×
Advertising

British Competition Regulator Says Google's Ad Practices Harmed Competition (cnbc.com) 13

An anonymous reader shared this report from CNBC: Britain's competition watchdog on Friday issued a statement of objections over Google's ad tech practices, which the regulator provisionally found are impacting competition in the U.K. In a statement, the Competition and Markets Authority alleged that the U.S. internet search titan "has harmed competition by using its dominance in online display advertising to favour its own ad tech services." The "vast majority" of the U.K.'s thousands of publishers and advertisers use Google's technology in order to bid for and sell space to display ads in a market where players were spending £1.8 billion annually as of a 2019 study, according to the CMA.

The regulator added that it is also "concerned that Google is actively using its dominance in this sector to preference its own services." So-called "self-preferencing" of services by technology giants is a key concern for regulators scrutinizing these companies. The CMA further noted that Google disadvantages ad technology competitors, preventing them from competing on a "level playing field...." In the CMA's decision Friday, the watchdog said that, since 2015, Google has abused its dominant position as the operator of both ad buying tools "Google Ads" and "DV360," and of a publisher ad server known as "DoubleClick For Publishers," in order to strengthen the market position of its advertising exchange, AdX...

AdX, on which Google charges its highest fees to advertisers, is the "centre of the ad tech stack" for the company, the CMA said, with Google taking roughly 20% of the amount for each bid that's processed on its platform.

Programming

Two Android Engineers Explain How They Extended Rust In Android's Firmware (theregister.com) 62

The Register reports that Google "recently rewrote the firmware for protected virtual machines in its Android Virtualization Framework using the Rust programming language." And they add that Google "wants you to do the same, assuming you deal with firmware."

A post on Google's security blog by Android engineers Ivan Lozano and Dominik Maier promises to show "how to gradually introduce Rust into your existing firmware," adding "You'll see how easy it is to boost security with drop-in Rust replacements, and we'll even demonstrate how the Rust toolchain can handle specialized bare-metal targets."

This prompts the Register to quip that easy "is not a term commonly heard with regard to a programming language known for its steep learning curve." Citing the lack of high-level security mechanisms in firmware, which is often written in memory-unsafe languages such as C or C++, Lozano and Maier argue that Rust provides a way to avoid the memory safety bugs like buffer overflows and use-after-free that account for the majority of significant vulnerabilities in large codebases. "Rust provides a memory-safe alternative to C and C++ with comparable performance and code size," they note. "Additionally it supports interoperability with C with no overhead."
At one point the blog post explains that "You can replace existing C functionality by writing a thin Rust shim that translates between an existing Rust API and the C API the codebase expects." But their ultimate motivation is greater security. "Android's use of safe-by-design principles drives our adoption of memory-safe languages like Rust, making exploitation of the OS increasingly difficult with every release."

And the Register also got this quote from Lars Bergstrom, Google's director of engineering for Android Programming Languages (and chair of the Rust Foundation's board of directors). "At Google, we're increasing Rust's use across Android, Chromium, and more to reduce memory safety vulnerabilities. We're dedicated to collaborating with the Rust ecosystem to drive its adoption and provide developers with the resources and training they need to succeed.

"This work on bringing Rust to embedded and firmware addresses another critical part of the stack."
Social Networks

GPT-Fabricated Scientific Papers Found on Google Scholar by Misinformation Researchers (harvard.edu) 81

Harvard's school of public policy is publishing a Misinformation Review for peer-reviewed, scholarly articles promising "reliable, unbiased research on the prevalence, diffusion, and impact of misinformation worldwide."

This week it reported that "Academic journals, archives, and repositories are seeing an increasing number of questionable research papers clearly produced using generative AI." They are often created with widely available, general-purpose AI applications, most likely ChatGPT, and mimic scientific writing. Google Scholar easily locates and lists these questionable papers alongside reputable, quality-controlled research. Our analysis of a selection of questionable GPT-fabricated scientific papers found in Google Scholar shows that many are about applied, often controversial topics susceptible to disinformation: the environment, health, and computing.

The resulting enhanced potential for malicious manipulation of society's evidence base, particularly in politically divisive domains, is a growing concern... [T]he abundance of fabricated "studies" seeping into all areas of the research infrastructure threatens to overwhelm the scholarly communication system and jeopardize the integrity of the scientific record. A second risk lies in the increased possibility that convincingly scientific-looking content was in fact deceitfully created with AI tools and is also optimized to be retrieved by publicly available academic search engines, particularly Google Scholar. However small, this possibility and awareness of it risks undermining the basis for trust in scientific knowledge and poses serious societal risks.

"Our analysis shows that questionable and potentially manipulative GPT-fabricated papers permeate the research infrastructure and are likely to become a widespread phenomenon..." the article points out.

"Google Scholar's central position in the publicly accessible scholarly communication infrastructure, as well as its lack of standards, transparency, and accountability in terms of inclusion criteria, has potentially serious implications for public trust in science. This is likely to exacerbate the already-known potential to exploit Google Scholar for evidence hacking..."
Electronic Frontier Foundation

FTC Urged To Stop Tech Makers Downgrading Devices After You've Bought Them (theregister.com) 80

Digital rights activists want device manufacturers to disclose a "guaranteed minimum support time" for devices — and federal regulations ensuring a product's core functionality will work even after its software updates stop.

Influential groups including Consumer Reports, EFF, the Software Freedom Conservancy, iFixit, and U.S. Pirg have now signed a letter to the head of America's Consumer Protection bureau (at the Federal Trade Commision), reports The Register: In an eight-page letter to the Commission (FTC), the activists mentioned the Google/Levis collaboration on a denim jacket that contained sensors enabling it to control an Android device through a special app. When the app was discontinued in 2023, the jacket lost that functionality. The letter also mentions the "Car Thing," an automotive infotainment device created by Spotify, which bricked the device fewer than two years after launch and didn't offer a refund...

Environmental groups and computer repair shops also signed the letter... "Consumers need a clear standard for what to expect when purchasing a connected device," stated Justin Brookman, director of technology policy at Consumer Reports and a former policy director of the FTC's Office of Technology, Research, and Investigation. "Too often, consumers are left with devices that stop functioning because companies decide to end support without little to no warning. This leaves people stranded with devices they once relied on, unable to access features or updates...."

Brookman told The Register that he believes this is the first such policy request to the FTC that asks the agency to help consumers with this dilemma. "I'm not aware of a previous effort from public interest groups to get the FTC to take action on this issue — it's still a relatively new issue with no clear established norms," he wrote in an email. "But it has certainly become an issue" that comes up more and more with device makers as they change their rules about product updates and usage.

"Both switching features to a subscription and 'bricking' a connected device purchased by a consumer in many cases are unfair and deceptive practices," the groups write, arguing that the practices "infringe on a consumer's right to own the products they buy." They're requesting clear "guidance" for manufacturers from the U.S. government. The FTC has a number of tools at its disposal to help establish standards for IoT device support. While a formal rulemaking is one possibility, the FTC also has the ability to issue more informal guidance, such as its Endorsement Guides12 and Dot Com Disclosures.13 We believe the agency should set norms...
The groups are also urging the FTC to:
  • Encourage tools and methods that enable reuse if software support ends.
  • Conduct an educational program to encourage manufacturers to build longevity into the design of their products.
  • Protect "adversarial interoperability"... when a competitor or third-party creates a reuse or modification tool [that] adds to or converts the old device.

Thanks to long-time Slashdot reader Z00L00K for sharing the article.


Education

MIT CS Professor Tests AI's Impact on Educating Programmers (acm.org) 84

Long-time Slashdot reader theodp writes: "The Impact of AI on Computer Science Education" recounts an experiment Eric Klopfer conducted in his undergrad CS class at MIT. He divided the class into three groups and gave them a programming task to solve in the Fortran language, which none of them knew. Reminiscent of how The Three Little Pigs used straw, sticks, and bricks to build their houses with very different results, Klopfer allowed one group to use ChatGPT to solve the problem, while the second group was told to use Meta's Code Llama LLM, and the third group could only use Google. The group that used ChatGPT, predictably, solved the problem quickest, while it took the second group longer to solve it. It took the group using Google even longer, because they had to break the task down into components.

Then, the students were tested on how they solved the problem from memory, and the tables turned. The ChatGPT group "remembered nothing, and they all failed," recalled Klopfer. Meanwhile, half of the Code Llama group passed the test. The group that used Google? Every student passed.

"This is an important educational lesson," said Klopfer. "Working hard and struggling is actually an important way of learning. When you're given an answer, you're not struggling and you're not learning. And when you get more of a complex problem, it's tedious to go back to the beginning of a large language model and troubleshoot it and integrate it." In contrast, breaking the problem into components allows you to use an LLM to work on small aspects, as opposed to trying to use the model for an entire project, he says. "These skills, of how to break down the problem, are critical to learn."

Open Source

How Should the FOSS Movement Respond to Proprietary Software? (linux-magazine.com) 102

Long-time FOSS-watcher Bruce Byfield writes that while people "still dream of a completely free alternative, increasingly the emphasis in FOSS seems to be on accepting coexistence with proprietary software." Many, too, have always preferred the permissive BSD licenses, which permits combining FOSS and proprietary software. From some perspectives, Debian's newest [non-free firmware] repository or Nobara's popularity [a Fedora-based distro but with proprietary drivers and gaming applications] is simply an admission of the true state of affairs...

On the other hand, the FOSS philosophy may be weakened because it no longer has a strong advocate. Sixteen years ago, the FSF reached a peak of authority in the discussions of 2006-2007 about the structure of GPLv3 — then immediately lost that authority by not reaching a consensus. That was followed by the cancellation of Richard Stallman in 2017, which, deserved or not, had the side effect of silencing free software's most influential representative. Today the FSF that Stallman led continues to function, with Stallman returned to the board of directors, but its actions go unreported, and it seems to speak to a much smaller group of loyalists. The Linux Foundation, with its corporate emphasis, is not an adequate substitution. In these circumstances, there is reason to wonder whether FOSS has lost its way.

While the issue has yet to reach the mainstream, Bruce Perens, one of the coiners of the term "open source" in 1998, is already trying to describe what he calls the Post-Open Source era. Not only does Perens believe that FOSS licenses no longer fulfill their original purpose, but they no longer inform or benefit the average user. According to Perens,

"Open Source has completely failed to serve the common person. For the most part, if they use us at all they do so through a proprietary software company's systems, like Apple iOS or Google Android, both of which use Open Source for infrastructure but the apps are mostly proprietary. The common person doesn't know about Open Source, they don't know about the freedoms we promote which are increasingly in their interest. Indeed, Open Source is used today to surveil and even oppress them."

As a remedy, Perens proposes that licenses should be replaced by contracts. He envisions that companies pay for the benefits they receive from using FOSS. Compliance for each contract would be checked, renewed, and paid for yearly, and the payments would go towards funding FOSS development. Individuals and nonprofits would continue to use FOSS for free. In March 2024, Perens posted a draft Post-Open license. The draft includes a description of the contract-related files to be shipped with FOSS software, a description of the status of derivative works, how revenue is collected, and conditions of termination. The draft has yet to be reviewed by a lawyer, but what is immediately noticeable is how it draws on both contract language and FOSS licenses to produce something different.

Byfield concludes that "free licenses are straining to respond to loopholes, and a discussion needs to be had about whether they are adequate to modern pressures."
Crime

New York Times Calls Telegram 'A Playground for Criminals, Extremists and Terrorists' (yahoo.com) 107

The New York Times analyzed over 3.2 million Telegram messages from 16,220 channels. Their conclusion? Telegram "offers features that enable criminals, terrorists and grifters to organize at scale and to sidestep scrutiny from the authorities" — and that Telegram "has looked the other way as illegal and extremist activities have flourished openly on the app."

Or, more succinctly: "Telegram has become a global sewer of criminal activity, disinformation, child sexual abuse material, terrorism and racist incitement, according to a four-month investigation." Look deeper, and a dark underbelly emerges. Uncut lumps of cocaine and shards of crystal meth are for sale on the app. Handguns and stolen checks are widely available. White nationalists use the platform to coordinate fight clubs and plan rallies. Hamas broadcast its Oct. 7 attack on Israel on the site... The Times investigation found 1,500 channels operated by white supremacists who coordinate activities among almost 1 million people around the world. At least two dozen channels sold weapons. In at least 22 channels with more than 70,000 followers, MDMA, cocaine, heroin and other drugs were advertised for delivery to more than 20 countries.

Hamas, the Islamic State and other militant groups have thrived on Telegram, often amassing large audiences across dozens of channels. The Times analyzed more than 40 channels associated with Hamas, which showed that average viewership surged up to 10 times after the Oct. 7 attacks, garnering more than 400 million views in October. Telegram is "the most popular place for ill-intentioned, violent actors to congregate," said Rebecca Weiner, the deputy commissioner for intelligence and counterterrorism at the New York Police Department. "If you're a bad guy, that's where you will land...." [Telegram] steadfastly ignores most requests for assistance from law enforcement agencies. An email inbox used for inquiries from government agencies is rarely checked, former employees said...

"It is easy to search and find channels selling guns, illicit narcotics, prescription drugs and fraudulent ATM cards, called clone cards..." according to the article. The Times "found at least 50 channels openly selling contraband, including guns, drugs and fraudulent debit cards." In December 2022, Hayden Espinosa began serving a 33-month sentence in federal prison in Louisiana for buying and selling illegal firearms and weapon parts he made with 3D printers. That did not stop his business. Using cellphones that had been smuggled into prison, Espinosa continued his illicit trade on a Telegram channel... Espinosa's gun market on Telegram might never have been uncovered except that one of its members was Payton Gendron, who massacred 10 people at a supermarket in Buffalo, New York, in 2022. Investigators scouring his life online for motives for the shooting discovered the channel, which also featured racist and extremist views he had shared.
"Operating like a stateless organization, Telegram has long behaved as if it were above the law," the article concludes — though it adds that "In many democratic countries, patience with the app is wearing thin.

"The European Union is exploring new oversight of Telegram under the Digital Services Act, a law that forces large online platforms to police their services more aggressively, two people familiar with the plans said."
AI

1,000 Autonomous AI Agents Collaborating? Altera Simulates It In Minecraft (readwrite.com) 21

Altera AI's home page says their mission is "to create digital human beings that live, care, and grow with us," adding that their company builds machines "with fundamental human qualities, starting with friends that can play video games with you."

And while their agents can function in many different games and apps, Altera used Minecraft to launch "the first-ever simulation of over 1,000 collaborating autonomous AI agents," reports ReadWrite, "working together in a Minecraft world, all of which can operate for hours or days without intervention from humans." The agents have already started to develop their own economy, culture, religion, and government, with the AI already working on establishing its own systems. The CEO Robert Yang took to X to share the news and introduce Project Sid...

So far, the agents have already formed a merchant hub, have voted in a democracy, spread religions, and collected five times more distinct items than before... "Though starting in games, we're solving the deepest issues facing agents: coherence, multi-agent collaboration, and long-term progression," said the CEO.

According to the video, the most active trader in their simulation was the priest — because he was bribing the other townsfolk to convert to his religion. (Which apparently involved the Flying Spaghetti Monster...) "We run these worlds every day, and they're always different," the video's narrator says, while pointing out that their agents had collected 32% of all the items in Minecraft — five times more than anything ever reported for an individual agent.

"Sid starts in Minecraft, but we are already going beyond," CEO Yang says in the video, calling it "the first-ever agent civilization."
Privacy

Signal is More Than Encrypted Messaging. It Wants to Prove Surveillance Capitalism Is Wrong (wired.com) 70

Slashdot reader echo123 shared a new article from Wired titled "Signal Is More Than Encrypted Messaging. Under Meredith Whittaker, It's Out to Prove Surveillance Capitalism Wrong." ("On its 10th anniversary, Signal's president wants to remind you that the world's most secure communications platform is a nonprofit. It's free. It doesn't track you or serve you ads. It pays its engineers very well. And it's a go-to app for hundreds of millions of people.") Ten years ago, WIRED published a news story about how two little-known, slightly ramshackle encryption apps called RedPhone and TextSecure were merging to form something called Signal. Since that July in 2014, Signal has transformed from a cypherpunk curiosity — created by an anarchist coder, run by a scrappy team working in a single room in San Francisco, spread word-of-mouth by hackers competing for paranoia points — into a full-blown, mainstream, encrypted communications phenomenon... Billions more use Signal's encryption protocols integrated into platforms like WhatsApp...

But Signal is, in many ways, the exact opposite of the Silicon Valley model. It's a nonprofit funded by donations. It has never taken investment, makes its product available for free, has no advertisements, and collects virtually no information on its users — while competing with tech giants and winning... Signal stands as a counterfactual: evidence that venture capitalism and surveillance capitalism — hell, capitalism, period — are not the only paths forward for the future of technology.

Over its past decade, no leader of Signal has embodied that iconoclasm as visibly as Meredith Whittaker. Signal's president since 2022 is one of the world's most prominent tech critics: When she worked at Google, she led walkouts to protest its discriminatory practices and spoke out against its military contracts. She cofounded the AI Now Institute to address ethical implications of artificial intelligence and has become a leading voice for the notion that AI and surveillance are inherently intertwined. Since she took on the presidency at the Signal Foundation, she has come to see her central task as working to find a long-term taproot of funding to keep Signal alive for decades to come — with zero compromises or corporate entanglements — so it can serve as a model for an entirely new kind of tech ecosystem...

Meredith Whittaker: "The Signal model is going to keep growing, and thriving and providing, if we're successful. We're already seeing Proton [a startup that offers end-to-end encrypted email, calendars, note-taking apps, and the like] becoming a nonprofit. It's the paradigm shift that's going to involve a lot of different forces pointing in a similar direction."

Key quotes from the interview:
  • "Given that governments in the U.S. and elsewhere have not always been uncritical of encryption, a future where we have jurisdictional flexibility is something we're looking at."
  • "It's not by accident that WhatsApp and Apple are spending billions of dollars defining themselves as private. Because privacy is incredibly valuable. And who's the gold standard for privacy? It's Signal."
  • "AI is a product of the mass surveillance business model in its current form. It is not a separate technological phenomenon."
  • "...alternative models have not received the capital they need, the support they need. And they've been swimming upstream against a business model that opposes their success. It's not for lack of ideas or possibilities. It's that we actually have to start taking seriously the shifts that are going to be required to do this thing — to build tech that rejects surveillance and centralized control — whose necessity is now obvious to everyone."

Programming

GitHub Actions Typosquatting: a High-Impact Supply Chain Attack-in-Waiting? (csoonline.com) 4

GitHub Actions let developers "automate software builds and tests," writes CSO Online, "by setting up workflows that trigger when specific events are detected, such as when new code is committed to the repository."

They also "can be reused and shared with others on the GitHub Marketplace, which currently lists thousands of public Actions that developers can use instead of coding their own. Actions can also be included as dependencies inside other Actions, creating an ecosystem similar to other open-source component registries." Researchers from Orca Security recently investigated the impact typosquatting can have in the GitHub Actions ecosystem by registering 14 GitHub organizations with names that are misspellings of popular Actions owners — for example, circelci instead of circleci, actons instead of actions, google-github-actons instead of google-github-actions... One might think that developers making typos is not very common, but given the scale of GitHub — over 100 million developers with over 420 million repositories — even a statistically rare occurrence can mean thousands of potential victims. For example, the researchers found 194 workflow files calling the "action" organization instead of "actions"; moreover, 12 public repositories started referencing the researchers' fake "actons" organization within two months of setting it up.

"Although the number may not seem that high, these are only the public repositories we can search for and there could be multiple more private ones, with numbers increasing over time," the researchers wrote... Ultimately this is a low-cost high-impact attack. Having the ability to execute malicious actions against someone else's code is very powerful and can result in software supply chain attacks, with organizations and users that then consume the backdoored code being impacted as well...

Out of the 14 typosquatted organizations that Orca set up for their proof-of-concept, GitHub only suspended one over a three-month period — circelci — and that's likely because someone reported it. CircleCI is one of the most popular CI/CD platforms.

Thanks to Slashdot reader snydeq for sharing the article.
Biotech

Telegram CEO Durov Fathered Over 100 Kids as an Anonymous Sperm Donor (msn.com) 88

An anonymous reader shared this report from USA Today: He's the founder of Telegram. He was arrested in France. He also claims to have fathered at least 100 children...

The 39-year-old Russian-born billionaire often keeps his personal life out of the spotlight. Something he has shared, however, is that, despite never marrying and preferring to live alone, he's fathered at least 100 children through anonymous sperm donation... Durov noted he plans to "open-source" his DNA so his biological children can find each other more easily. "I also want to help destigmatize the whole notion of sperm donation and incentivize more healthy men to do it, so that families struggling to have kids can enjoy more options," he wrote. "Defy convention — redefine the norm...!"

"Sperm donation has allowed many people to have families who otherwise wouldn't be able to," the article points out. But it also adds that the anonymous practice "has drawn several detractors, including from those who've been conceived through it." These people have shared with USA TODAY the mental turmoil of learning they have, in some cases, hundreds of half-siblings... One of the main criticisms of the practice is that the anonymity of the donor makes it difficult or impossible for donor-conceived people to learn about their health and treat genetically inherited medical issues. Even when donor-conceived people have their donor's identity and contact information, there's still no guarantee they'll respond or tell the truth. Also, most sperm banks in the United States aren't legally required to keep records of siblings or cap the number of families that can use a specific donor. As a result, donor-conceived people with many siblings often live in fear of accidentally having children with one of their half-siblings, or even having children with their own father if they were to pursue donor insemination.
ISS

ESA Prints 3D Metal Shape In Space For First Time (theregister.com) 8

The European Space Agency (ESA) has successfully 3D printed the first metal part aboard the International Space Station. This achievement marks a significant advancement in in-orbit manufacturing that could enable the production of essential spare parts and tools for future long-duration space missions. "The first metal shape was produced in August, and three more are planned as part of the experiment," notes The Register. "All four will eventually be returned to Earth for analysis -- two to ESA's technical center, ESTEC, in the Netherlands, one to the agency's astronaut training center in Cologne, and the last sample to the Technical University of Denmark." From the report: During a panel discussion following the UK premiere of Fortitude, a film about the emerging commercial space industry, Advenit Makaya, Advanced Manufacturing Engineer at ESA, remarked on the potential for recycling space debris in the process rather than having to rely on raw materials launched to the ISS. Rob Postema, ESA Project Manager for Metal 3D, told The Register that the agency was indeed looking at "circular" solutions in its drive for greater sustainability. However, don't hold your breath for putting bits of space garbage into one end and getting shiny metal parts out of the other: "A timeline is difficult to indicate, some early results are achieved with ground activities, ready to evaluate solutions in space."

The printer is overseen from the ground and operated for around four hours per day. The ground team has to check each layer via images and a scan of the surface area; printing a sample can take 10-25 days. However, Postema said: "Through automated control of the printing process as well as continuous operations, this can be substantially reduced." Knick-knacks from orbits are all well and good, but could something more substantial be produced? Yes, although not with this demonstrator, which can print to the outer dimensions of a soft drink can. Postema noted that while the demonstrator could manage smaller parts, either as a single unit or as part of larger structures, "there are definitely opportunities to create 3D shapes and parts with this technology larger than what we have done with this Technology Demonstrator."

Communications

Starlink Now Constitutes Roughly Two Thirds of All Active Satellites (the-independent.com) 64

"SpaceX deployed its 7,000th Starlink satellite this week, making the vast majority of active satellites around earth part of a single megaconstellation," writes Slashdot reader DogFoodBuss. "The Starlink communications system is now orders of magnitude larger than its nearest competitor, offering unprecedented access to low-latency broadband from anywhere on the planet." According to the latest data from satellite tracker CelesTrak, SpaceX now controls over 62% of all operational satellites. The Independent reports: The latest data from non-profit satellite tracker CelesTrak shows that SpaceX has 6,370 active Starlink satellites in low-Earth orbit, with several hundred more inactive or deorbited. The figure, which has risen more than six-fold in just three years, represents just over 62 per cent of all operational satellites, and is roughly 10-times the number of Starlink's closest rival, UK-based startup OneWeb.

SpaceX plans to launch up to 42,000 satellites to complete the Starlink constellation, capable of delivering high-speed internet and phone connectivity to any corner of the globe. Starlink currently operates in 102 countries and has more than three million customers paying a monthly fee to access the network through a $300 ground-based dish. The company expects to launch its service in dozens more countries, with only Afghanistan, China, Iran, North Korea, Russia and Syria not on the current waitlist due to internet restrictions or trade embargos.
"Starlink now constitutes roughly 2/3 of all active Earth satellites," SpaceX CEO Elon Musk said on X following the latest SpaceX launch.
ISS

Boeing's Starliner Makes 'Picture Perfect' Landing - Without Its Crew (npr.org) 103

Boeing's "beleaguered" Starliner spacecraft "successfully landed in New Mexico just after midnight Eastern time," reports NPR: After Starliner made a picture-perfect landing, Stich told reporters that the spacecraft did well during its return flight. "It was a bullseye landing," he said. "It's really great to get the spacecraft back...." He said while he and others on the team felt happy about the successful landing, "there's a piece of us, all of us, that we wish it would've been the way we had planned it" with astronauts on board when it landed...

Now that Starliner is back on the ground, Boeing and NASA will further analyze the thrusters to see if modifying the spacecraft or how it's flown could keep the thrusters from overheating in the future.

Futurism explains why NASA wanted an uncrewed Starliner flight: While attempting to duplicate the issue at NASA's White Sands Test Facility in New Mexico, engineers eventually found what appeared to be the smoking gun, as SpaceNews' Jeff Foust details in a detailed new breakdown of the timeline. A Teflon seal in a valve known as a "poppet" expanded as it was being heated by the nearby thrusters, significantly constraining the flow of the oxidizer — a disturbing finding, because it greatly degraded the thrusters' performance.

Worse, without being able to perfectly replicate and analyze the issue in the near vacuum of space, engineers weren't entirely sure how the issue was actually playing out in orbit... While engineers found that the thrusters had returned to a more regular shape after being fired in space, they were worried that similar deformations might take place during prolonged de-orbit firings.

A lot was on the line. Without perfect control over the thrusters, NASA became worried that the spacecraft could careen out of control. "For me, one of the really important factors is that we just don't know how much we can use the thrusters on the way back home before we encounter a problem," NASA associate administrator for space operations Ken Bowersox said, as quoted by SpaceNews.

Now CBS News reports that "the road ahead is far from clear" for Starliner: The service module was jettisoned as planned before re-entry, burning up in the atmosphere, and engineers will not be able to examine the hardware to pin down exactly what caused the helium leaks and degraded thruster performance during the ship's rendezvous with the station. Instead, they will face more data analysis, tests and potential redesigns expected to delay the next flight, with or without astronauts aboard, to late next year at the earliest.

"Even though it was necessary to return the spacecraft uncrewed, NASA and Boeing learned an incredible amount about Starliner in the most extreme environment possible," Ken Bowersox, space operations director at NASA Headquarters, said in a statement. "NASA looks forward to our continued work with the Boeing team to proceed toward certification of Starliner for crew rotation missions to the space station," Bowersox added. In any case, the successful landing was a shot in the arm for Boeing engineers and managers, who insisted the Starliner could have safely brought Wilmore and Williams back to Earth.

Steve Stich, manager of NASA's commercial crew program, agreed that if the crew had been on board "it would have been a safe, successful landing."

Two details about the astronauts now waiting for their February return flight from the International Space Station.
  • NPR reports that "in case the space station suffers an emergency that forces an evacuation before that capsule arrives, the station's crew had to jerry-rig two extra seats in a different SpaceX spacecraft that's currently docked there."
  • Space.com reports that when the uncrewed Starliner returned, "Among the gear that it carried home were the 'Boeing Blue' spacesuits that Williams and Wilmore wore aboard the capsule. The astronauts have no need for them now. "The suits are not compatible," Steve Stich, manager of NASA's Commercial Crew Program, said during a press conference on Wednesday (Sept. 4). "So the Starliner suits would not work in Dragon, and vice versa."

Technology

Malaysia Orders ISPs To Reroute DNS Traffic (theedgemalaysia.com) 66

The Malaysian Communications and Multimedia Commission, which regulates online and broadcast media in the Asian nation, has instructed internet service providers in the country to redirect DNS traffic that uses third-party servers back to their own DNS servers, according to local media reports. From a report: MCMC in a statement tonight said this is to ensure that users continue to benefit from the protection provided by the local ISP's DNS servers and that malicious sites are inaccessible to Malaysians. As a commitment to protecting the safety of Internet users, MCMC has blocked a total of 24,277 websites between between 2018 to Aug 1, classified into various categories, which are online gambling (39 per cent), pornography/obscene content (31 per cent), copyright infringement (14 per cent), other harmful sites (12 per cent), prostitution (two per cent) and unlawful investments/scams (two per cent). Further reading: MCMC orders DNS redirection for businesses, govts, enterprises by Sept 30, according to Maxis FAQ.
United States

Electrocuted Birds Are Bursting Into Flames and Starting Wildfires (gizmodo.com) 109

An anonymous reader quotes a report from Gizmodo: Electrocuted, flaming bird carcasses are falling off of power lines and causing wildfires across the U.S. This surprisingly common phenomenon has been responsible for at least three Colorado wildfires so far this summer. These events are not isolated. A 2022 study found that electrocuted birds caused 44 wildfires in the contiguous United States between 2014 and 2018. That study was led by Taylor Barnes, a biologist who now works for electric utility company EDM International. In the paper, Barnes wrote that "avian-caused ignitions" happen when a bird sits on an overhead power line. For reasons that can vary from case to case, sometimes the bird receives a powerful electrical shock, setting its feathers on fire. The dead or dying bird then falls, and, on occasion, lands in some brush or other flammable material.

"Sometimes they burst into flames," Barnes told 9News, an NBC affiliate in Colorado. "Sometimes they just fall dead. Not every bird that is electrocuted will fall to the ground and start a fire." Odds are, you've seen birds perched on electrical wires countless times without witnessing spontaneous sparrow combustion. Barnes said birds just going for a sit pose no threat. Because the birds are not touching the ground, the electricity in the power line has no way to the ground and is not dangerous to them. It's only when the birds get into a part of the power infrastructure where a circuit can be completed that they end up crispy. [...]

It's not clear what happened to the birds involved in Colorado's other two recent fires, which occurred on July 31 and August 27. No people were injured or killed in the incidents. According to Barnes' 2022 study, the area of California coast known as the state's Mediterranean ecoregion has the highest density of wildfires set off by avian ignitions. In the paper, he advised authorities in the area and other fire-prone regions to look into modifying power poles to prevent these electrocutions. Given the devastating effects fires can have and how common they've become, it's surely worth the investment to keep our feathered friends in flight and not on fire.

Security

SpyAgent Android Malware Steals Your Crypto Recovery Phrases From Images 32

SpyAgent is a new Android malware that uses optical character recognition (OCR) to steal cryptocurrency wallet recovery phrases from screenshots stored on mobile devices, allowing attackers to hijack wallets and steal funds. The malware primarily targets South Korea but poses a growing threat as it expands to other regions and possibly iOS. BleepingComputer reports: A malware operation discovered by McAfee was traced back to at least 280 APKs distributed outside of Google Play using SMS or malicious social media posts. This malware can use OCR to recover cryptocurrency recovery phrases from images stored on an Android device, making it a significant threat. [...] Once it infects a new device, SpyAgent begins sending the following sensitive information to its command and control (C2) server:

- Victim's contact list, likely for distributing the malware via SMS originating from trusted contacts.
- Incoming SMS messages, including those containing one-time passwords (OTPs).
- Images stored on the device to use for OCR scanning.
- Generic device information, likely for optimizing the attacks.

SpyAgent can also receive commands from the C2 to change the sound settings or send SMS messages, likely used to send phishing texts to distribute the malware. McAfee found that the operators of the SpyAgent campaign did not follow proper security practices in configuring their servers, allowing the researchers to gain access to them. Admin panel pages, as well as files and data stolen from victims, were easily accessible, allowing McAfee to confirm that the malware had claimed multiple victims. The stolen images are processed and OCR-scanned on the server side and then organized on the admin panel accordingly to allow easy management and immediate utilization in wallet hijack attacks.
Chrome

ChromeOS 128 Adds Snap Layouts For Apps, OCR Text Extraction, and Improved Settings (neowin.net) 7

Google's new ChromeOS 128 update introduces a feature similar to Windows 11's Snap layouts. Called Snap Groups, the feature enables users to organize on-screen apps in various fullscreen layouts. "When you pair two windows for split-screen display, ChromeOS now forms a Snap group," explains the ChromeOS team. "As a Snap group, you can bring the windows back into focus together, resize them simultaneously, and move them both as a group."

Other notable features of ChromeOS 128 include Optical Character Recognition (OCR), ChromeVox support for the Magnifier tool, isolated web apps (IWA), and improved settings for the camera and microphone on Chromebook devices.

You can view the release notes on the support document here.
Media

Podcasters Ditch Short Episodes in Favor of Four-Hour Conversations (bloomberg.com) 48

In a newsletter for Bloomberg, Ashley Carman discusses the rising trend of long podcasts and their surprising popularity among listeners. "By today's standards of interminable podcast discussions, a nearly three-hour recording isn't even particularly notable," she writes, highlighting recent episodes from Joe Rogan (2 hours; 16 minutes with Adam Sandler), Lex Fridman (8 hours; 37 minutes with Elon Musk), and the Acquired podcast (3 hours; 38 minutes with Lockheed Martin). "Increasingly, podcasters are pushing the outer limits of episode length while stress testing the endurance of their audiences. Popular podcast gabfests can now run on for half a workday or longer." From the report: One might assume such marathon episodes must be the result of a hands-off approach to editing. But this is not the case, said Ben Gilbert, co-host of the Acquired podcast. Every month, he and his co-host David Rosenthal release a three- to four-hour podcast, detailing the story of a specific company. The in-depth histories, he said, are the result of nine-hour recording sessions and a month of research.

"It's not important to ship every good minute," Gilbert said. "It's important to ship only great minutes. If you're actually intellectually honest with yourself, that's how to release a really good product." Even with the longer runtimes, he said, their audience listens to the vast majority of each episode. Consider their deep dive on Lockheed Martin, which runs for three hours and 38 minutes. On Apple Podcasts, the average listener consumed 70% of the show, he said. An episode on Nike, which clocks in at upwards of four hours, had an average consumption rate of 68%. "Every time we made something longer... people only seemed to love it more," he said. On the show's website, the hosts describe the episodes as "conversational audiobooks." [...]

[Jack Sylvester, executive director at Flight Studio, the Bartlett-founded podcast company behind Diary of a CEO] said the team can view data around how much of the audience consumes episodes on YouTube's TV app versus on a phone, tablet or computer. TV usage, he said, is ticking up. To give viewers a reason to keep the show on as their primary viewing experience, they're now making sure the videos have a top-quality polish. Still, in a world in which people scoff at the prospect of a three-hour movie -- and short-form video is the dominant consumption trend in entertainment -- these podcasters are eagerly meandering in the opposite direction. "The short-form obsession ended up creating white space for us," said Gilbert of Acquired. "Whenever you have a trend, that means there's people who feel left behind and want to flock to something new. This sets us apart."

Role Playing (Games)

Playing D&D Helps Autistic Players In Social Interactions, Study Finds (arstechnica.com) 40

An anonymous reader quotes a report from Ars Technica: Since its introduction in the 1970s, Dungeons & Dragons has become one of the most influential tabletop role-playing games (TRPGs) in popular culture, featuring heavily in Stranger Things, for example, and spawning a blockbuster movie released last year. Over the last decade or so, researchers have turned their focus more heavily to the ways in which D&D and other TRPGs can help people with autism form healthy social connections, in part because the gaming environment offers clear rules around social interactions. According to the authors of a new paper published in the journal Autism, D&D helped boost players' confidence with autism, giving them a strong sense of kinship or belonging, among other benefits.

"There are many myths and misconceptions about autism, with some of the biggest suggesting that those with it aren't socially motivated, or don't have any imagination," said co-author Gray Atherton, a psychologist at the University of Plymouth. "Dungeons & Dragons goes against all that, centering around working together in a team, all of which takes place in a completely imaginary environment. Those taking part in our study saw the game as a breath of fresh air, a chance to take on a different persona and share experiences outside of an often challenging reality. That sense of escapism made them feel incredibly comfortable, and many of them said they were now trying to apply aspects of it in their daily lives." [...] For this latest study. Atherton et al. wanted to specifically investigate how autistic players experience D&D when playing in groups with other autistic players. It's essentially a case study with a small sample size -- just eight participants -- and qualitative in nature, since the post-play analysis focused on semistructured interviews with each player after the conclusion of the online campaign, the better to highlight their individual voices.

The players were recruited through social media advertisements within the D&D, Reddit and Discord online communities; all had received an autism diagnosis by a medical professional. They were split into two groups of four players, with one of the researchers (who's been playing D&D for years) acting as the dungeon master. The online sessions featured in the study was the Waterdeep: Dragonheist campaign. The campaign ran for six weeks, with sessions lasting between two and four hours (including breaks). Participants spoke repeatedly about the positive benefits they received from playing D&D, providing a friendly environment that helped them relax about social pressures. "When you're interacting with people over D&D, you're more likely to understand what's going on," one participant said in their study interview. "That's because the method you'll use to interact is written out. You can see what you're meant to do. There's an actual sort of reference sheet for some social interactions." That, in turn, helped foster a sense of belonging and kinship with their fellow players.

Participants also reported feeling emotionally invested and close to their characters, with some preferring to separate themselves from their character in order to explore other aspects of their personality or even an entirely new persona, thus broadening their perspectives. "I can make a character quite different from how I interact with people in real-life interactions," one participant said. "It helps you put yourself in the other person's perspective because you are technically entering a persona that is your character. You can then try to see how it feels to be in that interaction or in that scenario through another lens." And some participants said they were able to "rewrite" their own personal stories outside the game by adopting some of their characters' traits -- a psychological phenomenon known as "bleed."

Slashdot Top Deals