Forgot your password?
typodupeerror
Cloud

Federal Cyber Experts Called Microsoft's Cloud 'a Pile of Shit', Yet Approved It Anyway (propublica.org) 64

ProPublica reports that federal cybersecurity reviewers had serious, yearslong concerns about Microsoft's GCC High cloud offering, yet they approved it anyway because the product was already deeply embedded across government. As one member of the team put it: "The package is a pile of shit." From the report: In late 2024, the federal government's cybersecurity evaluators rendered a troubling verdict on one of Microsoft's biggest cloud computing offerings. The tech giant's "lack of proper detailed security documentation" left reviewers with a "lack of confidence in assessing the system's overall security posture," according to an internal government report reviewed by ProPublica. For years, reviewers said, Microsoft had tried and failed to fully explain how it protects sensitive information in the cloud as it hops from server to server across the digital terrain. Given that and other unknowns, government experts couldn't vouch for the technology's security.

Such judgments would be damning for any company seeking to sell its wares to the U.S. government, but it should have been particularly devastating for Microsoft. The tech giant's products had been at the heart of two major cybersecurity attacks against the U.S. in three years. In one, Russian hackers exploited a weakness to steal sensitive data from a number of federal agencies, including the National Nuclear Security Administration. In the other, Chinese hackers infiltrated the email accounts of a Cabinet member and other senior government officials. The federal government could be further exposed if it couldn't verify the cybersecurity of Microsoft's Government Community Cloud High, a suite of cloud-based services intended to safeguard some of the nation's most sensitive information.

Yet, in a highly unusual move that still reverberates across Washington, the Federal Risk and Authorization Management Program, or FedRAMP, authorized the product anyway, bestowing what amounts to the federal government's cybersecurity seal of approval. FedRAMP's ruling -- which included a kind of "buyer beware" notice to any federal agency considering GCC High -- helped Microsoft expand a government business empire worth billions of dollars. "BOOM SHAKA LAKA," Richard Wakeman, one of the company's chief security architects, boasted in an online forum, celebrating the milestone with a meme of Leonardo DiCaprio in "The Wolf of Wall Street."

It was not the type of outcome that federal policymakers envisioned a decade and a half ago when they embraced the cloud revolution and created FedRAMP to help safeguard the government's cybersecurity. The program's layers of review, which included an assessment by outside experts, were supposed to ensure that service providers like Microsoft could be entrusted with the government's secrets. But ProPublica's investigation -- drawn from internal FedRAMP memos, logs, emails, meeting minutes, and interviews with seven former and current government employees and contractors -- found breakdowns at every juncture of that process. It also found a remarkable deference to Microsoft, even as the company's products and practices were central to two of the most damaging cyberattacks ever carried out against the government.

Earth

'Pokemon Go' Players Unknowingly Trained Delivery Robots With 30 Billion Images 57

More than 30 billion images captured by Pokemon Go players have helped train a visual mapping system developed by Niantic. The technology is now being used to guide delivery robots from Coco Robotics through city streets where GPS often struggles. Popular Science reports: This week, Niantic Spatial, part of the team behind Pokemon Go, announced a partnership with Coco Robotics, a company that makes short-distance delivery robots for food and groceries. Soon, those robot couriers will scoot around sidewalks using Niantic's Visual Positioning System (VPS)-- a navigation tool that can reportedly pinpoint location down to a few centimeters just by looking at nearby buildings and landmarks. Niantic trained that VPS model on more than 30 billion images captured by Pokemon Go users, and claims it will help robots operate in areas where GPS falls short. [...]

Instead of helping users navigate the way that GPS does, VPS determines where someone is based on their surroundings. That makes Pokemon Go particularly useful as a data source, because players had to physically travel to specific locations and point their phones at various angles. That mapping effort got a significant boost in 2020, when the app added what it called "Field Research," a feature prompting players to scan real-world statues and landmarks with their cameras in exchange for in-game rewards. A portion of the data also reportedly came from areas known as "Pokemon battle arenas." Whether players knew it or not, those scans were creating 3D models of the real world that would eventually power the Niantic model. More data means better accuracy, and because Niantic was collecting images of the same locations from many different users, it could capture the same spots across varying weather conditions, lighting, angles, and heights. [...]

The idea is that Coco's robots can use VPS and four cameras mounted around the machine to get a far more precise read on their surroundings. In turn, the well-equipped robot will deliver food on time. On a broader level, Niantic says its partnership with Coco Robotics is part of a longer-term effort to build a "living map" of the world that updates as new data becomes available. Once VPS-equipped delivery robots hit the streets, they will collect even more info that can be fed back into the model to bolster its accuracy further. This kind of continuous, real-world data collection is already central to how self-driving vehicle companies like Waymo and Tesla operate, and is a large part of why that technology has improved so significantly in recent years.
Sci-Fi

Animated 'Firefly' Reboot In Development With Nathan Fillion (hollywoodreporter.com) 116

An animated reboot of Firefly is in early development at 20th Television Animation with Nathan Fillion involved. The project has Joss Whedon's blessing and will be run by writers Tara Butters and Marc Guggenheim, with early concept art already underway. According to the Hollywood Reporter, "The series would be set in the timeline between the original, 11-episode TV run in 2002 and the 2005 feature film continuation, Serenity." You can watch Fillion announce the Firefly reboot on Instagram.

When the first episode of the original series premiered in late 2002, Slashdot reader fm6 wrote: "Firefly, Joss Whedon's 'anti-Trek drama' premieres tonight, on Fox, 8 E/P. I normally despise hypespeak, but this time it's the only language that fits: this is groundbreaking, mind-boggling, totally original. I've seen a bootleg of the pilot (which, unfortunately, the network is holding back) and I promise you this is the most geek-friendly SF you've seen in a long time. Yes, more so than Star Trek and B5, and way past Star Wars. I've never seen the future so skillfully, realistically, and lovingly portrayed. Here is the Official Site and a leading fan site." "This is the single new show this season I have added a season pass for to the old Tivo," CmdrTaco said at the time. "But I'll probably watch it live. This looks like it could be as good as we hope."
Power

Sodium-Ion Battery Tested for Grid-Scale Storage in Wisconsin (electrek.co) 135

"A new type of battery storage is about to be deployed on the Midwestern grid for the first time," reports Electrek: Sodium-ion battery storage manufacturer Peak Energy and global energy company RWE Americas will pilot a passively cooled sodium-ion battery system in eastern Wisconsin on the Midcontinent Independent System Operator network — the first sodium-ion deployment on that grid. Peak Energy says its technology is specifically designed for grid-scale storage and leverages sodium-ion chemistry's inherent stability. Unlike many lithium-ion systems, sodium-ion batteries don't require active cooling and can operate over a wide temperature range without losing performance.

That simpler design could make a meaningful dent in the cost of storing electricity. According to Peak Energy, its system cuts the lifetime cost of stored energy by an average of $70 per kilowatt-hour. That's roughly half the total cost of a typical battery system today. The company says it achieves those savings by removing energy-hungry cooling systems, eliminating routine maintenance requirements, and reducing the need to overbuild storage capacity to account for battery degradation over time...

If the Wisconsin pilot proves successful, it could open the door to wider adoption of sodium-ion batteries for large-scale energy storage across the US.

Android

Android, Epic, and What's Really Behind Google's 'Existential' Threat to F-Droid (thenewstack.io) 53

Starting in September, even Android developers not in Google's Play Store will still be required to register with Google to distribute their apps in Brazil, Singapore, Indonesia, and Thailand, with Google continuing "to roll out these requirements globally" four months later. Even developers distributing Android apps on the web for sideloading will be required to register, pay Google a $25 fee, and provide a government ID.

But there's a new theory on what's secretly been motivating Google from an unnamed source in the "Keep Android Open" movement, writes long-time Slashdot reader destinyland: "You can't separate this really from their ongoing interactions with Epic and the settlement that they came to," they argue. Twelve days ago Epic Games and Google announced a new proposal for settling their long-running dispute over the legality of alternative app stores on Android phones. (Rather than agreeing to let third-party app stores into their Play Store, Google wants them to continue being sideloaded, promising in a blog post last week that they'll even offer a "more streamlined" and "simplified" sideloading alternative for rival app stores. "This Registered App Store program will begin outside of the US first, and we intend to bring it to the US as well, subject to court approval.")

So "developer verification" could be Google's fallback plan if U.S. courts fail to approve this. "If the Google Play Store has to allow any third-party repository app store, Google essentially has given up all control of the apps. But if they're able to claw back that control by requiring that all developers, no matter how they distribute their apps, have to register with Google — have to agree to their Terms & Conditions, pay them money, provide identification — then they have a large degree of indirect control over any app that can be developed for the entire platform."

But that plan threatens millions of people using the alternative F/OSS app distributor F-Droid, since Google also wants to have only one signature attached to Android apps. Marc Prud'hommeaux, a member of F-Droid's board of directors, says that "all of a sudden breaks all those versions of the application distributed through F-Droid or any other app store!"

Prud'hommeaux says they've told Google's Android team "You know perfectly well that you're killing F-Droid!" creating an "existential" threat to an app distributor "that has existed happily for over 10 years." But good things started happening when he created the website Keep Android Open: There's now a "huge backlog" of signers for an Open Letter that already includes EFF, the Software Freedom Conservancy, and the Free Software Foundation. He believes Android's existing Play Protect security "is completely sufficient to handle the particular scenarios they claim that developer verification is meant to address"...

The Keep Android Open site urges developers not to sign up for Android's early access program when it launches next week. (Instead, they're asking developers to respond to invites with an email about their concerns — and to spread the word to other developers and organizations in forums and social media posts.) There's also a petition at Change.org currently signed by 64,000 developers — adding 20,000 new signatures in the last 10 days. And "If you have an Android device, try installing F-Droid!" he adds. Google tracks how many people install these alternative app repositories, and a larger user base means greater consequences from any Android policy changes.

Plus, installing F-Droid "might be refreshing!" Prud'hommeaux says. "You don't see all the advertisements and promotions and scam and crapware stuff that you see in the commercial app stores!"

GNU is Not Unix

FSF Threatens Anthropic Over Infringed Copyright: Share Your LLMs Freely (fsf.org) 54

In 2024 Anthropic was sued over claims it infringed copyrights when training LLMs.

But as they try to settle, they may have a problem. The Free Software Foundation announced Friday that Anthropic's training data apparently even included the book "Free as in Freedom: Richard Stallman's Crusade for Free Software" — for which the Free Software Foundation holds a copyright. It was published by O'Reilly and by the FSF under the GNU Free Documentation License (GNU FDL). This is a free license allowing use of the work for any purpose without payment.

Obviously, the right thing to do is protect computing freedom: share complete training inputs with every user of the LLM, together with the complete model, training configuration settings, and the accompanying software source code. Therefore, we urge Anthropic and other LLM developers that train models using huge datasets downloaded from the Internet to provide these LLMs to their users in freedom.

We are a small organization with limited resources and we have to pick our battles, but if the FSF were to participate in a lawsuit such as Bartz v. Anthropic and find our copyright and license violated, we would certainly request user freedom as compensation.

"The FSF doesn't usually sue for copyright infringement," reads the headline on the FSF's announcement, "but when we do, we settle for freedom."
Government

How One Company Finally Exposed North Korea's Massive Remote Workers Scam (nbcnews.com) 24

NBC News investigates North Korea's "wide-ranging effort to place remote workers at U.S. companies in order to funnel money back to its coffers and, in some cases, steal sensitive information."

And working with the FBI, one corporate security/investigations company decided to knowingly hire one of North Korea's remote workers — then "ship him a laptop and gain as much information as possible" about this "sprawling international employment scheme that is estimated to include hundreds of American companies, thousands of people and hundreds of millions of dollars per year." It worked.... Over a roughly three-month investigation, Nisos uncovered an apparent network of at least 20 North Korean operatives including "Jo" who had collectively applied to at least 160,000 roles. During that time, workers in the network — which some evidence showed were based in China — were employed by five U.S.-based companies and allegedly helped by an American citizen operating out of two nondescript suburban homes in Florida...

Nisos estimated that in about a year, "Jo", who was likely a newer member of the team, applied to about 5,000 jobs... "They attended interviews all day every day, and then once they secured a job, they would collect paychecks until they were terminated," [according to Jared Hudson, Nisos' chief technology officer]... With the ability to see which other U.S. companies Jo and his team were working for — all remote technology roles — Nisos' CEO, Ryan LaSalle, began making calls to their security teams to alert them of the fraud. "Most of the companies weren't aware of it, even if they had pretty robust security teams," LaSalle said. "It wasn't really high on the radar."

NBC News describes North Korea's 10-year effort — and its educational pipeline that steers promising students into "computer science and hacking training before being placed into cyberunits under military and state agencies, according to a recent report by DTEX, a risk-adaptive security and behavioral intelligence firm that tracks North Korea's cybercrime." In one case, a North Korean worker stole sensitive information related to U.S. military technology, according to the Justice Department. In another, an American accomplice obtained an ID that enabled access to government facilities, networks and systems. At least three organizations have been extorted and suffered hundreds of thousands of dollars in damages after proprietary information was posted online by IT workers... Analysts warn that North Korean IT workers are targeting larger organizations, increasing extortion attempts and seeking out employers that pay salaries in cryptocurrency. More recently, security researchers have uncovered fake job application platforms impersonating major U.S. cryptocurrency and AI firms, including Anthropic, designed to infect legitimate applicants' networks with malware to be utilized once hired. The global cybersecurity company CrowdStrike identified a 220% rise in 2025 in instances of North Koreans gaining fraudulent employment at Western companies to work remotely as developers...

The payoff flowing back to Pyongyang from these schemes is enormous. Some North Korean IT workers earn more than $300,000 per year, far more than they'd be able to earn domestically, with as much as 90% of their wages directed back to the regime, according to congressional testimony from Bruce Klinger, a former CIA deputy division chief for Korea. The United Nations estimates the schemes, which proliferated after the pandemic when more companies' workforces went remote, generate as much as $600 million annually, while a U.S. State Department-led sanctions monitoring assessment placed earnings for 2024 as high as $800 million... So far, at least 10 alleged U.S.-based facilitators have been federally charged, including one active-duty member of the U.S. Army, for their alleged roles in hosting laptop farms, laundering payments and moving proceeds through shell companies. At least six other alleged U.S. facilitators have been identified in court documents but not named...

"We believe there are many more hundreds of people out there who are participating in these schemes," said Rozhavsky, the FBI assistant director. "They could never pull this off if they didn't have willing facilitators in the U.S. helping them...." The scheme itself is also becoming more complex. North Korean IT teams are now subcontracting work to developers in Pakistan, Nigeria and India, expanding into fields like customer service, financial processing, insurance and translation services — roles far less scrutinized than software development.

The Media

Should Banksy Remain Anonymous? (reuters.com) 91

He's "the most famous anonymous man in the world," suggests Reuters. But investigating Banksy's artworks in a bombed Ukrainian village (and other clues in the U.K. and Manhattan) have led them to "a hand-written confession by the artist to a long-ago misdemeanor charge of disorderly conduct — a document that revealed, beyond dispute, Banksy's true identity."

But Banksy's long-time lawyer "urged us not to publish this report, saying doing so would violate the artist's privacy, interfere with his art and put him in danger" and "would harm the public, too." Working "anonymously or under a pseudonym serves vital societal interests," he wrote. "It protects freedom of expression by allowing creators to speak truth to power without fear of retaliation, censorship or persecution — particularly when addressing sensitive issues such as politics, religion or social justice."

Reuters took into account Banksy's privacy claims — and the fact that many of his fans wish for him to remain anonymous. Yet we concluded that the public has a deep interest in understanding the identity and career of a figure with his profound and enduring influence on culture, the art industry and international political discourse... As for the risk he might face of retaliation or censorship, Britain's legal and political establishments seem comfortable with Banksy's messages and how he delivers them...

His mastery of disguise began as a way of shaking the police, says former manager [Steve] Lazarides. In an interview, Lazarides said anonymity served a practical purpose in Bristol, where authorities enforced "draconian" policies against graffiti... Eventually, keeping the secret became a burden. By the end of their partnership, Lazarides estimates he spent half or more of his time managing and maintaining the artist's mystique. "I think it became a good gag, and then, if you want my honest, honest opinion, I think it then became a disease," he said.

Lazarides wrote a two-volume book about managing Banksy from the late 1990s to 2008, including a story about Banksy's arrest in 2000 for this defacing of a billboard. Reuters geolocated that building, then found police documents and a court file including the hand-written confession. This investigation spawned a 7,000-word article with everything from a comic strip Banksy drew when he was 11 to his connections with Robert Del Naja of the trip hop band Massive Attack — and a 2017 podcast interview where a music producer apparently revealed Banksy's real first name.

But the article also reveals how protective the art community is of Banksy's secret. Reuters investigated that Banksy auctioned in 2018 for $1.4 million — and then immediately started shredding itself with a device Banksy embedded in its frame: That piece, renamed "Love is in the Bin," sold three years later for about $25 million. Art dealer [Robert] Casterline was at the auction and remembers when the shredder began to beep. He pulled out his phone to take pictures. "Unfortunately, there was one person standing in front of me," blocking the view, he said. It was an eccentric-looking man with a broad neck scarf and thick eyewear. Oddly, the man wasn't watching the painting get shredded. He was looking in the other direction, observing the crowd's reaction. Only later, reviewing what he shot, did Casterline notice that the man's glasses appeared to have a small camera built into the bridge. (Banksy later posted a video of the stunt, including shots of the astonished audience.)
Having seen a photo of the man suspected of being Banksy, Casterline confirmed to Reuters that he was "pretty sure" it was the same man.

But "I don't want to be the guy who exposes Banksy."

Submission + - This Cancer Researcher Home-Brewed a Beer That Works as a Vaccine (reason.com)

fjo3 writes: Christopher Buck is fermenting a vaccine in his kitchen. You can too.

Specifically, Buck brews and quaffs a hazy beer that induces immunity against the BK virus, also known as human polyomavirus. Buck argues that you have the right to home-brew vaccines as a way to get around the Food and Drug Administration's (FDA) yearslong vaccine approval process.

Buck joins the pantheon of pioneeringvaccine self-experimenters. Among them are French physician and Nobel Prize winner Charles Jules Henri Nicolle, who used crushed lice to inoculate himself against typhus; Jonas Salk, who injected himself with his own polio vaccine; and Albert Sabin, who ingested his oral polio vaccine. In 2020, at the beginning of the COVID-19 pandemic, a group of researchers associated with Harvard launched the Rapid Deployment Vaccine Collaborative. They developed and self-administered a do-it-yourself nasal vaccine months before commercial vaccines against the coronavirus became available. They made their DIY recipe for the COVID-19 vaccine available to anyone.

Comment Re:renewables (Score 1) 184

At least Britain and France have (had) enrichment plants and separation processes. Which is more efficient ... hard to say from the outside. Classified on the inside - at least the military parts of the programme.

Germany and "Europe" as a whole ... no. Not yet.

An obvious consequence of America's disintegration into civil war will be that the EU *has* to bind it's forces into one group.

Whether they (remember : the UK is no longer politically in the EU) can tolerate having US bases in their territory which are likely to schism into Loyalist (Trump) and Loyalist (Constitutionalist) factions during the civil war (CW-2, CW-3 ... ?) and fight amongst themselves ... that must be subject to vigorous planning at this moment. Removing nuclear weapons from them would be a high priority.

Comment As many as that? (Score 1) 162

It has been about 6 years since I went to the cinema.

Now, if Hollywood would produce some interesting movies - even those involving Pinewood and Shepperton, or even New Zealand - then that might be a reason to go. But no, there hasn't been anything worth the 3-day's income cost of going to the local fleapit.

Slashdot Top Deals

Their idea of an offer you can't refuse is an offer... and you'd better not refuse.

Working...