posted 3 days ago on slashdot
An anonymous reader shares a report: Even if you're not a designer, you've probably heard the phrase "form follows function." That's how influential the school that espoused it, the Bauhaus, has become since its heyday in 1920s and '30s Germany. Now, some of the movement's most compelling -- but largely unknown -- lettering has been recreated from archival material, like original typography sketches and letter fragments, and transformed into contemporary digital typefaces. The project is part of an Adobe initiative called Hidden Treasures that resurfaces design gems from the past in Adobe products -- previously, the company recreated the paintbrushes used by painter Edvard Munch for use in Photoshop. For the second iteration of the initiative, Adobe worked with the Bauhaus archives in Berlin, Germany, to bring in five design students to create five distinct typefaces, all under the guidance of expert typeface designer Erik Spiekermann. While each of the typefaces will eventually be available to all users of Adobe Typekit, two are now available online: one inspired by Joost Schmidt, a teacher at the Bauhaus who also created the famed poster for the 1923 Bauhaus Exhibition, and the other inspired by Xanti Schawinsky, who taught classes in set design at the school.

Read More...
posted 3 days ago on slashdot
An anonymous reader shares a report: Although many businesses have begun moving to DevOps-style processes, eight out of 10 respondents to a new survey say they still have separate teams for managing infrastructure/operations and development. The study by managed cloud specialist 2nd Watch of more than 1,000 IT professionals indicates that a majority of companies have yet to fully commit to the DevOps process. 78 percent of respondents say that separate teams are still managing infrastructure/operations and application development. Some organizations surveyed are using infrastructure-as-code tools, automation or even CI/CD pipelines, but those techniques alone do not define DevOps.

Read More...
posted 3 days ago on slashdot
An anonymous reader writes: Kaspersky Lab announced it was temporarily halting its cooperation with Europol following the voting of a controversial motion in the European Parliament. The Russian antivirus vendor will also stop working on the NoMoreRansom project that provided free ransomware decrypters for ransomware victims. The company's decision comes after the EU Parliament voted a controversial motion that specifically mentions Kaspersky as a "confirmed as malicious" software and urges EU states to ban it as part of a joint EU cyber defense strategy. The EU did not present any evidence for its assessment that Kaspersky is malicious, but even answered user questions claiming it has no evidence. The motion is just a EU policy and has no legislative power, put it is still an official document. Kaspersky software has been previously banned from Government systems in the US, UK, Netherlands, and Lithuania.

Read More...
posted 3 days ago on slashdot
An anonymous reader shares a report: Former FBI Director James Comey, who led the investigation into Hillary Clinton's use of personal email while secretary of state, also used his personal email to conduct official business, according to a report from the Justice Department on Thursday. The report also found that while Comey was "insubordinate" in his handling of the email investigation, political bias did not play a role in the FBI's decision to clear Clinton of any criminal wrongdoing. The report from the office of the inspector general "identified numerous instances in which Comey used a personal email account (a Gmail account) to conduct FBI business." In three of the five examples, investigators said Comey sent drafts he had written from his FBI email to his personal account. In one instance, he sent a "proposed post-election message for all FBI employees that was entitled 'Midyear thoughts,'" the report states. In another instance, Comey again "sent multiple drafts of a proposed year-end message to FBI employees" from his FBI account to his personal email account.

Read More...
posted 3 days ago on slashdot
Joseph Cox, and Lorenzo Franceschi-Bicchierai, reporting for Motherboard: Apple confirmed to The New York Times Wednesday it was going to introduce a new security feature, first reported by Motherboard. USB Restricted Mode, as the new feature is called, essentially turns the iPhone's lightning cable port into a charge-only interface if someone hasn't unlocked the device with its passcode within the last hour, meaning phone forensic tools shouldn't be able to unlock phones. Naturally, this feature has sent waves throughout the mobile phone forensics and law enforcement communities, as accessing iPhones may now be substantially harder, with investigators having to rush a seized phone to an unlocking device as quickly as possible. That includes GrayKey, a relatively new and increasingly popular iPhone cracking tool. But forensics experts suggest that Grayshift, the company behind the tech, is not giving up yet. "Grayshift has gone to great lengths to future proof their technology and stated that they have already defeated this security feature in the beta build. Additionally, the GrayKey has built in future capabilities that will begin to be leveraged as time goes on,' a June email from a forensic expert who planned to meet with Grayshift, and seen by Motherboard, reads, although it is unclear from the email itself how much of this may be marketing bluff. "They seem very confident in their staying power for the future right now," the email adds. A second person, responding to the first email, said that Grayshift addressed USB Restricted Mode in a webinar several weeks ago.

Read More...
posted 3 days ago on slashdot
Brian Fagioli, writing for BetaNews: Samsung announces its latest such laptop -- the premium, yet affordable, Chromebook Plus (V2). This is a refresh of the first-gen "Plus" model. It can run Android apps and doubles as a convertible tablet, making it very versatile. Best of all, you won't have to wait long to get it -- it will go on sale very soon. "The Samsung Chromebook Plus (V2) puts productivity and entertainment at consumers' fingertips and at the tip of the built-in pen. At 2.91 pounds, its thin design makes it easy to slip into a bag and carry all day -- or use throughout the day with its extended battery life. Flipping its 12.2-inch FHD 1920x1080 resolution screen transforms it from notebook to tablet to sketchbook -- and back -- with two cameras for making it easier to stay connected with friends and sharing with the world. Plus, Chrome OS helps users get more done by providing access to millions of Android apps on Google Play," says Samsung. The Chromebook Plus, powered by Intel Celeron Processor 3965Y and 4GB of RAM, goes on sale later this month at $499.

Read More...
posted 3 days ago on slashdot
Quentin Carnicelli, the chief technology officer at Rogue Amoeba, a widely-reputed firm that produces several audio software for Apple's desktop operating system: With Apple recently releasing their first developer beta of MacOS 10.14 (Mojave), we've been installing it on various test machines to test our apps. The inevitable march of technology means Mojave won't install on all of our older hardware. There's no shock there, but the situation is rather distressing when it comes to spending money to purchase new equipment. Here is the situation, as reported by the wonderful MacRumor's Buyers Guide: At the time of the writing, with the exception of the $5,000 iMac Pro, no Macintosh has been updated at all in the past year. Here are the last updates to the entire line of Macs: iMac Pro: 182 days ago, iMac: 374 days ago, MacBook: 374 days ago, MacBook Air: 374 days ago, MacBook Pro: 374 days ago, Mac Pro: 436 days ago, and Mac Mini: 1337 days ago. Worse, most of these counts are misleading, with the machines not seeing a true update in quite a bit longer. The Mac Mini hasn't seen an update of any kind in almost 4 years (nor, for that matter, a price drop). The once-solid Mac Pro was replaced by the dead-end cylindrical version all the way back in 2012, which was then left to stagnate. I don't even want to get started on the MacBook Pro's questionable keyboard, or the MacBook's sole port (USB-C which must also be used to provide power). It's very difficult to recommend much from the current crop of Macs to customers, and that's deeply worrisome to us, as a Mac-based software company.

Read More...
posted 3 days ago on slashdot
An anonymous reader shares a report: Who is Satoshi Nakamoto? Ever since this pseudonymous person or group unleashed Bitcoin on the world in 2008, Nakamoto's real identity has been one of the biggest mysteries in the cryptocurrency world. And based on a response to my recent Freedom of Information Act (FOIA) request, if the CIA knows anything, it's not talking. [...] In 2016, Alexander Muse, a blogger who mostly writes about entrepreneurship, wrote a blog post that claimed the NSA had identified the real identity of Satoshi Nakamoto using stylometry, which uses a person's writing style as a unique fingerprint, and then searched emails collected under the PRISM surveillance program to identify the real Nakamoto. Muse said the identity was not shared with him by his source at the Department of Homeland Security. [...] I figured it couldn't hurt to ask some other three-letter agencies what they know about Nakamoto. [...] I received a terse reply that informed me that "the request has been rejected, with the agency stating that it can neither confirm nor deny the existence of the requested documents."

Read More...
posted 3 days ago on slashdot
An anonymous reader writes: Between 60 and 90 percent of the world's fresh water is frozen in the ice sheets of Antarctica, a continent roughly the size of the United States and Mexico combined. If all that ice melted, it would be enough to raise the world's sea levels by roughly 200 feet. While that won't happen overnight, Antarctica is indeed melting, and a study published Wednesday in the journal Nature shows that the melting is speeding up. The rate at which Antarctica is losing ice has tripled since 2007, according to the latest available data. The continent is now melting so fast, scientists say, that it will contribute six inches (15 centimeters) to sea-level rise by 2100. That is at the upper end of what the Intergovernmental Panel on Climate Change has estimated Antarctica alone could contribute to sea level rise this century. "Around Brooklyn you get flooding once a year or so, but if you raise sea level by 15 centimeters then that's going to happen 20 times a year," said Andrew Shepherd, a professor of earth observation at the University of Leeds and the lead author of the study. Even under ordinary conditions, Antarctica's landscape is perpetually changing as icebergs calve, snow falls and ice melts on the surface, forming glacial sinkholes known as moulins. But what concerns scientists is the balance of how much snow and ice accumulates in a given year versus the amount that is lost.

Read More...
posted 3 days ago on slashdot
Steven J. Vaughan-Nichols, writing for ZDNet: The latest Intel revelation, Lazy FP state restore, can theoretically pull data from your programs, including encryption software, from your computer regardless of your operating system. Like its forebears, this is a speculative execution vulnerability. In an interview, Red Hat Computer Architect Jon Masters explained: "It affects Intel designs similar to variant 3-a of the previous stuff, but it's NOT Meltdown." Still, "it allows the floating point registers to be leaked from another process, but alas that means the same registers as used for crypto, etc." Lazy State does not affect AMD processors. This vulnerability exists because modern CPUs include many registers (internal memory) that represent the state of each running application. Saving and restoring this state when switching from one application to another takes time. As a performance optimization, this may be done "lazily" (i.e., when needed) and that is where the problem hides. This vulnerability exploits "lazy state restore" by allowing an attacker to obtain information about the activity of other applications, including encryption operations. Further reading: Twitter thread by FreeBSD's security officer Colin Percival, BleepingComputer, and HotHardware.

Read More...
posted 3 days ago on slashdot
Microsoft is working on technology that would eliminate cashiers and checkout lines from stores, in a nascent challenge to Amazon.com's automated grocery shop, Reuters reported, citing six people familiar with the matter. From the report: The Redmond, Wash.-based software giant is developing systems that track what shoppers add to their carts, the people say. Microsoft has shown sample technology to retailers from around the world and has had talks with Walmart about a potential collaboration, three of the people said. Microsoft's technology aims to help retailers keep pace with Amazon Go, a highly automated store that opened to the public in Seattle in January. Amazon customers scan their smartphones at a turnstile to enter. Cameras and sensors identify what they remove from the shelves. When customers are finished shopping, they simply leave the store and Amazon bills their credit cards on file. Amazon Go, which will soon open in Chicago and San Francisco, has sent rivals scrambling to prepare for yet another disruption by the world's biggest online retailer. Some have tested programs where customers scan and bag each item as they shop, with mixed results.

Read More...
posted 3 days ago on slashdot
Comcast, which has been throttling speeds to slow down heavy internet users since 2008, has had a change of heart. From a report: Comcast has deactivated this "congestion management" system, according to an announcement this week. "As reflected in a June 11, 2018 update to our XFINITY Internet Broadband Disclosures, the congestion management system that was initially deployed in 2008 has been deactivated. As our network technologies and usage of the network continue to evolve, we reserve the right to implement a new congestion management system if necessary in the performance of reasonable network management and in order to maintain a good broadband Internet access service experience for our customers, and will provide updates here as well as other locations if a new system is implemented."

Read More...
posted 3 days ago on slashdot
Chicago has picked Elon Musk's Boring Company to build a futuristic transportation link to the city's airport, The Boring Company said late Wednesday. "We're really excited to work with the Mayor and the City to bring this new high-speed public transportation system to Chicago!' it said in a statement posted on Twitter. Chicago Tribune: Autonomous 16-passenger vehicles would zip back and forth at speeds exceeding 100 mph in tunnels between the Loop and O'Hare International Airport under a high-speed transit proposal being negotiated between Mayor Rahm Emanuel's City Hall and billionaire tech entrepreneur Elon Musk's The Boring Co., city and company officials have confirmed. Emanuel's administration has selected Musk's company from four competing bids to provide high-speed transportation between downtown and the airport. Negotiations between the two parties will ensue in hopes of reaching a final deal to provide a long-sought-after alternative to Chicago's traffic gridlock and slower "L" trains. In choosing Boring, Emanuel and senior City Hall officials are counting on Musk's highly touted but still unproven tunneling technology over the more traditional high-speed rail option that until recently had been envisioned as the answer to speeding up the commute between the city's central business district and one of the world's busiest airports.

Read More...
posted 3 days ago on slashdot
A creature as majestic as a whale, you might think, should have no owner. Yet it turns out that certain snippets of the DNA that makes a sperm whale a sperm whale are actually the subjects of patents -- meaning that private entities have exclusive rights to their use for research and development. From a report: The same goes for countless other marine species. And new research shows that a single German chemical company owns 47 percent of patented marine gene sequences. A just-published paper in Science Advances finds that 862 separate species of marine life have genetic patents associated with them. "It's everything from microorganisms to fish species," says lead author Robert Blasiak, a conservation researcher at the University of Stockholm who was shocked to find out how many genetic sequences in the ocean were patented. "Even iconic species" -- like plankton, manta rays, and yes, sperm whales. Of some 13,000 genetic sequences targeted by patents, nearly half are the intellectual property of a company called Baden Aniline and Soda Factory (BASF).

Read More...
posted 4 days ago on slashdot
An anonymous reader shares a report: Sophisticated malware, software security breaches, mobile scams -- the list of cybercrime threats is growing. Yet African nations continue to fall short of protecting themselves and must constantly grapple with the impact. A new study from IT services firm Serianu shows the pervasive nature of cybercrime across the continent, affecting businesses, individuals, families, financial institutions, and government agencies. The study shows how weak security architectures, the scarcity of skilled personnel and a lack of awareness and strict regulations have increased vulnerability. Cybercrime cost the continent an estimated $3.5 billion in 2017. The report found more than 90% of African businesses were operating below the cybersecurity "poverty line" -- meaning they couldn't adequately protect themselves against losses. At least 96% of online-related security incidents went unreported and 60% of organizations didn't keep up to date with cybersecurity trends and program updates. (In addition, at least 90% of parents didn't understand what measures to take to protect their children from cyber-bullying.)

Read More...
posted 4 days ago on slashdot
In an effort to "reduce undesired consequences," Uber is seeking a patent that would use artificial intelligence to separate sober passengers from drunk ones. The pending application details a technology that would be used to spot "uncharacteristic user activity," including passenger location, number of typos entered into the mobile app, and even the angle the smartphone is being held. CNET reports: Uber said it had no immediate plans to implement the technology described in the proposed patent, pointing out the application was filed in 2016. "We are always exploring ways that our technology can help improve the Uber experience for riders and drivers," a spokesperson said. "We file patent applications on many ideas, but not all of them actually become products or features."

Read More...
posted 4 days ago on slashdot
Researchers at the Massachusetts Institute of Technology have developed a new piece of software that uses wifi signals to monitor the movements, breathing, and heartbeats of humans on the other side of walls. While the researchers say this new tech could be used in areas like remote healthcare, it could in theory be used in more dystopian applications. Inverse reports: "We actually are tracking 14 different joints on the body [...] the head, the neck, the shoulders, the elbows, the wrists, the hips, the knees, and the feet," Dina Katabi, an electrical engineering and computer science teacher at MIT, said. "So you can get the full stick-figure that is dynamically moving with the individuals that are obstructed from you -- and that's something new that was not possible before." The technology works a little bit like radar, but to teach their neural network how to interpret these granular bits of human activity, the team at MIT's Computer Science and Artificial Intelligence Laboratory (CSAIL) had to create two separate A.I.s: a student and a teacher. [T]he team developed one A.I. program that monitored human movements with a camera, on one side of a wall, and fed that information to their wifi X-ray A.I., called RF-Pose, as it struggled to make sense of the radio waves passing through that wall on the other side. The research builds off of a longstanding project at CSAIL lead by Katabi, which hopes to use this wifi tracking to help passively monitor the elderly and automate any emergency alerts to EMTs and medical professionals if they were to fall or suffer some other injury. For more information, a press release and video about the software are available.

Read More...
posted 4 days ago on slashdot
China is establishing an electronic identification system to track cars nationwide, according to a report on WSJ, which cites records and people briefed on the matter. From a report: Under the plan being rolled out July 1, a radio-frequency identification chip for vehicle tracking will be installed on cars when they are registered. Compliance will be voluntary this year but will be made mandatory for new vehicles at the start of 2019, the people said. Authorities have described the plan as a means to improve public security and to help ease worsening traffic congestion, documents show, a major concern in many Chinese cities partly because clogged roads contribute to air pollution. But such a system, implemented in the world's biggest automotive market, with sales of nearly 30 million vehicles a year, will also vastly expand China's surveillance network, experts say. That network already includes widespread use of security cameras, facial recognition technology and internet monitoring.

Read More...
posted 4 days ago on slashdot
An anonymous reader quotes a report from Reuters: Future Mobility Corporation (FMC), the Chinese parent company behind electric car start-up Byton, has placed an order for a paint shop capable of handling 150,000 cars per year, German supplier Duerr said on Wednesday. China's Byton, a newcomer headed by the former head of BMW's i8 program, has already released plans for a premium electric SUV vehicle, the latest in a series of China-backed electric autonomous prototypes. Byton has financial backing from Chinese state-owned carmaker FAW Group and the country's dominant battery producer Contemporary Amperex Technology Co. (CATL) This is just one of the stories this week relating to China and the electric car industry. MIT Technology Review adds: In a public offering on June 11 in Shenzhen, battery giant Contemporary Amperex Technology Ltd. (CATL) raised nearly $1 billion to fund ambitious expansion plans, and its stock has been shooting up every day since. Thanks largely to the company's new plants, China will be making 70 percent of the world's electric-vehicle batteries by 2021, according to Bloomberg New Energy Finance (BNEF). Just seven years later, CATL has built up the biggest lithium-ion manufacturing facilities in the world, according to BNEF. The company can crank out around 17 gigawatt-hours of lithium-ion cells annually, placing it just ahead of Korea's LG Chem, the Tesla and Panasonic partnership, and China's electric-vehicle giant BYD. Flush with capital from its offering, CATL plans to build two new plants and expand existing facilities, pushing its capacity to nearly 90 gigawatt-hours by 2020. [...] Notably, it's the only Chinese battery company so far to line up deals to supply foreign automakers, including BMW, Honda, Nissan, Toyota, and Volkswagen.

Read More...
posted 4 days ago on slashdot
Researchers at UC Berkeley are using futuristic technology to save a piece of the past. From a report: Project IRENE is using cutting-edge optical scan technology to transfer and digitally restore recordings of indigenous languages, many of which no longer have living speakers, Hyperallergic first reported. The recordings were gathered between 1900 and 1938 when UC anthropologists asked native speakers of 78 indigenous languages of California to record their songs, histories, prayers, and vocabulary on wax cylinders. Many of those cylinders are housed at Berkeley's Phoebe A. Hearst Museum of Anthropology, and they are in a state of disrepair, degraded and broken. It's a frustrating state of affairs, as many of the languages recorded on the cylinders have fallen out of use or are no longer spoken at all. The "Documenting Endangered Languages" initiative, which has support from the National Science Foundation and the National Endowment for the Humanities, is hoping to save this important history.

Read More...
posted 4 days ago on slashdot
stikves writes: According to online reports, a recent court order has banned Periscope across Turkey. The cited reason is the alleged violation of copyrights of a local company named "Periskop." This adds to the list of online services no longer available in Turkey, including Wikipedia, PayPal and WordPress, among others. While access from Turkey to the domain periscope.tv and to the Twitter account "periscopeco" is banned, users can still access Periscope services under the name Scope TR and Twitter account "scopetr." Lawyers from Twitter, Apple and Google requested rejection of the case, "saying it was impossible for a company like Twitter, operating in the U.S., to be aware of the existence of the same brand name in Turkey," reports Stockholm Center for Freedom.

Read More...
posted 4 days ago on slashdot
Following the recent official repeal of net neutrality and approval of AT&T's acquisition of Time Warner, an anonymous reader shares an excerpt from a report via TechCrunch, written by Danny Crichton. Crichton discusses the options Alphabet, Netflix and other video streaming services have on how to respond: For Alphabet, that will likely mean a redoubling of its commitment to Google Fiber. That service has been trumpeted since its debut, but has faced cutbacks in recent years in order to scale back its original ambitions. That has meant that cities like Atlanta, which have held out for the promise of cheap and reliable gigabit bandwidth, have been left in something of a lurch. Ultimately, Alphabet's strategic advantage against Comcast, AT&T and other massive ISPs is going to rest on a sort of mutually assured destruction. If Comcast throttles YouTube, then Alphabet can propose launching in a critical (read: lucrative) Comcast market. Further investment in Fiber, Project Fi or perhaps a 5G-centered wireless strategy will be required to give it to the leverage to bring those negotiations to a better outcome. For Netflix, it is going to have to get into the connectivity game one way or the other. Contracts with carriers like Comcast and AT&T are going to be more challenging to negotiate in light of today's ruling and the additional power they have over throttling. Netflix does have some must-see shows, which gives it a bit of leverage, but so do the ISPs. They are going to have to do an end-run around the distributors to give them similar leverage to what Alphabet has up its sleeve. One interesting dynamic I could see forthcoming would be Alphabet creating strategic partnerships with companies like Netflix, Twitch and others to negotiate as a collective against ISPs. While all these services are at some level competitors, they also face an existential threat from these new, vertically merged ISPs. That might be the best of all worlds given the shit sandwich we have all been handed this week.

Read More...
posted 4 days ago on slashdot
The official app for the Spanish soccer league La Liga, which has more than 10 million downloads from Google Play, was recently updated to seek access to users' microphone and GPS settings. "When granted, the app processes audio snippets in an attempt to identify public venues that broadcast soccer games without a license," reports Ars Technica. From the report: According to a statement issued by La Liga officials, the functionality was added last Friday and is enabled only after users click "eyes" to an Android dialog asking if the app can access the mic and geolocation of the device. The statement says the audio is used solely to identify establishments that broadcast games without a license and that the app takes special precautions to prevent it from spying on end users. [La Liga's full statement with the "appropriate technical measures to protect the user's privacy" is embedded in Ars' report.] [E]ven if the app uses a cryptographic hash or some other means to ensure that stored or transmitted audio fragments can't be abused by company insiders or hackers (a major hypothetical), there are reasons users should reject this permission. For one, allowing an app to collect the IP address, unique app ID, binary representation of audio, and the time that the audio was converted could provide a fair amount of information over time about a user. For another, end users frequenting local bars and restaurants shouldn't be put in the position of policing the copyrights of sports leagues, particularly with an app that uses processed audio from their omnipresent phone.

Read More...
posted 4 days ago on slashdot
Volkswagen was fined one billion euros ($1.18 billion) over diesel emissions cheating in what amounts to one of the highest ever fines imposed by German authorities against a company, public prosecutors said on Wednesday. From a report: The German fine follows a U.S. plea agreement from January 2017 when VW agreed to pay $4.3 billion to resolve criminal and civil penalties for installing illegal software in diesel engines to cheat strict U.S. anti-pollution tests. "Following thorough examination, Volkswagen AG accepted the fine and it will not lodge an appeal against it. Volkswagen AG, by doing so, admits its responsibility for the diesel crisis and considers this as a further major step toward the latter being overcome," it said in a statement. The fine is the latest blow to Germany's auto industry which cannot seem to catch a break from the diesel emissions crisis. Germany's government on Monday ordered Daimler to recall nearly 240,000 cars fitted with illicit emissions-control devices, part of a total of 774,000 models affected in Europe as a whole.

Read More...
posted 4 days ago on slashdot
Mark Wilson shares a report from BetaNews: Another week, another cyberattack. This time around, it's the Dixons Carphone group which says it has fallen victim to not one but two major breaches. The bank card details of 5.9 million customers have been accessed by hackers in the first breach. In the second, the personal records of 1.2 million people have been exposed. Dixons Carphone says that it is investigating an attack on its card processing system at Currys PC World and Dixons Travel in which there was an attempt to compromise 5.9 million cards. The company stressed that the vast majority -- 5.8 million -- of these cards were protected by chip and PIN, and that the data accessed did not include PINS, CVVs or any other authentication data that could be used to make payments or identify the card owners. The report goes on to mention that 105,000 non-EU issued payment cards, which were not chip and PIN protected, were also affected. The company says it will be contacting those customers affected by the breaches.

Read More...