×
China

Chinese Chess Champion Stripped of Title After Defecating In Hotel Bathtub (theguardian.com) 57

Agence France-Press reports: The world of Chinese chess is in uproar over rumors of cheating and a bad behavior scandal that saw the national champion stripped of his title on Monday after a victory celebration ended with him defecating in a hotel bathtub. Xiangqi, or Chinese chess, has been hugely popular for hundreds of years across Asia -- and 48-year-old Yan Chenglong beat dozens of contenders last week to win the title of "Xiangqi King" at a national tournament hosted by the Chinese Xiangqi Association. But his joy was short-lived, with the CXA on Monday announcing that Yan would have his title revoked and prize money confiscated after had been caught "disrupting public order" and displaying "extremely bad character."

The association was also forced to address rumors circulating online that Yan had cheated during the competition by using anal beads equipped with wireless transmitters to send and receive signals. Yan allegedly clenched and unclenched rhythmically to communicate information about the chess board via code to a computer, which then sent back instructions on what moves to make in the form of vibrations, according to reports circulating on the Chinese social site Weibo. "Based on our understanding of the situation, it is currently impossible to prove that Yan engaged in cheating via 'anal beads' as speculated on social media," the CXA said. But he was still stripped of his title and banned from playing for a year after his celebrations went wayward.

"Yan consumed alcohol with others in his room on the night of the 17th, and then he defecated in the bathtub of the room he was staying in on the 18th, in an act that damaged hotel property, violated public order and good morals, had a negative impact on the competition and the event of Xiangqi, and was of extremely bad character," the association said. The association did not disclose the amount of prize money Yan was forfeiting, but Xiangqi tournaments often promise winners tens of thousands of yuan (thousands of dollars).

Open Source

What Comes After Open Source? Bruce Perens Is Working On It (theregister.com) 89

An anonymous reader quotes a report from The Register: Bruce Perens, one of the founders of the Open Source movement, is ready for what comes next: the Post-Open Source movement. "I've written papers about it, and I've tried to put together a prototype license," Perens explains in an interview with The Register. "Obviously, I need help from a lawyer. And then the next step is to go for grant money." Perens says there are several pressing problems that the open source community needs to address. "First of all, our licenses aren't working anymore," he said. "We've had enough time that businesses have found all of the loopholes and thus we need to do something new. The GPL is not acting the way the GPL should have done when one-third of all paid-for Linux systems are sold with a GPL circumvention. That's RHEL." RHEL stands for Red Hat Enterprise Linux, which in June, under IBM's ownership, stopped making its source code available as required under the GPL. Perens recently returned from a trip to China, where he was the keynote speaker at the Bench 2023 conference. In anticipation of his conversation with El Reg, he wrote up some thoughts on his visit and on the state of the open source software community. One of the matters that came to mind was Red Hat.

"They aren't really Red Hat any longer, they're IBM," Perens writes in the note he shared with The Register. "And of course they stopped distributing CentOS, and for a long time they've done something that I feel violates the GPL, and my defamation case was about another company doing the exact same thing: They tell you that if you are a RHEL customer, you can't disclose the GPL source for security patches that RHEL makes, because they won't allow you to be a customer any longer. IBM employees assert that they are still feeding patches to the upstream open source project, but of course they aren't required to do so. This has gone on for a long time, and only the fact that Red Hat made a public distribution of CentOS (essentially an unbranded version of RHEL) made it tolerable. Now IBM isn't doing that any longer. So I feel that IBM has gotten everything it wants from the open source developer community now, and we've received something of a middle finger from them. Obviously CentOS was important to companies as well, and they are running for the wings in adopting Rocky Linux. I could wish they went to a Debian derivative, but OK. But we have a number of straws on the Open Source camel's back. Will one break it?"

Another straw burdening the Open Source camel, Perens writes, "is that Open Source has completely failed to serve the common person. For the most part, if they use us at all they do so through a proprietary software company's systems, like Apple iOS or Google Android, both of which use Open Source for infrastructure but the apps are mostly proprietary. The common person doesn't know about Open Source, they don't know about the freedoms we promote which are increasingly in their interest. Indeed, Open Source is used today to surveil and even oppress them." Free Software, Perens explains, is now 50 years old and the first announcement of Open Source occurred 30 years ago. "Isn't it time for us to take a look at what we've been doing, and see if we can do better? Well, yes, but we need to preserve Open Source at the same time. Open Source will continue to exist and provide the same rules and paradigm, and the thing that comes after Open Source should be called something else and should never try to pass itself off as Open Source. So far, I call it Post-Open." Post-Open, as he describes it, is a bit more involved than Open Source. It would define the corporate relationship with developers to ensure companies paid a fair amount for the benefits they receive. It would remain free for individuals and non-profit, and would entail just one license. He imagines a simple yearly compliance process that gets companies all the rights they need to use Post-Open software. And they'd fund developers who would be encouraged to write software that's usable by the common person, as opposed to technical experts.

Pointing to popular applications from Apple, Google, and Microsoft, Perens says: "A lot of the software is oriented toward the customer being the product -- they're certainly surveilled a great deal, and in some cases are actually abused. So it's a good time for open source to actually do stuff for normal people." The reason that doesn't often happen today, says Perens, is that open source developers tend to write code for themselves and those who are similarly adept with technology. The way to avoid that, he argues, is to pay developers, so they have support to take the time to make user-friendly applications. Companies, he suggests, would foot the bill, which could be apportioned to contributing developers using the sort of software that instruments GitHub and shows who contributes what to which products. Merico, he says, is a company that provides such software. Perens acknowledges that a lot of stumbling blocks need to be overcome, like finding an acceptable entity to handle the measurements and distribution of funds. What's more, the financial arrangements have to appeal to enough developers. "And all of this has to be transparent and adjustable enough that it doesn't fork 100 different ways," he muses. "So, you know, that's one of my big questions. Can this really happen?"
Perens believes that the General Public License (GPL) is insufficient for today's needs and advocates for enforceable contract terms. He also criticizes non-Open Source licenses, particularly the Commons Clause, for misrepresenting and abusing the open-source brand.

As for AI, Perens views it as inherently plagiaristic and raises ethical concerns about compensating original content creators. He also weighs in on U.S.-China relations, calling for a more civil and cooperative approach to sharing technology.

You can read the full, wide-ranging interview here.
China

China Is Stealing AI Secrets To Turbocharge Spying, US Says 50

U.S. officials are worried about hacking and insider theft of AI secrets, which China has denied. From a report: On a July day in 2018, Xiaolang Zhang headed to the San Jose, Calif., airport to board a flight to Beijing. He had passed the checkpoint at Terminal B when his journey was abruptly cut short by federal agents. After a tipoff by Apple's security team, the former Apple employee was arrested and charged with stealing trade secrets related to the company's autonomous-driving program. It was a skirmish in a continuing shadow war between the U.S. and China for supremacy in artificial intelligence. The two rivals are seeking any advantage to jump ahead in mastering a technology with the potential to reshape economies, geopolitics and war.

Artificial intelligence has been on the Federal Bureau of Investigation's list of critical U.S. technologies to protect, just as China placed it on a list of technologies it wanted its scientists to achieve breakthroughs on by 2025. China's AI capabilities are already believed to be formidable, but U.S. intelligence authorities have lately made new warnings beyond the threat of intellectual-property theft. Instead of just stealing trade secrets, the FBI and other agencies believe China could use AI to gather and stockpile data on Americans at a scale that was never before possible. China has been linked to a number of significant thefts of personal data over the years, and artificial intelligence could be used as an "amplifier" to support further hacking operations, FBI Director Christopher Wray said, speaking at a press conference in Silicon Valley earlier this year.
United States

To Stem North Korea's Missiles Program, White House Looks To Its Hackers (politico.com) 19

The Biden administration has spent much of the last two years bracing key U.S. networks and infrastructure against crippling cyberattacks from Russia, Iran and China. But it is following a different playbook as it ramps up its efforts to thwart digital threats from North Korea: Follow the crypto -- and stop it. From a report: Convinced North Korea primarily sees hacking as a way to funnel money back to the cash-strapped Kim Jong Un regime, the White House has focused on blocking the country's ability to launder the cryptocurrency it steals through its cyberattacks. In the last year, the administration has unveiled a flurry of sanctions against North Korean hacking groups, front companies and IT workers, and blacklisted multiple cryptocurrency services they use to launder stolen funds. Earlier this month, national security adviser Jake Sullivan announced a new partnership with Japan and South Korea aimed at cracking down on Pyongyang's crypto bonanza -- thereby choking off money to its nuclear and conventional weapons programs.

"In countering North Korean cyber operations, our first priority has been focusing on their crypto heists," Anne Neuberger, the National Security Council's top cybersecurity official, said in an interview. The stepped-up effort to blunt North Korea's cyber operations is fueled by growing alarm about where the fruits of those attacks are going, Neuberger said. Hacking, she argued, has enabled North Korea to "either evade sanctions or evade the steps the international community has taken to target their weapons proliferation ... their missile regime, and the growth in the number of launches we've seen."

Earth

CNN Shares Hopeful Signs for Our Fight Against Climate Change (cnn.com) 130

With everyone worrying about climate change, CNN shares a list of reasons to feel positive: The year 2023 is on track to see the biggest increase in renewable energy capacity to date, according to the International Energy Agency. China, the world's biggest climate polluter, has made lightning advances in renewables, with the country set to shatter its wind and solar target five years early. A report published in June found that China's solar capacity is now greater than the rest of the world's nations combined, in a surge described by the report's author, Global Energy Monitor, as "jaw-dropping...."

The popularity of electric vehicles has surged this year, with American sales at an all-time high. People in China and Europe are snapping up EVs in large numbers as well... Americans purchased 1 million fully electric vehicles in 2023, an annual record, according to a report from Bloomberg New Energy Finance. Electric vehicles accounted for about 8% of all new vehicles sales in the US during the first half of 2023, according to the report. In China, EVs accounted for 19% of all vehicle sales, and worldwide, they made up 15% of new passenger vehicle sales. EV sales in Europe were up 47% in the first nine months of 2023, according to data from the European Automobile Manufacturers Association (EAMA)

Other positive developments from the article:
  • "For more than six days straight, between October 31 to November 6, the nation of more than 10 million people relied solely on renewable energy sources — setting an exciting example for the rest of the world."
  • "Deforestation in Brazil fell by 22.3% in the 12 months through July, according to data from the national government, as President Luiz Ignácio Lula da Silva started to make progress on his pledge to rein in the rampant forest destruction that occurred under his predecessor..."
  • "The Earth's ozone layer is on track to recover completely within decades, a UN-backed panel of experts announced in January, as ozone-depleting chemicals are phased out across the world."

United States

US Water Utilities Hacked After Default Passwords Set to '1111', Cybersecurity Officials Say (fastcompany.com) 84

An anonymous reader shared this report from Fast Company: Providers of critical infrastructure in the United States are doing a sloppy job of defending against cyber intrusions, the National Security Council tells Fast Company, pointing to recent Iran-linked attacks on U.S. water utilities that exploited basic security lapses [earlier this month]. The security council tells Fast Company it's also aware of recent intrusions by hackers linked to China's military at American infrastructure entities that include water and energy utilities in multiple states.

Neither the Iran-linked or China-linked attacks affected critical systems or caused disruptions, according to reports.

"We're seeing companies and critical services facing increased cyber threats from malicious criminals and countries," Anne Neuberger, the deputy national security advisor for cyber and emerging tech, tells Fast Company. The White House had been urging infrastructure providers to upgrade their cyber defenses before these recent hacks, but "clearly, by the most recent success of the criminal cyberattacks, more work needs to be done," she says... The attacks hit at least 11 different entities using Unitronics devices across the United States, which included six local water facilities, a pharmacy, an aquatics center, and a brewery...

Some of the compromised devices had been connected to the open internet with a default password of "1111," federal authorities say, making it easy for hackers to find them and gain access. Fixing that "doesn't cost any money," Neuberger says, "and those are the kinds of basic things that we really want companies urgently to do." But cybersecurity experts say these attacks point to a larger issue: the general vulnerability of the technology that powers physical infrastructure. Much of the hardware was developed before the internet and, though they were retrofitted with digital capabilities, still "have insufficient security controls," says Gary Perkins, chief information security officer at cybersecurity firm CISO Global. Additionally, many infrastructure facilities prioritize "operational ease of use rather than security," since many vendors often need to access the same equipment, says Andy Thompson, an offensive cybersecurity expert at CyberArk. But that can make the systems equally easy for attackers to exploit: freely available web tools allow anyone to generate lists of hardware connected to the public internet, like the Unitronics devices used by water companies.

"Not making critical infrastructure easily accessible via the internet should be standard practice," Thompson says.

Encryption

The Race to Shield Secrets from Quantum Computers (reuters.com) 67

An anonymous reader shared this report from Reuters: In February, a Canadian cybersecurity firm delivered an ominous forecast to the U.S. Department of Defense. America's secrets — actually, everybody's secrets — are now at risk of exposure, warned the team from Quantum Defen5e (QD5). QD5's executive vice president, Tilo Kunz, told officials from the Defense Information Systems Agency that possibly as soon as 2025, the world would arrive at what has been dubbed "Q-day," the day when quantum computers make current encryption methods useless. Machines vastly more powerful than today's fastest supercomputers would be capable of cracking the codes that protect virtually all modern communication, he told the agency, which is tasked with safeguarding the U.S. military's communications.

In the meantime, Kunz told the panel, a global effort to plunder data is underway so that intercepted messages can be decoded after Q-day in what he described as "harvest now, decrypt later" attacks, according to a recording of the session the agency later made public. Militaries would see their long-term plans and intelligence gathering exposed to enemies. Businesses could have their intellectual property swiped. People's health records would be laid bare... One challenge for the keepers of digital secrets is that whenever Q-day comes, quantum codebreakers are unlikely to announce their breakthrough. Instead, they're likely to keep quiet, so they can exploit the advantage as long as possible.

The article adds that "a scramble is on to protect critical data. Washington and its allies are working on new encryption standards known as post-quantum cryptography... Beijing is trying to pioneer quantum communications networks, a technology theoretically impossible to hack, according to researchers...

"In a quantum communications network, users exchange a secret key or code on subatomic particles called photons, allowing them to encrypt and decrypt data. This is called quantum key distribution, or QKD."
China

China To Tighten Controls on Video Gaming Industry (scmp.com) 60

Beijing is moving to curb excessive spending on video games across the country, according to a new draft regulation, dealing another blow to the world's largest video gaming market that is still recovering from the government's previous industry crackdown. From a report: Online games must not offer rewards that entice people to excessively play and spend, including those for daily logins and topping up accounts with additional funds, according to draft rules published on Friday by industry regulator the National Press and Publication Administration (NPPA). All video games must put a cap on how much players can top up their accounts and alert users about "irrational consumption behaviour" via a pop-up window, according to the NPPA.
Medicine

California Workers Say Herbicide Is Giving Them Parkinson's (latimes.com) 43

An anonymous reader quotes a report from the Los Angeles Times: It was the late 1980s when Gary Mund felt his pinky tremble. At first it seemed like a random occurrence, but pretty quickly he realized something was seriously wrong. Within two years, Mund -- a crew worker with the Eastern Municipal Water District in Riverside County -- was diagnosed with Parkinson's disease. The illness would eventually consume much of his life, clouding his speech, zapping most of his motor skills and taking away his ability to work and drive. "It sucks," said Mund, 69. He speaks tersely, because every word is a hard-won battle. "I was told the herbicide wouldn't hurt you."

The herbicide is paraquat, an extremely powerful weed killer that Mund sprayed on vegetation as part of his job from about 1980 to 1985. Mund contends the product is responsible for his disease, but the manufacturer denies there is a causal link between the chemical and Parkinson's. Paraquat is manufactured by Syngenta, a Swiss-based company owned by the Chinese government. The chemical is banned in at least 58 countries -- including China and Switzerland -- due to its toxicity, yet it continues to be a popular herbicide in California and other parts of the United States. But research suggests the chemical may cross the blood-brain barrier in a manner that triggers Parkinson's disease, a progressive, neurodegenerative disorder that affects movement. Now, Mund is among thousands of workers suing Syngenta seeking damages and hoping to see the chemical banned.

Since 2017, more than 3,600 lawsuits have been filed in state and federal courts seeking damages from exposure to paraquat products, according to Syngenta's 2022 financial report (PDF). [...] Paraquat is 28 times more toxic than another controversial herbicide, Roundup, according to a report from the Pesticide Action Network. (Roundup has been banned in several parts of California, including a 2019 moratorium by the Los Angeles County Board of Supervisors forbidding its use by county departments.) Paraquat also has other known health effects. It is listed as "highly toxic" on the U.S. Environmental Protection Agency's website, which says that "one small sip can be fatal and there is no antidote." The EPA is currently reviewing paraquat's approval status. However, both the EPA and Syngenta cited a 2020 U.S. government Agricultural Health Study that found there is no clear link between paraquat exposure and Parkinson's disease. A 2021 review of reviews similarly found that there is no causal relationship.

Earth

Pakistan Uses Artificial Rain in Attempt To Cut Pollution Levels (theguardian.com) 29

Artificial rain has been used in an attempt to lower pollution levels in Lahore, Pakistan. From a report: The capital city of the eastern province of Punjab, near the Indian border, has some of the worst air quality in the world and has become extremely polluted because of a growing population of more than 13 million people. By early December, the air quality in the city had grown so bad that schools, markets and parks were closed for four days. By last weekend, the city's air quality index (AQI) had reached levels considered extremely hazardous to health.

To try to reduce them, on Saturday the Punjab government used cloud seeding to create rain in 10 locations around the city using a small Cessna plane. To create the clouds, there needs to be enough moisture already present in the clouds in the lower atmosphere. In summer, common table salt mixed with water is sprayed over the cloud patches from planes. After a few hours, the mist integrates with the clouds and produces rain. In winter, the clouds are seeded using flakes of silver iodide, which can be fired from a vehicle or a plane. The practice, also known as "blueskying," has been used to induce precipitation in several countries in the Middle East, as well as China and India.

Security

Comcast Discloses Data Breach of Close To 36 Million Xfinity Customers [UPDATE] (techcrunch.com) 40

In a notice on Monday, Xfinity notified customers of a "data security incident" that resulted in the theft of customer information, including usernames, passwords, contact information, and more. The Verge reports: Xfinity traces the breach to a security vulnerability disclosed by cloud computing company Citrix, which began alerting customers of a flaw in software Xfinity and other companies use on October 10th. While Xfinity says it patched the security hole, it later uncovered suspicious activity on its internal systems "that was concluded to be a result of this vulnerability."

The hack resulted in the theft of customer usernames and hashed passwords, according to Xfinity's notice. Meanwhile, "some customers" may have had their names, contact information, last four digits of their social security numbers, dates of birth, and / or secret questions and answers exposed. Xfinity has notified federal law enforcement about the incident and says "data analysis is continuing."

We still don't know how many users were affected by the breach. Xfinity will automatically ask customers to change their passwords the next time they log in to their accounts, and it's also encouraging users to turn on two-factor authentication. You can find the full notice, including contact information for the company's incident response team, on Xfinity's website (PDF).
UPDATE 12/19/23: According to TechCrunch, almost 36 million Xfinity customers had their sensitive information accessed by hackers via a vulnerability known as "CitrixBleed." The vulnerability is "found in Citrix networking devices often used by big corporations and has been under mass-exploitation by hackers since late August," the report says. "Citrix made patches available in early October, but many organizations did not patch in time. Hackers have used the CitrixBleed vulnerability to hack into big-name victims, including aerospace giant Boeing, the Industrial and Commercial Bank of China and international law firm Allen & Overy."

"In a filing with Maine's attorney general, Comcast confirmed that almost 35.8 million customers are affected by the breach. Comcast's latest earnings report shows the company has more than 32 million broadband customers, suggesting this breach has impacted most, if not all Xfinity customers."
China

Is Huawei Pushing Forward With an Ambitious Plan to Dethrone Android? (forbes.com) 152

Forbes recently published this article by author/speaker Nina Xiang, who reports that Huawei is pushing forward with "an amibitious plan to dethrone Android." Hundreds of technical experts from many of China's biggest state-owned and private companies, including the Industrial and Commercial Bank of China (ICBC), China Telecom, Meituan, and Baidu, all gathered in Beijing last month. The purpose behind the meeting was for their staff to receive training so they could be certified as developers on Huawei's Harmony Operation System (OS).

While most observers were looking the other way, Huawei has been quietly building an independent Chinese operating system that isn't subject to U.S. sanctions. In the four years after the telecom giant was banned from using Google apps, the Shenzhen-based company has been making significant strides toward achieving its long-term goal: To dethrone Android and make its HarmonyOS the default operating system in China.

Looking at the data for smartphone sales in China shows that HarmonyOS had the third-largest share with 10% in the second quarter of 2023, thanks to a strong resurgence in sales of Huawei smartphones. Although it's still well below Android's dominant 72%, it's not far from iOS's 17%... Huawei already says more than 700 million devices (including phones, smart devices, computers, and others) were equipped with HarmonyOS as of August this year, with over 2.2 million developers actively building within the ecosystem...

A key moment will come next year, when Huawei says HarmonyOS will no longer be compatible with Android apps.

Cellphones

US Officials Doubt the Performance of Huawei's Advanced Chip (yahoo.com) 54

An anonymous reader quotes this report from Bloomberg: The U.S. doubts whether Huawei Technologies Co. can produce the advanced chip in its new smartphone at the scale or performance threshold necessary to meet market demand, a senior Commerce Department official told lawmakers Tuesday. "Neither the performance nor yields may match the market of the device," Thea Kendler, assistant secretary for export administration, said during testimony before a House Foreign Affairs Committee oversight panel.

"Moreover, the semiconductor chip that is inside that phone is a poorer performance than what they had years ago," Kendler said. "So our export controls are meaningful in slowing China's advanced technology acquisition...."

The [U.S. Commerce Department's Bureau of Industry and Security] is under pressure from Republicans to be tougher on Huawei and its chipmaking partner Semiconductor Manufacturing International Corp [or SMIC]. Foreign Affairs Committee Chairman Michael McCaul and others have called for the Bureau of Industry and Security to fully cut off both firms from their American suppliers. U.S. Commerce Secretary Gina Raimondo told Bloomberg News in a Monday interview that the U.S. will take the "strongest possible" action to protect its national security following the breakthrough, while declining to confirm the existence of an investigation into Huawei or SMIC.

AI

OpenAI Suspends ByteDance's Account After It Used GPT To Train Its Own AI Model (theverge.com) 32

TikTok's parent company, ByteDance, has been secretly using OpenAI's technology to develop its own competing large language model (LLM). "This practice is generally considered a faux pas in the AI world," writes The Verge's Alex Heath. "It's also in direct violation of OpenAI's terms of service, which state that its model output can't be used 'to develop any artificial intelligence models that compete with our products and services.'" From the report: Nevertheless, internal ByteDance documents shared with me confirm that the OpenAI API has been relied on to develop its foundational LLM, codenamed Project Seed, during nearly every phase of development, including for training and evaluating the model. Employees involved are well aware of the implications; I've seen conversations on Lark, ByteDance's internal communication platform for employees, about how to "whitewash" the evidence through "data desensitization." The misuse is so rampant that Project Seed employees regularly hit their max allowance for API access. Most of the company's GPT usage has been done through Microsoft's Azure program, which has the same policy as OpenAI.

In response, OpenAI said that it has suspended ByteDance's account: "All API customers must adhere to our usage policies to ensure that our technology is used for good. While ByteDance's use of our API was minimal, we have suspended their account while we further investigate. If we discover that their usage doesn't follow these policies, we will ask them to make necessary changes or terminate their account."
China

China Issues Draft Contingency Plan for Data Security Incidents (reuters.com) 5

China on Friday proposed a four-tier classification to help it respond to data security incidents, highlighting Beijing's concern with large-scale data leaks and hacking within its borders. From a report: The plan, which is currently soliciting opinions from the public, proposes a four-tier, colour-coded system depending on the degree of harm inflicted upon national security, a company's online and information network, or the running of the economy.

According to the plan, incidents that involve losses surpassing 1 billion yuan ($141 million) and affect the personal information of over 100 million people, or the "sensitive" information of over 10 million people, will be classed as "especially grave," to which a red warning must be issued. The plan demands that in response to red and orange warnings, the involved companies and relevant local regulatory authorities must establish a 24-hour work rota to address the incident and MIIT must be notified of the data breach within ten minutes of the incident happening, among other measures.

Portables (Apple)

Apple Plans OLED Displays for MacBooks, Evaluates Foldable iPads: Report (nikkei.com) 26

Apple will expand its use of advanced OLED screens to iPads and MacBooks and is considering eventually introducing foldable tablets, a move set to further shake up the $150 billion display industry as it shifts away from traditional LCD screens, Asian news outlet Nikkei reported Friday. From the report: OLED, or organic light-emitting diode, displays are already used in most premium smartphones, including iPhones. Apple plans to deploy the tech in its high-end iPads next year, multiple tech industry executives told Nikkei Asia. An OLED MacBook model is also under development for production in the second half of 2025 at the earliest, the people said. The growing penetration of OLED is a significant win for Samsung Display and LG Display of South Korea and China's BOE Technology Holding, which have all bet heavily on this expensive display technology.

On the flip side, it could be a blow to display makers that do not have much presence in this segment, including JDI and Sharp of Japan, and AUO and Innolux of Taiwan. Apple has also started evaluating the possibility of making foldable iPads after it deploys the flexible OLED screens on the tablet, but it does not have a concrete timeline for doing so, according to two sources familiar with the matter. The iPhone maker is not the first company to adopt OLED displays for tablets. Huawei, for instance, has been a significant driver of this trend, which in turn has helped strengthen the Chinese display supply chain.

Security

Lazarus Cyber Group Deploys DLang Malware Strains (theregister.com) 13

Connor Jones reports via The Register: DLang is among the newer breed of memory-safe languages being endorsed by Western security agencies over the past few years, the same type of language that cyber criminals are switching to. At least three new DLang-based malware strains have been used in attacks on worldwide organizations spanning the manufacturing, agriculture, and physical security industries, Cisco Talos revealed today. The attacks form part of what's being called "Operation Blacksmith" and are attributed to a group tracked as Andariel, believed to be a sub-division of the Lazarus Group -- North Korea's state-sponsored offensive cyber unit. [...]

The researchers noted that DLang is an uncommon choice for writing malware, but a shift towards newer languages and frameworks is one that's been accelerating over the last few years -- in malware coding as in the larger programming world. Rust, however, has often shown itself to be the preferred choice out of what is a fairly broad selection of languages deemed to be memory-safe. AlphV/BlackCat was the first ransomware group to make such a shift last year, re-writing its payload in Rust to offer its affiliates a more reliable tool. A month later, the now-shuttered Hive group did the same thing, and many others followed after that. Other groups to snub Rust include China-based Sandman which was recently observed using Lua-based malware, believed to be part of a wider shift toward Lua development from Chinese attackers.

Cellphones

Transparent Wood Could Soon Find Uses In Smartphone Screens, Insulated Windows (arstechnica.com) 33

An anonymous reader quotes a report from Ars Technica: Thirty years ago, a botanist in Germany had a simple wish: to see the inner workings of woody plants without dissecting them. By bleaching away the pigments in plant cells, Siegfried Fink managed to create transparent wood, and he published his technique in a niche wood technology journal. The 1992 paper remained the last word on see-through wood for more than a decade, until a researcher named Lars Berglund stumbled across it. Berglund was inspired by Fink's discovery, but not for botanical reasons. The materials scientist, who works at KTH Royal Institute of Technology in Sweden, specializes in polymer composites and was interested in creating a more robust alternative to transparent plastic. And he wasn't the only one interested in wood's virtues. Across the ocean, researchers at the University of Maryland were busy on a related goal: harnessing the strength of wood for nontraditional purposes.

Now, after years of experiments, the research of these groups is starting to bear fruit. Transparent wood could soon find uses in super-strong screens for smartphones; in soft, glowing light fixtures; and even as structural features, such as color-changing windows. "I truly believe this material has a promising future," says Qiliang Fu, a wood nanotechnologist at Nanjing Forestry University in China who worked in Berglund's lab as a graduate student. Wood is made up of countless little vertical channels, like a tight bundle of straws bound together with glue. These tube-shaped cells transport water and nutrients throughout a tree, and when the tree is harvested and the moisture evaporates, pockets of air are left behind. To create see-through wood, scientists first need to modify or get rid of the glue, called lignin, that holds the cell bundles together and provides trunks and branches with most of their earthy brown hues. After bleaching lignin's color away or otherwise removing it, a milky-white skeleton of hollow cells remains. This skeleton is still opaque, because the cell walls bend light to a different degree than the air in the cell pockets does -- a value called a refractive index. Filling the air pockets with a substance like epoxy resin that bends light to a similar degree to the cell walls renders the wood transparent.

The material the scientists worked with is thin -- typically less than a millimeter to around a centimeter thick. But the cells create a sturdy honeycomb structure, and the tiny wood fibers are stronger than the best carbon fibers, says materials scientist Liangbing Hu, who leads the research group working on transparent wood at the University of Maryland in College Park. And with the resin added, transparent wood outperforms plastic and glass: In tests measuring how easily materials fracture or break under pressure, transparent wood came out around three times stronger than transparent plastics like Plexiglass and about 10 times tougher than glass. "The results are amazing, that a piece of wood can be as strong as glass," says Hu, who highlighted the features of transparent wood in the 2023 Annual Review of Materials Research.

China

Huawei To Start Building First European Factory In France (reuters.com) 35

An anonymous reader quotes a report from Reuters: China's Huawei will start building its mobile phone network equipment factory in France next year, a source familiar with the matter said, pressing ahead with its first plant in Europe even as some European governments curb the use of the firm's 5G gear. The company outlined plans for the factory with an initial investment of 200 million euros ($215.28 million) in 2020, but the roll-out was delayed by the COVID-19 pandemic, the source said on Monday. The source did not give a timeline for when the factory in Brumath, near Strasbourg, will be up and running. A French government source said the site was expected to open in 2025. Further reading: 'How Washington Chased Huawei Out of Europe'
United States

New York Joins IBM, Micron in $10 Billion Chip Research Complex (wsj.com) 17

New York has partnered with chip firms to build $10 billion semiconductor research site at University at Albany, featuring cutting-edge ASML equipment to develop most advanced chips. From a report: Once the machinery is installed, the project and its partners will begin work on next-generation chip manufacturing there, according to New York Gov. Kathy Hochul's office. The partners include tech giant IBM, memory manufacturer Micron and chip manufacturing equipment makers Applied Materials and Tokyo Electron.

The expansion could help New York's bid to be designated a research hub under last year's $53 billion Chips Act. That legislation included $11 billion for a National Semiconductor Technology Center to foster domestic chip research and development. Expanding domestic chip manufacturing and research has become a federal and state-level priority in recent years as concern grows in the U.S. over China's expanding grasp over the industry. Chips are increasingly seen as a crux of geopolitical power, underlying advanced weapons for militaries and sophisticated artificial-intelligence systems.

Slashdot Top Deals