About Robin Edgar

Organisational Structures | Technology and Science | Military, IT and Lifestyle consultancy | Social, Broadcast & Cross Media | Flying aircraft

‘Gas station in space’: new plan to make rocket fuel from junk in Earth’s orbit

[…]

South Australian company Neumann Space has developed an “in-space electric propulsion system” that can be used in low Earth orbit to extend the missions of spacecraft, move satellites, or de-orbit them.

Now Neumann is working on a plan with three other companies to turn space junk into fuel for that propulsion system.

Japanese start-up Astroscale has already demonstrated how it can use satellites to capture bits of debris in space.

Nanorocks, in the US, is working on a plan using advanced robotics to store and cut up that debris while it is still in orbit. Another US company, Cislunar, is developing a space foundry to melt debris into metal rods.

And Neumann Space’s propulsion system can use those metal rods as fuel – their system ionises the metal which then creates thrust to move objects around orbit.

Chief executive officer Herve Astier said when Neumann was approached to be part of a supply chain to melt metal in space, he thought it was a futuristic plan, and would not be “as easy as it looks”.

“But they got a grant from Nasa so we built a prototype and it works,” he said.

“We did a live technology demonstration.“ One can grab a piece of debris, one can cut the debris open, one can melt the debris, and we can use that.”

[…]

Australian researchers are also working on the problem.

Saber Astronautics has won a Nasa grant to develop a drag sail, which will launch from a spacecraft at the end of its life and drag it out of orbit.

Sydney’s Electro Optic Systems, working with the University of Canberra, has developed laser technology that can nudge junk away from potential collisions, or towards the atmosphere.

The Australian Institute of Machine Learning has a grant to improve detection and tracking of debris, and a new surveillance radar in Western Australia will help with that too.

Recycling the junk, instead of capturing it or destroying it, is another dimension again.

Astier says it is still futuristic, but now he can see that it’s possible.

[…]

Source: ‘Gas station in space’: new plan to make rocket fuel from junk in Earth’s orbit | Space | The Guardian

Tesla drivers locked out of their cars by server error

Some Tesla drivers who fancied going for a spin on Saturday were unable to do so after an update to the cars’ companion app produced server errors.

Teslas don’t use conventional keys. Instead they require the presence of a fob, key card, or authenticated mobile phone app that links to the electric vehicles over Bluetooth. This is apparently easier and/or more convenient than a key, or something. Heck, everything’s better with Bluetooth, right?

Drivers that use the app to start their cars reported it couldn’t do the job and instead produced an error message.

Tesla founder and CEO Elon Musk personally replied to the above tweet, with the following information:

Measures like, maybe, letting people open their cars with keys? Just a suggestion.

Tesla appears not to have made any other public statement about the incident. The company put its support forums behind a regwall earlier in 2021 and owning a MuskMobile is a requirement for entry. Your correspondent is therefore unable to explore any official missives. Tesla’s Twitter account is silent on the matter and the electric car biz doesn’t bother with Facebook. The exact nature of the outage is therefore hard to divine.

[…]

Source: Tesla drivers locked out of their cars by server error • The Register

How Facebook and Google Actually Fund the Creation of Misinformation

MIT’s Technology Review shares data from a Facebook-run tool called CrowdTangle. It shows that by 2018 in the nation of Myanmar (population: 53 million), ” All the engagement had instead gone to fake news and clickbait websites.

“In a country where Facebook is synonymous with the internet, the low-grade content overwhelmed other information sources.” [T]he sheer volume of fake news and clickbait acted like fuel on the flames of already dangerously high ethnic and religious tensions. It shifted public opinion and escalated the conflict, which ultimately led to the death of 10,000 Rohingya, by conservative estimates, and the displacement of 700,000 more. In 2018, a United Nations investigation determined that the violence against the Rohingya constituted a genocide and that Facebook had played a “determining role” in the atrocities. Months later, Facebook admitted it hadn’t done enough “to help prevent our platform from being used to foment division and incite offline violence.” Over the last few weeks, the revelations from the Facebook Papers, a collection of internal documents provided to Congress and a consortium of news organizations by whistleblower Frances Haugen, have reaffirmed what civil society groups have been saying for years: Facebook’s algorithmic amplification of inflammatory content, combined with its failure to prioritize content moderation outside the US and Europe, has fueled the spread of hate speech and misinformation, dangerously destabilizing countries around the world.

But there’s a crucial piece missing from the story. Facebook isn’t just amplifying misinformation.

The company is also funding it.

An MIT Technology Review investigation, based on expert interviews, data analyses, and documents that were not included in the Facebook Papers, has found that Facebook and Google are paying millions of ad dollars to bankroll clickbait actors, fueling the deterioration of information ecosystems around the world.
Facebook pays them for permission to open their content within Facebook’s app (where Facebook controls the advertising) rather than having users clickthrough to the publisher’s own web site, reports Technology Review: Early on, Facebook performed little quality control on the types of publishers joining the program. The platform’s design also didn’t sufficiently penalize users for posting identical content across Facebook pages — in fact, it rewarded the behavior. Posting the same article on multiple pages could as much as double the number of users who clicked on it and generated ad revenue. Clickbait farms around the world seized on this flaw as a strategy — one they still use today… Clickbait actors cropped up in Myanmar overnight. With the right recipe for producing engaging and evocative content, they could generate thousands of U.S. dollars a month in ad revenue, or 10 times the average monthly salary — paid to them directly by Facebook. An internal company document, first reported by MIT Technology Review in October, shows that Facebook was aware of the problem as early as 2019… At one point, as many as 60% of the domains enrolled in Instant Articles were using the spammy writing tactics employed by clickbait farms, the report said…

75% of users who were exposed to clickbait content from farms run in Macedonia and Kosovo had never followed any of the pages. Facebook’s content-recommendation system had instead pushed it into their news feeds.
Technology Review notes that Facebook now pays billions of dollars to the publishers in their program. It’s a long and detailed article, which ultimately concludes that the problem “is now happening on a global scale.” Thousands of clickbait operations have sprung up, primarily in countries where Facebook’s payouts provide a larger and steadier source of income than other forms of available work. Some are teams of people while others are individuals, abetted by cheap automated tools that help them create and distribute articles at mass scale…

Google is also culpable. Its AdSense program fueled the Macedonia- and Kosovo-based farms that targeted American audiences in the lead-up to the 2016 presidential election. And it’s AdSense that is incentivizing new clickbait actors on YouTube to post outrageous content and viral misinformation.
Reached for comment, a Facebook spokesperson told Technology Review that they’d misunderstood the issue. And the spokesperson also said “we’ve invested in building new expert-driven and scalable solutions to these complex issues for many years, and will continue doing so.”

Google’s spokesperson confirmed examples in the article violated their own policies and removed the content, adding “We work hard to protect viewers from clickbait or misleading content across our platforms and have invested heavily in systems that are designed to elevate authoritative information.”

Source: How Facebook and Google Actually Fund the Creation of Misinformation – Slashdot

Beijing issues fines for 43 Big Tech M&A deals

China’s State Administration for Market Regulation (SAMR) has fined tech giants 43 times – with Alibaba, Baidu and Tencent told to pay up for failing to declare deals deemed to violate anti-monopoly legislation.

According to SAMR, more rigorous anti-monopoly law enforcement has seen businesses file more paperwork, sometimes about past transactions. SAMR’s own probes have spotted acquisitions that weren’t reported at the time.

Those efforts turned up 43 transactions, conducted between 2012 and 2021, that violated China’s 2008 Anti-Monopoly Law. Each count received a fine of ¥500,000 ($78,300). The regulatory body said that all were “assessed as having no effect of excluding or restricting competition”.

The market regulator posted about the fines on its WeChat account and Weibo page on Saturday.

State-sponsored media Global Times reported that Alibaba and Tencent each racked up more than ten cases.

[…]

China’s national anti-monopoly bureau was inaugurated on Thursday and guidelines for antitrust compliance of enterprises abroad were issued the same day.

The government in Beijing, and SAMR in particular, has been busy. Earlier this month the organization drafted new rules for internet platforms considered “super large” that hold them to higher standards than smaller, less influential ones in an attempt to stamp out anticompetitive behavior.

In September, the org ordered Alibaba, Tencent and more to stop blocking links to rivals. And it has been known to step in and outright ban mergers it deems imprudent.

[…]

Source: Beijing issues fines for 43 Big Tech M&A deals • The Register

It’s odd that China is leading the way in anti-monopolistic behaviour whilst the EU and US are lagging behind severely.

Physicists reveal non-reciprocal flow around the quantum world

A pair of theoretical physicists, from the University of Exeter (United Kingdom) and the University of Zaragoza (Spain), have developed a quantum theory explaining how to engineer non-reciprocal flows of quantum light and matter. The research may be important for the creation of quantum technologies which require the directional transfer of energy and information at small scales.

Reciprocity, going the same way backward as forward, is a ubiquitous concept in physics. A famous example may be found in Newton’s Law: for every action there is an equal and opposite reaction. The breakdown of such a powerful notion as reciprocity in any area of physics, from mechanics to optics to electromagnetism, is typically associated with surprises which can be exploited for technological application. For example, a nonreciprocal electric diode allows current to pass in forwards but not backwards and forms a building block of the microelectronics industry.

In their latest research, Downing and Zueco provide a of non-reciprocal transport around a triangular cluster of strongly interacting quantum objects. Inspired by the physics of quantum rings, they show that by engineering an artificial magnetic field one may tune the direction of the energy flow around the cluster. The theory accounts for strong particle interactions, such that directionality appears at a swathe of energies, and considers the pernicious effect of dissipation for the formation of non-reciprocal quantum currents.

The research may be useful in the development of quantum devices requiring efficient, directional transportation, as well for further studies of strongly interacting quantum phases, synthetic magnetic fields and quantum simulators.

Charles Downing from the University of Exeter explains: “Our calculations provide insight into how one may instigate directional transport in closed nanoscopic lattices of atoms and photons with , which may lead to the development of novel devices of a highly directional character”.

“Non-reciprocal population dynamics in a quantum trimer” is published in Proceedings of the Royal Society A, a historic journal which has been publishing scientific research since 1905.


More information: Nonreciprocal population dynamics in a quantum trimer, Proceedings of the Royal Society A: Mathematical and Physical Sciences (2021). DOI: 10.1098/rspa.2021.0507. royalsocietypublishing.org/doi … .1098/rspa.2021.0507

Source: Physicists reveal non-reciprocal flow around the quantum world

Apple’s macOS Monterey memory leak blamed on custom cursors

Sleuthing leads to suspected RAM-gobbling culpri

Apple’s macOS Monterey, the iGiant’s latest desktop operating system release, turns out to have an insatiable appetite for memory if you use certain apps.

Shortly after the OS update was released on October 25, Apple customers – at least those who avoided installation woes – began to notice that certain apps gobbled an excessive amount of memory, so much so the programs would crash or quit.

There were reports of this sort for Adobe Creative Cloud apps, Microsoft Office, Cinema 4D, and Pages, to name but a few.

Mozilla’s Firefox was also affected – 79GB of memory is a lot, even for a browser known for memory consumption. Following an October 10 bug report, filed back just prior to macOS Monterey’s release, Mozillans determined that Apple’s latest operating system was afflicted by a memory leak that occurs when an app uses a customized cursor.

“On macOS 12 Monterey, using a non-standard cursor size or colors causes a large memory leak in Firefox,” the bug report explains. “Firefox version 94 includes a fix that reduces the memory leak, but the problem can still occur. The problem has been reported to Apple and a fix is expected in a future update to macOS 12.”

[…]

Source: Apple’s macOS Monterey memory leak blamed on custom cursors

Which governments censor the tech giants the most?

Note: these numbers do not take into account the amount of secret removal requests from governments, which are probably most in the US (also see https://www.linkielist.com/global-domination/us-judge-rules-twitter-cant-be-transparent-about-amount-of-surveillance-requests-processed-per-year-due-to-national-security-of-the-4th-reich/)

In 2009, Google started recording the number of content removal requests it received from courts and government agencies all over the world, disclosing the figures on a six-month basis. Soon after, several other companies followed suit, including Twitter, Facebook, Microsoft, and Wikimedia.

This year, we’ve extended our study of the above to include Pinterest, Dropbox, Reddit, LinkedIn, TikTok, and Tumblr. Our study looks at the number of content removal requests by platform, which countries have the highest rates of content removal per 100,000 internet users, and how things have changed on a year-by-year basis.

What did we find?

Some governments avidly try to control online data, whether this is on social media, blogs, or both. And not all of the worst offenders may be who you expect.

Top 10 countries by number of content removal requests

According to our findings, the countries with the highest rate of content removal requests per 100,000 internet users are:

  1. Monaco – 341 content removal requests per 100,000 internet users
  2. Russia – 146 content removal requests per 100,000 internet users
  3. Turkey – 138 content removal requests per 100,000 internet users
  4. France – 97 content removal requests per 100,000 internet users
  5. Israel – 91 content removal requests per 100,000 internet users
  6. Liechtenstein – 68 content removal requests per 100,000 internet users
  7. Pakistan – 62 content removal requests per 100,000 internet users
  8. South Korea – 49 content removal requests per 100,000 internet users
  9. Mexico – 49 content removal requests per 100,000 internet users
  10. Japan – 49 content removal requests per 100,000 internet users

With 130 content removal requests to less than 39,000 internet users, Monaco has had the most content removal requests per 100,000 internet users. The majority of these (116) were directed at Facebook with over 98 percent in 2019.

In second and third place are Russia and Turkey with 146 and 138 content removal requests per 100,000 internet users respectively. Russia had 179,013 requests in total with 69 percent of these being directed toward Google. In contrast, Turkey had 90,696 requests in total with the majority of these (55 percent) being directed toward Twitter.

We’ll delve into the whats and whys of these removals below. But which countries submitted the most requests overall?

If we switch the top 10 to be the countries that submitted the highest number of requests overall, things do change slightly:

  1. Russia – 179,013 content removal requests submitted in total. The majority of these (69 percent) were directed toward Google
  2. India – 97,631 content removal requests submitted in total. The majority of these (76 percent) were directed toward Facebook
  3. Turkey – 90,696 content removal requests submitted in total. The majority of these (55 percent) were directed toward Twitter
  4. Japan – 56,861 content removal requests submitted in total. The majority of these (98 percent) were directed toward Twitter
  5. France – 54,627 content removal requests submitted in total. The majority of these (80 percent) were directed toward Facebook
  6. Mexico – 45,671 content removal requests submitted in total. The majority of these (99 percent) were directed toward Facebook
  7. Brazil – 36,151 content removal requests submitted in total. The majority of these (72 percent) were directed toward Facebook
  8. South Korea – 24,658 content removal requests submitted in total. The majority of these (44 percent) were directed toward Twitter
  9. Pakistan – 23,377 content removal requests submitted in total. The majority of these (84 percent) were directed toward Facebook
  10. Germany – 19,040 content removal requests submitted in total. The majority of these (68 percent) were directed toward Facebook

Russia outranked all other countries with a 6-digit figure for government content requests, making 179,765 requests across all platforms. It’s also the highest-ranking country for the number of requests submitted to Google, Reddit, TikTok, and Dropbox.

Interesting, too, is how the United Kingdom and the United States rank in eleventh and twelfth place respectively for the number of content requests submitted. The UK had 17,406 content removal requests in total with 64 percent being submitted to Facebook. Meanwhile, the US had 12,474 in total with 80 percent submitted to Google. In relation to the number of internet users, however, the UK submitted 27 per 100,000 and the US just 4 per 100,000. This places them 16th and 50th in the number of requests per 100,000 internet user rankings respectively.

Highest content removal requests by platform

Now we know which countries have submitted the most requests, which country comes out on top for each platform?

  • Google: Russia accounts for 60 percent of requests – 123,607 of 207,066
  • Facebook: India accounts for 24 percent of requests – 74,674 of 308,434
  • Twitter: Japan accounts for 31 percent of requests – 55,590 of 181,689
  • Microsoft: China accounts for 52 percent of requests – 8,665 of 16,817
  • Pinterest: South Korea accounts for 46 percent of requests – 2,345 of 5,134
  • Tumblr: South Korea accounts for 71 percent of requests – 2,260 of 3,193
  • Wikimedia: United States accounts for 23 percent of requests – 977 of 4,256
  • Dropbox: Russia accounts for 34 percent of requests – 752 of 2,217
  • TikTok: Russia accounts for 24 percent of requests – 150 of 620
  • Reddit: Russia accounts for 29 percent of requests – 143 of 488
  • LinkedIn: China accounts for 71 percent of requests – 72 of 102

What about China’s lower rankings across every category but Microsoft?

China tends not to bother going through content providers and their in-house reporting mechanisms to censor content. It simply blocks entire sites and apps outright, forcing internet service providers to bar access on behalf of the government. China has banned all of the websites we have used in this comparison, except for LinkedIn and some of Microsoft’s services–the two areas where it dominates the content removal requests.

Which tech giant is receiving the highest percentage of removal requests in each country?

If we look at which tech giant is receiving the highest percentage of removal requests in each country, we can see that Google and Facebook tend to receive the vast majority.

Tech giant government content removal requests

Many Central European, South East Asian, and some South American countries submit the majority of their removal requests to Facebook, while many African and Eastern European countries, as well as the US, Canada, and Australia, submit most of theirs to Google. A large number of Middle Eastern countries submit the majority of requests to Twitter.

Biggest years for government content removal requests

Following a slight dip in 2019 (a 2 percent decrease on the number of requests submitted in 2018), removal requests bounced back up by 69 percent from 2019 to 2020. Twitter accounted for the largest percentage of these requests with 80,744 (40 percent) of the 203,698 requests submitted in total. It was closely followed by Facebook (62,314 or 31 percent) and Google (44,065 or 22 percent).

Over the years, these platforms have made the most content removal requests. But, when you take into consideration that all three are the highest used of all the platforms we’ve covered, that’s perhaps no surprise.

However, what the above does show us is how the focus on platforms has changed over the years.

Facebook’s biggest year for content removal requests came in 2015 when 76,395 requests were submitted (25 percent of its overall total). These requests then dropped significantly in 2016 before increasing by 155 and 21 percent from 2016 to 2017 and 2017 to 2018 respectively. Figures then dropped by 34 percent from 2018 to 2019 before almost doubling again from 2019 to 2020.

Google also witnessed a similar drop in 2019 when requests dipped by 30 percent, having been growing by around 10,000 each year from 2016 to 2018. In 2020, the number of requests rose again by 46 percent.

Twitter, however, didn’t follow this trend. In 2019, Twitter saw a 97 percent increase in the number of requests submitted (rising from 23,464 in 2018 to 46,291 in 2019). The number of content removals submitted to Twitter continued to rise significantly in 2020, too, when they nearly doubled to 80,744. In fact, of all the platforms we’ve studied, Twitter is the only platform (bar LinkedIn and Reddit which have only recently begun to submit reports) that has noticed an increase in content removal requests each and every year.

Why does Twitter appear to be dominating content removal requests? After all, it doesn’t have the largest number of users (it has around 396.5m users compared to Facebook’s 2.8bn).

The majority of the increase comes from Japan, India, South Korea, and Indonesia. As we’ll see further on, Japan Twitter has recently been under fire for censoring government critics. Other reasons could be increases in scams, misinformation around elections, and general violations of local laws.

Russia accounts for 60 percent of Google’s content removal requests

As mentioned previously, Russia dominates the number of content request removals made to Google, accounting for 123,607 (60 percent) in total. Despite Russia’s requests dropping from over 30,000 in 2018 to just under 20,000 in 2019, they jumped back up to a record-breaking 31,384 in 2020. This dip in 2019 was a worldwide trend, however, with a 30 percent decrease in removal requests in 2019 followed by a 46 percent increase in 2020.

Nearly 34 percent of Russia’s requests come under the reason of national security, closely followed by copyright (26 percent) and regulated goods and services (18 percent).

Russia’s requests are significantly higher than second-place Turkey, which sent just 14,242 requests–7 percent of all requests received. Turkey was closely followed by India (10,138 with 4.89 percent) and the US (9,933 with 4.79 percent). Defamation is the main reason for all of these countries’ requests, accounting for 39 percent of Turkey’s total, 27 percent of India’s total, and 58 percent of the US’s total.

Which of Google’s products are being targeted by these removal requests?

YouTube and web searches are all prime targets for these removal requests. Of all the requests, 50 percent are directed toward YouTube and 30 percent toward web searches.

Examples of Google content removal requests

Some examples of the requests submitted by Russia, Turkey, and India include:

Russia: “Roskomnadzor requested that we block a Russian-language summary of a Financial Times report claiming that the content was “extremist”. The article stated that the real number of coronavirus deaths in Russia is potentially 70% higher than what official statistics report.” – The content wasn’t removed, which was, in part, due to errors in the way the request had been served. This included procedural defects in the way the request was served (Jan-Jun, 2020).

Turkey: “We received a court order to delist 5 URLs from Google Search and to remove 1 Blogger blog post on the basis of “right-to-be-forgotten” legislation, on behalf of a high-ranking official. The news articles reported accusations of organised crime, which allegedly led to a criminal complaint.” – The URLs were not delisted or removed (Jul-Dec, 2020).

Turkey: “We received a court order to remove 2 Google Groups posts, 2 Blogger posts, 1 Blogger image, and an entire Blogger blog publishing political caricatures of a very senior Government official of Turkey.” – The content was not removed (Jul-Dec, 2016).

India: “We received multiple requests from Indian law enforcement for 173 YouTube URLs depicting content related to COVID-19. The reported content ranged from conspiracy theories and religious hate speech related to COVID-19 to news reports and criticism of the authorities’ handling of the pandemic.” 14 URLs were removed for violating YouTube’s community guidelines, 30 URLs were restricted in India based on cited local laws. Further information was requested for 106 URLs, of which 10 URLs were not removed and 13 URLs were already down.

India accounts for 24 percent of Facebook’s content removal requests

Facebook received the largest number of government content requests overall with 308,434 in total. India made up for the vast majority of these, with its 74,674 requests accounting for nearly 25 percent of the total. Most of India’s requests (40 percent) were made in 2015 when 30,126 requests were submitted. Since then, India’s requests have remained much lower, only reaching two or three thousand per year, except for in 2018 when requests spiked again at just over 19,000.

Interestingly, in 2015, the Supreme Court of India struck down section 66A of the Information Technology Act, 2000, which made posting “offensive” comments online a crime that was punishable by jail. Perhaps this led to an influx in offensive comments on mediums like Facebook, or authorities turned to Facebook’s content removal system to try and combat things differently.

In second place for removal requests via Facebook is Mexico with 45,217. Most of these requests (45 percent) were placed in the first half of 2017, shortly after Mexico first started submitting removal requests (its first figures are recorded for the latter part of 2016). Therefore, Mexican officials were perhaps “catching up” on the content that they thought violated local law. Mexico’s removal requests dropped dramatically in 2018 (2,040 submitted in total) before rising in 2019 (by 240 percent to 6,946) and in 2020 (by 93 percent to 13,399).

Mexico was closely followed by France with 43,816 requests. Again, the majority of these requests were submitted years ago (37,695 or 86 percent were submitted in the second half of 2015). But unlike Mexico, France’s requests have continued to decline year on year with just 298 submitted in all of 2020. This dramatic peak in removal requests does coincide with the November 2015 terror attacks in Paris.

Oddly, the US doesn’t feature anywhere near the top for removal requests, ranking 57th for its mere 27 removal requests since reporting began. Facebook’s Transparency Report suggests a country might not make the list either because Facebook’s services aren’t available there or there haven’t been any items of this type to report. The US doesn’t fall into the former, but the latter doesn’t seem likely either, especially when you consider the United States’s removal requests across other platforms. Furthermore, there is a case study (like the ones depicted below) for the US, which suggests:

“We received a request from a county prosecutor’s office to remove a page opposing a county animal control agency, alleging that the page made threatening comments about the director of the agency and violated laws against menacing.” Facebook reviewed the page and found there to be no credible threats so it, therefore, didn’t violate their Community Standards. (Oct 2015)

Examples of Facebook content removal requests

India: “We received a request from law enforcement in India to remove a photo that depicted a sketch of the Prophet Mohammed.” – The content didn’t violate Facebook’s Community Standards but was made unavailable in India where any depiction of Mohammed is forbidden. (Jun 2016)

France: “Following the November 2015 terrorist attacks in Paris, we received a request from L’Office Central de Lutte Contre la Criminalité Liée aux Technologies de l’Information et de la Communication (OCLCTIC), a division of French law enforcement, to remove a number of instances of a photo taken inside the Bataclan concert venue depicting the remains of several victims. The photo was alleged to violate French laws related to protecting human dignity.” – The content didn’t violate Facebook’s Community Standards but 32,100 instances of the photo were restricted in France. It was still available in other countries. (Nov 2015)

Mexico: “We received a request from the Mexican Federal Electoral Court to remove 239 items in connection with two complaints filed by the Partido de la Revolución Democrática (“PRD”) against Governmental Entities in Mexico. The PRD alleged that the content violated Mexico’s election laws.” – The content didn’t violate Facebook’s Community Standards but access to 63 posts were restricted in Mexico as they were deemed unlawful. 159 items were duplicated or had already been removed. (Jan 2020)

Japan accounts for 31 percent of Twitter’s content removal requests Twitter

Japan had the largest number of government content requests on Twitter with 55,590 requests submitted in total. This made up for 31 percent of all of the requests recorded by Twitter. Most of these requests (36,573 or 66 percent) were submitted in 2020. In fact, Japan’s content removal requests to Twitter have increased dramatically in recent years, jumping by 1,916 percent from 2018 to 2019 (from 875 to 17,640) and by 107 percent from 2019 to 2020 (from 17,640 to 36,573).

While the removal requests across Twitter have increased on a yearly basis (worldwide), Japan’s growth exceeds the worldwide average of 97 percent from 2018 to 2019 and 74 percent from 2019 to 2020. This comes amid recent reports that Twitter Japan seems to be suspending government critics. However, Twitter’s official report suggests the majority of the removal requests relate to laws surrounding narcotics and psychotropics, obscenity, or money lending.

In second place was Turkey with 49,525 requests, followed by Russia with 36,787 requests. Although Russia follows Japan’s trend with yearly increases in removal requests (99 percent from 2018 to 2019 and 54 percent from 2019 to 2020), Turkey’s removal requests are in decline (dropping by 20 percent from 2018 to 2019 and by 28 percent from 2019 to 2020).

Examples of Twitter content removal requests

Turkey: “Twitter received a court order from Turkey regarding two Tweets containing insulting language towards a high-level official of a prominent bank in Turkey for violation of personal rights. Twitter withheld both Tweets in Turkey in response to the court order.” (Jul-Dec, 2020)

Russia: “We received the first Periscope removal request from Roskomnadzor concerning a prisoner’s account. Citing Article 82 of the Russian Criminal Executive Code, the reporter asked us to ‘block the account from which the violating broadcast was made’. However, the reported account had no broadcasts, so we did not take any action.” (Jan-Jun 2017)

France: “We withheld one Tweet in response to a legal demand from the Office Central de Lutte contre la Criminalité liée aux Technologies de l’Information et de la Communication (OCLCTIC) for glorification of terrorist attacks.” (Jul-Dec 2017)

China accounts for 52 percent of Microsoft’s content removal requests

As we have already seen, China barely features across all of the aforementioned removal platforms for its content removal requests. This is due to the widespread blocking of these platforms, which removes the need for such requests. However, as some of Microsoft’s products are available in China, it accounts for over half of all the requests submitted to this tech giant.

Unfortunately, Microsoft doesn’t offer any insight into why the content removal requests are submitted. What it does indicate, however, is how many requests result in any action being taken. From July to December 2020, 96 percent of China’s requests were actioned. Russia (the second-highest submitter of requests) had just 41 percent of its requests actioned, while France had 89 percent.

Since the second half of 2018, China has always submitted over 1,000 removal requests every six months to Microsoft. Russia, however, upped its requests significantly in the second half of 2019, submitting nearly 300 percent more than the first half (2,951 compared to 743). But these started to drop off again in 2020, reducing by 45 percent and 58 percent in the first and second half of 2020, respectively.

Content removal requests across other platforms

Google, Facebook, Twitter, and Microsoft account for the vast majority of content removal requests, but the following also show interesting insights into where governments are focusing their online censorship efforts.

Dropbox

Russia submitted 34 percent of all the content removal requests to Dropbox, followed by France with 24 percent and the UK with 21 percent. Russia’s requests peaked in 2017 with 243 of its 752 (32 percent) requests submitted during this time. France’s came in 2018 with 63 percent of its total (331 of 524) submitted then. The UK also submitted the majority of its (41 percent) in 2017.

Since 2017/18, Dropbox’s removal requests have decreased quite significantly, falling by 38 percent from 2018 to 2019 and by 52 percent from 2019 to 2020.

Dropbox doesn’t provide insight into the types of content removal requests that are submitted but does appear to action the majority of requests it receives for most countries. For example, the US submitted 33 requests which affected 45 accounts. All but 2 of these accounts had action taken against them. However, of the 48 requests submitted by Russia in 2020, which affected 13 accounts, only 7 accounts had content blocked on them.

LinkedIn

LinkedIn receives very few content removal requests according to its transparency report and the vast majority of these are submitted by China. 42 out of 50 of the requests in 2020 came from China with only 14 countries having ever submitted one of these reports in the last three years (from 2018 to 2020).

Pinterest

The number of requests submitted to Pinterest has grown significantly within the last two reporting periods, increasing by 500 percent from 2019 to 2020 (from 680 to 4,078). South Korea and Russia account for the majority of these requests, submitting 46 and 43 percent of the total requests respectively.

Most of South Korea’s requests (99 percent) came in 2020 while Russia has been upping its requests since 2018. Russia submitted 102 in 2018, increasing by 376 percent to 486 in 2019 before rising by a further 234 percent to 1,622 in 2020.

Most of the content removal requests submitted to Pinterest are due to violations of community guidelines. For example, in 2020, 90 percent of the requests submitted were due to content that violated Pinterest’s community guidelines. No specific examples are available.

Reddit

Even though government content removal requests for Reddit have increased in recent years, the numbers are still within the low hundreds. Furthermore, as Reddit’s report demonstrates, a lot of the content that is restricted due to these requests is done so in the local area (over 71 percent of the pieces of content flagged by government requests in 2020 was only restricted in the local area).

Russia is, again, the main culprit for these requests, submitting over 29 percent of all the requests. Turkey has submitted the second-highest number of requests (100 or 20 percent) but most of these came in 2018 and 2019. In 2020, South Korea upped its requests with 60 in total (it only submitted 1 in 2019 and none before that).

No further information on the type of requests is available.

Tumblr

Data is only available from mid-2019 for Tumblr so it’s hard to conduct real comparisons on how things have changed on a year-by-year basis here. However, from the second half of 2019 to the first half of 2020, requests jumped by 229 percent (from 224 to 738) before rising by another 202 percent in the second half of 2020 (from 738 to 2,231).

South Korea dominates the requests submitted to this platform, accounting for 71 percent of all requests ever submitted. According to Tumblr’s report, 96 percent of the requests submitted by South Korea in 2020 resulted in data being removed–the global average was 95 percent.

No further details on the requests are available.

TikTok

The number of requests submitted to TikTok has been steadily increasing in recent years. Most of these have come from Russia (24 percent), India (15 percent), and Pakistan (16 percent). While India and Pakistan submitted requests in 2019 and 2020, all of Russia’s requests came in 2020 alone.

TikTok doesn’t provide an insight into the reason for the content removal requests but does give figures for how much content is affected by the requests. Pakistan’s 97 removal requests in the second half of 2020 saw the greatest amount of content affected with 14,263 pieces implicated in total. In contrast, Russia’s 135 requests implicated 429 pieces of content.

Wikimedia

From 2018 to 2019, Wikimedia’s content removal requests dropped by 35 percent (from 880 to 573), before rising again by 29 percent (from 573 to 741) from 2019 to 2020.

The United States accounts for the greatest chunk of these requests (across all years), accounting for 23 percent in total. However, the US’s requests have decreased in recent years.

What is particularly interesting about these Wikimedia content removal requests is that they are hardly ever actioned. According to the reports, only 2 of the 380 requests submitted in the second half of 2020 were actioned. Before that, the only content removal request accepted was from Ukraine in 2014. A blogger included a photo of his visa to visit Burma/Myanmar on his website. He had scrubbed his personal details from the image. The same picture later appeared on English Wikipedia in an article about the country’s visa policy. The redactions were removed and his information exposed. Given the nature of the information and the circumstances of how it was exposed, Wikimedia granted the takedown request.

Methodology

Our team extracted the data from the transparency reports for Twitter, Facebook, Microsoft, Wikimedia, Pinterest, Dropbox, Reddit, LinkedIn, TikTok, and Tumblr. We analyzed the data by country and year, while also noting any other significant details where available.

In Facebook’s latest report for the second half of 2020, every country was listed as having at least 12 removal requests. Due to the volume of countries with a 12, this appeared to be a glitch in the report as the majority of countries normally had 0. Therefore, we omitted the ones with 12 and replaced them with a 0 to avoid over-exaggerating the number of requests received.

When creating a ratio of content removal requests to internet users, we omitted two countries from the top 10–Tokelau and Cook Islands. This is due to them having 1 and 6 content removal requests in total but, because of their low populations, they were classed as having a high rate of requests per 100,000 users, which would be an unfair representation.

Sources

https://transparencyreport.google.com/government-removals/by-country?hl=en

https://transparency.twitter.com/en/removal-requests.html

https://www.microsoft.com/en-us/corporate-responsibility/crrr

https://govtrequests.facebook.com/content-restrictions

https://transparency.wikimedia.org/content.html

https://www.dropbox.com/transparency/reports

https://about.linkedin.com/transparency/government-requests-report

https://policy.pinterest.com/en/transparency-report

https://www.redditinc.com/policies/transparency-report-2020

https://www.tumblr.com/transparency

https://www.tiktok.com/safety/resources/transparency-report-2020-2

Source: Which government censors the tech giants the most? – Comparitech

EU’s Latest Internet Regulatory Madness: Destroying Internet Security With Its Digital Identity Framework

The EU is at it again. Recently Mozilla put out a position paper highlighting the latest dangerous move by busybody EU regulators who seem to think that they can magically regulate the internet without (1) understanding it, or (2) bothering to talk to people who do understand it. The issue is the Digital Identity Framework, which, in theory, is supposed to do some useful things regarding interoperability and digital identities. This could be really useful in enabling more end user control over identity and information (a key part of my whole Protocols, Not Platforms concept). But the devil is in the details, and the details are a mess.

It would force browsers to support a specific kind of authentication certificate — Qualified Web Authentication Certificates (QWACs) — but as Mozilla points out, that would be disastrous for security:

At the same time, the types of website certificates that browsers would be forced to accept, namely QWACs, are based on a flawed certificate architecture that is ill-suited for the security risks users face online today. In the years since the original eIDAS regulation was adopted in 2014, an increasing body of research has illustrated how the certificate architecture upon which QWACs are inspired – namely, extended validation certificates – lull individuals into a false sense of security that is often exploited for malicious purposes such as phishing and domain impersonation. For that reason, since 2019 no major browser showcases EV certificates directly in the URL address bar.

As such, should the revised Article 45 be adopted as is, Mozilla would no longer be able to honour the security commitments we make to the hundreds of millions of people who use our Firefox browser or any of the other browser and email products that also depend on Mozilla’s Root Program. It would amount to an unprecedented weakening of the website security ecosystem, and undercut the browser community’s ability to push back against authoritarian regimes’ interference with fundamental rights (see here and here for two recent examples).

As Mozilla notes, the EU can still fix this. Whether or not it does is an open question.

Source: EU’s Latest Internet Regulatory Madness: Destroying Internet Security With Its Digital Identity Framework | Techdirt

Why You Should Encrypt Your WhatsApp Backups in iCloud

it’s also one of the few apps that offer end-to-end encryption by default. This means that no one other than you the other party can read your conversations. Even WhatsApp can’t read your conversations because it doesn’t have the key to un-encrypt your chats.

This was all true, except for one scenario: WhatsApp chats backed up to iCloud were all unencrypted, so if anyone got their hands on your iCloud backup, they could read all your messages pretty easily. But now, WhatsApp has an optional feature to protect your WhatsApp backups with the same two-factor authentication using a password or a secure key.

How to enable end-to-end encryption for WhatsApp backups over iCloud

Before we begin, you should know that WhatsApp end-to-end encryption depends on a password or a 64-digit secure key. If you lose your password, you won’t be able to restore your chats, so make sure you use a secure yet recognizable password. If you use something complicated, make sure to save it on your password manager (it can be iCloud Keychain or a third-party service like Bitwarden).

To get started, first update your WhatsApp application to the latest version. WhatsApp is slowly rolling this feature out to its two billion users, so if you don’t see it yet, try again in a couple of days.

Open WhatsApp, and from the “Settings” tab, go to “Chats.” Here, select “Chat Backups” and tap the “End-to-End Encrypted Backup” button. Tap the “Turn on” button and from the next screen, choose the “Create Password” option.

Source: Why You Should Encrypt Your WhatsApp Backups in iCloud

Google Cloud partially fixes load balancer issues that killed Snapchat, spotify, etsy, discord and many many more

Google Cloud suffered a brief outage, seemingly bringing down or disrupting a whole bunch of websites relying on its systems.

If you’ve had trouble accessing Snapchat, Discord, Spotify, Etsy, retailers like Home Depot, and others today, this is likely why: a fault developed in Google Cloud’s networking infrastructure, resulting in websites throwing up 404 errors. Netizens found themselves unable to log into or use certain services properly.

The good news is that, by now, the IT breakdown has been resolved in that sites using Google’s cloud-based load balancers should work again.

The bad news is that Google’s customers can’t update their load balancing configurations until the web giant gives the word, and when that will be isn’t known.

The outage was acknowledged by Google at 1010 PST, about 35 minutes minutes after websites apparently started going wrong, and a fix was deployed within a few minutes to stop the “page not found” errors. Since that update, though, changes by customers to their external proxy load balancers are being ignored.

[…]

Source: Google Cloud partially fixes load balancer issues • The Register

Does Copyright Give Companies The Right To Search Your Home And Computer?

One reason why copyright has become so important in the digital age is that it applies to the software that many of us use routinely on our smartphones, tablets and computers. In order to run those programs, you must have a license of some kind (unless the software is in the public domain, which rarely applies to modern code). The need for a license is why we must agree to terms and conditions when we install new software. On Twitter, Alvar C.H. Freude noticed something interesting in the software licence agreement for Capture One: “world-class tools for editing, organizing and working with photos” according to the Danish company that makes it (found via Wolfie Christl). The license begins by warning:

if you do not agree to the terms of this license, you may not install or use the software but should promptly return the software to the place where you obtained it for a refund.

That’s normal enough, and merely reflects the power of copyright holders to impose “take it or leave it” conditions on users. Less common is the following:

Capture One or a third-party designated by Capture One in its sole discretion has the right to verify your compliance with this License at any time upon request including without limitation to request information regarding your installation and/or use of the Software and/or to perform on-site investigations of your installation and use of the Software.

If you use Capture One, you must provide “without limitation access to your premises, IT systems on which the Software is installed”, and “Capture One or an Auditor may decide in their sole discretion to apply software search tools in accordance with audits.”

That is, thanks to copyright, a company is perfectly able to demand the right to access a user’s premises, the computer systems they use, and to run search tools on that system as part of an audit. Although this applies to business premises, there’s no reason a software license could not demand the same right to access somebody’s home. In fact, there are really no limits on what may be required. You’re not obliged to agree to such terms, but most people do, often without even checking the details.

The fact that such requirements are possible shows how far copyright has strayed from the claimed purpose of protecting creators and promoting creativity. Copyright has mutated into a monster because it was never designed to regulate activities, as it does with software, just static objects like books and drawings.

Source: Does Copyright Give Companies The Right To Search Your Home And Computer? | Techdirt

Blizzard started with this with World of Warcraft, allowing itself to search your hard drive and memory. Many games since then have given themselves this ability, which they make use of.

Microsoft blocks workaround that let Windows 11 users avoid its Edge browser – browser wars are on again

Microsoft plans to update Windows 11 to block a workaround that has allowed users to open Start menu search results in a browser other than Edge. The loophole was popularized by EdgeDeflector, an app that allows you to bypass some of the built-in browser restrictions found in Windows 10 and 11. Before this week, companies like Mozilla and Brave had planned to implement similar workarounds to allow users to open Start menu results in their respective browsers, but now won’t be able to do so.

When the block first appeared in an early preview build of Windows 11 last week, it looked like it was added by mistake. However, on Monday, the company confirmed it intentionally closed the loophole.

“Windows openly enables applications and services on its platform, including various web browsers,” a spokesperson for Microsoft told The Verge. “At the same time, Windows also offers certain end-to-end customer experiences in both Windows 10 and Windows 11, the search experience from the taskbar is one such example of an end-to-end experience that is not designed to be redirected. When we become aware of improper redirection, we issue a fix.”

Daniel Aleksandersen, the developer of EdgeDeflector, was quick to criticize the move. “These aren’t the actions of an attentive company that cares about its product anymore,” he said in a blog post. “Microsoft isn’t a good steward of the Windows operating system. They’re prioritizing ads, bundleware, and service subscriptions over their users’ productivity.”

Mozilla was similarly critical of Microsoft. “People deserve choice. They should have the ability to simply and easily set defaults and their choice of default browser should be respected,” a spokesperson for the company told The Verge. “We have worked on code that launches Firefox when the microsoft-edge protocol is used for those users that have already chosen Firefox as their default browser. Following the recent change to Windows 11, this planned implementation will no longer be possible.”

[…]

Source: Microsoft blocks workaround that let Windows 11 users avoid its Edge browser | Engadget

Portugal: Proposed law tries to sneak in biometric mass surveillance.

Whilst the European Parliament has been fighting bravely for the rights of everyone in the EU to exist freely and with dignity in publicly accessible spaces, the government of Portugal is attempting to push their country in the opposite direction: one of digital authoritarianism.

[…]

Eerily reminiscent of the failed attempts by the Serbian government just two months ago to rush in a biometric mass surveillance law, Portugal now asked its Parliament to approve a law in a shocking absence of democratic scrutiny. Just two weeks before the national Assembly will be dissolved, the government wants Parliamentarians to quickly approve a law, without public consultation or evidence. The law would enable and encourage widespread biometric mass surveillance – even though we have repeatedly shown just how harmful these practices are.

[…]

Source: Portugal: Proposed law tries to sneak in biometric mass surveillance. – Reclaim Your Face

DDR4 memory protections are broken wide open by new Rowhammer technique

Rowhammer exploits that allow unprivileged attackers to change or corrupt data stored in vulnerable memory chips are now possible on virtually all DDR4 modules due to a new approach that neuters defenses chip manufacturers added to make their wares more resistant to such attacks.

Rowhammer attacks work by accessing—or hammering—physical rows inside vulnerable chips millions of times per second in ways that cause bits in neighboring rows to flip, meaning 1s turn to 0s and vice versa. Researchers have shown the attacks can be used to give untrusted applications nearly unfettered system privileges, bypass security sandboxes designed to keep malicious code from accessing sensitive operating system resources, and root or infect Android devices, among other things.

All previous Rowhammer attacks have hammered rows with uniform patterns, such as single-sided, double-sided, or n-sided. In all three cases, these “aggressor” rows—meaning those that cause bitflips in nearby “victim” rows—are accessed the same number of times.

Rowhammer access patterns from previous work, showing spatial arrangement of aggressor rows (in black) and victim rows (in orange and cream) in DRAM memory.
Rowhammer access patterns from previous work, showing spatial arrangement of aggressor rows (in black) and victim rows (in orange and cream) in DRAM memory.
Jattke et al.
Relative activation frequency, i.e., number of ACTIVATEs per aggressor row in a Rowhammer pattern. Notice how they hammer aggressors uniformly.
Relative activation frequency, i.e., number of ACTIVATEs per aggressor row in a Rowhammer pattern. Notice how they hammer aggressors uniformly.
Jattke et al.

Bypassing all in-DRAM mitigations

Research published on Monday presented a new Rowhammer technique. It uses non-uniform patterns that access two or more aggressor rows with different frequencies. The result: all 40 of the randomly selected DIMMs in a test pool experienced bitflips, up from 13 out of 42 chips tested in previous work from the same researchers.

[…]

The effects of previous Rowhammer demonstrations have been serious. In one case, researchers were able to gain unrestricted access to all physical memory by flipping bits in the page table entry, which maps the memory address locations. The same research also demonstrated how untrusted applications could gain root privileges. In another case, researchers used Rowhammer to pluck a 2048-bit encryption key out of memory.

[…]

Source: DDR4 memory protections are broken wide open by new Rowhammer technique | Ars Technica

High severity BIOS flaws affect numerous Intel processors

Intel has disclosed two high-severity vulnerabilities that affect a wide range of Intel processor families, allowing threat actors and malware to gain higher privilege levels on the device.

The flaws were discovered by SentinelOne and are tracked as CVE-2021-0157 and CVE-2021-0158, and both have a CVSS v3 score of 8.2 (high).

The former concerns the insufficient control flow management in the BIOS firmware for some Intel processors, while the latter relies on the improper input validation on the same component.

These vulnerabilities could lead to escalation of privilege on the machine, but only if the attacker had physical access to vulnerable devices.

The affected products, according to Intel’s advisory, are the following:

  • Intel® Xeon® Processor E Family
  • Intel® Xeon® Processor E3 v6 Family
  • Intel® Xeon® Processor W Family
  • 3rd Generation Intel® Xeon® Scalable Processors
  • 11th Generation Intel® Core™ Processors
  • 10th Generation Intel® Core™ Processors
  • 7th Generation Intel® Core™ Processors
  • Intel® Core™ X-series Processors
  • Intel® Celeron® Processor N Series
  • Intel® Pentium® Silver Processor Series

Intel hasn’t shared many technical details around these two flaws, but they advise users to patch the vulnerabilities by applying the available BIOS updates.

This is particularly problematic because motherboard vendors do not release BIOS updates often and don’t support their products with security updates for long.

Considering that 7th gen Intel Core processors came out five years ago, it’s doubtful that MB vendors are still releasing security BIOS updates for them.

As such, some users will be left with no practical way to fix the above flaws. In these cases, we would suggest that you set up a strong password for accessing the BIOS settings.

A third vulnerability affects cars

A third flaw for which Intel released a separate advisory on the same day is CVE-2021-0146, also a high-severity (CVSS 7.2) elevation of privilege flaw.

“Hardware allows activation of test or debug logic at runtime for some Intel(R) processors which may allow an unauthenticated user to potentially enable escalation of privilege via physical access.” – Intel’s advisory

This bug affects the following products:

Affected Intel products
Affected Intel products
Source: Intel

Intel has released a firmware update to mitigate this flaw, and users will get it through patches supplied by the system manufacturer.

Positive Technologies, who discovered and reported the bug to Intel, says that the flaw could allow threat actors to gain access to highly sensitive information.

“One example of a real threat is lost or stolen laptops that contain confidential information in encrypted form,” says Mark Ermolov.

“Using this vulnerability, an attacker can extract the encryption key and gain access to information within the laptop. The bug can also be exploited in targeted attacks across the supply chain.”

“For example, an employee of an Intel processor-based device supplier could, in theory, extract the Intel CSME firmware key and deploy spyware that security software would not detect.”

Positive Technologies says that the flaw also affects several car models that use the Intel Atom E3900, including the Tesla Model 3.

Users should apply a BIOS update from the device vendor to address this flaw, so check your manufacturer’s website regularly.

[…]

Source: High severity BIOS flaws affect numerous Intel processors

ISS crew shelters from debris after Russia blows up old sat – US angry

In a test of its missile technology, Russia destroyed an old space satellite on Monday, littering Earth’s orbit with fragments and forcing astronauts on the International Space Station to temporarily take shelter.

The cloud of debris was generated when Cosmos 1408, a 2,200-kg defunct signals intelligence satellite launched in 1982, was blown up by a Russian anti-satellite missile. The US Department of State condemned the experiment for endangering “human spaceflight activities.”

“Earlier today, the Russian Federation recklessly conducted a destructive satellite test of a direct-ascent anti-satellite missile against one of its own satellites,” the department’s spokesperson Ned Price said at a press briefing on Monday. “The test has so far generated over 1,500 pieces of trackable orbital debris and hundreds of thousands of pieces of smaller orbital debris that now threaten the interests of all nations.

[…]

The seven astronauts onboard the International Space Station were directed to close all hatches to external modules and climb into the Soyuz MS-19 and Crew Dragon capsules for safety. They remained there for about two hours, and will periodically close off and isolate sections of the ISS as the debris cloud crosses the station’s path every 90 minutes or so, according to NASA.

[…]

Only last week, the ISS performed an orbital burn to avoid any chance of smashing into the passing remains of a Chinese satellite that was blown up by Beijing.

The cloud of shrapnel that was once Cosmos 1408 will disperse and continue to occupy low-Earth orbit, where it all risks crashing into other objects. Some 1,500 pieces will probably remain in the region for decades. Small flecks of debris traveling at orbital speeds can cause huge amounts of damage, potentially setting off a chain reaction where collisions create more amounts of junk that go on to smash into more objects and so on.

This nightmare scenario, known as the Kessler syndrome, would make low Earth orbit a hostile environment as debris levels increase. It’d be difficult to launch future spacecraft without weighty armor and all existing satellites and space stations would be in danger of getting pelted by the junk.

[…]

Source: ISS crew shelters from debris after Russia blows up old sat • The Register

Modders Have Fixed The GTA Trilogy’s Incredibly Ugly Rain

The recently “remastered” GTA trilogy has some of the ugliest rain I’ve ever seen, and a handful of days later, modders have fixed it. No longer will you walk the streets of Vice City at night, only to be covered in the drippings of Spiderman’s leaky web-shooter. Finally, you can be free of that oddly viscous rain.

Grand Theft Auto: The Trilogy — Definitive Edition is very sick. The games are ill. They need doctors. Luckily for them, Rockstar has a pretty dedicated modding community, all of whom are trained in virtual trauma care. These brave few, whose greatest works were wiped out by the release of an overpriced, undersupported mess, have taken on the gargantuan task of fixing this shitshow. They have taken to this new work with the practiced, exhausted rage of a community used to being tossed scraps by a company that has become too big to fail.

The rain, which has been made more transparent in about half a dozen mods searching for the perfect drop of water, is just the beginning of their grim quest. Other modders are attempting to restore the series’ signature radio stations, which were utterly eviscerated by expired music licensing. The games’ jerseys, currently haunted by the ghostly textures of dead numbers, have a faithful army of Vatican-ordained modders attempting dozens of simultaneous digital exorcisms. But all of this only scratches the surface.

The rot runs deep. Everything from character geometry to building textures is uncomfortably wrong. It is as if Rockstar has found a new kind of uncanny valley, but instead of being based on how people should look, this new kind of uncanny valley disquiets our memories of virtual cities.

Source: Modders Have Fixed The GTA Trilogy’s Incredibly Ugly Rain

Woman Allegedly Made $57,000 From Unofficial Demon Slayer Cakes

A 34-year-old resident of Tokyo’s Shibuya has been arrested on suspicion of violating Japanese copyright law after selling unlicensed Demon Slayer cakes.

According to Kyodo News, the women sold the cakes through Instagram, with customers submitting their desired images to be turned into frosting, cream, and sugar. The suspect is said to have charged between 13,000 yen ($114) and 15,000 yen ($132) per cake. Since July 2019, it is believed she made over 6,500,000 yen in sales. That’s over $57,000!

It’s a lot of cakes, too.

The Metropolitan Police Department released photos of the criminal cakes in question, which can be seen in the above TBS News clip.

Source: Woman Allegedly Made $57,000 From Unofficial Demon Slayer Cakes

yay well done copyright. not.

Securing your digital life, part one: The basics

[…]

Even those who consider themselves well educated about cyber crime and security threats—and who do everything they’ve been taught to do—can (and do!) still end up as victims. The truth is that, with enough time, resources, and skill, everything can be hacked.

The key to protecting your digital life is to make it as expensive and impractical as possible for someone bent on mischief to steal the things most important to your safety, financial security, and privacy. If attackers find it too difficult or expensive to get your stuff, there’s a good chance they’ll simply move on to an easier target. For that reason, it’s important to assess the ways that vital information can be stolen or leaked—and understand the limits to protecting that information.

[…]

Source: Securing your digital life, part one: The basics | Ars Technica

A very good 2 part article about how to stay relatively safe on internet

Amazon textbook rental service scammed for $1.5m

A 36-year-old man from Portage, Michigan, was arrested on Thursday for allegedly renting thousands of textbooks from Amazon and selling them rather than returning them.

[…]

Also indicted were three alleged co-conspirators: Gregory Mark Gleesing, 43, and Lovedeep Singh Dhanoa, 25, both from Portage, Michigan, and Paul Steven Larson, 32, from Kalamazoo, Michigan

From January 2016 through March 2021, according to the indictment, Talsma rented textbooks from the Amazon Rental program in order to sell them for a profit. The indictment describes what occurred as “a sophisticated fraud scheme.”

Talsma allegedly disguised his identity by creating multiple customer accounts with different names, mailing addresses, email addresses, and phone numbers. He supposedly did so to bypass the 15 book limit Amazon placed on textbook rentals.

His alleged fraud scheme involved using Amazon gift cards to rent the textbooks and prepaid MyVanilla Visa cards with minimal credit balances to cover the buyout price charged for books not returned.

[…]

made sure that the MyVanilla Visa cards did not have sufficient credit balances, or any balance at all, when the textbook rentals were past due so that Amazon could not collect the book buyout price from those cards.”

[…]

As the scheme progressed, the indictment says, Talsma “recruited individuals, including defendants Gregory Mark Gleesing, Lovedeep Singh Dhanoa, and Paul Steven Larson, and other individuals known to the grand jury, to allow him to use their names and mailing addresses to further continue receiving rental textbooks in amounts well above the fifteen-book limit.”

Talsma would call Amazon’s customer service department and claim that instead of the textbooks ordered, he had received other items that could not be returned by mail, like flammable objects. Or he would claim he never received any textbooks, in the hope Amazon would credit him for unreceived goods and forget about the rental. And later, he is said to have taught Gleesing, Dhanoa, and Larson to do the same.

Titles taken included “Compensation,” by Jerry Newman, Barry Gerhart, and George Milkovich, which lists a Buyout Price of $172.05, and “Economics,” by Campbell McConnell, Stanley Brue, and Sean Flynn, which lists a Buyout Price of $108.00.

The scheme appears to have been fairly successful: The indictment says the four alleged scammers stole 14,000 textbooks worth over $1.5m.

[…]

Source: Amazon textbook rental service scammed for $1.5m • The Register

French government to speed up deployment of open source – EURACTIV.com

The French government’s roadmap for developing open source to make it a vector of digital sovereignty and a guarantee of “democratic confidence” was presented by Public Transformation and Civil Service Minister Amélie de Montchalin on Wednesday (10 November). EURACTIV France reports.

Montchalin spoke at the closing of the first edition of the “Open Source Experience”, which took place from 9-10 November and brought together all players in the free software community in Paris.

[…]

“Open source contrasts with proprietary software in that the source code of applications is freely available to the public; it is developed in a collaborative and decentralised way, by a community, and relies on peer review. But more importantly, it is not owned, in the proprietary sense, by anyone,” Quentin Roland of LegalUP Consulting told EURACTIV.

With the vast majority of relations between citizens and state services now being digital, Montchalin believes a “culture of transparency” is necessary for “democratic trust”. It is also a matter of digital sovereignty, she added.

According to a European Commission study published in September, investment in open source software in 2018 generated a sum of €65-95 billion in revenue. According to the same report, France was crowned European champion of open source policies.

To help French administrations make greater use of such solutions, Montchalin announced the creation of a team within the Interministerial Digital Directorate (DINUM) responsible for the promotion and inter-ministerial coordination of this mission.

She also revealed the launch of the code.gouv.fr platform, which will inventory all source code published by public organisations.

The source code for ‘France Connect’, the digital identification system for government services used by more than 30 million French people, will be public ‘in the next few days’, Montchalin also announced, adding that she would do the same for the code determining income tax deducted at the source.

[…]

n his report, Bothorel recommended using more open source software because “infrastructures necessary for data are increasingly exposed to forms of software dependency” and that this therefore raises “a strategic autonomy issue”.

This vision is shared by Montchalin, who wants the state to retain “control over the solutions” it uses. She also stressed the importance of interoperability – the ability to work with other existing or future products or systems – and reversibility – the ability to resume using data or software in the event of migration to another solution.

“By using open source software, you give yourself much more autonomy than by using proprietary software and a fortiori proprietary cloud services that are hosted outside Europe,” Stéfane Fermigier, co-president of the Union of Free Software and Open Digital Businesses (CNLL), told EURACTIV.

[…]

However, it is not a “miracle solution”, he added, noting that this is because open source software does not always offer the same technical level as proprietary solutions, mainly because open source code makes it easier to discover security flaws, which can be exploited.

“However, this is an extremely interesting alternative for Europe, a third way between digital giants and local players; an opportunity to ensure independence through neutrality and decentralisation rather than conflict,” he also said.

According to Fermigier, however, “free software is also an opportunity to rethink a number of habits and reflexes,” particularly in the field of public procurement.

“It’s an opportunity to think about what we need, to use the best tools for our needs and not for marketing or expectations,” he added.

Source: French government to speed up deployment of open source – EURACTIV.com

Forget Radio! Transmitting With Neutrons

Throughout history, people have devised ways to send information across long distances. For centuries we relied on smoke signals, semaphores, and similar physical devices. Electricity changed everything. First the telegraph and then radio transformed communications. Now researchers at the University of Lancaster have demonstrated another way to send wireless data without using electromagnetic radiation. They’ve harnessed fast neutrons from californium-252 and modulated them with information with 100% success.

The setup was interesting. The radioactive material was encased in a cubic meter steel tank filled with water. A pneumatic system can move the material to one edge of the tank which allows fast neutrons to escape. A scintillating detector can pick up the increased neutron activity. It seems like it is akin to using what hams call CW and college professors call OOK (on off keying). You can do that with just about anything you can detect. A flashlight, knocking on wood, or — we suppose — neutrons.

We wondered what the practical application of this might be. The paper suggests that the technique could send data through metal containment structures like those of a nuclear reactor or, perhaps, a spacecraft where you don’t want anything unnecessarily breaching the containment. After all, neutrons cut through things that would stop a conventional radio wave cold.

It seems like you only have to prove you can detect something to make this work — it really doesn’t matter what it is you are detecting. It seems like it would be much harder to do more advanced types of modulation using neutrons. Maybe this is why we don’t hear aliens. They are all Morse code operators with neutron-based telegraphs.

Source: Forget Radio! Transmitting With Neutrons | Hackaday

FBI email servers were hacked to target a security researcher

The FBI appears to have been used as a pawn in a fight between hackers and security researchers. According to Bleeping Computer, the FBI has confirmed intruders compromised its email servers early today (November 13th) to send fake messages claiming recipients had fallen prone to data breaches. The emails tried to pin the non-existent attacks on Vinny Troia, the leader of dark web security firms NightLion and Shadowbyte.

The non-profit intelligence organization Spamhaus quickly shed light on the bogus messages. The attackers used legitimate FBI systems to conduct the attack, using email addresses scraped from a database for the American Registry for Internet Numbers (ARIN), among other sources. Over 100,000 addresses received the fake emails in at least two waves.

The FBI described the hack as an “ongoing situation” and didn’t initially have more details to share. It asked email recipients to report messages like these to the bureau’s Internet Crime Complaint Center or the Cybersecurity and Infrastructure Security Agency. Troia told Bleeping Computer he believed the perpetrators might be linked to “Pompomourin,” a persona that has attacked the researcher in the past.

[…]

Source: FBI email servers were hacked to target a security researcher | Engadget

Apple has tight control over states’ digital ID cards

Apple’s digital ID card support in iOS 15 may be convenient, but it also comes with tight requirements for the governments that use them. CNBC has learned states using Apple’s system are required to not only run the platforms for issuing and checking credentials, but hire managers to handle Apple’s requests and meet the iPhone maker’s performance reporting expectations. States also have to “prominently” market the feature and encourage other government agencies (both state and federal) to adopt the technology.

Contracts are nearly identical for Arizona, Georgia, Kentucky and Oklahoma, some of the earliest adopters of the program. That suggests other states, including Connecticut, Iowa, Maryland and Utah, may have to honor similar terms.

Apple declined to comment. A representative for Arizona’s Transportation Department told CNBC there were no payments to Apple or other “economic considerations,” though the states would have to cover the costs.

The details raise a number of concerns. While it isn’t surprising that states would have pay for at least some of the expenses, the contracts give a private company a significant amount of control over the use and promotion of government systems while asking governments to foot the bills.

[…]

Source: Apple has tight control over states’ digital ID cards | Engadget

Vizio’s profit on ads, subscriptions, and data is double the money it makes selling TVs

It’s been less than a year since Vizio became a publicly traded company, and one consequence of that is we know more about its business than ever before. The TV maker released its latest earnings report on Tuesday and revealed that over the last three months, its Platform Plus segment that includes advertising and viewer data had a gross profit of $57.3 million. That’s more than twice the amount of profit it made selling devices like TVs, which was $25.6 million, despite those device sales pulling in considerably more revenue.

When Vizio filed to go public, it described the difference between the two divisions. While Devices is easy to understand — 4K TVs, soundbars, etc. — Platform Plus is a little more complicated. It counts money made from selling ad placements on its TV homescreens, deals for the buttons on remotes, ads that run on streaming channels, its cut from subscriptions, and viewer data that it tracks and sells as part of the InScape program.

The company says shipments of its TVs fell to 1.4 million in 2021 compared to 2.1 million in 2020, a drop of 36 percent. CEO William Wang told investors on the call that he sees “pretty healthy inventory” going into the holiday season, so anyone planning to pick up a value-priced TV or soundbar should have some decent options available.

That spike in Platform Plus revenue, which shot up 136 percent compared to last year, did a lot to help Vizio make up the difference as profits from TVs dipped compared to last year. Supply chain and logistics problems affecting many companies hit Vizio hard, too, but execs also said the company is working with its third-party partners to help find warehouse and trucking employees.

Where the numbers keep growing is in its number of active SmartCast accounts, which are now over 14 million, and how much money it makes from each user on average. That number has nearly doubled from last year, going from $10.44 to $19.89. On the call with investors and analysts, Vizio execs said 77 percent of that money comes directly from advertising, like the kind that runs on its WatchFree Plus package of streaming channels, a group that recently expanded with content targeting. The next biggest contributor is the money it makes selling Inscape data about what people are watching.

Vizio isn’t the only smart TV maker that’s really in the advertising business — as we noted a couple of years ago, while you probably know Roku for its TV OS and streaming boxes, CEO Anthony Wood is very up front about its true model. Roku’s most recent report revealed that on average it’s pulling in $40 per month on each user, or more than double what Vizio manages. One way Vizio plans to catch up is by building its own in-app payment system, which chief revenue officer Mike O’Donnell says will roll out to consumers next year.

[…]

Source: Vizio’s profit on ads, subscriptions, and data is double the money it makes selling TVs – The Verge

With this kind of profitability it’s not really surprising that everyone is out to turn you into a product.