AI

Claude Code Leak Reveals a 'Stealth' Mode for GenAI Code Contributions - and a 'Frustration Words' Regex (pcworld.com) 38

That leak of Claude Code's source code "revealed all kinds of juicy details," writes PC World.

The more than 500,000 lines of code included:

- An 'undercover mode' for Claude that allows it to make 'stealth' contributions to public code bases
- An 'always-on' agent for Claude Code
- A Tamagotchi-style 'Buddy' for Claude

"But one of the stranger bits discovered in the leak is that Claude Code is actively watching our chat messages for words and phrases — including f-bombs and other curses — that serve as signs of user frustration." Specifically, Claude Code includes a file called "userPromptKeywords.ts" with a simple pattern-matching tool called regex, which sweeps each and every message submitted to Claude for certain text matches. In this particular case, the regex pattern is watching for "wtf," "wth," "omfg," "dumbass," "horrible," "awful," "piece of — -" (insert your favorite four-letter word for that one), "f — you," "screw this," "this sucks," and several other colorful metaphors... While the Claude Code leak revealed the existence of the "frustration words" regex, it doesn't give any indication of why Claude Code is scouring messages for these words or what it's doing with them.
Science

Bonobos Can Tell When They Know Something You Don't (newscientist.com) 54

A study found that bonobos can recognize when someone lacks knowledge they possess and take action to help, demonstrating a basic form of theory of mind. This suggests that the ability to understand others' perspectives is evolutionarily older than previously thought and may have existed in our common ancestors to enhance cooperation and coordination. New Scientist reports: [W]e have been missing clear evidence from controlled settings that primates can track a perspective that differs from their own and then act upon it, says Luke Townrow at Johns Hopkins University in Maryland. To investigate this, Townrow and Christopher Krupenye, also at Johns Hopkins University, tested if three male bonobos at the Ape Initiative research centre in Iowa could identify ignorance in someone they were trying to cooperate with, and then gesture to them to help solve the task. On a table between the bonobo and an experimenter were three upturned plastic cups. A second researcher placed a barrier between the experimenter and the cups, then hid a treat, like a juicy grape, under one of them.

In one version of the experiment, the "knowledge condition," a window in the barrier allowed the experimenter to watch where the treat was placed. In the "ignorance condition," their view was completely blocked. If the experimenter found the food, they would give it to the bonobo, providing a motivation for the apes to share what they knew. Townrow and Krupenye looked at whether the ape pointed at the cup, and how quickly they pointed, after the barrier had been removed over 24 trials for each condition. They found that, on average, the bonobos took 1.5 seconds less time to point and pointed in approximately 20 per cent more trials in the ignorance condition. "This shows that they can actually take action when they realize that somebody has a different perspective from their own," says Krupenye. It appears that bonobos understand features of what others are thinking that researchers have historically assumed they didn't comprehend, he adds.
The findings have been published in the journal PNAS.
Technology

QR-Style Codes Could Replace Barcodes 'Within Two Years' (theguardian.com) 80

Traditional barcodes are set to be replaced by next-generation QR-style codes by 2027, offering enhanced functionality such as embedding sell-by dates, allergens, and recycling information. The Guardian reports: Tesco has started using them on some products, and other trials have suggested that waste of perishable food such as poultry can be cut by embedding sell-by dates in the new QR-style codes, allowing for more dynamic discounting. QR (quick response) codes will allow customers to instantly access more information about the product, including how to recycle batteries, clothes and building materials when tougher environmental regulations bite. But they will also put a greater demand on the world's cloud computing resources, where the extra data they contain will be stored -- meaning a potentially greater carbon footprint.

The first barcode was read in an Ohio supermarket in June 1974 when a packet of Juicy Fruit chewing gum was rung up. It was devised by Joe Woodland, an inventor who had been implored by a retailer frustrated at losing profits, to speed up checkout queues and stocktaking. Coca-Cola has used the new generation of codes in parts of Latin America for refillable bottles, with the QR code allowing the counting of refills so that a requirement of 25 before recycling can be enforced. The Australian supermarket chain Woolworths is said to have reduced food waste by up to 40% in some areas, as the codes allow stores to better spot products approaching expiry and discount more efficiently.
"We've defined an ambition that by the end of 2027 all retailers in the world will be able to read those next-generation barcodes," said Renaud de Barbuat, the president and chief executive of GS1. "We think it's doable ... It represents some investment on the part of retailers to adapt their point-of-sale systems, but it's already well under way."

Anne Godfrey, the chief executive of GS1 UK, said: "This has been in the works for some time, but Covid really accelerated it. During the pandemic, everyone got used to pointing their phones at QR codes in pubs and restaurants to access the menu."
Firefox

Microsoft Wants Firefox To Make Bing Its Default Search Engine (androidpolice.com) 52

According to The Information, Microsoft wants to bid to make Bing Firefox's default search engine. Android Police reports: The browser's contract with Google is set to expire this year, at which point Mozilla could either renew it or switch to a different search engine. Microsoft would very much like to take Google's place in Firefox. It's not a guarantee that it will actually help boost Bing's usage -- after all, Firefox users who don't want to use Bing could just switch to a different search engine, as Yahoo found out a few years ago -- but Microsoft sees potential in such a deal.

The report also notes that there's also a potentially more juicy opportunity coming up for Microsoft if it really wants to get serious about pushing Bing. Apple's Safari browser, which is the main web browser on Apple devices, will have its Google contract expire next year. Despite throwing shade constantly, Google really benefits from the deal it currently has with Apple, and Microsoft could sweep in and try to get Bing to become the main browser on iPhones.

AMD

Will AMD's 'openSIL' Library Enable Open-Source Silicon Initialization With Coreboot? (phoronix.com) 29

Formerly known as LinuxBIOS, coreboot is defined by Wikipedia as "a software project aimed at replacing proprietary firmware (BIOS or UEFI) found in most computers with a lightweight firmware."

Phoronix is wondering if there's about to be a big announcement from AMD: AMD dropped a juicy tid-bit of information to be announced next month with "openSIL" [an open-source AMD x86 silicon initialization library], complete with AMD Coreboot support....

While about a decade ago AMD was big into Coreboot and at the time committed to it for future hardware platforms (2011: AMD To Support Coreboot On All Future CPUs) [and] open-source AGESA at the time did a lot of enabling around it, that work had died off. In more recent years, AMD's Coreboot contributions have largely been limited to select consumer APU/SoC platforms for Google Chromebook use. But issues around closing up the AGESA as well as concerns with the AMD Platform Security Processor (PSP) have diminished open-source firmware hopes in recent years....

For the Open Compute Project Regional Summit in Prague, there is a new entry added with a title of OSF on AMD — Enabled by openSIL (yes, folks, OSF as in "Open-Source Firmware").... [H]opefully this will prove to be a monumental shift for open-source firmware in the HPC server space.

From the talk's description: openSIL (AMD open-source x86 Silicon Initialization Library) offers the versatility, scalability, and light weight interface to allow for ease of integration with open-source and/or proprietary host boot solutions such as coreboot, UEFI and others and adds major flexibility to the overall platform design.

In other words, this library-based solution simply allows a platform integrator to scale from feature rich solutions such as UEFI to slim, lightweight, and secure solutions such as coreboot.

The description promises the talk will include demonstrations "highlighting system bring-up using openSIL integrated with coreboot and UEFI Host Firmware stacks on AMD's Genoa based platforms."
United States

BlackRock, Which Manages Over $10 Trillion, Strikes Back at ESG Critics (axios.com) 114

Investment giant BlackRock is rebutting Republican politicians over its ESG investment policies, arguing that its critics are wrong on both the science and the cents. Axios: Private equity and other investment fund managers should pay close attention, because they could be next in the line of fire. Last month, 18 state attorneys general sent a letter to BlackRock, essentially arguing that its goal of moving toward a net-zero economy is in conflict with its fiduciary duty. Two states, Texas and West Virginia, also banned state entities from doing business with BlackRock, arguing (incorrectly) that the firm boycotts fossil fuel company investments.

Axios' Alayna Treene reports that the BlackRock blowback is part of a coordinated lobbying effort, writing: "The crusade against ESG investments is something many conservatives feel deeply about -- they view these companies as cultural enemies who are misusing investment funds to promote pro-climate policies... House Republicans plan to make an assault on ESG a central part of their legislative and investigative agenda if they take back the majority in November's midterms." BlackRock yesterday responded to the AG's letter, with a 10-page letter of its own. After again disputing the "boycott" accusations, the firm wrote: "We believe investors and companies that take a forward-looking position with respect to climate risk and its implications for the energy transition will generate better long-term financial outcomes." BlackRock is the world's largest asset manager, and its CEO Larry Fink has been very outspoken about ESG initiatives (with declining emphasis as the acronym progresses). In other words, it's a juicy target.

The Almighty Buck

Can the Visa-Mastercard Duopoly Be Broken? (economist.com) 160

An anonymous reader quotes a report from The Economist: America is home to the heftiest interchange fees of any major economy -- costs are an order of magnitude greater than in Europe and China. That largely benefits two firms: Visa and Mastercard, which facilitate more than three-quarters of the country's credit-card transactions. Doing so has made them two of the most profitable companies in the world, with net margins last year of 51% and 46% respectively. Rank every firm (excluding real-estate-investment trusts) in the s&p 500 index by their average net-profit margins last year, five years ago and a decade ago, and only four appear in the top 20 every time. Two are financial-information firms, Intercontinental Exchange and the cme Group. The others are Mastercard and Visa. At first glance their position appears insurmountable. Already dominant, in recent years the firms have been boosted by a covid-induced rise in online shopping. American consumers used credit or debit cards for 45% of their transactions in 2016; by 2021, that had reached 57%. The migration from cash is "a significant and long-running tailwind," says Craig Vosburg of Mastercard. Yet two threats loom. The first comes from Washington, where legislators hope to smash the duo's grip on payments. The second is virtual. Payments have been transformed in Brazil, China and Indonesia by cheap, convenient app-based options from tech giants like Mercado Pago, Ant Group, Tencent and Grab. After a long wait, new entrants now look like they could shake up America's market.

[...] On July 28th Richard Durbin, the same Democratic senator who regulated debit interchange a decade ago, introduced the Credit Card Competition Act (ccc). It does not propose a cap on interchange, as the debit rule does, since costs for credit cards are more variable than for debit cards, making it harder to find the right level. Instead, the ccc would attempt to spur competition by breaking the links between card networks and banks. At present, when a bank issues a credit card every transaction on it is processed by the card network the bank stipulates, meaning the bank is guaranteed the interchange fee the network sets. If the ccc becomes law it will force banks to offer merchants the choice of at least two different card networks. Crucially, these choices could not be the two biggest -- at least one smaller network would have to be offered. They could compete for business by offering lower interchange rates, and merchants would presumably jump at the offer.

Two factors help the bill's chances. It is sponsored by Mr Durbin, the second-most senior Democrat in the Senate, and it is bipartisan, co-sponsored by Roger Marshall, a Republican from Kansas. The ccc's best chance is probably as an amendment to another bigger piece of legislation, which is how debit-card regulation passed in 2010. Even if the effort fails, or fails to work as intended, a potentially bigger threat to the giants looms. So far new entrants to the payments market have benefited Visa and Mastercard, by making it easier for consumers to use their cards online. But as the new fintechs have gained clout, their decisions about the sorts of payments they offer could influence how much money travels along the card networks. Stripe, a large payments-infrastructure firm, says it is working to provide merchants with payment methods that will lower their costs. Current options include a box for customers to enter card details, but also Klarna, a "buy-now-pay-later" provider through which customers can pay for purchases using bank transfers, thus avoiding the card networks. It could soon include things like FedNow, a real-time bank-transfer system being built by the Fed, which is due to be launched next year. In time, it could even include central-bank digital currencies or cryptocurrencies.

Competitors might make little headway if the perks for sticking with credit cards are sufficiently juicy. But merchants can offer their own incentives. When your correspondent recently went to purchase a pair of linen trousers from Everlane, an online retailer, she was encouraged to pay using Catch, a fintech app. The app linked to her bank account via another payment startup called Plaid. As a thank you for avoiding the card networks, Everlane offered a shop credit worth 5% of the transaction value. Catch has signed up a handful of fashionable, millennial brands including Pacsun, another clothing retailer, and Farmacy, a skincare firm. For evidence that this poses a threat, look no further than Visa's attempted purchase of Plaid. In 2020 the firm tried to buy the upstart for $5.3bn, only for the deal to be scuppered by antitrust regulators on the grounds that the transaction would have allowed Visa to eliminate a competitive threat. Ultimately, Visa gave up, but the attempt was nonetheless telling. The house of cards carefully constructed by the two payment giants is formidable and long-standing. But it is not indestructible.

Privacy

FlexBooker Discloses Data Breach, Over 3.7 Million Accounts Impacted (bleepingcomputer.com) 10

An anonymous reader quotes a report from BleepingComputer: Accounts of more than three million users of the U.S.-based FlexBooker appointment scheduling service have been stolen in an attack before the holidays and are now being traded on hacker forums. The same intruders are offering databases claiming to be from two other entities: racing media organization Racing.com and Redbourne Group's rediCASE case management software, both from Australia. Among FlexBooker's customers are owners of any business that needs to schedule appointments, which is everything from accountants, barbers, doctors, mechanics, lawyers, dentists, gyms, salons, therapists, trainers, spas, and the list goes on.

Claiming the attack seems to be a group calling themselves Uawrongteam, who shared links to archives and files with sensitive information, such as photos, driver's licenses, and other IDs. According to Uawrongteam, the database contains a table with 10 million lines of customer information that ranges from payment forms and charges to driver's license photos. The actor notes that some "juicy columns" in the database are names, emails, phone numbers, password salt, and hashed passwords. FlexBooker has sent a data breach notification to customers, confirming the attack and that the intruders "accessed and downloaded" data on the service's Amazon cloud storage system. "On December 23, 2021, starting at 4:05 PM EST our account on Amazon's AWS servers was compromised," reads the notification, adding that the intruders did not access "any credit card or other payment card information."

Businesses

Stablecoin Supply Grew By 388% this Year, Driven by DeFi and Derivatives (theblockcrypto.com) 39

The market for stablecoins experienced breakneck growth in 2021, with the supply for dollar-backed cryptocurrencies surging by 388%, according to data compiled by The Block Research. From a report: As indicated by The Block Research's 2022 Digital Asset Outlook report, the aggregate supply of stablecoins has increased from $29 billion at the start of 2021 to more than $140 billion. That growth benefited a swathe of stablecoins, including tether (USDT) and USD coin (USDC), which is managed by a consortium that includes Circle and Coinbase.

Several factors contributed to the surge in the outstanding supply of stablecoins, which historically have been used by high-speed crypto trading firms as a way to dampen volatility when trading between different cryptocurrencies. Over the course of 2021, retail traders parked stablecoins on decentralized finance protocols as a way to tap into juicy yields. The growth of the derivatives market was another tailwind. Most derivatives venues settle futures contracts in stablecoins, noted Tether's Paolo Ardoino.

Space

'Gardened Zones' on Europa Could Be the Key to Finding Life, Study Says (vice.com) 22

Jupiter's moon Europa contains a voluminous ocean of liquid water under its icy crust that could potentially host extraterrestrial organisms. "But as evidence builds that Europa could be habitable under its crust, a problem remains: the intense radiation that Jupiter emits likely annihilates any signs of life, known as biosignatures, that upwell onto the moon's surface, presenting a challenge to future missions that aim to detect life with Europa landers," reports Motherboard. "Now, a team of researchers led by Emily Costello, a postdoctoral researcher at the Hawaii Institute of Geophysics and Planetology, have shed new light on this obstacle by examining the role of "impact gardening" in the search for life on Europa." From the report: Impact gardening occurs when rocks collide with a planetary body without an atmosphere, causing a mechanical churn that continually exposes new layers of the surface, known as the "gardened zone," to all the erosive effects of space, according to a study published on Monday in Nature Astronomy. "Knowing the depth of the gardened zone is critical for the exploration of Europa as a potentially habitable world," the researchers added. "We will need to sample material below the gardened zone if we wish to discover biomolecules that have never been exposed to hazardous radiation at the surface."

Of course, that raises the question: just how deep is Europa's gardened zone? To provide an answer, the team produced the first comprehensive models of impact gardening on Europa, with the help of Moon rocks returned from the Apollo program that also show a distinct gardened zone. This approach yielded good news and bad news. The bad news is that the models suggest that impact gardening exposes the top 30 centimeters (12 inches) of Europa's global surface to radiation, on average. Contrary to previous studies that proposed the possible presence of juicy biosignatures only a few centimeters under the moon's surface, the new study finds that signs of life would be embedded much deeper in the ice.

That said, the good news is that pristine material from Europa's ocean could be sampled at shallower depths in rare circumstances, such as in the fallout of recent landslides or fresh meteorite impacts. These natural processes can excavate layers of ice from below the gardened zone and position them within centimeters of the surface. Looking for recent examples of such disturbances could reveal samples that have not experienced the damaging long-term effects of radiation yet. Fortunately, scientists will soon benefit from close-up observations of Europa from ESA's Jupiter Icy Worlds Explorer (JUICE) and NASA's Europa Clipper, both scheduled to launch in the 2020s. These spacecraft will conduct intimate flybys of Europa, and they may be able to spot regions with freshly excavated material on the surface that would be prime destinations for future lander missions.

Security

Plex Media Servers Are Being Abused For DDoS Attacks (zdnet.com) 15

DDoS-for-hire services have found a way to abuse Plex Media servers to bounce junk traffic and amplify distributed denial of service (DDoS) attacks, security firm Netscout said in an alert this week. From a report: The company's alert warns owners of devices that ship with Plex Media Server, a web application for Windows, Mac, and Linux that's usually used for video or audio streaming and multimedia asset management. The app can be installed on regular web servers or usually ships with network-attached storage (NAS) systems, digital media players, or other types of multimedia-streaming IoT devices. Netscout says that when a server/device running a Plex Media Server app is booted and connected to a network, it will start a local scan for other compatible devices via the Simple Service Discovery Protocol (SSDP). The problem comes when a Plex Media Server discovers a local router that has SSDP support enabled. When this happens, the Plex Media Server will add a NAT forwarding rule to the router, exposing its Plex Media SSDP (PMSSDP) service directly on the internet on UDP port 32414. Since the SSDP protocol has been known for years to be a perfect vector to amplify the size of a DDoS attack, this makes Plex Media servers a juicy and untapped source of DDoS bots for DDoS-for-hire operations.
Security

Some Ransomware Gangs Are Going After Top Execs To Pressure Companies Into Paying (zdnet.com) 31

A new trend is emerging among ransomware groups where they prioritize stealing data from workstations used by top executives and managers in order to obtain "juicy" information that they can later use to pressure and extort a company's top brass into approving large ransom payouts. From a report: ZDNet first learned of this new tactic last week during a phone call with a company that paid a multi-million dollar ransom to the Clop ransomware gang. Similar calls with other Clop victims and email interviews with cybersecurity firms later confirmed that this wasn't just a one-time fluke, but instead a technique that the Clop gang had fine-tuned across the past few months.

The technique is an evolution of what we've been seen from ransomware gangs lately. For the past two years, ransomware gangs have evolved from targeting home consumers in random attacks to going after large corporations in very targeted intrusions. These groups breach corporate networks, steal sensitive files they can get their hands on, encrypt files, and then leave ransom notes on the trashed computers. In some cases, the ransom note informs companies that they have to pay a ransom demand to receive a decryption key. In case data was stolen, some ransom notes also inform victims that if they don't pay the ransom fee, the stolen data will be published online on so-called "leak sites."

Businesses

McDonald's To Launch a Plant-Based Burger: The McPlant (usatoday.com) 113

According to USA Today, McDonald's has developed a new plant-based platform dubbed McPlant that will debut in markets around the world early next year. From the report: "McPlant is crafted exclusively for McDonald's, by McDonald's," Ian Borden, McDonald's international president, said at the investor meeting. "In the future, McPlant could extend across a line of plant-based products including burgers, chicken substitutes and breakfast sandwiches." The plant-based and chicken sandwich announcements were part of the company's new growth strategy called "Accelerating the Arches." The strategy includes a commitment to the core menu.

"There are other plant-based burgers out there, but the McPlant delivers our iconic taste in a sink-your-teeth-in (and wipe-your-mouth) kind of sandwich," McDonald's said in a blog post Monday. "It's made with a juicy, plant-based patty and served on a warm, sesame seed bun with all the classic toppings." Borden said some markets will test the burger next year. Whether or not the vegan-friendly burger will arrive in the U.S. and a potential timeline was not immediately known. "We are excited about the opportunity because we believe we have a proven, delicious-tasting product," Borden said. "When customers are ready for it, we will be ready for them."
Beyond Meat, a pioneer of plant-based meat substitutes, said it co-created the plant-based patty that will be part of the McPlant platform with McDonald's.
Security

Thousands of Enterprise Systems Infected by New Blue Mockingbird Malware Gang (zdnet.com) 44

Thousands of enterprise systems are believed to have been infected with a cryptocurrency-mining malware operated by a group tracked under the codename of Blue Mockingbird. From a report: Discovered earlier this month by malware analysts from cloud security firm Red Canary, the Blue Mockingbird group is believed to have been active since December 2019. Researchers say Blue Mockingbird attacks public-facing servers running ASP.NET apps that use the Telerik framework for their user interface (UI) component. Hackers exploit the CVE-2019-18935 vulnerability to plant a web shell on the attacked server. They then use a version of the Juicy Potato technique to gain admin-level access and modify server settings to obtain (re)boot persistence. Once they gain full access to a system, they download and install a version of XMRRig, a popular cryptocurrency mining app for the Monero (XMR) cryptocurrency.
Crime

When Ransomware Gets Paid By A City's Insurance Policies (news18.com) 131

Remember when the small town of Lake City, Florida paid $460,000 for a ransomware's decryption key?

As they slowly recover 100 years of encrypted municipal records, the New York Times looks at the lessons learned, arguing that cyberattackers have simply found a juicy target: small governments with weak computer protections -- and strong insurance policies. The city had backup files for all its data, but they were on the same network -- and also inaccessible... The city's insurer, the Florida League of Cities, hired a consultant to handle the negotiations with the hackers via the email addresses that had been posted on the city server. The initial demands were refused outright, and city technicians raced to find a workaround. "We tried a lot of different solutions," said Joseph Helfenberger, the city manager. None of them worked. "We were at the end of the day faced with either re-creating the data from scratch, or paying the ransom," he said.

The insurer's negotiator settled on a payment of 42 Bitcoins, or about $460,000, Helfenberger said, of which the city would pay a $10,000 deductible. After the payment, the hackers provided a decryption key, and recovery efforts began in earnest.

As it turned out, recovery would not be simple. Even with the decryption key, each terabyte has taken about 12 hours to recover. Much of the city's data, nearly a month after the onset of the attack, has still not been unlocked... In Lake City, the information technology director, blamed for both failing to secure the network and taking too long to recover the data, wound up losing his job.

Mark A. Orlando, the chief technology officer for Raytheon Intelligence Information and Services, tells the Times it's unrealistic to expect cities to never pay the ransom. "Anyone who said that has never been in charge of a municipality that has half their services down and no choice."

But does that create an ever-widening problem? The FBI knows of at least 1,500 reported ransomware incidents last year, according to the article, although the Illinois computer programmer offering free decryption help at ID Ransomware says he's receiving 1,500 requests for assistance every day.
Microsoft

Microsoft's Surface Roadmap Reportedly Includes Ambient Computing and a Modular All-in-One PC (venturebeat.com) 41

Journalist Brad Sams is releasing a book chronicling the company's Surface brand: Beneath a Surface. VentureBeat writes: While you'll want to read all 26 chapters to get the juicy details, the last one includes Microsoft's hardware roadmap for 2019, and even a part of 2020 -- spanning various Surface products and even a little Xbox. Here's a quick rundown of Microsoft's current Surface lineup plans:

Spring 2019: A new type of Surface-branded ambient computing device designed to address "some of the common frustrations of using a smartphone," but that isn't itself a smartphone.
Q4 2019: Surface Pro refresh with USB-C (finally), smaller bezels, rounded corners, and new color options.
Q4 2019: AMD-based Surface Laptop -- Microsoft is exploring using the Picasso architecture.
Late 2019: Microsoft's foldable tablet Andromeda could be larger than earlier small form factor prototypes for a pocketable device with dual screens and LTE connectivity.
Q1 2020: Surface Book update that might include new hinge designs (high-end performance parts may delay availability).
2020: A Surface monitor, and the modular design debuted for Surface Hub 2 could make its way to Surface Studio. The idea is to bring simple upgrades to all-in-one PCs, rather than having to replace the whole computer.
GeekWire adds: A pair of new lower-cost devices Xbox One S devices could come next year. Sams reports that one of the models may be all digital, without a disc drive.
Books

New Book Paints Different Picture of Workplace Behavior At Google and Facebook 191

Longtime Slashdot reader theodp writes: In Valley of Genius: The Uncensored History of Silicon Valley (As Told by the Hackers, Founders, and Freaks Who Made It Boom), Adam Fisher paints quite a different picture of life at now-workforce behavior preachers Google and Facebook, revealing that the tech giants' formative days were filled with the kind of antics that run afoul of HR protocols. Google was not a normal place, begins an excerpt in Vanity Fair that includes some juicy quotes attributed to Google executive chef Charlie Ayers about Google's founders ("Sergey's the Google playboy. He was known for getting his fingers caught in the cookie jar with employees that worked for the company in the masseuse room. He got around.") And in Sex, Beer, and Coding, Wired runs an excerpt about Facebook's wild early days, which even extended to the artwork gracing its office ("The office was on the second floor, so as you walk in you immediately have to walk up some stairs, and on the big 10-foot-high wall facing you is just this huge buxom woman with enormous breasts wearing this Mad Max-style costume riding a bulldog. It's the most intimidating, totally inappropriate thing. [...] That set a tone for us. A huge-breasted warrior woman riding a bulldog is the first thing you see as you come in the office, so like, get ready for that!" So, what changed? "When Sheryl Sandberg joined the company is when I saw a vast shift in everything in the company," said Ayers about Google. Sandberg later became Facebook's grown-up face.
Bitcoin

Hackers Keep Robbing Cryptocurrency YouTubers (theverge.com) 42

Hackers are going after YouTubers who make videos about cryptocurrencies. Adrianne Jeffries, reporting for The Verge: Cryptocurrency vlogging has exploded on YouTube over the last two years. In the last 90 days, there were 122,000 videos on cryptocurrency or Bitcoin uploaded to YouTube, garnering 328 million views, according to video analytics platform Tubular Labs. As it turns out, YouTubers are juicy targets for hackers because they share so much information about themselves. They often share their screens as they make trades, which can reveal what apps, usernames, and cryptocurrency addresses they use. They may even tell their followers what systems they use to secure their holdings, which can end up being a blueprint for attackers.

"You have to be very careful about that stuff as a YouTuber," says Peter Saddington, the host of Decentralized TV on YouTube who infamously bought a Lamborghini with his Bitcoin earnings. "In my early days of YouTube, I used to show my trades. I learned that was not a good idea." Saddington was hacked in late 2017.

Youtube

YouTube Is Littered With Mass-Produced Videos Made By Automated Bots (hackernoon.com) 99

A report via Hacker Noon sheds some light on the practice of using bots to mass-produce videos for YouTube. The YouTube channel Breaking News Today, for example, constantly generates new videos from recent news sources, and posts as often as every few minutes. You can tell the videos are bot-produced because they always start off with a cringe-worthy 80's style intro, followed by a robotic voiceover and floating low quality images. From the report: Someone has effectively created a fully automated process running 24/7 that is taking and stripping recent articles, converting them into video format, and posting it on Youtube as their own. And while doing so, they take credit for it and reap all the rewardsâS -- such as revenue and influenceâS -- âSthat come with it. Some videos, especially the ones that gain momentum and get popular, even feature a large juicy ad on the bottom, in which Google displays and shares profits with. Sure, one video with a few thousand views isn't really that significant, but when you have hundreds of videos being pumped out week after week, you can see how quickly things can add up. And while many new videos are still awaiting their first dozen views, others are in the tens of thousands. One even amassed almost 50k views in just two days. In total, the channel's videos have been viewed more than 225,000 times just in the past month, with an average of around 8,000 views per day. Did I mention that there are more than just this one channel? There's also this one, and this one, both following the same concept. There's actually many, MANY more. There are few solutions to deal with this new type of fully automated plagiarism. While you can certainly down vote the videos and report them to YouTube if the uploader is infringing on your copyright, they will likely stay online for days racking up views and revenue before any action is taken. There's also no reason why the videos couldn't be uploaded to separate channels to fly under YouTube's radar.
Bitcoin

Former Bitcoin Developer Shares Early Satoshi Nakamoto Emails (vice.com) 42

Jordan Pearson, writing for Motherboard: Satoshi Nakamoto is Bitcoin's anonymous creator and absentee head of state. In the years since she (or he, or they) disappeared into the ether and left the technology in the hands of a few high-profile developers, Nakamoto's words have become nigh-gospel for some in the Bitcoin world. On Friday, a user going by "CipherionX" on the Bitcointalk forum published five emails allegedly between Satoshi Nakamoto and former Bitcoin developer Mike Hearn. In an email to Motherboard, Hearn confirmed that he shared the emails with the user. While Hearn himself, who was one of the earliest Bitcoin developers, has previously quoted most of the juicy bits from his correspondence with Nakamoto, it appears to be the first time much of the material has been shared in full. None of the emails are included on a popular database of Nakamoto's writings collected from old emails and forum posts.

Slashdot Top Deals