Privacy

Zoom To Launch End-to-End Encryption For All Users -- Not Just Paid Accounts (blog.zoom.us) 39

Weeks after Zoom said it will offer end-to-end encryption to only paying customers -- a move that was received poorly by several privacy and security advocates, the popular video calling software said on Wednesday it is making some amendments: We are also pleased to share that we have identified a path forward that balances the legitimate right of all users to privacy and the safety of users on our platform. This will enable us to offer E2EE (end-to-end encryption) as an advanced add-on feature for all of our users around the globe -- free and paid -- while maintaining the ability to prevent and fight abuse on our platform. To make this possible, Free/Basic users seeking access to E2EE will participate in a one-time process that will prompt the user for additional pieces of information, such as verifying a phone number via a text message. Many leading companies perform similar steps on account creation to reduce the mass creation of abusive accounts. We are confident that by implementing risk-based authentication, in combination with our current mix of tools -- including our Report a User function -- we can continue to prevent and fight abuse.
Encryption

Matthew Green on Zoom Not Offering End-To-End Encryption To Free Users (twitter.com) 39

Earlier this week video conferencing service Zoom said it will not offer its forthcoming, complete version of end-to-end encryption to its free users so that it can work better with law enforcement to curb abuse on the platform. Matthew Green, who teaches cryptography at Johns Hopkins, looks at the broader implication of this move: Obviously I don't think you should have to pay for E2E encryption. The thing that's really concerning me is that there's a strong push from the US and other governments to block the deployment of new E2E encryption. You can see this in William Barr's "open letter to Facebook." But this is part of an older trend. Law enforcement and intelligence agencies can't get Congress to ban E2E, so they're using all the non-legislative tools they have to try to stop it. And, it turns out, this works. Not against the big entrenched providers who have already deployed E2E. But against the new upstarts who want to use crypto to solve trust problems.

And the Federal government has an enormous amount of power. Power over tools like Section 230. Power to create headaches for people. But even without Congressional assistance, the executive branch has vast power to make procurement and certification decisions. So if you're a firm that wants to deploy E2E to your customers, even if there's a pressing need, you face the specter of going to war with an immensely powerful government that has very strong negative feelings about broad access to encryption. And this is a huge problem. Because some companies have infrastructure all over the world. Some companies carry incredibly valuable and sensitive corporate data (even at their "free" tiers) and there are people who want that data. Encryption is an amazing tool to protect it. The amazing thing about this particular moment is that, thanks to a combination of the pandemic forcing us all online, more people than ever are directly exposed by this. "Communications security" isn't something that only activists and eggheads care about. Now for companies that are exposed to this corrupt dynamic, there's an instinct to try to bargain. Split the baby in half. Deploy E2E encryption, but only maybe a little of it. E2E for some users, like paying customers and businesses, but not for everyone. And there's some logic to this position.

The worst crimes, like distribution of child abuse media, happen in the free accounts. So restricting E2E to paid accounts seems like an elegant compromise, a way to avoid getting stepped on by a dragon. But I personally think this is a mistake. Negotiating with a dragon never ends well. And throwing free-tier users into the dragon's mouth feels even worse. But the real takeaway, and why I hope maybe this issue will matter to you, is that if the Federal government is able to intimidate one company into compromising your security. Then what's going to happen to the next company? And the next? Once the precedent is set that E2E encryption is too "dangerous" to hand to the masses, the genie is out of the bottle. And once corporate America accepts that private communications are too politically risky to deploy, it's going to be hard to put it back. Anyway, this might be an interesting academic debate if we were in normal times. But we're not. Anyone who looks at the state of our government and law enforcement systems -- and feels safe with them reading all our messages -- is living in a very different world than I am.

Encryption

The EARN IT Act is an Attack on Encryption (cryptographyengineering.com) 176

A bipartisan pair of US senators on Thursday introduced long-rumored legislation known as the EARN IT Act. The bill is meant to combat child sexual exploitation online, but if passed, it could hurt encryption as we know it. Matthew Green, a cryptographer and professor at Johns Hopkins University, writes: Because the Department of Justice has largely failed in its mission to convince the public that tech firms should stop using end-to-end encryption, it's decided to try a different tack. Instead of demanding that tech firms provide access to messages only in serious criminal circumstances and with a warrant, the DoJ and backers in Congress have decided to leverage concern around the distribution of child pornography, also known as child sexual abuse material, or CSAM. [...] End-to-end encryption systems make CSAM scanning more challenging: this is because photo scanning systems are essentially a form of mass surveillance -- one that's deployed for a good cause -- and end-to-end encryption is explicitly designed to prevent mass surveillance. So photo scanning while also allowing encryption is a fundamentally hard problem, one that providers don't yet know how to solve.

All of this brings us to EARN IT. The new bill, out of Lindsey Graham's Judiciary committee, is designed to force providers to either solve the encryption-while-scanning problem, or stop using encryption entirely. And given that we don't yet know how to solve the problem -- and the techniques to do it are basically at the research stage of R&D -- it's likely that "stop using encryption" is really the preferred goal. EARN IT works by revoking a type of liability called Section 230 that makes it possible for providers to operate on the Internet, by preventing the provider for being held responsible for what their customers do on a platform like Facebook. The new bill would make it financially impossible for providers like WhatsApp and Apple to operate services unless they conduct "best practices" for scanning their systems for CSAM. Since there are no "best practices" in existence, and the techniques for doing this while preserving privacy are completely unknown, the bill creates a government-appointed committee that will tell technology providers what technology they have to use. The specific nature of the committee is byzantine and described within the bill itself. Needless to say, the makeup of the committee, which can include as few as zero data security experts, ensures that end-to-end encryption will almost certainly not be considered a best practice.

Operating Systems

Huawei Unveils OpenEuler, CentOS-Based Linux Distribution (computing.co.uk) 53

New submitter profi shares a report from Computing: Huawei has released the source code of openEuler, its distribution of Linux based on CentOS. The operating system was formally launched by Huawei in September 2019 in response to U.S. sanctions, which had briefly affected the company's access to Windows and Android operating systems. The source code has now been published on Gitee, the Chinese version of Github.

OpenEuler comprises two organizations on Gitee, one for source code and one for package sources. The openEuler organization was keen to highlight two particular packages, iSulad and A-Tune, among the openEuler source code. "iSulad is a lightweight gRPC service-based container runtime. Compared to runc, iSulad is written in C, but all interfaces are compatible with OCI. A-Tune is a system software to auto-optimize the system adaptively to multiple scenarios with embedded AI-engine." The announcement continues: "You will also see several infrastructure-supported projects that set up the community's operating systems... these systems are built on the Huawei Cloud through script automation."

Among the package sources, covered by the src-openeuler organization on Gitee, are around 1,000 packages with versions in both ARM64 and X86 architecture packages. Huawei claims its developers have made a number of enhancements to ARM64 openEuler code to improve multi-core efficiency. It is also working on a "green computing" ecosystem with Linaro and the Green Industry Alliance. At the moment, the organization claims, there are more than 50 contributors and just under 600 commits. The openEuler community has around 20 SIGs or project groups.

AMD

AMD Cites 'Factual Errors', 'Omissions' in Critical Report on Its China Venture (forbes.com) 69

Thursday the Wall Street Journal wrote a piece about AMD's joint venture with Chinese holding coming THATIC -- titled "How a Big U.S. Chip Maker Gave China the 'Keys to the Kingdom'." The article argues that AMD "essentially granted China access to advanced processor IP that could be used to threaten U.S. national security," reports Forbes.

But they add that the same day, AMD executive Harry Wolin wrote an angry blog post in response, complaining that the story "contains several factual errors and omissions and does not portray an accurate picture." Forbes reports: From Wolin's post, "Starting in 2015, AMD diligently and proactively briefed the Department of Defense, the Department of Commerce and multiple other agencies within the U.S. Government before entering into the joint ventures. AMD received no objections whatsoever from any agency to the formation of the joint ventures or to the transfer of technology -- technology which was of lower performance than other commercially available processors. In fact, prior to the formation of the joint ventures and the transfer of technology, the Department of Commerce notified AMD that the technology proposed was not restricted or otherwise prohibited from being transferred. Given this clear feedback, AMD moved ahead with the joint ventures."

Not only does AMD claim it had the green light from multiple government entities to enter into the deal, the post claims that the WSJ article is simply wrong. "The Wall Street Journal story omits important factual details, including the fact that AMD put significant protections in place to protect its intellectual property (IP) and prevent valuable IP from being misused or reverse engineered to develop future generations of processors."

Transportation

Toyota Establishes Research Institute In China To Study Hydrogen, Green Tech (reuters.com) 82

Japan announced on Sunday it was setting up a research institute in Beijing in partnership with Tsinghua University to study car technology using hydrogen power and other green technologies that could ease environmental problems in China. Reuters reports: The initiative, outlined by Toyota's President and Chief Executive Akio Toyoda in a speech at Tsinghua University, is part of the Japanese carmaker's efforts to share more technology with China as it seeks to expand its business in the country by beefing up manufacturing capacity and distribution channels, a source close to Toyota said. The Tsinghua-Toyota Joint Research Institute will conduct research into cars and new technology to solve environmental problems in China, including reducing traffic accidents, Toyota said in a statement.

The institute will "cooperate in research not only related to cars for Chinese consumers, but also in research related to active utilization of hydrogen energy that can help solve China's energy problems," the company said. The move dovetails with Toyota's announcement this month that it would offer carmakers and suppliers around the world free access to nearly 24,000 patents for electric vehicle technologies.

Transportation

Toyota Will Share 23,740 Hybrid Vehicle Patents For Free (reuters.com) 163

An anonymous reader quotes Reuters: Japan's Toyota Motor Corp will offer free access to its hybrid-vehicle patents through 2030, it said on Wednesday, seeking to expand use of the lower-emission technology even as the global industry shifts toward fully electric cars. The pledge by one of the world's biggest automakers to share its closely guarded patents, the second time it has opened up a technology, is aimed at driving industry uptake of hybrids and fending off the challenge of all-battery electric vehicles (EVs).

Toyota said it would grant licenses on nearly 24,000 patents on technologies used in its Prius, the world's first mass-produced "green" car, and offer to supply competitors with components including motors, power converters and batteries used in its lower-emissions vehicles... Toyota's move to unlock its patents underlines its belief that hybrids are an effective alternative to all-battery EVs, given a fuel efficiency roughly double that of gasoline cars, lower cost and that they do not need charging infrastructure. Toyota vehicles account for more than 80 percent of the global hybrid vehicle market. "Toyota has realized that they made a mistake by protecting their hybrid technology for years. This prevented diffusion" said Janet Lewis, head of Asia transportation research at Macquarie Securities.

"Toyota on its own can't get key technology accepted, but if other companies use it, that offers the best chance of expansion," she added.

The article notes statistics from LMC Automotive that hybrid vehicles "account for around 3 percent of all vehicles sold globally, eclipsing the roughly 1.5 percent share of all-battery EVs."

Shigeki Terashi, Executive Vice President of Toyota, said, "we believe that now is the time for cooperation."
Chrome

Google Secretly Logs Users Into Chrome Whenever They Log Into a Google Site (zdnet.com) 179

Catalin Cimpanu, writing for ZDNet: Starting with Chrome 69, whenever a Chrome user would access a Google-owned site, the browser would take that user's Google identity and log the user into the Chrome in-browser account system -- also known as Sync. This system, Sync, allows users to log in with their Google accounts inside Chrome and optionally upload and synchronize local browser data (history, passwords, bookmarks, and other) to Google's servers. Sync has been present in Chrome for years, but until now, the system worked independently from the logged-in state of Google accounts. This allowed users to surf the web while logged into a Google account but not upload any Chrome browsing data to Google's servers, data that may be tied to their accounts.

Now, with the revelations of this new auto-login mechanism, a large number of users are angry that this sneaky modification would allow Google to link that person's traffic to a specific browser and device with a higher degree of accuracy. That criticism proved to be wrong, as Google engineers have clarified on Twitter that this auto-login operation does not start the process of synchronizing local data to Google's servers, which will require a user click. Furthermore, they also revealed that the reason why this mechanism was added was for privacy reasons in the first place. Chrome engineers said the auto-login mechanism was added in the browser because of shared computers/browsers.
Well-respected cryptographer Matthew Green was disappointed by the move. In a post, he wrote: [...] In the rest of this post, I'm going to talk about why this matters. From my perspective, this comes down to basically four points:
1. Nobody on the Chrome development team can provide a clear rationale for why this change was necessary, and the explanations they've given don't make any sense.
2. This change has enormous implications for user privacy and trust, and Google seems unable to grapple with this.
3. The change makes a hash out of Google's own privacy policies for Chrome.
4. Google needs to stop treating customer trust like it's a renewable resource, because they're screwing up badly.

Canada

Tech Conferences Moving North as Trump Policies Turn Off Attendees (financialpost.com) 340

The Collision Conference, one of North America's most influential technology gatherings, tweeted on Tuesday: "We've got some news. It's about Toronto. But we'll let Justin Trudeau tell you about it." What followed was a video in which the prime minister announced that Collision, which typically boasts 25,000 attendees, will be coming to Canada in 2019. From a report: "I'm happy you chose Toronto to host North America's fastest growing tech conference for the next three years, but I have to say, I'm not completely surprised," Trudeau said. "Toronto is a key global tech hub and an example of the diversity that is our strength." And Collision is not alone in coming north. At least two other major technology conferences have recently made the decision to relocate to Canada, lured in part by Toronto's burgeoning tech sector, but also driven by travel restrictions imposed by U.S. President Donald Trump, policies that have left organizers scrambling to accommodate those who can't visit the United States.

In mid-April, Creative Commons, an international non-profit dedicated to the legal sharing of digital content, held their global summit in Toronto for the second year in a row. "The political climate in the U.S., specifically the open hostility from the current administration towards many international communities, and the anxiety from those we work with about how they might be treated was definitely a deciding factor," said Ryan Merkley, CEO of Creative Commons. "What's most unfortunate is that this approach is so inconsistent with the views of the many collaborative communities we work with every day in the U.S."

At Access Now, a non-profit that organizes the RightsCon digital rights conference, Trump's travel ban on seven predominantly Muslim countries hit close to home. "One of our interns at the time was an Iranian citizen with a U.S. green card, and she wasn't able to leave the country to go to Brussels to help us organize the (2017) event," RightsCon director Nick Dagostino said. For years, RightsCon has alternated between San Francisco and a series of global venues, and after last year's event in Brussels, heading back to California would have been the natural choice. But then, people started telling Access Now that if the event happened in the U.S., they wouldn't show up.

Facebook

Facebook Admits To Tracking Users, Non-Users Off-Site (theguardian.com) 147

Facebook said in a blog post yesterday that they tracked users and non-users across websites and apps for three main reasons: providing services directly, securing the company's own site, and "improving our products and services." The statement comes as the company faces a U.S. lawsuit over a controversial facial recognition feature launched in 2011. The Guardian reports: "When you visit a site or app that uses our services, we receive information even if you're logged out or don't have a Facebook account. This is because other apps and sites don't know who is using Facebook," Facebook's product management director, David Baser, wrote. "Whether it's information from apps and websites, or information you share with other people on Facebook, we want to put you in control -- and be transparent about what information Facebook has and how it is used."

But the company's transparency has still not extended to telling non-users what it knows about them -- an issue Zuckerberg also faced questions over from Congress. Asked by Texas representative Gene Green whether all information Facebook holds about a user is in the file the company offers as part of its "download your data" feature, Zuckerberg had responded he believed that to be the case. Privacy campaigner Paul-Olivier Dehaye disagreed, noting that, even as a Facebook user, he had been unable to access personal data collected through the company's off-site tracking systems. Following an official subject access request under EU law, he told MPs last month, Facebook had responded that it was unable to provide the information.

Australia

'How I Went Dark In Australia's Surveillance State For 2 Years' (cnet.com) 235

schwit1 shares a report from CNET, written by Claire Reilly: In 2015, during the transition from paper to Opal [contactless public transit cards], Australia passed sweeping new data retention laws. These laws required all Australian internet service providers and telecommunications carriers to retain customers' phone and internet metadata for two years -- details like the phone number a person calls, the timestamps on text messages or the cell tower a phone pings when it makes a call. Suddenly, Australians were fighting for the right to stay anonymous in a digital world. On one side of the fence: safety-conscious civilians. They argued that this metadata was a powerful tool and that the ability to track a person's movements through phone pings or call times was vital for law enforcement. On the other side of the fence: digital civil libertarians. They argued that the data retention scheme was invasive and that this metadata could be used to build up an incredibly detailed picture of someone's life. And sitting in a barn two paddocks away from that fence: me, switching out burner phones and researching VPNs. When it emerged that police had the power to search Opal card data, track people's movements and match this to individual users, it was the last straw. August 2016 rolled around, paperless tickets were phased out and I hatched my plan. The Black Opal. The concept of the Black Opal is simple. Buy your transport card. Pay cash. Top up with cash (preferably in a new location each time). Never register it. Never link it to your credit or debit card. Live off the grid. Stay away from The Man.

[Reilly discusses the problems she faced:] All the top-up machines at train stations, light rail stops and ferry terminals were card-only affairs. One tap on that baby and you were back in the system. So, if I was busing downtown for a work meeting, I'd have to factor in extra time to get to an ATM, get cash out and then find somewhere to top up my card. Running for the train with friends, I was the one who had to divert three blocks, change jackets, burn off my fingerprints and find a nondescript corner store to top up. Here's what I learned. No one likes the paranoid one. [...] I finally came undone last week. Racing for a flight, I forgot about my Black Opal. I'd had an unusually busy week on public transport, and my balance was low. On the train to the airport terminal, it hit me. Did I have enough money on my card to pay the AU$17.76 tap-off fee that they use to gouge tourists at the airport? As I rode up the escalators and the exit turnstiles came into view, my heart sank. No ATM. No cash in my wallet. Just a row of bright green Opal readers and a top-up machine. Card only. With one trip, my years of off-grid living were undone. I slumped against the top-up machine and swiped my debit card. I was just 9 cents short, but it cost me so much more than that. My Black Opal was dead.

IT

Why Paper Jams Persist (newyorker.com) 122

A trivial problem reveals the limits of technology. Fascinating story from The New Yorker: Unsurprisingly, the engineers who specialize in paper jams see them differently. Engineers tend to work in narrow subspecialties, but solving a jam requires knowledge of physics, chemistry, mechanical engineering, computer programming, and interface design. "It's the ultimate challenge," Ruiz said.

"I wouldn't characterize it as annoying," Vicki Warner, who leads a team of printer engineers at Xerox, said of discovering a new kind of paper jam. "I would characterize it as almost exciting." When she graduated from the Rochester Institute of Technology, in 2006, her friends took jobs in trendy fields, such as automotive design. During her interview at Xerox, however, another engineer showed her the inside of a printing press. All Xerox printers look basically the same: a million-dollar printing press is like an office copier, but twenty-four feet long and eight feet high. Warner watched as the heavy, pale-gray double doors swung open to reveal a steampunk wonderland of gears, wheels, conveyor belts, and circuit boards. As in an office copier, green plastic handles offer access to the "paper path" -- the winding route, from "feeder" to "stacker," along which sheets of paper are shocked and soaked, curled and decurled, vacuumed and superheated. "Printers are essentially paper torture chambers," Warner said, smiling behind her glasses. "I thought, This is the coolest thing I've ever seen."

Censorship

How Millions of Iranians Are Evading Internet Censors (msn.com) 48

schwit1 quotes the Wall Street Journal: Authorities in Tehran have ratcheted up their policing of the internet in the past week and a half, part of an attempt to stamp out the most far-reaching protests in Iran since 2009. But the crackdown is driving millions of Iranians to tech tools that can help them evade censors, according to activists and developers of the tools. Some of the tools were attracting three or four times more unique users a day than they were before the internet crackdown, potentially weakening government efforts to control access to information online. "By the time they wake up, the government will have lost control of the internet," said Mehdi Yahyanejad, executive director of NetFreedom Pioneers, a California-based technology nonprofit that largely focuses on Iran and develops educational and freedom of information tools.
Wired calls it "the biggest protest movement in Iran since the 2009 Green Movement uprising," criticing tech companies which "continue to deny services to Iranians that could be crucial to free and open communications."
Censorship

Iran Cuts Internet Access and Threatens Telegram Following Mass Protests (bbc.com) 156

Long-time Slashdot reader cold fjord writes: As seething discontent has boiled over in Iran leading to mass protests, protesters have taken to the streets and social media to register their discontent... The government has been closing schools and shutting down transportation.

Now, as mass protests in Iran go into their third day there are reports that internet access is being cut in cities with protests occurring. Social media has been a tool for documenting the protests and brutal crackdowns against them. Iran previously cut off internet access during the Green Movement protests following the 2009 elections. At the same time the Iranian government is cutting internet access they have called on Telegram, reportedly used by more than 40 million Iranians, to close the channels used by protesters. Telegram is now closing channels used by the protesters while Telegram itself may be shut down in Iran.

Businesses

Vendor Tracks LinkedIn Profile Changes To Alert Client Employers (techtarget.com) 101

dcblogs shares a report from TechTarget: IT managers have long had the ability and right to monitor employee behavior on internal networks. Now, HR managers are getting similar capabilities thanks to cloud-based services -- but for tracking employee activity outside of their employer's network. A controversy and court fight is swelling over its potential impact on employee privacy. A San Francisco-based startup, hiQ Labs Inc., offers products based on its analysis of publicly available LinkedIn data. One is Keeper, which identifies employees at risk of being recruited away, and another is Skill Mapper, which analyzes employee skills. The profile data is collected by software bots. The clients of hiQ's service may learn whether a LinkedIn member is a flight risk thanks to an individual risk score: high (red), medium (yellow) or low (green), according to court papers. LinkedIn is in court fighting this, but so far it's losing. A federal judge recently took exception to the use of the CFAA in this case "to punish hiQ for accessing publicly available data." The judge warned such an interpretation "could profoundly impact open access to the internet."
Businesses

Why We Must Fight For the Right To Repair Our Electronics (ieee.org) 224

Kyle Wiens and Gay Gordon-Byrne explain via IEEE Spectrum how people in the United States can preserve their right to repair electronics, and why people must fight for the right in the first place. Here's an excerpt from their report: So how can people in the United States preserve their right to repair electronics? The answer is now apparent: through right-to-repair legislation enacted at the state level. Popular support on this issue has been clear since 2012, when 86 percent of the voters in Massachusetts endorsed a ballot initiative that would "[require] motor vehicle manufacturers to allow vehicle owners and independent repair facilities in Massachusetts to have access to the same vehicle diagnostic and repair information made available to the manufacturers' Massachusetts dealers and authorized repair facilities." Carmakers howled in protest, but after the law passed, they decided not to fight independent repair. Indeed, in January 2014 they entered into a national memorandum of understanding [PDF], voluntarily extending the terms of the Massachusetts law to the entire country. The commercial vehicle industry followed suit in October 2015. Now we need right-to-repair legislation for other kinds of equipment, too, particularly electronic equipment, which is the focus of "digital right to repair" initiatives in many states.

Similar to the Massachusetts legislation for automobiles, these digital-right-to-repair proposals would require manufacturers to provide access to service documentation, tools, firmware, and diagnostic programs. They also would require manufacturers to sell replacement parts to consumers and independent repair facilities at reasonable prices. The bills introduced this year in a dozen states have some variations. The ones in Kansas and Wyoming, for example, are limited to farm equipment. The one most likely to be adopted soon is in Massachusetts, which seeks to outlaw the monopoly on repair parts and information within the state. If it passes, electronics manufacturers will probably change their practices nationwide. Consumers would then have more choices when something breaks. The next time your smartphone screen cracks, your microwave oven gets busted, or your TV dies, you may be able to get it fixed quickly, affordably, and fairly. And you, not the manufacturer, would decide where your equipment is repaired: at home, with the manufacturer, or at a local repair shop that you trust.

Slashdot.org

20 Years of Stuff That Matters 726

Today we're marking Slashdot's 20th birthday. 20 years is a long time on the internet. Many websites have come and gone over that time, and many that stuck around haven't had any interest in preserving their older content. Fortunately, as Slashdot approaches its 163,000th story, we've managed to keep track of almost all our old postings - all but the first 2^10, or so. In addition to that, we've held onto user comments, the lifeblood of the site, from 1999 onward. As we celebrate Slashdot's 20th anniversary this month, we thought we'd take a moment to highlight a few of the notable or interesting stories and discussions that have happened here in the past decade and a half. This is part of our 20-year anniversary celebration, and we've set up a page to coordinate user meet-ups. We'll be continuing to run some special pieces throughout the month, so keep an eye out for those.

Read on for a trip down memory lane.

Update: Slashdot founder CmdrTaco has taken to Medium with some of his own Slashdot nostalgia.
United States

After Emissions Scandal, Volkswagen Pledges Charging Stations Across The US (siliconvalley.com) 142

Here's how the Volkswagen emissions scandal ends in California -- and the rest of America. An anonymous reader quotes the Bay Area News Group: In a decision with lasting implications for the growth of electric vehicles, state regulators on Thursday approved Volkswagen's plan to invest nearly $1 billion in California's EV network as penalty for its diesel-emission cheating scandal... San Jose and San Francisco are two of six cities slated for expanded community charging stations. A Volkswagen subsidiary, Electrify America, also will target low-income communities for at least 35 percent of the projects... The first phase calls for $120 million to build 400 charging stations with between 2,000 and 3,000 chargers. About $75 million will be used to develop a high-speed, highway charging network, mostly consisting of 150 kilowatt fast-chargers. The other $45 million will build community charging stations in six metro areas: San Jose, San Francisco, Sacramento, Fresno, Los Angeles and San Diego. Another $44 million will build a "Green City" in Sacramento. It will provide access to zero-emission vehicles to low-income residents, through ride-sharing and other programs. As part of the 10-year comprehensive plan, Electrify America will build a nationwide network of fast-charging stations with universal technology.
That nationwide network is expected to cost another $2 billion.
Transportation

Elon Musk Says He Has a Green Light To Build a NY-Philly-Baltimore-DC Hyperloop (theverge.com) 308

An anonymous reader shares a report:Elon Musk just tweeted that his Boring Company tunnel project has just received "verbal [government] approval" to build a hyperloop connecting New York City, Philadelphia, Baltimore, and Washington, DC. While we work to verify his claim, Musk is continuing to tweet more details about the project. The hyperloop, an ultrafast method of travel first developed by Musk in 2013, would only take 29 minutes to travel between New York City and DC, he claims. And it would feature "up to a dozen or more" access points via elevator in each city. Update: Eric Phillips, press secretary for the New York City mayor, tweeted, "This is news to City Hall," adding "The entirety of what we know about this proposal is what's in Mr. Musk's tweet. That is not how we evaluate projects of any scale."
Mars

SpaceX Pulls the Plug On Its Red Dragon Plans (arstechnica.com) 161

SpaceX has largely confirmed the rumors that the company is no longer planning to send an uncrewed version of its Dragon spacecraft to Mars in 2020, or later. Ars Technica reports: The company had planned to use the propulsive landing capabilities on the Dragon 2 spacecraft -- originally developed for the commercial crew variant to land on Earth -- for Mars landings in 2018 or 2020. Previously, it had signed an agreement with NASA to use some of its expertise for such a mission and access its deep-space communications network. On Tuesday, however, during a House science subcommittee hearing concerning future NASA planetary science missions, Florida Representative Bill Posey asked what the agency was doing to support privately developed planetary science programs. Jim Green, who directs NASA's planetary science division, mentioned several plans about the Moon and asteroids, but he conspicuously did not mention Red Dragon. After this hearing, SpaceX spokesman John Taylor didn't return a response to questions from Ars about the future of Red Dragon. Then, during a speech Wednesday at the International Space Station Research and Development Conference, Musk confirmed that the company is no longer working to land Dragon propulsively for commercial crew.

"Yeah, that was a tough decision," Musk acknowledged Wednesday with a sigh. "The reason we decided not to pursue that heavily is that it would have taken a tremendous amount of effort to qualify that for safety for crew transport," Musk explained Wednesday. "There was a time when I thought the Dragon approach to landing on Mars, where you've got a base heat shield and side mounted thrusters, would be the right way to land on Mars. But now I'm pretty confident that is not the right way." Musk added that his company has come up with a "far better" approach to landing on Mars that will be incorporated into the next iteration of the company's proposed Mars transportation hardware.

Slashdot Top Deals