By BeauHD from
Slashdot's behind-the-scenes department:
An anonymous reader quotes a report from Motherboard: Wednesday, Valve, the company that operates the huge online video game store Steam, shared more details about how it plans to control and moderate the ever-increasing number of games published on its platform. In the post published Wednesday, Valve shared more details about how it determines what it considers "outright trolling." "It is vague and we'll tell you why," Valve wrote. "You're a denizen of the internet so you know that trolls come in all forms. On Steam, some are simply trying to rile people up with something we call 'a game shaped object' (ie: a crudely made piece of software that technically and just barely passes our bar as a functioning video game but isn't what 99.9% of folks would say is "good.")
Valve goes on to explain that some trolls are trying to scam folks out of their Steam inventory items (digital items that can be traded for real money), while others are trying to generate a small amount of money through a variety of schemes that have to do with how developers use keys to unlock Steam games, while others are trying to "incite and sow discord." "Trolls are figuring out new ways to be loathsome as we write this," Valve said. "But the thing these folks have in common is that they aren't actually interested in good faith efforts to make and sell games to you or anyone. When a developer's motives aren't that, they're probably a troll." One interesting observation Valve shares in the blog post is that it rarely bans individual games from Steam, and more often bans developers and/or publishers entirely. [...] Valve said that its review process for determining that something may be a "troll game" is a "deep assessment" that involves investigating who the developer is, what they've done in the past, their behavior on Steam as a developer, as a customer, their banking information, developers they associate with, and more.
Read Replies (0)
By BeauHD from
Slashdot's easier-said-than-done department:
pgmrdlm shares a report from The Verge: Best known for coining the phrase "net neutrality" and his book The Master Switch: The Rise and Fall of Information Empires, Wu has a new book coming out in November called The Curse of Bigness: Antitrust in the New Gilded Age. In it, he argues compellingly for a return to aggressive antitrust enforcement in the style of Teddy Roosevelt, saying that Google, Facebook, Amazon, and other huge tech companies are a threat to democracy as they get bigger and bigger. "We live in America, which has a strong and proud tradition of breaking up companies that are too big for inefficient reasons," Wu told me on this week's Vergecast. "We need to reverse this idea that it's not an American tradition. We've broken up dozens of companies."
"I think if you took a hard look at the acquisition of WhatsApp and Instagram, the argument that the effects of those acquisitions have been anticompetitive would be easy to prove for a number of reasons," says Wu. And breaking up the company wouldn't be hard, he says. "What would be the harm? You'll have three competitors. It's not 'Oh my god, if you get rid of WhatsApp and Instagram, well then the whole world's going to fall apart.' It would be like 'Okay, now you have some companies actually trying to offer you an alternative to Facebook.'" Breaking up Facebook (and other huge tech companies like Google and Amazon) could be simple under the current law, suggests Wu. But it could also lead to a major rethinking of how antitrust law should work in a world where the giant platform companies give their products away for free, and the ability for the government to restrict corporate power seems to be diminishing by the day. And it demands that we all think seriously about the conditions that create innovation. "I think everyone's steering way away from the monopolies, and I think it's hurting innovation in the tech sector," says Wu.
Read Replies (0)
By BeauHD from
Slashdot's leak-detecting department:
A 28-year-old MIT graduate named You Wu spent six years developing a low-cost robot designed to find leaks in pipes early, both to save water and to avoid bigger damage later from bursting water mains. "Called Lighthouse, the robot looks like a badminton birdie," reports Fast Company. "A soft 'skirt' on the device is covered with sensors. As it travels through pipes, propelled by the flowing water, suction tugs at the device when there's a leak, and it records the location, making a map of critical leaks to fix." From the report: MIT doctoral student You Wu spent six years developing the design, building on research that earlier students began under a project sponsored by a university in Saudi Arabia, where most drinking water comes from expensive desalination plants and around a third of it is lost to leaks. It took three years before he had a working prototype. Then Wu got inspiration from an unexpected source: At a party with his partner, he accidentally stepped on her dress. She noticed immediately, unsurprisingly, and Wu realized that he could use a similar skirt-like design on a robot so that the robot could detect subtle tugs from the suction at each leak. Wu graduated from MIT in June, and is now launching the technology through a startup called WatchTower Robotics. The company will soon begin pilots in Australia and in Cambridge, Massachusetts. One challenge now, he says, is creating a guide so water companies can use the device on their own.
Read Replies (0)
By BeauHD from
Slashdot's ensuring-the-integrity-of-elections department:
The National Academies Press has released a 156-page report, called "Securing the Vote: Protecting American Democracy," concluding that blockchains are not safe for the U.S. election system. "While the notion of using a blockchain as an immutable ballot box may seem promising, blockchain technology does little to solve the fundamental security issues of elections, and indeed, blockchains introduce additional security vulnerabilities," the report states. "In particular, if malware on a voter's device alters a vote before it ever reaches a blockchain, the immutability of the blockchain fails to provide the desired integrity, and the voter may never know of the alteration." The report goes on to say that "Blockchains do not provide the anonymity often ascribed to them." It continues: "In the particular context of elections, voters need to be authorized as eligible to vote and as not having cast more than one ballot in the particular election. Blockchains do not offer means for providing the necessary authorization. [...] If a blockchain is used, then cast ballots must be encrypted or otherwise anonymized to prevent coercion and vote-selling." The New York Times summarizes the findings: The cautiously worded report calls for conducting all federal, state and local elections on paper ballots by 2020. Its other top recommendation would require nationwide use of a specific form of routine postelection audit to ensure votes have been accurately counted. The panel did not offer a price tag for its recommended overhaul. New York University's Brennan Center has estimated that replacing aging voting machines over the next few years could cost well over $1 billion. The 156-page report [...] bemoans a rickety system compromised by insecure voting equipment and software whose vulnerabilities were exposed more than a decade ago and which are too often managed by officials with little training in cybersecurity.
<
article continued at Slashdot's ensuring-the-integrity-of-elections department >
Read Replies (0)
By msmash from
Slashdot's security-woes department:
Open .git directories are a bigger cybersecurity problem than many might imagine, at least according to a Czech security researcher who discovered almost 400,000 web pages with an open .git directory possibly exposing a wide variety of data. From a report: Vladimir Smitka began his .git directory odyssey in July when he began looking at Czech websites to find how many were improperly configured and allow access to their .git folders within the file versions repository. Open .git directories are a particularly dangerous issue, he said, because they can contain a great deal of sensitive information. "Information about the website's structure, and sometimes you can get very sensitive data such as database passwords, API keys, development IDE settings, and so on. However, this data shouldn't be stored in the repository, but in previous scans of various security issues, I have found many developers that do not follow these best practices," Smitka wrote. Smitka queried 230 million websites to discover the 390,000 allowing access to their .git directories. The vast majority of the websites with open directories had a .com TLD with .net, .de, .org and uk comprising most of the others.
Read Replies (0)
By msmash from
Slashdot's for-the-record department:
The Tor Browser has rolled out a new interface with the release of v8. From a report: The Tor Browser has always been based on the Firefox codebase, but it lagged behind a few releases. Mozilla rolled out a major overhaul of the Firefox codebase in November 2017, with the release of Firefox 57, the first release in the Firefox Quantum series. Firefox Quantum came with a new page rendering engine, a new add-ons API, and a new user interface called the Photon UI. Because these were major, code-breaking changes, it took the smaller Tor team some time to integrate all of them into the Tor Browser codebase and make sure everything worked as intended. The new Tor Browser 8, released yesterday, is now in sync with the most recent version of Firefox, the Quantum release, and also supports all of its features. This means the Tor Browser now uses the same modern Photon UI that current Firefox versions use, it supports the same speed-optimized page rendering engine and has also dropped support for the old XUL-based add-ons system for the new WebExtensions API system used by Chrome, Opera, Vivaldi, Brave, and the rest of the Chromium browsers.
Read Replies (0)
By msmash from
Slashdot's they-don't-really-care-about-us department:
The Equifax data breach was supposed to change everything about cybersecurity regulation on Capitol Hill. A year ago, Equifax announced that 145.5 million U.S. adults had their social security numbers stolen in an easily preventable breach. If any data breach was going to be able to shock Washington into enacting sweeping privacy reforms, this should have been it. Axios: But that didn't happen: "The initial interest that was implied by congressional actions didn't pan out," said Michelle Richardson, director of the Privacy and Data Project at the Center for Democracy and Technology (CDT). What was supposed to happen: After the first of several hearings involving Equifax, Sen. Chuck Grassley (R-Iowa), chair of the Judiciary Committee, said it was "long past time" for federal standards for how companies like Equifax secure data. Data security wasn't the only anticipated reform. Congress appeared poised to create a national breach notification law governing how and how quickly companies must notify anybody whose personal information is stolen in a breach. Currently, to the chagrin of national retailers, those laws vary state to state. Several investigations were supposed to penalize the credit bureau for lax cybersecurity, including failing to patch the vulnerability hackers exploited despite government warnings. What actually happened: The bills petered out. Mick Mulvaney took over the Consumer Financial Protection Bureau in November and halted the bureau's investigation.
Read Replies (0)
By msmash from
Slashdot's looking-closer department:
The Information (paywalled) reports: In 2012, Mr. Cue took on even more responsibility when Mr. Cook fired Scott Forstall, then a senior vice president of the iOS software powering iPhones. Mr. Forstall had overseen the launch of Apple Maps, which was panned due to misplaced landmarks, distorted satellite images and other problems. With Mr. Forstall gone, Mr. Cue took over Apple Maps and Siri, the intelligent assistant that launched as a major feature of the iPhone 4S the prior year. From the moment he gained responsibility for Siri, Mr. Cue seemed to lack much interest in it, according to people who worked on the project. When Siri team members presented Mr. Cue with technical data around the performance of the assistant -- an area of frequent criticism of the technology -- Mr. Cue appeared bored and seemed to fall asleep in at least two meetings, said a former Apple employee who was present. [...] One obstacle for Mr. Cue, in his meetings with television executives, was that he didn't encounter the kind of desperation that made it possible for Apple to sign all the major record labels, then being ravaged by piracy, to iTunes. Cord-cutting -- people dumping their cable and satellite subscriptions -- had not yet emerged as a problem. "Apple kept wanting to use the same playbook, and it's not going to work in the video world," said a former Apple executive who worked on video. Around four years ago, Mr. Cue oversaw development of a version of Apple TV that could integrate with cable services, with the goal of replacing set-top boxes distributed by the likes of Comcast and Time Warner Cable, said a former Apple employee. The Apple TV box -- with a coaxial cable port for plugging into cable networks and software to handle the combination of live and on-demand video -- never launched due to disagreements with the potential cable partners. Apple engineers involved in the product were dispirited, said a former employee. A non-paywalled source.
Read Replies (0)
By msmash from
Slashdot's closer-look department:
Three months after the American Civil Liberties Union revealed that Amazon provided facial recognition technology to local law enforcement, a new report by The Intercept says that IBM collaborated with the New York City Police Department to develop a system that allowed officials to search for people by skin color, hair color, gender, age, and various facial features. VentureBeat: The Intercept and the National Institute's nonprofit Investigative Fund, citing "confidential corporate documents" and interviews with engineers involved with the project, write that IBM began developing the analytics platform roughly 10 years ago in partnership with New York's Lower Manhattan Security Initiative counterterrorist center, after an earlier experiment with the city of Chicago. Using "thousands" of photographs from roughly 50 cameras provided by the NYPD, its computer vision system learned from 16,000 points to identify clothing color and other bodily characteristics, in addition to potential threats like unattended packages, people entering off-limits areas, and cars speeding up against the flow of traffic.
Read Replies (0)
By BeauHD from
Slashdot's new-and-improved department:
Audiofan writes: Just when we thought Sony learned their lessons from past formats DOA, they are at it again this time by teaming up with IMAX and select partners to certify the "IMAX movie experience" for home theater setups. Will Sony be on the losing side against already established Dolby Vision and HDR10 or will they leverage IMAX's immersive picture and sound quality on top of these other technologies? This smells like a format war or at the very least more consumer confusion. The new certification and license program from IMAX and DTS will give what they say to be the highest-quality image and sound experiences for home theater. "IMAX and DTS [as well as partners Denon, Marantz, Sony, and Paramount Studios] aren't clear as to whether this will be significantly different from DTS:X immersive 3D sound other than to say, 'The DTS:X codec technology (is) integrated in home audio equipment to deliver an IMAX signature sound experience,'" reports Audioholics. "To be accepted into the program, leading consumer electronics manufacturers will design top-of-the-line 4K HDR televisions, A/V receivers, sound systems and other home theater equipment to meet a carefully prescribed set of the highest audio and video performance standards, set by a certification committee of IMAX and DTS engineers and Hollywood's leading technical specialists." The report notes that the program will use an IMAX post-production process "to digitally re-master content to produce more vibrant colors, greater contrast and sharper clarity," as well as "deliver an IMAX signature sound experience."
Read Replies (0)
By BeauHD from
Slashdot's taller-than-anticipated department:
Iwastheone shares a report from Space.com: The weird hexagon swirling around Saturn's north pole is much taller than scientists had thought, a new study suggests. Researchers have generally regarded the 20,000-mile-wide (32,000 kilometers) hexagon -- a jet stream composed of air moving at about 200 mph (320 km/h) -- as a lower-atmosphere phenomenon, restricted to the clouds of Saturn's troposphere. But the bizarre structure actually extends about 180 miles (300 km) above those cloud tops, up into the stratosphere, at least during the northern spring and summer, a new study suggests. The hexagon, which surrounds a smaller circular vortex situated at the north pole, has existed for at least 38 years; NASA's Voyager 1 and Voyager 2 spacecraft spotted the sharp-cornered feature when they flew by Saturn in 1980 and 1981, respectively. Scientists started to get much more detailed looks at the hexagon in 2004, when NASA's Cassini spacecraft began orbiting the ringed planet. But Cassini's hexagon observations were pretty much confined to the troposphere for a decade after its arrival; springtime didn't come to Saturn's north until 2009, and low temperatures in the stratosphere continued to compromise measurements by the probe's Composite Infrared Spectrometer (CIRS) instrument for another five years.
<
article continued at Slashdot's taller-than-anticipated department >
Read Replies (0)