About Robin Edgar

Organisational Structures | Technology and Science | Military, IT and Lifestyle consultancy | Social, Broadcast & Cross Media | Flying aircraft

Spain, Austria not convinced location data is personal

[…]

EU privacy group NOYB (None of your business), set up by privacy warrior Max “Angry Austrian” Schrems, said on Tuesday it appealed a decision of the Spanish Data Protection Authority (AEPD) to support Virgin Telco’s refusal to provide the location data it has stored about a customer.

In Spain, according to NOYB, the government still requires telcos to record the metadata of phone calls, text messages, and cell tower connections, despite Court of Justice (CJEU) decisions that prohibit data retention.

A Spanish customer demanded that Virgin reveal his personal data, as allowed under the GDPR. Article 15 of the GDPR guarantees individuals the right to obtain their personal data from companies that process and store it.

[…]

Virgin, however, refused to provide the customer’s location data when a complaint was filed in December 2021, arguing that only law enforcement authorities may demand that information. And the AEPD sided with the company.

NOYB says that Virgin Telco failed to explain why Article 15 should not apply since the law contains no such limitation.

“The fundamental right to access is comprehensive and clear: users are entitled to know what data a company collects and processes about them – including location data,” argued Felix Mikolasch, a data protection attorney at NOYB, in a statement. “This is independent from the right of authorities to access such data. In this case, there is no relevant exception from the right to access.”

[…]

The group said it filed a similar appeal last November in Austria, where that country’s data protection authority similarly supported Austrian mobile provider A1’s refusal to turn over customer location data. In that case, A1’s argument was that location data should not be considered personal data because someone else could have used the subscriber phone that generated it.

[…]

Location data is potentially worth billions. According to Fortune Business Insights, the location analytics market is expected to bring in $15.76 billion in 2022 and $43.97 billion by 2029.

Outside the EU, the problem is the availability of location data, rather than lack of access. In the US, where there’s no federal data protection framework, the government is a major buyer of location data – it’s more convenient than getting a warrant.

And companies that can obtain location data, often through mobile app SDKs, appear keen to monetize it.

In 2020, the FCC fined the four largest wireless carriers in the US for failing to protect customer location data in accordance with a 2018 commitment to do so.

Source: Spain, Austria not convinced location data is personal • The Register

YouTube Has a Hidden List of Keyboard Shortcuts

[…]

what’s this secret shortcut that unlocks all hidden keyboard shortcuts? Shift + /. Or, of course, ?.

This button combo is your ticket to see the hidden list of keyboard shortcuts for your favorite websites. I first stumbled upon it while browsing YouTube: Somehow, I accidentally hit Shift + /, and, all of a sudden, I was presented with this complete collection of keyboard shortcuts for the site. Many of these shortcuts I already knew, as you might already know: K plays and pauses a video, J and L rewinds and fast forwards, respectively. However, other shortcuts might come as a surprise: You can rewind and fast forward frame-by-frame using , and . while paused. You can also slow down or speed up playback speed using < and > (Shift + ,) and (Shift + .).

It’s worth scanning the full list to see if any of these keyboard shortcuts are new to you, and whether some of them might actually be helpful during your next YouTube binge. As someone who takes screenshots on YouTube as part of his job, the frame-by-frame scanning is particularly useful.

Image for article titled YouTube Has a Hidden List of Keyboard Shortcuts
Screenshot: Jake Peterson

Many websites hide their keyboard shortcuts from users, too

It’s not just YouTube: Other popular websites you use every day hide keyboard shortcuts behind Shift + /. Twitter, for example, taught me that g + m launches DMs, while u and x can mute and block an account, respectively. Facebook also has a list of keyboard shortcuts: You might know that L likes a post, but did you know you can use / to search Facebook, or that you can pin keyboard shortcuts to the bottom right corner of the window that change depending on what you’re doing? That’s the most helpful option I’ve seen so far.

[…]

Source: YouTube Has a Hidden List of Keyboard Shortcuts

The 10 Best Illusions of the Year 2021

the finalists of this year’s Best Illusion of the Year Contest aren’t going to leave your brain feeling any less raddled, confused, or exhausted as we quickly approach the new year. As they do every year, a group of talented neurologists, visual scientists, ophthalmologists, and artists have come together to create and celebrate the best optical illusions of the year, and once again their creations will make you wonder if your brain really is completely broken.

Source: The 10 Best Illusions of the Year

Scientists develop antimicrobial, plant-based food wrap designed to replace plastic

Aiming to produce environmentally friendly alternatives to plastic food wrap and containers, a Rutgers scientist has developed a biodegradable, plant-based coating that can be sprayed on foods, guarding against pathogenic and spoilage microorganisms and transportation damage.

The scalable process could potentially reduce the adverse environmental impact of food packaging as well as protect .

[…]

what we have come up with is a scalable technology, which enables us to turn biopolymers, which can be derived as part of a circular economy from food waste, into smart fibers that can wrap food directly. This is part of new generation, ‘smart’ and ‘green’ .”

The research was conducted in concert with scientists at Harvard University and funded by the Harvard-Nanyang Technological University/Singapore Sustainable Nanotechnology Initiative.

Their article, published in the science journal Nature Food, describes the new kind of packaging technology using the polysaccharide/biopolymer-based fibers. Like the webs cast by the Marvel comic book character Spider-Man, the stringy material can be spun from a heating device that resembles a hair dryer and “shrink-wrapped” over foods of various shapes and sizes, such as an avocado or a sirloin steak. The resulting material that encases is sturdy enough to protect bruising and contains antimicrobial agents to fight spoilage and such as E. coli and listeria.

The research paper includes a description of the technology called focused rotary jet spinning, a process by which the biopolymer is produced, and quantitative assessments showing the coating extended the of avocados by 50 percent. The coating can be rinsed off with water and degrades in soil within three days, according to the study.

[…]

The paper describes how the new fibers encapsulating the food are laced with naturally occurring antimicrobial ingredients—thyme oil, citric acid and nisin. Researchers in the Demokritou research team can program such smart materials to act as sensors, activating and destroying bacterial strains to ensure food will arrive untainted. This will address growing concern over food-borne illnesses as well as lower the incidence of spoilage, Demokritou said.

[…]

More information: Huibin Chang et al, High-throughput coating with biodegradable antimicrobial pullulan fibres extends shelf life and reduces weight loss in an avocado model, Nature Food (2022). DOI: 10.1038/s43016-022-00523-w , www.nature.com/articles/s43016-022-00523-w

 

Yi Wang et al, Protecting foods with biopolymer fibres, Nature Food (2022). DOI: 10.1038/s43016-022-00519-6 , www.nature.com/articles/s43016-022-00519-6

Journal information: Nature Food

Source: Scientists develop antimicrobial, plant-based food wrap designed to replace plastic

Virpil VPC Desk Mount linear rail adapter for MongoosT / WarBRD / Stream Deck by SciMonster – Thingiverse

https://www.youtube.com/watch?v=VWXf6EsfZ4c&t=62s

Mount your Virpil Throttle and Stick to linear rails so you can slide them along your desk.
This allows you to move your HOTAS aside when you use the computer for other work.
When flying your aircraft or spaceship, a spring-loaded locking meachanism holds your HOTAS securely in place.

The files are designed for the VPC Desk Mount V2/V3:
https://virpil-controls.eu/vpc-desk-mount-angled-adapter-mt-50-throttle.html
which is compatible with the VPC MongoosT-50 Throttle.

An adapter plate for Virpil Flightsticks (VPC WarBRD Base) is included (with and without a mounting option for the 15 button Elgato Stream Deck (MK.1). MongoosT Base untested.

Source: Virpil VPC Desk Mount linear rail adapter for MongoosT / WarBRD / Stream Deck by SciMonster – Thingiverse

Attacking ML systems by changing  the order of the training data

Machine learning is vulnerable to a wide variety of attacks. It is now well understood that by changing the underlying data distribution, an adversary can poison the model trained with it or introduce backdoors. In this paper we present a novel class of training-time attacks that require no changes to the underlying dataset or model architecture, but instead only change the order in which data are supplied to the model. In particular, we find that the attacker can either prevent the model from learning, or poison it to learn behaviours specified by the attacker. Furthermore, we find that even a single adversarially-ordered epoch can be enough to slow down model learning, or even to reset all of the learning progress. Indeed, the attacks presented here are not specific to the model or dataset, but rather target the stochastic nature of modern learning procedures. We extensively evaluate our attacks on computer vision and natural language benchmarks to find that the adversary can disrupt model training and even introduce backdoors.

Source: [2104.09667] Manipulating SGD with Data Ordering Attacks

Chinese Officials Are Weaponizing COVID Health Tracker to Block Protests

Chinese bank depositors planning a protest about their frozen funds saw their health code mysteriously turn red and were stopped from traveling to the site of a rally, confirming fears that China’s vast COVID-tracking system could be weaponized as a powerful tool to stifle dissent.

A red health code designated the would-be protesters as suspected or confirmed COVID-19 patients, limiting their movement and access to public transportation. Their rallies in the central Henan province this week were thwarted as some were forced into quarantine and others detained by police.

A 38-year-old software engineer was among hundreds who could not access their savings at four rural banks since mid-April. She had planned to travel from her home in Jiangxi province to Zhengzhou, Henan’s capital city, to join a group petition this week to demand her money back. But her health code turned from green to red shortly after she bought a train ticket on Sunday. She said a nucleic test for COVID she took the night before came back negative and her hometown has not reported any infection recently.

[…]

Source: Chinese Officials Are Weaponizing COVID Health Tracker to Block Protests

Facebook and Anti-Abortion Clinics Are Collecting Highly Sensitive Info on Would-Be Patients

Facebook is collecting ultra-sensitive personal data about abortion seekers and enabling anti-abortion organizations to use that data as a tool to target and influence people online, in violation of its own policies and promises.

In the wake of a leaked Supreme Court opinion signaling the likely end of nationwide abortion protections, privacy experts are sounding alarms about all the ways people’s data trails could be used against them if some states criminalize abortion.

A joint investigation by Reveal from The Center for Investigative Reporting and The Markup found that the world’s largest social media platform is already collecting data about people who visit the websites of hundreds of crisis pregnancy centers, which are quasi-health clinics, mostly run by religiously aligned organizations whose mission is to persuade people to choose an option other than abortion.

[…]

Reveal and The Markup have found Facebook’s code on the websites of hundreds of anti-abortion clinics. Using Blacklight, a Markup tool that detects cookies, keyloggers and other types of user-tracking technology on websites, Reveal analyzed the sites of nearly 2,500 crisis pregnancy centers – with data provided by the University of Georgia – and found that at least 294 shared visitor information with Facebook. In many cases, the information was extremely sensitive – for example, whether a person was considering abortion or looking to get a pregnancy test or emergency contraceptives.

[…]

Source: Facebook and Anti-Abortion Clinics Are Collecting Highly Sensitive Info on Would-Be Patients – Reveal

Telegram criticizes Apple for subpar web app features on iOS, crippling app

A week after confirming plans for Telegram Premium, the messaging platform’s CEO, Pavel Durov, is again criticizing Apple’s approach to its Safari browser for stifling the efforts of web developers.

Durov would very much like his web-based messaging platform, Telegram Web, to be delivered as a web app rather than native, but is prevented from offering users a full-fat experience on Apple’s mobile devices due to limitations in the iOS Safari browser.

There’s no option for web developers on Apple’s iPhone and iPad to use anything but Safari, and features taken for granted on other platforms have yet to make it to iOS.

“We suspect that Apple may be intentionally crippling its web apps,” claimed Durov, “to force its users to download more native apps where Apple is able to charge its 30 percent commission.”

[…]

Source: Telegram criticizes Apple for subpar web app features on iOS • The Register

Samsung accused of cheating on hardware benchmarks – again

[…]

The South Korean titan was said to have unfairly goosed Galaxy Note 3 phone benchmarks in 2013, and faced with similar allegations about the Galaxy S4 in 2018 settled that matter for $13.4 million.

This time Samsung has allegedly fudged the results for its televisions, specifically the S95B QD-OLED and QN95B Neo OLED LCD TVs.

These accusations were raised this month by YouTube channel HDTVTest on the S95B, and by reviews site FlatpanelsHD on the QN95B. The claims boils down to Samsung allegedly using an algorithm to detect when benchmarking software was running on the set and adjusting the color and artificially boosting luminance by up to 80 percent during the test to make the equipment look better in reviews.

According to the FlatpanelsHD report, those levels of brightness can’t be sustained during normal use without damaging the TV’s backlight panel.

An algorithm to detect and hoodwink benchmarking software is just what Samsung was accused of employing in those earlier examples.

[…]

Source: Samsung accused of cheating on hardware benchmarks – again • The Register

Time to throw out those older, vulnerable Cisco SMB routers – they’re not gonna fix critical bugs for you

[…]Cisco has just released fixes for seven flaws, two of which are not great.

First on the priority list should be a critical vulnerability in its enterprise security appliances, and the second concerns another critical bug in some of its outdated small business routers that it’s not going to fix. In other words, junk your kit or somehow mitigate the risk.

[…]

The first security flaw, tracked as CVE-2022-20798, is an authentication bypass vulnerability in the virtual and hardware versions of Cisco Secure Email and Web Manager, and the Cisco Email Security Appliance. It occurs when the device uses Lightweight Directory Access Protocol (LDAP) for external authentication, and the good news is that Cisco disables external authentication by default.

A remote user could exploit the flaw “by entering a specific input on the login page of the affected device,” the networking titan warned in a security advisory this week. Once the intruder has gained unauthorized access, they could perform any number of illicit actions from the web-based interface including crashing the device.

Another high-severity flaw, CVE-2022-20664, in these same virtual and hardware appliances could allow a remote, authenticated user to steal credentials from a LDAP external authentication server connected to a device. However, exploiting this bug would require valid operator-level, or higher, credentials. It received a CVSS score of 7.7, and Cisco issued a software update to fix this bug, too.

More e-waste

The second critical vulnerability exists in the web-based management interface of Cisco Small Business RV110W, RV130, RV130W, and RV215W routers, which the vendor stopped selling [PDF] in 2019. Cisco isn’t issuing a fix for this one, and said there’s no workaround. Instead, customers should upgrade to newer hardware.

The flaw, tracked as CVE-2022-20825, also received a 9.8 CVSS score, and it’s due to insufficient user input validation of incoming HTTP packets.

“An attacker could exploit this vulnerability by sending a crafted request to the web-based management interface,” according to Cisco’s security alert. “A successful exploit could allow the attacker to execute arbitrary commands on an affected device using root-level privileges,” and also stop and restart the device, resulting in a denial of service.

In addition to the two critical and one high-severity vulnerabilities, Cisco disclosed an additional four medium-severity flaws on Wednesday.

[…]

Source: Time to throw out those older, vulnerable Cisco SMB routers • The Register

Julian Assange Extradition to US Approved by UK Government

Julian Assange—founder of the whistleblowing website WikiLeaks—can now be extradited from the United Kingdom to the United States, where he will face charges of espionage.

In April, a London court filed a formal extradition order for Assange, and the UK Home Secretary approved the order today, meaning that Assange can be extradited back to the United States. According to CNBC , Assange is facing 18 charges of espionage for his involvement with WikiLeaks, the website that published hundreds of thousands of classified military documents in 2010 and 2011.

Assange has been in prison or the Ecuadorian Embassy in London for much of the last decade. He’s currently being held in a high-security prison in London. Assange has the right to appeal today’s decision within 14 days, and WikiLeaks indicated it would be doing just that in a statement posted on Twitter this morning.

“This is a dark day for press freedom and for British democracy,” WikiLeaks said. “Julian did nothing wrong. He has committed no crime and is not a criminal. He is a journalist and a publisher, and he is being punished for doing his job.”

[…]

Source: Julian Assange Extradition to US Approved by UK Government

The Earth moves far under our feet: A new study shows that the inner core oscillates

USC scientists have found evidence that the Earth’s inner core oscillates, contradicting previously accepted models that suggested it consistently rotates at a faster rate than the planet’s surface.

Their study, published today in Science Advances, shows that the inner core changed direction in the six-year period from 1969–74, according to the analysis of seismic data. The scientists say their model of inner core movement also explains the variation in the length of day, which has been shown to oscillate persistently for the past several decades.

“From our findings, we can see the Earth’s surface shifts compared to its inner core, as people have asserted for 20 years,” said John E. Vidale, co-author of the study and Dean’s Professor of Earth Sciences at USC Dornsife College of Letters, Arts and Sciences. “However, our latest observations show that the inner core spun slightly slower from 1969–71 and then moved the other direction from 1971–74. We also note that the length of day grew and shrank as would be predicted.

“The coincidence of those two observations makes oscillation the likely interpretation.”

[…]

Utilizing data from the Large Aperture Seismic Array (LASA), a U.S. Air Force facility in Montana, researcher Wei Wang and Vidale found the inner core rotated slower than previously predicted, approximately 0.1 degrees per year. The study analyzed waves generated from Soviet underground nuclear bomb tests from 1971–74 in the Arctic archipelago Novaya Zemlya using a novel beamforming technique developed by Vidale.

The new findings emerged when Wang and Vidale applied the same methodology to a pair of earlier atomic tests beneath Amchitka Island at the tip of the Alaskan archipelago—Milrow in 1969 and Cannikin in 1971. Measuring the compressional waves resulting from the , they discovered the inner core had reversed direction, sub-rotating at least a tenth of a degree per year.

[…]

The study does support the speculation that the inner core oscillates based on variations in the length of day—plus or minus 0.2 seconds over six years—and geomagnetic fields, both of which match the theory in both amplitude and phase. Vidale says the findings provide a compelling theory for many questions posed by the research community.

“The inner core is not fixed—it’s moving under our feet, and it seems to going back and forth a couple of kilometers every six years,” Vidale said. “One of the questions we tried to answer is, does the inner core progressively move or is it mostly locked compared to everything else in the long term? We’re trying to understand how the formed and how it moves over time—this is an important step in better understanding this process.”

Source: The Earth moves far under our feet: A new study shows that the inner core oscillates

US Copyright Office sued for denying AI model authorship

The US Copyright Office and its director Shira Perlmutter have been sued for rejecting one man’s request to register an AI model as the author of an image generated by the software.

You guessed correct: Stephen Thaler is back. He said the digital artwork, depicting railway tracks and a tunnel in a wall surrounded by multi-colored, pixelated foliage, was produced by machine-learning software he developed. The author of the image, titled A Recent Entrance to Paradise, should be registered to his system, Creativity Machine, and he should be recognized as the owner of the copyrighted work, he argued.

(Owner and author are two separate things, at least in US law: someone who creates material is the author, and they can let someone else own it.)

Thaler’s applications to register and copyright the image behalf of Creativity Machine, however, have been turned down by the Copyright Office twice. Now, he has sued the government agency and Perlmutter. “Defendants’ refusal to register the copyright claim in the work is contrary to law,” Thaler claimed in court documents [PDF] filed this month in a federal district court in Washington DC.

“The agency actions here were arbitrary, capricious, an abuse of discretion and not in accordance with the law, unsupported by substantial evidence, and in excess of Defendants’ statutory authority,” the lawsuit claimed.

Thaler’s lawyer, Ryan Abbott, believes the Copyright Office should overturn its previous decision and process Thaler’s original application. “The refusal to register the copyright claim in the work should be set aside and the application reinstated,” he argued.

[…]

Source: US Copyright Office sued for denying AI model authorship • The Register

Scientists covered a robot finger in living human skin

[…] At the moment, robots are sometimes coated in silicone rubber to give them a fleshy appearance, but the rubber lacks the texture of human skin, he says.

To make more realistic-looking skin, Takeuchi and his colleagues bathed a plastic robot finger in a soup of collagen and human skin cells called fibroblasts for three days. The collagen and fibroblasts adhered to the finger and formed a layer similar to the dermis, which is the second-from-top layer of human skin.

Next, they gently poured other human skin cells called keratinocytes onto the finger to recreate the upper layer of human skin, called the epidermis.

The resulting 1.5-millimetre-thick skin was able to stretch and contract as the finger bent backwards and forwards. As it did this, it wrinkled like normal skin, says Takeuchi. “It is much more realistic than silicone.”

The robot skin could also be healed when it was cut by grafting a collagen sheet onto the wound.

However, the skin began to dry out after a while since it didn’t have blood vessels to replenish it with moisture.

In the future, it may be possible to incorporate artificial blood vessels into the skin to keep it hydrated, as well as sweat glands and hair follicles to make it more realistic, says Takeuchi.

It should also be possible to make different skin colours by adding melanocytes, he says.

The researchers now plan to try coating a whole robot in the living skin. “But since this research field has the potential to build a new relationship between humans and robots, we need to carefully consider the risks and benefits of making it too realistic,” says Takeuchi.

Source: Scientists covered a robot finger in living human skin | New Scientist

Planting Undetectable Backdoors in Machine Learning Models

We show how a malicious learner can plant an undetectable backdoor into a classifier. On the surface, such a backdoored classifier behaves normally, but in reality, the learner maintains a mechanism for changing the classification of any input, with only a slight perturbation. Importantly, without the appropriate “backdoor key”, the mechanism is hidden and cannot be detected by any computationally-bounded observer. We demonstrate two frameworks for planting undetectable backdoors, with incomparable guarantees.
First, we show how to plant a backdoor in any model, using digital signature schemes. The construction guarantees that given black-box access to the original model and the backdoored version, it is computationally infeasible to find even a single input where they differ. This property implies that the backdoored model has generalization error comparable with the original model. Second, we demonstrate how to insert undetectable backdoors in models trained using the Random Fourier Features (RFF) learning paradigm or in Random ReLU networks. In this construction, undetectability holds against powerful white-box distinguishers: given a complete description of the network and the training data, no efficient distinguisher can guess whether the model is “clean” or contains a backdoor.
Our construction of undetectable backdoors also sheds light on the related issue of robustness to adversarial examples. In particular, our construction can produce a classifier that is indistinguishable from an “adversarially robust” classifier, but where every input has an adversarial example! In summary, the existence of undetectable backdoors represent a significant theoretical roadblock to certifying adversarial robustness.

Source: [2204.06974] Planting Undetectable Backdoors in Machine Learning Models

Testing firm Cignpost can profit from sale of Covid swabs with customer DNA

A large Covid-19 testing provider is being investigated by the UK’s data privacy watchdog over its plans to sell swabs containing customers’ DNA for medical research.

Source: Testing firm can profit from sale of Covid swabs | News | The Sunday Times

Find you: an airtag which Apple can’t find in unwanted tracking

[…]

In one exemplary stalking case, a fashion and fitness model discovered an AirTag in her coat pocket after having received a tracking warning notification from her iPhone. Other times, AirTags were placed in expensive cars or motorbikes to track them from parking spots to their owner’s home, where they were then stolen.

On February 10, Apple addressed this by publishing a news statement titled “An update on AirTag and unwanted tracking” in which they describe the way they are currently trying to prevent AirTags and the Find My network from being misused and what they have planned for the future.

[…]

Apple needs to incorporate non-genuine AirTags into their threat model, thus implementing security and anti-stalking features into the Find My protocol and ecosystem instead of in the AirTag itself, which can run modified firmware or not be an AirTag at all (Apple devices currently have no way to distinguish genuine AirTags from clones via Bluetooth).

The source code used for the experiment can be found here.

Edit: I have been made aware of a research paper titled “Who Tracks the Trackers?” (from November 2021) that also discusses this idea and includes more experiments. Make sure to check it out as well if you’re interested in the topic!

[…]

Survey of Alternative Displays

[Blair Nearl] has been working on an information database for artists and hackers – a collection of non-conventional display technologies available to us. We’ve covered this repository before, six years ago – since then, it’s moved to a more suitable platform, almost doubled in size, and currently covers over 40+ display technology types and related tricks. This database is something you should check out even if you’re not looking for a new way to display things right now, however, for its sheer educational and entertainment value alone.

[…]

If you’re ever wondered about the current state of technology when it comes to flexible or transparent displays, or looked for good examples of volumetric projection done in a variety of ways, this is the place to go. It also talks about interesting experimental technologies, like drone displays, plasma combustion or scanning fiber optics. Overall, if you’re looking to spend about half an hour learning about all the ways there are to visualize something, this database is worth a read. And, if there’s a display technology the author might’ve missed and you know something about, contributions are welcome!

Someone setting out to compile information about an extensive topic is always appreciated, and helps many hackers on their path. We’ve seen that done with 3D printer resin settings and SMD part codes, to name just a few. What’s your favourite hacker-maintained database?

Source: Alternative Display Technologies And Where To Find Them

Things like Transparent displays, volumetric displays, modified polarizers, e-ink, flexible displays, lasers and projectors, lightfield displays, head mounted displays, projection on water or fog, diffusion and distortion, switchable glass, drone displays, electrochromic paint, acoustic levitation display, plasma combustion and many more

The survey itself is here

Some of Canon’s wireless Pixma printers are stuck in reboot loops

Over the last day or two, there have been a growing number of reports by people who own certain Canon Pixma printers that the devices either won’t turn on at all or, once turned on, get stuck in a reboot loop, cycling on and off as long as they’re plugged in. Verge reader Jamie pointed us to posts on Reddit about the problem and Canon’s own support forum, citing problems with models including the MX490, MX492, MB2010, and MG7520.

Some believe their problem is due to a software update Canon pushed to the printers, but that hasn’t been confirmed yet. In response to an inquiry from The Verge, corporate communications senior director and general manager Christine Sedlacek said, “We are currently investigating this issue and hope to bring resolution shortly as customer satisfaction is our highest priority.”

Until there is an official update or fix, some people in the forums have found that disconnecting the printers from the internet is enough to keep them from rebooting, with control still possible via USB.

To get the printers to work while maintaining your connection to the internet and their connection to local network devices, one reply from a customer on Canon’s support forum suggests a method that many people report has worked for them. If you’re experienced with network setups, DNS servers, and IP addresses, it could be worth trying, but for most people, I’d recommend waiting for an official solution.

To follow their steps, then, after taking your internet offline, turn on the printer, go into its network settings, and, under web service setup, select DNS server setup and choose manual setup. In that section, input an internal network address (192.168.X.X, with numbers replacing X that aren’t in use by any other devices on your local network), press “OK,” and then press “no” for a secondary DNS server. This keeps the printer connected to your router without accessing the wider internet, and, for some reason, has been enough to stop the devices from rebooting.

Source: Some of Canon’s wireless Pixma printers are stuck in reboot loops – The Verge

What Is Pegasus Spyware? Why is it important? Infographic

If you’ve been following the latest news on government surveillance scandals around the world, the name Pegasus may have popped up in your feed. It’s a complex story, so we’ve put together an infographic explainer that covers all the basics.

How does Pegasus work? Check. Which world leaders were targeted? Check. Astonishing subscription costs? Check. Gasp. Check. Our infographic should help you understand why NSO’s Pegasus software is in the news so much.

Check it out below, or download it in full here.

Source: What Is Pegasus? All About the Infamous Software (Infographic) – CyberGhost Privacy Hub

Fan’s Rare Recordings Of Lost 1963 Beatles’ Performances Can’t Be Heard, Because … Copyright

There’s a story in the Daily Mail that underlines why it is important for people to make copies. It concerns the re-surfacing of rare recordings of the Beatles:

In the summer of 1963, the BBC began a radio series called Pop Go The Beatles which went out at 5pm on Tuesdays on the Light Programme.

Each show featured the Beatles performing six or seven songs, recorded in advance but as live, in other words with no or minimal post-production.

The BBC had not thought it worth keeping the original recordings, even though they consisted of rarely heard material – mostly covers of old rock ‘n’ roll numbers. Fortunately, a young fan of the Beatles, Margaret Ashworth, used her father’s modified radio connected directly to a reel-to-reel tape recorder to make recordings of the radio shows, which meant they were almost of broadcast quality.

When the recording company EMI was putting together an album of material performed by the Beatles for the BBC, it was able to draw on these high-quality recordings, some of which were much better than the other surviving copies. In this case, it was just chance that Margaret Ashworth had made the tapes. The general message is that people shouldn’t do this, because “copyright”. There are other cases where historic cultural material would have been lost had people not made copies, regardless of what copyright law might say.

Margaret Ashworth thought it would be fun to put out the old programmes she had recorded on a Web site, for free, recreating the weekly schedules she had heard back in the 1960s. So she contacted the BBC for permission, but was told it would “not approve” the upload of her recordings to the Internet. As she writes:

after all these years, with the Beatles still extremely popular, it seems mean-spirited of the BBC not to allow these little time capsules to be broadcast, either by me or by the Corporation. I cannot believe there are copyright issues that cannot be solved.

Readers of this blog probably can.

Source: Fan’s Rare Recordings Of Lost Beatles’ Performances Can’t Be Heard, Because Copyright Ruins Everything | Techdirt

Microsoft’s free Top Gun ‘Flight Simulator’ expansion is finally here

Now that Top Gun: Maverick is finally reaching theaters, the matching Microsoft Flight Simulator expansion is launching as well. Microsoft and Asobo Studio have released the free add-on to both hype up the Tom Cruise movie and give you a taste of the US Navy’s real-world flight training. You’ll get a “Maverick Edition” livery for the F/A-18E Super Hornet fighter jet, but you’ll also learn how to land on an aircraft carrier, perform combat maneuvers and navigate challenging terrain at low altitude.

[…]

Source: Microsoft’s free Top Gun ‘Flight Simulator’ expansion is finally here | Engadget

Now Amazon to put creepy AI cameras in UK delivery vans

Amazon is installing AI-powered cameras in delivery vans to keep tabs on its drivers in the UK.

The technology was first deployed, with numerous errors that reportedly denied drivers’ bonuses after malfunctions, in the US. Last year, the internet giant produced a corporate video detailing how the cameras monitor drivers’ driving behavior for safety reasons. The same system is now being rolled out to vehicles in the UK.

Multiple cameras are placed under the front mirror. One is directed at the person behind the wheel, one faces the road, and two are located on either side to provide a wider view. The cameras do not record constant video, and are monitored by software built by Netradyne, a computer-vision startup focused on driver safety. This code uses machine-learning algorithms to figure out what’s going on in and around the vehicle. Delivery drivers can also activate the cameras to record footage if they want to, such as if someone’s trying to rob them or run them off the road. There is no microphone, for what it’s worth.

Audio alerts are triggered by some behaviors, such as if a driver fails to brake at a stop sign or is driving too fast. Other actions are silently logged, such as if the driver doesn’t wear a seat-belt or if a camera’s view is blocked. Amazon, reportedly in the US at least, records workers and calculates from their activities a score that affects their pay; drivers have previously complained of having bonuses unfairly deducted for behavior the computer system wrongly classified as reckless.

[…]

Source: Now Amazon to put ‘creepy’ AI cameras in UK delivery vans • The Register

GM Discloses Data Breach of Cars’ Locations, Mileage, Service

General Motors suffered a hack that exposed a significant amount of sensitive personal information on car owners—names, addresses, phone numbers, locations, car mileage, and maintenance history.

The Detroit-based automaker revealed details of the incident in a breach disclosure filed with the California Attorney General’s Office on May 16. The disclosure explains that malicious login activity was detected on an unspecified number of GM online user accounts between April 11 and 29. Further investigation revealed that the company had been hit with a credential stuffing attack, which saw hackers infiltrate user accounts to steal customer reward points, which they then redeemed for gift cards

[…]

In addition to the reward points theft, the incident also exposed a significant amount of user information. GM’s breach notification lays out a full list of the information that may have been compromised by the hackers:

  • first and last name
  • personal email address
  • home address
  • username
  • phone number
  • last known and saved favorite location
  • OnStar package (if applicable)
  • family members’ avatars and photos
  • profile picture
  • search and destination information
  • reward card activity
  • fraudulently redeemed reward points

[…]

Source: GM Discloses Data Breach of Cars’ Locations, Mileage, Service