Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
The Internet

Pornhub Hasn't Been Actively Enforcing Its Deepfake Ban (engadget.com) 97

Pornhub said in February that it was banning AI-generated deepfake videos, but BuzzFeed News found that it's not doing a very good job at enforcing that policy. The media company found more than 70 deepfake videos -- depicting graphic fake sex scenes with Emma Watson, Scarlett Johanson, and other celebrities -- were easily searchable from the site's homepage using the search term "deepfake." From the report: Shortly after the ban in February, Mashable reported that there were dozens of deepfake videos still on the site. Pornhub removed those videos after the report, but a few months later, BuzzFeed News easily found more than 70 deepfake videos using the search term "deepfake" on the site's homepage. Nearly all the videos -- which included graphic and fake depictions of celebrities like Katy Perry, Scarlett Johansson, Daisy Ridley, and Jennifer Lawrence -- had the word "deepfake" prominently mentioned in the title of the video and many of the names of the videos' uploaders contained the word "deepfake." Similarly, a search for "fake deep" returned over 30 of the nonconsensual celebrity videos. Most of the videos surfaced by BuzzFeed News had view counts in the hundreds of thousands -- one video featuring the face of actor Emma Watson garnered over 1 million views. Some accounts posting deepfake videos appeared to have been active for as long as two months and have racked up over 3 million video views. "Content that is flagged on Pornhub that directly violates our Terms of Service is removed as soon as we are made aware of it; this includes non-consensual content," Pornhub said in a statement. "To further ensure the safety of all our fans, we officially took a hard stance against revenge porn, which we believe is a form of sexual assault, and introduced a submission form for the easy removal of non-consensual content." The company also provided a link where users can report any "material that is distributed without the consent of the individuals involved."
ISS

Bacteria Found On ISS May Be Alien In Origin, Says Cosmonaut (independent.co.uk) 240

Kekke writes: Lots of buzz around this. Russian cosmonaut Anton Shkaplerov took routine samples from the outside of the International Space Station during a spacewalk. These samples were analyzed and found to contain bacteria that must have come from somewhere other than Earth or the ISS itself. "Bacteria that had not been there during the launch of the ISS module were found on the swabs," Mr. Shkaplerov told TASS Russian News Agency. "So they have flown from somewhere in space and settled on the outside hull." He made it clear that "it seems, there is no danger," and that scientists are doing more work to find out what they are. The Independent writes, "Finding bacteria that came from somewhere other than Earth would be one of the biggest breakthroughs in the history of science -- but much more must be done before such a claim is made."
Crime

Password Sharing Is a Federal Crime, Appeals Court Rules (vice.com) 165

An anonymous reader writes from a report via Motherboard: An appeals court ruled Wednesday that sharing passwords can be a violation of the Computer Fraud and Abuse Act, a catch-all "hacking" law that has been widely used to prosecute behavior that bears no resemblance to hacking. Motherboard reports: "In this particular instance, the conviction of David Nosal, a former employee of Korn/Ferry International research firm, was upheld by the Ninth Circuit Court of Appeals, who said that Nosal's use of a former coworker's password to access one of the firm's databases was an 'unauthorized' use of a computer system under the CFAA. In the majority opinion, Judge Margaret McKeown wrote that 'Nosal and various amici spin hypotheticals about the dire consequences of criminalizing password sharing. But these warnings miss the mark in this case. This appeal is not about password sharing.' She then went on to describe a thoroughly run-of-the-mill password sharing scenario -- her argument focuses on the idea that Nosal wasn't authorized by the company to access the database anymore, so he got a password from a friend -- that happens millions of times daily in the United States, leaving little doubt about the thrust of the case. The argument McKeown made is that the employee who shared the password with Nosal 'had no authority from Korn/Ferry to provide her password to former employees.' At issue is language in the CFAA that makes it illegal to access a computer system 'without authorization.' McKeown said that 'without authorization' is 'an unambiguous, non-technical term that, given its plain and ordinary meaning, means accessing a protected computer without permission.' The question that legal scholars, groups such as the Electronic Frontier Foundation, and dissenting judge Stephen Reinhardt ask is an important one: Authorization from who?"
Technology

Terahertz Radiation To Enable Portable Particle Accelerators (www.desy.de) 52

Zothecula writes with this Gizmag story about an interdisciplinary team of researchers who have built the first prototype of a miniature particle accelerator that uses terahertz radiation. "Researchers at MIT in the US and DESY (Deutsches Elektronen-Synchrotron) in Germany have developed a technology that could shrink particle accelerators by a factor of 100 or more. The basic building block of the accelerator uses high-frequency electromagnetic waves and is just 1.5 cm (0.6 in) long and 1 mm (0.04 in) thick, with this drastic size reduction potentially benefitting the fields of medicine, materials science and particle physics, among others."
DRM

How Much Data Plan Bandwidth Is Wasted By DRM? 200

Bennett Haselton writes: "If you watch a movie or TV show (legally) on your mobile device while away from your home network, it's usually by streaming it on a data plan. This consumes an enormous amount of a scarce resource (data bundled with your cell phone provider's data plan), most of it unnecessarily, since many of those users could have downloaded the movie in advance on their home broadband connection — if it weren't for pointless DRM restrictions." Read on for the rest of Bennett's thoughts.

Comment Re:What a Surprise (Score 1) 57

I think you're being a bit unfair towards some of the ideas. I see a lot of potential, for example, in being able to generate randomized, individualized, instantly-graded homework sets for students. A lot of these systems are pretty "smart," and can identify a student's individual weaknesses and give them more practice where they need it. They can also let students zip past the parts they already understand and so get to harder material as appropriate. The teacher plays an important role in being able to provide assistance to the students that are stuck. With a classroom of 30 students, expecting a teacher to generate this level of individualized work for each student on their own is impractical.

Comment Note about Ekhad (Score 5, Interesting) 185

I'm not sure if the original submitter had his tongue in cheek by describing the co-author Ekhad as a "computer scientist." Just in case he didn't, note that Shalosh B. Ekhad is actually Zeilberger's computer. Since most of Zeilberger's research depends heavily on computations, and (I think) as a nod to some of his philosophical positions, Zeilberger usually lists his computer as a coauthor on his papers. So I guess Ekhad is a computer scientist, but not quite in the way we usually mean. :)
Space

Rogue Satellite Shuts Down US Weather Services 202

radioweather writes "On Sunday, the drifting rogue 'zombie' Galaxy 15 satellite with a stuck transmitter interfered with the satellite data distribution system used by NOAA's National Weather Service (NWS), effectively shutting down data sharing between NWS offices nationwide, as well as weather support groups for the US Air force. This left many forecasters without data, imagery, and maps. Interference from Galaxy 15 affected transmissions of the SES-1 Satellite, which not only serves NOAA with data relay services, but also is used to feed TV programming into virtually every cable network in the US. NOAA's Network Control Facility reports that the computer system affected was NOAA's Advanced Weather Interactive Processing System (AWIPS) used to issue forecasts and weather bulletins which uses the weather data feed. They also state the problem is likely to recur again this month before the satellite drifts out of range and eventually dies due to battery depletion."
Education

Astonishing Speedup In Solving Linear SDD Systems 157

eldavojohn writes "A new paper (PDF) out of Carnegie Mellon University shows how to solve symmetric diagonally dominant linear systems much faster than before. The technique employs graph theory, randomized algorithms, and linear algebra to achieve an astonishing advantage over current methods to solve such systems. From the article: 'The result is a significant decrease in computer run times. The Gaussian elimination algorithm runs in time proportional to s^3, where s is the size of the SDD system as measured by the number of terms in the system, even when s is not much bigger the number of variables. The new algorithm, by comparison, has a run time of s*[log(s)]^2. That means, if s = 1 million, that the new algorithm run time would be about a billion times faster than Gaussian elimination.' Developers out there who maintain matrix packages and linear algebra tools might want to take a peak at the paper. Anyone who has modeled real-world systems will be able to tell you that speedups in linear algebra algorithms have a weighty effect on efficiency in simulations — especially as one approaches the theoretical limits of optimality. This research is currently being presented at the IEEE Symposium on Foundations of Computer Science."

Comment Re:Book reviews? (Score 1) 531

The answers to your questions depend on what you think is the purpose of a published book review.

In my discipline (mathematics), reviews of research monographs that appear in journals usually have an opening paragraph describing the book under review and a couple of closing paragraphs summarizing the contents of the book, judging the quality of the book, and sometimes listing the errors found by the reviewer. In between those paragraphs are pages and pages in which the reviewer usually gives his or her personal view of the subject of the book. That is, book reviews are seen as excuses for a reviewer to write exposition about a subject he or she enjoys. I think it's a little strange, and rarely interesting, but that's the norm.

I agree with the sentiment I once read that it's a waste of time to review a bad book, especially a mediocre one. A book review should, in my opinion, either steer the reader towards a book worth reading, explaining why the book is worthy and important; or, in cases of books published with a lot of fanfare (e.g., Wolfram's A New Kind of Science), discuss the merits or lack thereof of a book of which the reader is already aware. Why waste the time of reviewers and readers trashing a book no one will hear of otherwise? Just let such books die deservedly in obscurity.

A notable exception is an entertaining review of a truly wretched book. That's fun to read, but only if the reviewer is sufficiently talented to pull it off.

Censorship

Behind Google's Recent Decision About China 155

yuhong writes "This article by The Independent takes a look at what is behind the recent decisions made by Google regarding China, particularly regarding Sergey Brin, born in the USSR, [and whose origins] played a big part in this decision. From the article: 'He's always had an emotional tug within him, saying "we shouldn't be making compromises," says Ken Auletta, the author of Googled: The End of the World As We Know It.'"
Programming

Haskell 2010 Announced 173

paltemalte writes "Simon Marlow has posted an announcement of Haskell 2010, a new revision of the Haskell purely functional programming language. Good news for everyone interested in SMP and concurrency programming."
Earth

Is That Sushi Hazardous To Your Health? 554

pdclarry writes "A recent study by scientists at the American Museum of Natural History and Columbia University found that a piece of tuna sushi may not be tuna at all: 'A piece of tuna sushi has the potential to be an endangered species, a fraud or a health hazard,' wrote the authors. 'All three of these cases were uncovered in this study.' The study, published in PLoS ONE examined 68 samples of tuna sushi purchased from 31 restaurants in Manhattan (New York City) and Denver, Colorado. Some of these were from endangered species, others were not as labeled, and some were not tuna at all. Of these last, five samples labeled as 'white tuna' were from a toxic fish, Escolar, which is a gempylid species banned for sale in Italy and Japan due to health concerns. 'It can cause gastrointestinal symptoms ranging from mild and rapid passage of oily yellow or orange droplets, to severe diarrhea with nausea and vomiting. The milder symptoms have been referred to as keriorrhea [i.e. flow of wax in Greek].' Fraud in sushi is not new; Slashdot also reported study on mislabeling in 2008. This new study shows that some sushi can actually make you sick. The study was also covered by Wired."

Slashdot Top Deals

...when fits of creativity run strong, more than one programmer or writer has been known to abandon the desktop for the more spacious floor. - Fred Brooks, Jr.

Working...