About Robin Edgar

Organisational Structures | Technology and Science | Military, IT and Lifestyle consultancy | Social, Broadcast & Cross Media | Flying aircraft

Stratasys sues Bambu Lab over patents used widely by consumer 3D printers | Ars Technica

[…]

In two complaints, (1, 2, PDF) filed in the Eastern District of Texas, Marshall Division, against six entities related to Bambu Lab, Stratasys alleges that Bambu Lab infringed upon 10 patents that it owns, some through subsidiaries like Makerbot (acquired in 2013). Among the patents cited are US9421713B2, “Additive manufacturing method for printing three-dimensional parts with purge towers,” and US9592660B2, “Heated build platform and system for three-dimensional printing methods.”

There are not many, if any, 3D printers sold to consumers that do not have a heated bed, which prevents the first layers of a model from cooling during printing and potentially shrinking and warping the model. “Purge towers” (or “prime towers” in Bambu’s parlance) allow for multicolor printing by providing a place for the filament remaining in a nozzle to be extracted and prevent bleed-over between colors. Stratasys’ infringement claims also target some fundamental technologies around force detection and fused deposition modeling (FDM) that, like purge towers, are used by other 3D-printer makers that target entry-level and intermediate 3D-printing enthusiasts.

[…]

Source: Stratasys sues Bambu Lab over patents used widely by consumer 3D printers | Ars Technica

UK Once Again Denies A Passport Over Applicant’s Name Due To Intellectual Property Concerns – again

I can’t believe this, but it happened again. Almost exactly a decade ago, Tim Cushing wrote about a bonkers story out of the UK in which a passport applicant who’s middle name was “Skywalker” was denied the passport due to purported trademark or copyright concerns. The question that ought to immediately leap to mind should be: wait, nothing about a name or its appearance on a passport amounts to either creative expression being copied, nor use in commerce, meaning that neither copyright nor trademark law ought to apply in the slightest.

And you would have thought that coming out of that whole episode, proper guidance would have been given to the UK’s passport office so that this kind of stupidity doesn’t happen again. Unfortunately, it did happen again. A UK woman attempted to get a passport for her daughter, who she named Khaleesi, only to have it refused over the trademark for the Game of Thrones character that held the same fictional title.

Lucy, 39, from Swindon in Wiltshire, said the Passport Office initially refused the application for Khaleesi, six.

Officials said they were unable to issue a passport unless Warner Brothers gave permission because it owned the name’s trademark. But the authority has since apologised for the error.

“I was absolutely devastated, we were so looking forward to our first holiday together,” Lucy said.

While any intellectual property concerns over a passport are absolutely silly, I would argue that trademark law makes even less sense here than copyright would. Again, trademark law is designed specifically to protect the public from being confused as to the source of a good or service in commerce. There is no good or service nor commerce here. Lucy would simply like to take her own child across national borders. That’s it. Lucy had to consult with an attorney due to this insanity, which didn’t initially yield the proper result.

After seeking legal advice, her solicitors discovered that while there is a trademark for Game of Thrones, it is for goods and services – but not for a person’s name.

“That information was sent to the Passport Office who said I would need a letter from Warner Brothers to confirm my daughter is able to use that name,” she said.

This amounts to a restriction on the rights and freedoms of a child in a free country as a result of the choice their parent’s made about their name. Whatever your thoughts on IP laws in general, that simply cannot be the aim of literally any of them.

Now, once the media got a hold of all of this, the Passport Office eventually relented, said it made an error in denying the passport, and has put the application through. But even the government’s explanation doesn’t fully make sense.

Official explained there had been a misunderstanding and the guidance staff had originally given applies only to people changing their names.

“He advised me that they should be able to process my daughter’s passport now, ” she said.

Why would the changing of a name be any different? My name is my name, not a creative expression, nor a use in commerce. If I elect to change my name from “Timothy Geigner” to “Timothy Mickey Mouse Geigner”, none of that equates to an infringement of Disney’s rights, copyright nor trademark. It’s just my name. It would only be if I attempted to use my new name in commerce or as part of an expression that I might run afoul of either trademark or copyright law.

What this really is is the pervasive cancer that is ownership culture. It’s only with ownership culture that you get a passport official somehow thinking that Warner Bros. production of a fantasy show means a six year old can’t get a passport.

Source: UK Once Again Denies A Passport Over Applicant’s Name Due To Intellectual Property Concerns | Techdirt

Amazon-Anthropic Investment Investigated by UK Government – is it a stealth merger?

The U.K. government has launched a preliminary investigation into the partnership between Amazon and Anthropic to see if it will significantly lessen competition. This comes days after a similar probe was announced into Alphabet’s collaboration with the AI startup.

In March, Amazon concluded its $4 billion (£3.16 billion) investment in Anthropic, the company behind the Claude LLM family, some of the only viable competitors to OpenAI’s ChatGPT and Google’s Gemini. It was founded by former OpenAI employees, including siblings Daniela and Dario Amodei, who were both execs.

In return for the investment, Anthropic committed to using Amazon Web Services as its primary cloud provider for “mission critical workloads, including safety research and future foundation model development.” It also agreed to use Amazon’s Trainium and Inferentia chips to build, train, and deploy its models and host them on the AI app development platform Amazon Bedrock.

However, the Competition and Markets Authority believes that this partnership could result in a “substantial lessening of competition” within the U.K. tech markets.

[…]

Complete mergers and acquisitions often trigger extensive regulatory scrutiny and potential antitrust actions for this reason, which can delay or block proceedings. To avoid this situation, Big Tech instead makes strategic investments in the most promising startups and hires their top talent, allowing them to gain influence and access to innovative technologies unchecked.

In an April report on how the CMA is looking into AI foundational models, the CMA said, “Without fair, open, and effective competition and strong consumer protection, underpinned by these principles, we see a real risk that the full potential of organisations or individuals to use AI to innovate and disrupt will not be realised, nor its benefits shared widely across society.

[…]

The CMA is looking to identify “relevant merger situation(s)” that allow large tech companies to “shield themselves from competition” in the U.K. It says that “a range of different kinds of transactions and arrangements” could represent a relevant merger with the provisions of the Enterprise Act 2002.

The Digital Markets, Competition, and Consumers Bill that was passed in May also “anticipates new powers for the CMA.” According to the April report, the CMA can “enforce consumer protection law against infringing firms” and apply non-compliance penalties of up to 10% of a firm’s worldwide turnover.

“We are ready to use these new powers to raise standards in the market and, if necessary, to tackle firms that do not play by the rules through enforcement action,” it said.

[…]

Source: Amazon-Anthropic Merger Investigated by UK Government

New U.N. Cybercrime Treaty Could Threaten Human Rights

The United Nations approved its first international cybercrime treaty yesterday. The effort succeeded despite opposition from tech companies and human rights groups, who warn that the agreement will permit countries to expand invasive electronic surveillance in the name of criminal investigations. Experts from these organizations say that the treaty undermines the global human rights of freedom of speech and expression because it contains clauses that countries could interpret to internationally prosecute any perceived crime that takes place on a computer system.

[…]

among the watchdog groups that monitored the meeting closely, the tone was funereal. “The U.N. cybercrime convention is a blank check for surveillance abuses,” says Katitza Rodriguez, the Electronic Frontier Foundation’s (EFF’s) policy director for global privacy. “It can and will be wielded as a tool for systemic rights violations.”

In the coming weeks, the treaty will head to a vote among the General Assembly’s 193 member states. If it’s accepted by a majority there, the treaty will move to the ratification process, in which individual country governments must sign on.

The treaty, called the Comprehensive International Convention on Countering the Use of Information and Communications Technologies for Criminal Purposes, was first devised in 2019, with debates to determine its substance beginning in 2021. It is intended to provide a global legal framework to prevent and respond to cybercrimes.

[…]

experts have expressed that the newly adopted treaty lacks such safeguards for a free Internet. A major concern is that the treaty could be applied to all crimes as long as they involve information and communication technology (ICT) systems. HRW has documented the prosecution of LGBTQ+ people and others who expressed themselves online. This treaty could require countries’ governments to cooperate with other nations that have outlawed LGBTQ+ conduct or digital forms of political protest, for instance.

“This expansive definition effectively means that when governments pass domestic laws that criminalize a broad range of conducts, if it’s committed through an ICT system, they can point to this treaty to justify the enforcement of repressive laws,” said HRW executive director Tirana Hassan in a news briefing late last month.

[…]

“The treaty allows for cross-border surveillance and cooperation to gather evidence for serious crimes, effectively transforming it into a global surveillance network,” Rodriguez says. “This poses a significant risk of cross-border human rights abuses and transnational repression.”

[…]

Source: New U.N. Cybercrime Treaty Could Threaten Human Rights | Scientific American

For a more complete look at the threats presented by this treaty, also see: UN Cybercrime Treaty does not define cybercrime, allows any definition and forces all signatories to secretly surveil their own population on request by any other signatory (think totalitarian states spying on people in democracies with no recourse)

Apple tries again to make EU officials happy with new fees for in-app purchases

Apple this week revised its alternative contractual terms for devs selling apps in the European Union – a revision that was immediately dismissed by critics as more “malicious compliance.”

[…]

Essentially, Apple has allowed developers in the EU to choose whether they want to use its own In‑App Purchase system for App Store transactions or an alternative payment processor for In-App transactions. EU app developers can also choose to sell their apps through a third-party storefront.

The Alternative Terms contract covers: 1) In‑App Purchase system from the App Store; 2) alternative payment processors; and 3) linking out from apps.

The StoreKit addendum covers just linking out – it “allows the ability to link out for purchases of digital goods or services for apps distributed in the EU and includes new business terms for those transactions.” It’s not for in-app transactions.

The StoreKit contract doesn’t include the Core Technology fee – assessed for devs using the Alternative Terms contract on app installs beyond one million at €0.50 for each app installed.

But it does come with two new fees: a 5 percent “Initial Acquisition Fee” and a 10/20 percent “Store Services Fee.”

On iOS, under the Alternative Terms contract, Apple demands a 17 percent commission for apps sold in EU storefronts of the App Store, or 10 percent for App Store Small Business Program participants. Then there’s the 3 percent payment processing fee, and the Core Technology fee is applicable.

There’s also an Initial acquisition fee of 5 percent “for sales of digital goods and services, made on any platform, that occur within a 12-month period after an initial install.” And there’s a Store services fee of 10 percent “for sales of digital goods and services, made on any platform, that occur within a fixed 12-month period from the date of an install, including app updates and reinstalls.”

Under the StoreKit Contract, the Initial acquisition fee is the same – 5 percent – but the Store service fee is 20 percent. For App Store Small Business Program participants or auto-renewal subscriptions beyond one year, that drops to 7 percent.

Fee calculation is complicated enough that Apple has built a web-based calculator for the task.

In a statement provided to The Register, Spotify said, “We are currently assessing Apple’s deliberately confusing proposal. At first glance, by demanding as much as a 25 percent fee for basic communication with users, Apple once again blatantly disregards the fundamental requirements of the Digital Markets Act (DMA). The European Commission has made it clear that imposing recurring fees on basic elements like pricing and linking is unacceptable. We call on the Commission to expedite its investigation, implement daily fines and enforce the DMA.”

[…]

United Kingdom’s Competition and Markets Authority – as part of its Mobile Browsers and Cloud Gaming Market investigation – is contemplating uncomfortable remedies [PDF] against the fruiterer.

[…]

Among the issues that concern the CMA are: Apple’s requirement that all browsers on its mobile devices use its own WebKit rendering engine; Apple’s and Google’s dominance of browser engines; and Apple’s rules that limit in-app browsers.

Some of the options being considered include: “Requirement for Apple to grant access to alternative browser engines to iOS”; “Requirement for Apple to grant equivalent access to iOS to browsers using alternative browser engines”; and “Requirement for Apple to grant equivalent access to APIs used by WebKit and Safari to browsers using alternative browser engines.”

[…]

Source: Apple tries again to make EU officials happy – with new fees • The Register

‘Sinkclose’ Flaw in Hundreds of Millions of AMD Chips Allows Deep, Virtually Unfixable Infections

Security flaws in your computer’s firmware, the deep-seated code that loads first when you turn the machine on and controls even how its operating system boots up, have long been a target for hackers looking for a stealthy foothold. But only rarely does that kind of vulnerability appear not in the firmware of any particular computer maker, but in the chips found across hundreds of millions of PCs and servers. Now security researchers have found one such flaw that has persisted in AMD processors for decades, and that would allow malware to burrow deep enough into a computer’s memory that, in many cases, it may be easier to discard a machine than to disinfect it.

At the Defcon hacker conference tomorrow, Enrique Nissim and Krzysztof Okupski, researchers from the security firm IOActive, plan to present a vulnerability in AMD chips they’re calling Sinkclose. The flaw would allow hackers to run their own code in one of the most privileged modes of an AMD processor, known as System Management Mode

[…]

an attacker could infect the computer with malware known as a “bootkit” that evades antivirus tools and is potentially invisible to the operating system, while offering a hacker full access to tamper with the machine and surveil its activity. For systems with certain faulty configurations in how a computer maker implemented AMD’s security feature known as Platform Secure Boot—which the researchers warn encompasses the large majority of the systems they tested—a malware infection installed via Sinkclose could be harder yet to detect or remediate, they say, surviving even a reinstallation of the operating system.

[…]

Only opening a computer’s case, physically connecting directly to a certain portion of its memory chips with a hardware-based programming tool known as SPI Flash programmer and meticulously scouring the memory would allow the malware to be removed, Okupski says.

Nissim sums up that worst-case scenario in more practical terms: “You basically have to throw your computer away.”

In a statement shared with WIRED, AMD acknowledged IOActive’s findings, thanked the researchers for their work, and noted that it has “released mitigation options for its AMD EPYC datacenter products and AMD Ryzen PC products, with mitigations for AMD embedded products coming soon.” (The term “embedded,” in this case, refers to AMD chips found in systems such as industrial devices and cars.) For its EPYC processors designed for use in data-center servers, specifically, the company noted that it released patches earlier this year. AMD declined to answer questions in advance about how it intends to fix the Sinkclose vulnerability, or for exactly which devices and when, but it pointed to a full list of affected products that can be found on its website’s security bulletin page.

[…]

Nissim and Okupski respond that while exploiting Sinkclose requires kernel-level access to a machine, such vulnerabilities are exposed in Windows and Linux practically every month

[…]

Nissim and Okupski’s Sinkclose technique works by exploiting an obscure feature of AMD chips known as TClose. (The Sinkclose name, in fact, comes from combining that TClose term with Sinkhole, the name of an earlier System Management Mode exploit found in Intel chips in 2015.) In AMD-based machines, a safeguard known as TSeg prevents the computer’s operating systems from writing to a protected part of memory meant to be reserved for System Management Mode known as System Management Random Access Memory or SMRAM. AMD’s TClose feature, however, is designed to allow computers to remain compatible with older devices that use the same memory addresses as SMRAM, remapping other memory to those SMRAM addresses when it’s enabled. Nissim and Okupski found that, with only the operating system’s level of privileges, they could use that TClose remapping feature to trick the SMM code into fetching data they’ve tampered with, in a way that allows them to redirect the processor and cause it to execute their own code at the same highly privileged SMM level.

[…]

Nissim and Okupski say they agreed with AMD not to publish any proof-of-concept code for their Sinkclose exploit for several months to come, in order to provide more time for the problem to be fixed.

[…]

Source: ‘Sinkclose’ Flaw in Hundreds of Millions of AMD Chips Allows Deep, Virtually Unfixable Infections | WIRED

Warner Bros. Scrubs Cartoon Network Website, Erasing Years of History

Warners Bros. Discovery has not been having a great time recently, and is going through a wave of increasingly desperate cost-cutting initiatives because of it. Several of those movements have felt particularly targeted at the studio’s animated offerings, from its inability to release finished films to selling off its current, past, and would-be successes to other streamers. Its latest indignity comes at the cost of Cartoon Network’s online presence.

Variety reports that Warner completely wiped the Cartoon Network website—previously home to an archive of clips and full episodes of a wide variety of animated series, including the likes of Steven UniverseTeen Titans Go!, We Bare Bears, Adventure Time, and other past and present CN series—leaving nothing and redirecting visitors to a message encouraging them to instead sign up for Max.

[…]

As well as removing free access to series, the Cartoon Network website also hosted years of beloved flash games relating to its shows. While many have been erased over the years through various site redesigns—and archived elsewhere for nostalgic fans—at least some of the current archives are still accessible via international versions of the Cartoon Network website in regions where Max is currently unavailable.

The news comes after Warner recently announced plans to shutter its dedicated streaming service for classic animation, Boomerang.

[…]

Source: Warner Bros. Scrubs Cartoon Network Website, Erasing Years of History

Oxford scientists’ new light-absorbing material can turn everyday objects into solar panels

Oxford University scientists may have solved one of the greatest hindrances of expanding access to solar energy. Scientists from the university’s physics department have created an ultra-thin layer of material that can be applied to the exterior of objects with sunlight access in place of bulky silicon-based solar panels.

The ultra-thin and flexible film is made by stacking layers of light-absorbing layers of perovskite that are just over one micron thick. The new materials are also 150 times thinner than a traditional silicon wafer and can produce 5 percent more energy efficiency than traditional, single-layer silicon photovoltaics, according to a statement released by Oxford University.

Dr. Shauifeng Hu, a postdoctoral fellow at Oxford’s physics department, says he believes “this approach could enable the photovoltaic devices to achieve far greater efficiencies, exceeding 45 percent.”

This new approach to solar energy technology could also reduce the cost of solar energy. Due to their thinness and flexibility, they can be applied to almost any surface. This reduces the cost of construction and installation and could increase the number of solar energy farms producing more sustainable energy.

This technology, however, is still in the research stage and the university doesn’t mention the long-term stability of the newly designed perovskite panels. Going from 6 to 27 percent solar energy efficiency in five years is an impressive feat but stability has always been limited compared to photovoltaic technology, according to the US Department of Energy. A 2016 study in the science journal Solar Energy Materials and Solar Cells also noted that perovskite can provide “efficient, low-cost energy generation” but it also has “poor stability” due its sensitivity to moisture.

Source: Oxford scientists’ new light-absorbing material can turn everyday objects into solar panels

After 33 Years, GameStop Shuts Down And Disappears ‘Game Informer’

[…]

Nobody is going to let decades of journalistic output just suddenly get disappeared out of nowhere… right?

When it comes to Game Informer, the GameStop owned video game magazine that has been in production for over three decades, that’s exactly what just happened.

Staff at the magazine, which also publishes a website, weekly podcast, and online video documentaries about game studios and developers, were all called into a meeting on Friday with parent company GameStop’s VP of HR. In it they were told the publication was closing immediately, they were all laid off, and would begin receiving severance terms. At least one staffer was in the middle of a work trip when the team was told.

The sudden closure of Game Informer means that issue number 367, the outlet’s Dragon Age: The Veilguard cover story, will be its last. The entire website has been taken offline as well.

This isn’t link rot. It’s link decapitation. Every single URL from the Game Informer website now points only to the main site URL, with the following message posted on it.

After 33 thrilling years of bringing you the latest news, reviews, and insights from the ever-evolving world of gaming, it is with a heavy heart that we announce the closure of Game Informer.

From the early days of pixelated adventures to today’s immersive virtual realms, we’ve been honored to share this incredible journey with you, our loyal readers. While our presses may stop, the passion for gaming that we’ve cultivated together will continue to live on.

Thank you for being part of our epic quest, and may your own gaming adventures never end.

Barring anyone with physical copies of the magazine, or those that created their own online scans of those magazines, or whatever you can still get out of the Internet Archive, it’s all just gone. Thousands of articles and features, millions of words of journalistic output, simply erased. Even the ExTwitter account for the publication has been disappeared, even after it was used to post the same message as on the website. What you will see if you go that link for the disappeared tweet is an outpouring of sadness from all sorts of folks, including famed voice actors, content creators like Mega Ran, and even game studios, all eulogizing the beloved magazine.

And it seems that this shut down, almost certainly at the hands of CEO Ryan Cohen, occurred without any opportunity for those who produced all of this content to take backups for archive purposes.

[…]

And, because cultural disasters like this tend to be sprinkled with at least a dash of irony:

A recent in-depth feature on the retro game studio Digital Eclipse about gaming’s history and preservation is one of the stories that is no longer accessible. A write-up about Game Informer’s famous game vault, containing releases from across its decades long history, is also inaccessible.

So a gaming journalism outfit failed to preserve its own features on game preservation. That would actually be funny if it weren’t so infuriating.

Source: After 33 Years, GameStop Shuts Down And Disappears ‘Game Informer’ | Techdirt

Wow, #GME you have lost a diamondhand. I no longer believe in this stonk.

Posted in Art

Google will let you search your Chrome browsing history by asking questions like a human – Firefox, you need this!

[…]

you’ll be able to ask questions of your browsing history in natural language using Gemini, Google’s family of large language models that power its AI systems. You can type a question like “What was that ice cream shop I looked at last week?” into your address bar after accessing your history and Chrome will show relevant pages from whatever you’ve browsed so far.

Google Search History with AI
Google

“The high level is really wanting to introduce a more conversational interface to Chrome’s history so people don’t have to remember URLs,” said Parisa Tabriz, vice president of Chrome, in a conversation with reporters ahead of the announcement.

The feature will only be available to Chrome’s desktop users in the US for now and will be opt-in by default. It also won’t work with websites you browsed in Incognito mode. And the company says that it is aware of the implications of having Google’s AI parse through your browsing history to give you an answer. Tabriz said that the company does not directly use your browsing history or tabs to train its large language models. “Anything related to browsing history is super personal, sensitive data,” she said. “We want to be really thoughtful and make sure that we’re thinking about privacy from the start and by design.”

[…]

Source: Google will let you search your Chrome browsing history by asking questions like a human

Absolutely brilliant! And it should be able to implement this on a privacy friendly scale – for which I wouldn’t trust Google for a second!

Europe launches ‘AI Factories’ initiative

[…]

According to the Commission, AI Factories are envisioned as “dynamic ecosystems” that bring together all the necessary ingredients – compute power, data, and talent – to create cutting-edge generative AI models, so it isn’t just about making a supercomputer available and telling people to get on with it.

The ultimate goal for these AI Factories is that they will serve as hubs able to drive advances in AI across various key domains, from health to energy, manufacturing to meteorology, it said.

To get there, the EuroHPC JU says that its AI Factories approach aims to create a one-stop shop for startups, SMEs, and scientific users to facilitate access to services as well as skill development and support.

In addition, an AI Factory will also be able to apply for a grant to develop an optional system/partition focused on the development of experimental AI-optimized supercomputing platforms. The goal of such platforms would be to stimulate the development and design of a wide range of technologies for AI-ready supercomputers.

The EuroHPC JU says it will kick off a two-pronged approach to delivering AI Factories from September. One will be a call for new hosting agreements for the acquisition of a new AI supercomputer, or for an upgraded supercomputer in the case applicants aim to upgrade an existing EuroHPC supercomputer to have AI capabilities.

[…]

According to the EuroHPC JU, grants will be offered to cover the operational costs of the supercomputers, as well as to support AI Factory activities and services.

The second prong is aimed at entities that already host a EuroHPC supercomputer capable of training large-scale, general-purpose AI models and emerging AI applications. It will also offer grants to support AI Factory activities.

[…]

Source: Europe launches ‘AI Factories’ initiative • The Register

EU Commission opens stakeholder participation in drafting general-purpose AI code of practice

The European Commission has issued a call to stakeholders to participate in drafting a code of practice for general-purpose artificial intelligence (GPAI), a key part of compliance with the AI Act for deployers of technology like ChatGPT, according to a press release on Tuesday (30 July).

[…]

a diversity of stakeholders will be engaged in the process, albeit with companies still maintaining a somewhat stronger position in the planned structure, according to the call for expression of interest published today, which runs until 25 August.

Separately, on Tuesday the Commission opened up a consultation for parties to express their views on the code of practice until 10 September, without participating directly in its drafting.

GPAI providers, like OpenAI or Microsoft, can use the code to demonstrate compliance with their obligations until harmonised standards are created. The standards will support compliance with GPAI obligations, which take effect in August 2025, one year after the AI Act comes into force.

The Commission may give the code general validity within the EU through an implementing act, similar to how it plans to convert a voluntary Code of Practice on Disinformation under the Digital Services Act into a formal Code of Conduct.

[…]

Source: EU Commission opens stakeholder participation in drafting general-purpose AI code of practice – Euractiv

Thin edge-lit LCD TVs Break Faster Under Prolonged Use: tested for 10k hours

[…] At the time of this article’s publication, our 100 TVs had been running for over 10,000 hours since the launch of the test, which represents roughly six years of use in a typical U.S. household

[…]

The results of this investigation are unequivocal: edge-lit TVs are inherently prone to significant durability issues, including warped reflector sheets, cracked light guide plates, and burnt-out LEDs due to concentrated heat. These problems manifest after prolonged use at maximum brightness, posing a significant risk to their long-term reliability.

[…]

we recommend prioritizing models with better heat distribution, such as direct-lit or FALD TVs, for improved longevity and performance.

[…]

Excluding the 18 OLEDs, which have burn-in from constantly streaming CNN, over 25% of the 82 LCD TVs in our test suffer from visible uniformity issues.

It gets worse if we look at LCD TVs by their sub-type. Seven out of the eleven (64%) edge-lit models in our test suffer from uniformity issues, one has outright failed, and others are in the process of doing so. In contrast, only 14 out of the 71 (20%) full-array local dimming (FALD) and direct-lit TVs have uniformity issues.

The issues we’ve encountered with the edge-lit TVs in our test seem to be the same across models and brands

[…]

Brand/Model/Year LG QNED80 2022 LG NANO85 2021 Samsung AU8000 2021
Time to Issue Onset 7,600 3,300 2,200
50% Gray Uniformity

@ ~10 000 h

LG QNED80 2022 - 50% Gray Uniformity Picture - 10 000h LG NANO85 2021 - 50% Gray Uniformity Picture - 10 000 h Samsung AU8000 - 50% Gray Uniformity Picture - 10 000 h
Brand/Model/Year Samsung Q60A QLED 2021 Samsung Q70A QLED 2021 Samsung The Frame 2022
Time to Issue Onset 2,200 2,200 3,300
50% Gray Uniformity

@ ~10 000 h

Samsung Q60A - 50% Gray Uniformity Picture - 10 000 h Samsung Q70A - 50% Gray Uniformity Picture - 10 000 h Samsung The Frame 2022 - 50% Gray Uniformity Picture - 10 000 h
Brand/Model/Year Samsung Q60B QLED 2022
Time to Issue Onset 5,500
50% Gray Uniformity

@ ~10 000 h

 Samsung Q60B - 50% Gray Uniformity Picture - 10 000 h

 

Source: Thin LCD TVs Break Faster Under Prolonged Use: Key Findings From Running 100 TVs for Over 10,000 Hours – RTINGS.com

Suno & Udio To RIAA: Your Music Is Copyrighted, You Can’t Copyright Styles

AI music generators Suno and Udio responded to the lawsuits filed by the major recording labels, arguing that their platforms are tools for making new, original music that “didn’t and often couldn’t previously exist.”

“Those genres and styles — the recognizable sounds of opera, or jazz, or rap music — are not something that anyone owns,” the companies said. “Our intellectual property laws have always been carefully calibrated to avoid allowing anyone to monopolize a form of artistic expression, whether a sonnet or a pop song. IP rights can attach to a particular recorded rendition of a song in one of those genres or styles. But not to the genre or style itself.” TorrentFreak reports: “[The labels] frame their concern as one about ‘copies’ of their recordings made in the process of developing the technology — that is, copies never heard or seen by anyone, made solely to analyze the sonic and stylistic patterns of the universe of pre-existing musical expression. But what the major record labels really don’t want is competition.” The labels’ position is that any competition must be legal, and the AI companies state quite clearly that the law permits the use of copyrighted works in these circumstances. Suno and Udio also make it clear that snippets of copyrighted music aren’t stored as a library of pre-existing content in the neural networks of their AI models, “outputting a collage of ‘samples’ stitched together from existing recordings” when prompted by users.

“[The neural networks were] constructed by showing the program tens of millions of instances of different kinds of recordings,” Suno explains. “From analyzing their constitutive elements, the model derived a staggeringly complex collection of statistical insights about the auditory characteristics of those recordings — what types of sounds tend to appear in which kinds of music; what the shape of a pop song tends to look like; how the drum beat typically varies from country to rock to hip-hop; what the guitar tone tends to sound like in those different genres; and so on.” These models are vast stores, not of copyrighted music, the defendants say, but information about what musical styles consist of, and it’s from that information new music is made.

Most copyright lawsuits in the music industry are about reproduction and public distribution of identified copyright works, but that’s certainly not the case here. “The Complaint explicitly disavows any contention that any output ever generated by Udio has infringed their rights. While it includes a variety of examples of outputs that allegedly resemble certain pre-existing songs, the Complaint goes out of its way to say that it is not alleging that those outputs constitute actionable copyright infringement.” With Udio declaring that, as a matter of law, “that key point makes all the difference,” Suno’s conclusion is served raw. “That concession will ultimately prove fatal to Plaintiffs’ claims. It is fair use under copyright law to make a copy of a protected work as part of a back-end technological process, invisible to the public, in the service of creating an ultimately non-infringing new product.” Noting that Congress enacted the first copyright law in 1791, Suno says that in the 233 years since, not a single case has ever reached a contrary conclusion.

In addition to addressing allegations unique to their individual cases, the AI companies accuse the labels of various types of anti-competitive behavior. Imposing conditions to prevent streaming services obtaining licensed music from smaller labels at lower rates, seeking to impose a “no AI” policy on licensees, to claims that they “may have responded to outreach from potential commercial counterparties by engaging in one or more concerted refusals to deal.” The defendants say this type of behavior is fueled by the labels’ dominant control of copyrighted works and by extension, the overall market. Here, however, ownership of copyrighted music is trumped by the existence and knowledge of musical styles, over which nobody can claim ownership or seek to control. “No one owns musical styles. Developing a tool to empower many more people to create music, by scrupulously analyzing what the building blocks of different styles consist of, is a quintessential fair use under longstanding and unbroken copyright doctrine. “Plaintiffs’ contrary vision is fundamentally inconsistent with the law and its underlying values.”
You can read Suno and Udio’s answers to the RIAA’s lawsuits here (PDF) and here (PDF).

Source: Suno & Udio To RIAA: Your Music Is Copyrighted, You Can’t Copyright Styles

Design flaw has Microsoft Authenticator overwriting MFA accounts, locking users out

[…] For those who rely on Microsoft Authenticator, the experience can go beyond momentary frustration to full-blown panic as they become locked out of their accounts.

That’s because, due to an issue involving which fields it uses, Microsoft Authenticator often overwrites accounts when a user adds a new account via QR scan — the most common method of doing so.

But because of the way the resulting lockout happens, the user is not likely to realize the issue resides with Microsoft Authenticator. Instead, the company issuing the authentication is considered the culprit, resulting in wasted corporate helpdesk hours trying to fix an issue not of that company’s making.

The core of the problem? Microsoft Authenticator will overwrite an account with the same username. Given the prominent use of email addresses for usernames, most users’ apps share the same username.

[…]

There are multiple workarounds. The easiest is for companies to use any other authentication app. Not using the QR code scan feature — and manually entering the code — will also sidestep the issue, which doesn’t appear to arise when the authenticated accounts belong to Microsoft.

CSO Online found complaints of this problem dating back to 2020, but it appears to have been in place since Microsoft Authenticator was released in June 2016.

[…]

Source: Design flaw has Microsoft Authenticator overwriting MFA accounts, locking users out | CSO Online

Chrome Web Store warns end is coming for uBlock Origin

[…] With the stable release of Chrome 127 on July 23, 2024, the full spectrum of Chrome users could see the warning. One user of the content-blocking add-on filed a GitHub Issue about the notification.

“This extension may soon no longer be supported because it doesn’t follow best practices for Chrome extensions,” the Chrome Web Store (CWS) notification banner explained.

But Google is being too cautious in its language. uBlock Origin (uBO) will stop working entirely when Google Chrome drops support for Manifest v2 – which uBlock Origin and other extensions rely on to do their thing. When Manifest v2 is no longer supported by Chrome, uBlock Origin won’t work at all – that’s what Google should be telling users.

Raymond Hill, the creator and maintainer of uBO, has made it clear that he will not be trying to adapt uBO to Google’s Manifest v3 – the extension architecture that is replacing v2.

“You will have to find an alternative to uBO before Google Chrome disables it for good,” he explained in a list of FAQs for uBlock Origin Lite – a content-blocking extension that functions on the upcoming Manifest v3 system but lacks the ability to create custom filters.

uBlock Origin Lite, he explained, is “not meant as a [Manifest v3]-compliant version of uBO, it’s meant as a reliable Lite version of uBO, suitable for those who used uBO in an install-and-forget manner.”

This is a nuanced statement. He’s not saying that if you move from uBO to uBlock Origin Lite all will be well and exactly the same – just that uBlock Origin Lite works on Manifest v3, so it will continue working after the v2 purge.

This nuance is needed because Manifest v2 provided uBlock Origin and other extensions deep access to sites and pages being visited by the user. It allowed adverts and other stuff to be filtered out as desired, whereas v3 pares back that functionality.

While it’s difficult to generalize about how the experience of uBO under Manifest v2 and uBOL under Manifest v3 will differ, Hill expects uBOL “will be less effective at dealing with” websites that detect and block content blockers, and at “minimizing website breakage” when stuff is filtered out, because existing uBO filters can’t be converted to declarative rules.

[…]

Source: Chrome Web Store warns end is coming for uBlock Origin • The Register

Sonos apologized months too late for messing up its app and has offered a roadmap for fixing everything which has already slipped

Sonos seriously stepped in it a couple of months back when it released an overhauled first-party mobile app that shipped with a number of missing features. These included core functions like sleep timers and alarms. Many of the company’s speakers would not appear as a pairing option and it became extremely difficult to precisely adjust the volume level of a paired speaker.Additionally, music search and playback were both negatively impacted by the change, leading to numerous customer complaints.

Now, the company has apologized for releasing the half-baked app. CEO Patrick Spence whipped up a blog post to address the “significant problems” with the new software.

“There isn’t an employee at Sonos who isn’t pained by having let you down, and I assure you that fixing the app for all of our customers and partners has been and continues to be our number one priority,” he wrote.

Spence also wrote that the company had planned to quickly incorporate the missing features and patch up any errors, but these fixes were delayed by a “number of issues” that were unique to the update. He did confirm that Sonos has been actively pushing out patches approximately every two weeks to address a wide variety of concerns.

[…]

Source: Sonos apologized for messing up its app and has offered a roadmap for fixing everything

Etsy goes USA level prude and will kill Artisanal sex toy businesses – without having told them that their policies were changing. Surprise!

Simply Elegant Glass has been selling hand-crafted sex toys on Etsy for nearly a decade. In that time, the shop has made over 7,000 sales and racked up more than 1,500 mostly five-star reviews. The Etsy shop — which offers glass dildos, anal plugs and other insertable items — drives the majority of the small business’ overall sales. But as of Monday July 29, the bulk of the shop’s catalog won’t be allowed on the marketplace anymore under Etsy’s new restrictions around sex toys.

The Adult Nudity and Sexual Content policy, which was quietly published at the end of June to the platform’s “House Rules,” states that “Etsy prohibits the sale of adult toys that are: inserted into the body; applied to the genitalia; designed for genitals to be inserted into them.” Among other things, it specifically forbids vendors from selling “dildos, vibrators, anal plugs, sex dolls and fleshlights.” The policy update, spotted first by Mashable, came in tandem with a community forum post by Etsy’s head of Trust & Safety, Alice Wu Paulus, who wrote that it was designed to reflect “evolving industry standards and best practices so that we can continue to keep our users safe.”

The note about the impending change said Etsy would, in the coming weeks, “communicate directly with sellers who may need to update their listing images to be compliant.” Enforcement would begin on July 29, it said, and non-compliant listings would be removed. But up to three weeks after the new policy was published online, sellers that spoke to Engadget said they were never contacted directly by Etsy. All of them found out about the ban through social media or other means.

[…]

Source: Artisanal sex toy businesses might not survive Etsy’s new seller policies

Posted in Sex

Samsung starts blocking sideloading, so Epic Games pulls Fortnite from the Galaxy Store

After it was discovered that Samsung would begin blocking any attempt to sideload apps Epic Games has made the decision to remove Fortnite, among other titles, from the Galaxy Store.

When the Galaxy Z Fold 6 began to land in the hands of users, the loaded version of One UI touted a brand-new attempt to block unverified apps from being sideloaded. Samsung’s One UI 6.1.1 asks if the user wants to turn on the “Auto Blocker,” a function that will block not only apps from unverified sources but also commands or software updates via USB cable.

Related: Samsung Galaxy phones now stop you from sideloading Android apps by default

Epic Games views this as poor behavior on Samsung’s part, citing it as one reason the company is pulling Fortnite from the Galaxy Store in One UI. A blog post notes that the decision was also made because of “ongoing Google proposals to Samsung to restrain competition in the market for Android app distribution.”

[…]

Source: Epic Games pulls Fortnite from the Galaxy Store

Come on Samsung,  blocking sideloading and USB? Really, one of the advantages of Android is that it is a (more) open system.

Crowdstrike apologises for breaking the world to own IT Workers With $10 Uber Eats Coupons that are flagged by Uber as Fraudulent

Last week, the world reacted as 8.5 million computers crashed to bluescreen, grounding flights, crippling hospitals, and bringing down 911 services. This week, the world is reacting to the company responsible—Crowdstrike—offering its staff and the companies it works with a $10 Uber Eats voucher as way of apology for all their extra work over the weekend. People are not pleased.

[…]

Given Crowdstrike’s day-job is to help companies respond in the event of a cyberattack, you might imagine damage control was a concept with which it had some manner of familiarity. However, in an email sent out to its staff and partner companies, it managed the most impressively cloth-eared response, saying,

To express our gratitude, your next cup of coffee or late night snack is on us!

The email came with a code that would unlock a $10 Uber Eats voucher. A figure just low enough to be next to useless.

It would be very reasonable to suspect that this was one of very many fraudulent emails and links that have gone around since Friday’s incident, attempting to take advantage of the situation for malware, phishing and all manner of scams. However, according to CNN, a Crowdstrike spokesperson confirmed the emails were legitimate.

However, CNN reports that the spike in uses of the particular code caused Uber to flag it as fraud! Just perfect.

[…]

Source: Crowdstrike Says Sorry To IT Workers With $10 Uber Eats Coupons

A Hacker ‘Ghost’ Network Is Quietly Spreading Malware on GitHub

A secretive network of around 3,000 “ghost” accounts on GitHub has quietly been manipulating pages on the code-hosting website to promote malware and phishing links, according to new research seen by WIRED.

Since at least June last year, according to researchers at cybersecurity company Check Point, a cybercriminal they dubbed “Stargazer Goblin” has been hosting malicious code repositories on the Microsoft-owned platform. GitHub is the world’s largest open-source code website, hosting millions of developers’ work. As well as uploading malicious repositories, Stargazer Goblin has been boosting the pages by using GitHub’s own community tools.

Antonis Terefos, a malware reverse engineer at Check Point who discovered the nefarious behavior, says the persona behind the network uses their false accounts to “star,” “fork,” and “watch” the malicious pages.

[…]

The Stargazers Ghost Network, which Check Point named after one of the first accounts they spotted, has been spreading malicious GitHub repositories that offer downloads of social media, gaming, and cryptocurrency tools. For instance, pages might be claiming to provide code to run a VPN or license a version of Adobe’s Photoshop. These are mostly targeting Windows users, the research says, and aim to capitalize on people potentially searching for free software online.

The operator behind the network charges other hackers to use their services, which Check Point call “distribution as a service.” The harmful network has been spotted sharing various types of ransomware and info-stealer malware, Check Point says, including the Atlantida Stealer, Rhadamanthys, and the Lumma Stealer. Terefos says he discovered the network while researching instances of the Atlantida Stealer. The researcher says the network could be bigger than he expects, as he has also seen legitimate GitHub accounts being taken over using stolen login details.

[…]

The Stargazer Goblin threat actor identified by Check Point sells their services through ads on cybercrime forums and also through a Telegram account. A posts on a Russian-language cybercrime forum advertises 100 stars for $10 and 500 for $50 and says they can provide clones of existing repositories and trusted accounts. “For GitHub, the process looks organic,”

[…]

The Check Point engineer also says he identified one YouTube “ghost” account that was sharing malicious links via video, indicating that the network could be more encompassing. “I think this is not the whole picture,” Terefos says.

Source: A Hacker ‘Ghost’ Network Is Quietly Spreading Malware on GitHub | WIRED

US Congress Wants To Let Private Companies Own The Law – set standards you must comply with but can’t actually find or see easily

It sounds absolutely batty that there is a strong, bipartisan push to lock up aspects of our law behind copyright. But it’s happening. Even worse, the push is on to include this effort to lock up the law in the “must pass” National Defense Authorization Act (NDAA). This is the bill that Congress lights up like a Christmas tree with the various bills they know they can’t pass normally, every year.

And this year, they’re pushing the Pro Codes Act, a dangerous bill to lock up the law that has bipartisan support.

[…]

There are lots of standards out there, often developed by industry groups. These standards can be on all sorts of subjects, such as building codes or consumer safety or indicators for hazardous materials. The list goes on and on and on. Indeed, the National Institute of Standards and Technology has a database of over 27,000 such standards that are “included by reference” into law.

This is where things get wonky. Since many of these standards are put together by private organizations (companies, standards bodies, whatever), some of them could qualify for copyright. But, then, lawmakers will often require certain products and services to meet those standards. That is, the laws will “reference” those standards (for example, how to have a building be built in a safe or non-polluting manner).

Many people, myself included, believe that the law must be public. How can the rule of law make any sense at all if the public cannot freely access and read the law? Thus, we believe that when a standard gets “incorporated by reference” into the law, it should become public domain, for the simple fact that the law itself must be public domain.

[…]

Two years ago, there was a pretty big victory, noting that his publishing of standards that are “incorporated by reference” is fair use.

But industry standards bodies hate this, because often a large part of their own revenue stream comes from selling access to the standards they create, including those referenced by laws.

So they lobbied Congress to push this Pro Codes Act, which explicitly says that technical standards incorporated by reference retain copyright. To try to stave off criticism (and to mischaracterize the bill publicly), the law says that standards bodies retain the copyright if the standards body makes the standard available on a free publicly accessible online source.

[…]

They added this last part to head off criticism that the law is “locked up.” They say things like “see, under this law, the law has to be freely available online.”

But that’s missing the point. It still means that the law itself is only available from one source, in one format. And while it has to be “publicly accessible online at no monetary cost,” that does not mean that it has to be publicly accessible in an easy or useful manner. It does not mean that there won’t be limitations on access or usage.

It is locking up the law.

But, because the law says that those standards must be released online free of cost, it allows the supporters of this law, like Issa, to falsely portray the law as “enhancing public access” to the laws.

That’s a lie.

[…]

t flies in the face of the very fundamental concept that “no one can own the law,” as the Supreme Court itself recently said. And to try and shove it into a must pass bill about funding the military is just ridiculously cynical, while demonstrating that its backers know it can’t pass through regular process.

Instead, this is an attempt by Congress to say, yes, some companies do get to own the law, so long as they put up a limited, difficult to use website by which you can see parts of the law.

Library groups and civil society groups are pushing back on this (disclaimer: we signed onto this letter). Please add your voice and tell Congress not to lock up the law.

Source: Congress Wants To Let Private Companies Own The Law | Techdirt

FTC asks 8 big names to explain surveillance pricing tech

The US Federal Trade Commission (FTC) has launched an investigation into “surveillance pricing,” a phenomenon likely familiar to anyone who’s had to buy something in an incognito browser window to avoid paying a premium.

Surveillance pricing, according to the FTC, is the use of algorithms, AI, and other technologies – most crucially combined with personal information about shoppers like location, demographics, credit, the computer used, and browsing/shopping history – “to categorize individuals and set a targeted price for a product or service.”

In other words, the regulator is concerned about the use of software to artificially push up prices for people based on their perceived circumstances, something that incognito mode can counter by more or less cloaking your online identity.

[…]

But don’t mistake this for legal action – at this point it’s all about “helping the FTC better understand the opaque market for [surveillance pricing] products by third-party intermediaries,” the government watchdog said.

“Firms that harvest Americans’ personal data can put people’s privacy at risk,” FTC boss Lina Khan opined. “Now firms could be exploiting this vast trove of personal information to charge people higher prices.”

It’s not exactly a secret that sellers manipulate online prices, or that consumers know about it – recommendations to shop online in an incognito browser window are plentiful and go back years.

In this case, the FTC wants to know more about how Mastercard, JPMorgan Chase, Accenture and McKinsey & Co are offering surveillance pricing products. It also wants the same information from some names you may not have heard of, like Revionics, which offers surveillance pricing services to companies like The Home Depot and Tractor Supply; Task Software, which counts McDonald’s and Starbucks among its customers; PROS, which supports Nestle, DigiKey and others; and Bloomreach, which provides similar services like Williams Sonoma, Total Wine, and Virgin Experience Days.

The FTC wants to probe what types of surveillance pricing products exist, the services they offer, how they’re collecting customer data and where it’s coming from, information about who they offered services to, and what sort of impacts these may have on consumers and the prices they pay.

[…]

Source: FTC asks 8 big names to explain surveillance pricing tech • The Register

Switzerland now requires all government software to be open source. Sort of.

Several European countries are betting on open-source software. In the United States, eh, not so much. In the latest news from across the Atlantic, Switzerland has taken a major step forward with its “Federal Law on the Use of Electronic Means for the Fulfillment of Government Tasks” (EMBAG). This groundbreaking legislation mandates using open-source software (OSS) in the public sector.

This new law requires all public bodies to disclose the source code of software developed by or for them unless third-party rights or security concerns prevent it. This “public money, public code” approach aims to enhance government operations’ transparency, security, and efficiency.

[…]

Source: Switzerland now requires all government software to be open source | ZDNET

The Netherlands has a similar law, but you would be amazed how flimsy the accepted excuses are that claim that software should be delivered under a closed-source exception.

Google’s reCAPTCHAv2 is just labor exploitation, boffins say

Google promotes its reCAPTCHA service as a security mechanism for websites, but researchers affiliated with the University of California, Irvine, argue it’s harvesting information while extracting human labor worth billions.

The term CAPTCHA stands for “Completely Automated Public Turing test to tell Computers and Humans Apart,” and, as Google explains, it refers to a challenge-response authentication scheme that presents people with a puzzle or question that a computer cannot solve.

[…]

The utility of reCAPTCHA challenges appears to be significantly diminished in an era when AI models can answer CAPTCHA questions almost as well as humans.

Show me the money

UC Irvine academics contend CAPTCHAs should be binned.

In a paper [PDF] titled “Dazed & Confused: A Large-Scale Real-World User Study of reCAPTCHAv2,” authors Andrew Searles, Renascence Tarafder Prapty, and Gene Tsudik argue that the service should be abandoned because it’s disliked by users, costly in terms of time and datacenter resources, and vulnerable to bots – contrary to its intended purpose.

“I believe reCAPTCHA’s true purpose is to harvest user information and labor from websites,” asserted Andrew Searles, who just completed his PhD and was the paper’s lead author, in an email to The Register.

“If you believe that reCAPTCHA is securing your website, you have been deceived. Additionally, this false sense of security has come with an immense cost of human time and privacy.”

The paper, released in November 2023, notes that even back in 2016 researchers were able to defeat reCAPTCHA v2 image challenges 70 percent of the time. The reCAPTCHA v2 checkbox challenge is even more vulnerable – the researchers claim it can be defeated 100 percent of the time.

reCAPTCHA v3 has fared no better. In 2019, researchers devised a reinforcement learning attack that breaks reCAPTCHAv3’s behavior-based challenges 97 percent of the time.

[…]

The authors’ research findings are based on a study of users conducted over 13 months in 2022 and 2023. Some 9,141 reCAPTCHAv2 sessions were captured from unwitting participants and analyzed, in conjunction with a survey completed by 108 individuals.

Respondents gave the reCAPTCHA v2 checkbox puzzle 78.51 out of 100 on the System Usability Scale, while the image puzzle rated only 58.90. “Results demonstrate that 40 percent of participants found the image version to be annoying (or very annoying), while <10 percent found the checkbox version annoying,” the paper explains.

But when examined in aggregate, reCAPTCHA interactions impose a significant cost – some of which Google captures.

“In terms of cost, we estimate that – during over 13 years of its deployment – 819 million hours of human time has been spent on reCAPTCHA, which corresponds to at least $6.1 billion USD in wages,” the authors state in their paper.

“Traffic resulting from reCAPTCHA consumed 134 petabytes of bandwidth, which translates into about 7.5 million kWhs of energy, corresponding to 7.5 million pounds of CO2. In addition, Google has potentially profited $888 billion from cookies [created by reCAPTCHA sessions] and $8.75–32.3 billion per each sale of their total labeled data set.”

Asked whether the costs Google shifts to reCAPTCHA users in the form of time and effort are unreasonable or exploitive, Searles pointed to the original white paper on CAPTCHAs by Luis von Ahn, Manuel Blum, and John Langford – which includes a section titled “Stealing cycles from humans.”

[…]

As the paper points out, image-labeling challenges have been around since 2004 and by 2010 there were attacks that could beat them 100 percent of the time. Despite this, Google introduced reCAPTCHA v2 with a fall-back image recognition security challenge that had been proven to be insecure four years earlier.

This makes no sense, the authors argue, from a security perspective. But it does make sense if the goal is obtaining image labeling data – the results of users identifying CAPTCHA images – which Google happens to sell as a cloud service.

“The conclusion can be extended that the true purpose of reCAPTCHA v2 is a free image-labeling labor and tracking cookie farm for advertising and data profit masquerading as a security service,” the paper declares.

[…]

Source: Google’s reCAPTCHAv2 is just labor exploitation, boffins say • The Register