×
XBox (Games)

Upcoming Games Include More Xbox Sequels - and a Medieval 'Doom' (polygon.com) 32

Announced during Microsoft's Xbox Games Showcase, Doom: The Dark Ages is id Software's next foray back into hell. [Also available for PS5 and PC.] Doom: The Dark Ages is a medieval spin on the Doom franchise, taking the Doom Slayer back to the beginning. It's coming to Xbox Game Pass on day one, sometime in 2025.

Microsoft's first trailer for Doom: The Dark Ages shows the frenetic, precision gameplay we've come to expect from the franchise — there's a lot of blasting and shooting and a chainsaw. Oh, and the Doom Slayer can ride a dragon?

"Before he became a hero he was the super weapon of gods and kings," says the trailer (which showcases the game's crazy-good graphics...) The 2020 game Doom Eternal sold 3 million copies in its first month, according to Polygon, with its game director telling the site in 2021 that "our hero is somewhat timeless — I mean, literally, he's immortal. So we could tell all kinds of stories..."

Other upcoming Xbox games were revealed too. Engadget is excited about the reboot of the first-person shooter Perfect Dark (first released in 2000, but now set in the near future). There's also Gears of War: E-Day, Indiana Jones and the Great Circle, State of Decay 3, and Assassin's Creed Shadows, according to Xbox.com — plus "the announcement of three new Xbox Series X|S console options." [Engadget notes it's the first time Microsoft has offered a cheaper all-digital Xbox Series X with no disc drive.] "And on top of all that, we also brought the gameplay reveal of a brand-new Call of Duty game with Call of Duty: Black Ops 6."

Meanwhile, Friday's Summer Game Fest 2024 featured Star Wars Outlaws footage (which according to GamesRadar takes place between Empire Strikes Back and Return of the Jedi, featuring not just card games with Lando Calrissian but also Jabba the Hutt and a frozen Han Solo.) Engadget covered all the announcements from Game Fest, including the upcoming game Mixtape, which Engadget calls a "reality-bending adventure" with "a killer '80s soundtrack" about three cusp-of-adulthood teenagers who "Skate. Party. Avoid the law. Make out. Sneak out. Hang out..." for Xbox/PS5/PC.
Google

How Google Will Distribute $100 Million to Canada's News Companies (www.cbc.ca) 36

In November Google agreed to pay Canadian news publishers $100 million annually "in order to be exempt from the Online News Act, which compels tech companies to enter into agreements with news publishers," writes the Canadian Press.

On Friday Google "named the organization it has selected to distribute the $100 million..." The Canadian Journalism Collective will be responsible for ensuring eligible news organizations get their share of the money. The collective is a federally incorporated non-profit organization that was created for this purpose. It was founded in May by a group of independent publishers and broadcasters... "We hope these next steps will be completed as quickly as possible, so Canadian publishers and journalists can soon begin to receive the proceeds of this new contribution model," Google said in a blog entry posted on their website Friday...

The money will be distributed proportionately based on how many full time-journalists the companies employ. Small print and digital outlets can expect to receive about $17,000 per journalist that they employ, an official with the Canadian Heritage Department has said.

Google's money will go to 1,520 news organizations, according to Google's blog post — which describes the arrangement as "addressing our concerns with the Online News Act" and "a viable path to an exemption at a clear and commercially acceptable commitment level..." As part of this transition, we have advised partners in our Google News Showcase program (our online news experience and licensing program for news organizations) will cease to operate in Canada later this year as we transition to this new contribution model. We will be maintaining some Google News Initiative programming in Canada. This includes a range of collaborative tools and resources that can support the advancement of quality journalism. However, with our monetary contribution in Canada now streamlined into the new single collective model, these investments will be non-monetary in nature.
Piracy

Nintendo Hits 127 Switch Piracy Tutorial Repos After 'Cracking' URL Encryption (torrentfreak.com) 28

An anonymous reader quotes a report from TorrentFreak: A popular GitHub repo and over 120 forks containing Switch emulation tutorials have been targeted by Nintendo. While most forks are now disabled, the main repository has managed to survive after being given the opportunity to put things right. Whether Nintendo appreciated the irony is unclear, but it appears that use of encoding as a protection measure to obfuscate links, was no match for the video game company's circumvention skills. [...] The Switch Emulators Guide was presented in the context of piracy, something made clear by a note on the main page of the original repo which stated that the tutorial was made, in part, for use on the /r/NewYuzuPiracy subreddit. Since the actions of Yuzu and its eventual demise are part of the unwritten framework for similar takedowns, that sets the tone (although not the legal basis) in favor of takedown.

When asked to provide a description and URL pointing to the copyrighted content allegedly infringed by the repos, Nintendo states that the works are the 'Nintendo Switch firmware" and various games protected by technological protection measures (TPM) which prevent users from unlawfully copying and playing pirated games. The notice states the repos 'provide access' to keys that enable circumvention of its technical measures. "The reported repositories offer and provide access to unauthorized copies of cryptographic keys that are used to circumvent Nintendo's Technological Measures and infringe Nintendo's intellectual property rights. Specifically, the reported repositories provide to users unauthorized copies of cryptographic keys (prod.keys) extracted from the Nintendo Switch firmware," Nintendo writes.

"The prod.keys allow users to bypass Nintendo's Technological Measures for digital games; specifically, prod.keys allow users to decrypt and play Nintendo Switch games in unauthorized ways. Distribution of keys without the copyright owner's authorization is a violation of Section 1201 of the DMCA." Nintendo further notes that unauthorized distribution of prod.keys "facilitates copyright infringement by permitting users to play pirated versions of Nintendo's copyright-protected game software on systems without the Nintendo Technological Measures or systems on which Nintendo's Technological Measures have been disabled." Since the prod.keys are extracted from the Nintendo Switch firmware, which is also protected by copyright, distribution amounts to "infringement of Nintendo Switch firmware itself."

Given that the repo's stated purpose was to provide information on how to circumvent Nintendo's technical protection measures, it's fairly ironic that it appears to have used technical measures itself to hinder detection. "The reported repositories attempt to evade detection of their illegal activities by providing access to prod.keys and unauthorized copies of Nintendo's firmware and video games via encoded links that direct users to third-party websites to download the infringing content," Nintendo explains in its notice. "The repositories provide strings of letters and numbers and then instruct users to 'use [private] to decode the lines of strings given here to get an actual link.' The decoded links take users to sites where they can access the prod.keys and unauthorized copies of Nintendo's copyright-protected material." The image below shows the encoded links (partially redacted) that allegedly link to the content in question on third-party sites. To hide their nature, regular URLs are encoded using Base64, a binary-to-text encoding scheme that transforms them into a sequence of characters. Those characters can be decoded to reveal the original URL using online tools.

AI

Adobe Scolded For Selling 'Ansel Adams-Style' Images Generated By AI (theverge.com) 89

The Ansel Adams estate said it was "officially on our last nerve" after Adobe was caught selling AI-generated images imitating the late photographer's work. The Verge reports: While Adobe permits AI-generated images to be hosted and sold on its stock image platform, users are required to hold the appropriate rights or ownership over the content they upload. Adobe Stock's Contributor Terms specifically prohibits content "created using prompts containing other artist names, or created using prompts otherwise intended to copy another artist." Adobe responded to the callout, saying it had removed the offending content and had privately messaged the Adams estate to get in touch directly in the future. The Adams estate, however, said it had contacted Adobe directly multiple times since August 2023.

"Assuming you want to be taken seriously re: your purported commitment to ethical, responsible AI, while demonstrating respect for the creative community, we invite you to become proactive about complaints like ours, & to stop putting the onus on individual artists/artists' estates to continuously police our IP on your platform, on your terms," said the Adams estate on Threads. "It's past time to stop wasting resources that don't belong to you."

Adobe Stock Vice President Matthew Smith previously told The Verge that the company generally moderates all "crowdsourced" Adobe Stock assets before they are made available to customers, employing a "variety" of methods that include "an experienced team of moderators who review submissions." As of January 2024, Smith said the strongest action the company can take to enforce its platform rules is to block Adobe Stock users who violate them. Bassil Elkadi, Adobe's Director of Communications and Public Relations, told The Verge that Adobe is "actively in touch with Ansel Adams on this matter," and that "appropriate steps were taken given the user violated Stock terms." The Adams estate has since thanked Adobe for removing the images, and said that it expects "it will stick this time."
"We don't have a problem with anyone taking inspiration from Ansel's photography," said the Adams estate. "But we strenuously object to the unauthorized use of his name to sell products of any kind, including digital products, and this includes AI-generated output -- regardless of whether his name has been used on the input side, or whether a given model has been trained on his work."
AI

CEO of Zoom Wants AI Clones in Meetings (theverge.com) 95

Zoom's CEO Eric Yuan predicts that AI will significantly transform the workplace, potentially ushering in a four-day workweek, he told The Verge in an interview. Yuan said Zoom is transitioning from a videoconferencing platform to a comprehensive collaboration suite called Zoom Workplace. He believes AI will automate routine tasks such as attending meetings, reading emails, and making phone calls, enabling employees to dedicate time to more creative and meaningful work. The Verge adds: The Verge: I'm asking you which meetings do you look at and think you would hand off?
Yuan: I started with the problem first, right? And last but not least, after the meeting is over, let's say I'm very busy and missed the meeting. I really don't understand what happened. That's one thing. Another thing for a very important meeting I missed, given I'm the CEO, they're probably going to postpone the meeting. The reason why is I probably need to make a decision. Given that I'm not there, they cannot move forward, so they have to reschedule. You look at all those problems. Let's assume AI is there. AI can understand my entire calendar, understand the context. Say you and I have a meeting -- just one click, and within five seconds, AI has already scheduled a meeting.

At the same time, every morning I wake up, an AI will tell me, "Eric, you have five meetings scheduled today. You do not need to join four of the five. You only need to join one. You can send a digital version of yourself." For the one meeting I join, after the meeting is over, I can get all the summary and send it to the people who couldn't make it. I can make a better decision. Again, I can leverage the AI as my assistant and give me all kinds of input, just more than myself. That's the vision.

AI

Could AI Replace CEOs? (msn.com) 132

'"As AI programs shake up the office, potentially making millions of jobs obsolete, one group of perpetually stressed workers seems especially vulnerable..." writes the New York Times.

"The chief executive is increasingly imperiled by A.I." These employees analyze new markets and discern trends, both tasks a computer could do more efficiently. They spend much of their time communicating with colleagues, a laborious activity that is being automated with voice and image generators. Sometimes they must make difficult decisions — and who is better at being dispassionate than a machine?

Finally, these jobs are very well paid, which means the cost savings of eliminating them is considerable...

This is not just a prediction. A few successful companies have begun to publicly experiment with the notion of an A.I. leader, even if at the moment it might largely be a branding exercise... [The article gives the example of the Chinese online game company NetDragon Websoft, which has 5,000 employees, and the upscale Polish rum company Dictador.]

Chief executives themselves seem enthusiastic about the prospect — or maybe just fatalistic. EdX, the online learning platform created by administrators at Harvard and M.I.T. that is now a part of publicly traded 2U Inc., surveyed hundreds of chief executives and other executives last summer about the issue. Respondents were invited to take part and given what edX called "a small monetary incentive" to do so. The response was striking. Nearly half — 47 percent — of the executives surveyed said they believed "most" or "all" of the chief executive role should be completely automated or replaced by A.I. Even executives believe executives are superfluous in the late digital age...

The pandemic prepared people for this. Many office workers worked from home in 2020, and quite a few still do, at least several days a week. Communication with colleagues and executives is done through machines. It's just a small step to communicating with a machine that doesn't have a person at the other end of it. "Some people like the social aspects of having a human boss," said Phoebe V. Moore, professor of management and the futures of work at the University of Essex Business School. "But after Covid, many are also fine with not having one."

The article also notes that a 2017 survey of 1,000 British workers found 42% saying they'd be "comfortable" taking orders from a computer.
United Kingdom

How Facial Recognition Tech Is Being Used In London By Shops - and Police (bbc.co.uk) 98

"Within less than a minute, I'm approached by a store worker who comes up to me and says, 'You're a thief, you need to leave the store'."

That's a quote from the BBC by a wrongly accused customer who was flagged by a facial-recognition system called Facewatch. "She says after her bag was searched she was led out of the shop, and told she was banned from all stores using the technology."

Facewatch later wrote to her and acknowledged it had made an error — but declined to comment on the incident in the BBC's report: [Facewatch] did say its technology helped to prevent crime and protect frontline workers. Home Bargains, too, declined to comment. It's not just retailers who are turning to the technology... [I]n east London, we joined the police as they positioned a modified white van on the high street. Cameras attached to its roof captured thousands of images of people's faces. If they matched people on a police watchlist, officers would speak to them and potentially arrest them...

On the day we were filming, the Metropolitan Police said they made six arrests with the assistance of the tech... The BBC spoke to several people approached by the police who confirmed that they had been correctly identified by the system — 192 arrests have been made so far this year as a result of it.

Lindsey Chiswick, director of intelligence for the Met, told the BBC that "It takes less than a second for the technology to create a biometric image of a person's face, assess it against the bespoke watchlist and automatically delete it when there is no match."

"That is the correct and acceptable way to do it," writes long-time Slashdot reader Baron_Yam, "without infringing unnecessarily on the freedoms of the average citizen. Just tell me they have appropriate rules, effective oversight, and a penalty system with teeth to catch and punish the inevitable violators."

But one critic of the tech complains to the BBC that everyone scanned automatically joins "a digital police line-up," while the article adds that others "liken the process to a supermarket checkout — where your face becomes a bar code." And "The error count is much higher once someone is actually flagged. One in 40 alerts so far this year has been a false positive..."

Thanks to Slashdot reader Bruce66423 for sharing the article.
Biotech

World's First Bioprocessor Uses 16 Human Brain Organoids, Consumes Less Power (tomshardware.com) 48

"A Swiss biocomputing startup has launched an online platform that provides remote access to 16 human brain organoids," reports Tom's Hardware: FinalSpark claims its Neuroplatform is the world's first online platform delivering access to biological neurons in vitro. Moreover, bioprocessors like this "consume a million times less power than traditional digital processors," the company says. FinalSpark says its Neuroplatform is capable of learning and processing information, and due to its low power consumption, it could reduce the environmental impacts of computing. In a recent research paper about its developments, FinalSpakr claims that training a single LLM like GPT-3 required approximately 10GWh — about 6,000 times greater energy consumption than the average European citizen uses in a whole year. Such energy expenditure could be massively cut following the successful deployment of bioprocessors.

The operation of the Neuroplatform currently relies on an architecture that can be classified as wetware: the mixing of hardware, software, and biology. The main innovation delivered by the Neuroplatform is through the use of four Multi-Electrode Arrays (MEAs) housing the living tissue — organoids, which are 3D cell masses of brain tissue...interfaced by eight electrodes used for both stimulation and recording... FinalSpark has given access to its remote computing platform to nine institutions to help spur bioprocessing research and development. With such institutions' collaboration, it hopes to create the world's first living processor.

FinalSpark was founded in 2014, according to Wikipedia's page on wetware computing. "While a wetware computer is still largely conceptual, there has been limited success with construction and prototyping, which has acted as a proof of the concept's realistic application to computing in the future."

Thanks to long-time Slashdot reader Artem S. Tashkinov for sharing the article.
Displays

HP's MicroLED Monitors Stack Together Like Legos (digitaltrends.com) 25

An anonymous reader quotes a report from Digital Trends: HP researchers have published a paper detailing a new modular monitor design they call "composable microLED monitors." Using advancing microLED tech to make smaller screens with no bezels, they imagine a Lego-like system that allows customers to buy different monitor modules and slot them together at home. In the paper, diagrams show "core units" with a direct connection to the host computer being expanded both horizontally and vertically with multiple extensions. The idea is that by choosing from flat or curved extension pieces and connecting them to the core unit, you can make a monitor in whatever size or shape you want. To keep assembly simple and effective, the design uses jigsaw-like connections alongside magnets to ensure each module automatically aligns correctly. And to prevent the number of possible configurations from getting out of hand, the design only allows extensions to attach to the sides or bottom of the square-shaped core unit. Once your strangely shaped monitor is complete, you would be able to choose how your operating system treats each part -- either as an extension of the core unit or as a separate screen. These settings would be controlled with physical switches on the modules that you could change whenever you wanted.

As for the sizes of the modules, HP proposes a range of different possibilities, some more complicated than others. In an ideal situation, customers would be able to choose from either flat or curved core units and add flat or curved extensions of varying sizes. If that proved too difficult, curved monitor elements could be taken out of the picture completely, and customers would just add flat extensions to a flat core unit. As cool as this all sounds, there is a glaring problem -- how would the seams between each module look? Thanks to the bezel-less design, there at least wouldn't be a thick black divider between each part. However, a thin line or visible distortion would be inevitable. One approach HP proposes is minimizing the gap between each panel as much as possible and just accepting the thin line it creates. Alternatives include complicated techniques to disguise the joints using hardware or software solutions that modify the display of edge pixels to minimize visual joints. HP would have to find a balance between technical viability, cost, and customer feedback to determine the best overall solution.

Science

Biomedical Paper Retractions Have Quadrupled in 20 Years (nature.com) 26

The retraction rate for European biomedical-science papers increased fourfold between 2000 and 2021, a study of thousands of retractions has found. Nature: Two-thirds of these papers were withdrawn for reasons relating to research misconduct, such as data and image manipulation or authorship fraud. These factors accounted for an increasing proportion of retractions over the roughly 20-year period, the analysis suggests. "Our findings indicate that research misconduct has become more prevalent in Europe over the last two decades," write the authors, led by Alberto RuanoâRavina, a public-health researcher at the University of Santiago de Compostela in Spain.

Other research-integrity specialists point out that retractions could be on the rise because researchers and publishers are getting better at investigating and identifying potential misconduct. There are more people working to spot errors and new digital tools to screen publications for suspicious text or data. Scholarly publishers have faced increased pressure to clear up the literature in recent years as sleuths have exposed cases of research fraud, identified when peer review has been compromised and uncovered the buying and selling of research articles. Last year saw a record 10,000 papers retracted. Although misconduct is a leading cause of retractions, it is not always responsible: some papers are retracted when authors discover honest errors in their work.

IT

Fax Machines Permeate Germany's Business Culture. But Parliament is Ditching Them (npr.org) 49

An anonymous reader shares a report: The sound of the 1990s still resonates in the German capital. Like techno music, the fax machine remains on trend. According to the latest figures from Germany's digital industry association, four out of five companies in Europe's largest economy continue to use fax machines and a third do so frequently or very frequently. Much as Germany's reputation for efficiency is regularly undermined by slow internet connections and a reliance on paper and rubber stamps, fax machines are at odds with a world embracing artificial intelligence.

But progress is on the horizon in the Bundestag -- the lower house of parliament -- where lawmakers have been instructed by the parliamentary budget committee to ditch their trusty fax machines by the end of June, and rely on email instead for official communication. Torsten Herbst, parliamentary whip of the pro-business Free Democrats, points out one fax machine after the other as he walks through the Bundestag. He says the public sector is particularly fond of faxing and that joining parliament was like going back in time.

Google

Google, AR Startup Magic Leap Strike Partnership Deal (reuters.com) 7

Alphabet's Google and augmented reality startup Magic Leap are forming a strategic technology partnership and working on building immersive experiences that blend the physical and digital worlds. From a report: Magic Leap said in a blog post on Thursday that the two companies have agreed to a partnership. While short on details, the announcement adds to signals that Google may be plotting a return to the market for augmented and virtual reality (AR/VR) technologies that it so far has largely yielded to rivals Meta and Apple. The partnership would combine Florida-based Magic Leap's expertise in optics and device manufacturing with Google's technology platforms, Magic Leap said.
Bitcoin

PayPal Adds Stablecoin To Solana Blockchain 22

Last August, PayPal became the first major financial company to roll out a stablecoin. Labeled PayPal USD, or PYUSD, the coin was issued on the Ethereum blockchain and "fully backed by U.S. dollar deposits, short-term Treasuries and similar cash equivalents." Now, the financial company is adding Solana as an option, "making PayPal's stablecoin faster and cheaper to use."

"The Solana blockchain is known for processing massive amounts of transactions at high speeds with extremely low costs, providing significant benefits for commerce use cases," says the company in a press release. "As the most used blockchain for stablecoin transfers, according to data from blockchain analytics platform Artemis, Solana has emerged as the leading blockchain to run tokenized transactions and is ideal for PYUSD as it continues to be used for payment use cases."
Canada

'Ottawa Wants the Power To Create Secret Backdoors In Our Networks' (theglobeandmail.com) 39

An anonymous reader quotes an op-ed from The Globe and Mail, written by Kate Robertson and Ron Deibert. Robertson is a senior research associate and Deibert is director at the University of Toronto's Citizen Lab. From the piece: A federal cybersecurity bill, slated to advance through Parliament soon, contains secretive, encryption-breaking powers that the government has been loath to talk about. And they threaten the online security of everyone in Canada. Bill C-26 empowers government officials to secretly order telecommunications companies to install backdoors inside encrypted elements in Canada's networks. This could include requiring telcos to alter the 5G encryption standards that protect mobile communications to facilitate government surveillance. The government's decision to push the proposed law forward without amending it to remove this encryption-breaking capability has set off alarm bells that these new powers are a feature, not a bug.

There are already many insecurities in today's networks, reaching down to the infrastructure layers of communication technology. The Signalling System No. 7, developed in 1975 to route phone calls, has become a major source of insecurity for cellphones. In 2017, the CBC demonstrated how hackers only needed a Canadian MP's cell number to intercept his movements, text messages and phone calls. Little has changed since: A 2023 Citizen Lab report details pervasive vulnerabilities at the heart of the world's mobile networks. So it makes no sense that the Canadian government would itself seek the ability to create more holes, rather than patching them. Yet it is pushing for potential new powers that would infect next-generation cybersecurity tools with old diseases.

It's not as if the government wasn't warned. Citizen Lab researchers presented the 2023 report's findings in parliamentary hearings on Bill C-26, and leaders and experts in civil society and in Canada's telecommunications industry warned that the bill must be narrowed to prevent its broad powers to compel technical changes from being used to compromise the "confidentiality, integrity, or availability" of telecommunication services. And yet, while government MPs maintained that their intent is not to expand surveillance capabilities, MPs pushed the bill out of committee without this critical amendment last month. In doing so, the government has set itself up to be the sole arbiter of when, and on what conditions, Canadians deserve security for their most confidential communications -- personal, business, religious, or otherwise. The new powers would only make people in Canada more vulnerable to malicious threats to the privacy and security of all network users, including Canada's most senior officials. [...]
"Now, more than ever, there is no such thing as a safe backdoor," the authors write in closing. "A shortcut that provides a narrow advantage for the few at the expense of us all is no way to secure our complex digital ecosystem."

"Against this threat landscape, a pivot is crucial. Canada needs cybersecurity laws that explicitly recognize that uncompromised encryption is the backbone of cybersecurity, and it must be mandated and protected by all means possible."
United States

Colorado Enacts Right-to-Repair Law for Electronics (coloradotimesrecorder.com) 62

Colorado Governor Jared Polis has signed the "Consumer Right to Repair Digital Electronic Equipment" bill into law. The legislation grants consumers the right to repair their own electronic devices, including cell phones, gaming systems, computers, and televisions. According to Polis, the bill will provide Coloradans with the necessary information to repair their own equipment or choose their preferred repair provider, potentially leading to lower prices and faster repairs through increased competition.

State Senator Jeff Bridges, the bill's prime sponsor, called for the federal government and other states to follow Colorado's lead, claiming that this bill is the strongest repair legislation in the country. Bridges emphasized that the law addresses issues such as "parts pairing" and repair restrictions that have prevented owners from fixing their devices in the past. The bill expands on Colorado's previous right-to-repair law for agricultural equipment, which Polis cited as a successful precedent for this new legislation.
Bitcoin

Former FTX Executive Ryan Salame Sentenced To 7.5 Years In Prison (apnews.com) 14

Former FTX executive Ryan Salame has been sentenced to more than seven years in prison, "the first of the lieutenants of failed cryptocurrency mogul Sam Bankman-Fried to receive jail time for their roles in the 2022 collapse of the cryptocurrency exchange," reports the Associated Press. From the report: Salame, 30, was a high-ranking executive at FTX for most of the exchange's existence and, up until its collapse, was the co-CEO of FTX Digital Markets. He pleaded guilty last year to illegally making unlawful U.S. campaign contributions and to operating an unlicensed money-transmitting business. The sentence of 7 1/2 years in prison, plus three years of supervised release, was more than the five to seven years prosecutors had asked Judge Lewis A. Kaplan to impose on Salame in their pre-sentencing memo.

While Salame was a high-level executive at FTX, he was not a major part of the government's case against Bankman-Fried at his trial earlier this year and did not testify against him. In a bid for leniency, Salame said during the sentencing hearing that he cooperated and even provided documents that aided prosecutors in their cross examination of Bankman-Fried, as well as in his own prosecution. Along with helping Bankman-Fried hide the holes in FTX's balance sheet that ultimately led to the exchange's failure, Salame was used as a conduit for Bankman-Fried to make illegal campaign contributions to help shape U.S. policy on cryptocurrencies. On the surface, Bankman-Fried mostly gave political contributions to Democrats and liberal-leaning causes, while Salame gave contributions to Republicans and right-leaning causes. But ultimately the funds that Salame used for those contributions came from Bankman-Fried.

The judge also chastised Salame for pulling $5 million in cryptocurrencies out of FTX as the exchange was failing. "You tried to withdraw tens of millions more," Kaplan said. "It was me first. I'm getting in the lifeboat first. To heck with all those customers."

Piracy

Nvidia Denies Pirate e-Book Sites Are 'Shadow Libraries' To Shut Down Lawsuit (arstechnica.com) 105

An anonymous reader quotes a report from Ars Technica: Some of the most infamous so-called shadow libraries have increasingly faced legal pressure to either stop pirating books or risk being shut down or driven to the dark web. Among the biggest targets are Z-Library, which the US Department of Justice has charged with criminal copyright infringement, and Library Genesis (Libgen), which was sued by textbook publishers last fall for allegedly distributing digital copies of copyrighted works "on a massive scale in willful violation" of copyright laws. But now these shadow libraries and others accused of spurning copyrights have seemingly found an unlikely defender in Nvidia, the AI chipmaker among those profiting most from the recent AI boom.

Nvidia seemed to defend the shadow libraries as a valid source of information online when responding to a lawsuit from book authors over the list of data repositories that were scraped to create the Books3 dataset used to train Nvidia's AI platform NeMo. That list includes some of the most "notorious" shadow libraries -- Bibliotik, Z-Library (Z-Lib), Libgen, Sci-Hub, and Anna's Archive, authors argued. However, Nvidia hopes to invalidate authors' copyright claims partly by denying that any of these controversial websites should even be considered shadow libraries.

"Nvidia denies the characterization of the listed data repositories as 'shadow libraries' and denies that hosting data in or distributing data from the data repositories necessarily violates the US Copyright Act," Nvidia's court filing said. The chipmaker did not go into further detail to define what counts as a shadow library or what potentially absolves these controversial sites from key copyright concerns raised by various ongoing lawsuits. Instead, Nvidia kept its response brief while also curtly disputing authors' petition for class-action status and defending its AI training methods as fair use. "Nvidia denies that it has improperly used or copied the alleged works," the court filing said, arguing that "training is a highly transformative process that may include adjusting numerical parameters including 'weights,' and that outputs of an LLM may be based, at least in part, on such 'weights.'"
"Nvidia's argument likely depends on the court agreeing that AI models ingesting published works in order to transform those works into weights governing AI outputs is fair use," notes Ars. "However, authors have argued that 'these weights are entirely and uniquely derived from the protected expression in the training dataset' that has been copied without getting authors' consent or providing authors with compensation."

"Authors suing Nvidia have taken the next step, linking the chipmaker to shadow libraries by arguing that 'these shadow libraries have long been of interest to the AI-training community because they host and distribute vast quantities of unlicensed copyrighted material. For that reason, these shadow libraries also violate the US Copyright Act.'"
Security

Internet Archive and the Wayback Machine Under DDoS Cyberattack (archive.org) 31

The Internet Archive is "currently in its third day of warding off an intermittent DDoS cyber-attack," writes Chris Freeland, Director of Library Services at Internet Archive, in a blog post. While library staff stress that the archives are safe, access to its services are affected, including the Wayback Machine. From the post: Since the attacks began on Sunday, the DDoS intrusion has been launching tens of thousands of fake information requests per second. The source of the attack is unknown. "Thankfully the collections are safe, but we are sorry that the denial-of-service attack has knocked us offline intermittently during these last three days," explained Brewster Kahle, founder and digital librarian of the Internet Archive. "With the support from others and the hard work of staff we are hardening our defenses to provide more reliable access to our library. What is new is this attack has been sustained, impactful, targeted, adaptive, and importantly, mean." Cyber-attacks are increasingly frequent against libraries and other knowledge institutions, with the British Library, the Solano County Public Library (California), the Berlin Natural History Museum, and Ontario's London Public Library all being recent victims.

In addition to a wave of recent cyber-attacks, the Internet Archive is also being sued by the US book publishing and US recording industries associations, which are claiming copyright infringement and demanding combined damages of hundreds of millions of dollars and diminished services from all libraries. "If our patrons around the globe think this latest situation is upsetting, then they should be very worried about what the publishing and recording industries have in mind," added Kahle. "I think they are trying to destroy this library entirely and hobble all libraries everywhere. But just as we're resisting the DDoS attack, we appreciate all the support in pushing back on this unjust litigation against our library and others."

Bitcoin

Researchers Cracked an 11-Year-Old Password To a $3 Million Software-Based Crypto Wallet (wired.com) 74

An anonymous reader quotes a report from Wired: Two years ago when "Michael," an owner of cryptocurrency, contacted Joe Grand to help recover access to about $2 million worth of bitcoin he stored in encrypted format on his computer, Grand turned him down. Michael, who is based in Europe and asked to remain anonymous, stored the cryptocurrency in a password-protected digital wallet. He generated a password using the RoboForm password manager and stored that password in a file encrypted with a tool called TrueCrypt. At some point, that file got corrupted and Michael lost access to the 20-character password he had generated to secure his 43.6 BTC (worth a total of about [...] $5,300, in 2013). Michael used the RoboForm password manager to generate the password but did not store it in his manager. He worried that someone would hack his computer and obtain the password. "At [that] time, I was really paranoid with my security," he laughs.

Grand is a famed hardware hacker who in 2022 helped another crypto wallet owner recover access to $2 million in cryptocurrencyhe thought he'd lost forever after forgetting the PIN to his Trezor wallet. Since then, dozens of people have contacted Grand to help them recover their treasure. But Grand, known by the hacker handle "Kingpin," turns down most of them, for various reasons. Grand is an electrical engineer who began hacking computing hardware at age 10 and in 2008 cohosted the Discovery Channel's Prototype This show. He now consults with companies that build complex digital systems to help them understand how hardware hackers like him might subvert their systems. He cracked the Trezor wallet in 2022 using complex hardware techniques that forced the USB-style wallet to reveal its password. But Michael stored his cryptocurrency in a software-based wallet, which meant none of Grand's hardware skills were relevant this time. [...] Michael contacted multiple people who specialize in cracking cryptography; they all told him "there's no chance" of retrieving his money. But last June he approached Grand again, hoping to convince him to help, and this time Grand agreed to give it a try, working with a friend named Bruno in Germany who also hacks digital wallets.

Grand and Bruno spent months reverse engineering the version of the RoboForm program that they thought Michael had used in 2013 and found that the pseudo-random number generator used to generate passwords in that version -- and subsequent versions until 2015 -- did indeed have a significant flaw that made the random number generator not so random. The RoboForm program unwisely tied the random passwords it generated to the date and time on the user's computer -- it determined the computer's date and time, and then generated passwords that were predictable. If you knew the date and time and other parameters, you could compute any password that would have been generated on a certain date and time in the past. [...] There was one problem: Michael couldn't remember when he created the password. According to the log on his software wallet, Michael moved bitcoin into his wallet for the first time on April 14, 2013. But he couldn't remember if he generated the password the same day or some time before or after this. So, looking at the parameters of other passwords he generated using RoboForm, Grand and Bruno configured RoboForm to generate 20-character passwords with upper- and lower-case letters, numbers, and eight special characters from March 1 to April 20, 2013. It failed to generate the right password. [...] Instead, they revealed that they had finally found the correct password -- no special characters. It was generated on May 15, 2013, at 4:10:40 pm GMT.

Businesses

Russia Mulling Charging Companies To Use Foreign Software (yahoo.com) 34

Russia may charge domestic companies to use foreign software, the TASS news agency quoted Digital Development Minister Maksut Shadaev as saying on Tuesday, as Moscow seeks to cut dependency on foreign technology and bolster its own. From a report: President Vladimir Putin has made achieving technological independence a key goal, as Western sanctions over the war in Ukraine seek to hamstring Moscow's ability to acquire technology and equipment from abroad that could help it on the battlefield. As part of that push, Putin signed a decree in early May which stated that at least 80% of Russian companies in key economic sectors should transition to using Russian-made software by 2030. Many Russian companies still use foreign software in their daily operations, although an EU sanctions package passed last December prohibits companies from supplying enterprise and design-related software to Russia. Shadaev said that introducing a levy on Russian firms would "equalise" foreign and Russian software.

Slashdot Top Deals