra information) at stops along the way. Etienne is a great sport throughout (and interestingly claims that The Verge's editorial basically threw him under the bus with the video section of the guide). The pair go through the original guide point by point, not just explaining how they'd improve things in 2021, but also allowing Etienne to break down just what was going on during the creation of the video as well.
[H/T UnknowingFool.]
Businesses

Amazon's Answer To Delivery Driver Shortage: Recruit Pot Smokers (bloomberg.com) 176

Amazon.com has a solution for a potentially crippling shortage of delivery drivers: Recruit pot smokers. From a report: The company is advising its delivery partners -- the mom and pops that operate the ubiquitous blue Amazon vans -- to prominently advertise that they don't screen applicants for marijuana use, according to correspondence reviewed by Bloomberg and interviews with four business owners. Doing so can boost the number of job applicants by as much as 400%, Amazon says in one message, without explaining how it came up with the statistic. Conversely, the company says, screening for marijuana cuts the prospective worker pool by up to 30%.

One delivery partner, who stopped screening applicants at Amazon's behest, says marijuana was the prevailing reason most people failed drug tests. Now that she's only testing for drugs like opiates and amphetamines, more drivers pass. Other delivery companies are continuing to screen applicants, concerned about the insurance and liability implications in the many states where weed use remains illegal. They also worry that ending drug testing might prompt some drivers to toke up before going out on a route. "If one of my drivers crashes and kills someone and tests positive for marijuana, that's my problem, not Amazon's," said one, who requested anonymity to discuss the issue because Amazon discourages delivery company owners from speaking to the media.

Slashdot Top Deals