Printer

California Ghost-Gun Bill Wants 3D Printers To Play Cop, EFF Says (theregister.com) 139

A proposed California bill would require 3D printer makers to use state-certified software to detect and block files for gun parts, but advocates at the Electronic Frontier Foundation (EFF) say it would be easy to evade and could lead to widespread surveillance of users' printing activity. The Register reports: The bill in question is AB 2047, the scope of which, on paper, appears strict. The primary goal is clear and simple: to require 3D printer manufacturers to use a state-certified algorithm that checks digital design files for firearm components and blocks print jobs that would produce prohibited parts. [...] Cliff Braun and Rory Mir, who respectively work in policy and tech community engagement at the EFF, claim that the proposals in California are technically infeasible and in practice will lead to consumer surveillance.

In a series of blog posts published this month, the pair argued that print-blocking technology -- proposals for which have also surfaced in states including New York and Washington - cannot work for a range of technical reasons. They argued that because 3D printers and other types of computer numerical control (CNC) machines are fairly simple, with much of their brains coming from the computer-aided manufacturing (CAM) software -- or slicer software -- to which they are linked, the bill would establish legal and illegal software. Proprietary software will likely become the de facto option, leaving open source alternatives to rot.

"Under these proposed laws, manufacturers of consumer 3D printers must ensure their printers only work with their software, and implement firearm detection algorithms on either the printer itself or in a slicer software," wrote Braun earlier this month. "These algorithms must detect firearm files using a maintained database of existing models. Vendors of printers must then verify that printers are on the allow-list maintained by the state before they can offer them for sale. Owners of printers will be guilty of a crime if they circumvent these intrusive scanning procedures or load alternative software, which they might do because their printer manufacturer ends support."

Braun also argued that it would be trivial for anyone who uses 3D printers to make small tweaks to either the visual models of firearms parts, or the machine instructions (G-code) generated from those models, to evade detection. Mir further argued that the bill offers no guardrails to keep this "constantly expanding blacklist" limited to firearm-related designs. In his view, there is a clear risk that this approach will creep into other forms of alleged unlawful activity, such as copyright infringement. [...] Braun and Mir have a list of other arguments against the bill. They say the algorithms are more than likely to lead to false positives, which will prevent good-faith users from using their hardware. Many 3D printer owners also have no interest in printing firearm components. Most simply want the freedom to print trinkets and spare parts while others use them to print various items and sell them as an income stream.

Desktops (Apple)

Mac Studio 512GB RAM Option Disappears Amid Global DRAM Shortage (macrumors.com) 50

Apple has removed the 512GB RAM configuration for the Mac Studio, leaving 256GB as the new maximum. The remaining 256GB upgrade has also increased in price and now faces longer shipping delays as demand grows "due to consumers seeking machines suitable for running local AI agents," reports MacRumors. From the report: The Mac Studio starts with 36GB RAM, but there were upgrades ranging from 48GB to 512GB, with the higher tier upgrades limited to the M3 Ultra chip. Now there are options ranging from 48GB to 256GB, with wait times into May for the 256GB upgrade. Apple has also raised the price for the 256GB RAM upgrade option. It used to cost $1,600 to go from 96GB to 256GB on the high-end M3 Ultra machine, but now it costs $2,000. 512GB was $4,000 when it was available.
Crime

DNA Technology Convicts a 64-Year-Old for Murdering a Teenager in 1982 (cnn.com) 78

"More than four decades after a teenager was murdered in California, DNA found on a discarded cigarette has helped authorities catch her killer," reports CNN: Sarah Geer, 13, was last seen leaving her friend's houseï in Cloverdale, California, on the evening of May 23, 1982. The next morning, a firefighter walking home from work found her body, the Sonoma County District Attorney's Office said in a news release... Her death was ruled a homicide, but due to the "limited forensic science of the day," no suspect was identified and the case went cold for decades, prosecutors said.

Nearly 44 years after Sarah's murder, a jury found James Unick, 64, guilty of killing her on February 13. It would have been the victim's 57th birthday, the Sonoma County District Attorney's Office told CNN. Genetic genealogy, which combines DNA evidence and traditional genealogy, helped match Unick's DNA from a cigarette butt to DNA found on Sarah's clothing, according to prosecutors... [The Cloverdale Police Department] said it had been in communication with a private investigation firm in late 2019 and had partnered with them in hopes the firm could revisit the case's evidence "with the latest technological advancements in cold case work...."

"The FBI, with its access to familial genealogical databases, concluded that the source of the DNA evidence collected from Sarah belonged to one of four brothers, including James Unick," prosecutors said. Once investigators narrowed down the list of suspects to the four Unick brothers, the FBI "conducted surveillance of the defendant and collected a discarded cigarette that he had been smoking," prosecutors said. A DNA analysis of the cigarette confirmed James Unick's DNA matched the 2003 profile, along with other DNA samples collected from Sarah's clothing the day she was killed.

In a statement, the county's district attorney "While 44 years is too long to wait, justice has finally been served..."

And the article points out that "In 2018, genetic genealogy led to the arrest of the Golden State Killer, and it has recently helped solve several other cold cases, including a 1974 murder in Wisconsin and a 1988 murder in Washington."
Transportation

New York Drops Plan To Legalize Robotaxis Outside NYC (theverge.com) 25

New York Governor Kathy Hochul has dropped a proposal that would have allowed limited commercial robotaxi deployments outside New York City, citing a lack of support among state legislators. "The move is a blow to Waymo and other robotaxi companies who saw New York, and especially New York City, as a potential goldmine," reports The Verge. From the report: The plan, which was introduced by Hochul as part of the state's budget proposal last month, would have allowed limited robotaxi deployment in cities other than the Big Apple -- while leaving whether New York City would get autonomous vehicles up to the mayor and the City Council. But now that plan is DOA, as support in the legislature never materialized. "Based on conversations with stakeholders, including in the legislature, it was clear that the support was not there to advance this proposal," Sean Butler, a Hochul spokesperson, said in a statement. "While we are disappointed by the Governor's decision, we're committed to bringing our service to New York and will work with the State Legislature to advance this issue," Waymo spokesperson Ethan Teicher said in a statement. "The path forward requires a collaborative approach that prioritizes transparency and public safety."
Power

Gasoline Out of Thin Air? It's a Reality! (jalopnik.com) 122

Can Aircela's machine "create gasoline using little more than electricity and the air that we breathe"? Jalopnik reports... The Aircela machine works through a three-step process. It captures carbon dioxide directly from the air... The machine also traps water vapor, and uses electrolysis to break water down into hydrogen and oxygen... The oxygen is released, leaving hydrogen and carbon dioxide, the building blocks of hydrocarbons. This mixture then undergoes a process known as direct hydrogenation of carbon dioxide to methanol, as documented in scientific papers.

Methanol is a useful, though dangerous, racing fuel, but the engine under your hood won't run on it, so it must be converted to gasoline. ExxonMobil has been studying the process of doing exactly that since at least the 1970s. It's another well-established process, and the final step the Aircela machine performs before dispensing it through a built-in ordinary gas pump. So while creating gasoline out of thin air sounds like something only a wizard alchemist in Dungeons & Dragons can do, each step of this process is grounded in science, and combining the steps in this manner means it can, and does, really work.

Aircela does not, however, promise free gasoline for all. There are some limitations to this process. A machine the size of Aircela's produces just one gallon of gas per day... The machine can store up to 17 gallons, according to Popular Science, so if you don't drive very much, you can fill up your tank, eventually... While the Aircela website does not list a price for the machine, The Autopian reports it's targeting a price between $15,000 and $20,000, with hopes of dropping the price once mass production begins. While certainly less expensive than a traditional gas station, it's still a bit of an investment to begin producing your own fuel. If you live or work out in the middle of nowhere, however, it could be close to or less than the cost of bringing gas to you, or driving all your vehicles into a distant town to fill up. You're also not limited to buying just one machine, as the system is designed to scale up to produce as much fuel as you need.

The main reason why this process isn't "something for nothing" is that it takes twice as much electrical energy to produce energy in the form of gasoline. As Aircela told The Autopian " Aircela is targeting >50% end to end power efficiency. Since there is about 37kWh of energy in a gallon of gasoline we will require about 75kWh to make it. When we power our machines with standalone, off-grid, photovoltaic panels this will correspond to less than $1.50/gallon in energy cost."

Thanks to long-time Slashdot reader Quasar1999 for sharing the news.
Transportation

Airbus Says Most of Its Recalled 6,000 A320 Jets Now Modified (reuters.com) 51

Airbus said Monday that the vast majority of around 6,000 A320-family jets affected by an emergency software recall have now been modified, leaving fewer than 100 aircraft still requiring work after a frantic weekend of repairs prompted by the discovery of a vulnerability to solar flares. The unprecedented recall -- described as the broadest emergency action in the company's history -- came after a mid-air incident on a JetBlue A320 revealed a possible link between a drop in altitude and a space-related computer bug.

The fix involved reverting to an earlier version of software that controls nose angle, uploaded via cable from a portable device called a data loader. Some older A320 jets will need entirely new computers rather than a simple software reset, raising questions about how long those aircraft will remain grounded amid global chip shortages.

Reuters separately reported on Monday that Airbus had discovered an industrial quality issue affecting metal panels of a "limited" number of A320-family aircraft. The company told the publication that it had "identified" and "contained" the source of the issue and that "all newly produced panels conform to all requirements."
Education

UC San Diego Reports 'Steep Decline' in Student Academic Preparation 174

The University of California, San Diego has documented a steep decline in the academic preparation of its entering freshmen over the past five years, according to a report [PDF] released this month by the campus's Senate-Administration Working Group on Admissions. Between 2020 and 2025, the number of students whose math skills fall below middle-school level increased nearly thirtyfold, from roughly 30 to 921 students. These students now represent one in eight members of the entering cohort.

The Mathematics Department redesigned its remedial program this year to focus entirely on elementary and middle school content after discovering students struggled with basic fractions and could not perform arithmetic operations taught in grades one through eight. The deterioration extends beyond mathematics. Nearly one in five domestic freshmen required remedial writing instruction in 2024, returning to pre-pandemic levels after a brief decline.

Faculty across disciplines report students increasingly struggle to engage with longer and complex texts. The decline coincided with multiple disrupting factors. The COVID-19 pandemic forced remote learning starting in spring 2020. The UC system eliminated SAT and ACT requirements in 2021. High school grade inflation accelerated during this period, leaving transcripts unreliable as indicators of actual preparation. UC San Diego simultaneously doubled its enrollment from under-resourced high schools designated LCFF+, admitting more such students than any other UC campus between 2022 and 2024.

The working group concluded that admitting large numbers of underprepared students risks harming those students while straining limited instructional resources. The report recommends developing predictive models to identify at-risk applicants and calls for the UC system to reconsider standardized testing requirements.
Privacy

Mother Describes the Dark Side of Apple's Family Sharing (wired.com) 140

An anonymous reader quotes a report from 9to5Mac: A mother with court-ordered custody of her children has described how Apple's Family Sharing feature can be weaponized by a former partner. Apple support staff were unable to assist her when she reported her former partner using the service in controlling and coercive ways... [...] Namely, Family Sharing gives all the control to one parent, not to both equally. The parent not identified as the organizer is unable to withdraw their children from this control, even when they have a court order granting them custody. As one woman's story shows, this can allow the feature which allows it to be weaponized by an abusive former partner.

Wired reports: "The lack of dual-organizer roles, leaving other parents effectively as subordinate admins with more limited power, can prove limiting and frustrating in blended and shared households. And in darker scenarios, a single-organizer setup isn't merely inconvenient -- it can be dangerous. Kate (name changed to protect her privacy and safety) knows this firsthand. When her marriage collapsed, she says, her now ex-husband, the designated organizer, essentially weaponized Family Sharing. He tracked their children's locations, counted their screen minutes and demanded they account for them, and imposed draconian limits during Kate's custody days while lifting them on his own [...] After they separated, Kate's ex refused to disband the family group. But without his consent, the children couldn't be transferred to a new one. "I wrongly assumed being the custodial parent with a court order meant I'd be able to have Apple move my children to a new family group, with me as the organizer," says Kate. But Apple couldn't help. Support staff sympathized but said their hands were tied because the organizer holds the power."
Although users can "abandon the accounts and start again with new Apple IDs," the report notes that doing so means losing all purchased apps, along with potentially years' worth of photos and videos.
Microsoft

Extortion and Ransomware Drive Over Half of Cyberattacks — Sometimes Using AI, Microsoft Finds (microsoft.com) 23

Microsoft said in a blog post this week that "over half of cyberattacks with known motives were driven by extortion or ransomware... while attacks focused solely on espionage made up just 4%."

And Microsoft's annual digital threats report found operations expanding even more through AI, with cybercriminals "accelerating malware development and creating more realistic synthetic content, enhancing the efficiency of activities such as phishing and ransomware attacks." [L]egacy security measures are no longer enough; we need modern defenses leveraging AI and strong collaboration across industries and governments to keep pace with the threat...

Over the past year, both attackers and defenders harnessed the power of generative AI. Threat actors are using AI to boost their attacks by automating phishing, scaling social engineering, creating synthetic media, finding vulnerabilities faster, and creating malware that can adapt itself... For defenders, AI is also proving to be a valuable tool. Microsoft, for example, uses AI to spot threats, close detection gaps, catch phishing attempts, and protect vulnerable users. As both the risks and opportunities of AI rapidly evolve, organizations must prioritize securing their AI tools and training their teams...

Amid the growing sophistication of cyber threats, one statistic stands out: more than 97% of identity attacks are password attacks. In the first half of 2025 alone, identity-based attacks surged by 32%. That means the vast majority of malicious sign-in attempts an organization might receive are via large-scale password guessing attempts. Attackers get usernames and passwords ("credentials") for these bulk attacks largely from credential leaks. However, credential leaks aren't the only place where attackers can obtain credentials. This year, we saw a surge in the use of infostealer malware by cybercriminals...

Luckily, the solution to identity compromise is simple. The implementation of phishing-resistant multifactor authentication (MFA) can stop over 99% of this type of attack even if the attacker has the correct username and password combination.

"Security is not only a technical challenge but a governance imperative..." Microsoft adds in their blog post. "Governments must build frameworks that signal credible and proportionate consequences for malicious activity that violates international rules." (The report also found that America is the #1 most-targeted country — and that many U.S. companies have outdated cyber defenses.)

But while "most of the immediate attacks organizations face today come from opportunistic criminals looking to make a profit," Microsoft writes that nation-state threats "remain a serious and persistent threat." More details from the Associated Press: Russia, China, Iran and North Korea have sharply increased their use of artificial intelligence to deceive people online and mount cyberattacks against the United States, according to new research from Microsoft. This July, the company identified more than 200 instances of foreign adversaries using AI to create fake content online, more than double the number from July 2024 and more than ten times the number seen in 2023.
Examples of foreign espionage cited by the article:
  • China is continuing its broad push across industries to conduct espionage and steal sensitive data...
  • Iran is going after a wider range of targets than ever before, from the Middle East to North America, as part of broadening espionage operations..
  • "[O]utside of Ukraine, the top ten countries most affected by Russian cyber activity all belong to the North Atlantic Treaty Organization (NATO) — a 25% increase compared to last year."
  • North Korea remains focused on revenue generation and espionage...

There was one especially worrying finding. The report found that critical public services are often targeted, partly because their tight budgets limit their incident response capabilities, "often resulting in outdated software.... Ransomware actors in particular focus on these critical sectors because of the targets' limited options. For example, a hospital must quickly resolve its encrypted systems, or patients could die, potentially leaving no other recourse but to pay."


Intel

Intel Talent Bleed Continues (theregister.com) 16

Intel's long-time Xeon chief architect Ronak Singhal is leaving the company after nearly 30 years, marking yet another high-profile departure amid Intel's leadership churn and intensifying competition from AMD and Arm-based cloud CPUs. The Register reports: The Carnegie Mellon alum holds degrees in electrical and computer engineering, along with at least 30 patents involving CPUs. Singhal joined Intel in 1997 after spending the previous summer as an intern at Cyrix. After a year in Intel's Rotation Engineers Program, he spent the remainder of his tenure helping to develop some of the chipmaker's most consequential and, at times, controversial processors. Most notably, Singhal oversaw the core development of Intel's 22nm Haswell and 14nm Broadwell processor architectures. His innovations aren't limited to the datacenter either, with his architectural contributions playing a significant role in the success of Intel's Core and Atom processor families as well. [...]

Singhal is only the latest Xeon lead to jump ship since the start of the year. In January, Sailesh Kottapalli, another senior fellow, left for Qualcomm barely a month after former CEO Pat Gelsinger's unceremonious "retirement." Even before Gelsinger's eviction, Intel's datacenter group has been something of a revolving door. Last summer Singhal's long-time colleague Lisa Spelman departed the company, eventually landing a spot as CEO of HPC interconnect vendor Cornelis Networks. Her replacement, Ryan Tabrah, lasted seven months in the role, about half as long as Intel datacenter boss Justin Hotard, who defected for the forests of Finland to lead Nokia as its new President and CEO back in April.

In fact, the churn now extends all the way to the top. On Monday, Intel announced its CEO of Products, Michelle Johnston Holthaus, would be leaving the business. The move is part of a broader executive shakeup that will see former Arm engineer Kevork Kechichian take over as head of Intel's datacenter engineering group. Jim Johnson, meanwhile, will take over as head of the chipmaker's client computing group while Srinivasan (Srini) Iyengar will head up a new central engineering division.

Businesses

PayPal No Longer Available for Steam Purchases Outside Major Currency Zones (rockpapershotgun.com) 87

PayPal payment processing has been unavailable for Steam purchases in most countries since early July 2025, Valve has confirmed, with functionality limited to transactions in U.S. dollars, Euros, British Pounds, Japanese Yen, Australian dollars, and Canadian dollars. In a statement to RockPaperShotgun, the company said one of PayPal's acquiring banks terminated all Steam transaction processing. Valve linked the bank's decision to previous Mastercard-related content restrictions. The disruption began in early July 2025 when PayPal notified Valve of the immediate termination, leaving millions of users in affected regions without PayPal access and no certain timeline for resolution.
AI

The Dead Need Right To Delete Their Data So They Can't Be AI-ified, Lawyer Says 71

Legal scholar Victoria Haneman argues that U.S. law should grant estates a time-limited right to delete a deceased person's data so they can't be recreated by AI without their consent. "Digital resurrection by or through AI requires the personal data of the deceased, and the amount of data that we are storing online is increasing exponentially with each passing year," writes Haneman in an article published earlier this year in the Boston College Law Review. "It has been said that data is the new uranium, extraordinarily valuable and potentially dangerous. A right to delete will provide the decedent with a time-limited right for deletion of personal data." The Register reports: A living person may have some say on the matter through the control of personal digital documents and correspondence. But a dead person can't object, and US law doesn't offer the dead much data protection in terms of privacy law, property law, intellectual property law, or criminal law. The Revised Uniform Fiduciary Access to Digital Assets Act (RUFADAA), a law developed to help fiduciaries deal with digital files of the dead or incapacitated, can come into play. But Haneman points out that most people die intestate (without a will), leaving matters up to tech platforms. Facebook's response to dead users is to allow anyone to request the memorialization of an account, which keeps posts online. As for RUFADAA, it does little to address digital resurrection, says Haneman.

The right to publicity, which provides a private right of action against unauthorized commercial use of a person's name, image, or likeness, covers the dead in about 25 states, according to Haneman. But the monetization of publicity rights has proven to be problematic. Haneman says that there are some states where it's theoretically possible to be prosecuted for libeling or defaming the deceased, such as Idaho, Nevada, and Oklahoma, but adds that such prosecutions have declined because they tread upon the constitutional right to free expression. [...] A recent California law, the Delete Act, which took effect last year, is the first to offer a way for the living to demand the deletion of personal data from data brokers in one step. But according to Haneman, it's unclear whether the text of the law will be extended to cover the dead -- a possibility think tank Aspen Tech Policy Hub supports [PDF].

Haneman argues that a data deletion law for the dead would be grounded in laws governing human remains, where corpses receive protection against abuse despite being neither a person nor property. "The personal representative of the decedent has the right to destroy all physical letters and photographs saved by the decedent; merely storing personal information in the cloud should not grant societal archival rights," she argues. "A limited right of deletion within a twelve-month window balances the interests of society against the rights of the deceased."
AI

How Do Olympiad Medalists Judge LLMs in Competitive Programming? 23

A new benchmark assembled by a team of International Olympiad medalists suggests the hype about large language models beating elite human coders is premature. LiveCodeBench Pro, unveiled in a 584-problem study [PDF] drawn from Codeforces, ICPC and IOI contests, shows the best frontier model clears just 53% of medium-difficulty tasks on its first attempt and none of the hard ones, while grandmaster-level humans routinely solve at least some of those highest-tier problems.

The researchers measured models and humans on the same Elo scale used by Codeforces and found that OpenAI's o4-mini-high, when stripped of terminal tools and limited to one try per task, lands at an Elo rating of 2,116 -- hundreds of points below the grandmaster cutoff and roughly the 1.5 percentile among human contestants. A granular tag-by-tag autopsy identified implementation-friendly, knowledge-heavy problems -- segment trees, graph templates, classic dynamic programming -- as the models' comfort zone; observation-driven puzzles such as game-theory endgames and trick-greedy constructs remain stubborn roadblocks.

Because the dataset is harvested in real time as contests conclude, the authors argue it minimizes training-data leakage and offers a moving target for future systems. The broader takeaway is that impressive leaderboard jumps often reflect tool use, multiple retries or easier benchmarks rather than genuine algorithmic reasoning, leaving a conspicuous gap between today's models and top human problem-solvers.
First Person Shooters (Games)

New 'Doom: The Dark Ages' Already Adjusted to Add Even More Dangerous Demons (windowscentral.com) 23

Doom: The Dark Ages just launched on May 15. But it's already received "difficulty" balance changes "that have made the demons of Hell even more dangerous than ever," writes Windows Central: According to DOOM's official website Slayer's Club, these balance adjustments are focused on making the game harder, as players have been leaving feedback saying it felt too easy even on Nightmare Mode. As a result, enemies now hit harder, health and armor item pick-ups drop less often, and certain enemies punish you more severely for mistiming the parry mechanic.
It reached three million players in just five days, which was seven times faster than 2020's Doom: Eternal," reports Wccftech (though according to analytics firm Ampere Analysis (via The Game Business), more than two million of those three million launch players were playing on Xbox, while only 500K were playing on PS5.") "id Software proves it can still reinvent the wheel," according to one reviewer, "shaking up numerous aspects of gameplay, exchanging elaborate platforming for brutal on-the-ground action, as well as the ability to soar on a dragon's back or stomp around in a giant mech."

And the New York Times says the game "effectively reinvents the hellish shooter with a revamped movement system and deepened lore" in the medieval goth-themed game... Double jumping and dashing are ditched and replaced with an emphasis on raw power and slow, strategic melee combat. Doom Slayer's arsenal features a brand-new tool, the powerful Shield Saw, which Id Software made a point to showcase across its "Stand and Fight" trailers and advertisements. Used for absorbing damage at the expense of speed, the saw also allows players to bash enemies from afar and close the gap on chasms too wide to jump across. While previous titles allowed players to quickly worm their way through bullet hell, The Dark Ages expects you to meet foes head on. "If you were an F-22 fighter jet in Doom Eternal, this time around we wanted you to feel like an Abrams tank," Hugo Martin, the game's creative director, has told journalists.

And Doom Slayer's beefy durability and unstoppable nature does make the gameplay a refreshing experience. The badassery is somehow ratcheted to new heights with the inclusion of a fully controllable mech, which has only a handful of attacks at its disposal, and actual dragons. Flight in a Doom game is entirely surprising and fluid, and the dragons feel relatively easy to maneuver through tight spots. They can also engage in combat more deliberately with the use of dodges and mounted cannons...

One of my favorite additions is the skullcrusher pulverizer. Equal parts heinous nutcracker and demonic woodchipper, the gun lodges skulls into a grinder and sends shards of bones flying at enemies. The animation is both goofy and satisfying.

Another special Times article notes that Doom's fans "resurrect the original game over and over again on progressively stranger pieces of hardware: a Mazda Miata, a NordicTrack treadmill, a French pharmacy sign." But what many hard-core tech hobbyists want to know is whether you can play it on a pregnancy test. The answer: positively yes. And for the first time, even New York Times readers can play Doom within The Times's site [after creating a free account]...

None of this happened by accident, of course. Ports were not incidental to Doom's development. They were a core consideration. "Doom was developed in a really unique way that lent a high degree of portability to its code base," said John Romero, who programmed the game with John Carmack. (In our interview, he then reminisced about operating systems for the next 14 minutes.) Id had developed Wolfenstein 3D, the Nazi-killing predecessor to Doom, on PCs. To build Doom, Carmack and Romero used NeXT, the hardware and software company founded by Steve Jobs after his ouster from Apple in 1985. NeXT computers were powerful, selling for about $25,000 apiece in today's dollars. And any game designed on that system would require porting to the more humdrum PCs encountered by consumers at computer labs or office jobs.

This turned out to be advantageous because Carmack had a special aptitude for ports. All of Id's founders met as colleagues at Softdisk, which had hired Carmack because of his ability to spin off multiple versions of a single game. The group decided to strike out on its own after Carmack created a near-perfect replica of the first level of Super Mario Bros. 3 — Nintendo's best-selling platformer — on a PC. It was a wonder of software engineering that compensated for limited processing power with clever workarounds. "This is the thing that everyone has," Romero said of PCs. "The fact that we could figure out how to make it become a game console was world changing...."

Romero founded a series of game studios after leaving Id in 1996 and is working on a new first-person shooter, the genre he and Carmack practically invented. He has no illusions about how it may stack up. "I absolutely accept that Doom is the best game I'll ever make that has that kind of a reach," he said. "At some point you make the best thing." Thirty years on, people are still making it.

And in related news, PC Gamer reports... As part of a new "FPS Fridays" series on Twitch, legendary shooter designer John Romero streamed New Blood's 2018 hit, Dusk, one of the first and most influential indie "boomer shooters" in the genre's recent revitalization. The short of it? Romero seems to have had a blast.
KDE

'KDE Plasma LTS Releases Are Dead' (itsfoss.com) 29

With its Start menu-style application launcher and its bottom-of-the-screen taskbar, KDE Plasma is a "nice" and "traditional" desktop environment that's "also highly customizable," notes It's FOSS News.

But there's a change coming... In contrast to other desktop environments, KDE offers a long-term support release (LTS) of Plasma, where bug fixes and security updates are provided for an extended period, with no new major changes being introduced. However, that is no longer the case now. Shared by Nate Graham, a prominent contributor within the KDE community, KDE has decided to stop working on LTS releases of Plasma, shifting its focus on extending support for the bug-fix and feature releases instead.

The reasoning behind this move is multi-faceted, with factors such as inconsistent expectations from the community, developers' reluctance to work on older versions, and the lack of consistency in LTS support for Frameworks and Gear apps... I believe this move will provide Plasma users with a better Linux desktop experience, thanks to the extended bug-fix period, which will enhance the stability of each release.

From Graham's blog post: It's no secret that our Plasma LTS ("Long-Term Support") product isn't great. It really only means we backport bug-fixes for longer than usual — usually without even testing them, since no Plasma developers enjoy living on or testing old branches. And there's no corresponding LTS product for Frameworks or Gear apps, leaving a lot of holes in the LTS umbrella. Then there's the fact that "LTS" means different things to different people; many have an expansive definition of the term that gives them expectations of stability that are impossible to meet.

Our conclusion was that the fairly limited nature of the product isn't meeting anyone's expectations, so we decided to not continue it. Instead, we'll lengthen the effective support period of normal Plasma releases a bit by adding on an extra bug-fix release, taking us from five to six.

We also revisited the topic of reducing from three to two Plasma feature releases per year, with a much longer bug-fix release schedule. It would effectively make every Plasma version a sort of mini-LTS, and we'd also try to align them with the twice-yearly release schedules of Kubuntu and Fedora.

However, the concept of "Long-Term Support" doesn't go away just because we're not giving that label to any of our software releases anymore. Really, it was always a label applied by distros anyway — the distros doing the hard work of building an LTS final product out of myriad software components that were never themselves declared LTS by their own developers. It's a lot of work.

So we decided to strengthen our messaging that users of KDE software on LTS distros should be reporting issues to their distro, and not to KDE. An LTS software stack is complex and requires a lot of engineering effort to stabilize; the most appropriate people to triage issues on LTS distros are the engineers putting them together. This will free up time among KDE's bug triagers and developers to focus on current issues they can reproduce and fix, rather than wasting time on issues that can't be reproduced due to a hugely different software stack, or that were fixed months or years ago yet reported to us anyway due to many users' unfamiliarity with software release schedules and bug reporting.

Privacy

Nearly 1.5 Million Private Photos from Five Dating Apps Were Exposed Online (bbc.com) 32

"Researchers have discovered nearly 1.5 million pictures from specialist dating apps — many of which are explicit — being stored online without password protection," reports the BBC, "leaving them vulnerable to hackers and extortionists."

And the images weren't limited to those from profiles, the BBC learned from the ethical hacker who discovered the issue. "They included pictures which had been sent privately in messages, and even some which had been removed by moderators..." Anyone with the link was able to view the private photos from five platforms developed by M.A.D Mobile [including two kink/BDSM sites and two LGBT apps]... These services are used by an estimated 800,000 to 900,000 people.

M.A.D Mobile was first warned about the security flaw on 20th January but didn't take action until the BBC emailed on Friday. They have since fixed it but not said how it happened or why they failed to protect the sensitive images. Ethical hacker Aras Nazarovas from Cybernews first alerted the firm about the security hole after finding the location of the online storage used by the apps by analysing the code that powers the services...

None of the text content of private messages was found to be stored in this way and the images are not labelled with user names or real names, which would make crafting targeted attacks at users more complex.

In an email M.A.D Mobile said it was grateful to the researcher for uncovering the vulnerability in the apps to prevent a data breach from occurring. But there's no guarantee that Mr Nazarovas was the only hacker to have found the image stash.

"Mr Nazarovas and his team decided to raise the alarm on Thursday while the issue was still live as they were concerned the company was not doing anything to fix it..."
Crime

Thousands of Freed Scam Center Workers Now Trapped in Overcrowded Detention Centers (apnews.com) 85

August, 2023: Thousands of Crypto Scammers are Enslaved by Human-Trafficking Gangsters, Says Bloomberg Reporter. ("They'd lure young people from across Southeast Asia...with the promise of well-paying jobs in customer service or online gambling.")

February, 2025: A coordinated response begins by Thai, Chinese and Myanmar authorities, which includes cutting power, internet, and fuel supplies to the scam centers.

Today: The Associated Press reports that thousands of the people liberated from locked compounds in Myanmar now "have found themselves trapped once again, this time in overcrowded facilities with no medical care, limited food and no idea when they'll be sent home." Thousands of sick, exhausted and terrified young men and women, from countries all over the world squat in rows, packed shoulder to shoulder, surgical masks covering their mouths and eyes. Their nightmare was supposed to be over... The armed groups who are holding the survivors, as well as Thai officials across the border, say they are awaiting action from the detainees' home governments. It's one of the largest potential rescues of forced laborers in modern history, but advocates say the first major effort to crack down on the cyber scam industry has turned into a growing humanitarian crisis...

An unconfirmed list provided by authorities in Myanmar says they're holding citizens from 29 countries including Philippines, Kenya and the Czech Republic. Authorities in Thailand say they cannot allow foreigners to cross the border from Myanmar unless they can be sent home immediately, leaving many to wait for help from embassies that has been long in coming. China sent a chartered flight Thursday to the tiny Mae Sot airport to pick up a group of its citizens, but few other governments have matched that. There are roughly 130 Ethiopians waiting in a Thai military base, stuck for want of a $600 plane ticket. Dozens of Indonesians were bused out one morning last week, pushing suitcases and carrying plastic bags with their meager possessions as they headed to Bangkok for a flight home... The recent abrupt halt to U.S. foreign aid funding has made it even harder to get help to released scam center workers...

It's not clear how much of an effect these releases will have on the criminal groups that run the scam centers. February marked the third time the Thais have cut internet or electricity to towns across the river. Each time, the compounds have managed to work around the cuts. Large compounds have access to diesel-powered generators, as well as access to internet provider Starlink, experts working with law enforcement say.

The article also points out that "The people released are just a small fraction of what could be 300,000 people working in similar scam operations across the region, according to an estimate from the United States Institute of Peace. Human rights groups and analysts add that the networks that run these illegal scams will continue to operate unless much broader action is taken against them..."

"The United Nations Office on Drugs and Crimes estimates that between $18 billion and $37 billion was lost in Asia alone in 2023, with minimal government action against the criminal industry's spread."
AI

OpenAI Partners with Anduril, Leaving Some Employees Concerned Over Militarization of AI (msn.com) 46

"OpenAI is partnering with defense tech company Anduril," wrote the Verge this week, noting that OpenAI "used to describe its mission as saving the world." It was Anduril founder Palmer Luckey who advocated for a "warrior class" and autonomous weapons during a talk at Pepperdine University, saying society's need people "excited about enacting violence on others in pursuit of good aims." The Verge notes it's OpenAI's first partnership with a defense contractor "and a significant reversal of its earlier stance towards the military." OpenAI's terms of service once banned "military and warfare" use of its technology, but it softened its position on military use earlier this year, changing its terms of service in January to remove the proscription.
Hours after the announcement, some OpenAI employees "raised ethical concerns about the prospect of AI technology they helped develop being put to military use," reports the Washington Post. "On an internal company discussion forum, employees pushed back on the deal and asked for more transparency from leaders, messages viewed by The Washington Post show." OpenAI has said its work with Anduril will be limited to using AI to enhance systems the defense company sells the Pentagon to defend U.S. soldiers from drone attacks. Employees at the AI developer asked in internal messages how OpenAI could ensure Anduril systems aided by its technology wouldn't also be directed against human-piloted aircraft, or stop the U.S. military from deploying them in other ways. One OpenAI worker said the company appeared to be trying to downplay the clear implications of doing business with a weapons manufacturer, the messages showed. Another said that they were concerned the deal would hurt OpenAI's reputation, according to the messages...

OpenAI executives quickly acknowledged the concerns, messages seen by The Post show, while also writing that the company's work with Anduril is limited to defensive systems intended to save American lives. Other OpenAI employees in the forum said that they supported the deal and were thankful the company supported internal discussion on the topic. "We are proud to help keep safe the people who risk their lives to keep our families and our country safe," OpenAI CEO Sam Altman said in a statement...

[OpenAI] has invested heavily in safety testing, and said that the Anduril project was vetted by its policy team. OpenAI has held feedback sessions with employees on its national security work in the past few months, and plans to hold more, Liz Bourgeois, an OpenAI spokesperson said. In the internal discussions seen by The Post, the executives stated that it was important for OpenAI to provide the best technology available to militaries run by democratically-elected governments, and that authoritarian governments would not hold back from using AI for military uses. Some workers countered that the United States has sold weapons to authoritarian allies. By taking on military projects, OpenAI could help the U.S. government understand AI technology better and prepare to defend against its use by potential adversaries, executives also said.

"The debate inside OpenAI comes after the ChatGPT maker and other leading AI developers including Anthropic and Meta changed their policies to allow military use of their technology," the article points out. And it also notes another concern raised in OpenAI's internal discussion forum.

The comment said "that defensive use cases still represented militarization of AI, and noted that the fictional AI system Skynet, which turns on humanity in the Terminator movies, was also originally designed to defend against aerial attacks on North America.
Supercomputing

IBM Boosts the Amount of Computation You Can Get Done On Quantum Hardware (arstechnica.com) 30

An anonymous reader quotes a report from Ars Technica: There's a general consensus that we won't be able to consistently perform sophisticated quantum calculations without the development of error-corrected quantum computing, which is unlikely to arrive until the end of the decade. It's still an open question, however, whether we could perform limited but useful calculations at an earlier point. IBM is one of the companies that's betting the answer is yes, and on Wednesday, it announced a series of developments aimed at making that possible. On their own, none of the changes being announced are revolutionary. But collectively, changes across the hardware and software stacks have produced much more efficient and less error-prone operations. The net result is a system that supports the most complicated calculations yet on IBM's hardware, leaving the company optimistic that its users will find some calculations where quantum hardware provides an advantage. [...]

Wednesday's announcement was based on the introduction of the second version of its Heron processor, which has 133 qubits. That's still beyond the capability of simulations on classical computers, should it be able to operate with sufficiently low errors. IBM VP Jay Gambetta told Ars that Revision 2 of Heron focused on getting rid of what are called TLS (two-level system) errors. "If you see this sort of defect, which can be a dipole or just some electronic structure that is caught on the surface, that is what we believe is limiting the coherence of our devices," Gambetta said. This happens because the defects can resonate at a frequency that interacts with a nearby qubit, causing the qubit to drop out of the quantum state needed to participate in calculations (called a loss of coherence). By making small adjustments to the frequency that the qubits are operating at, it's possible to avoid these problems. This can be done when the Heron chip is being calibrated before it's opened for general use.

Separately, the company has done a rewrite of the software that controls the system during operations. "After learning from the community, seeing how to run larger circuits, [we were able to] almost better define what it should be and rewrite the whole stack towards that," Gambetta said. The result is a dramatic speed-up. "Something that took 122 hours now is down to a couple of hours," he told Ars. Since people are paying for time on this hardware, that's good for customers now. However, it could also pay off in the longer run, as some errors can occur randomly, so less time spent on a calculation can mean fewer errors. Despite all those improvements, errors are still likely during any significant calculations. While it continues to work toward developing error-corrected qubits, IBM is focusing on what it calls error mitigation, which it first detailed last year. [...] The problem here is that using the function is computationally difficult, and the difficulty increases with the qubit count. So, while it's still easier to do error mitigation calculations than simulate the quantum computer's behavior on the same hardware, there's still the risk of it becoming computationally intractable. But IBM has also taken the time to optimize that, too. "They've got algorithmic improvements, and the method that uses tensor methods [now] uses the GPU," Gambetta told Ars. "So I think it's a combination of both."

Operating Systems

Sysadmin Shock As Windows Server 2025 Installs Itself After Update Labeling Error (theregister.com) 86

A security update mislabeling by Microsoft led to Windows Server 2022 systems unexpectedly upgrading to Windows Server 2025, impacting 7 percent of Heimdal customers and leaving administrators scrambling to manage unexpected licensing and configuration challenges. The Register reports: It took Heimdal a while to trace the problem. According to a post on Reddit: "Due to the limited initial footprint, identifying the root cause took some time. By 18:05 UTC, we traced the issue to the Windows Update API, where Microsoft had mistakenly labeled the Windows Server 2025 upgrade as KB5044284." It added: "Our team discovered this discrepancy in our patching repository, as the GUID for the Windows Server 2025 upgrade does not match the usual entries for KB5044284 associated with Windows 11. This appears to be an error on Microsoft's side, affecting both the speed of release and the classification of the update. After cross-checking with Microsoft's KB repository, we confirmed that the KB number indeed references Windows 11, not Windows Server 2025."

As of last night, Heimdal estimated that the unexpected upgrade had affected 7 percent of customers -- it said it had blocked KB5044284 across all server group policies. However, this is of little comfort to administrators finding themselves receiving an unexpected upgrade. Since rolling back to the previous configuration will present a challenge, affected users will be faced with finding out just how effective their backup strategy is or paying for the required license and dealing with all the changes that come with Windows Server 2025.

Slashdot Top Deals