Programming

What Makes Some Programming Languages the 'Most Dreaded'? (oreilly.com) 137

O'Reilly media's Vice President of Content Strategy (also the coauthor of Unix Power Tools) recently explored why several popular programming languages wound up on the "most dreaded" list in StackOverflow's annual developer survey: There's no surprise that VBA is #1 disliked language. I'll admit to complete ignorance on Objective C (#2), which I've never had any reason to play with. Although I'm a Perl-hater from way back, I'm surprised that Perl is so widely disliked (#3), but some wounds never heal. It will be interesting to see what happens after Perl 7 has been out for a few years. Assembly (#4) is an acquired taste (and isn't a single language)...
But he eventually suggests that both C and Java might be on the list simply because they have millions of users, citing a quote from C++ creator Bjarne Stroustrup: "there are only two kinds of languages: the ones people complain about and the ones nobody uses." Dislike of a language may be "guilt by association": dislike of a large, antiquated codebase with minimal documentation, and an architectural style in which every bug fixed breaks something else. Therefore, it's not surprising to see languages that used to be widely used but have fallen from popularity on the list... Java has been the language people love to hate since its birth. I was at the USENIX session in which James Gosling first spoke about Java (way before 1.0), and people left the room talking about how horrible Java was — none of whom had actually used the language because it hadn't been released yet...

If there's one language on this list that's associated with gigantic projects, it's Java. And there are a lot of things to dislike about it — though a lot of them have to do with bad habits that grew up around Java, rather than the language itself. If you find yourself abusing design patterns, step back and look at what you're doing; making everything into a design pattern is a sign that you didn't understand what patterns are really for... If you start writing a FactoryFactoryFactory, stop and take a nice long walk. If you're writing a ClassWithAReallyLongNameBecauseThatsHowWeDoIt, you don't need to. Java doesn't make you do that... I've found Java easier to read and understand than most other languages, in part because it's so explicit — and most good programmers realize that they spend more time reading others' code than writing their own.

He also notes that Python only rose to #23 on the "most dreaded" languages list, speculating developers may appreciation its lack of curly braces, good libraries, and Jupyter notebooks. "Python wins the award for the most popular language to inspire minimal dislike. It's got a balanced set of features that make it ideal for small projects, and good for large ones."

"And what shall we say about JavaScript, sixteenth on the list? I've got nothing. It's a language that grew in a random and disordered way, and that programmers eventually learned could be powerful and productive... A language that's as widely used as JavaScript, and that's only 16th on the list of most dreaded languages, is certainly doing something right. But I don't have to like it."
Medicine

New Zealand Reinstates Coronavirus Restrictions After First Locally-Transmitted Case in 102 Days (cnn.com) 229

schwit1 shares a report: New Zealand has reintroduced coronavirus restrictions in parts of the country after new locally transmitted cases broke the 102-day streak the country had gone without recording a local infection. New Zealand's Prime Minister Jacinda Ardern confirmed four new locally transmitted coronavirus cases on Tuesday night, and announced that New Zealand's most populous city, Auckland, will temporarily see level three restrictions introduced for three days starting from midday on Wednesday. All four of the cases were found within one household in South Auckland according to New Zealand's Director-General of Health Dr Ashley Bloomfield. He added that none of the new cases had recently traveled outside of New Zealand. "We have been preparing for that time, and that time is now," said Dr Bloomfield adding that the "health system is well prepared." "In line with our precautionary approach we will be asking Aucklanders to take swift actions with us, as of 12 noon tomorrow, Wednesday August 12, we will be moving Auckland to level 3 restrictions," said Ardern.
United Kingdom

Should the U.K. Government Form a Coalition to Buy ARM? (theguardian.com) 124

With SoftBank's Masayoshi Son trying to sell ARM, a columnist for the Observer newspaper has a suggestion for the U.K. government (and specifically Brexit Tories), calling the Cambridge-based company "a kind of public-interest commercial company: licensing state-of-the art instruction sets that can be implemented in silicon architecture by everyone. It was in nobody's pocket." Its business, as its chief founder, Tudor Brown, acknowledges, relied on it never betraying its neutrality... A future owner could almost trash Arm in the pursuit of its own commercial ends. Nvidia, reported to be in advanced talks with Son, is just such a possible owner. Rooted in the games industry, it has found to its surprise that its processing units are much in demand as artificial intelligence applications mushroom. Son wanted to sell Arm to an industry coalition that might protect the company's independence and business model. None could be found, so, desperate for cash, given a string of failed and written-down investments (WeWork, Uber etc), he is now having to sup with a buyer that can only destroy Arm.

Nvidia's ambitions are scarcely hidden. Once it owns Arm it will withdraw its licensing agreements from its competitors, notably Intel and Huawei, and after July next year take the rump of Arm to Silicon Valley, just as Google has done with the British AI company DeepMind. Arm, and Britain's hopes to be a player in hi-tech, will be dead.

Ownership is fundamental and the lesson of the story is that unless Britain creates the legal, cultural and institutional framework allowing companies such as Arm (or DeepMind) to have anchor shareholders — or simply allowing founder shareholders to have powerful differential voting rights as in the U.S. and Canada — we are condemned to inferiority. But even now Britain could act. The government could offer a foundational investment of, say, £3bn-£5bn and invite other investors — some industrial, some sovereign wealth funds, some commercial asset managers — to join it in a coalition to buy Arm and run it as an independent quoted company, serving the worldwide tech industry... if Britain is to develop an industrial strategy, this is how it must act...

A successful capitalism is always about framing innovative private dynamism within a fit-for-purpose regulatory and ownership architecture designed by the state, a reality that neither major party has ever understood. The open question is whether Brexit Tories, forced by reality, might change. This kind of audacious deal could appeal to Johnson and Cummings, a statement of intent to match China in our commitment to a decisive presence in 21st-century hi-tech.

Brexit was meant to give Britain the freedom to make this kind of move.

Desktops (Apple)

How an Automated Mistake by Apple Killed All of a Mac Developer's Apps (9to5mac.com) 41

Long-time Slashdot reader philml writes: Popular Mac developer Charlie Monroe woke up to find that none of his users could run his software. Instead, Mac OS was giving a message saying that it "will damage your computer".
Monroe described the ensuing hassle in a blog post titled "A day without business." In a later update he added that Apple "has called and apologized for the complications. The issue was caused by my account being erroneously flagged by automated processes."

But 9 to 5 Mac describes how Apple's mistake affected Monroe's apps: Users were unable to open them, and a message flagged them as malware, advising users to delete the apps to avoid damaging their Macs.

Developer Charlie Monroe, creator of the Downie video downloader, among other apps, said that Apple didn't even send him a message saying it had happened, and for several hours he didn't know whether he still had a business or not⦠He said that it took Apple 24 hours to partly fix the problem, removing the flags, though that still left him having to recompile, re-sign, and redistribute everything... Most app users will never know the story behind this, only that they bought an app, Apple told them it was malware, and they deleted it as instructed.

It also seems unlikely to help Apple's antitrust battles, where many are arguing that the company holds too much power over users and developers alike.

Books

Stet!, the Hot New Language Game (newyorker.com) 24

The game Stet!, a spinoff of the book "Dreyer's English," is an excellent way to prepare for a copy-editing test and pairs well with a gin-and-tonic. Mary Norris, writing for The New Yorker: Nerdsday fell on a Tuesday this year, and I invited a friend over for a doubleheader: a round of Stet!, the new language game based on "Dreyer's English," followed by an episode of Mark Allen's "That Word Chat," a homespun Zoom talk show for editors, lexicographers, linguists, and others of the inky tribe. My friend was Merrill Perlman, who writes the column "Language Corner" for the Columbia Journalism Review, where her biographical note says that she has "managed copy desks across the newsroom at the New York Times." Although retired from full-time journalism, she continues to teach and serves on the board of ACES: The Society for Editing. Nitpickers by profession, we ran into a problem right away. The instructions for Stet! suggest that you "play with three or more players" (is that redundant?), and we had been unable, during the pandemic, to scare up a third nerd. The game of Stet! comprises two packs of cards with sentences on them, fifty of them Grammar cards with indisputable errors (dangling modifiers, stinking apostrophes, and homonyms, like horde/hoard and reign/rein) and fifty of them Style cards, on which the sentences are correct but pedestrian, and the object is to improve the sentence without rewriting it. There are trick cards with no mistakes on them. You might suspect that there is something wrong with (spoiler alert) "Jackson Pollock" or "asafetida" or "farmers market," but these are red herrings.

If you believe that the sentence is perfect just as it is, you shout "Stet!," the proofreading term for "leave it alone" (from the Latin for "let it stand"), which is used by copy editors to protect an author's prose and by authors to protect their prose from copy editors. The game involves some role playing. If you use only the Grammar cards, the dealer is called the Copy Chief, as in "The Copy Chief shuffles the fifty Grammar cards." If you mix in the Style cards, the dealer is the Author, the players are Copy Editors (you can almost hear an author muttering, "Everyone is a copy editor"), and the deck is huge. I got the impression from the size of the cards, which are bigger than those in a tarot pack, that authors and copy editors have large, masculine hands. I personally wear a small-to-medium-sized disposable nitrile glove and could not riffle the deck with any kind of flair (or is it "flare"?). The sporting element in Stet! is slapping your hand on the carefully sanitized table when you spot the mistake or mistakes. Points are awarded based on the number of errors planted in a sentence. Most have just one, some have two, and there are a few three-pointers. Penalties are assessed for missing mistakes, but none for introducing an error, a cardinal sin in copy editing. (Perhaps the instructions could be refined to add a slap on the hand for this.) It takes five points to win a game, and the game goes fast. I won the first round handily, mostly because my opponent, the Copy Chief, kept forgetting to slap.

Software

India Is Reportedly Looking To Ban 275 More Chinese Apps -- Including PUBG, Zili and AliExpress (indiatimes.com) 40

schwit1 writes: India has drawn up a list of 275 Chinese apps that it will examine for any violation of national security and user privacy, signaling heightened scrutiny and the possibility of more Chinese internet companies being banned in the country, according to people aware of the developments. This follows the high-profile ban of 59 Chinese apps last month, including short video app TikTok, amid simmering geopolitical tensions between the two Asian giants.

The list, reviewed by ET, includes gaming app PubG, Zili by phonemaker Xiaomi, AliExpress by ecommerce giant Alibaba as well as apps like Resso and ULike from TikTok-owner ByteDance. "The government may ban all, some or none from the list," said one person cited above. A spokesperson for the union home ministry did not respond to queries from ET on the developments. However, official sources said reviews aimed at identifying more Chinese apps and their funding is underway. "Some of these apps have been red-flagged due to security reasons while others have been listed for violation of data sharing and privacy concerns," an official explained. This is in addition to examining the alleged flow of data from these apps to China that poses a threat to sovereignty and integrity of India, according to officials who pointed to what they termed as China's data-sharing norm that requires companies of Chinese-origin to share data with the home country, irrespective of where they operate.

Mars

Giant Waves of Sand Are Moving On Mars (sciencemag.org) 21

"Researchers have spotted large waves of martian sand migrating for the first time," reports Science magazine.

"The discovery dispels the long-held belief that these 'megaripples' haven't moved since they formed hundreds of thousands of years ago. They're also evidence of stronger-than-expected winds on the Red Planet." It's pretty staggering that humans can detect these changes on Mars, says Ralph Lorenz, a planetary scientist at the Johns Hopkins University Applied Physics Laboratory who was not involved in the research. "We can now measure processes on the surface of another planet that are just a couple times faster than our hair grows...."

Since the early 2000s, Mars rovers and orbiters have repeatedly spotted megaripples on the Red Planet. But they didn't seem to change in any measurable way, which led some scientists to think they were relics from Mars's past, when its thicker atmosphere permitted stronger winds. Now, using images captured by NASA's Mars Reconnaissance Orbiter, Simone Silvestro, a planetary scientist at Italy's National Institute of Astrophysics in Naples, and his colleagues have shown that some megaripples do creep along — just very slowly. The researchers focused on two sites near the equator of Mars... Megaripples in both regions advanced by about 10 centimeters per year, the team reports in the Journal of Geophysical Research: Planets...

It's a surprise that megaripples move at all on Mars, says Jim Zimbelman, a planetary geologist at the Smithsonian Institution's Air and Space Museum. Just a few decades ago, there was no evidence that sands on Mars were mobile, he says. "None of us thought that the winds were strong enough...." Atmospheric models of Mars suggest winds capable of moving sand are rare. This discovery of migrating megaripples will force those models to be revised, the team suggests....

Megaripples on the move are beacons of windy conditions, which might in turn kick-start dust storms, the researchers suggest. Airborne dust can blanket solar panels, reducing their efficiency, and it can also gum up mechanical parts like gears. That's bad news for Mars rovers and human habitats alike.

Twitter

Many New Details Emerge About Twitter's Breach (nytimes.com) 32

The New York Times claims to have traced the origins of a Twitter security breach to "a teasing message between two hackers late Tuesday on the online messaging platform Discord." [The Times' article was also republished here by the Bangkok Post.] "yoo bro," wrote a user named "Kirk," according to a screenshot of the conversation shared with The New York Times. "i work at twitter / don't show this to anyone / seriously." He then demonstrated that he could take control of valuable Twitter accounts — the sort of thing that would require insider access to the company's computer network. The hacker who received the message, using the screen name "lol," decided over the next 24 hours that Kirk did not actually work for Twitter because he was too willing to damage the company. But Kirk did have access to Twitter's most sensitive tools, which allowed him to take control of almost any Twitter account...

[F]our people who participated in the scheme spoke with The Times and shared numerous logs and screen shots of the conversations they had on Tuesday and Wednesday, demonstrating their involvement both before and after the hack became public. The interviews indicate that the attack was not the work of a single country like Russia or a sophisticated group of hackers. Instead, it was done by a group of young people — one of whom says he lives at home with his mother — who got to know one another because of their obsession with owning early or unusual screen names, particularly one letter or number, like @y or @6... "lol" did not confirm his real-world identity, but said he lived on the West Coast and was in his 20s. "ever so anxious" said he was 19 and lived in the south of England...

The group began by selling access to highly-coveted Twitter handles for bitcoin, according to the Times, including the accounts @dark, @w, @l, @50 and @vague.

Brian Krebs had suggested tweets of Twitter's internal tools came from "notorious SIM swapper" PlugWalkJoe — but the Times spoke to the 21-year-old (real name: Joseph O'Connor) who says his only involvement was taking possession of the breached Twitter account @6. "I don't care. They can come arrest me. I would laugh at them. I haven't done anything." Mr. O'Connor said other hackers had informed him that Kirk got access to the Twitter credentials when he found a way into Twitter's internal Slack messaging channel and saw them posted there, along with a service that gave him access to the company's servers. People investigating the case said that was consistent with what they had learned so far.
Meanwhile, Twitter has said, "The attackers successfully manipulated a small number of employees and used their credentials to access Twitter's internal systems, including getting through our two-factor protections. As of now, we know that they accessed tools only available to our internal support teams."

But Mashable brings more bad news: In an update posted on Friday night, Twitter ran down what its internal investigation has discovered so far. One piece of previously unknown information: the hacker(s) downloaded the personal account data for up to eight of the accounts which they had access to.

I should make this clear up front: that data includes direct messages...

As rumors spread around the platform as to which eight accounts could have been targeted, Twitter released an additional clarification... "[T]o address some of the speculation: none of the eight were Verified accounts..." Twitter also says 130 Twitter accounts were targeted... The company said that hackers gained access to 45 of them via a password reset and, for a second time, reiterated that the passwords used on the accounts were not accessed.

An article shared by Slashdot reader kimmmos notes that one account that went untouched was that of U.S. president Donald Trump. The Verge reports "it could be because Twitter has implemented extra protections for his account." But responding to the other account breaches, "A Twitter spokesperson confirmed the company has been in touch with the FBI," reports CNN. "We're acutely aware of our responsibilities to the people who use our service and to society more generally," Twitter added in a blog post.

"We're embarrassed, we're disappointed, and more than anything, we're sorry."
Chrome

Chrome 84 Arrives With SameSite Cookie Changes, Web OTP API and Web Animations API (venturebeat.com) 14

An anonymous reader quotes a report from VentureBeat: Google today launched Chrome 84 for Windows, Mac, Linux, Android, and iOS. Chrome 84 resumes SameSite cookie changes, includes the Web OTP API and Web Animations API, and removes older Transport Layer Security (TLS) versions. First deprecated with Chrome 81 in April, TLS 1.0 and TLS 1.1 have now been completely removed with Chrome 84. This is notable for anyone who manages a website, even if they don't use Chrome at home or at work. TLS is a cryptographic protocol designed to provide communications security over a computer network -- websites use it to secure all communications between their servers and browsers. TLS also succeeds Secure Sockets Layer (SSL) and thus handles the encryption of every HTTPS connection.

In May 2016, Chrome 51 introduced the SameSite attribute to allow sites to declare whether cookies should be restricted to a same-site (first-party) context. The hope was this would mitigate cross-site request forgeries (CSRF). Chrome 80 began enforcing a new secure-by-default cookie classification system, treating cookies that have no declared SameSite value as SameSite=Lax cookies. Only cookies set as SameSite=None; Secure are available in third-party contexts, provided they are being accessed from secure connections. Due to the coronavirus crisis, however, Google paused the SameSite cookie changes, with plans to resume enforcement sometime over the summer. SameSite cookie enforcement has now resumed with a gradual rollout ramping up over the next several weeks for Chrome 80 and newer.

Chrome 84 introduces the Web OTP API (formerly called the SMS Receiver API). This API helps users enter a one-time password (OTP) on a webpage when a specially crafted SMS message is delivered to their Android phone. When verifying the ownership of a phone number, developers typically send an OTP over SMS that must be manually entered by the user (or copied and pasted). The user has to switch to their native SMS app and back to their web app to input the code. The Web OTP API lets developers help users enter the code with one tap. Chrome 84 also adopts the Web Animations API, which gives developers more control over web animations. These can be used to help users navigate a digital space, remember your app or site, and provide implicit hints around how to use your product. Parts of the API have been around for some time, but this implementation brings greater spec compliance and supports compositing operations, which control how effects are combined and offer many new hooks that enable replaceable events. The API also supports Promises, which allow for animation sequencing and provide greater control over how animations interact with other app features.

Desktops (Apple)

Apple's ARM-Based Macs To Support Thunderbolt (theverge.com) 137

tlhIngan writes: For those worried that the transition Apple is doing to ARM-based Macs will drop Thunderbolt, Apple has stated that they will continue to support Thunderbolt. This was a worry since Thunderbolt is primarily an Intel design (formerly known as Light Peak) with Apple collaboration, and that none of Apple's ARM based devices support it (not even the ARM Developer Transition Kit).
Open Source

Linus Torvalds Likes His New AMD Threadripper System (zdnet.com) 44

This week Linus Torvalds and Dirk Hohndel re-created their keynote conversation for a special all-virtual edition of the Open Source Summit and Embedded Linux Conference North America. ZDNet reports: While COVID-19 has slowed down many technologies, while speeding up other tech developments, it hasn't affected Linux development much at all. "None of my co-developers have been hugely impacted either. I was worried for a while because one of our developers was offline for a month or two.... [But,] it turned out that it was just RSI [repetitive strain injury], and RSI is kind of an occupational hazard to deal with." He added. "One of the things that is so interesting about the Linux community is how much it has always been email-based and remote, how rarely we get together in person...."

Torvalds trusts this new build. Indeed, he ran his end of the videoconference from his new developer machine running the first release candidate of 5.8.

Thinking of his new AMD Threadripper 3970x-based processor-powered developer desktop, Torvalds later added that, although he had been concerned about its fan noise it actually works well for him. Torvalds moved to this new homebrew computer because he needed the speed. "My 'allmodconfig' test builds are now three times faster than they used to be." That's important because Torvalds "strives to do about 20 to 30 [pull requests] a day, which is above my limit, ... [but] in order to do that, [he needs] a lot of computing power.

Medicine

Moderate Drinking May Improve Cognitive Health for Older Adults, Study Says (cnn.com) 129

"A new study found low to moderate drinking may improve cognitive function for White middle-aged or older adults," reports CNN: The findings support prior research which found that, generally, one standard drink a day for women and two a day for men -- which is the US guidance -- appears to offer some cognitive benefits... "There is now a lot of observational evidence showing that light to moderate alcohol drinking is associated with better cognitive function and a lower risk of dementia compared with alcohol abstaining," said senior principal research scientist Kaarin Anstey, a director of the NHMRC Dementia Centre for Research Collaboration in Australia, who was not involved in the study...

The new study, published Monday in JAMA Network Open, analyzed data on nearly 20,000 participants from the University of Michigan's Health and Retirement Study, a longitudinal panel study that surveys a representative sample of Americans on a variety of health issues. Study participants, who were predominately white, female and a mean age of 62, were given cognitive tests starting in 1996 through 2008, and were surveyed every other year for approximately nine years. When compared with those who said they never drank, low to moderate drinking was associated with significantly higher cognition scores for mental status, word recall and vocabulary over time, as well as with lower rates of decline in each of those areas.

But before you get too excited, CNN has a "However..." paragraph: However, a major global study released last year found that no amount of liquor, wine or beer is safe for your overall health. It found that alcohol was the leading risk factor for disease and premature death in men and women between the ages of 15 and 49 worldwide in 2016, accounting for nearly one in 10 deaths... "What we know for sure is that drinking too much alcohol definitely harms the brain in a major way. What is less clear is whether or not low to moderate intake may be protective in certain people, or if total abstinence is the most sound advice," said neurologist Dr. Richard Isaacson, founder of the Alzheimer's Prevention Clinic at NewYork-Presbyterian and Weill Cornell Medical Center. "Based on conflicting studies, I don't think at this time we can know for sure whether none versus low to moderate consumption is best in each individual person..."
Businesses

WeWork Founder Warned Staff in 2016: 'You Do Not Get a Chance Like This Again' (bloomberg.com) 51

To many of its employees, WeWork was much more than a job. Adam Neumann, the co-founder and former chief executive officer, kept workers motivated by invoking a higher calling to community-building and promising a once-in-a-lifetime opportunity. From a report: "None of us want to look back and say, 'I could have done more,'" Neumann said in a 2016 staff meeting, captured in hours of tape obtained by Bloomberg. "That's not acceptable. You do not get a chance like this again." In this episode of Foundering, a former WeWork executive assistant, Cody Quinn, describes the tumultuous experience working inside WeWork's New York headquarters. According to Quinn, most employees worked until near-burnout, then were rewarded with trips to Summer Camp and Summit, WeWork's famously raucous companywide parties. And she details the strange things she saw at the office: an executive smashing a printer on the floor, 2 a.m. meetings with Neumann and an elaborate technique designed to lure investors called "activating the space."
United States

New York Times Investigates How in America 'the Virus Won' (nytimes.com) 388

"Invisible outbreaks sprang up everywhere. The United States ignored the warning signs," writes the New York Times, in a detailed interactive data visualization.

"We analyzed travel patterns, hidden infections and genetic data to show how the epidemic spun out of control." By mid-February, there were only 15 known coronavirus cases in the United States, all with direct links to China... The patients were isolated. Their contacts were monitored. Travel from China was restricted.

None of that worked. Only a small part of the picture was visible. Some 2,000 hidden infections were already spreading through major cities...

Genetic samples linked to the Seattle outbreak appeared in at least 14 states, said Trevor Bedford, a professor at Fred Hutchinson Cancer Research Center... In New York City, where officials had found only a single case by March 1, roughly 10,000 infections had spread undetected... More than 5,000 contagious travelers left New York City in the first two weeks of March, estimates suggest... People [from New York City] also made more than 25,000 trips to New Orleans, where genetic data suggests that a large early outbreak stemmed from infections from New York...

Travel from the city helped to spread that variant across the country. "New York has acted as a Grand Central Station for this virus," said David Engelthaler of the Translational Genomics Research Institute. By the time President Trump blocked travel from Europe on March 13, the restrictions were essentially pointless. The outbreak had already been spreading widely in most states for weeks... The New Orleans outbreak helped seed infection across Louisiana and the South...

Even now, America remains in the dark. Most infected people are never tested. There is little capacity to trace and isolate the contacts to those who do test positive.

After the lockdowns expired, new cases spiked once again.

Privacy

Journalist's Phone Hacked: All He Had To Do Was Visit a Website. Any Website. (thestar.com) 123

The iPhone that Moroccan journalist Omar Radi used to contact his sources also allowed his government to spy on him (and at least two other journalists), reports the Toronto Star, citing new research from Amnesty International.

A Slashdot reader shares their report: Their government could read every email, text and website visited; listen to every phone call and watch every video conference; download calendar entries, monitor GPS coordinates, and even turn on the camera and microphone to see and hear where the phone was at any moment.

Yet Radi was trained in encryption and cyber security. He hadn't clicked on any suspicious links and didn't have any missed calls on WhatsApp — both well-documented ways a cell phone can be hacked. Instead, a report published Monday by Amnesty International shows Radi was targeted by a new and frighteningly stealthy technique. All he had to do was visit one website. Any website.

Forensic evidence gathered by Amnesty International on Radi's phone shows that it was infected by "network injection," a fully automated method where an attacker intercepts a cellular signal when it makes a request to visit a website. In milliseconds, the web browser is diverted to a malicious site and spyware code is downloaded that allows remote access to everything on the phone. The browser then redirects to the intended website and the user is none the wiser.

Two more human rights advocates in Morocco have been targeted by the same malware, the article reports.
United States

America Is Reopening. Coronavirus Tracing Apps Aren't Ready. (wsj.com) 124

Smartphone apps meant to track where people have traveled or whom they have been near are mostly buggy, little-used or not ready for major rollouts, raising concerns as restrictions lift and infections rise. From a report: Local officials in Teton County, Wyo., home to Yellowstone National Park and resort town Jackson Hole, want to prevent a new wave of coronavirus cases as the area reopens. They decided to lean on technology. The county signed up for a location-tracking app developed at the Massachusetts Institute of Technology to help accelerate contact tracing, the process of notifying and isolating people who might have been exposed to the virus. But as tourists stream into Yellowstone -- rangers spotted license plates from 41 states the day it reopened in mid-May -- the app isn't ready. It can't accurately track location, it's missing key features and its developers have struggled to protect sensitive user data. U.S. states and counties are placing great faith in contact tracing, in tandem with aggressive testing, as they reopen their economies. Pressure has increased as coronavirus infections rise in many states, including Arizona, Texas and Florida.

The quick spread of the coronavirus makes it hard for human contact tracers to keep up, so authorities are turning to smartphone technologies to help track where people have traveled or whom they have been near. What is emerging across the country so far, however, is a patchwork of buggy or little-used apps, made by partners ranging from startups on shoestring budgets to academics to consulting firms. Some are working with location-tracking firms that have been under fire from privacy advocates. None appears ready for a major rollout, even as more local governments ease restrictions. Utah signed a deal worth more than $6 million with a firm backed by the family of billionaire Nelson Peltz and other investors. Rhode Island hired Indian software company Infosys to build its app free. North Dakota's governor turned to an old friend who had built an app for a college football team in 2013. Apple and Alphabet's Google deployed technology that at least five U.S. states agreed to adopt, but integrating it into smartphone apps takes time and comes with significant trade-offs. Some local health departments aren't keen on privacy restrictions in the Apple-Google protocol that limit information they can collect. Others had already sunk money into Covid apps before the tech giants arrived on the scene.

Databases

Appeals Court Says California's IMDb-Targeting 'Ageism' Law Is Unconstitutional (techdirt.com) 140

The state of California has lost again in its attempt to punish IMDb for ageism perpetrated by movie studios who seem to refuse to cast actresses above a certain age in choice roles. Techdirt reports: The law passed by the California legislature does one thing: prevents IMDb (and other sites, theoretically) from publishing facts about actors: namely, their ages. This stupid law was ushered into existence by none other than the Screen Actors Guild, capitalizing on a (failed) lawsuit brought against the website by an actress who claimed the publication of her real age cost her millions in Hollywood paychecks. These beneficiaries of the First Amendment decided there was just too much First Amendment in California. To protect actors from studio execs, SAG decided to go after a third-party site respected for its collection of factual information about movies, actors, and everything else film-related.

The federal court handling IMDb's lawsuit against the state made quick work of the state's arguments in favor of very selective censorship. In only six pages, the court destroyed the rationale offered by the government's finest legal minds. [...] Even if the law had somehow survived a First Amendment challenge, it still wouldn't have prevented studios from engaging in discriminatory hiring practices. If this was really the state's concerns, it would have stepped up its regulation of the entertainment industry, rather than a single site that was unsuccessfully sued by an actress, who speculated IMDb's publication of her age was the reason she wasn't landing the roles she wanted.

Portables

Reporter Tests Walmart's $140 Laptop 'So You Wouldn't Have To' (arstechnica.com) 200

Ars Technica's technology reporter Jim Salter tested Walmart's 11.6-inch EVOO laptop, which sells for $139 and ships with just 2GiB of RAM and a 32GB SSD, which he worries "simply is not enough room for Windows itself, let alone any applications." The first thing I noticed while looking through the Windows install is that our "internal" Wi-Fi is actually a cheap USB 2.0 Realtek adapter — and it's 2.4GHz-only 802.11n, at that. The second thing I noticed was the fact that I couldn't install even simple applications, because the laptop was in S mode. For those unfamiliar, S mode locks a system into using only the Edge browser and only apps from the Microsoft Store. Many users end up badly confused by S mode, and some unnecessarily buy a new copy of Windows trying to get out of it. Fortunately, if you click the "learn more" link in the S mode warning that pops up when you attempt to load a non-Store app, you are eventually led to a free Microsoft Store app which turns S mode off. On my first try, this app crashed. But on the second, it successfully disabled S mode, leaving me with a normal Windows install....

I verified that I was on an older version of Windows 10 — build 1903, from March 2019 — and initiated an upgrade to build 2004, from April 2020. Windows 10 was having none of it. It wanted at least 8GiB of free space on C:, and I couldn't even get to 6GiB free, after only a day of using the system.... Meaningful benchmark results were impossible to attain on this laptop, since it was too slow and quirky to even run the benchmarks reliably. But I didn't let a silly thing like "being obviously inappropriate" stop me from slogging painfully through the benchmarks and getting what numbers I could. The first suite up, PCMark 10, eventually produced a score of zero. I didn't know that a zero score was even possible. Apparently, it is... Cinebench R20 also took several tries to complete successfully, and eventually the test produced a jaw-droppingly bad score of 118...

Under Fedora 32 — selected due to its ultra-modern kernel, and lightweight Wayland display manager — the EVOO was incredibly balky and sluggish. To be fair, Fedora felt significantly snappier than Windows 10 had on this laptop, but that was a very, very low bar to hurdle. The laptop frequently took as long as 12 seconds just to launch Firefox. Actually navigating webpages wasn't much better, with very long pauses for no apparent reason. The launcher was also balky to render — and this time, with significantly lower memory usage than Windows, I couldn't just blame it on swap thrashing... [W]ith the laptop completely open, several questions are answered — the reason I hadn't heard any fan noise up until this point is because there is no fan, and the horrible CPU performance is because the CPU can't perform any better than it does without cooking itself in its own juices....

At first, I mistakenly assumed that the A4-9120 was just thermally throttling itself 24/7. After re-assembling it and booting back into Fedora, I found the real answer — the normally 2.5GHz chip is underclocked to an anemic 1.5GHz. The system BIOS confirms this clockrate but offers no room to adjust it — which is a shame, since the system never hit temperatures higher than about 62C in my testing.

His verdict? Walmart's EVOO laptop "doesn't have either the RAM or the storage to do an even vaguely reasonable job for normal people doing normal things under Windows, even when limited to S mode...

"There may be a purpose this laptop is well-suited to — but for the life of me, I cannot think what it might be."
Google

In America, Only Three States Use Google-Apple Contact Tracing App (nbcnews.com) 42

NBC News reports that in various parts of America, "States that had committed to using contact tracing apps or expressed interest are now backing away from those claims." The few states that have rolled them out have seen only tepid responses. And there are no indications of any momentum for the apps at a national level... A survey of state health officials from Business Insider this week showed that only three states — Alabama, North Dakota and South Carolina — said they were going to use the software provided by Apple and Google. The number hasn't grown since the same three states reported interest last month, and none has launched an app with the Google-Apple software...

Even the World Health Organization has piled on. "Digital tools do not replace the human capacity needed to do contact tracing," WHO Director-General Tedros Adhanom Ghebreyesus said at a briefing this week, adding that more evidence was needed and that the WHO would convene experts to share information...

A handful of states — North Dakota, South Dakota and Utah — launched apps without the support of Apple and Google, but none saw widespread adoption. More states, including Washington, have considered doing so or have launched test versions, and it's possible that apps will gain momentum closer to the fall, when they might be taken up by more employers, schools and universities and at related football games.

Two months ago Google and Apple announced a joint project to build a contact-tracing app -- which was supported by the governor of America's most populous state, California. But now a spokesperson for California's public health department tells NBC News that the state isn't currently using any apps or cellphone tracking technology.

"Most of the contact tracing work (notifying people who have been in close contact with an infected person to prevent the disease from spreading to others) can be done by phone, text, email and chat."
United States

Trump Hasn't Followed Through On Plan To Withdraw US From WHO (arstechnica.com) 197

An anonymous reader quotes a report from Ars Technica: On May 29, President Trump said his administration would take immediate action to withdraw the U.S. from the World Health Organization. "Because they have failed to make the requested and greatly needed reforms, we will be today terminating our relationship with the World Health Organization, and redirecting those funds to other worldwide and deserving, urgent global public health needs," Trump said at the time, while criticizing the WHO's response to the coronavirus pandemic and claiming that "China has total control" over the United Nations agency.

But now, two weeks later, there's nothing to indicate that Trump has followed through on his plan. In an article yesterday titled "U.S. hasn't taken action to withdraw from WHO despite Trump pledge," The Hill wrote that "no steps toward a formal withdrawal have been taken," and that "a WHO spokesman told The Hill that the agency had received no formal notification that the United States would withdraw." Another article yesterday in Stat, a health news website, said that "none of the levers that would need to be pulled to follow through on [Trump's WHO] decision has been pulled." For example, the Trump administration has "not paid outstanding financial obligations to the WHO, a step that would be required before the United States could pull out under a joint resolution signed by Congress," the article said.
These reports follow a Vanity Fair article published Monday that describes "the secret plan to unwithdraw from the WHO after Trump's 'bizarre,' 'ruinous' exit." The article continued:

"Now, Vanity Fair has learned, secret negotiations aimed at reversing Trump's decision have begun between [U.S.] Ambassador [Andrew] Bremberg and the WHO's director general, Dr. Tedros Adhanom Ghebreyesus. A phone call Saturday between the two men resulted in a possible framework agreement to restore the relationship, which the U.S. diplomatic corps views as essential to the global fight against coronavirus and myriad other public health issues.

"The framework would allow for both increased scrutiny of China's conduct and an independent review of the WHO's performance in the first six months of the outbreak. And discussions continue over whether the WHO would exert pressure on China to turn over original samples of the live virus and allow its scientists to be interviewed regarding the virus's origins. 'It's fair to say the US is not out of WHO, and negotiations are ongoing to address concerns and hopefully walk back from this decision,' said an official who participated in a call with G7 partners, an alliance of countries with advanced economies, where this information was shared."

Slashdot Top Deals