About Robin Edgar

Organisational Structures | Technology and Science | Military, IT and Lifestyle consultancy | Social, Broadcast & Cross Media | Flying aircraft

South Korea Is Giving Millions of Photos of all foreign travelers since 2019 to Facial Recognition Researchers

The South Korean Ministry of Justice has provided more than 100 million photos of foreign nationals who travelled through the country’s airports to facial recognition companies without their consent, according to attorneys with the non-governmental organization Lawyers for a Democratic Society.

While the use of facial recognition technology has become common for governments across the world, advocates in South Korea are calling the practice a “human rights disaster” that is relatively unprecedented.

“It’s unheard-of for state organizations—whose duty it is to manage and control facial recognition technology—to hand over biometric information collected for public purposes to a private-sector company for the development of technology,” six civic groups said during a press conference last week.

The revelation, first reported in the South Korean newspaper The Hankyoreh, came to light after National Assembly member Park Joo-min requested and received documents from the Ministry of Justice related to a April 2019 project titled Artificial Intelligence and Tracking System Construction Project. The documents show private companies secretly used biometric data to research and develop an advanced immigration screening system that would utilize artificial intelligence to automatically identify airport users’ identities through CCTV surveillance cameras and detect dangerous situations in real time.

Shortly after the discovery, civil liberty groups announced plans to represent both foreign and domestic victims in a lawsuit.

[…]

Despite this pushback, the use of the technology is increasingly used in commercial spaces and airports. This holiday season, Delta Airlines will be piloting a facial recognition boarding program in Atlanta, following similar moves by JetBlue. US Customs and Border Protection is already relying on facial recognition technology in dozens of locations.

While the South Korean government’s collaboration with the private sector is unprecedented in its scale, it  is not the only collaboration of its kind. In 2019, a Motherboard investigation revealed the Departments of Motor Vehicles in numerous states had been selling names, addresses and other personal data to insurance or tow companies and to private investigators.

Source: South Korea Is Giving Millions of Photos to Facial Recognition Researchers

Big tech fined 2% revenue if they force their own in-app payment system in S Korea

South Korean has again imposed new regulations on app stores, this time with a regime that will see operators fined up to two per cent of revenue if they force their proprietary in-app payment systems on developers.

“Considering that certain payment methods compulsory acts are serious illegal acts of app market operators, an enforcement ordinance has been prepared that imposes a fine of two per cent of sales and one per cent of sales for delayed screening or deletion,” the Korea Communications Commission (KCC), yesterday announced in a (Korean language) canned statement.

The new regulation follows the September 2021 introduction of the country’s Telecommunications Business Act, which prevents tech giants from restricting payment options on their platforms – either to pay for apps or for in-app purchases. The Act also prevents the likes of Google, Apple and others from taking a cut of in-app purchases facilitated by third-party services.

[….]

Source: Big tech fined if they force their own in-app payment system • The Register

Come on, EU, US, where are you guys?!

Project Collects ‘Every’ NFT In One Giant 20TB Download

Hours ago, a website appeared online with the express purpose of hosting a nearly 20TB torrent (that’s terabytes, folks, the big boys of digital data measurement) containing every NFT available through the Ethereum and Solana blockchains.

The NFT Bay, whose name and overall design riff on iconic torrent database The Pirate Bay, is the work of one Geoffrey Huntley, an Australian software and dev ops engineer. In a frequently asked questions document written up for annoying reporters like me, Huntley describes The NFT Bay as an “educational art project” designed to teach the public about what NFTs are and aren’t, in the hopes that fewer folks get swindled by the technology’s innumerable grifters.

A logo of a pirate ship underlined by text reading "The NFT Bay" in a fancy script.
Image: Geoffrey Huntley

“Fundamentally, I hope people learn to understand what people are buying when purchasing NFT art right now is nothing more than directions on how to access or download an image,” Huntley explained. “The image is not stored on the blockchain and the majority of images I’ve seen are hosted on web 2.0 storage, which is likely to end up as 404, meaning the NFT has even less value.

[…]

“[NFTs] are only valuable as tools for money laundering, tax evasion, and greater fool investment fraud,” wrote computer scientist Antsstyle in a scathing criticism of the technology, the long version of which is perhaps the most comprehensive breakdown of the ills posed by NFTs, cryptocurrency, and the blockchain on which they operate. “There is zero actual value to NFTs. Their sole purpose is to create artificial scarcity of an artwork to supposedly increase its value.”

Source: Project Collects ‘Every’ NFT In One Giant 20TB Download

Canadian teen arrested for stealing $36.5m of cryptocurrency

A Canadian teenager has been arrested for allegedly stealing $37 million worth of cryptocurrency ($46M Canadian) via a SIM swap scam, making it the largest virtual cash heist affecting a single person yet, according to police.

Together with the FBI and the US Secret Service Electronic Crimes Task Force, Hamilton Police in the Canadian province of Ontario launched a joint probe to investigate the breach of a US resident’s mobile phone account.

The victim was reportedly targeted with a SIM swap attack – their phone number was hijacked and ported to a different phone belonging to the attacker. The miscreant was then able to enter personal accounts via two-factor authentication requests and obtain details of the victim’s cryptocurrency wallet. From there, millions of dollars were siphoned off, it’s claimed.

“The joint investigation revealed that some of the stolen cryptocurrency was used to purchase an online username that was considered to be rare in the gaming community,” according to a statement from Hamilton Police.

“This transaction led investigators to uncover the account holder of the rare username,” it confirmed.

The teen was arrested for theft and possession of property. Police have seized over $5.5 million worth of cryptocurrencies in the case so far.

Source: Canadian teen arrested for stealing $36.5m of cryptocurrency • The Register

Thousands of Firefox users accidentally commit login cookies on GitHub

Thousands of Firefox cookie databases containing sensitive data are available on request from GitHub repositories, data potentially usable for hijacking authenticated sessions.

These cookies.sqlite databases normally reside in the Firefox profiles folder. They’re used to store cookies between browsing sessions. And they’re findable by searching GitHub with specific query parameters, what’s known as a search “dork.”

Aidan Marlin, a security engineer at London-based rail travel service Trainline, alerted The Register to the public availability of these files after reporting his findings through HackerOne and being told by a GitHub representative that “credentials exposed by our users are not in scope for our Bug Bounty program.”

Marlin then asked whether he could make his findings public and was told he’s free to do so.

“I’m frustrated that GitHub isn’t taking its users’ security and privacy seriously,” Marlin told The Register in an email. “The least it could do is prevent results coming up for this GitHub dork. If the individuals who uploaded these cookie databases were made aware of what they’d done, they’d s*** their pants.”

Marlin acknowledges that affected GitHub users deserve some blame for failing to prevent their cookies.sqlite databases from being included when they committed code and pushed it to their public repositories. “But there are nearly 4.5k hits for this dork, so I think GitHub has a duty of care as well,” he said, adding that he’s alerted the UK Information Commissioner’s Office because personal information is at stake.

[…]

Source: Thousands of Firefox users accidentally commit login cookies on GitHub • The Register

Warhammer 40K’s Imperium Is Genocidal – not a Good Thing, Maker Reminds Players

Some Warhammer 40,000 players think the game’s fascist Imperium of Man faction is awesome, and actually has a few good ideas. It does not. To clarify this point—which more than one Warhammer 40K fan appears to have missed—maker Games Workshop put out a statement saying that you do not, under any circumstances, “gotta hand it to them.”

“There are no goodies in the Warhammer 40,000 universe,” Games Workshop wrote on its website today. “None. Especially not the Imperium of Man…We believe in and support a community united by shared values of mutual kindness and respect. Our fantasy settings are grim and dark, but that is not a reflection of who we are or how we feel the real world should be.”

The statement comes just a couple weeks after controversy broke out when a player wore Nazi symbols to an unofficial tournament in Spain and the organizers apparently didn’t throw him out, despite complaints from other players.

[…]

Most fans get that Warhammer 40K is not real, and if it were, life in its universe would be exceedingly nasty, brutish, and short. But some of its aesthetic and lore have been co-opted by the alt-right, white supremacists, and other crypto-fascist groups. They think the Imperium of Man—a feudalistic galactic empire modeled after Rome, full of enslaved races, and ruled by a 10,000 year-old psychic kept alive by cyborg implants called the Emperor of Mankind—is a model on which to base their politics. During the 2016 presidential election it became the basis for the now famous internet meme: God Emperor Trump.

This all adds up to why Games Workshop had to take a break from its world building today, to make Warhammer 40K’s subtext text:

Like so many aspects of Warhammer 40,000, the Imperium of Man is satirical.

For clarity: satire is the use of humour, irony, or exaggeration, displaying people’s vices or a system’s flaws for scorn, derision, and ridicule. Something doesn’t have to be wacky or laugh-out-loud funny to be satire. The derision is in the setting’s amplification of a tyrannical, genocidal regime, turned up to 11. The Imperium is not an aspirational state, outside of the in-universe perspectives of those who are slaves to its systems. It’s a monstrous civilisation, and its monstrousness is plain for all to see.

But apparently not plainly enough. Games Workshop reiterated its stance against hate groups and others seeking to co-opt its creative work, including banning individuals wearing hate symbols at Warhammer-adjacent events.

“If you come to a Games Workshop event or store and behave to the contrary, including wearing the symbols of real-world hate groups, you will be asked to leave. We won’t let you participate,” the company wrote. “We don’t want your money. We don’t want you in the Warhammer community.”

It’s nice to have a corporate statement that doesn’t mince words for once.

Source: Warhammer 40K’s Imperium Is Genocidal, Maker Reminds Players

German state planning to switch 25,000 PCs to LibreOffice

The north-German state of Schleswig-Holstein plans to switch to open source software, including LibreOffice, in its administration and schools.

In doing so, the state wants to reduce its dependence on proprietary software, and eventually end it altogether. By the end of 2026, Microsoft Office is to be replaced by LibreOffice on all 25,000 computers used by civil servants and employees (including teachers), and the Windows operating system is to be replaced by GNU/Linux.

The necessary steps for this are specified in the planning of the Schleswig-Holstein state parliament (German), as digital minister Jan Philipp Albrecht explains in an interview with c’t (also German – Google Translate version here).

Lothar Becker and Thorsten Behrens from The Documentation Foundation, the non-profit entity behind LibreOffice, were invited to a meeting with those responsible (photos below). The focus was on cloud solutions, integration with LibreOffice and other systems, and video conferencing tools.

[…]

Source: German state planning to switch 25,000 PCs to LibreOffice

‘Gas station in space’: new plan to make rocket fuel from junk in Earth’s orbit

[…]

South Australian company Neumann Space has developed an “in-space electric propulsion system” that can be used in low Earth orbit to extend the missions of spacecraft, move satellites, or de-orbit them.

Now Neumann is working on a plan with three other companies to turn space junk into fuel for that propulsion system.

Japanese start-up Astroscale has already demonstrated how it can use satellites to capture bits of debris in space.

Nanorocks, in the US, is working on a plan using advanced robotics to store and cut up that debris while it is still in orbit. Another US company, Cislunar, is developing a space foundry to melt debris into metal rods.

And Neumann Space’s propulsion system can use those metal rods as fuel – their system ionises the metal which then creates thrust to move objects around orbit.

Chief executive officer Herve Astier said when Neumann was approached to be part of a supply chain to melt metal in space, he thought it was a futuristic plan, and would not be “as easy as it looks”.

“But they got a grant from Nasa so we built a prototype and it works,” he said.

“We did a live technology demonstration.“ One can grab a piece of debris, one can cut the debris open, one can melt the debris, and we can use that.”

[…]

Australian researchers are also working on the problem.

Saber Astronautics has won a Nasa grant to develop a drag sail, which will launch from a spacecraft at the end of its life and drag it out of orbit.

Sydney’s Electro Optic Systems, working with the University of Canberra, has developed laser technology that can nudge junk away from potential collisions, or towards the atmosphere.

The Australian Institute of Machine Learning has a grant to improve detection and tracking of debris, and a new surveillance radar in Western Australia will help with that too.

Recycling the junk, instead of capturing it or destroying it, is another dimension again.

Astier says it is still futuristic, but now he can see that it’s possible.

[…]

Source: ‘Gas station in space’: new plan to make rocket fuel from junk in Earth’s orbit | Space | The Guardian

Tesla drivers locked out of their cars by server error

Some Tesla drivers who fancied going for a spin on Saturday were unable to do so after an update to the cars’ companion app produced server errors.

Teslas don’t use conventional keys. Instead they require the presence of a fob, key card, or authenticated mobile phone app that links to the electric vehicles over Bluetooth. This is apparently easier and/or more convenient than a key, or something. Heck, everything’s better with Bluetooth, right?

Drivers that use the app to start their cars reported it couldn’t do the job and instead produced an error message.

Tesla founder and CEO Elon Musk personally replied to the above tweet, with the following information:

Measures like, maybe, letting people open their cars with keys? Just a suggestion.

Tesla appears not to have made any other public statement about the incident. The company put its support forums behind a regwall earlier in 2021 and owning a MuskMobile is a requirement for entry. Your correspondent is therefore unable to explore any official missives. Tesla’s Twitter account is silent on the matter and the electric car biz doesn’t bother with Facebook. The exact nature of the outage is therefore hard to divine.

[…]

Source: Tesla drivers locked out of their cars by server error • The Register

How Facebook and Google Actually Fund the Creation of Misinformation

MIT’s Technology Review shares data from a Facebook-run tool called CrowdTangle. It shows that by 2018 in the nation of Myanmar (population: 53 million), ” All the engagement had instead gone to fake news and clickbait websites.

“In a country where Facebook is synonymous with the internet, the low-grade content overwhelmed other information sources.” [T]he sheer volume of fake news and clickbait acted like fuel on the flames of already dangerously high ethnic and religious tensions. It shifted public opinion and escalated the conflict, which ultimately led to the death of 10,000 Rohingya, by conservative estimates, and the displacement of 700,000 more. In 2018, a United Nations investigation determined that the violence against the Rohingya constituted a genocide and that Facebook had played a “determining role” in the atrocities. Months later, Facebook admitted it hadn’t done enough “to help prevent our platform from being used to foment division and incite offline violence.” Over the last few weeks, the revelations from the Facebook Papers, a collection of internal documents provided to Congress and a consortium of news organizations by whistleblower Frances Haugen, have reaffirmed what civil society groups have been saying for years: Facebook’s algorithmic amplification of inflammatory content, combined with its failure to prioritize content moderation outside the US and Europe, has fueled the spread of hate speech and misinformation, dangerously destabilizing countries around the world.

But there’s a crucial piece missing from the story. Facebook isn’t just amplifying misinformation.

The company is also funding it.

An MIT Technology Review investigation, based on expert interviews, data analyses, and documents that were not included in the Facebook Papers, has found that Facebook and Google are paying millions of ad dollars to bankroll clickbait actors, fueling the deterioration of information ecosystems around the world.
Facebook pays them for permission to open their content within Facebook’s app (where Facebook controls the advertising) rather than having users clickthrough to the publisher’s own web site, reports Technology Review: Early on, Facebook performed little quality control on the types of publishers joining the program. The platform’s design also didn’t sufficiently penalize users for posting identical content across Facebook pages — in fact, it rewarded the behavior. Posting the same article on multiple pages could as much as double the number of users who clicked on it and generated ad revenue. Clickbait farms around the world seized on this flaw as a strategy — one they still use today… Clickbait actors cropped up in Myanmar overnight. With the right recipe for producing engaging and evocative content, they could generate thousands of U.S. dollars a month in ad revenue, or 10 times the average monthly salary — paid to them directly by Facebook. An internal company document, first reported by MIT Technology Review in October, shows that Facebook was aware of the problem as early as 2019… At one point, as many as 60% of the domains enrolled in Instant Articles were using the spammy writing tactics employed by clickbait farms, the report said…

75% of users who were exposed to clickbait content from farms run in Macedonia and Kosovo had never followed any of the pages. Facebook’s content-recommendation system had instead pushed it into their news feeds.
Technology Review notes that Facebook now pays billions of dollars to the publishers in their program. It’s a long and detailed article, which ultimately concludes that the problem “is now happening on a global scale.” Thousands of clickbait operations have sprung up, primarily in countries where Facebook’s payouts provide a larger and steadier source of income than other forms of available work. Some are teams of people while others are individuals, abetted by cheap automated tools that help them create and distribute articles at mass scale…

Google is also culpable. Its AdSense program fueled the Macedonia- and Kosovo-based farms that targeted American audiences in the lead-up to the 2016 presidential election. And it’s AdSense that is incentivizing new clickbait actors on YouTube to post outrageous content and viral misinformation.
Reached for comment, a Facebook spokesperson told Technology Review that they’d misunderstood the issue. And the spokesperson also said “we’ve invested in building new expert-driven and scalable solutions to these complex issues for many years, and will continue doing so.”

Google’s spokesperson confirmed examples in the article violated their own policies and removed the content, adding “We work hard to protect viewers from clickbait or misleading content across our platforms and have invested heavily in systems that are designed to elevate authoritative information.”

Source: How Facebook and Google Actually Fund the Creation of Misinformation – Slashdot

Beijing issues fines for 43 Big Tech M&A deals

China’s State Administration for Market Regulation (SAMR) has fined tech giants 43 times – with Alibaba, Baidu and Tencent told to pay up for failing to declare deals deemed to violate anti-monopoly legislation.

According to SAMR, more rigorous anti-monopoly law enforcement has seen businesses file more paperwork, sometimes about past transactions. SAMR’s own probes have spotted acquisitions that weren’t reported at the time.

Those efforts turned up 43 transactions, conducted between 2012 and 2021, that violated China’s 2008 Anti-Monopoly Law. Each count received a fine of ¥500,000 ($78,300). The regulatory body said that all were “assessed as having no effect of excluding or restricting competition”.

The market regulator posted about the fines on its WeChat account and Weibo page on Saturday.

State-sponsored media Global Times reported that Alibaba and Tencent each racked up more than ten cases.

[…]

China’s national anti-monopoly bureau was inaugurated on Thursday and guidelines for antitrust compliance of enterprises abroad were issued the same day.

The government in Beijing, and SAMR in particular, has been busy. Earlier this month the organization drafted new rules for internet platforms considered “super large” that hold them to higher standards than smaller, less influential ones in an attempt to stamp out anticompetitive behavior.

In September, the org ordered Alibaba, Tencent and more to stop blocking links to rivals. And it has been known to step in and outright ban mergers it deems imprudent.

[…]

Source: Beijing issues fines for 43 Big Tech M&A deals • The Register

It’s odd that China is leading the way in anti-monopolistic behaviour whilst the EU and US are lagging behind severely.

Physicists reveal non-reciprocal flow around the quantum world

A pair of theoretical physicists, from the University of Exeter (United Kingdom) and the University of Zaragoza (Spain), have developed a quantum theory explaining how to engineer non-reciprocal flows of quantum light and matter. The research may be important for the creation of quantum technologies which require the directional transfer of energy and information at small scales.

Reciprocity, going the same way backward as forward, is a ubiquitous concept in physics. A famous example may be found in Newton’s Law: for every action there is an equal and opposite reaction. The breakdown of such a powerful notion as reciprocity in any area of physics, from mechanics to optics to electromagnetism, is typically associated with surprises which can be exploited for technological application. For example, a nonreciprocal electric diode allows current to pass in forwards but not backwards and forms a building block of the microelectronics industry.

In their latest research, Downing and Zueco provide a of non-reciprocal transport around a triangular cluster of strongly interacting quantum objects. Inspired by the physics of quantum rings, they show that by engineering an artificial magnetic field one may tune the direction of the energy flow around the cluster. The theory accounts for strong particle interactions, such that directionality appears at a swathe of energies, and considers the pernicious effect of dissipation for the formation of non-reciprocal quantum currents.

The research may be useful in the development of quantum devices requiring efficient, directional transportation, as well for further studies of strongly interacting quantum phases, synthetic magnetic fields and quantum simulators.

Charles Downing from the University of Exeter explains: “Our calculations provide insight into how one may instigate directional transport in closed nanoscopic lattices of atoms and photons with , which may lead to the development of novel devices of a highly directional character”.

“Non-reciprocal population dynamics in a quantum trimer” is published in Proceedings of the Royal Society A, a historic journal which has been publishing scientific research since 1905.


More information: Nonreciprocal population dynamics in a quantum trimer, Proceedings of the Royal Society A: Mathematical and Physical Sciences (2021). DOI: 10.1098/rspa.2021.0507. royalsocietypublishing.org/doi … .1098/rspa.2021.0507

Source: Physicists reveal non-reciprocal flow around the quantum world

Apple’s macOS Monterey memory leak blamed on custom cursors

Sleuthing leads to suspected RAM-gobbling culpri

Apple’s macOS Monterey, the iGiant’s latest desktop operating system release, turns out to have an insatiable appetite for memory if you use certain apps.

Shortly after the OS update was released on October 25, Apple customers – at least those who avoided installation woes – began to notice that certain apps gobbled an excessive amount of memory, so much so the programs would crash or quit.

There were reports of this sort for Adobe Creative Cloud apps, Microsoft Office, Cinema 4D, and Pages, to name but a few.

Mozilla’s Firefox was also affected – 79GB of memory is a lot, even for a browser known for memory consumption. Following an October 10 bug report, filed back just prior to macOS Monterey’s release, Mozillans determined that Apple’s latest operating system was afflicted by a memory leak that occurs when an app uses a customized cursor.

“On macOS 12 Monterey, using a non-standard cursor size or colors causes a large memory leak in Firefox,” the bug report explains. “Firefox version 94 includes a fix that reduces the memory leak, but the problem can still occur. The problem has been reported to Apple and a fix is expected in a future update to macOS 12.”

[…]

Source: Apple’s macOS Monterey memory leak blamed on custom cursors

Which governments censor the tech giants the most?

Note: these numbers do not take into account the amount of secret removal requests from governments, which are probably most in the US (also see https://www.linkielist.com/global-domination/us-judge-rules-twitter-cant-be-transparent-about-amount-of-surveillance-requests-processed-per-year-due-to-national-security-of-the-4th-reich/)

In 2009, Google started recording the number of content removal requests it received from courts and government agencies all over the world, disclosing the figures on a six-month basis. Soon after, several other companies followed suit, including Twitter, Facebook, Microsoft, and Wikimedia.

This year, we’ve extended our study of the above to include Pinterest, Dropbox, Reddit, LinkedIn, TikTok, and Tumblr. Our study looks at the number of content removal requests by platform, which countries have the highest rates of content removal per 100,000 internet users, and how things have changed on a year-by-year basis.

What did we find?

Some governments avidly try to control online data, whether this is on social media, blogs, or both. And not all of the worst offenders may be who you expect.

Top 10 countries by number of content removal requests

According to our findings, the countries with the highest rate of content removal requests per 100,000 internet users are:

  1. Monaco – 341 content removal requests per 100,000 internet users
  2. Russia – 146 content removal requests per 100,000 internet users
  3. Turkey – 138 content removal requests per 100,000 internet users
  4. France – 97 content removal requests per 100,000 internet users
  5. Israel – 91 content removal requests per 100,000 internet users
  6. Liechtenstein – 68 content removal requests per 100,000 internet users
  7. Pakistan – 62 content removal requests per 100,000 internet users
  8. South Korea – 49 content removal requests per 100,000 internet users
  9. Mexico – 49 content removal requests per 100,000 internet users
  10. Japan – 49 content removal requests per 100,000 internet users

With 130 content removal requests to less than 39,000 internet users, Monaco has had the most content removal requests per 100,000 internet users. The majority of these (116) were directed at Facebook with over 98 percent in 2019.

In second and third place are Russia and Turkey with 146 and 138 content removal requests per 100,000 internet users respectively. Russia had 179,013 requests in total with 69 percent of these being directed toward Google. In contrast, Turkey had 90,696 requests in total with the majority of these (55 percent) being directed toward Twitter.

We’ll delve into the whats and whys of these removals below. But which countries submitted the most requests overall?

If we switch the top 10 to be the countries that submitted the highest number of requests overall, things do change slightly:

  1. Russia – 179,013 content removal requests submitted in total. The majority of these (69 percent) were directed toward Google
  2. India – 97,631 content removal requests submitted in total. The majority of these (76 percent) were directed toward Facebook
  3. Turkey – 90,696 content removal requests submitted in total. The majority of these (55 percent) were directed toward Twitter
  4. Japan – 56,861 content removal requests submitted in total. The majority of these (98 percent) were directed toward Twitter
  5. France – 54,627 content removal requests submitted in total. The majority of these (80 percent) were directed toward Facebook
  6. Mexico – 45,671 content removal requests submitted in total. The majority of these (99 percent) were directed toward Facebook
  7. Brazil – 36,151 content removal requests submitted in total. The majority of these (72 percent) were directed toward Facebook
  8. South Korea – 24,658 content removal requests submitted in total. The majority of these (44 percent) were directed toward Twitter
  9. Pakistan – 23,377 content removal requests submitted in total. The majority of these (84 percent) were directed toward Facebook
  10. Germany – 19,040 content removal requests submitted in total. The majority of these (68 percent) were directed toward Facebook

Russia outranked all other countries with a 6-digit figure for government content requests, making 179,765 requests across all platforms. It’s also the highest-ranking country for the number of requests submitted to Google, Reddit, TikTok, and Dropbox.

Interesting, too, is how the United Kingdom and the United States rank in eleventh and twelfth place respectively for the number of content requests submitted. The UK had 17,406 content removal requests in total with 64 percent being submitted to Facebook. Meanwhile, the US had 12,474 in total with 80 percent submitted to Google. In relation to the number of internet users, however, the UK submitted 27 per 100,000 and the US just 4 per 100,000. This places them 16th and 50th in the number of requests per 100,000 internet user rankings respectively.

Highest content removal requests by platform

Now we know which countries have submitted the most requests, which country comes out on top for each platform?

  • Google: Russia accounts for 60 percent of requests – 123,607 of 207,066
  • Facebook: India accounts for 24 percent of requests – 74,674 of 308,434
  • Twitter: Japan accounts for 31 percent of requests – 55,590 of 181,689
  • Microsoft: China accounts for 52 percent of requests – 8,665 of 16,817
  • Pinterest: South Korea accounts for 46 percent of requests – 2,345 of 5,134
  • Tumblr: South Korea accounts for 71 percent of requests – 2,260 of 3,193
  • Wikimedia: United States accounts for 23 percent of requests – 977 of 4,256
  • Dropbox: Russia accounts for 34 percent of requests – 752 of 2,217
  • TikTok: Russia accounts for 24 percent of requests – 150 of 620
  • Reddit: Russia accounts for 29 percent of requests – 143 of 488
  • LinkedIn: China accounts for 71 percent of requests – 72 of 102

What about China’s lower rankings across every category but Microsoft?

China tends not to bother going through content providers and their in-house reporting mechanisms to censor content. It simply blocks entire sites and apps outright, forcing internet service providers to bar access on behalf of the government. China has banned all of the websites we have used in this comparison, except for LinkedIn and some of Microsoft’s services–the two areas where it dominates the content removal requests.

Which tech giant is receiving the highest percentage of removal requests in each country?

If we look at which tech giant is receiving the highest percentage of removal requests in each country, we can see that Google and Facebook tend to receive the vast majority.

Tech giant government content removal requests

Many Central European, South East Asian, and some South American countries submit the majority of their removal requests to Facebook, while many African and Eastern European countries, as well as the US, Canada, and Australia, submit most of theirs to Google. A large number of Middle Eastern countries submit the majority of requests to Twitter.

Biggest years for government content removal requests

Following a slight dip in 2019 (a 2 percent decrease on the number of requests submitted in 2018), removal requests bounced back up by 69 percent from 2019 to 2020. Twitter accounted for the largest percentage of these requests with 80,744 (40 percent) of the 203,698 requests submitted in total. It was closely followed by Facebook (62,314 or 31 percent) and Google (44,065 or 22 percent).

Over the years, these platforms have made the most content removal requests. But, when you take into consideration that all three are the highest used of all the platforms we’ve covered, that’s perhaps no surprise.

However, what the above does show us is how the focus on platforms has changed over the years.

Facebook’s biggest year for content removal requests came in 2015 when 76,395 requests were submitted (25 percent of its overall total). These requests then dropped significantly in 2016 before increasing by 155 and 21 percent from 2016 to 2017 and 2017 to 2018 respectively. Figures then dropped by 34 percent from 2018 to 2019 before almost doubling again from 2019 to 2020.

Google also witnessed a similar drop in 2019 when requests dipped by 30 percent, having been growing by around 10,000 each year from 2016 to 2018. In 2020, the number of requests rose again by 46 percent.

Twitter, however, didn’t follow this trend. In 2019, Twitter saw a 97 percent increase in the number of requests submitted (rising from 23,464 in 2018 to 46,291 in 2019). The number of content removals submitted to Twitter continued to rise significantly in 2020, too, when they nearly doubled to 80,744. In fact, of all the platforms we’ve studied, Twitter is the only platform (bar LinkedIn and Reddit which have only recently begun to submit reports) that has noticed an increase in content removal requests each and every year.

Why does Twitter appear to be dominating content removal requests? After all, it doesn’t have the largest number of users (it has around 396.5m users compared to Facebook’s 2.8bn).

The majority of the increase comes from Japan, India, South Korea, and Indonesia. As we’ll see further on, Japan Twitter has recently been under fire for censoring government critics. Other reasons could be increases in scams, misinformation around elections, and general violations of local laws.

Russia accounts for 60 percent of Google’s content removal requests

As mentioned previously, Russia dominates the number of content request removals made to Google, accounting for 123,607 (60 percent) in total. Despite Russia’s requests dropping from over 30,000 in 2018 to just under 20,000 in 2019, they jumped back up to a record-breaking 31,384 in 2020. This dip in 2019 was a worldwide trend, however, with a 30 percent decrease in removal requests in 2019 followed by a 46 percent increase in 2020.

Nearly 34 percent of Russia’s requests come under the reason of national security, closely followed by copyright (26 percent) and regulated goods and services (18 percent).

Russia’s requests are significantly higher than second-place Turkey, which sent just 14,242 requests–7 percent of all requests received. Turkey was closely followed by India (10,138 with 4.89 percent) and the US (9,933 with 4.79 percent). Defamation is the main reason for all of these countries’ requests, accounting for 39 percent of Turkey’s total, 27 percent of India’s total, and 58 percent of the US’s total.

Which of Google’s products are being targeted by these removal requests?

YouTube and web searches are all prime targets for these removal requests. Of all the requests, 50 percent are directed toward YouTube and 30 percent toward web searches.

Examples of Google content removal requests

Some examples of the requests submitted by Russia, Turkey, and India include:

Russia: “Roskomnadzor requested that we block a Russian-language summary of a Financial Times report claiming that the content was “extremist”. The article stated that the real number of coronavirus deaths in Russia is potentially 70% higher than what official statistics report.” – The content wasn’t removed, which was, in part, due to errors in the way the request had been served. This included procedural defects in the way the request was served (Jan-Jun, 2020).

Turkey: “We received a court order to delist 5 URLs from Google Search and to remove 1 Blogger blog post on the basis of “right-to-be-forgotten” legislation, on behalf of a high-ranking official. The news articles reported accusations of organised crime, which allegedly led to a criminal complaint.” – The URLs were not delisted or removed (Jul-Dec, 2020).

Turkey: “We received a court order to remove 2 Google Groups posts, 2 Blogger posts, 1 Blogger image, and an entire Blogger blog publishing political caricatures of a very senior Government official of Turkey.” – The content was not removed (Jul-Dec, 2016).

India: “We received multiple requests from Indian law enforcement for 173 YouTube URLs depicting content related to COVID-19. The reported content ranged from conspiracy theories and religious hate speech related to COVID-19 to news reports and criticism of the authorities’ handling of the pandemic.” 14 URLs were removed for violating YouTube’s community guidelines, 30 URLs were restricted in India based on cited local laws. Further information was requested for 106 URLs, of which 10 URLs were not removed and 13 URLs were already down.

India accounts for 24 percent of Facebook’s content removal requests

Facebook received the largest number of government content requests overall with 308,434 in total. India made up for the vast majority of these, with its 74,674 requests accounting for nearly 25 percent of the total. Most of India’s requests (40 percent) were made in 2015 when 30,126 requests were submitted. Since then, India’s requests have remained much lower, only reaching two or three thousand per year, except for in 2018 when requests spiked again at just over 19,000.

Interestingly, in 2015, the Supreme Court of India struck down section 66A of the Information Technology Act, 2000, which made posting “offensive” comments online a crime that was punishable by jail. Perhaps this led to an influx in offensive comments on mediums like Facebook, or authorities turned to Facebook’s content removal system to try and combat things differently.

In second place for removal requests via Facebook is Mexico with 45,217. Most of these requests (45 percent) were placed in the first half of 2017, shortly after Mexico first started submitting removal requests (its first figures are recorded for the latter part of 2016). Therefore, Mexican officials were perhaps “catching up” on the content that they thought violated local law. Mexico’s removal requests dropped dramatically in 2018 (2,040 submitted in total) before rising in 2019 (by 240 percent to 6,946) and in 2020 (by 93 percent to 13,399).

Mexico was closely followed by France with 43,816 requests. Again, the majority of these requests were submitted years ago (37,695 or 86 percent were submitted in the second half of 2015). But unlike Mexico, France’s requests have continued to decline year on year with just 298 submitted in all of 2020. This dramatic peak in removal requests does coincide with the November 2015 terror attacks in Paris.

Oddly, the US doesn’t feature anywhere near the top for removal requests, ranking 57th for its mere 27 removal requests since reporting began. Facebook’s Transparency Report suggests a country might not make the list either because Facebook’s services aren’t available there or there haven’t been any items of this type to report. The US doesn’t fall into the former, but the latter doesn’t seem likely either, especially when you consider the United States’s removal requests across other platforms. Furthermore, there is a case study (like the ones depicted below) for the US, which suggests:

“We received a request from a county prosecutor’s office to remove a page opposing a county animal control agency, alleging that the page made threatening comments about the director of the agency and violated laws against menacing.” Facebook reviewed the page and found there to be no credible threats so it, therefore, didn’t violate their Community Standards. (Oct 2015)

Examples of Facebook content removal requests

India: “We received a request from law enforcement in India to remove a photo that depicted a sketch of the Prophet Mohammed.” – The content didn’t violate Facebook’s Community Standards but was made unavailable in India where any depiction of Mohammed is forbidden. (Jun 2016)

France: “Following the November 2015 terrorist attacks in Paris, we received a request from L’Office Central de Lutte Contre la Criminalité Liée aux Technologies de l’Information et de la Communication (OCLCTIC), a division of French law enforcement, to remove a number of instances of a photo taken inside the Bataclan concert venue depicting the remains of several victims. The photo was alleged to violate French laws related to protecting human dignity.” – The content didn’t violate Facebook’s Community Standards but 32,100 instances of the photo were restricted in France. It was still available in other countries. (Nov 2015)

Mexico: “We received a request from the Mexican Federal Electoral Court to remove 239 items in connection with two complaints filed by the Partido de la Revolución Democrática (“PRD”) against Governmental Entities in Mexico. The PRD alleged that the content violated Mexico’s election laws.” – The content didn’t violate Facebook’s Community Standards but access to 63 posts were restricted in Mexico as they were deemed unlawful. 159 items were duplicated or had already been removed. (Jan 2020)

Japan accounts for 31 percent of Twitter’s content removal requests Twitter

Japan had the largest number of government content requests on Twitter with 55,590 requests submitted in total. This made up for 31 percent of all of the requests recorded by Twitter. Most of these requests (36,573 or 66 percent) were submitted in 2020. In fact, Japan’s content removal requests to Twitter have increased dramatically in recent years, jumping by 1,916 percent from 2018 to 2019 (from 875 to 17,640) and by 107 percent from 2019 to 2020 (from 17,640 to 36,573).

While the removal requests across Twitter have increased on a yearly basis (worldwide), Japan’s growth exceeds the worldwide average of 97 percent from 2018 to 2019 and 74 percent from 2019 to 2020. This comes amid recent reports that Twitter Japan seems to be suspending government critics. However, Twitter’s official report suggests the majority of the removal requests relate to laws surrounding narcotics and psychotropics, obscenity, or money lending.

In second place was Turkey with 49,525 requests, followed by Russia with 36,787 requests. Although Russia follows Japan’s trend with yearly increases in removal requests (99 percent from 2018 to 2019 and 54 percent from 2019 to 2020), Turkey’s removal requests are in decline (dropping by 20 percent from 2018 to 2019 and by 28 percent from 2019 to 2020).

Examples of Twitter content removal requests

Turkey: “Twitter received a court order from Turkey regarding two Tweets containing insulting language towards a high-level official of a prominent bank in Turkey for violation of personal rights. Twitter withheld both Tweets in Turkey in response to the court order.” (Jul-Dec, 2020)

Russia: “We received the first Periscope removal request from Roskomnadzor concerning a prisoner’s account. Citing Article 82 of the Russian Criminal Executive Code, the reporter asked us to ‘block the account from which the violating broadcast was made’. However, the reported account had no broadcasts, so we did not take any action.” (Jan-Jun 2017)

France: “We withheld one Tweet in response to a legal demand from the Office Central de Lutte contre la Criminalité liée aux Technologies de l’Information et de la Communication (OCLCTIC) for glorification of terrorist attacks.” (Jul-Dec 2017)

China accounts for 52 percent of Microsoft’s content removal requests

As we have already seen, China barely features across all of the aforementioned removal platforms for its content removal requests. This is due to the widespread blocking of these platforms, which removes the need for such requests. However, as some of Microsoft’s products are available in China, it accounts for over half of all the requests submitted to this tech giant.

Unfortunately, Microsoft doesn’t offer any insight into why the content removal requests are submitted. What it does indicate, however, is how many requests result in any action being taken. From July to December 2020, 96 percent of China’s requests were actioned. Russia (the second-highest submitter of requests) had just 41 percent of its requests actioned, while France had 89 percent.

Since the second half of 2018, China has always submitted over 1,000 removal requests every six months to Microsoft. Russia, however, upped its requests significantly in the second half of 2019, submitting nearly 300 percent more than the first half (2,951 compared to 743). But these started to drop off again in 2020, reducing by 45 percent and 58 percent in the first and second half of 2020, respectively.

Content removal requests across other platforms

Google, Facebook, Twitter, and Microsoft account for the vast majority of content removal requests, but the following also show interesting insights into where governments are focusing their online censorship efforts.

Dropbox

Russia submitted 34 percent of all the content removal requests to Dropbox, followed by France with 24 percent and the UK with 21 percent. Russia’s requests peaked in 2017 with 243 of its 752 (32 percent) requests submitted during this time. France’s came in 2018 with 63 percent of its total (331 of 524) submitted then. The UK also submitted the majority of its (41 percent) in 2017.

Since 2017/18, Dropbox’s removal requests have decreased quite significantly, falling by 38 percent from 2018 to 2019 and by 52 percent from 2019 to 2020.

Dropbox doesn’t provide insight into the types of content removal requests that are submitted but does appear to action the majority of requests it receives for most countries. For example, the US submitted 33 requests which affected 45 accounts. All but 2 of these accounts had action taken against them. However, of the 48 requests submitted by Russia in 2020, which affected 13 accounts, only 7 accounts had content blocked on them.

LinkedIn

LinkedIn receives very few content removal requests according to its transparency report and the vast majority of these are submitted by China. 42 out of 50 of the requests in 2020 came from China with only 14 countries having ever submitted one of these reports in the last three years (from 2018 to 2020).

Pinterest

The number of requests submitted to Pinterest has grown significantly within the last two reporting periods, increasing by 500 percent from 2019 to 2020 (from 680 to 4,078). South Korea and Russia account for the majority of these requests, submitting 46 and 43 percent of the total requests respectively.

Most of South Korea’s requests (99 percent) came in 2020 while Russia has been upping its requests since 2018. Russia submitted 102 in 2018, increasing by 376 percent to 486 in 2019 before rising by a further 234 percent to 1,622 in 2020.

Most of the content removal requests submitted to Pinterest are due to violations of community guidelines. For example, in 2020, 90 percent of the requests submitted were due to content that violated Pinterest’s community guidelines. No specific examples are available.

Reddit

Even though government content removal requests for Reddit have increased in recent years, the numbers are still within the low hundreds. Furthermore, as Reddit’s report demonstrates, a lot of the content that is restricted due to these requests is done so in the local area (over 71 percent of the pieces of content flagged by government requests in 2020 was only restricted in the local area).

Russia is, again, the main culprit for these requests, submitting over 29 percent of all the requests. Turkey has submitted the second-highest number of requests (100 or 20 percent) but most of these came in 2018 and 2019. In 2020, South Korea upped its requests with 60 in total (it only submitted 1 in 2019 and none before that).

No further information on the type of requests is available.

Tumblr

Data is only available from mid-2019 for Tumblr so it’s hard to conduct real comparisons on how things have changed on a year-by-year basis here. However, from the second half of 2019 to the first half of 2020, requests jumped by 229 percent (from 224 to 738) before rising by another 202 percent in the second half of 2020 (from 738 to 2,231).

South Korea dominates the requests submitted to this platform, accounting for 71 percent of all requests ever submitted. According to Tumblr’s report, 96 percent of the requests submitted by South Korea in 2020 resulted in data being removed–the global average was 95 percent.

No further details on the requests are available.

TikTok

The number of requests submitted to TikTok has been steadily increasing in recent years. Most of these have come from Russia (24 percent), India (15 percent), and Pakistan (16 percent). While India and Pakistan submitted requests in 2019 and 2020, all of Russia’s requests came in 2020 alone.

TikTok doesn’t provide an insight into the reason for the content removal requests but does give figures for how much content is affected by the requests. Pakistan’s 97 removal requests in the second half of 2020 saw the greatest amount of content affected with 14,263 pieces implicated in total. In contrast, Russia’s 135 requests implicated 429 pieces of content.

Wikimedia

From 2018 to 2019, Wikimedia’s content removal requests dropped by 35 percent (from 880 to 573), before rising again by 29 percent (from 573 to 741) from 2019 to 2020.

The United States accounts for the greatest chunk of these requests (across all years), accounting for 23 percent in total. However, the US’s requests have decreased in recent years.

What is particularly interesting about these Wikimedia content removal requests is that they are hardly ever actioned. According to the reports, only 2 of the 380 requests submitted in the second half of 2020 were actioned. Before that, the only content removal request accepted was from Ukraine in 2014. A blogger included a photo of his visa to visit Burma/Myanmar on his website. He had scrubbed his personal details from the image. The same picture later appeared on English Wikipedia in an article about the country’s visa policy. The redactions were removed and his information exposed. Given the nature of the information and the circumstances of how it was exposed, Wikimedia granted the takedown request.

Methodology

Our team extracted the data from the transparency reports for Twitter, Facebook, Microsoft, Wikimedia, Pinterest, Dropbox, Reddit, LinkedIn, TikTok, and Tumblr. We analyzed the data by country and year, while also noting any other significant details where available.

In Facebook’s latest report for the second half of 2020, every country was listed as having at least 12 removal requests. Due to the volume of countries with a 12, this appeared to be a glitch in the report as the majority of countries normally had 0. Therefore, we omitted the ones with 12 and replaced them with a 0 to avoid over-exaggerating the number of requests received.

When creating a ratio of content removal requests to internet users, we omitted two countries from the top 10–Tokelau and Cook Islands. This is due to them having 1 and 6 content removal requests in total but, because of their low populations, they were classed as having a high rate of requests per 100,000 users, which would be an unfair representation.

Sources

https://transparencyreport.google.com/government-removals/by-country?hl=en

https://transparency.twitter.com/en/removal-requests.html

https://www.microsoft.com/en-us/corporate-responsibility/crrr

https://govtrequests.facebook.com/content-restrictions

https://transparency.wikimedia.org/content.html

https://www.dropbox.com/transparency/reports

https://about.linkedin.com/transparency/government-requests-report

https://policy.pinterest.com/en/transparency-report

https://www.redditinc.com/policies/transparency-report-2020

https://www.tumblr.com/transparency

https://www.tiktok.com/safety/resources/transparency-report-2020-2

Source: Which government censors the tech giants the most? – Comparitech

EU’s Latest Internet Regulatory Madness: Destroying Internet Security With Its Digital Identity Framework

The EU is at it again. Recently Mozilla put out a position paper highlighting the latest dangerous move by busybody EU regulators who seem to think that they can magically regulate the internet without (1) understanding it, or (2) bothering to talk to people who do understand it. The issue is the Digital Identity Framework, which, in theory, is supposed to do some useful things regarding interoperability and digital identities. This could be really useful in enabling more end user control over identity and information (a key part of my whole Protocols, Not Platforms concept). But the devil is in the details, and the details are a mess.

It would force browsers to support a specific kind of authentication certificate — Qualified Web Authentication Certificates (QWACs) — but as Mozilla points out, that would be disastrous for security:

At the same time, the types of website certificates that browsers would be forced to accept, namely QWACs, are based on a flawed certificate architecture that is ill-suited for the security risks users face online today. In the years since the original eIDAS regulation was adopted in 2014, an increasing body of research has illustrated how the certificate architecture upon which QWACs are inspired – namely, extended validation certificates – lull individuals into a false sense of security that is often exploited for malicious purposes such as phishing and domain impersonation. For that reason, since 2019 no major browser showcases EV certificates directly in the URL address bar.

As such, should the revised Article 45 be adopted as is, Mozilla would no longer be able to honour the security commitments we make to the hundreds of millions of people who use our Firefox browser or any of the other browser and email products that also depend on Mozilla’s Root Program. It would amount to an unprecedented weakening of the website security ecosystem, and undercut the browser community’s ability to push back against authoritarian regimes’ interference with fundamental rights (see here and here for two recent examples).

As Mozilla notes, the EU can still fix this. Whether or not it does is an open question.

Source: EU’s Latest Internet Regulatory Madness: Destroying Internet Security With Its Digital Identity Framework | Techdirt

Why You Should Encrypt Your WhatsApp Backups in iCloud

it’s also one of the few apps that offer end-to-end encryption by default. This means that no one other than you the other party can read your conversations. Even WhatsApp can’t read your conversations because it doesn’t have the key to un-encrypt your chats.

This was all true, except for one scenario: WhatsApp chats backed up to iCloud were all unencrypted, so if anyone got their hands on your iCloud backup, they could read all your messages pretty easily. But now, WhatsApp has an optional feature to protect your WhatsApp backups with the same two-factor authentication using a password or a secure key.

How to enable end-to-end encryption for WhatsApp backups over iCloud

Before we begin, you should know that WhatsApp end-to-end encryption depends on a password or a 64-digit secure key. If you lose your password, you won’t be able to restore your chats, so make sure you use a secure yet recognizable password. If you use something complicated, make sure to save it on your password manager (it can be iCloud Keychain or a third-party service like Bitwarden).

To get started, first update your WhatsApp application to the latest version. WhatsApp is slowly rolling this feature out to its two billion users, so if you don’t see it yet, try again in a couple of days.

Open WhatsApp, and from the “Settings” tab, go to “Chats.” Here, select “Chat Backups” and tap the “End-to-End Encrypted Backup” button. Tap the “Turn on” button and from the next screen, choose the “Create Password” option.

Source: Why You Should Encrypt Your WhatsApp Backups in iCloud

Google Cloud partially fixes load balancer issues that killed Snapchat, spotify, etsy, discord and many many more

Google Cloud suffered a brief outage, seemingly bringing down or disrupting a whole bunch of websites relying on its systems.

If you’ve had trouble accessing Snapchat, Discord, Spotify, Etsy, retailers like Home Depot, and others today, this is likely why: a fault developed in Google Cloud’s networking infrastructure, resulting in websites throwing up 404 errors. Netizens found themselves unable to log into or use certain services properly.

The good news is that, by now, the IT breakdown has been resolved in that sites using Google’s cloud-based load balancers should work again.

The bad news is that Google’s customers can’t update their load balancing configurations until the web giant gives the word, and when that will be isn’t known.

The outage was acknowledged by Google at 1010 PST, about 35 minutes minutes after websites apparently started going wrong, and a fix was deployed within a few minutes to stop the “page not found” errors. Since that update, though, changes by customers to their external proxy load balancers are being ignored.

[…]

Source: Google Cloud partially fixes load balancer issues • The Register

Does Copyright Give Companies The Right To Search Your Home And Computer?

One reason why copyright has become so important in the digital age is that it applies to the software that many of us use routinely on our smartphones, tablets and computers. In order to run those programs, you must have a license of some kind (unless the software is in the public domain, which rarely applies to modern code). The need for a license is why we must agree to terms and conditions when we install new software. On Twitter, Alvar C.H. Freude noticed something interesting in the software licence agreement for Capture One: “world-class tools for editing, organizing and working with photos” according to the Danish company that makes it (found via Wolfie Christl). The license begins by warning:

if you do not agree to the terms of this license, you may not install or use the software but should promptly return the software to the place where you obtained it for a refund.

That’s normal enough, and merely reflects the power of copyright holders to impose “take it or leave it” conditions on users. Less common is the following:

Capture One or a third-party designated by Capture One in its sole discretion has the right to verify your compliance with this License at any time upon request including without limitation to request information regarding your installation and/or use of the Software and/or to perform on-site investigations of your installation and use of the Software.

If you use Capture One, you must provide “without limitation access to your premises, IT systems on which the Software is installed”, and “Capture One or an Auditor may decide in their sole discretion to apply software search tools in accordance with audits.”

That is, thanks to copyright, a company is perfectly able to demand the right to access a user’s premises, the computer systems they use, and to run search tools on that system as part of an audit. Although this applies to business premises, there’s no reason a software license could not demand the same right to access somebody’s home. In fact, there are really no limits on what may be required. You’re not obliged to agree to such terms, but most people do, often without even checking the details.

The fact that such requirements are possible shows how far copyright has strayed from the claimed purpose of protecting creators and promoting creativity. Copyright has mutated into a monster because it was never designed to regulate activities, as it does with software, just static objects like books and drawings.

Source: Does Copyright Give Companies The Right To Search Your Home And Computer? | Techdirt

Blizzard started with this with World of Warcraft, allowing itself to search your hard drive and memory. Many games since then have given themselves this ability, which they make use of.

Microsoft blocks workaround that let Windows 11 users avoid its Edge browser – browser wars are on again

Microsoft plans to update Windows 11 to block a workaround that has allowed users to open Start menu search results in a browser other than Edge. The loophole was popularized by EdgeDeflector, an app that allows you to bypass some of the built-in browser restrictions found in Windows 10 and 11. Before this week, companies like Mozilla and Brave had planned to implement similar workarounds to allow users to open Start menu results in their respective browsers, but now won’t be able to do so.

When the block first appeared in an early preview build of Windows 11 last week, it looked like it was added by mistake. However, on Monday, the company confirmed it intentionally closed the loophole.

“Windows openly enables applications and services on its platform, including various web browsers,” a spokesperson for Microsoft told The Verge. “At the same time, Windows also offers certain end-to-end customer experiences in both Windows 10 and Windows 11, the search experience from the taskbar is one such example of an end-to-end experience that is not designed to be redirected. When we become aware of improper redirection, we issue a fix.”

Daniel Aleksandersen, the developer of EdgeDeflector, was quick to criticize the move. “These aren’t the actions of an attentive company that cares about its product anymore,” he said in a blog post. “Microsoft isn’t a good steward of the Windows operating system. They’re prioritizing ads, bundleware, and service subscriptions over their users’ productivity.”

Mozilla was similarly critical of Microsoft. “People deserve choice. They should have the ability to simply and easily set defaults and their choice of default browser should be respected,” a spokesperson for the company told The Verge. “We have worked on code that launches Firefox when the microsoft-edge protocol is used for those users that have already chosen Firefox as their default browser. Following the recent change to Windows 11, this planned implementation will no longer be possible.”

[…]

Source: Microsoft blocks workaround that let Windows 11 users avoid its Edge browser | Engadget

Portugal: Proposed law tries to sneak in biometric mass surveillance.

Whilst the European Parliament has been fighting bravely for the rights of everyone in the EU to exist freely and with dignity in publicly accessible spaces, the government of Portugal is attempting to push their country in the opposite direction: one of digital authoritarianism.

[…]

Eerily reminiscent of the failed attempts by the Serbian government just two months ago to rush in a biometric mass surveillance law, Portugal now asked its Parliament to approve a law in a shocking absence of democratic scrutiny. Just two weeks before the national Assembly will be dissolved, the government wants Parliamentarians to quickly approve a law, without public consultation or evidence. The law would enable and encourage widespread biometric mass surveillance – even though we have repeatedly shown just how harmful these practices are.

[…]

Source: Portugal: Proposed law tries to sneak in biometric mass surveillance. – Reclaim Your Face

DDR4 memory protections are broken wide open by new Rowhammer technique

Rowhammer exploits that allow unprivileged attackers to change or corrupt data stored in vulnerable memory chips are now possible on virtually all DDR4 modules due to a new approach that neuters defenses chip manufacturers added to make their wares more resistant to such attacks.

Rowhammer attacks work by accessing—or hammering—physical rows inside vulnerable chips millions of times per second in ways that cause bits in neighboring rows to flip, meaning 1s turn to 0s and vice versa. Researchers have shown the attacks can be used to give untrusted applications nearly unfettered system privileges, bypass security sandboxes designed to keep malicious code from accessing sensitive operating system resources, and root or infect Android devices, among other things.

All previous Rowhammer attacks have hammered rows with uniform patterns, such as single-sided, double-sided, or n-sided. In all three cases, these “aggressor” rows—meaning those that cause bitflips in nearby “victim” rows—are accessed the same number of times.

Rowhammer access patterns from previous work, showing spatial arrangement of aggressor rows (in black) and victim rows (in orange and cream) in DRAM memory.
Rowhammer access patterns from previous work, showing spatial arrangement of aggressor rows (in black) and victim rows (in orange and cream) in DRAM memory.
Jattke et al.
Relative activation frequency, i.e., number of ACTIVATEs per aggressor row in a Rowhammer pattern. Notice how they hammer aggressors uniformly.
Relative activation frequency, i.e., number of ACTIVATEs per aggressor row in a Rowhammer pattern. Notice how they hammer aggressors uniformly.
Jattke et al.

Bypassing all in-DRAM mitigations

Research published on Monday presented a new Rowhammer technique. It uses non-uniform patterns that access two or more aggressor rows with different frequencies. The result: all 40 of the randomly selected DIMMs in a test pool experienced bitflips, up from 13 out of 42 chips tested in previous work from the same researchers.

[…]

The effects of previous Rowhammer demonstrations have been serious. In one case, researchers were able to gain unrestricted access to all physical memory by flipping bits in the page table entry, which maps the memory address locations. The same research also demonstrated how untrusted applications could gain root privileges. In another case, researchers used Rowhammer to pluck a 2048-bit encryption key out of memory.

[…]

Source: DDR4 memory protections are broken wide open by new Rowhammer technique | Ars Technica

High severity BIOS flaws affect numerous Intel processors

Intel has disclosed two high-severity vulnerabilities that affect a wide range of Intel processor families, allowing threat actors and malware to gain higher privilege levels on the device.

The flaws were discovered by SentinelOne and are tracked as CVE-2021-0157 and CVE-2021-0158, and both have a CVSS v3 score of 8.2 (high).

The former concerns the insufficient control flow management in the BIOS firmware for some Intel processors, while the latter relies on the improper input validation on the same component.

These vulnerabilities could lead to escalation of privilege on the machine, but only if the attacker had physical access to vulnerable devices.

The affected products, according to Intel’s advisory, are the following:

  • Intel® Xeon® Processor E Family
  • Intel® Xeon® Processor E3 v6 Family
  • Intel® Xeon® Processor W Family
  • 3rd Generation Intel® Xeon® Scalable Processors
  • 11th Generation Intel® Core™ Processors
  • 10th Generation Intel® Core™ Processors
  • 7th Generation Intel® Core™ Processors
  • Intel® Core™ X-series Processors
  • Intel® Celeron® Processor N Series
  • Intel® Pentium® Silver Processor Series

Intel hasn’t shared many technical details around these two flaws, but they advise users to patch the vulnerabilities by applying the available BIOS updates.

This is particularly problematic because motherboard vendors do not release BIOS updates often and don’t support their products with security updates for long.

Considering that 7th gen Intel Core processors came out five years ago, it’s doubtful that MB vendors are still releasing security BIOS updates for them.

As such, some users will be left with no practical way to fix the above flaws. In these cases, we would suggest that you set up a strong password for accessing the BIOS settings.

A third vulnerability affects cars

A third flaw for which Intel released a separate advisory on the same day is CVE-2021-0146, also a high-severity (CVSS 7.2) elevation of privilege flaw.

“Hardware allows activation of test or debug logic at runtime for some Intel(R) processors which may allow an unauthenticated user to potentially enable escalation of privilege via physical access.” – Intel’s advisory

This bug affects the following products:

Affected Intel products
Affected Intel products
Source: Intel

Intel has released a firmware update to mitigate this flaw, and users will get it through patches supplied by the system manufacturer.

Positive Technologies, who discovered and reported the bug to Intel, says that the flaw could allow threat actors to gain access to highly sensitive information.

“One example of a real threat is lost or stolen laptops that contain confidential information in encrypted form,” says Mark Ermolov.

“Using this vulnerability, an attacker can extract the encryption key and gain access to information within the laptop. The bug can also be exploited in targeted attacks across the supply chain.”

“For example, an employee of an Intel processor-based device supplier could, in theory, extract the Intel CSME firmware key and deploy spyware that security software would not detect.”

Positive Technologies says that the flaw also affects several car models that use the Intel Atom E3900, including the Tesla Model 3.

Users should apply a BIOS update from the device vendor to address this flaw, so check your manufacturer’s website regularly.

[…]

Source: High severity BIOS flaws affect numerous Intel processors

ISS crew shelters from debris after Russia blows up old sat – US angry

In a test of its missile technology, Russia destroyed an old space satellite on Monday, littering Earth’s orbit with fragments and forcing astronauts on the International Space Station to temporarily take shelter.

The cloud of debris was generated when Cosmos 1408, a 2,200-kg defunct signals intelligence satellite launched in 1982, was blown up by a Russian anti-satellite missile. The US Department of State condemned the experiment for endangering “human spaceflight activities.”

“Earlier today, the Russian Federation recklessly conducted a destructive satellite test of a direct-ascent anti-satellite missile against one of its own satellites,” the department’s spokesperson Ned Price said at a press briefing on Monday. “The test has so far generated over 1,500 pieces of trackable orbital debris and hundreds of thousands of pieces of smaller orbital debris that now threaten the interests of all nations.

[…]

The seven astronauts onboard the International Space Station were directed to close all hatches to external modules and climb into the Soyuz MS-19 and Crew Dragon capsules for safety. They remained there for about two hours, and will periodically close off and isolate sections of the ISS as the debris cloud crosses the station’s path every 90 minutes or so, according to NASA.

[…]

Only last week, the ISS performed an orbital burn to avoid any chance of smashing into the passing remains of a Chinese satellite that was blown up by Beijing.

The cloud of shrapnel that was once Cosmos 1408 will disperse and continue to occupy low-Earth orbit, where it all risks crashing into other objects. Some 1,500 pieces will probably remain in the region for decades. Small flecks of debris traveling at orbital speeds can cause huge amounts of damage, potentially setting off a chain reaction where collisions create more amounts of junk that go on to smash into more objects and so on.

This nightmare scenario, known as the Kessler syndrome, would make low Earth orbit a hostile environment as debris levels increase. It’d be difficult to launch future spacecraft without weighty armor and all existing satellites and space stations would be in danger of getting pelted by the junk.

[…]

Source: ISS crew shelters from debris after Russia blows up old sat • The Register

Modders Have Fixed The GTA Trilogy’s Incredibly Ugly Rain

The recently “remastered” GTA trilogy has some of the ugliest rain I’ve ever seen, and a handful of days later, modders have fixed it. No longer will you walk the streets of Vice City at night, only to be covered in the drippings of Spiderman’s leaky web-shooter. Finally, you can be free of that oddly viscous rain.

Grand Theft Auto: The Trilogy — Definitive Edition is very sick. The games are ill. They need doctors. Luckily for them, Rockstar has a pretty dedicated modding community, all of whom are trained in virtual trauma care. These brave few, whose greatest works were wiped out by the release of an overpriced, undersupported mess, have taken on the gargantuan task of fixing this shitshow. They have taken to this new work with the practiced, exhausted rage of a community used to being tossed scraps by a company that has become too big to fail.

The rain, which has been made more transparent in about half a dozen mods searching for the perfect drop of water, is just the beginning of their grim quest. Other modders are attempting to restore the series’ signature radio stations, which were utterly eviscerated by expired music licensing. The games’ jerseys, currently haunted by the ghostly textures of dead numbers, have a faithful army of Vatican-ordained modders attempting dozens of simultaneous digital exorcisms. But all of this only scratches the surface.

The rot runs deep. Everything from character geometry to building textures is uncomfortably wrong. It is as if Rockstar has found a new kind of uncanny valley, but instead of being based on how people should look, this new kind of uncanny valley disquiets our memories of virtual cities.

Source: Modders Have Fixed The GTA Trilogy’s Incredibly Ugly Rain

Woman Allegedly Made $57,000 From Unofficial Demon Slayer Cakes

A 34-year-old resident of Tokyo’s Shibuya has been arrested on suspicion of violating Japanese copyright law after selling unlicensed Demon Slayer cakes.

According to Kyodo News, the women sold the cakes through Instagram, with customers submitting their desired images to be turned into frosting, cream, and sugar. The suspect is said to have charged between 13,000 yen ($114) and 15,000 yen ($132) per cake. Since July 2019, it is believed she made over 6,500,000 yen in sales. That’s over $57,000!

It’s a lot of cakes, too.

The Metropolitan Police Department released photos of the criminal cakes in question, which can be seen in the above TBS News clip.

Source: Woman Allegedly Made $57,000 From Unofficial Demon Slayer Cakes

yay well done copyright. not.