Security

New Linux/Windows Malware Allows Arbitrary Execution of Shell Commands (bleepingcomputer.com) 80

"Researchers have discovered a new multi-platform backdoor that infects Windows and Linux systems allowing the attackers to run malicious code and binaries on the compromised machines," reports Bleeping Computer: The malware dubbed ACBackdoor is developed by a threat group with experience in developing malicious tools for the Linux platform based on the higher complexity of the Linux variant as Intezer security researcher Ignacio Sanmillan found. "ACBackdoor provides arbitrary execution of shell commands, arbitrary binary execution, persistence, and update capabilities," the Intezer researcher found.

Both variants share the same command and control (C2) server but the infection vectors they use to infect their victims are different: the Windows version is being pushed through malvertising with the help of the Fallout Exploit Kit while the Linux payload is dropped via a yet unknown delivery system... Besides infecting victims via an unknown vector, the Linux malicious binary is detected by only one of the anti-malware scanning engines on VirusTotal at the time this article was published, while the Windows one is detected by 37 out of 70 engines. The Linux binary is also more complex and has extra malicious capabilities, although it shares a similar control flow and logic with the Windows version...

ACBackdoor can receive the info, run, execute, and update commands from the C2 server, allowing its operators to run shell commands, to execute a binary, and to update the malware on the infected system.

The article warns that the Linux version will disguise itself as the Ubuntu UpdateNotifier utility, renaming its process as the Linux kernel thread [kworker/u8:7-ev].
Games

Half Life Alyx Hits PC VR Headsets In March 2020 (arstechnica.com) 67

An anonymous reader quotes a report from Ars Technica: After a tease earlier this week, Valve has revealed more details and a new trailer for the first new Half-Life content in over a decade. The "full-length" Half Life: Alyx will hit Steam in March 2020, Valve says, with support for "all PC-based VR headsets." Pre-orders are already available for $59.99, though the game will be free if you own a Valve Index headset. The game, which Valve says is "set between the events of Half-Life and Half-Life 2," has been "designed from the ground up for Virtual Reality" (i.e. you can stop hoping for a 2D monitor release). "Everyone at Valve is excited to be returning to the world of Half-Life," Valve founder Gabe Newell said in a statement. "VR has energized us."

Today's video trailer shows that next year's Alyx-ization of Half-Life is equal parts abstract and concrete. The VR perspective from today's trailer doesn't include any floating body parts or feet; the only part of your virtual self you'll see, at least in today's trailer, is your hands, covered in a pair of gloves. Yet we also hear Alyx's voice, which indicates that this game's protagonist won't be nearly as silent as Freeman in his own mainline adventures. Today's announcement includes video footage that confirms a data-leak examination by Valve News Network earlier this year: a new manipulation system dubbed the Gravity Gloves. And boy do these things look cool. Need to grab or pick something up? Point at whatever that object is (whether it's close or far away) with an open hand until it glows orange, then close your hand and flick your wrist toward yourself to fling the item in your direction. At this point, you get a moment to physically "catch" the object in question. Point, clench, flick, catch.

Today's trailer also confirms bits and pieces of the exciting HLA details I've previously heard about from multiple sources. For instance, the trailer includes teases of the game's approach to VR-exclusive puzzles, particularly those that require moving hands around a three-dimensional space. Some of these puzzles will require scanning and finding clues hidden inside of the virtual world's walls (and moving or knocking down anything hindering your ability to see or touch said walls). Other puzzles will require arranging what look like constellations or grids of stars around a 3D space in order to match certain patterns. And then there's the matter of familiar Half-Life creatures coming to life for the first time in over 12 years, which means they're that much more detailed and gruesome as rendered in the Source 2 engine.
The Half-Life website specifies that this game can be played sitting, standing, or with "roomscale" movement. Players can use finger-tracking or trigger-based VR controllers and move around the VR environments by "teleporting" from point A to point B, "shifting" smoothly to a new position, or just walking continuously with an analog stick.
Android

Google Asks Three Outside Antivirus Firms To Start Scanning Submissions To Android's Play Store (arstechnica.com) 14

"Android has a bit of a malware problem," argues Wired, noting that " malware-ridden apps sneak into the official Play Store with disappointing frequency..."

"After grappling with the issue for a decade, Google is calling in some reinforcements." This week, Google announced a partnership with three antivirus firms -- ESET, Lookout, and Zimperium -- to create an App Defense Alliance. All three companies have done extensive Android malware research over the years, and have existing relationships with Google to report problems they find. But now they'll use their scanning and threat detection tools to evaluate new Google Play submissions before the apps go live -- with the goal of catching more malware before it hits the Play Store in the first place.

"On the malware side we haven't really had a way to scale as much as we've wanted to scale," says Dave Kleidermacher, Google's vice president of Android security and privacy. "What the App Defense Alliance enables us to do is take the open ecosystem approach to the next level. We can share information not just ad hoc, but really integrate engines together at a digital level, so that we can have real-time response, expand the review of these apps, and apply that to making users more protected."

Crime

Tech Sites Including Microsoft's Bing Criticized Over Child Pornography Policies (cnet.com) 73

"Microsoft's Bing search engine reportedly still served up child porn, nearly a year after the tech giant said it was addressing the issue," reports CNET: The news comes as part of a Saturday report in The New York Times that looks at what the newspaper says is a failure by tech companies to adequately address child pornography on their platforms.... [A] former Microsoft executive told the Times that it now looks as if the company is failing to use its own tools. The Times' Saturday report notes that 10 years ago, Microsoft helped create software called PhotoDNA that "can use computers to recognize photos, even altered ones, and compare them against databases of known illegal images." But, the Times said, Bing and other search engines that use Bing's results are serving up imagery that doesn't pass muster with PhotoDNA....

The Bing news is part of a larger story from the Times about how various tech companies are dealing with child porn on their platforms.

The Times criticizes a tech industry which they say is looking the other way: Amazon, whose cloud storage services handle millions of uploads and downloads every second, does not even look for the imagery. Apple does not scan its cloud storage, according to federal authorities, and encrypts its messaging app, making detection virtually impossible. Dropbox, Google and Microsoft's consumer products scan for illegal images, but only when someone shares them, not when they are uploaded. And other companies, including Snapchat and Yahoo, look for photos but not videos, even though illicit video content has been exploding for years. (When asked about its video scanning, a Dropbox spokeswoman in July said it was not a "top priority." On Thursday, the company said it had begun scanning some videos last month.)

The largest social network in the world, Facebook, thoroughly scans its platforms, accounting for over 90 percent of the imagery flagged by tech companies last year, but the company is not using all available databases to detect the material. And Facebook has announced that the main source of the imagery, Facebook Messenger, will eventually be encrypted, vastly limiting detection.

AI

A Face-Scanning Algorithm Increasingly Decides Whether You Deserve the Job (washingtonpost.com) 128

Shmoodling shares a report from The Washington Post: Designed by the recruiting-technology firm HireVue, the system uses candidates' computer or cellphone cameras to analyze their facial movements, word choice and speaking voice before ranking them against other applicants based on an automatically generated "employability" score. HireVue's "AI-driven assessments" have become so pervasive in some industries, including hospitality and finance, that universities make special efforts to train students on how to look and speak for best results. More than 100 employers now use the system, including Hilton, Unilever and Goldman Sachs, and more than a million job seekers have been analyzed.

But some AI researchers argue the system is digital snake oil -- an unfounded blend of superficial measurements and arbitrary number-crunching, unrooted in scientific fact. Analyzing a human being like this, they argue, could end up penalizing nonnative speakers, visibly nervous interviewees or anyone else who doesn't fit the model for look and speech. The system, they argue, will assume a critical role in helping decide a person's career. But they doubt it even knows what it's looking for: Just what does the perfect employee look and sound like, anyway?
"It's a profoundly disturbing development that we have proprietary technology that claims to differentiate between a productive worker and a worker who isn't fit, based on their facial movements, their tone of voice, their mannerisms," said Meredith Whittaker, a co-founder of the AI Now Institute, a research center in New York. "It's pseudoscience. It's a license to discriminate," she added. "And the people whose lives and opportunities are literally being shaped by these systems don't have any chance to weigh in."
Earth

A Look at Earth Archive, a Project To Produce Detailed Maps of All the Land on Earth Through Laser Scanning (theguardian.com) 14

A project to produce detailed maps of all the land on Earth through laser scanning has been revealed by researchers who say action is needed now to preserve a record of the world's cultural, environmental and geological treasures. From a report: Prof Chris Fisher, an archaeologist from Colorado State University, said he founded the Earth Archive as a response to the climate crisis. "We are going to lose a significant amount of both cultural patrimony -- so archaeological sites and landscapes -- but also ecological patrimony -- plants and animals, entire landscapes, geology, hydrology," Fisher told the Guardian. "We really have a limit time to record those things before the Earth fundamentally changes." He also said that while it was important to take action on the climate crisis, even if we started "living like the Flintstones," changes are already taking place.

The main technology Fisher hopes to use is aircraft-based Lidar, a scanning technique in which laser pulses are directed at the Earth's surface from an instrument attached to an aircraft. The time it takes for the pulses to bounce back is measured, allowing researchers to work out the distance to the object or surface they strike. Combined with location data, the approach allows scientists to build 3D maps of an area. The method has already helped reveal ancient cities deep in jungles and map the full extent of sites built by rivals to the Aztecs.

Privacy

Home Depot and Lowe's Accused of Scanning Millions of Customers Faces (dailymail.co.uk) 36

JustAnotherOldGuy tipped us off to this story. The Daily Mail reports: Home Depot and Lowe's are secretly using facial recognition technology to track customer movement in their stores, violating privacy laws in Illinois, plaintiffs in two class action lawsuits say.

The plaintiffs, who are Illinois residents, allege the two big box retailers are using the technology without properly notifying customers or seeking their consent, as required by state law... The collection of the biometric data requires written notification, a statement of purpose for the collection of that data and duration for which it will be kept, and written consent from the individuals from which the data is being collected, the lawsuits both state. Neither store, according to both lawsuits, met the benchmarks set in the Illinois law, also know as BIPA and which was enacted in 2008. "Plaintiffs and the class members did not consent to the disclosure or dissemination of their biometric identifiers," say both of the class actions.

No evidence is provided for the allegations, although the American Civil Liberties Union confirmed last year that Lowe's was using facial recognition, citing mentions in its 2018 privacy policy. However, IPVM, a camera surveillance industry news site, noted that the privacy policy this year no longer has references to the technology... Walmart also was testing the technology, according to the ACLU, and Madison Square Garden was considering using it. The civil rights organization points out on its website that "stores have a strong financial incentive to collect as much information about their customers as they can get. And we do know that when it comes to this kind of cutting-edge technology, which is taking the human race to places it's never been before, the public has a right to know what stores are doing with it, if anything, so they can vote with their feet if they don't like it."

Books

Libraries and Archivists Are Scanning and Uploading Books That Are Secretly in the Public Domain (vice.com) 49

A coalition of archivists, activists, and libraries are working overtime to make it easier to identify the many books that are secretly in the public domain, digitize them, and make them freely available online to everyone. The people behind the effort are now hoping to upload these books to the Internet Archive, one of the largest digital archives on the internet. From a report: As it currently stands, all books published in the U.S. before 1924 are in the public domain, meaning they're publicly owned and can be freely used and copied. Books published in 1964 and after are still in copyright, and by law will be for 95 years from their publication date. But a copyright loophole means that up to 75 percent of books published between 1923 to 1964 are secretly in the public domain, meaning they are free to read and copy.

The problem is determining which books these are, due to archaic copyright registration systems and convoluted and shifting copyright law. As such, a coalition of libraries, volunteers, and archivists have been working overtime to identify which titles are in the public domain, digitize them, then upload them to the internet. At the heart of the effort has been the New York Public Library, which recently documented why the entire process is important, but a bit of a pain.

Power

Spring Cyberattack on US Power Grid 'Probably Just Some Script Kiddie' (eenews.net) 62

The electric utility non-profit NERC has posted a "Lessons Learned" document detailing a March 5th incident that Environment & Energy News calls "a first-of-its-kind cyberattack on the U.S. grid". While it didn't cause any blackouts -- it was at a "low-impact" control center -- NERC is now warning power utilities to "have as few internet facing devices as possible" and to use more than just a firewall for defense.

puddingebola shared this report from Environment & Energy News: The cyberthreat appears to have been simpler and far less dangerous than the hacks in Ukraine. The March 5 attack hit web portals for firewalls in use at the undisclosed utility. The hacker or hackers may not have even realized that the online interface was linked to parts of the power grid in California, Utah and Wyoming. "So far, I don't see any evidence that this was really targeted," said Reid Wightman, senior vulnerability analyst at industrial cybersecurity firm Dragos Inc. "This was probably just an automated bot that was scanning the internet for vulnerable devices, or some script kiddie," he said, using a term for an unskilled hacker...

In the March episode, a flaw in the victim utility's firewalls allowed "an unauthenticated attacker" to reboot them over and over again, effectively breaking them. The firewalls served as traffic cops for data flowing between generation sites and the utility's control center, so operators lost contact with those parts of the grid each time the devices winked off and on. The glitches persisted for about 10 hours, according to NERC, and the fact that there were issues at multiple sites "raised suspicion." After an initial investigation, the utility decided to ask its firewall manufacturer to review what happened, according to NERC, which led to the discovery of "an external entity" -- a hacker or hackers -- interfering with the devices. NERC stressed that "there was no impact to generation...."

Wightman said the "biggest problem" was the fact that hackers were able to successfully take advantage of a known flaw in the firewall's interface. "The advisory even goes on to say that there were public exploits available for the particular bug involved," he said. "Why didn't somebody say, 'Hey, we have these firewalls and they're exposed to the internet -- we should be patching?'"

Large power utilities are required to check for and apply fixes to sensitive grid software that could offer an entry point for hackers.

Iphone

Apple Plans Return of Touch ID and New Cheap iPhone (bloomberg.com) 25

Apple is reportedly developing in-display fingerprint technology for as early as its 2020 iPhones, according to Bloomberg. "The technology is in testing both inside Apple and among the company's overseas suppliers, though the timeline for its release may slip to the 2021 iPhone refresh, said the people, who asked not to be identified discussing private work." From the report: Apple introduced fingerprint scanning on iPhones in 2013, following its acquisition of AuthenTec Inc., a pioneer in the field. Integrated into the iPhone's home button, the Touch ID system was used for unlocking the device, approving payments and authorizing app downloads -- and it gave Apple a technological edge with its speed and reliability. Touch ID was replaced with face-scanning sensors in 2017 with the iPhone X launch. Branded as Face ID, the new face authentication again put Apple ahead of the competition with a more robust and secure implementation than rivals. The upcoming fingerprint reader would be embedded in the screen, letting a user scan their fingerprint on a large portion of the display, and it would work in tandem with the existing Face ID system, the people familiar with Apple's plans said. The report also mentions Apple is working on its first low-cost iPhone since the iPhone SE: That could come out as early as the first half of 2020, the people said. The device would look similar to the iPhone 8 and include a 4.7-inch screen. The iPhone 8 currently sells for $599, while Apple sold the iPhone SE for $399 when that device launched in 2016. The new low-cost phone is expected to have Touch ID built into the home button, not the screen. Nikkei reported plans for a cheaper iPhone earlier this week.
Transportation

All UK Airports To Install 3D Baggage Scanning Technology By 2022 (bbc.com) 19

"The UK government is requiring all major UK airports to introduce 3D baggage screening equipment before the end of 2022," writes Slashdot reader Hammeh.

The BBC reports: Ministers say the technology will boost security, speed up pre-boarding checks, and could end the restrictions on travelling with liquids and laptops. The equipment, similar to CT scanners used in hospitals, is already being installed at London's Heathrow Airport. It provides a clearer picture of a bag's contents, which staff can zoom in to and rotate for inspection.

Currently, passengers taking liquid in their cabin baggage are restricted to containers holding no more than 100ml, which must be shown to security staff in a single, transparent, resealable plastic bag of about 20cm (8in) x 20cm. The limits have been in place since November 2006. Their introduction ended a ban on liquids in the cabin imposed three months earlier, when British police said they had foiled a plot to blow up as many as 10 planes using explosives hidden in drinks bottles...

The technology is already being used by US airports, including Atlanta's Hartsfield-Jackson and Chicago's O'Hare.

Social Networks

Social Media Stress Can Lead To Social Media Addiction, Study Finds (sciencedaily.com) 17

An anonymous reader quotes a report from ScienceDaily: Social networking sites (SNS) such as Facebook and Instagram are known to cause stress in users, known as technostress from social media. However, when faced with such stress, instead of switching off or using them less, people are moving from one aspect of the social media platforms to another -- escaping the causes of their stress without leaving the medium on which it originated. Research into the habits of 444 Facebook users revealed they would switch between activities such as chatting to friends, scanning news feeds and posting updates as each began to cause stress. This leads to an increased likelihood of technology addiction, as they use the various elements of the platform over a greater timespan. Researchers from Lancaster University, the University of Bamberg and Friedrich-Alexander Univeristat Erlangen-Nurnberg, writing in Information Systems Journal, found that users were seeking distraction and diversion within the Facebook platform as a coping mechanism for stress caused by the same platform, rather than switching off and undertaking a different activity. Professor Sven Laumer said: "We found that those users who had a greater social media habit- needed less effort to find another aspect of the platforms, and were thus more likely to stay within the SNS rather than switch off when they needed to divert themselves. The stronger the user's SNS habit, the higher the likelihood they would keep using it as a means of diversion as a coping behavior in response to stressors, and possibly develop addiction to the SNS."

"Users go to different areas of the platform which they see as being separate and that they use in different ways. With Facebook, there are features that take you into different worlds within the same platform. You can be in many different places all from the same application, for example following friends' activities, posting pictures about daily activities, switching to a chat feature or playing games."

The study has been published in the Information Systems Journal.
Space

Scientists Are 99 Percent Sure They Just Detected a Black Hole Eating a Neutron Star (vice.com) 41

An anonymous reader quotes a report from Motherboard: On Wednesday, a gravitational wave called S190814bv was detected by the U.S.-based Laser Interferometer Gravitational-Wave Observatory (LIGO) and its Italian counterpart Virgo. Based on its known properties, scientists think there is a 99% probability that the source of the wave is a black hole that ate a neutron star. In contrast to black hole mergers, neutron star collisions do produce a lot of light. When a gravitational wave from a neutron star crash was detected in 2017, scientists were able to pinpoint bright emissions from the event -- called an optical counterpart -- in the days that followed the wave detection. This marked the dawn of a technique called "multi-messenger astronomy," in which scientists use multiple types of signals from space to examine astronomical objects.

Ryan Foley, an astronomer at UC Santa Cruz, was part of the team that tracked down that first optical counterpart, a feat that has not yet been repeated. He and his colleagues are currently scanning the skies with telescopes, searching for any light that might have been radiated by the new suspected merger of a black hole and neutron star. If the team were to pick up light from the event within the coming weeks, they would be witnessing the fallout of a black hole spilling a neutron star's guts while devouring it. This would provide a rare glimpse of the exotic properties of these extreme astronomical objects and could shed light on everything from subatomic physics to the expansion rate of the universe.
"We've never detected a neutron star and a black hole together," said Foley. "If it turns out to be right, then we've confirmed a new type of star system. It's that fundamental." He added: "If you learn about how neutron stars are built, that can tell you about how atoms are built. This is something that is fundamental to everything in our daily life works."
Science

Chemists Make First-Ever Ring of Pure Carbon (nature.com) 37

A team of researchers has synthesized the first ring-shaped molecule of pure carbon -- a circle of 18 atoms. Nature reports: The chemists started with a triangular molecule of carbon and oxygen, which they manipulated with electric currents to create the carbon-18 ring. Initial studies of the properties of the molecule, called a cyclocarbon, suggest that it acts as a semiconductor, which could make similar straight carbon chains useful as molecular-scale electronic components.

Chemist Przemyslaw Gawel of the University of Oxford, UK, and his collaborators have now created and imaged the long-sought ring molecule carbon-18. Using standard 'wet' chemistry, his collaborator Lorel Scriven, an Oxford chemist, first synthesized molecules that included four-carbon squares coming off the ring with oxygen atoms attached to squares. The team then sent their samples to IBM laboratories in Zurich, Switzerland, where collaborators put the oxygen -- carbon molecules on a layer of sodium chloride, inside a high-vacuum chamber. They manipulated the rings one at a time with electric currents (using an atomic-force microscope that can also act as a scanning-transmission microscope), to remove the extraneous, oxygen-containing parts. After much trial-and-error, micrograph scans revealed the 18-carbon structure. "I never thought I would see this," says Scriven. Alternating bond types are interesting because they are supposed to give carbon chains and rings the properties of semiconductors. The results suggest that long, straight carbon chains might be semiconductors, too, Gawel says, which could make them useful as components of future molecular-sized transistors.
The paper has been published in the journal Science.
Education

A New Way To Help Students Turn in Their Best Work (www.blog.google) 40

Google announces in a blog post: Today's students face a tricky challenge: In an age when they can explore every idea imaginable on the internet, how do they balance outside inspiration with authenticity in their own work? Students have to learn to navigate the line between other people's ideas and their own, and how and when to properly cite sources. We've heard from instructors that they copy and paste passages into Google Search to check if student work is authentic, which can be repetitive, inefficient and biased. They also often spend a lot of time giving feedback about missed citations and improper paraphrasing. By integrating the power of Search into our assignment and grading tools, we can make this quicker and easier.

That's why Google is introducing originality reports. This new feature -- with several reports included free in every course -- will be part of Classroom and Assignments, which was also announced today. We create originality reports by scanning student work for matched phrases across hundreds of billions of web pages and tens of millions of books. When assigning work in Classroom and Assignments, instructors will have the option to enable originality reports. Students will then be able to run up to three originality reports on documents they attach to the assignment before submitting their work. This heads-up gives students an opportunity to proactively improve their work, and also saves time for instructors.

Privacy

Facial Recognition Deployed on Children at Hundreds of US Summer Camps (tulsaworld.com) 60

The Washington Post describes a parent whose phone "rings 10 times a day with notifications from the summer camp's facial-recognition service, which alerts him whenever one of his girls is photographed enjoying their newfound independence."

Cory Doctorow reports: You can also call your kid if you think they look unhappy or if you are unsatisfied with them in any way and nag them. So kids mob photographers with big, fake smiles and beg to be photographed so their parents won't harass them.

The companies have "privacy policies" that grossly overreach, giving them perpetual licenses to distribute all the photos they take forever, for any purpose. They claim to have super-secure data-centers, but won't describe what makes them so sure their data centers are more secure than, say, the NSA's, Equifax, or any of the other "super secure" data centers that have been breached and dumped in recent memory.

And while parents enjoy all this looking at their kids while they're away in theory, they also report a kind of free-floating anxiety because they know just enough about their kids' lives at camp to worry, but not enough to assuage their worries.

One overseer of two camps tells the Post that more concerned parents call her in two hours than used to call in an entire month. One company adds that their service is now being used by over 160,000 parents -- and for children as young as six.

At least one camp takes over 1,000 photos each day -- scanning each one with facial recognition technology -- and the Post reports that facial-recognition technology has now already been deployed at "hundreds" of summer camps all across the United States.
Encryption

Is Facebook Planning on Backdooring WhatsApp? (schneier.com) 131

Bruce Schneier: This article points out that Facebook's planned content moderation scheme will result in an encryption backdoor into WhatsApp: "In Facebook's vision, the actual end-to-end encryption client itself such as WhatsApp will include embedded content moderation and blacklist filtering algorithms. These algorithms will be continually updated from a central cloud service, but will run locally on the user's device, scanning each cleartext message before it is sent and each encrypted message after it is decrypted. The company even noted. that when it detects violations it will need to quietly stream a copy of the formerly encrypted content back to its central servers to analyze further, even if the user objects, acting as true wiretapping service. Facebook's model entirely bypasses the encryption debate by globalizing the current practice of compromising devices by building those encryption bypasses directly into the communications clients themselves and deploying what amounts to machine-based wiretaps to billions of users at once."

Once this is in place, it's easy for the government to demand that Facebook add another filter -- one that searches for communications that they care about -- and alert them when it gets triggered. Of course alternatives like Signal will exist for those who don't want to be subject to Facebook's content moderation, but what happens when this filtering technology is built into operating systems?
Separately The Guardian reports: British, American and other intelligence agencies from English-speaking countries have concluded a two-day meeting in London amid calls for spies and police officers to be given special, backdoor access to WhatsApp and other encrypted communications. The meeting of the "Five Eyes" nations -- the UK, US, Australia, Canada and New Zealand -- was hosted by new home secretary, Priti Patel, in an effort to coordinate efforts to combat terrorism and child abuse.
UPDATE: 8/2/2019 On Friday technologist Bruce Schneier wrote that after reviewing responses from WhatsApp, he's concluded that reports of a pre-encryption backdoor are a false alarm. He also says he got an equally strong confirmation from WhatsApp's Privacy Policy Manager Nate Cardozo, who Facebook hired last December from EFF. "He basically leveraged his historical reputation to assure me that WhatsApp, and Facebook in general, would never do something like this."
Robotics

Researchers Develop Speedy Soft Robot That's More Robust Than a Cockroach (ieee.org) 52

Researchers from Tsinghua University in China and University of California, Berkeley, have developed a new kind of soft robot that looks like a bent strip of paper, but is able to move at 20 body lengths per second and survive being stomped on. The robot has been presented in the current issue of Science Robotics. IEEE Spectrum reports: This prototype robot measures just 3 centimeters by 1.5 cm. It takes a scanning electron microscope to actually see what the robot is made of -- a thermoplastic layer is sandwiched by palladium-gold electrodes, bonded with adhesive silicone to a structural plastic at the bottom. When an AC voltage (as low as 8 volts but typically about 60 volts) is run through the electrodes, the thermoplastic extends and contracts, causing the robot's back to flex and the little "foot" to shuffle. A complete step cycle takes just 50 milliseconds, yielding a 200 hertz gait. And technically, the robot "runs," since it does have a brief aerial phase.

The researchers also put together a prototype with two legs instead of one, which was able to demonstrate a potentially faster galloping gait by spending more time in the air. They suggest that robots like these could be used for "environmental exploration, structural inspection, information reconnaissance, and disaster relief," which are the sorts of things that you suggest that your robot could be used for when you really have no idea what it could be used for. But this work is certainly impressive, with speed and robustness that are largely unmatched by other soft robots. An untethered version seems possible due to the relatively low voltages required to drive the robot, and if they can put some peanut-sized sensors on there as well, practical applications might actually be forthcoming sometime soon.

AI

New AI-Assisted Coding Tool Called 'Amazing' (theverge.com) 174

An anonymous reader quotes The Verge's AI and Robotics reporter: By scanning huge datasets of text, machine learning software can produce convincing samples of everything from short stories to song lyrics. Now, those same techniques are being applied to the world of coding with a new program called Deep TabNine, a "coding autocompleter." Programmers can install it as an add-on in their editor of choice, and when they start writing, it'll suggest how to continue each line, offering small chunks at a time. Think of it as Gmail's Smart Compose feature but for code.

Jacob Jackson, the computer science undergrad at the University of Waterloo who created Deep TabNine, says this sort of software isn't new, but machine learning has hugely improved what it can offer... Earlier this month, he released an updated version that uses a deep learning text-generation algorithm called GPT-2, which was designed by the research lab OpenAI, to improve its abilities. The update has seriously impressed coders, who have called it "amazing," "insane," and "absolutely mind-blowing" on Twitter...

Deep TabNine is trained on 2 million files from coding repository GitHub. It finds patterns in this data and uses them to suggest what's likely to appear next in any given line of code, whether that's a variable name or a function... Most importantly, thanks to the analytical abilities of deep learning, the suggestions Deep TabNine makes are of a high overall quality. And because the software doesn't look at users' own code to make suggestions, it can start helping with projects right from the word go, rather than waiting to get some cues from the code the user writes.

It's not free software. Currently a personal license costs $49 (with a business-use license costing $99), the Verge reports -- but the tool supports the following 22 languages...

Python, JavaScript, Java, C++, C, PHP, Go, C#, Ruby, Objective-C, Rust, Swift, TypeScript, Haskell, OCaml, Scala, Kotlin, Perl, SQL, HTML, CSS, and Bash.
Encryption

Did Facebook End The Encryption Debate? (forbes.com) 163

Forbes contributor Kalev Leetaru argues that "the encryption debate is already over -- Facebook ended it earlier this year." The ability of encryption to shield a user's communications rests upon the assumption that the sender and recipient's devices are themselves secure, with the encrypted channel the only weak point... [But] Facebook announced earlier this year preliminary results from its efforts to move a global mass surveillance infrastructure directly onto users' devices where it can bypass the protections of end-to-end encryption. In Facebook's vision, the actual end-to-end encryption client itself such as WhatsApp will include embedded content moderation and blacklist filtering algorithms. These algorithms will be continually updated from a central cloud service, but will run locally on the user's device, scanning each cleartext message before it is sent and each encrypted message after it is decrypted. The company even noted that when it detects violations it will need to quietly stream a copy of the formerly encrypted content back to its central servers to analyze further, even if the user objects, acting as true wiretapping service...

If Facebook's model succeeds, it will only be a matter of time before device manufacturers and mobile operating system developers embed similar tools directly into devices themselves, making them impossible to escape... Governments would soon use lawful court orders to require companies to build in custom filters of content they are concerned about and automatically notify them of violations, including sending a copy of the offending content. Rather than grappling with how to defeat encryption, governments will simply be able to harness social media companies to perform their mass surveillance for them, sending them real-time alerts and copies of the decrypted content.

Putting this all together, the sad reality of the encryption debate is that after 30 years it is finally over: dead at the hands of Facebook. If the company's new on-device content moderation succeeds it will usher in the end of consumer end-to-end encryption and create a framework for governments to outsource their mass surveillance directly to social media companies, completely bypassing encryption.

In the end, encryption's days are numbered and the world has Facebook to thank.


UPDATE: 8/2/2019 Will Cathcart, WhatsApp's vice president of product management, took to the internet with this forceful response. "We haven't added a backdoor to WhatsApp. To be crystal clear, we have not done this, have zero plans to do so, and if we ever did, it would be quite obvious and detectable that we had done it. We understand the serious concerns this type of approach would raise, which is why we are opposed to it."

Slashdot Top Deals