×
Operating Systems

Windows 11 Is Getting the Ability To Run Win32 Apps In Isolation (xda-developers.com) 63

At its Build 2023 conference this week, Microsoft announced Windows 11 will soon be able to run Win32 apps in isolation mode. XDA Developers reports: Starting [today], Microsoft is launching a preview of Win32 apps in isolation for Windows 11 customers. As the name suggests, it will allow users to run Win32 apps in an isolated environment so that they can be sandboxed from the rest of the operating system in order to further strengthen security. The idea is to leverage Windows 11's isolation capabilities to run Win32 apps in an environment where they don't have access to critical Windows components and subsystems. This will ensure that if someone runs a compromised Win32 app in isolation, it will be very difficult for an attacker to break through the sandbox and penetrate the rest of the system. This capability will be available in public preview for both enterprise customers and consumers.
Transportation

AM Radio to Be Dropped in All Ford New Models Except Commercial Vehicles (freep.com) 145

It's not just the Ford Mustang that's losing its AM radio. The Detroit Free Press reports: "We are transitioning from AM radio for most new and updated 2024 models," Ford spokesman Wes Sherwood told the Free Press. "A majority of U.S. AM stations, as well as a number of countries and automakers globally, are modernizing radio by offering internet streaming through mobile apps, FM, digital and satellite radio options. Ford will continue to offer these alternatives for customers to hear their favorite AM radio music, news and podcasts as we remove amplitude modulation — the definition of AM in this case — from most new and updated models we bring to market." Commercial vehicles will continue to offer AM radio because of longstanding contract language, Sherwood said....

"In essence, EV motors generate a lot of electromagnetic interference that affects the frequencies of AM radio and make it difficult to get a clear signal," said Mike Ramsey, an analyst with Stamford, Connecticut-based Gartner Research Group, which specializes in digital transformation and innovation. "It could be shielded, but given the diminishing listening habits to AM, the automakers haven't chosen to do it. Most of the content there is available through other means, including podcast and internet streaming. In my view, this isn't that different from automakers discontinuing 8-track players, cassette players and CD players. Technology has advanced. The idea that it is a critical safety channel is a bit suspect given that almost all critical communication now is sent through mobile phones...."

Veteran analyst John McEloy, host of "Autoline After Hours" webcast and podcast said automakers don't need to get rid of AM radio. "It's happening because automakers would love to get rid of the cost of an AM radio," he told the Free Press. "Some of them, like Ford, are using EVs as an excuse to get rid of it. GM shields its AM radios in its electric cars to they don't get any interference."

But the article also quotes a spokesperson for GM saying they're "evaluating AM radio on future vehicles and not providing any further details at this time."

Last month U.S. Senator Markey noted that seven more top automakers have already removed AM radio from their electric vehicles — BMW, Mazda, Polestar, Rivian, Tesla, Volkswagen, and Volvo.
Cloud

US Plans More Regulations to Improve Cloud Security (politico.com) 12

Politico reports: Governments and businesses have spent two decades rushing to the cloud — trusting some of their most sensitive data to tech giants that promised near-limitless storage, powerful software and the knowhow to keep it safe.

Now the White House worries that the cloud is becoming a huge security vulnerability.

So it's embarking on the nation's first comprehensive plan to regulate the security practices of cloud providers like Amazon, Microsoft, Google and Oracle, whose servers provide data storage and computing power for customers ranging from mom-and-pop businesses to the Pentagon and CIA.... Among other steps, the Biden administration recently said it will require cloud providers to verify the identity of their users to prevent foreign hackers from renting space on U.S. cloud servers (implementing an idea first introduced in a Trump administration executive order). And last week the administration warned in its national cybersecurity strategy that more cloud regulations are coming — saying it plans to identify and close regulatory gaps over the industry....

So far, cloud providers have haven't done enough to prevent criminal and nation-state hackers from abusing their services to stage attacks within the U.S., officials argued, pointing in particular to the 2020 SolarWinds espionage campaign, in which Russian spooks avoided detection in part by renting servers from Amazon and GoDaddy. For months, they used those to slip unnoticed into at least nine federal agencies and 100 companies. That risk is only growing, said Rob Knake, the deputy national cyber director for strategy and budget. Foreign hackers have become more adept at "spinning up and rapidly spinning down" new servers, he said — in effect, moving so quickly from one rented service to the next that new leads dry up for U.S. law enforcement faster than it can trace them down.

On top of that, U.S. officials express significant frustration that cloud providers often up-charge customers to add security protections — both taking advantage of the need for such measures and leaving a security hole when companies decide not to spend the extra money. That practice complicated the federal investigations into the SolarWinds attack, because the agencies that fell victim to the Russian hacking campaign had not paid extra for Microsoft's enhanced data-logging features.... Part of what makes that difficult is that neither the government nor companies using cloud providers fully know what security protections cloud providers have in place. In a study last month on the U.S. financial sector's use of cloud services, the Treasury Department found that cloud companies provided "insufficient transparency to support due diligence and monitoring" and U.S. banks could not "fully understand the risks associated with cloud services."

Programming

Google's Go May Add Telemetry That's On By Default (theregister.com) 75

Russ Cox, a Google software engineer steering the development of the open source Go programming language, has presented a possible plan to implement telemetry in the Go toolchain. However many in the Go community object because the plan calls for telemetry by default. The Register reports: These alarmed developers would prefer an opt-in rather than an opt-out regime, a position the Go team rejects because it would ensure low adoption and would reduce the amount of telemetry data received to the point it would be of little value. Cox's proposal summarized lengthier documentation in three blog posts.

Telemetry, as Cox describes it, involves software sending data from Go software to a server to provide information about which functions are being used and how the software is performing. He argues it is beneficial for open source projects to have that information to guide development. And the absence of telemetry data, he contends, makes it more difficult for project maintainers to understand what's important, what's working, and to prioritize changes, thereby making maintainer burnout more likely. But such is Google's reputation these days that many considering the proposal have doubts, despite the fact that the data collection contemplated involves measuring the usage of language features and language performance. The proposal isn't about the sort of sensitive personal data vacuumed up by Google's ad-focused groups.
"Now you guys want to introduce telemetry into your programming language?" IT consultant Jacob Weisz said. "This is how you drive off any person who even considered giving your project a chance despite the warning signs. Please don't do this, and please issue a public apology for even proposing it. Please leave a blast radius around this idea wide enough that nobody even suggests trying to do this again."

He added: "Trust in Google's behavior is at an all time low, and moves like this are a choice to shove what's left of it off the edge of a cliff."

Meanwhile, former Google cryptographer and current open source maintainer Filippo Valsorda said in a post to Mastodon: "This is a large unconventional design, there are a lot of tradeoffs worth discussing and details to explore," he wrote. "When Russ showed it to me I made at least a dozen suggestions and many got implemented."

"Instead: all opt-out telemetry is unethical; Google is evil; this is not needed. No one even argued why publishing any of this data could be a problem."
United States

US Blacklists More Chinese Tech Companies (bloomberg.com) 66

The US government is blacklisting Yangtze Memory Technologies, Shanghai Micro Electronics Equipment Group and dozens of other Chinese tech companies, ratcheting up a trade conflict between the world's two largest economies. From a report: The Department of Commerce is placing the companies on the so-called entity list, meaning that anyone seeking to supply them with US technology will require a license from Washington -- something that will likely be difficult to get. Bloomberg News previously reported that the US was preparing to add the companies to the list. The latest restrictions are part of a push to limit China's access to advanced chipmaking and artificial intelligence technology, which the US wants to keep away from the Asian nation's military. In October, the Biden administration unveiled sweeping measures that limit what US companies can sell to the country -- and it's been pushing for allies to go along with the plan.

The idea is to severely restrict China's "ability to leverage artificial intelligence, advanced computing, and other powerful, commercially available technologies for military modernization and human rights abuses," Under Secretary of Commerce for Industry and Security Alan Estevez said in a statement. "This work will continue, as will our efforts to detect and disrupt Russia's efforts to obtain necessary items and technologies for its brutal war against Ukraine, including from Iran." Yangtze Memory and Shanghai Micro were added to the list out of concern that they'll work with Huawei, Hangzhou Hikvision Digital Technology and other companies that the US has decided are either a risk to national security or support oppression by the Chinese government. The two companies are key to China's efforts to build a domestic chipmaking business and wean itself off imports, particularly those from the US. In all, 36 companies are joining the entity list.

Science

Why the Laws of Physics Don't Actually Exist (newscientist.com) 177

Theoretical physicist Sankar Das Sarma wrote a thought-provoking essay for New Scientist magazine's Lost in Space-Time newsletter: I was recently reading an old article by string theorist Robbert Dijkgraaf in Quanta Magazine entitled "There are no laws of physics". You might think it a bit odd for a physicist to argue that there are no laws of physics but I agree with him. In fact, not only do I agree with him, I think that my field is all the better for it. And I hope to convince you of this too.

First things first. What we often call laws of physics are really just consistent mathematical theories that seem to match some parts of nature. This is as true for Newton's laws of motion as it is for Einstein's theories of relativity, Schrödinger's and Dirac's equations in quantum physics or even string theory. So these aren't really laws as such, but instead precise and consistent ways of describing the reality we see. This should be obvious from the fact that these laws are not static; they evolve as our empirical knowledge of the universe improves.

Here's the thing. Despite many scientists viewing their role as uncovering these ultimate laws, I just don't believe they exist.... I know from my 40 years of experience in working on real-life physical phenomena that the whole idea of an ultimate law based on an equation using just the building blocks and fundamental forces is unworkable and essentially a fantasy. We never know precisely which equation describes a particular laboratory situation. Instead, we always have to build models and approximations to describe each phenomenon even when we know that the equation controlling it is ultimately some form of the Schrödinger equation!

Even with quantum mechanics, space and time are variables that have to be "put in by hand," the article argues, "when space and time should come out naturally from any ultimate law of physics. This has remained perhaps the greatest mystery in fundamental physics with no solution in sight...."

"It is difficult to imagine that a thousand years from now physicists will still use quantum mechanics as the fundamental description of nature.... I see no particular reason that our description of how the physical universe seems to work should reach the pinnacle suddenly in the beginning of the 21st century and become stuck forever at quantum mechanics. That would be a truly depressing thought...!"

"Our understanding of the physical world must continue indefinitely, unimpeded by the search for ultimate laws. Laws of physics continuously evolve — they will never be ultimate."

Thanks to long-time Slashdot reader InfiniteZero for sharing the article!
AI

Why Mastering Language Is So Difficult For AI (undark.org) 75

Long-time Slashdot reader theodp writes: UNDARK has an interesting interview with NYU professor emeritus Gary Marcus (PhD in brain and cognitive sciences, MIT) about Why Mastering Language Is So Difficult for AI. Marcus, who has had a front-row seat for many of the developments in AI, says we need to take AI advances with a grain of salt.

Starting with GPT-3, Marcus begins, "I think it's an interesting experiment. But I think that people are led to believe that this system actually understands human language, which it certainly does not. What it really is, is an autocomplete system that predicts next words and sentences. Just like with your phone, where you type in something and it continues. It doesn't really understand the world around it.

"And a lot of people are confused by that. They're confused by that because what these systems are ultimately doing is mimicry. They're mimicking vast databases of text. And I think the average person doesn't understand the difference between mimicking 100 words, 1,000 words, a billion words, a trillion words — when you start approaching a trillion words, almost anything you can think of is already talked about there. And so when you're mimicking something, you can do that to a high degree, but it's still kind of like being a parrot, or a plagiarist, or something like that. A parrot's not a bad metaphor, because we don't think parrots actually understand what they're talking about. And GPT-3 certainly does not understand what it's talking about."

Marcus also has cautionary words about Google's LaMDA ("It's not sentient, it has no idea of the things that it is talking about."), driverless cars ("Merely memorizing a lot of traffic situations that you've seen doesn't convey what you really need to understand about the world in order to drive well"), OpenAI's DALL-E ("A lot of AI right now leverages the not-necessarily-intended contributions by human beings, who have maybe signed off on a 'terms of service' agreement, but don't recognize where this is all leading to"), and what's motivating the use of AI at corporations ("They want to solve advertisements. That's not the same as understanding natural language for the purpose of improving medicine. So there's an incentive issue.").

Still, Marcus says he's heartened by some recent AI developments: "People are finally daring to step out of the deep-learning orthodoxy, and finally willing to consider "hybrid" models that put deep learning together with more classical approaches to AI. The more the different sides start to throw down their rhetorical arms and start working together, the better."

Mars

Experts Call For Trip To Venus Before Crewed Mission To Mars (theguardian.com) 125

Noam Izenberg, a researcher at the Johns Hopkins University's applied physics laboratory, is making a case for sending a crewed mission to examine Venus en route to Mars. "Venus gets a bad rap because it's got such a difficult surface environment," said Izenberg in a report presented at the International Astronautical Congress in Paris last week. "The current Nasa paradigm is moon-to-Mars. We're trying to make the case for Venus as an additional target on that pathway." The Guardian reports: There are notable downsides. Walking on the surface would be an unsurvivable experience, so astronauts would have to gaze down at the planet from the safety of their spacecraft in a flyby mission. In its favor, however, Venus is significantly closer, making a return mission doable in a year, compared with a potentially three-year roundtrip to Mars. A flyby would be scientifically valuable and could provide crucial experience of a lengthy deep-space mission as a precursor to visiting Mars, according to a report presented at the International Astronautical Congress (IAC) in Paris last week.

Izenberg said there were practical arguments for incorporating a Venus flyby into the crewed Mars landing that Nasa hopes to achieve by the late 2030s. Although the planet is in the "wrong" direction, performing a slingshot around Venus -- known as a gravity assist - could reduce the travel time and the fuel required to get to the red planet. That would make a crewed flyby trip to Venus a natural stepping stone towards Nasa's ultimate goal. "You'd be learning about how people work in deep space, without committing yourself to a full Mars mission," he said. "And it's not just going out into the middle of nowhere -- it would have a bit of cachet as you'd be visiting another planet for the first time." "We need to understand how we can get out of the cradle and move into the universe," he added.

There is also renewed scientific interest in Venus. The discovery of thousands of exoplanets raises the question of how many might be habitable, and scientists want to understand how and why Venus, a planet so similar to our own in size, mass and distance from the sun, ended up with infernal surface conditions. Izenberg said a Venus flyby "doesn't yet have traction" in the broader space travel community, although there are advocates within Nasa, including its chief economist, Alexander Macdonald, who led the IAC session.
Of course, there are those who push back against such an idea. "It's really not a nice place to go. It's a hellish environment and the thermal challenges for a human mission would be quite considerable," said Prof Andrew Coates, a space scientist at UCL's Mullard space science laboratory.

He said Venus was rightly a focus of scientific exploration, but that "a human flyby really wouldn't add very much."
Bug

Google's New Bug Bounties Include Their Custom Linux Kernel's Experimental Security Mitigations (theregister.com) 5

Google uses Linux "in almost everything," according to the leader of Google's "product security response" team — including Chromebooks, Android smartphones, and even Google Cloud.

"Because of this, we have heavily invested in Linux's security — and today, we're announcing how we're building on those investments and increasing our rewards." In 2020, we launched an open-source Kubernetes-based Capture-the-Flag (CTF) project called, kCTF. The kCTF Vulnerability Rewards Program lets researchers connect to our Google Kubernetes Engine (GKE) instances, and if they can hack it, they get a flag, and are potentially rewarded.

All of GKE and its dependencies are in scope, but every flag caught so far has been a container breakout through a Linux kernel vulnerability.

We've learned that finding and exploiting heap memory corruption vulnerabilities in the Linux kernel could be made a lot harder. Unfortunately, security mitigations are often hard to quantify, however, we think we've found a way to do so concretely going forward....

First, we are indefinitely extending the increased reward amounts we announced earlier this year, meaning we'll continue to pay $20,000 — $91,337 USD for vulnerabilities on our lab kCTF deployment to reward the important work being done to understand and improve kernel security. This is in addition to our existing patch rewards for proactive security improvements.

Second, we're launching new instances with additional rewards to evaluate the latest Linux kernel stable image as well as new experimental mitigations in a custom kernel we've built. Rather than simply learning about the current state of the stable kernels, the new instances will be used to ask the community to help us evaluate the value of both our latest and more experimental security mitigations. Today, we are starting with a set of mitigations we believe will make most of the vulnerabilities (9/10 vulns and 10/13 exploits) we received this past year more difficult to exploit. For new exploits of vulnerabilities submitted which also compromise the latest Linux kernel, we will pay an additional $21,000 USD. For those which compromise our custom Linux kernel with our experimental mitigations, the reward will be another $21,000 USD (if they are clearly bypassing the mitigations we are testing). This brings the total rewards up to a maximum of $133,337 USD.

We hope this will allow us to learn more about how hard (or easy) it is to bypass our experimental mitigations.....

With the kCTF VRP program, we are building a pipeline to analyze, experiment, measure and build security mitigations to make the Linux kernel as safe as we can with the help of the security community. We hope that, over time, we will be able to make security mitigations that make exploitation of Linux kernel vulnerabilities as hard as possible.

"We don't care about vulnerabilities; we care about exploits," Vela told the Register. "We expect the vulnerabilities are there, they will get patched, and that's nice and all. But the whole idea is what do to beyond just patching a couple of vulnerabilities." In total, Google paid out $8.7 million in rewards to almost 700 researchers across its various VPRs last year. "We are just one actor in the whole community that happens to have economic resources, financial resources, but we need the community to help us make the Kernel better," Vela said.

"If the community is engaged and helps us validate the mitigations that we have, then, we will continue growing on top of that. But the whole idea is that we need to see where the community wants us to go with this...."

[I]t's not always about the cash payout, according to Vela, and different bug hunters have different motivations. Some want money, some want fame and some just want to solve an interesting problem, Vela said. "We are trying to find the right combination to captivate people."

Movies

Live-Action Pac-Man Movie In the Works (hollywoodreporter.com) 66

A live-action film based on PAC-MAN is in the works from Bandai Namco Entertainment -- the company behind PAC-MAN -- and Wayfarer Studios, the production company founded by Justin Baldoni and Steve Sarowitz. The Hollywood Reporter reports: First introduced in the U.S. in 1980 -- and originally called Puck Man in Japan -- PAC-MAN became a coin-operated staple. The game is set in mazes where Pac-Man has to eat pellets while being pursued by colorful ghosts as the mazes get progressively more difficult. The game begat merchandise, several sequel games like Ms. PAC-MAN, as well as two television series, including a Hanna-Barbera produced ABC series and a Disney XD take.

The project will be based on an original idea from Chuck Williams (Sonic the Hedgehog) of Lightbeam Entertainment. Baldoni, Manu Gargi and Andrew Calof will produce on behalf of Wayfarer Studios, with Tracy Ryerson developing; Williams and Tim Kwok will produce on behalf of Lightbeam.

Businesses

Podcast Guests Are Paying Up To $50,000 To Appear on Popular Shows (bloomberg.com) 30

People will confess all sorts of things to podcasters, from their unpopular political beliefs or embarrassing romantic mishaps to their worst fears. But there's one revelation certain guests will never disclose -- namely, that they're paying thousands of dollars just to be interviewed on the show. From a report: Welcome to the golden era of pay-for-play podcasting, when guests pay handsomely to be interviewed for an entire episode. In exchange, the host gets some revenue, fills out the programming calendar, and might bag a future advertiser. Determining exactly how widespread the practice is can be tricky. Disclosures, if included at all, might last only a few fleeting seconds in an hourlong interview, and various hosts use different language to describe the nature of such relationships. What percentage of shows accepts payment in exchange for airtime is also difficult to say. According to nearly a dozen interviews with industry sources, it appears the practice is particularly popular among podcasts in the wellness, cryptocurrency, and business arenas.

In an age when social media influencers routinely get paid for mentioning a brand in an Instagram post or YouTube video, this marriage of convenience shouldn't come as a complete shock. Still, not everyone thinks it's a good idea. "As someone who's making money for that type of advertorial content, it should be disclosed," says Craig Delsack, a New York-based media lawyer. "It's just good practice and builds trust with the podcaster. It can't be the Wild West." US regulators also agree that consumers might be misled when they don't know a media mention only occurred in exchange for compensation. Even so, the phenomenon appears to be thriving in podcasting. Online platform Guestio has raised more than $1 million to build a marketplace devoted entirely to brokering paid guest appearances. On Guestio, the flow of money sometimes reverses direction, and a podcaster provides payment to land a particularly coveted guest such as boxer Manny Pacquiao, who charges $15,000 for an appearance.

Privacy

A New Attack Can Unmask Anonymous Users On Any Major Browser (wired.com) 58

An anonymous reader quotes a report from Wired: [R]esearchers from the New Jersey Institute of Technology are warning this week about a novel technique attackers could use to de-anonymize website visitors and potentially connect the dots on many components of targets' digital lives. The findings (PDF), which NJIT researchers will present at the Usenix Security Symposium in Boston next month, show how an attacker who tricks someone into loading a malicious website can determine whether that visitor controls a particular public identifier, like an email address or social media account, thus linking the visitor to a piece of potentially personal data.

When you visit a website, the page can capture your IP address, but this doesn't necessarily give the site owner enough information to individually identify you. Instead, the hack analyzes subtle features of a potential target's browser activity to determine whether they are logged into an account for an array of services, from YouTube and Dropbox to Twitter, Facebook, TikTok, and more. Plus the attacks work against every major browser, including the anonymity-focused Tor Browser. "If you're an average internet user, you may not think too much about your privacy when you visit a random website," says Reza Curtmola, one of the study authors and a computer science professor at NJIT. "But there are certain categories of internet users who may be more significantly impacted by this, like people who organize and participate in political protest, journalists, and people who network with fellow members of their minority group. And what makes these types of attacks dangerous is they're very stealthy. You just visit the website and you have no idea that you've been exposed."

How this de-anonymization attack works is difficult to explain but relatively easy to grasp once you have the gist. Someone carrying out the attack needs a few things to get started: a website they control, a list of accounts tied to people they want to identify as having visited that site, and content posted to the platforms of the accounts on their target list that either allows the targeted accounts to view that content or blocks them from viewing it -- the attack works both ways. Next, the attacker embeds the aforementioned content on the malicious website. Then they wait to see who clicks. If anyone on the targeted list visits the site, the attackers will know who they are by analyzing which users can (or cannot) view the embedded content. [...] Complicated as it may sound, the researchers warn that it would be simple to carry out once attackers have done the prep work. It would only take a couple of seconds to potentially unmask each visitor to the malicious site -- and it would be virtually impossible for an unsuspecting user to detect the hack. The researchers developed a browser extension that can thwart such attacks, and it is available for Chrome and Firefox. But they note that it may impact performance and isn't available for all browsers.

Medicine

The Video Game Prescribed By Doctors To Treat ADHD 29

An anonymous reader quotes a report from the BBC: In 2020 [EndeavorRx] became the first such game to be approved by the US Food and Drug Administration (FDA) for use in the treatment of ADHD in children. Currently only available on prescription from doctors in the US, EndeavorRx at first glance looks very similar to countless other games. You control a little alien that races on a spaceship through different worlds having to collect things. But the app-based game was developed in conjunction with neuroscientists, and is designed to stimulate and improve areas of the brain that play a key role in attention function. The idea is that it trains a child with ADHD to both better multitask and ignore distractions, with a computer algorithm measuring his or her performance and customizing the difficulty of the game in real time. When doctors prescribe it, the child's parents get sent an activation link that is needed before the game will play.

Eddie Martucci, chief executive of Akili, the Boston-based tech firm behind EndeavorRx, says the game has been designed to boost cognitive progressing. "It is something that's very difficult to get through molecular means, like taking a pill. But it turns out that sensory stimuli can actually directly stimulate parts of the brain controlling cognitive function." His company now plans to launch the game in Europe in the next few years.
Akili is one of only a handful of companies with clearance to offer a digital therapeutic as a prescription for medical conditions. Late last year, the FDA approved a virtual reality-based treatment for children with the visual disorder amblyopia, or lazy eye.
Mars

NASA Funds a Robot That Could Explore the Caves of Mars (cnn.com) 11

CNN reports that a professor and his students at Stanford's Autonomous Systems Lab have received "phase II" funding from NASA's Innovative Advanced Concepts Program (which supports space robotics research) after proving the feasibility of their plan for robots to crawl through space caves. "The team will use the next two years to work on 3D simulations, a robot prototype, develop strategies that help the robot avoid risk, and test out [their cave robot] in a realistic mission environment — likely a cave site in New Mexico or California."

One of the students explains to CNN that "Caves are risky environments, but they're scientifically interesting. Our idea for this robot is to go far before people would get there to do interesting science and scope out the area."

CNN explains why space caves are so crucial: New research suggests that the best chance of finding past or present evidence of life on Mars requires going below its surface — at least 6.6 feet (2 meters) below. Mars has an incredibly thin atmosphere, which means that the surface of the red planet is bombarded by high energy radiation from space, and that could quickly degrade substances like amino acids that provide fragile evidence of life. Those harsh surface conditions also present a challenge for astronauts, which is one reason scientists have suggested that caves on other planets could be the key to future exploration. Vast cave systems on the moon and Mars could act as shelters for future space travelers.

Caves could also contain resources like water, reveal more about the history of a planet — and be havens for evidence of microbial life. On Earth, there are a varied range of cave systems, many of which remain unexplored, and they support diverse groups of microorganisms. But caves are dangerous — and since we've never peered inside a Martian cave, it's difficult to know what to expect.

The cave robot would presumably to be equipped with cameras, microscopes and LIDAR remote sensing, and the team envisions it will be tethered to a power-supplying rover on the surface.

One team member even told CNN the robots could be adapted to perform maintenance and upkeep on the planned "Gateway" lunar outpost between Earth and the moon.
Worms

'Superworms' Can Digest Styrofoam, Australian Scientists Find (bloomberg.com) 54

An anonymous reader quotes a report from Bloomberg: Scientists in Australia have discovered that superworms can live and even grow on a diet of only polystyrene, also known colloquially as Styrofoam. Superworm is a common name for the larval stages of the darkling beetle (Zophobas morio). The researchers described their finding as a "first step" in discovering natural enzymes that could be used to recycle this type of plastic. "We envision that polystyrene waste will be collected, mechanically shredded, and then degraded in bioreactors with an enzyme cocktail," said Chris Rinke, a scientist at the University of Queensland and an author of a paper published on Thursday in the journal Microbial Genomics.

In recent years, scientists globally have been looking for microorganisms that can digest plastic, which is how natural materials like wood biodegrade. The idea is that some kind of enzyme engineered from the gut of an insect or bacteria could be used to digest difficult-to-recycle plastic so it could be made into new plastic products, which would reduce the need for virgin plastic. Used for things such as coffee cups and packing peanuts, polystyrene is one of the most common plastics in production. It accounts for "up to 7-10% of the total non-fibre plastic production," according to the paper.

Experimenters divided worms into three groups and fed each a different diet: bran, polystyrene or a starvation diet. The worms that lived on polystyrene were not as healthy as those eating bran, but they were able to eat the Styrofoam and gain weight and complete their life cycle. However, the report also found that the diet had "negative impacts on host gut microbiome diversity and health" of the worms. In other words, they could eat plastics, but it had a cost to them. It would theoretically be possible to keep thousands of worms in an industrial setting to digest plastics. But the researchers say their next goal is to identify and enhance the enzyme the worms use for future applications.

Social Networks

Can Tech Firms Prevent Violent Videos Circulating on the Internet? (theguardian.com) 116

This week New York's attorney general announced they're officially "launching investigations into the social media companies that the Buffalo shooter used to plan, promote, and stream his terror attack." Slashdot reader echo123 points out that Discord confirmed that roughly 30 minutes before the attack a "small group" was invited to join the shooter's server. "None of the people he invited to review his writings appeared to have alerted law enforcement," reports the New York Times., "and the massacre played out much as envisioned."

But meanwhile, another Times article tells a tangentially-related story from 2019 about what ultimately happened to "a partial recording of a livestream by a gunman while he murdered 51 people that day at two mosques in Christchurch, New Zealand." For more than three years, the video has remained undisturbed on Facebook, cropped to a square and slowed down in parts. About three-quarters of the way through the video, text pops up urging the audience to "Share THIS...." Online writings apparently connected to the 18-year-old man accused of killing 10 people at a Buffalo, New York, grocery store Saturday said that he drew inspiration for a livestreamed attack from the Christchurch shooting. The clip on Facebook — one of dozens that are online, even after years of work to remove them — may have been part of the reason that the Christchurch gunman's tactics were so easy to emulate.

In a search spanning 24 hours this week, The New York Times identified more than 50 clips and online links with the Christchurch gunman's 2019 footage. They were on at least nine platforms and websites, including Reddit, Twitter, Telegram, 4chan and the video site Rumble, according to the Times' review. Three of the videos had been uploaded to Facebook as far back as the day of the killings, according to the Tech Transparency Project, an industry watchdog group, while others were posted as recently as this week. The clips and links were not difficult to find, even though Facebook, Twitter and other platforms pledged in 2019 to eradicate the footage, pushed partly by public outrage over the incident and by world governments. In the aftermath, tech companies and governments banded together, forming coalitions to crack down on terrorist and violent extremist content online. Yet even as Facebook expunged 4.5 million pieces of content related to the Christchurch attack within six months of the killings, what the Times found this week shows that a mass killer's video has an enduring — and potentially everlasting — afterlife on the internet.

"It is clear some progress has been made since Christchurch, but we also live in a kind of world where these videos will never be scrubbed completely from the internet," said Brian Fishman, a former director of counterterrorism at Facebook who helped lead the effort to identify and remove the Christchurch videos from the site in 2019....

Facebook, which is owned by Meta, said that for every 10,000 views of content on the platform, only an estimated five were of terrorism-related material. Rumble and Reddit said the Christchurch videos violated their rules and they were continuing to remove them. Twitter, 4chan and Telegram did not respond to requests for comment

For what it's worth, this week CNN also republished an email they'd received in 2016 from 4chan's current owner, Hiroyuki Nishimura. The gist of the email? "If I liked censorship, I would have already done that."

But Slashdot reader Bruce66423 also shares an interesting observation from The Guardian's senior tech reporter about the major tech platforms. "According to Hany Farid, a professor of computer science at UC Berkeley, there is a tech solution to this uniquely tech problem. Tech companies just aren't financially motivated to invest resources into developing it." Farid's work includes research into robust hashing, a tool that creates a fingerprint for videos that allows platforms to find them and their copies as soon as they are uploaded...

Farid: It's not as hard a problem as the technology sector will have you believe... The core technology to stop redistribution is called "hashing" or "robust hashing" or "perceptual hashing". The basic idea is quite simple: you have a piece of content that is not allowed on your service either because it violated terms of service, it's illegal or for whatever reason, you reach into that content, and extract a digital signature, or a hash as it's called.... That's actually pretty easy to do. We've been able to do this for a long time. The second part is that the signature should be stable even if the content is being modified, when somebody changes say the size or the color or adds text. The last thing is you should be able to extract and compare signatures very quickly.

So if we had a technology that satisfied all of those criteria, Twitch would say, we've identified a terror attack that's being live-streamed. We're going to grab that video. We're going to extract the hash and we are going to share it with the industry. And then every time a video is uploaded with the hash, the signature is compared against this database, which is being updated almost instantaneously. And then you stop the redistribution.

It's a problem of collaboration across the industry and it's a problem of the underlying technology. And if this was the first time it happened, I'd understand. But this is not, this is not the 10th time. It's not the 20th time. I want to emphasize: no technology's going to be perfect. It's battling an inherently adversarial system. But this is not a few things slipping through the cracks.... This is a complete catastrophic failure to contain this material. And in my opinion, as it was with New Zealand and as it was the one before then, it is inexcusable from a technological standpoint.

"These are now trillion-dollar companies we are talking about collectively," Farid points out later. "How is it that their hashing technology is so bad?
Social Networks

Should Social Networks Let You Take Your Followers to Other Services? (msn.com) 75

The Washington Post reports on the "My Friends My Data" coalition, a group of start-up founders "working to push tech giants to adopt a new industry-wide standard that would allow users to transfer their followings from one app to another, thereby creating more competition between platforms." "Large social media companies are intentionally holding our personal contact information hostage," said Daniel Liss, founder and CEO of Dispo, a photography-based social network. "This limits consumer choice, stymies competition and inhibits free speech. We are committed to giving our community members control of their friend data...."

MFMD's founding members include a who's who of buzzy social apps like Dispo, Itsme, Clash App, Muze, Spam app and Collage, which together have received more than $100 million in venture funding and amassed tens of millions of downloads. The group has issued letters to Meta, TikTok, Snap, Twitter and other large social platforms calling on them to join their crusade. As the start-ups have found, competing with tech giants like Meta or YouTube is difficult when the top talent on the Internet is essentially locked in to specific platforms because of their inability to take followers elsewhere.

Many creators are already on board with MFMD's initiative. Some learned lessons about ownership the hard way after the fall of Vine. Many top Vine stars were overleveraged, investing all their energy in building out their following on the short-form video platform. When the app shuttered in 2016 those who hadn't used Vine to springboard to other apps like YouTube were left without access to the massive fandoms they had built....

[Liss] said that in addition to putting public pressure on the tech giants he hopes the MFMD can be a political force as well. "I'm very comfortable engaging in the political process on behalf of what we think is right," Liss said. "Not just for our companies but also for the next generation of consumer start-ups."

Eugene Park, a gaming Twitch streamer in Los Angeles with 300,000 followers, likes the idea of making followers transferrable to other services, telling the Post it "would be taking power from the tech companies and putting it in the hands of creators who really make up these giant platforms."

In the meantime, the article points out, TikTok users "have taken to referring to other apps like Instagram and YouTube using 'algospeak' pseudonyms, because they say even uttering the name of a competitor can downrank your content."
Education

Intel Calls Its AI That Detects Student Emotions a Teaching Tool. Others Call It 'Morally Reprehensible' (protocol.com) 38

An anonymous reader shares a report: When college instructor Angela Dancey wants to decipher whether her first-year English students comprehend what she's trying to get across in class, their facial expressions and body language don't reveal much. "Even in an in-person class, students can be difficult to read. Typically, undergraduates don't communicate much through their faces, especially a lack of understanding," said Dancey, a senior lecturer at the University of Illinois Chicago. Dancey uses tried-and-true methods such as asking students to identify their "muddiest point" -- a concept or idea she said students still struggle with -- following a lecture or discussion. "I ask them to write it down, share it and we address it as a class for everyone's benefit," she said. But Intel and Classroom Technologies, which sells virtual school software called Class, think there might be a better way. The companies have partnered to integrate an AI-based technology developed by Intel with Class, which runs on top of Zoom. Intel claims its system can detect whether students are bored, distracted or confused by assessing their facial expressions and how they're interacting with educational content.

"We can give the teacher additional insights to allow them to better communicate," said Michael Chasen, co-founder and CEO of Classroom Technologies, who said teachers have had trouble engaging with students in virtual classroom environments throughout the pandemic. His company plans to test Intel's student engagement analytics technology, which captures images of students' faces with a computer camera and computer vision technology and combines it with contextual information about what a student is working on at that moment to assess a student's state of understanding. Intel hopes to transform the technology into a product it can distribute more broadly, said Sinem Aslan, a research scientist at Intel, who helped develop the technology. "We are trying to enable one-on-one tutoring at scale," said Aslan, adding that the system is intended to help teachers recognize when students need help and to inform how they might alter educational materials based on how students interact with the educational content. "High levels of boredom will lead [students to] completely zone out of educational content," said Aslan. But critics argue that it is not possible to accurately determine whether someone is feeling bored, confused, happy or sad based on their facial expressions or other external signals.

United States

Proposal To Sanction Russian Cybersecurity Firm Over Ukraine Invasion Splits Biden Administration (wsj.com) 62

The Biden administration is divided over whether to impose sanctions on Kaspersky Lab, a Russian cybersecurity giant that officials warn could be used by the Kremlin as a surveillance tool against its customers, The Wall Street Journal reported Thursday, citing people familiar with the matter. From the report: The White House's National Security Council has pressed the Treasury Department to ready the sanctions as part of the broad Western campaign to punish Russia for its invasion of Ukraine, according to officials familiar with the matter. While Treasury officials have been working to prepare the package, sanctions experts within the department have raised concerns over the size and scope of such a move. The company's software is used by hundreds of millions of customers across the world, making it difficult to enforce the sanctions. In addition, some officials in the U.S. and Europe fear sanctioning Kaspersky Lab will increase the likelihood of triggering a cyberattack against the West by Moscow, even potentially leveraging the software itself. It wasn't clear whether the sanctions would go forward, and one official said the idea had been put on hold for now. The debate reflects how agencies within the Biden administration are weighing in real time options to deliver more economic pain to the Russian economy in response to its invasion of Ukraine.
Supercomputing

'Quantum Computing Has a Hype Problem' (technologyreview.com) 48

"A reputed expert in the quantum computing field puts it in black and white: as of today, quantum computing is a paper tiger, and nobody knows when (if ever) it will become commercially practical," writes Slashdot reader OneHundredAndTen. "In the meantime, the hype continues."

In an opinion piece for MIT Technology Review, Sankar Das Sarma, a "pro-quantum-computing" physicist that's "published more than 100 technical papers on the subject," says he's disturbed by some of the quantum computing hype he sees today, "particularly when it comes to claims about how it will be commercialized." Here's an excerpt from his article: Established applications for quantum computers do exist. The best known is Peter Shor's 1994 theoretical demonstration that a quantum computer can solve the hard problem of finding the prime factors of large numbers exponentially faster than all classical schemes. Prime factorization is at the heart of breaking the universally used RSA-based cryptography, so Shor's factorization scheme immediately attracted the attention of national governments everywhere, leading to considerable quantum-computing research funding. The only problem? Actually making a quantum computer that could do it. That depends on implementing an idea pioneered by Shor and others called quantum-error correction, a process to compensate for the fact that quantum states disappear quickly because of environmental noise (a phenomenon called "decoherence"). In 1994, scientists thought that such error correction would be easy because physics allows it. But in practice, it is extremely difficult.

The most advanced quantum computers today have dozens of decohering (or "noisy") physical qubits. Building a quantum computer that could crack RSA codes out of such components would require many millions if not billions of qubits. Only tens of thousands of these would be used for computation -- so-called logical qubits; the rest would be needed for error correction, compensating for decoherence. The qubit systems we have today are a tremendous scientific achievement, but they take us no closer to having a quantum computer that can solve a problem that anybody cares about. It is akin to trying to make today's best smartphones using vacuum tubes from the early 1900s. You can put 100 tubes together and establish the principle that if you could somehow get 10 billion of them to work together in a coherent, seamless manner, you could achieve all kinds of miracles. What, however, is missing is the breakthrough of integrated circuits and CPUs leading to smartphones -- it took 60 years of very difficult engineering to go from the invention of transistors to the smartphone with no new physics involved in the process.

Slashdot Top Deals