NASA

NASA Investigates Laser-Beam Welding in a Vacuum for In-Space Manufacturing (nasa.gov) 41

NASA hopes to stimulate in-space manufacturing through a multi-year "laser beam welding collaboration" with Ohio State University. The project "seeks to understand the physical processes of welding on the lunar surface," according to NASA.gov, "such as investigating the effects of laser beam welding in a combined vacuum and reduced gravity environment." The goal is to increase the capabilities of manufacturing in space to potentially assemble large structures or make repairs on the Moon, which will inform humanity's next giant leap of sending astronauts to Mars and beyond. "For a long time, we've used fasteners, rivets, or other mechanical means to keep structures that we assemble together in space," said Andrew O'Connor, a Marshall materials scientist who is helping coordinate the collaborative effort and is NASA's technical lead for the project. "But we're starting to realize that if we really want strong joints and if we want structures to stay together when assembled on the lunar surface, we may need in-space welding."

The ability to weld structures in space would also eliminate the need to transport rivets and other materials, reducing payloads for space travel. That means learning how welds will perform in space. To turn the effort into reality, researchers are gathering data on welding under simulated space conditions, such as temperature and heat transfer in a vacuum; the size and shape of the molten area under a laser beam; how the weld cross-section looks after it solidifies; and how mechanical properties change for welds performed in environmental conditions mimicking the lunar surface. "Once you leave Earth, it becomes more difficult to test how the weld performs, so we are leveraging both experiments and computer modeling to predict welding in space while we're still on the ground," said O'Connor.

In August 2024, a joint team from Ohio State's Welding Engineering and Multidisciplinary Capstone Programs and Marshall's Materials & Processes Laboratory performed high-powered fiber laser beam welding aboard a commercial aircraft that simulated reduced gravity. The aircraft performed parabolic flight maneuvers that began in level flight, pulled up to add 8,000 feet in altitude, and pushed over at the top of a parabolic arc, resulting in approximately 20 seconds of reduced gravity to the passengers and experiments. While floating in this weightless environment, team members performed laser welding experiments in a simulated environment similar to that of both low Earth orbit and lunar gravity. Analysis of data collected by a network of sensors during the tests will help researchers understand the effects of space environments on the welding process and welded material.

They performed that laser-beam welding in a vacuum chamber during the parabolic flight (on a Boeing 727), according to the article — and successfully completed 69 out of 70 welds in microgravity and lunar gravity conditions. "The last time NASA performed welding in space was during the Skylab mission in 1973...

"Practical welding and joining methods and allied processes, including additive manufacturing, will be required to develop the in-space economy."
Iphone

Police Freak Out at iPhones Mysteriously Rebooting Themselves, Locking Cops Out (404media.co) 129

Law enforcement officers are warning other officials and forensic experts that iPhones which have been stored securely for forensic examination are somehow rebooting themselves, returning the devices to a state that makes them much harder to unlock, 404 Media is reporting, citing a law enforcement document it obtained. From the report: The exact reason for the reboots is unclear, but the document authors, who appear to be law enforcement officials in Detroit, Michigan, hypothesize that Apple may have introduced a new security feature in iOS 18 that tells nearby iPhones to reboot if they have been disconnected from a cellular network for some time. After being rebooted, iPhones are generally more secure against tools that aim to crack the password of and take data from the phone.

"The purpose of this notice is to spread awareness of a situation involving iPhones, which is causing iPhone devices to reboot in a short amount of time (observations are possibly within 24 hours) when removed from a cellular network," the document reads. Apple did not provide a response on whether it introduced such an update in time for publication.

Piracy

Pirating 'The Pirate Bay' TV Series Is Ironically Difficult (torrentfreak.com) 25

With the debut of the Pirate Bay TV series in Sweden, international viewers are finding it surprisingly difficult to pirate. TorrentFreak reports: The series premiered at the on-demand platform of the Swedish national broadcaster SVT a few hours ago. International deals haven't been announced, but pirates can generally get access anyway. Soon after the first two episodes of The Pirate Bay series came out, scene release copies started circulating online. As one would expect.

The Scene group OLLONBORRE, which specializes in Swedish content, was the first to pick the show up. Within minutes, the first 1080p WEB-rips were posted on private scene servers and 720p copies followed a few hours later. Interestingly, pirate releases have yet to make their way to The Pirate Bay. We haven't seen any other copies on other public pirate sites either, which is surprising given the topic of the series.

It's common knowledge that The Scene -- a secretive network of release groups -- prefers to keep its releases private. Therefore, it wasn't happy with The Pirate Bay's public nature and rise to prominence in the early 2003s, which is highlighted in the first episodes of the TV series. However, we expected non-scene release groups would be eager to pick up the show. Apparently that's not the case, yet.

The Courts

IBM Sued Again In Storm Over Weather Channel Data Sharing (theregister.com) 20

IBM is facing a new lawsuit alleging that its Weather Channel website shared users' personal data with third-party ad partners without consent, violating the Video Privacy Protection Act (VPPA). The Register reports: In the absence of a comprehensive federal privacy law, the complaint [PDF] claims Big Blue violated America's Video Privacy Protection Act (VPPA), enacted in 1988 in response to the disclosure of Supreme Court nominee Robert Bork's videotape rental records. IBM was sued in 2019 (PDF) by then Los Angeles City Attorney Mike Feuer over similar allegations: That its Weather Channel mobile app collected and shared location data without disclosure. The IT titan settled that claim in 2020. A separate civil action against IBM's Weather Channel was filed in 2020 and settled in 2023 (PDF).

This latest legal salvo against alleged Weather Channel-enabled data collection takes issue with the sensitive information made available through the company's website to third-party ad partners mParticle and AppNexus/Xandr (acquired by Microsoft in 2022). The former provides customer analytics, and the latter is an advertising and marketing platform. The complaint, filed on behalf of California plaintiff Ed Penning, contends that by watching videos on the Weather Channel website, those two marketing firms received Penning's full name, gender, email address, precise geolocation, the name, and the URLs of videos he watched, without his permission or knowledge.

It explains that the plaintiff's counsel retained a private research firm last year to analyze browser network traffic during video sessions on the Weather Channel website. The research firm is said to have confirmed that the website provided the third-party ad firms with information that could be used to identify people and the videos that they watched. The VPPA prohibits video providers from sharing "personally identifiable information" about clients without their consent. [...] The lawsuit aspires to be certified as a class action. Under the VPPA, a successful claim allows for actual damages (if any) and statutory damages of $2,500 for each violation of the law, as well as attorney's fees.

AT&T

US Cellular To Sell Some Spectrum Licenses To AT&T For $1 Billion (reuters.com) 2

U.S. Cellular has agreed to sell $1.02 billion worth of spectrum licenses to AT&T as part of its strategy to monetize its spectrum assets that were not included in an earlier $4.4 billion deal with T-Mobile. Reuters reports: Last month, U.S. Cellular agreed to sell select spectrum licenses for $1 billion to Verizon. It also signed deals with two other mobile network operators, but did not disclose the details. The latest agreement "adds a fourth mobile network operator, in addition to T-Mobile, to the list of those whose subscribers will benefit from the sale of our spectrum licenses," U.S. Cellular CEO Laurent Therivel said on Thursday. From a press release: Following this transaction, as well as those previously announced, UScellular will have reached definitive agreements to monetize approximately 55%, measured on a MHz-Pops basis, of the spectrum holdings (excluding mmWave) that were excluded from the proposed sale to T-Mobile, for a total consideration of approximately $2.02 billion. Including the proposed T-Mobile transaction, UScellular will have reached agreements to monetize approximately 70% of its total spectrum holdings (excluding mmWave), measured on a MHz-Pops basis.

"After our proposed sales, we will be left with 1.86 billion MHz-Pops of low and mid-band spectrum, as well as 17.2 billion MHz-Pops of mmWave spectrum, with the substantial majority of retained value in the C-band spectrum," [said Laurent C. Therivel, President and CEO]. "The C-band licenses have a number of attributes that we believe are favorable to their long-term value. First, our C-band licenses are positioned in an attractive mid-band frequency that can deliver outstanding speed and capacity. Second, there is a substantial 5G ecosystem of equipment vendors and existing infrastructure that uses C-band. Finally, they have a lengthy build-out timeline, with first and second build-out dates of 2029 and 2033, respectively. This provides ample time and optionality for us to either monetize or deploy the spectrum in the future. We will continue to look for ways to opportunistically monetize the C-band, as well as the other remaining spectrum."

Transportation

Amazon Starts Drone Deliveries In Arizona (theverge.com) 26

Amazon is launching drone deliveries from its Tolleson, AZ, same-day delivery site, making over 50,000 essentials available to eligible customers in the West Valley Phoenix area. The Verge reports: The news came after Amazon announced it was shutting down its testing zone location in Lockeford, California. The new Tolleson location integrates drone deliveries into Amazon's delivery network for the first time, and the drones will deploy right next to the fulfillment center. Amazon is using its latest MK30 drones that can carry up to 5 pounds while also flying "twice as far" and running "50 percent quieter" than its previous models that sometimes crashed and burned in testing.

Amazon will launch the drones from its hybrid facility. The Federal Aviation Administration (FAA) has approved Amazon's drones for Beyond Visual Line of Sight (BVLOS), meaning they can be flown out of visual range from the operator. The company claims it's the first to launch both a new facility and BVLOS drone service that meets FAA requirements.

Bitcoin

Robinhood and Kraken Launch New Global Stablecoin Network With Paxos' USDG 14

Leading fintech and digital asset firms, including Robinhood, Kraken and Galaxy Digital, have introduced a joint stablecoin pegged to the U.S. dollar. Called the Global Dollar Network, it seeks to enhance the stablecoin market by lowering transaction costs, boosting consumer protections, and facilitating cross-border transactions with rewards for institutional participants. Crypto Briefing reports: The network will utilize Paxos's new stablecoin, the Global Dollar (USDG), which complies with the Monetary Authority of Singapore's upcoming stablecoin framework. USDG is designed to return yield on reserve assets to participants who contribute to its adoption, encouraging the development of crypto and financial solutions using the token. The Global Dollar Network aims to address shortcomings in the stablecoin market, such as high transaction costs and limited consumer protections.

The network has opened an invite-only phase for select custodians, exchanges, payment processors, merchants, and banks to develop new solutions using USDG. Initial distribution is available on Anchorage Digital, Galaxy Digital, Kraken, and Paxos platforms, with plans to expand access through additional partners in the coming months.
NASA

After Silence, NASA's Voyager Finally Phones Home - With a Device Unused Since 1981 (mashable.com) 71

Somewhere off in interstellar space, 15.4 billion miles away from Earth, NASA's 47-year-old Voyager "recently went quiet," reports Mashable.

The probe "shut off its main radio transmitter for communicating with mission control..." Voyager's problem began on October 16, when flight controllers sent the robotic explorer a somewhat routine command to turn on a heater. Two days later, when NASA expected to receive a response from the spacecraft, the team learned something tripped Voyager's fault protection system, which turned off its X-band transmitter. By October 19, communication had altogether stopped.

The flight team was not optimistic. However, Voyager 1 was equipped with a backup that relies on a different, albeit significantly fainter, frequency. No one knew if the second radio transmitter could still work, given the aging spacecraft's extreme distance.

Days later, engineers with the Deep Space Network, a system of three enormous radio dish arrays on Earth, found the signal whispering back over the S-band transmitter. The device hadn't been used since 1981, according to NASA.

"The team is now working to gather information that will help them figure out what happened and return Voyager 1 to normal operations," NASA said in a recent mission update.

It's been more than 12 years since Voyager entered interstellar space, the article points out. And interstellar space "is a high-radiation environment that nothing human-made has ever flown in before.

"That means the only thing the teams running the old probes can count on are surprises."
Security

Inside a Firewall Vendor's 5-Year War With the Chinese Hackers Hijacking Its Devices (wired.com) 33

British cybersecurity firm Sophos revealed this week that it waged a five-year battle against Chinese hackers who repeatedly targeted its firewall products to breach organizations worldwide, including nuclear facilities, military sites and critical infrastructure. The company told Wired that it traced the attacks to researchers in Chengdu, China, linked to Sichuan Silence Information Technology and the University of Electronic Science and Technology.

Sophos planted surveillance code on its own devices used by the hackers, allowing it to monitor their development of sophisticated intrusion tools, including previously unseen "bootkit" malware designed to hide in the firewalls' boot code. The hackers' campaigns evolved from mass exploitation in 2020 to precise attacks on government agencies and infrastructure across Asia, Europe and the United States. Wired story adds: Sophos' report also warns, however, that in the most recent phase of its long-running conflict with the Chinese hackers, they appear more than ever before to have shifted from finding new vulnerabilities in firewalls to exploiting outdated, years-old installations of its products that are no longer receiving updates. That means, company CEO Joe Levy writes in an accompanying document, that device owners need to get rid of unsupported "end-of-life" devices, and security vendors need to be clear with customers about the end-of-life dates of those machines to avoid letting them become unpatched points of entry onto their network. Sophos says it's seen more than a thousand end-of-life devices targeted in just the past 18 months.

"The only problem now isn't the zero-day vulnerability," says Levy, using the term "zero-day" to mean a newly discovered hackable flaw in software that has no patch. "The problem is the 365-day vulnerability, or the 1,500-day vulnerability, where you've got devices that are on the internet that have lapsed into a state of neglect."

Medicine

Weight-Loss Surgery Down 25% as Anti-Obesity Drug Use Soars (harvard.edu) 159

A new study examining a large sample of privately insured patients with obesity found that use of drugs such as Ozempic and Wegovy as anti-obesity medications more than doubled from 2022 to 2023. During that same period, there was a 25.6% decrease in patients undergoing metabolic bariatric surgery to treat obesity. From a report: The study, by researchers at Brigham and Women's Hospital, in collaboration with researchers at Harvard T.H. Chan School of Public Health and the Brown School of Public Health, is published in JAMA Network Open. "Our study provides one of the first national estimates of the decline in utilization of bariatric metabolic surgery among privately insured patients corresponding to the rising use of blockbuster GLP-1 RA drugs," said senior author Thomas C. Tsai, a metabolic bariatric surgeon at Brigham and Women's Hospital.

Using a national sample of medical insurance claims data from more than 17 million privately insured adults, the researchers identified patients with a diagnosis of obesity without diabetes in 2022-2023. The study found a sharp increase in the share of patients who received glucagon-like peptide-1 receptor agonists, or GLP-1 RAs, during the study period, with GLP-1 RA use increasing 132.6% from the last six months of 2022 to the last six months of 2023 (from 1.89 to 4.41 patients per 1,000 patients).

Meanwhile, there was a 25.6% decrease in use of bariatric metabolic surgery during the same period (from 0.22 to 0.16 patients per 1,000 patients). Among the sample of patients with obesity, 94.7% received neither form of treatment during the study period (while 5% received GLP-1 RAs and 0.3% received surgery). Compared to patients who were prescribed GLP-1 RAs, patients who underwent surgery tended to be more medically complex.

Facebook

Meta AI Surpasses 500 Million Users (engadget.com) 24

An anonymous reader quotes a report from Engadget: Last month at Meta Connect, Mark Zuckerberg said that Meta AI was "on track" to become the most-used generative AI assistant in the world. The company has now passed a significant milestone toward that goal, with Meta AI passing the 500 million user mark, Zuckerberg revealed during the company's latest earnings call. The half billion user mark comes just barely a year after the social network first launched its AI assistant last fall. Zuckerberg said the company still expects to become the "most-used" assistant by the end of 2024, though he's never specified how the company is measuring that metric. Zuck said that AI-driven improvements in feed and video recommendations have led to an 8% increase in time spent on Facebook and 5% increase on Instagram this year. Advertisers have also leveraged the company's AI tools to generate over 15 million ads in just the past month.

Separately, Meta's Threads app is gaining over a million new sign-ups daily, with nearly 275 million total monthly users.
Networking

BBC Interviews Charley Kline and Bill Duvall, Creators of Arpanet (bbc.com) 26

The BBC interviewed scientists Charley Kline and Bill Duvall 55 years after the first communications were made over a system called Arpanet, short for the Advanced Research Projects Agency Network. "Kline and Duvall were early inventors of networking, networks that would ultimately lead to what is today the Internet," writes longtime Slashdot reader dbialac. "Duvall had basic ideas what might come of the networks, but they had no idea of how much of a phenomenon it would turn into." Here's an excerpt from the interview: BBC: What did you expect Arpanet to become?
Duvall: "I saw the work we were doing at SRI as a critical part of a larger vision, that of information workers connected to each other and sharing problems, observations, documents and solutions. What we did not see was the commercial adoption nor did we anticipate the phenomenon of social media and the associated disinformation plague. Although, it should be noted, that in [SRI computer scientist] Douglas Engelbart's 1962 treatise describing the overall vision, he notes that the capabilities we were creating would trigger profound change in our society, and it would be necessary to simultaneously use and adapt the tools we were creating to address the problems which would arise from their use in society."

What aspects of the internet today remind you of Arpanet?
Duvall: Referring to the larger vision which was being created in Engelbart's group (the mouse, full screen editing, links, etc.), the internet today is a logical evolution of those ideas enhanced, of course, by the contributions of many bright and innovative people and organisations.

Kline: The ability to use resources from others. That's what we do when we use a website. We are using the facilities of the website and its programs, features, etc. And, of course, email. The Arpanet pretty much created the concept of routing and multiple paths from one site to another. That got reliability in case a communication line failed. It also allowed increases in communication speeds by using multiple paths simultaneously. Those concepts have carried over to the internet. Today, the site of the first internet transmission at UCLA's Boetler Hally Room 3420 functions as a monument to technology history (Credit: Courtesy of UCLA) As we developed the communications protocols for the Arpanet, we discovered problems, redesigned and improved the protocols and learned many lessons that carried over to the Internet. TCP/IP [the basic standard for internet connection] was developed both to interconnect networks, in particular the Arpanet with other networks, and also to improve performance, reliability and more.

How do you feel about this anniversary?
Kline: That's a mix. Personally, I feel it is important, but a little overblown. The Arpanet and what sprang from it are very important. This particular anniversary to me is just one of many events. I find somewhat more important than this particular anniversary were the decisions by Arpa to build the Network and continue to support its development.

Duvall: It's nice to remember the origin of something like the internet, but the most important thing is the enormous amount of work that has been done since that time to turn it into what is a major part of societies worldwide.

Businesses

OpenAI Builds First Chip With Broadcom and TSMC, Scales Back Foundry Ambition (reuters.com) 12

OpenAI is partnering with Broadcom and TSMC to design its first in-house AI chip while supplementing its infrastructure with AMD chips, aiming to diversify its reliance on Nvidia GPUs. "The company has dropped the ambitious foundry plans for now due to the costs and time needed to build a network, and plans instead to focus on in-house chip design effort," adds Reuters. From the report: OpenAI has been working for months with Broadcom to build its first AI chip focusing on inference, according to sources. Demand right now is greater for training chips, but analysts have predicted the need for inference chips could surpass them as more AI applications are deployed. Broadcom helps companies including Alphabet unit Google fine-tune chip designs for manufacturing and also supplies parts of the design that help move information on and off the chips quickly. This is important in AI systems where tens of thousands of chips are strung together to work in tandem. OpenAI is still determining whether to develop or acquire other elements for its chip design, and may engage additional partners, said two of the sources.

The company has assembled a chip team of about 20 people, led by top engineers who have previously built Tensor Processing Units (TPUs) at Google, including Thomas Norrie and Richard Ho. Sources said that through Broadcom, OpenAI has secured manufacturing capacity with Taiwan Semiconductor Manufacturing Company to make its first custom-designed chip in 2026. They said the timeline could change. Currently, Nvidia's GPUs hold over 80% market share. But shortages and rising costs have led major customers like Microsoft, Meta, and now OpenAI, to explore in-house or external alternatives.

Communications

FCC Chair: Mobile Dead Spots Will End When Space-Based and Ground Comms Merge (theregister.com) 21

Federal Communications Commission Chair Jessica Rosenworcel outlined a vision for universal connectivity last week that merges satellite and ground-based networks. The FCC recently became the first regulator to establish a framework for supplemental coverage from space (SCS). "Satellites may be in our skies, but they are the anchor tenant in our communications future," said Rosenworcel, calling for seamless integration of fiber, cellular, wireless, and satellite infrastructure into a unified network. The vision comes as the FCC's Affordable Connectivity Program recently ended due to funding depletion.
AT&T

AT&T Announces $1 Billion Fiber Deal With Corning (reuters.com) 10

AT&T has signed a $1 billion multi-year deal with Corning to acquire fiber and connectivity solutions. Reuters reports: With the U.S. wireless market facing a slowdown, telecom companies such as AT&T and rival Verizon have doubled down on their high-speed internet businesses, an area that has long been dominated by broadband companies such as Comcast. Demand has also been growing for AT&T's plans that allow customers to combine its high-speed fiber data with its wireless phone service for a discount. In the third quarter, AT&T reported 28.3 million fiber passings, or the number of potential customer locations a fiber network passes by. It remains on track to pass more than 30 million fiber passings by the end of 2025.
The Almighty Buck

Europe's Crooks Keep Blowing up ATMs (cnn.com) 98

"In the early hours of Thursday, March 23, 2023, residents in the German town of Kronberg were woken from their sleep by several explosions," reports CNN .

"Criminals had blown up an ATM located below a block of flats in the town center..." According to local media reports, witnesses saw people dressed in dark clothing fleeing in a black car towards a nearby highway. During the heist, thieves stole 130,000 euros in cash. They also caused an estimated half a million euros worth of collateral damage, according to a report by Germany's Federal Criminal Police Office, BKA.

Rather than staging dramatic and risky bank robberies, criminal groups in Europe have been targeting ATMs as an easier and more low-key target. In Germany — Europe's largest economy — thieves have been blowing up ATMs at a rate of more than one per day in recent years. In a country where cash is still a prevalent payment method, the thefts can prove incredibly lucrative, with criminals pocketing hundreds of thousands of euros in one attack.

Europol has been cracking down on the robberies, carrying out large cross-border operations aimed at taking down the highly-organized criminal gangs behind them. Earlier this month, authorities from Germany, France and the Netherlands arrested three members of a criminal network who have been carrying out attacks on cash machines using explosives, Europol said in a statement. Since 2022, the detainees are believed to have looted millions of euros and run up a similar amount in property damage, from 2022 to 2024, Europol said...

Unlike its European neighbors, who largely transitioned away from cash payments due to the Covid-19 pandemic, cash still plays a significant role in Germany. One half of all transactions in 2023 were made using banknotes and coins, according to Bundesbank. Germans have a cultural attachment to cash, traditionally viewing it as a safe method of payment. Some say it allows a greater level of privacy, and gives them more control over their expenses.

The Internet

One Argument Why Data Caps Are Not a Problem (fierce-network.com) 181

NoWayNoShapeNoForm writes: OpenVault believes that data caps on broadband are not a problem because most people do not exceed their existing data caps. OpenVault contends that people that do exceed their broadband data caps are simply being forgetful — leaving a streaming device on 24x7, or deploying unsecure WiFi access points, or reselling their service within an apartment building.

Yes, there may be some ISPs that have older networks that they have not upgraded. Or maybe they are unable to increase network capacity in "the middle mile" of their networks, but the Covid pandemic certainly encouraged many ISPs to upgrade their networks and capacity while many ISPs that had broadband data caps ended that feature.

Perhaps the biggest problem, according to OpenVault, is that most broadband users do not really have any idea how much bandwidth they "consume" every month. If Internet access is a service that people want to treat as a "utility", then you have to ask, Would they keep the water running after finishing their shower?

In the article Ookla's VP of Smart Communities adds that "Scrolling through social media feeds for hours can 'push' hundreds of videos to the user, many of which may be of no interest — they just start running." So the main driver for usage-based billing wasn't to increase revenue, OpenVault CEO Mark Trudeau tells the site, but to "balance the network a little more..." (Though he then also adds that sometimes a subscriber could also be reselling broadband service in their apartment building, "And that's not even legal.")

"If one or two customers on a given node is causing issues for 300 others, where those 300 are not getting the service that they paid for, then that's a problem right?" he said.

Having said that, the article also points out that "Many major fiber providers, like AT&T, Frontier, Google Fiber and Verizon Fios, don't have data caps at all."
Networking

DTrace for Linux Comes to Gentoo (gentoo.org) 14

It was originally created back in 2005 by Sun Microsystems for its proprietary Solaris Unix systems, "for troubleshooting kernel and application problems on production systems in real time," explains Wikipedia. "DTrace can be used to get a global overview of a running system, such as the amount of memory, CPU time, filesystem and network resources used by the active processes," explains its Wikipedia entry.

But this week, Gentoo announced: The real, mythical DTrace comes to Gentoo! Need to dynamically trace your kernel or userspace programs, with rainbows, ponies, and unicorns — and all entirely safely and in production?! Gentoo is now ready for that!

Just emerge dev-debug/dtrace and you're all set. All required kernel options are already enabled in the newest stable Gentoo distribution kernel...

Documentation? Sure, there's lots of it. You can start with our DTrace wiki page, the DTrace for Linux page on GitHub, or the original documentation for Illumos. Enjoy!

Thanks to Heraklit (Slashdot reader #29,346) for sharing the news.
Bug

Apple Will Pay Security Researchers Up To $1 Million To Hack Its Private AI Cloud 6

An anonymous reader quotes a report from TechCrunch: Ahead of the debut of Apple's private AI cloud next week, dubbed Private Cloud Compute, the technology giant says it will pay security researchers up to $1 million to find vulnerabilities that can compromise the security of its private AI cloud. In a post on Apple's security blog, the company said it would pay up to the maximum $1 million bounty to anyone who reports exploits capable of remotely running malicious code on its Private Cloud Compute servers. Apple said it would also award researchers up to $250,000 for privately reporting exploits capable of extracting users' sensitive information or the prompts that customers submit to the company's private cloud.

Apple said it would "consider any security issue that has a significant impact" outside of a published category, including up to $150,000 for exploits capable of accessing sensitive user information from a privileged network position. "We award maximum amounts for vulnerabilities that compromise user data and inference request data outside the [private cloud compute] trust boundary," Apple said.
You can learn more about Apple's Private Cloud Computer service in their blog post. Its source code and documentation is available here.
Privacy

UnitedHealth Says Change Healthcare Hack Affects Over 100 Million (techcrunch.com) 35

UnitedHealth Group said a ransomware attack in February resulted in more than 100 million individuals having their private health information stolen. The U.S. Department of Health and Human Services first reported the figure on Thursday. TechCrunch reports: The ransomware attack and data breach at Change Healthcare stands as the largest known digital theft of U.S. medical records, and one of the biggest data breaches in living history. The ramifications for the millions of Americans whose private medical information was irretrievably stolen are likely to be life lasting. UHG began notifying affected individuals in late July, which continued through October. The stolen data varies by individual, but Change previously confirmed that it includes personal information, such as names and addresses, dates of birth, phone numbers and email addresses, and government identity documents, including Social Security numbers, driver's license numbers, and passport numbers. The stolen health data includes diagnoses, medications, test results, imaging and care and treatment plans, and health insurance information -- as well as financial and banking information found in claims and payment data taken by the criminals.

The cyberattack became public on February 21 when Change Healthcare pulled much of its network offline to contain the intruders, causing immediate outages across the U.S. healthcare sector that relied on Change for handling patient insurance and billing. UHG attributed the cyberattack to ALPHV/BlackCat, a Russian-speaking ransomware and extortion gang, which later took credit for the cyberattack. The ransomware gang's leaders later vanished after absconding with a $22 million ransom paid by the health insurance giant, stiffing the group's contractors who carried out the hacking of Change Healthcare out of their new financial windfall. The contractors took the data they stole from Change Healthcare and formed a new group, which extorted a second ransom from UHG, while publishing a portion of the stolen files online in the process to prove their threat.

There is no evidence that the cybercriminals subsequently deleted the data. Other extortion gangs, including LockBit, have been shown to hoard stolen data, even after the victim pays and the criminals claim to have deleted the data. In paying the ransom, Change obtained a copy of the stolen dataset, allowing the company to identify and notify the affected individuals whose information was found in the data. Efforts by the U.S. government to catch the hackers behind ALPHV/BlackCat, one of the most prolific ransomware gangs today, have so far failed. The gang bounced back following a takedown operation in 2023 to seize the gang's dark web leak site. Months after the Change Healthcare breach, the U.S. State Department upped its reward for information on the whereabouts of the ALPHV/BlackCat cybercriminals to $10 million.

Slashdot Top Deals