Forgot your password?
typodupeerror

Submission + - Claude AI Finds Bugs In Microsoft CTO's 40-Year-Old Apple II Code (theregister.com)

An anonymous reader writes: AI can reverse engineer machine code and find vulnerabilities in ancient legacy architectures, says Microsoft Azure CTO Mark Russinovich, who used his own Apple II code from 40 years ago as an example. Russinovich wrote: "We are entering an era of automated, AI-accelerated vulnerability discovery that will be leveraged by both defenders and attackers."

In May 1986, Russinovich wrote a utility called Enhancer for the Apple II personal computer. The utility, written in 6502 machine language, added the ability to use a variable or BASIC expression for the destination of a GOTO, GOSUB, or RESTORE command, whereas without modification Applesoft BASIC would only accept a line number. Russinovich had Claude Opus 4.6, released early last month, look over the code. It decompiled the machine language and found several security issues, including a case of "silent incorrect behavior" where, if the destination line was not found, the program would set the pointer to the following line or past the end of the program, instead of reporting an error. The fix would be to check the carry flag, which is set if the line is not found, and branch to an error.

The existence of the vulnerability in Apple II type-in code has only amusement value, but the ability of AI to decompile embedded code and find vulnerabilities is a concern. "Billions of legacy microcontrollers exist globally, many likely running fragile or poorly audited firmware like this," said one comment to Russinovich's post.

Submission + - Many International Game Developers Plan To Skip GDC In US (arstechnica.com)

An anonymous reader writes: This week, tens of thousands of game developers and producers will once again gather in San Francisco, as they have since 1988, for the weeklong Game Developers Conference. But this year’s show will be missing many international developers who say they no longer feel comfortable traveling to the United States to attend, no matter how relevant the show is to their work and careers. Dozens of those developers who spoke to Ars in recent months say they’re wary of traveling to a country that has shown a callous disregard for—or outright hostility toward—the safety of international travelers. That’s especially true for developers from various minority groups, those with transgender identities, and those who feel they could be targeted for outspoken political beliefs. “I honestly don’t know anyone who is not from the US who is planning on going to the next GDC,” Godot Foundation Executive Director Emilio Coppola, who’s based in Spain, told Ars. “We never felt super safe, but now we are not willing to risk it.”

Submission + - AI Suspected in Bombing of Iran Girls School (futurism.com)

hackingbear writes: In the aftermath of airstrikes that leveled a school and claimed the lives of 165 Iranian elementary students and staff, the Pentagon has refused to say whether the attack was suggested by an AI system. Given the United States’ reported use of AI to select at least some military targets in Iran, a major question remains unanswered: did the US use Anthropics' Claude to decide whether to annihilate an elementary school? When Futurism reached out to the Pentagon regarding the use of AI in recent military operations — specifically the targeting of the Shajareh Tayyebeh girls’ school — we were referred to US CENTCOM, one of eleven unified commands under the Pentagon’s umbrella. “We have nothing for you on this at this time,” CENTCOM said. Back in April of 2024, an investigation by +972 Magazine revealed that the Israeli army had leveraged an AI system called “Lavender” to select targets in its war on Gaza where a UN school was hit, similarly to how the Pentagon is reportedly using Claude in Iran.

Submission + - Stormy Space Weather May Be Garbling Messages From Aliens, New Research Suggests (theguardian.com)

An anonymous reader writes: Reminiscent of ET’s struggles to “phone home” in Steven Spielberg’s 1982 blockbuster movie, new research by the Silicon Valley-based SETI Institute (search for extraterrestrial intelligence) suggests tempestuous space weather makes radio signals from the distant cosmos harder to detect. The organization, which is partly funded by Nasa, said stellar activity such as solar storms and plasma turbulence from a star near “a transmitting planet” can broaden otherwise ultra-narrow signals. That spreads the power of any such transmission across more frequencies, the institute’s scientists say, which makes it more difficult to detect using traditional narrowband searches.

“If a signal gets broadened by its own star’s environment, it can slip below our detection thresholds, even if it’s there, potentially helping explain some of the radio silence we’ve seen in technosignature searches,” SETI astronomer Vishal Gajjar said. His report, co-authored with SETI research assistant Grayce C Brown, was published this week in the Astrophysical Journal. [...] The SETI team made the discovery by calibrating the effects of stellar activity using radio transmissions from spacecraft in our own solar system, then extrapolating them to the environments of faraway stars. Brown said the findings meant space listeners would have to rethink the long-established mechanics of the search for alien lifeforms, including conducting future observation surveys at higher frequencies. “By quantifying how stellar activity can reshape narrowband signals, we can design searches that are better matched to what actually arrives at Earth, not just what might be transmitted,” she said.

Submission + - China's Fossil Fuel Emissions Dropped Last Year as Solar Boomed (yale.edu)

AmiMoJo writes: In China, the world’s leading carbon emitter, a massive buildout of solar power is beginning to push coal into decline. Last year China saw its fossil fuel emissions drop, even as demand for energy rose.

Emissions from energy and industry dropped by 0.3 percent in 2025, while consumption of energy rose by 3.5 percent, according to official statistics. Last year, renewables supplied 40 percent of power in China, up from 37 percent the previous year, with solar accounting for most of the growth. The added renewable power more than met the uptick in demand, and as a result, coal power fell slightly.

“This is an encouraging signal, as it suggests that the sort of large-scale energy transition which China has been investing heavily in has begun to translate into measurable outcomes,” said Duo Chan, a climate scientist at the University of Southampton. “Whilst one year of lower emissions does not mean that the climate challenge is solved, the scale of China’s deployment of renewables can lead us to hope that this may be the start of a sustained decline in its emissions.”

Submission + - Japan approves stem-cell treatment for Parkinson's in world first (france24.com)

fjo3 writes: Pharmaceutical company Sumitomo Pharma said it received the green light for the manufacture and sale of Amchepry, its Parkinson's disease treatment that transplants stem cells into a patient's brain.

Japan's health ministry also gave the go-ahead to ReHeart, heart muscle sheets developed by medical startup Cuorips that can help form new blood vessels and restore heart function, media reports said.

The treatments could be on the market and rolled out to patients as early as this summer, reports said, citing the health ministry, becoming the world's first commercially available medical products using (iPS) cells.

Comment I've done this (Score 1) 86

Many years ago. Flew internationally with no ticket, boarding pass, or passport. Then, as now, the weakness in the system is people. Social engineering has always been a hugely successful vector for compromise. For example, I got past the gate staff by inundating them with questions about the plane, until they got annoyed and started intentionally ignoring me at which stage I could wander down the ramp.

Actually, my means of bypassing that final check (since there's so many ways one could conceivably get to air-side of an airport, the boarding gate is a vital security nexus) triggered a worldwide airport improvement to enclose the sides of the gate entry of international flights so that a passenger can't wander from the windows directly to the ramp behind the staff - they have to come around and walk directly between the staff. They're not as stringent for domestic gates, since carrying a passenger domestically without documentation is just the airline's loss. Carrying a passenger internationally without documentation triggers a whole range of problems to deal with and penalties for the airline.

I too was checked at security, although at that time there was no checking of documents at security. I understand commonly in many places at least the boarding pass is checked at security, in my part of the world the document check often comes at a separate point before security screening, and if one is able to bypass the document check, won't have a separate check at security screening. And that's still a weakness - there should be document verification at every point of ingress.

Several other people have achieved the same. Some by forging documentation, but by and large whenever this occurs, generally people are the weakness in the system that allows it. I'm not dismissing the culpability of those who do so, just mentioning this as a look at the security apparatus. We're doing mostly the right thing from the technical aspects of security, although in this particular instance it seems like a use case where AI could be deployed to identify tail-gaters as they happen.

Comment Re:Trust (Score 1) 96

Not quite, but close enough to the mark that it should count. To run it is one thing, to *trust* it is another entirely, and we generally engage it quite a bit of data security, isolation, and threat mitigation on the basis that no, we don't trust it. Sure, run it, but accordingly, regard it as a threat and take whatever measures you can to mitigate that threat. And from a security standpoint, the same is true of Linux as well. Protect your data, because you can't "trust" code from anywhere. (Sidenote: obviously, we always have to balance trust risk vs mitigation cost, and they're both high in the case of Windows, and both low in the case of Linux, which is why I admit, the point you're making should effectively count as correct anyhow.)

Comment Re:Security for me, but not for thee (Score 2) 38

It's not about the apps specifically. The "not for thee" is due to the fact that the exploited backdoors put in place in communications infrastructure were at the requirement of the government. They could remove these backdoors but won't for wish to continue to use them to surveil the citizenry. They're not advising everyone to stop using phones or text messages; they want everyone else to keep using them so they can keep monitoring them. Just not senior government officials.

Sure, you can use the apps too, it's just that they're just not telling you you should. This was the point OP was raising - that everyone would benefit from more secure communications. The government could either remove the backdoors which caused their telecommunications infrastructure to become compromised in the first place, or recommend everyone use secure apps. But they're not doing either of these. Hence OP's "for me, but not for thee" - it's not claimed to be an absolute.

And besides, in regards to apps, the federal government keeps raising concerns with the level of encryption present in consumer products. Nobody is claiming the public is yet being prevented from using these apps, but unfortunately the "yet" there could at any time be only a serious incident or "public mandate" away.

Comment Good (Score 1) 12

Intentionally ambiguous season pass descriptions are a significant frustration with some titles. For example, some games teasing future season passes which happen to include DLC already released, but not telling you that in the description so that one ends up double-dipping. Or games with multiple useless single-player cosmetic DLCs and a handful of content DLCs, dropping a season pass priced *slightly less* than those combined, but not telling you which of the content DLCs are included, so that you go for the "cheaper" option of buying the season pass, only be stuck with one content DLC and a bunch of cosmetics. And so forth and so on.

Sure - sometimes reading comments/reviews can help get around these and similar traps. And always, simply not buying from publishers who engage such scummy practices would always avoid it. But not everybody is an as perfectly refined and wondrously logical being as you are, and for those individuals, it's certainly a step in the right direction to have the storefront require publishers to actually tell purchases what they're buying. I mean, it seems obvious that should have always been a thing, but it hasn't been, and its a fix better late rather than never.

Comment Re:Turn your phone off at the border (Score 1) 129

Right, so if you're travelling to the US for example where border security can require access to your phone and/or computer, you just have to decide beforehand if you're willing to abandon transit to avoid your phone being searched. If your answer to that is No, then there's no point powering it off to avoid search, since you already know you won't abandon transit in order to do so. That's all I was saying - the advice is useless for most people. Only useful for people who know ahead of time they *will* abandon transit if a search of their devices is requested.

Comment Re:Turn your phone off at the border (Score 1) 129

Not much point for most folk, since border control can generally require you to turn on and unlock your phone. The only reason to take the extra step of turning off your phone is if it actually has something illegal on it, and you're willing to sacrifice your transit if you're asked to unlock it and refuse to. For everyone else who's *not* willing to sacrifice their transit and will comply with any lawful order, turning it off just takes up more of your time.

"But what if I have nothing illegal on it and don't want to unlock it on principal". Like I said - it's useless advice for people who *aren't* willing to sacrifice their transit. If you're willing to sacrifice your transit for that principal, that's fine. But there's exceedingly few people this applies to.

Comment Re:Calling bullshit on "more than two hours a day" (Score 0) 140

To be clear, nobody is making this claim, but what data do you have on the heart health of primitive humans in order to use them as a rebuttal argument against the story? For all you know, they had terrible heart health, and since as best we can tell they had fairly short, violent lives with mostly young deaths, it bewilders me that you'd bring primitive humans up as a rebuttal.

It sounds like you're making the same non-sequitur argument folks make when they say "eating paleo must be the best diet for us because it's what our ancestors ate" - as if the availability or lack thereof of a thing within a specific period in time is what makes it best. Which is not to say the average modern adult's diet isn't terrible, but in no way implies a paleo diet is the best thing for us either.

Rather than making up nonsense rebuttals, just find the science which shows standing still for more than 2 hours a day is beneficial for our health, and the science which debunks and explains the findings of this study with a better hypothesis.

Comment Re:What about legal compliance? GDPR? (Score 3, Interesting) 169

Let me start by saying, I think this is a terrible product and support any efforts to circumvent it. However, in answer to your question, there's no second party here. It's not a GDPR issue nor requires consent. The model is run locally on your PC, by you. Once the model is downloaded, it works offline, and nobody else is making a recording. Whether that data gets to them through some other delineated feature or software is another matter, but on it's own, there is no second party involved in the processing of this data.

That being said, it can be disabled through Group Policy Editor. At least for now. Most OS telemetry (but not all) can be disabled without any third-party software, and this falls well within the most category, especially since at present it requires express consent to install the appropriate model in the first place.

Slashdot Top Deals

"Tell the truth and run." -- Yugoslav proverb

Working...