The Media

65 Editorial Workers at Wired Are Threatening to Strike (axios.com) 51

"It's Friday night and I'm meant to be on my first vacation in a year," tweeted a senior writer at Wired. "But instead I've been bargaining with Wired management all day — and will tonight and into the weekend to get a fair deal."

65 editorial workers at Wired are threatening to strike for two days if they can't reach a contract agreement with their publisher, Condé Nast, by July 12. "The employees argue they aren't being paid equitably despite the fact that their work helps drive some of the company's most lucrative traffic days," reports Axios: High-profile writers are joining the union's push, arguing Wired workers should be treated equally to those at other Condé Nast-owned publications, especially when it comes to rights over their work.

"While Condé Nast owns our work, it's fair practice to allow writers and creators to share in the bounty when the work they produce is resold to others — and the company has agreed to that principle by giving full-time New Yorker writers a piece of the action when their work is reprinted by others, or sold to filmmakers," Steven Levy, editor at large at Wired and a contributor there since the magazine's 1993 launch, said in a statement provided to Axios by the union. "We've been asking for exactly the same terms that the New Yorker writers got in their contract, but Condé Nast won't even discuss this with us."

"It's insulting to imply that Wired creators are less deserving than other Condé employees," he said. "And it's not like our work isn't valued outside the company — a Wired story was the basis of a best-picture-of-the-year Oscar...!"

The first union to come out of Condé Nast was on behalf of employees at The New Yorker in June 2018. Ars Technica and Pitchfork launched their own unions the following year. Wired voted to unionize in April 2020.... Earlier this year, Condé Nast employees from publications that hadn't yet unionized, including Vogue, Bon Appétit and others, formed a union representing around 500 editorial workers.

The article also notes successful negotiations at tech sites BuzzFeed News and Vox Media — and shares one more strategic detail:

The Wired workers threatening to walk are asking their supporters to sign an online petition pledging "no contracts, no clicks." (That is, if the workers fail to reach a deal by Tuesday July 12th, "do not click on any WIRED links or shop through WIRED on July 12th and July 13th. Do not cross the picket line.") But if they do reach a deal by Tuesday, "please continue to click. Support union publications!"
Crime

British Army's Twitter and YouTube Accounts Compromised to Promote Crypto Scams (engadget.com) 16

The British army is "investigating an apparent hack," reports Engadget, after its official Twitter and YouTube accounts were compromised Sunday: News of the breach was first reported by Web3 is Going Great . According to the blog, both accounts were simultaneously compromised to promote two different cryptocurrency scams.

Although it has since been scrubbed, the army's verified Twitter account was briefly changed to look like a page for The Possessed, a project involving a collection of 10,000 animated NFTs with a price floor of 0.58 Ethereum (approximately $1,063). During that time, the account tweeted out multiple links to a fake minting website....

Over on YouTube, the army's channel [had] been made to look like a page for Ark Invest...livestreaming videos that repurpose old footage of Elon Musk, Jack Dorsey and Ark CEO Katie Wood discussing cryptocurrency. The clips feature an overlay promoting "double your money" Bitcoin and Ethereum scams. According to Web3 is Going Great, a similar scheme netted scammers $1.3 million this past May. It's unclear who is behind the attacks.

Piracy

Kim Dotcom Not Happy, Says 'Mega Mass Piracy Report' Is On the Way (torrentfreak.com) 39

An anonymous reader quotes a report from TorrentFreak: Megaupload founder Kim Dotcom does not seem like a happy man right now. After accusing two of his former colleagues [Mathias Ortmann and Bram van der Kolk] of facilitating Chinese spying, Dotcom says that a report is being produced to show that mass infringement is taking place on Mega, a company he co-founded. Surprisingly, he says it will include live pirate links to content posted by Mega users. [...] Turning his attention to former colleagues Ortmann and van der Kolk, last week Dotcom publicly blamed them for his exit from Mega, claiming they had "stolen" the company from him. How this dovetails with previous allegations related to his major falling out with former Mega CEO Tony Lentino, who also founded domain name registrar Instra, is unknown.

Local media reports suggest that Dotcom hasn't spoken to former friends Ortmann and van der Kolk for years but their recent deal to avoid extradition in the Megaupload case by pleading guilty to organized crime charges puts Dotcom in a tough spot. "My co-defendants who claimed to be innocent for 10+ years were offered a sweet exit deal for a false confession," he said last week. And he wasn't finished there. After a research team found that Mega was vulnerable to attacks that allow for a "full compromise of the confidentiality of user files", Ortmann himself responded via a security notification stating that the issues had been fixed. In response, Dotcom accused Ortmann and van der Kolk of creating "backdoors" in Mega so that the Chinese government could decrypt users' files. "Same shady guys who just made a deal with the US and NZ Govt to get out of the US extradition case by falsely accusing me," he added.

Whether this reference to the no-extradition-deal betrayed what was really on Dotcom's mind is up for debate but whatever the motivation, he's not letting it go. In a tweet posted yesterday, he again informed his 850K+ followers that the company he founded "is not safe" and people who think that their files are unreadable by Mega are wrong. Shortly after, Dotcom delivered another message, one even darker in tone. It targeted Mega, the company he co-founded and where his colleagues still work. It's possible to interpret the tweet in several ways but none seem beneficial to his former colleagues, Mega, or its users. "In addition to security vulnerabilities a comprehensive report about mass copyright infringement on Mega with millions of active links and channels is in the works," he said.
"[P]erhaps the most worrying thing about this new complication in an escalating dispute is its potential to affect the minority of users that actually store infringing files on Mega," adds TorrentFreak. "Any detailed report of 'mass copyright infringement' will draw negative attention directly to them, especially if the report includes active hyperlinks as Dotcom suggests."

"Couple that with Dotcom's allegations that the content of user files can be read, any conclusion that this upcoming infringement report hasn't been thought through from a user perspective can be easily forgiven..."
Security

Cyber Pirates Prowling Ship Controls Threaten Another Big Shock (bloomberg.com) 34

An anonymous reader shares a report: In February 2019, a large container ship sailing for New York identified a cyber intrusion on board that startled the US Coast Guard. Though the malware attack never controlled the vessel's movement, authorities concluded that weak defenses exposed critical functions to "significant vulnerabilities." A maritime disaster didn't happen that day, but a warning flare rose over an emerging threat to global trade: cyber piracy able to penetrate on-board technology that's replacing old ways of steering, propulsion, navigation and other key operations. Such leaps in hacking capabilities could do enormous economic damage, particularly now, when supply chains are already stressed from the pandemic and the war in Ukraine, experts including a top Coast Guard official said.

"We've been lucky so far," said Rick Tiene, vice president with Mission Secure, a cybersecurity firm in Charlottesville, Virginia. "More and more incidents are happening, and the hackers are getting a better understanding what they can do once they've taken over an operational technology system. In the case of maritime -- whether it be the ports or the vessels themselves -- there is a tremendous amount that could be done to harm both the network and physical operations." Rear Admiral Wayne Arguin, the Coast Guard's assistant commandant for prevention policy, said shipping faces cyber risks similar to those in other industries -- it's just that the stakes are so much higher given that almost 80% of global trade moves on the sea. While Arguin declined to put a number on the frequency of attempted break-ins, he said "I feel very confident that every day networks are being tested, which really reinforces the need to have a plan."
"That universe includes not just ship operators but port terminals and the thousands of logistics links in global supply chains that are increasingly interconnected," the story adds.
AI

A Single AI-Enhanced Brain Scan Can Diagnose Alzheimer's Disease (imperial.ac.uk) 10

Long-time Slashdot reader schwit1 shares an announcement from London's Imperial College of Science, Technology and Medicine: A single MRI scan of the brain could be enough to diagnose Alzheimer's disease, according to new research by Imperial College London.

The research uses machine learning technology to look at structural features within the brain, including in regions not previously associated with Alzheimer's. The advantage of the technique is its simplicity and the fact that it can identify the disease at an early stage when it can be very difficult to diagnose. Although there is no cure for Alzheimer's disease, getting a diagnosis quickly at an early stage helps patients. It allows them to access help and support, get treatment to manage their symptoms and plan for the future. Being able to accurately identify patients at an early stage of the disease will also help researchers to understand the brain changes that trigger the disease, and support development and trials of new treatments....

The researchers adapted an algorithm developed for use in classifying cancer tumours, and applied it to the brain. They divided the brain into 115 regions and allocated 660 different features, such as size, shape and texture, to assess each region. They then trained the algorithm to identify where changes to these features could accurately predict the existence of Alzheimer's disease... They found that in 98 per cent of cases, the MRI-based machine learning system alone could accurately predict whether the patient had Alzheimer's disease or not. It was also able to distinguish between early and late-stage Alzheimer's with fairly high accuracy, in 79 per cent of patients.

Professor Eric Aboagye, from Imperial's Department of Surgery and Cancer, who led the research, said: "Currently no other simple and widely available methods can predict Alzheimer's disease with this level of accuracy, so our research is an important step forward...." The new system spotted changes in areas of the brain not previously associated with Alzheimer's disease, [which] opens up potential new avenues for research into these areas and their links to Alzheimer's disease.

Professor Aboagye adds that this new approach "could also identify early-stage patients for clinical trials of new drug treatments or lifestyle changes, which is currently very hard to do."
Twitter

Twitter Testing Notes, a Long-Form Content Feature (searchengineland.com) 25

An anonymous reader quotes a report from Search Engine Land: Twitter is testing a new feature that would eliminate the constraints of its 280-character tweet limit and allow users to publish long-form tweets. Twitter confirmed the test via a tweet.

When this will become available to all Twitter users? It's unclear. Twitter noted: "We're excited for the moment when everyone can use Notes, but for now, our focus is on building it right. A large part of that is engaging with writers and building community." For now, Twitter plans to test it over the next two months with a small group of writers from Canada, Ghana, the UK and the U.S.

In Twitter Notes, it looks like you will be able to add:
- Formatting: Bold, italic and strikethrough text; insert ordered/unordered lists; add links.
- Media: You can add one GIF, one video, or up to four images.
- Tweets: You can either embed tweets by pasting URLs or from bookmarked tweets.

Notes also has a "Focus mode," that makes the article composer full-screen.

Privacy

Shadowy Strava Users Spy on Israeli Military With Fake Routes in Bases (theguardian.com) 24

Unidentified operatives have been using the fitness tracking app Strava to spy on members of the Israeli military, tracking their movements across secret bases around the country and potentially observing them as they travel the world on official business. From a report: By placing fake running "segments" inside military bases, the operation -- the affiliation of which has not been uncovered -- was able to keep tabs on individuals who were exercising on the bases, even those who have applied the strongest possible account privacy settings. In one example seen by the Guardian, a user running on a top-secret base thought to have links to the Israeli nuclear programme could be tracked across other military bases and to a foreign country.

The surveillance campaign was discovered by the Israeli open-source intelligence outfit FakeReporter. The group's executive director, Achiya Schatz, said: "We contacted the Israeli security forces as soon as we became aware of this security breach. After receiving approval from the security forces to proceed, FakeReporter contacted Strava, and they formed a senior team to address the issue." Strava's tracking tools are designed to allow anyone to define and compete over "segments," short sections of a run or bike ride that may be regularly raced over, like a long uphill climb on a popular cycling route or a single circuit of a park. Users can define a segment after uploading it from the Strava app, but can also upload GPS recordings from other products or services.

Social Networks

Is Social Media Really Harmful? (newyorker.com) 202

Social media has made us "uniquely stupid," believes Jonathan Haidt, a social psychologist at the New York University's School of Business. Writing in the Atlantic in April, Haidt argued that large social media platforms "unwittingly dissolved the mortar of trust, belief in institutions, and shared stories that had held a large and diverse secular democracy together."

But is that true? "We're years into this, and we're still having an uninformed conversation about social media," notes Dartmouth political scientist Brendan Nyhan (quoted this month in a new article in the New Yorker).

The article describes how Haidt tried to confirm his theories in November with Chris Bail, a sociologist at Duke and author of the book "Breaking the Social Media Prism." The two compiled a Google Doc collecting every scholarly study of social media — but many of the studies seemed to contradict each other: When I told Bail that the upshot seemed to me to be that exactly nothing was unambiguously clear, he suggested that there was at least some firm ground. He sounded a bit less apocalyptic than Haidt.

"A lot of the stories out there are just wrong," he told me. "The political echo chamber has been massively overstated. Maybe it's three to five per cent of people who are properly in an echo chamber." Echo chambers, as hotboxes of confirmation bias, are counterproductive for democracy. But research indicates that most of us are actually exposed to a wider range of views on social media than we are in real life, where our social networks — in the original use of the term — are rarely heterogeneous. (Haidt told me that this was an issue on which the Google Doc changed his mind; he became convinced that echo chambers probably aren't as widespread a problem as he'd once imagined....)

[A]t least so far, very few Americans seem to suffer from consistent exposure to fake news — "probably less than two per cent of Twitter users, maybe fewer now, and for those who were it didn't change their opinions," Bail said. This was probably because the people likeliest to consume such spectacles were the sort of people primed to believe them in the first place. "In fact," he said, "echo chambers might have done something to quarantine that misinformation."

The final story that Bail wanted to discuss was the "proverbial rabbit hole, the path to algorithmic radicalization," by which YouTube might serve a viewer increasingly extreme videos. There is some anecdotal evidence to suggest that this does happen, at least on occasion, and such anecdotes are alarming to hear. But a new working paper led by Brendan Nyhan, a political scientist at Dartmouth, found that almost all extremist content is either consumed by subscribers to the relevant channels — a sign of actual demand rather than manipulation or preference falsification — or encountered via links from external sites. It's easy to see why we might prefer if this were not the case: algorithmic radicalization is presumably a simpler problem to solve than the fact that there are people who deliberately seek out vile content. "These are the three stories — echo chambers, foreign influence campaigns, and radicalizing recommendation algorithms — but, when you look at the literature, they've all been overstated." He thought that these findings were crucial for us to assimilate, if only to help us understand that our problems may lie beyond technocratic tinkering. He explained, "Part of my interest in getting this research out there is to demonstrate that everybody is waiting for an Elon Musk to ride in and save us with an algorithm" — or, presumably, the reverse — "and it's just not going to happen."

Nyhan also tells the New Yorker that "The most credible research is way out of line with the takes," adding, for example, that while studies may find polarization on social media, "That might just be the society we live in reflected on social media!" He hastened to add, "Not that this is untroubling, and none of this is to let these companies, which are exercising a lot of power with very little scrutiny, off the hook. But a lot of the criticisms of them are very poorly founded. . . . The lack of good data is a huge problem insofar as it lets people project their own fears into this area." He told me, "It's hard to weigh in on the side of 'We don't know, the evidence is weak,' because those points are always going to be drowned out in our discourse. But these arguments are systematically underprovided in the public domain...."

Nyhan argued that, at least in wealthy Western countries, we might be too heavily discounting the degree to which platforms have responded to criticism... He added, "There's some evidence that, with reverse-chronological feeds" — streams of unwashed content, which some critics argue are less manipulative than algorithmic curation — "people get exposed to more low-quality content, so it's another case where a very simple notion of 'algorithms are bad' doesn't stand up to scrutiny. It doesn't mean they're good, it's just that we don't know."

KDE

KDE Plasma 5.25 Released (kde.org) 27

Long-time Slashdot reader jrepin describes Plasma as "a popular desktop environment, which is also powering the desktop mode on the Steam Deck portable gaming console."

And this week the KDE Community announced the release of KDE Plasma 5.25: This new version brings many improvements...

- The accent colour can now be set based on the prominent colour from the current desktop background image (it updates if you use slide-show wallpapers) and it applies to more graphical elements.

- Floating Panels add a margin all around the panel to make it float while no window is maximised.

- Touch-screen mode can now be activated by detaching the screen, rotating it 360, or enabling it manually.

- The Global Theme settings page lets you pick and choose which parts to apply.

- The Application page for Discover has been redesigned and gives you links to the application's documentation and website, and shows what system resources it has access to.

- Panels can now be navigated with the keyboard, and you can assign custom shortcuts to focus individual panels.

Lilputing.com adds that "There's a new Overview effect that zooms out to display previews of all currently-running apps and virtual desktops. You can access this view with a four-finger pinch on a touchscreen or touchpad, and from this view, you can also search for apps, documents, or browser tabs or add, remove, or rename virtual desktops."
The Internet

SEO Tool Ahrefs Built a $60M, Creator-Friendly Search Engine Named Yep (techcrunch.com) 28

In 2019 SEO toolset provider Ahrefs announced it would build it's own search engine, remembers Search Engine Land. After investing $60 million of its own money, this month that search engine has finally launched with the name of "Yep", and Ahrefs "is positioning it as a Googe competitor.

"However, we've seen plenty of Google competitors and Google "killers" come and go over the past two decades. So for now, let's just call it a Google alternative... Yep will not collect personal information (e.g., geolocation, name, age, gender) by default. Your Yep search history will not be stored anywhere.

What Yep will rely on is aggregated search statistics to improve algorithms, spelling corrections, and search suggestions, the company said. "In other words, we do save certain data on searches, but never in a personally identifiable way," said Ahrefs CEO Dmytro Gerasymenko.... What Yep will use is a searcher's:

- Entered keywords.
- Language preference received from the browser.
- Approximate geographical area at the origin of the search at the scale of a region or a city (deduced from the IP address)....

AhrefsBot visits more than 8 billion webpages every 24 hours, which makes it the second most active crawler on the web, behind only Google, Ahrefs said. For 12 years, AhrefsBot has been crawling the web. They had just been using the AhrefsBot data to power its link database and SEO insights. The Yep search index is updated every 15 to 30 minutes. Daily, the company adds 30 million webpages and drops 20 million.

Ahrefs said its Singapore data center is powered by around 1,000 servers that store and process 100 petabytes of web data (webpages, links between them, and the search index). Each server uses at least 2x 100GB connections... Before the end of the year, Ahrefs plans to open a U.S.-based data center.

"It's a unique proposition," reports TechCrunch, "running its own search index, rather than relying on APIs from Google or Bing.

"As for the name? I dunno; Yep seems pretty daft to me, but I guess at least the name is one character shorter than Bing, the other major search engine I'll only ever use by accident." Name aside, Yep is taking a fresh new path through the world of internet advertising, claiming that it's giving 90% of its ad revenues to content creators. The pitch is pretty elegant:

"Let's say that the biggest search engine in the world makes $100B a year. Now, imagine if they gave $90B to content creators and publishers," the company paints a picture of the future it wants to live in. "Wikipedia would probably earn a few billion dollars a year from its content. They'd be able to stop asking for donations and start paying the people who polish their articles a decent salary."

It's an impressively quixotic windmill to fight for the bootstrapped company Ahrefs. Its CEO sheds some light on why this makes sense to him:

"Creators who make search results possible deserve to receive payments for their work...."

Perhaps it sounds a little idealistic, but damn it, that's what made me excited about Yep in the first place. It represents the faintest of echoes from a web more innocent and more hopeful than the social-media poisoned cesspool of chaos and fake news we often find ourselves in today.

Search Engine Land points out that DuckDuckGo, which launched in 2008, "gets as many searches per year (~15.7 billion) as Google gets in about two or three days. Even Microsoft Bing — which is owned by Microsoft, the third-largest company on the planet by market cap — has failed to make a significant dent in Google's search market share since 2009."

But they also quote Ahrefs CEO Dmytro Gerasymenko as saying in 2019, "If we succeed in our endeavors, Google will finally get some long overdue competition for search."
Google

Google To Combine Meet, Duo Into Single App (theverge.com) 19

Google announced today that it's combining two of its video-calling apps, Duo and Meet, into a single platform. The Verge reports: Pretty soon, there will be only Google Meet, and Google's hoping it can be the one calling app users need for just about everything in their lives. By bringing them both together, Google's hoping it can solve some of what ails modern communication tools. [...] Over the last couple of years in particular, Meet has become a powerful platform for meetings and group chats of all kinds, while Duo has stayed more of a messaging app. Google promises it's bringing all of Duo's features to Meet going forward and seems convinced it can offer the best of both worlds.

It's not quite right to say that Duo's being killed, though. The app, which Google originally launched in 2016 as an easy way to make one-to-one video calls, does a number of useful things that Meet doesn't. For one thing, you can call someone directly -- including with their phone number -- rather than relying on sending links or hitting that giant Meet button in your Google Calendar invite. Duo has always been more like FaceTime than Zoom in that sense. (Google also launched an iMessage competitor, Allo, at the same time as Duo. Allo didn't turn out so great.)

As the two services become one, Google is leaning on Duo's mobile app as the default. Pretty soon, the Duo app will get an update that brings an onslaught of Meet features into the platform; later this year, the Duo app will be renamed Google Meet. The current Meet app will be called "Meet Original," and eventually deprecated. This sounds... confusing, but Google claims it's the best way forward.

Microsoft

Microsoft Is Killing Money In Excel Along With Wolfram Alpha Data Types (xda-developers.com) 73

In an email sent to Microsoft 365 subscribers, the company announced that is killing off Money and Wolfram Alpha data types in Excel starting next year. XDA Developers reports: Money in Excel was one of the big features Microsoft touted when it rebranded Office 365 consumer plans to Microsoft 365. Essentially, it allowed you to easily import data from your bank to help you keep an eye on your finances. That happened just over two years ago, so this feature will have lived just over three years by the time it's discontinued. Thankfully, you can still use it until June 30th, 2023, and your existing data won't disappear. You just won't be able to add any more data to it. Microsoft is instead offering a 60-day free trial of Tiller if you're looking for a similar service, but that means you'll eventually be spending more money on another subscription.

The other feature that's being discontinued is Wolfram Alpha data types, which are also pretty recent. Microsoft first introduced them in July 2020, and they'll stop working on June 11th next year, so they will have lasted less than three years. Excel featured over 100 Wolfram Alpha data types and it seemed to be a big investment for Microsoft, but it's falling by the wayside. This lack of support means refreshing data, following links, and most other features related to Wolfram Alpha data will stop working. Aside from these features, Microsoft is also killing off partner benefits, which could net you discounts on certain products from Microsoft partners if you were a Microsoft 365 subscriber. These will also be discontinued on June 30th, 2023, but until then, you can still check out the available offers if you're interested.

The Military

Navy Ships Swarmed By Drones, Not UFOs, Defense Officials Confirm (thedrive.com) 103

The Drive's Adam Kehoe noticed something during this week's UFO hearings in the U.S. Congress. "After intense public speculation, stacks of official documents obtained via the Freedom Of Information Act, ambiguous statements from top officials, and an avalanche of media attention, it has now been made clear that the mysterious swarming of U.S. Navy ships off the Southern California coast in 2019 was caused by drones, not otherworldly UFOs or other mysterious craft.

"Raising even more questions, a similar drone swarm event has occurred off another coast, as well." These revelations came from top Department of Defense officials during a recent and much-anticipated house hearing on UFOs, which you can read all about here.

The strange series of events in question unfolded around California's Channel Islands in July of 2019. On multiple evenings, swarms of unidentified drones were spotted operating around U.S. Navy vessels. In numerous instances, the drones flew within close proximity to ships, even crossing directly over their decks. The behavior provoked defensive reactions from the ships, including the deployment of emergency security teams... Deck logs demonstrate that the Navy appears to have drilled and implemented a variety of counter-drone techniques in response to these incidents. This eventually included the deployment of Northrop Grumman's Drone Restricted Access Using Known EW (DRAKE) platform. The DRAKE system is a man-portable backpack that allows sailors to use radio frequency signals to interrupt the control links of drones. The DRAKE system appears to have been actually deployed in one of the incidents....

It is entirely unclear where the drones were operating from, how they were controlled, or who was controlling them. Still, the Navy could identify the objects as drones without those questions being fully answered at this time.... The Department of Defense's open acknowledgment of these drone swarm events just off U.S. shores shows that the threat is not theoretical. It is also not a future threat. Significant drone swarm events have occurred in the last three years, unknown to the public, and evidently unresolved by defense authorities. Judging by what is known to date about the 2019 incident, it is clear that the United States is not well-positioned to detect, identify and neutralize such threats. It remains to be seen what level of priority these issues will receive by lawmakers in relation to more speculative questions surrounding UAP.

If anything else, top confirmation that adversaries are operating swarms among America's most powerful weapons in training areas where their most sensitive capabilities are put to use should make national headlines, but because it was buried in sensationalism around UFOs, it clearly did not.

Social Networks

Can Tech Firms Prevent Violent Videos Circulating on the Internet? (theguardian.com) 116

This week New York's attorney general announced they're officially "launching investigations into the social media companies that the Buffalo shooter used to plan, promote, and stream his terror attack." Slashdot reader echo123 points out that Discord confirmed that roughly 30 minutes before the attack a "small group" was invited to join the shooter's server. "None of the people he invited to review his writings appeared to have alerted law enforcement," reports the New York Times., "and the massacre played out much as envisioned."

But meanwhile, another Times article tells a tangentially-related story from 2019 about what ultimately happened to "a partial recording of a livestream by a gunman while he murdered 51 people that day at two mosques in Christchurch, New Zealand." For more than three years, the video has remained undisturbed on Facebook, cropped to a square and slowed down in parts. About three-quarters of the way through the video, text pops up urging the audience to "Share THIS...." Online writings apparently connected to the 18-year-old man accused of killing 10 people at a Buffalo, New York, grocery store Saturday said that he drew inspiration for a livestreamed attack from the Christchurch shooting. The clip on Facebook — one of dozens that are online, even after years of work to remove them — may have been part of the reason that the Christchurch gunman's tactics were so easy to emulate.

In a search spanning 24 hours this week, The New York Times identified more than 50 clips and online links with the Christchurch gunman's 2019 footage. They were on at least nine platforms and websites, including Reddit, Twitter, Telegram, 4chan and the video site Rumble, according to the Times' review. Three of the videos had been uploaded to Facebook as far back as the day of the killings, according to the Tech Transparency Project, an industry watchdog group, while others were posted as recently as this week. The clips and links were not difficult to find, even though Facebook, Twitter and other platforms pledged in 2019 to eradicate the footage, pushed partly by public outrage over the incident and by world governments. In the aftermath, tech companies and governments banded together, forming coalitions to crack down on terrorist and violent extremist content online. Yet even as Facebook expunged 4.5 million pieces of content related to the Christchurch attack within six months of the killings, what the Times found this week shows that a mass killer's video has an enduring — and potentially everlasting — afterlife on the internet.

"It is clear some progress has been made since Christchurch, but we also live in a kind of world where these videos will never be scrubbed completely from the internet," said Brian Fishman, a former director of counterterrorism at Facebook who helped lead the effort to identify and remove the Christchurch videos from the site in 2019....

Facebook, which is owned by Meta, said that for every 10,000 views of content on the platform, only an estimated five were of terrorism-related material. Rumble and Reddit said the Christchurch videos violated their rules and they were continuing to remove them. Twitter, 4chan and Telegram did not respond to requests for comment

For what it's worth, this week CNN also republished an email they'd received in 2016 from 4chan's current owner, Hiroyuki Nishimura. The gist of the email? "If I liked censorship, I would have already done that."

But Slashdot reader Bruce66423 also shares an interesting observation from The Guardian's senior tech reporter about the major tech platforms. "According to Hany Farid, a professor of computer science at UC Berkeley, there is a tech solution to this uniquely tech problem. Tech companies just aren't financially motivated to invest resources into developing it." Farid's work includes research into robust hashing, a tool that creates a fingerprint for videos that allows platforms to find them and their copies as soon as they are uploaded...

Farid: It's not as hard a problem as the technology sector will have you believe... The core technology to stop redistribution is called "hashing" or "robust hashing" or "perceptual hashing". The basic idea is quite simple: you have a piece of content that is not allowed on your service either because it violated terms of service, it's illegal or for whatever reason, you reach into that content, and extract a digital signature, or a hash as it's called.... That's actually pretty easy to do. We've been able to do this for a long time. The second part is that the signature should be stable even if the content is being modified, when somebody changes say the size or the color or adds text. The last thing is you should be able to extract and compare signatures very quickly.

So if we had a technology that satisfied all of those criteria, Twitch would say, we've identified a terror attack that's being live-streamed. We're going to grab that video. We're going to extract the hash and we are going to share it with the industry. And then every time a video is uploaded with the hash, the signature is compared against this database, which is being updated almost instantaneously. And then you stop the redistribution.

It's a problem of collaboration across the industry and it's a problem of the underlying technology. And if this was the first time it happened, I'd understand. But this is not, this is not the 10th time. It's not the 20th time. I want to emphasize: no technology's going to be perfect. It's battling an inherently adversarial system. But this is not a few things slipping through the cracks.... This is a complete catastrophic failure to contain this material. And in my opinion, as it was with New Zealand and as it was the one before then, it is inexcusable from a technological standpoint.

"These are now trillion-dollar companies we are talking about collectively," Farid points out later. "How is it that their hashing technology is so bad?
Communications

Two Military Satellites Just Communicated With Each Other Using Space Lasers 51

Two satellites recently exchanged more than 200 gigabits of data over a distance of about 60 miles (100 kilometers) using laser communication in space. Gizmodo reports: Satellites generally don't communicate directly with each other. Instead, they use radio signals to transfer data down to a ground station on Earth, which then relays this data to another satellite. Optical terminals between satellites are considered to be faster and more secure. CACI International -- the company that developed the optical terminals for the space lasers -- announced the achievement on Tuesday in a press release. The two satellites, named Able and Baker, were launched last summer by the U.S. Defense Advanced Research Projects Agency as part of its Blackjack project. DARPA is seeking to build a constellation of small satellites in low Earth orbit for the purpose of supporting military operations.

The two satellites successfully pulled off the 40-minute laser communications experiment on April 14, during which time Able and Baker used CACI's CrossBeam free-space optical terminals. Infrared lasers transmit data by encoding the message into an optical signal, which is then carried to a receiver. The experiment, known as Mandrake 2, was funded by the Space Development Agency (SDA) and the Air Force Research Laboratory. Mandrake 2 launched on June 30, 2021 as an early risk-reduction flight for DARPA's Blackjack constellation project. The Blackjack constellation aims to deploy an initial batch of 20 small satellites in low Earth orbit, which will connect with each other to form a mesh network in space.

The idea is not to rival commercial satellite constellations such as SpaceX's Starlink, but rather to have a government-owned constellation that the military can use to connect to its bases, sensors, and weapons across the world. The SDA is planning to launch the 20 satellites this fall and then launch an additional 126 satellites by 2024, according to SpaceNews. The agency is seeking to create a full constellation that would include somewhere between 300 and 500 satellites in low Earth orbit. The satellites are being developed by Lockheed Martin, Northrop Grumman, and York Space.
Google

Google Messages RCS Is Being Abused For Ads In India (9to5google.com) 11

Over the past few weeks, Google Messages users in India have been reporting more and more ads showing up through RCS messaging. 9to5Google reports: While many brands -- even in the US and other countries -- have used messaging apps and SMS texts to advertise new products to former customers, these ads going on in India are not necessarily the result of a user's buying activity. Business messaging on RCS, as Google's Jibe website points out, is supposed to be used for things such as sending copies of your travel tickets or sending links for buying additional products based on a past purchase based on a user's request. [...] That is very much not what is happening in India right now.

Brought to our attention by Ishan Argwal on Twitter, RCS ads in Google Messages appear to be coming from "Verified Business" accounts. Google first announced that functionality back in 2020, for the purposes of allowing customers to talk to businesses. Advertising was surely part of the functionality, but it's clearly being abused in India. Android Police says these ads have been going out for almost a year now, citing examples of ads sent by Kotak Mahindra Bank, Bajaj Finserv, Buddy Loan, and PolicyBazaar. From what we can tell from user reports, it appears the frequency of these ads has been picking up over the past few months especially.

These ads are not harmless, either, with many of the examples we've seen being for personal loans, a category that tends to be full of predatory practices. One user reports that they were sent one of these ads on a phone that didn't even have an active SIM card in it. Currently, it seems as though this practice is primarily happening in the Indian market, at least in this quantity. What can be done about these ads in Google Messages? The solutions are all not quite ideal, unfortunately. You can report these businesses and block them from sending future messages [...]. Alternatively, you can turn off RCS features entirely within the Google Messages app.

Security

Hackers Are Using SEO To Rank Malicious PDFs On Search Engines, Research Finds 13

An anonymous reader quotes a report from VentureBeat: Today, researchers at security service edge provider, Netskope, published the Netskope Cloud and Threat Report: Global Cloud and Malware Trends, which found that phishing downloads rose 450% over the past 12 months, and highlighted that attackers are using search engine optimization (SEO) to rank malicious PDF files on search engines. The report's findings show that phishing attempts are constantly evolving, and attackers aren't just targeting employees through their email inboxes; they're also using popular search engines like Google and Bing. The increase in phishing attacks and the growing popularity of SEO techniques among cybercriminals highlights the need for enterprises to provide their employees with security awareness training so they're prepared to spot threats and not at risk of handing over sensitive information.

When it comes to defending against these SEO-driven attacks, [Ray Canzanese, director of Netskope's Threat Labs] highlights several methods that security teams can use to protect employees. One of the most effective is to use a solution that can decrypt and scan web traffic for malicious content. At the same time, security teams should encourage users to inspect all links they click on, and to exercise caution if the link takes them to an unfamiliar website. In the event an employee does click on a malicious PDF, they can expect to see a fake captcha at the top of the first page, followed by text on other pages. In these scenarios, users should close the file, delete it from the device and report it to the security team ASAP. Canzanese also notes that it's important for users to report malicious URLs that feature on popular search engines to help the provider unlist them from the site and prevent other users from falling victim to a scam.
Earth

Cleaner Air Leads To More Atlantic Hurricanes, Study Finds (apnews.com) 85

Cleaner air in United States and Europe is brewing more Atlantic hurricanes, a new U.S. government study found. The Associated Press reports: The National Oceanic and Atmospheric Administration study links changes in regionalized air pollution across the globe to storm activity going both up and down. A 50% decrease in pollution particles and droplets in Europe and the U.S. is linked to a 33% increase in Atlantic storm formation in the past couple decades, while the opposite is happening in the Pacific with more pollution and fewer typhoons, according to the study published in Wednesday's Science Advances.

NOAA hurricane scientist Hiroyuki Murakami ran numerous climate computer simulations to explain change in storm activity in different parts of the globe that can't be explained by natural climate cycles and found a link to aerosol pollution from industry and cars -- sulfur particles and droplets in the air that make it hard to breathe and see. Scientists had long known that aerosol pollution cools the air, at times reducing the larger effects of greenhouse gases from the burning of fossil fuel and earlier studies mentioned it as a possibility in increase in Atlantic storms, but Murakami found it a factor around the world and a more direct link.

Hurricanes need warm water -- which is warmed by the air -- for fuel and are harmed by wind shear, which changes in upper level winds that can decapitate storm tops. Cleaner air in the Atlantic and dirtier air in the Pacific, from pollution in China and India, mess with both of those, Murakami said. In the Atlantic, aerosol pollution peaked around 1980 and has been dropping steadily since. That means the cooling that masked some of the greenhouse gas warming is going away, so sea surface temperatures are increasing even more, Murakami said. On top of that the lack of cooling aerosols has helped push the jet stream -- the river of air that moves weather from west to east on a roller-coaster like path -- further north, reducing the shear that had been dampening hurricane formation.

Ubuntu

This Week Saw New Releases of 'Ubuntu Unity' and 'Ubuntu Cinnamon' (theregister.com) 74

The Register noted this week that two "unofficial" Ubuntu remixes "came out on the same day as the official flavors."

- Ubuntu Cinnamon (Linux Mint's flagship desktop environment)

- Ubuntu Unity, a revival of what used to be the official Ubuntu desktop by Ubuntu team member Rudra B. Saraswat (described the Register as "a 12-year-old wunderkind") Ubuntu Cinnamon is the older of the two and first appeared in 2019, while Ubuntu Unity came out in May 2020, soon after the release of Ubuntu 20.04.

Ubuntu Unity....has the macOS-like desktop that was Ubuntu's standard offering from 2011 until the company pensioned it off in 2017.... Ubuntu Unity is as free as Ubuntu itself, and the new remix continues to evolve. In 22.04, most of the GNOME-based accessory apps have been replaced with the MATE equivalents, such as the Pluma text editor and Atril document viewer. (A handful remain, such as the GNOME system monitor rather than the MATE one, but the differences are trivial.) The System Settings app is the original Unity one, and the Unity Tweaks app comes pre-installed.... The new "Jammy Jellyfish" version of Ubuntu Unity also adds support for Flatpak packages alongside Ubuntu's native Snap packages. To do this, it replaces Ubuntu's Software Store with version 41.5 of GNOME Software. Interestingly, this also supports Snap packages, so sometimes, when you search for a package, you might get multiple results: one for the OS-native DEB package, possibly one for a Flatpak, and maybe a Snap version too....

[I]f you dislike both the Unity and GNOME desktops and want something more Windows-like, but you don't mind GNOME's CSD windows, then Joshua Peisach's Ubuntu Cinnamon remix may appeal. Cinnamon is the default desktop of both Ubuntu-based Linux Mint and its Debian variant. Ubuntu Cinnamon combines the latest upstream version of Mint's Cinnamon desktop, 5.2.7, with the standard app selection of upstream Ubuntu. This means most of its apps lack menu bars, except for the Nemo file manager and LibreOffice. For these classic-style apps, the Ubuntu Cinnamon distro has tweaked the GNOME title-bar layout to be more Windows-like: minimize/maximize/close buttons at top right, and a window-management menu at top left....

Cinnamon's roots as a fork of GNOME 3 do offer a significant potential feature that MATE, Xfce and indeed Unity cannot do: fractional scaling. This is clearly labelled as an experimental feature, and in testing, we couldn't get it to work, so for now, this remains a theoretical advantage.... These caveats aside, though, Ubuntu Cinnamon is maturing nicely in the new version. While Ubuntu and Ubuntu Unity are now purple-toned, Ubuntu Cinnamon has switched to a restrained theme in shades of dark orange and brown, which reminded us of the tasteful earth-toned Ubuntu of the old GNOME 2 days...

Both these desktops are X.11-based, so there's not a trace of Wayland in either distro. Both also benefit from having working 3D acceleration.

Both remixes "are aiming for inclusion as official Ubuntu flavors," the article points out.

But then again, "There are dozens of Ubuntu remixes and flavors out there. The official Ubuntu Derivatives page links to 30, and DistroWatch has more than five times as many, including many which are no longer maintained."
Chrome

Chrome's Latest Update: 30 Security Fixes and Bug Details Kept 'Restricted' (hothardware.com) 28

Hot Hardware warns that on Tuesday, the Stable Channel for Chrome's desktop edition "had an update on April 26, 2022. That update includes 30 security fixes, some of them so bad that Google is urging all users to update immediately." The release notes for Google's Chrome v101.0.4951.41 for Windows, Mac, and Linux has a long list of bug fixes; you can view it here. However, there's also a key statement in that page.

"Note: Access to bug details and links may be kept restricted until a majority of users are updated with a fix. We will also retain restrictions if the bug exists in a third party library that other projects similarly depend on, but haven't yet fixed...."

Effectively the the non-developer translation of the quote above is that something so significant was found, the details are being kept hidden.

Slashdot Top Deals