×
Android

Alibaba Cloud Gets More of Android Working On RISC-V Silicon (theregister.com) 28

An anonymous reader quotes a report from The Register: Alibaba Cloud has advanced its work to port Android to the RISC-V architecture. The Chinese cloud giant has spent more than a year working on a port of the Google-spawned OS and in January 2021 showed off a GUI powered by Android 10 running on silicon designed by T-Head Semiconductor -- an Alibaba subsidiary that designs its own RISC-V chip. Alibaba Cloud has now revealed it's working on Android 12, and has integrated third-party vendor modules. The result is Android on RISC-V that's capable of playing audio and video, running Wi-Fi and Bluetooth radios, and driving cameras.

The company has also "enabled more system enhancement features such as core tool sets, third-party libraries and SoC board support package on RISC-V," which collectively make RISC-V a better target for Android. Another advance is successful trials of TensorFlow Lite models on RISC-V. That effort means Android on RISC-V should be capable running workloads like image and audio classification and Optical Character Recognition. Alibaba Cloud hasn't detailed whether its porting efforts are directed to any particular processor, but is keen to point out that its homegrown Xuantie C906 processor recently aced the MLPerf Tiny v0.7 benchmark -- a test applied to Internet of Things devices. The company has also pointed out that its home-grown RISC-V kit has already been employed in smart home appliances, automotive applications, and edge computing. [...] The Xuantie C906 uses Alibaba-designed cores that are -- as required for RISC-V users -- available on GitHub.
When the firm has a complete version of Android on RISC-V, it "will be an important step towards China's goal of reducing its reliance on technology that other nations can control with restrictions such as trade bans," notes The Register. "As RISC-V is open source, preventing its flow to China is all but impossible."
EU

EU Joins Mastodon Social Network, Sets Up Its Own Server (pcmag.com) 75

The European Union has joined the social network Mastodon, which has seen a staggering 30,000 new users after Elon Musk's bid for Twitter was accepted. PC Magazine reports: On Thursday, the European Commission said it had set up its own server, dubbed EU Voice, to join Mastodon's decentralized social network, also known as a "Fediverse." The effort is currently only a pilot, but it represents the EU's goal of supporting private and open-source software capable of rivaling mainstream social media platforms such as Twitter, Facebook, and YouTube. On the same day, the European Commission also launched an account for PeerTube, another decentralized platform that revolves around video sharing. "With the pilot launch of EU Voice and EU Video, we aim to offer alternative social media platforms that prioritize individuals and their rights to privacy and data protection," said European Data Protection Supervisor Wojciech Wiewiorowski.

"In concrete terms this means, for example, that EU Voice and EU Video do not rely on transfers of personal data to countries outside the European Union and the European Economic Area; there are no advertisements on the platforms; and there is no profiling of individuals that may use the platforms," he added. "These measures, amongst others, give individuals the choice on and control over how their personal data is used."
Android

North Koreans Are Jailbreaking Phones To Access Forbidden Media (wired.com) 23

An anonymous reader quotes a report from Wired: For most of the world, the common practice of "rooting" or "jailbreaking" a phone allows the device's owner to install apps and software tweaks that break the restrictions of Apple's or Google's operating systems. For a growing number of North Koreans, on the other hand, the same form of hacking allows them to break out of a far more expansive system of control -- one that seeks to extend to every aspect of their lives and minds. On Wednesday, the North Korea-focused human rights organization Lumen and Martyn Williams, a researcher at the Stimson Center think tank's North Korea -- focused 38 North project, together released a report on the state of smartphones and telecommunications in the Democratic People's Republic of Korea, a country that restricts its citizens' access to information and the internet more tightly than any other in the world. The report details how millions of government-approved, Android-based smartphones now permeate North Korean society, though with digital restrictions that prevent their users from downloading any app or even any file not officially sanctioned by the state. But within that regime of digital repression, the report also offers a glimpse of an unlikely new group: North Korean jailbreakers capable of hacking those smartphones to secretly regain control of them and unlock a world of forbidden foreign content.

Learning anything about the details of subversive activity in North Korea -- digital or otherwise -- is notoriously difficult, given the Hermit Kingdom's nearly airtight information controls. Lumen's findings on North Korean jailbreaking are based on interviews with just two defectors from the country. But Williams says the two escapees both independently described hacking their phones and those of other North Koreans, roughly corroborating each others' telling. Other North Korea -- focused researchers who have interviewed defectors say they've heard similar stories. Both jailbreakers interviewed by Lumen and Williams said they hacked their phones -- government-approved, Chinese-made, midrange Android phones known as the Pyongyang 2423 and 2413 -- primarily so that they could use the devices to watch foreign media and install apps that weren't approved by the government. Their hacking was designed to circumvent a government-created version of Android on those phones, which has for years included a certificate system that requires any file downloaded to the device to be "signed" with a cryptographic signature from government authorities, or else it's immediately and automatically deleted. Both jailbreakers say they were able to remove that certificate authentication scheme from phones, allowing them to install forbidden apps, such as games, as well as foreign media like South Korean films, TV shows, and ebooks that North Koreans have sought to access for decades despite draconian government bans.

In another Orwellian measure, Pyongyang phones' government-created operating system takes screenshots of the device at random intervals, the two defectors say -- a surveillance feature designed to instill a sense that the user is always being monitored. The images from those screenshots are then kept in an inaccessible portion of the phone's storage, where they can't be viewed or deleted. Jailbreaking the phones also allowed the two defectors to access and wipe those surveillance screenshots, they say. The two hackers told Lumen they used their jailbreaking skills to remove restrictions from friends' phones, as well. They said they also knew of people who would jailbreak phones as a commercial service, though often for purposes that had less to do with information freedom than more mundane motives. Some users wanted to install a certain screensaver on their phone, for instance, or wipe the phone's surveillance screenshots merely to free up storage before selling the phone secondhand.
As for how the jailbreaking was done, the report says both jailbreakers "described attaching phones to a Windows PC via a USB cable to install a jailbreaking tool."

"One mentioned that the Pyongyang 2423's software included a vulnerability that allowed programs to be installed in a hidden directory. The hacker says they exploited that quirk to install a jailbreaking program they'd downloaded while working abroad in China and then smuggled back into North Korea." The other hacker might've obtained his jailbreaking tool in a computer science group at Pyongyang's elite Kim Il Sung University where he attended.
Apple

Apple Launches Do-It-Yourself Repairs For iPhone 13, iPhone 12 and iPhone SE, But There's a Catch (cnet.com) 58

Apple on Wednesday followed through on its plans to begin publicly releasing repair manuals for some of its products, in addition to selling parts and tools online. The goal, the company said, is to allow iPhone owners an alternative way to repair their devices. From a report: The tech giant's new program, called Self Service Repair, is starting out for US customers with Apple's iPhone 13 line of smartphones, the iPhone 12 and new iPhone SE. Apple said it designed the program to offer adventurous and capable people access to the same parts, tools and instructions it gives to its own certified technicians and partner repair shops, hopefully making it easier for people to repair devices instead of resorting to buying a new one. "We believe we have a responsibility to customers and the environment to offer convenient access to safe, reliable, and secure repairs to help customers get the most out of their devices," the company wrote in a document published Wednesday that outlines its plans. "As the doors open on this new venue, we're underwhelmed, and settling back into our usual skepticism," iFixit posted on Wednesday. The firm adds: The biggest problem? Apple is doubling down on their parts pairing strategy, enabling only very limited, serial number-authorized repairs. You cannot purchase key parts without a serial number or IMEI. If you use an aftermarket part, there's an "unable to verify" warning waiting for you. This strategy hamstrings third-party repair with feature loss and scare tactics and could dramatically limit options for recyclers and refurbishers, short-circuiting the circular economy. As of today, you can buy an official Apple iPhone 12 screen and install it yourself, on your own device, with no fuss. Until now, DIY repairs relied on keeping the Face ID speaker and sensor assembly intact, then very carefully moving it to your new screen, and finally ignoring some gentle warnings. If your assembly was damaged or defective, you were out of luck. The new program will solve that problem -- assuming you've bought an official Apple part.
NASA

NASA's Space Telecoms Network May Soon Be Outsourced (space.com) 23

vm shares a report from Space.com: SpaceX is among companies that might replace services of NASA's aging space telecoms constellation that has kept the International Space Station connected to Earth for decades. For years, NASA's Tracking and Data Relay Satellite (TDRS) constellation has served as the main link between the International Space Station and Earth, providing astronauts with constant connection to ground control as well as the ability to engage with the public and stay in touch with their loved ones. The American space agency, however, plans to retire the six aging satellites in the next decade and hand over their task to commercial companies. This month, the agency announced partnerships with six commercial satellite operators including SpaceX, U.K. company Inmarsat, American Viasat and Switzerland-based SES, to demonstrate how they could take care of NASA's space communication needs in the future. "We don't plan to launch any new TDRS satellites in the future," Eli Naffah, the manager of NASA's Commercial Services Project, who oversees the partnership with the commercial companies, told Space.com. "The plan is to allow the constellation to basically [reach the end of its life]. At some point later in this decade, we are going to have some diminished capability and the plan is for the [commercial companies] to come up with a different way of providing communication services to our missions."

"Back in the 1980s, when we developed TDRS, there really wasn't an ability on the commercial side to be able to provide this service," Naffah said. "But since then, the industry has far outpaced NASA's investment in this area. There's a lot of infrastructure, both on the ground and in orbit that is capable of providing these types of services to a spacecraft. [...] Hopefully, we can achieve some cost efficiencies in buying commercial services, get out of the business of operating networks, and really put more focus on science and exploration." According to Naffah, NASA will invest $278 million into the project over the next five years, with the agency's industry partners contributing a total of about $1.5 billion.
EU

Apple's Grip On iOS Browser Engines Disallowed Under Latest Draft EU Rules (theregister.com) 74

Europe's Digital Markets Act -- near-finalized legislation to tame the internet's gatekeepers -- contains language squarely aimed at ending Apple's iOS browser restrictions. The Register reports: The Register has received a copy of unpublished changes in the proposed act, and among the various adjustments to the draft agreement is the explicit recognition of "web browser engines" as a service that should be protected from anti-competitive gatekeeper-imposed limitations. Apple requires that competing mobile browsers distributed through the iOS App Store use its own WebKit rendering engine, which is the basis of its Safari browser. The result is that Chrome, Edge, and Firefox on iOS are all, more or less, Safari.

That requirement has been a sore spot for years among rivals like Google, Mozilla, and Microsoft. They could not compete on iOS through product differentiation because their mobile browsers had to rely on WebKit rather than their own competing engines. And Apple's browser engine requirement has vexed web developers, who have been limited to using only the web APIs implemented in WebKit for their web apps. Many believe this barrier serves to steer developers toward native iOS app development, which Apple controls.

The extent to which Apple profits from the status quo has prompted regulatory scrutiny in Europe, the UK, the US, and elsewhere. [...] Now those efforts have been translated into the text of the DMA, which, alongside the Digital Services Act (DSA), defines how large technology gatekeepers will be governed in Europe. [...] In short, when the DMA takes effect in 2024, it appears that Apple will be required to allow browser competition on iOS devices.
"The potential for a capable web has been all but extinguished on mobile because Apple has successfully prevented it until now," said Alex Russell, partner program manager on Microsoft Edge who worked previously as Google Chrome's first web standards tech lead. "Businesses and services will be able to avoid building 'apps' entirely when enough users have capable browsers."

"There's a long road between here and there," he added. "Apple has spent enormous amounts to lobby on this, and they aren't stupid. Everyone should expect them to continue to play games along the lines of what they tried in Denmark and South Korea."
Television

UK's Department for Transport Proposes To Allow Drivers To Watch TV on Self-Driving Cars (bbc.com) 47

People using self-driving cars will be allowed to watch television on built-in screens under proposed updates to the Highway Code. From a report: The changes will say drivers must be ready to take back control of vehicles when prompted, the government said. The first use of self-driving technology is likely to be when travelling at slow speeds on motorways, such as in congested traffic. However, using mobile phones while driving will remain illegal.

No self-driving cars are currently allowed on UK roads, but the first vehicles capable of driving themselves could be ready for use later this year, the Department for Transport (DfT) said. The planned changes to the code are expected to come in over the summer. The updates, proposed following public consultation, were described as an interim measure to support the early adoption of the technology and a full regulatory framework is planned to be implemented by 2025.

Classic Games (Games)

What Chinese Scientists Learned Teaching Two Monkeys to Play Pac-Man (msn.com) 23

"What can scientists learn by teaching two monkeys to play Pac-Man?" asks the South China Morning Post.

"Quite a lot it seems, according to researchers at the Chinese Academy of Sciences." A team of neuroscientists from the academy said they used the classic video game to look at the way the primates made decisions. The result was the first study of its kind to show that monkeys were capable of formulating strategies to simplify a sophisticated task, they said. "To our knowledge, this is the first quantitative study that shows animals develop and use strategies for problem solving," Yang Tianming, corresponding author of the study, said on Twitter. The results were published in the peer-reviewed scientific journal eLife last month.

The scientists used artificial intelligence to come up with a statistical model to find out whether the monkey's behaviour could be broken down into a set of strategies.... The monkeys were then trained to use a joystick to manoeuvre Pac-Man around a maze to collect snack pellets and avoid ghosts. The monkeys received fruit juice as a reward instead of earning points. Yang and his colleagues found the monkeys understood the basic elements of the game because they tended to choose the direction with the largest local reward and knew how to react to ghosts in different modes.... More importantly, the researchers found that the monkeys adopted a hierarchical solution for the Pac-Man game by using one dominant strategy and only focusing on a subset of game aspects at a time.

The researchers said the study was significant because it was quantitative and examined complex tasks.... The study said the findings paved the way for further understanding of the neural mechanisms underlying sophisticated cognitive functions.

Plus, teaching monkeys to play Pac-Man sounds like fun.

Though I wonder how they feel about Donkey Kong....
Space

NASA Will Test SpinLaunch's Ability To Fling Satellites Into Orbit (newatlas.com) 85

NASA has signed up to test SpinLaunch's extraordinary whirl 'n' hurl space launch technology, which accelerates a launch vehicle to hypersonic speeds using an electric centrifuge instead of a rocket, hurling it skyward like a space discus. New Atlas reports: The idea behind SpinLaunch is as staggering as the company's name is appropriate. The idea of winding up and throwing satellites most of the way into orbit just boggles the mind. But in initial testing, this company's kinetic launch system, which looks externally a lot like a turbocharger, has shown promise as an environmentally-friendly, and potentially cost-effective replacement for first-stage rocket launches. [T]he company says it'll be appropriate for smaller launch vehicles weighing up to about 440 lb (200 kg), carrying ultra-ruggedized satellites capable of dealing with the forces involved. The SpinLaunch system will do the first part, flinging them high into the air, where a second-stage rocket can take over and give them the final push into orbit.

And the advantages are pretty compelling. SpinLaunch says that eliminating the first-stage rocket from the launch vehicle will cut out some 70 percent of the fuel and structures needed by a traditional launch vehicle, and that it can get appropriate loads into orbit using a quarter of the fuel, and at a tenth of the price. NASA is one of many parties interested in this possibility, and it's now signed a Space Act agreement with SpinLaunch to develop and integrate a NASA payload for this kinetic launch system, which will be flung skyward from Spaceport America, New Mexico, in a test flight later this year.

This, like all SpinLaunch "regular" test flights to date, will be a slower sub-orbital launch with a speed closer to 1,000 mph (1,600 km/h, Mach 1.3) than 5,000 mph. The payload will be designed to take a range of measurements, which will be analyzed by both groups. All non-proprietary information learned from this test will be published, and SpinLaunch says it's working towards its first orbital launch in 2025.
A render posted late last year by SpinLaunch shows how their system works.
Moon

Putin Says Russia Will Resume Lunar Program (arstechnica.com) 190

An anonymous reader quotes a report from Ars Technica: Putin said Russia is working on a "next-generation transport ship," as well as a nuclear-powered space tug. And, according to Russian media reports, Putin added, "We will resume the lunar program." The next-generation ship presumably refers to the "Orel," or Eagle, spacecraft that would be capable of launching cosmonauts into low Earth orbit as well as to the Moon. The problem with this is that Orel, under various guises and names, has been in development for nearly two decades and is likely years away from flying -- if it ever does. And the nuclear-powered space tug is a concept that is years or more likely decades-to-never away from launching.

That leaves the lunar program Putin mentioned. He is referring to a series of three robotic missions planned for launch to the Moon, Luna 25, Luna 26, and Luna 27. These missions, too, have been in the planning stages for a long, long time. Luna 25 was originally scheduled to launch on a Soyuz rocket a decade ago, and its current launch date is now August 2022. There is reason to be skeptical about all of the above happening, because even before the war in Ukraine, Putin significantly slashed Roscosmos' budget. Now, more resources than ever will likely be devoted to the war effort.
Hours after Putin made his announcements, the European Space Agency (ESA) Council agreed to discontinue cooperative activities with Russia on the three Luna missions. "The Russian aggression against Ukraine and the resulting sanctions put in place represent a fundamental change of circumstances and make it impossible for ESA to implement the planned lunar cooperation," the space agency said in a statement.

Instead, the council said it would now work with NASA and its commercial partners.
United States

US Warns New Sophisticated Malware Can Target ICS/SCADA Devices (securityweek.com) 15

wiredmikey writes: The U.S government is sounding a loud alarm after discovering new custom tools capable of full system compromise and disruption of ICS/SCADA devices and servers. A joint advisory from the Department of Energy, CISA, NSA and the FBI warned that unidentified APT actors have created specialized tools capable of causing major damage to PLCs from Schneider Electric and OMRON Corp. and servers from open-source OPC Foundation. Privately owned ICS security firm Dragos issued a separate notice documenting what is now the seventh known industrial control system (ICS)-specific malware. "[This] is a modular ICS attack framework that an adversary could leverage to cause disruption, degradation, and possibly even destruction depending on targets and the environment," the company said.
Displays

E Ink's New Color Electronic Paper Is Fast Enough To Play Videos (gizmodo.com) 57

E Ink has unveiled a new version of its "Kaleido" color e-paper color display capable of playing animations and videos. It can also support displays up to 13.3-inches. Gizmodo reports: Kaleido was followed by Kaleido Plus which offered some key improvements, but it is now being replaced by the freshly announced Kaleido 3. We haven't had a chance to go eyes-on with Kaleido 3 just yet, but according to E Ink, "by optimizing the design of the ePaper module structure, E Ink Kaleido 3 has increased its color saturation by 30 percent compared to the previous generation." That's not a stark contrast on paper (pun intended) and Kaleido 3 still only supports 4,096 colors, but in person, the improvements between versions are usually far more obvious.

E Ink also claims that Kaleido 3, which will be available in three sizes (7.8-inch, 10.3-inch, and 13.3-inch) for everything from e-readers to larger tablets, employs a new front light technology that reduces the amount of blue light bouncing off the screen to make reading easier at night without resorting to warmer color temperature options for the LEDs which would throw off the accuracy of the colors being displayed. The most interesting upgrade with Kaleido 3 is that E Ink claims the responsiveness of the display has been improved which "enables the module to play animations and videos, providing new options for digital reading and writing in educational and professional applications."

Power

Stanford Engineers Invent a Solar Panel That Generates Electricity At Night (interestingengineering.com) 72

Research Sid Assawaworrarit and his colleagues have outfitted an ordinary solar panel with a thermoelectric generator, capable of generating a small amount of electricity from the slight difference in temperature between the ambient air and the surface of a solar panel pointed deep into space. Interesting Engineering reports: "During the day, there's a light coming in from the Sun and hitting the solar cell, but during the night, something of a reverse happens," Assawaworrarit says. That's because solar panels -- like everything warmer than absolute zero -- emit infrared radiation. "There's actually light going out [from the solar panel], and we use that to generate electricity at night. The photons going out into the night sky actually cool down the solar cell," he says.

As those photons leave the skyward surface of the solar panel, they cary heat with them. That means that on a clear night -- when there are no clouds to reflect infrared light back toward the Earth -- the surface of a solar panel will be a few degrees cooler than the air around it. That temperature differential is what Assawaworrarit and his colleagues are taking advantage of. A device called a thermoelectric generator can capture some of the heat flowing from the warmer air to the cooler solar panel and convert it into electricity.

On a clear night, the device Assawaworrarit tested on the Stanford rooftop generates roughly fifty milliwatts for every square meter of solar panel (50 mW/m2). "I think that's probably a record number," he says. But Assawaworrarit and his team aren't stopping there. He says that with a couple of improvements (and in a good location) such a device could generate twice that amount of electricity. "The theoretical limit is probably about one or two watts per square meter," he says. "That's not a huge number, but there are a lot of applications" where that kind of energy at night would come in handy.

OS X

'Infinite Mac' Project Lets You Boot Up Mac OS In Your Browser (arstechnica.com) 10

An anonymous reader quotes a report from Ars Technica: What makes the ["Infinite Mac"] project unique isn't necessarily the fact that it's browser-based; it has been possible to run old DOS, Windows, and Mac OS versions in browser windows for quite a while now. Instead, it's the creative solutions that developer Mihai Parparita has come up with to enable persistent storage, fast download speeds, reduced processor usage, and file transfers between the classic Mac and whatever host system you're running it on. Parparita details some of his work in this blog post.

Beginning with a late 2017 browser-based port of the Basilisk II emulator, Parparita wanted to install old apps to more faithfully re-create the experience of using an old Mac, but he wanted to do it without requiring huge downloads or running as a separate program as the Macintosh.js project does. To solve the download problem, Parparita compressed the disk image and broke it up into 256K chunks that are downloaded on demand rather than up front. "Along with some old fashioned web optimizations, this makes the emulator show the Mac's boot screen in a second and be fully booted in 3 seconds, even with a cold HTTP cache," Parparita wrote.

CPU usage was another issue. Old operating systems and processors didn't really distinguish between active and idle processor states -- your computer was either on or off. So when you emulate these old systems, they'll ramp one of your CPU cores to 100% whether you're actually using the emulator or not. Parparita used existing Basilisk II features to reduce CPU usage, only requiring full performance when "there was user input or a screen refresh was required." Infinite Mac won't run later releases of classic Mac OS (including 8.5, 8.6, and 9) because those releases ran exclusively on PowerPC Macs, dropping support for the old Motorola 68000-based processors. Emulators like QEMU are capable of emulating PowerPC Macs, but (at least as far as I am aware) there are no easy browser-based implementations that exist. Not yet, anyway.

Robotics

Boston Dynamics' Logistics Robot Is Available For Purchase 30

Stretch, a logistics robot from Boston Dynamics that's capable of moving boxes and unloading cargo, is now on sale for anyone who wants to purchase one. Though, as TechCrunch notes, "deliveries are not expected until 2023 and 2024." From the report: The company predictably cites ongoing labor issues as a key driver in interest around the new robot. "Labor shortages and supply chain snags continue to create challenges in keeping the flow of goods moving," says CEO Robert Playter. "Stretch makes logistics operations more efficient and predictable, and it improves safety by taking on one of the most physically demanding jobs in the warehouse. Many of our early adopter customers have already committed to deploying the robot at scale, so we are excited Stretch will soon be put to work more broadly, helping retailers and logistics companies handle the continued surging demand for goods."
The Military

The Drone Operators Who Halted Russian Convoy Headed For Kyiv (theguardian.com) 122

"Ukrainian special forces teamed up with IT professionals on ATV four-wheelers to target the infamous Kiev convoy," writes longtime Slashdot reader darkseid. "Every Help Desk Geek's Walter Mitty fantasy!" The Guardian reports: One week into its invasion of Ukraine, Russia massed a 40-mile mechanized column in order to mount an overwhelming attack on Kyiv from the north. But the convoy of armored vehicles and supply trucks ground to a halt within days, and the offensive failed, in significant part because of a series of night ambushes carried out by a team of 30 Ukrainian special forces and drone operators on quad bikes, according to a Ukrainian commander.

The drone operators were drawn from an air reconnaissance unit, Aerorozvidka, which began eight years ago as a group of volunteer IT specialists and hobbyists designing their own machines and has evolved into an essential element in Ukraine's successful David-and-Goliath resistance. [...] The unit's commander, Lt Col Yaroslav Honchar, gave an account of the ambush near the town of Ivankiv that helped stop the vast, lumbering Russian offensive in its tracks. He said the Ukrainian fighters on quad bikes were able to approach the advancing Russian column at night by riding through the forest on either side of the road leading south towards Kyiv from the direction of Chernobyl.

The Ukrainian soldiers were equipped with night vision goggles, sniper rifles, remotely detonated mines, drones equipped with thermal imaging cameras and others capable of dropping small 1.5kg bombs. "This one little unit in the night destroyed two or three vehicles at the head of this convoy, and after that it was stuck. They stayed there two more nights, and [destroyed] many vehicles," Honchar said. The Russians broke the column into smaller units to try to make headway towards the Ukrainian capital, but the same assault team was able to mount an attack on its supply depot, he claimed, crippling the Russians' capacity to advance. "The first echelon of the Russian force was stuck without heat, without oil, without bombs and without gas. And it all happened because of the work of 30 people," Honchar said.
"The Aerorozvidka unit also claims to have helped defeat a Russian airborne attack on Hostomel airport, just north-west of Kyiv, in the first day of the war," adds the Guardian. Similar to the convoy ambush, they "[used] drones to locate, target and shell about 200 Russian paratroopers concealed at one end of the airfield."
The Military

Russian Troops' Tendency to Talk on Unsecured Lines is Proving Costly (sfgate.com) 263

The Washington Post reports Russian troops in Ukraine "have relied, with surprising frequency, on unsecured communication devices such as smartphones and push-to-talk radios."

But this is leaving Russia's units "vulnerable to targeting...further underscoring the command-and-control deficiencies that have come to define Moscow's month-long invasion, observers say." The Russian military possesses modern equipment capable of secure transmission, but troops on the battlefield have reached for simpler-to-use but less-secure lines because of uneven discipline across the ranks, an apparent lack of planning for conducting a sustained fight over long distances, and Russian attacks on Ukraine's communication infrastructure that it, too, has relied on, experts say.

A European intelligence official, speaking on the condition of anonymity to discuss NATO's battlefield assessments, said that since the invasion began in late-February, there have been multiple instances of Russian commanders confiscating their subordinates' personal phones for fear they would unwittingly give away a unit's location.... There is evidence that the United States and other NATO countries have provided Ukrainian forces with electronic warfare equipment capable of interrupting Russian transmissions and allowing them to target Russian command posts, said Kostas Tigkos, a Russian military expert at the defense analysis firm Janes Group. By destroying Russia's communication nodes, the Ukrainians could pressure their adversaries to use less-secure equipment, he said, increasing the likelihood their conversations will be intercepted or their positions triangulated....

There is anecdotal evidence that Russia's unsecured communications have led to battlefield losses. One Russian general was purportedly killed in an airstrike after his cellphone was detected by the Ukrainians, the New York Times reported earlier this month.

The Post reports that Russian military transmissions over unsecured lines are now even being listened to by amateur radio enthusiasts at online sites like WebSDR (a software-defined radio receiver connected to the internet).

"Don't say the last names on air!" one Russian service member was apparently overheard saying by Shadow Break International, a U.K.-based open-source intelligence consultancy.
Classic Games (Games)

Man Creates Entire Game of Pong Inside a Single Commodore 64 Sprite (neowin.net) 67

"Pong on a Commodore 64 is one thing... but Pong in a single C64 sprite? That's uncharted territory," writes Slashdot reader segaboy81.

Neowin reports: The Commodore 64 is an iconic machine. For many of us boomers, it was our introduction to programming... Josip Retro Bits is a YouTube channel that specializes in fun challenges on old hardware like the Commodore 64. In an older video, Josip creates a game of Pong using Basic. On the surface, this doesn't sound very interesting, but it's a real challenge because Basic is very limited when compared to writing machine code. Basically, the C64 is perfectly capable of a game like Pong, but not really in Basic. Spoiler alert: he does it. However, a commenter on that video had a novel idea. How about creating an entire game of Pong in a single spite?
That's a 24 x 21 pixels object. ("It can be seen as a bigger programmable character that can be moved on hardware on steps of one pixel," explains one tech blog.) And another spoiler alert: he does it again.

Here's the repository for the "Tiny Pong" code. It's written in C, with functions like drawScreen() and batSound().

And about 18 minutes into the video, he not only plays a game of Pong inside the sprite — he simultaneously makes that sprite move around the screen like the ball in a game of Pong.
Crime

UK Police Arrest 7 People In Connection With Lapsus$ Hacks (techcrunch.com) 9

An anonymous reader quotes a report from TechCrunch: Police in the United Kingdom have arrested seven people over suspected connections to the Lapsus$ hacking group, which has in recent weeks targeted tech giants including Samsung, Nvidia, Microsoft and Okta. In a statement given to TechCrunch, Detective Inspector Michael O'Sullivan from the City of London Police said: "The City of London Police has been conducting an investigation with its partners into members of a hacking group. Seven people between the ages of 16 and 21 have been arrested in connection with this investigation and have all been released under investigation. Our enquiries remain ongoing."

News of the arrests comes just hours after a Bloomberg report revealed a teenager based in Oxford, U.K. is suspected of being the mastermind of the now-prolific Lapsus$ hacking group. Four researchers investigating the gang's recent hacks said they believed the 16-year-old, who uses the online moniker "White" or "Breachbase," was a leading figure in Lapsus$, and Bloomberg was able to track down the suspected hacker after his personal information was leaked online by rival hackers. TechCrunch has seen a copy of the the suspected hacker's leaked personal information, which we are not sharing -- but it matches Bloomberg's reporting. City of London Police, which primarily focuses on financial crimes, did not say if the 16-year-old was among those arrested.

At least one member of Lapsus$ was also apparently involved with a recent data breach at Electronic Arts, according to [security reporter Brian Krebs], and another is suspected to be a teenager residing in Brazil. The latter is said to be so capable of hacking that researchers first believed that the activity they were witnessing was automated. Researchers' ability to track the suspected Lapsus$ members may be because the group, which now has more than 45,000 subscribers to its Telegram channel where it frequently recruits insiders and leaks victims' data, does little to cover its tracks. In a blog post this week, Microsoft said the group uses brazen tactics to gain initial access to a target organization, which has included publicly recruiting company insiders. As reported by Bloomberg this week, the group has even gone as far as to join the Zoom calls of companies they've breached and taunted employees trying to clean up their hack.

Google

Google's CTO of Android Tablets Sees Tablet Sales Passing Laptops 'in the Not Too Distant Future' (theverge.com) 45

An anonymous reader shares a report: After seemingly forgetting that Android tablets existed for a while, Google is suddenly very invested in the market. Android 12L is in development to support larger-screened devices, and one of the platform's co-founders, Rich Miner, has rejoined the team with the title "CTO of Android tablets." Now, speaking to developers during an episode of Google's The Android Show, Miner explained the opportunity the company is seeing. [...] The other reason he cites is that tablets can be "very capable, less expensive than a laptop." That spurred Google's work on Android 12L to optimize its system UI for use on bigger devices, as well as the way it formats apps to fit on big screens.

Miner is making the pitch for developers to look at their apps and consider taking advantage of the tools Google's building to improve tablet support or even building apps that approach the market as a tablet-first experience. He points to 2020 sales data, where "tablet purchases actually started to approach the number of laptop shipments... I actually think there's going to be a crossover point at some point in the not too distant future where there are more tablets sold annually than there are laptops. I think once you cross over that point, you're not going to be coming back."

Slashdot Top Deals