By BeauHD from Slashdot's show-me-the-money department
The New York Times tells the story of Dr. Michael Holick, a Boston University endocrinologist "who perhaps more than anyone else is responsible for creating a billion-dollar vitamin D sales and testing juggernaut." From the report: Dr. Holick's role in drafting national vitamin D guidelines, and the embrace of his message by mainstream doctors and wellness gurus alike, have helped push supplement sales to $936 million in 2017. That's a ninefold increase over the previous decade. Lab tests for vitamin D deficiency have spiked, too: Doctors ordered more than 10 million for Medicare patients in 2016, up 547 percent since 2007, at a cost of $365 million. But few of the Americans swept up in the vitamin D craze are likely aware that the industry has sent a lot of money Dr. Holick's way. A Kaiser Health News investigation for The New York Times found that he has used his prominent position in the medical community to promote practices that financially benefit corporations that have given him hundreds of thousands of dollars -- including drug makers, the indoor tanning industry and one of the country's largest commercial labs.
In an interview, Dr. Holick acknowledged he has worked as a consultant to Quest Diagnostics, which performs vitamin D tests, since 1979. Dr. Holick, 72, said that industry funding "doesn't influence me in terms of talking about the health benefits of vitamin D." There is no question that the hormone is important. Without enough of it, bones can become thin, brittle and misshapen, causing a condition called rickets in children and osteomalacia in adults. The issue is how much vitamin D is healthy, and what level constitutes deficiency.Read Replies (0)
By BeauHD from Slashdot's two-can-play-that-game department
According to the Department of Defense, China is looking to narrow the gap with the U.S. in terms of cyberwarfare capabilities. "The Pentagon report said that in recent years the Chinese army has emphasized the importance of cyberspace for national security because of the country's increasing reliance on its digital economy," reports ZDNet. "It said Chinese military strategists see cyber operations as a low-cost deterrent that can demonstrate capabilities and challenge an adversary." From the report: The DoD's annual report to congress (PDF) points to a Chinese international cyberspace cooperation strategy in March 2017, which called for the expedited development of a military "cyber force" as an important aspect of the country's defense strategy. However, the U.S. report said that China also believes its cyber capabilities and personnel lag behind those of the U.S. and that China "is working to improve training and bolster domestic innovation to overcome these perceived deficiencies and advance cyberspace operations." The report lists "cyber activities" directed against the DoD by China and said: "Computer systems around the world, including those owned by the U.S. government, continued to be targeted by China-based intrusions through 2017." It said these intrusions focused on accessing networks and extracting information, and said China uses its cyber capabilities to support intelligence collection against U.S. diplomatic, economic, academic, and defense sectors.Read Replies (0)
By BeauHD from Slashdot's times-they-are-a-changin department
Bloomberg's Tyler Cowen writes about "the erosion of personal ownership and what that will mean for our loyalties to traditional American concepts of capitalism and private property." An anonymous Slashdot reader shares the report: The main culprits for the change are software and the internet. For instance, Amazon's Kindle and other methods of online reading have revolutionized how Americans consume text. Fifteen years ago, people typically owned the books and magazines they were reading. Much less so now. If you look at the fine print, it turns out that you do not own the books on your Kindle. Amazon.com Inc. does. I do not consider this much of a practical problem. Although Amazon could obliterate the books on my Kindle, this has happened only in a very small number of cases, typically involving account abuse. Still, this licensing of e-books, instead of stacking books on a shelf, has altered our psychological sense of how we connect to what we read -- it is no longer truly "ours."
The change in our relationship with physical objects does not stop there. We used to buy DVDs or video cassettes; now viewers stream movies or TV shows with Netflix. Even the company's disc-mailing service is falling out of favor. Music lovers used to buy compact discs; now Spotify and YouTube are more commonly used to hear our favorite tunes. Each of these changes is beneficial, yet I worry that Americans are, slowly but surely, losing their connection to the idea of private ownership. The nation was based on the notion that property ownership gives individuals a stake in the system. It set Americans apart from feudal peasants, taught us how property rights and incentives operate, and was a kind of training for future entrepreneurship. We're hardly at a point where American property has been abolished, but I am still nervous that we are finding ownership to be so inconvenient.Read Replies (0)
By BeauHD from Slashdot's electrically-powered department
Rolls-Royce, a British power system company (not to be confused with the luxury automobile maker), is launching a new battery system to electrify ships. "Rolls-Royce now offers SAVe Energy, a cost competitive, highly efficient and liquid cooled battery system with a modular design that enables the product to scale according to energy and power requirements," the company said in a statement. "SAVe Energy comply with international legislations for low and zero emission propulsion systems." Electrek reports: The company has been working on battery systems for years, but the recent improvements in li-ion batteries are now resulting in a boom of electrification of ships. Andreas Seth, Rolls-Royce, EVP Electrical, Automation and Control for Commercial Marine, said the company expects to deploy more batteries next year than they did over the last 8 years combined: "The electrification of ships is building momentum. From 2010 we have delivered battery systems representing about 15 MWh in total. However now the potential deployment of our patent pending SAVe Energy in 2019 alone is 10-18 MWh."
Seth said that they are delivering the first system to Prestfjord as part of Norway's effort to electrify its maritime transport: "Battery systems have become a key component of our power and propulsions systems, and SAVe Energy is being introduced on many of the projects we are currently working on. This includes the upgrade programme for Hurtigruten's cruise ferries, the advanced fishing vessel recently ordered by Prestfjord and the ongoing retrofits of offshore support vessels. As a system provider we can find the best solution considering both installation and operational cost."Read Replies (0)
By BeauHD from Slashdot's unexpected-occurrences department
Dexguard, a tool used to protect Android software from piracy, tampering and cloning attacks, has been removed after being illegally posted on Github. A version of the tool exposed on the code repository was stolen from a customer of Guardsquare, the software's creator. TorrentFreak reports: "We develop premium software for the protection of mobile applications against reverse engineering and hacking," the [security company Guardsquare's] website reads. "Our products are used across the world in a broad range of industries, from financial services, e-commerce and the public sector to telecommunication, gaming and media." One of Guardsquare's products is Dexguard, a tool to protect Android applications from being decompiled, something that can lead to piracy, credential harvesting, tampering and cloning. Unfortunately, a version of Dexguard itself ended up on Github. In a takedown notice filed with the Microsoft-owned code platform, Guardsquare explains that the code is unauthorized and was obtained illegally. "The listed folders... contain an older version of our commercial obfuscation software (DexGuard) for Android applications. The folder is part of a larger code base that was stolen from one of our former customers," Guardsquare writes. Guardsquare found almost 300 "forks" of the stolen software on Github and filed a request to have them all taken down.Read Replies (0)
By BeauHD from Slashdot's foreshadowing department
An anonymous reader quotes a report from Reuters: Volkswagen Chief Executive Herbert Diess was told about the existence of cheating software in cars two months before regulators blew the whistle on a multi-billion exhaust emissions scandal, German magazine Der Spiegel said. Der Spiegel's story, based on recently unsealed documents from the Braunschweig prosecutor's office, raises questions about whether VW informed investors in a timely manner about the scope of a scandal which it said has cost it more than $27 billion in penalties and fines.
Responding to the magazine report, the carmaker reiterated on Saturday that the management board had not violated its disclosure duties, and had decided to not inform investors earlier because they had failed to grasp the scope of the potential fines and penalties. Citing documents unsealed by the Braunschweig prosecutor's office, Der Spiegel said Diess was present at a meeting on July 27, 2015 when senior engineers and executives discussed how to deal with U.S. regulators, who were threatening to ban VW cars because of excessive pollution levels. Diess, who had defected from BMW to become head of the VW brand on July 1, 2015, joined the July 27 meeting with Volkswagen's then Chief Executive Martin Winterkorn to discuss how to convince regulators that VW's cars could be sold, a VW defense document filed with a court in Braunschweig in February, shows.Read Replies (0)
By BeauHD from Slashdot's pseudo-security department
Last month, Gmail's big redesign became default for everyone, changing up the aesthetic appearance of the email service and introducing several new features. One of the key features, Confidential Mode, lets you add an "expiration date" and passcode to emails either in the web interface or via SMS, but not everyone is so trusting of its ability to keep your private data secure. "Recipients of these confidential emails won't be able to copy, paste, download, print or forward the message, and attachments will be disabled," notes Engadget.
The Electronic Frontier Foundation (EFF) doesn't think this new mode is secure at all. It's not encrypted end-to-end, so Google could read your messages in transit, and the expiring messages do not disappear from your Sent mail, which means they are retrievable. What's more is that if you use an SMS passcode, you might need to give Google your recipient's phone number. Because of these reasons, Slashdot reader shanen doesn't believe the new feature goes far enough to secure your data. They write: [M]y initial reaction is that I now need a new feature for Gmail. I want an option to reject incoming email from any person who wants to use confidential mode to communicate with me. Whatever conspiracy you are trying to hide, I'm not interested. So can anyone convince me you have a legitimate need for confidential mode? The main features I still want are completely different. Easiest one to describe would be future delivery of email, preferably combined with a tickler system.Read Replies (0)
By BeauHD from Slashdot's money-pit department
Last week, Uber reported a second-quarter loss of $891 million, even though it brought in $2.8 billion in revenue. "While it's a 16 percent improvement from a year earlier, the loss follows a rare profit posted in the first quarter, thanks largely to the sale of overseas assets," reports Bloomberg. As a result, the company is being pressured by investors to sell its self-driving cars unit, which Uber is spending $125-200 million a quarter to maintain. From the report: Even after increased spending last quarter, revenue growth is slowing. Sales rose 63 percent to $2.8 billion in the second quarter compared with the same period last year. The rate in the first quarter was 70 percent. [Uber CEO Dara Khosrowshahi] Khosrowshahi is pouring large, undisclosed sums of money into food delivery, logistics and autonomous-car technology. The San Francisco-based company has said the food delivery business, Uber Eats, represents more than 10 percent of its gross bookings. Growth in that segment may be masking a slowdown in Uber's main business.Read Replies (0)
By BeauHD from Slashdot's preferentially-treated department
An anonymous reader quotes a report from Gizmodo: The U.S. Department of Housing and Urban Development has filed an official discrimination complaint against Facebook, saying the site's dizzying array of advertising tools makes it simple for advertisers to illegally exclude wide swathes of the population from seeing housing ads, Politico wrote on Friday. In a press release, HUD wrote that Facebook's "targeted advertising" model more or less constitutes a way for said advertisers to skirt the federal Fair Housing Act, specifically by excluding members of protected categories: "HUD claims Facebook enables advertisers to control which users receive housing-related ads based upon the recipient's race, color, religion, sex, familial status, national origin, disability, and/or zip code. Facebook then invites advertisers to express unlawful preferences by offering discriminatory options, allowing them to effectively limit housing options for these protected classes under the guise of 'targeted advertising.'"
< article continued at Slashdot's preferentially-treated department
>Read Replies (0)
By EditorDavid from Slashdot's in-the-dirt department
Elon Musk's Boring Company wants to build a transit tunnel connecting Dodger Stadium to a Los Angeles' subway station. An anonymous reader quotes GeekWire:
The Boring Company laid out the plan for the Dugout Loop on its website, saying that the linkup could take baseball fans and concertgoers to the stadium in less than four minutes for a roughly $1 fare. This ride would be nothing like your typical subway trip: Loopers could book their tickets in advance, through an app-based reservation system that's similar to what's used to purchase theater tickets, or buy them over the phone or in person for a given time (say, 5:45 p.m. heading for the stadium).
At least initially, the Dugout Loop clientele would be limited to about 1,400 people per event, or roughly 2.5 percent of stadium capacity. The Boring Company says that capacity could be doubled over time. Loopers would board electric-powered pods (also known as "skates") that are based on the Tesla Model X auto design and are capable of carrying 8 to 16 passengers at a time. The skates would be lowered into the tunnel system, and sent autonomously at speeds of 125 to 150 mph from one terminal to the other. The Boring Company says it'll cover the cost of digging the roughly 3.6-mile tunnel with no public funding sought.
The Boring Company's site says this project will preempt construction of their proof-of-concept tunnel under Los Angeles' Sepulveda Boulevard.
"The Boring Company has made technical progress much faster than expected and has decided to make its first tunnel in Los Angeles an operational one, hence Dugout Loop!"Read Replies (0)
By EditorDavid from Slashdot's disinterested-in-interviews department
An anonymous reader quotes CNN Money:
Chandra Kill had scheduled face-to-face interviews with 21 candidates to fill some job openings at her employment screening firm. Only 11 showed up. "About half flaked out," said Kill.... "A year or two ago it wasn't like this." With the U.S. unemployment rate at its lowest in 18 years, and more job openings than there are people looking for work, candidates are bailing on scheduled interviews. In some cases, new hires are not showing up for their first day of work....
While there's nothing wrong with accepting another job offer, bailing on an employer without notice could have lasting effects. "The world is small," said Johnny Taylor, president and CEO of the Society for Human Resource Management.... He added that he's heard of a candidate being flown out for a job interview only to skip that part of the trip. "I expect that if I send you a plane ticket and block off two hours to meet with you, you will show up." As a result, he said some companies are having candidates agree to reimburse for travel costs if they take the trip but flake on the interview.
In an effort to curb the problem, recruiters have been changing their tactics and moving through the hiring process faster. If they have a qualified candidate that seems like a good fit, they work to get them in for an interview the next day.
Inc. magazine once blamed the problem of no-shows on the low unemployment rate and "the effects technology have had on the communication style of younger generations." But leave your own thoughts in the comments.
And have you ever been a no-show for a job interview?Read Replies (0)
By EditorDavid from Slashdot's see-no-evil department
An anonymous reader quotes the Associated Press:
Egypt's President Abdel-Fattah el-Sissi has ratified an anti-cybercrime law that rights groups say paves the way for censoring online media. The law, published Saturday in the country's official gazette, empowers authorities to order the blocking of websites that publish content considered a threat to national security. Viewers attempting to access blocked sites can also be sentenced to one year in prison or fined up to EGP100,000 ($5,593) under the law. Last month, Egypt's parliament approved a bill placing personal social media accounts and websites with over 5,000 followers under the supervision of the top media authority, which can block them if they're found to be disseminating false news.
"Authorities say the new measures are needed to tackle instability and terrorism," reports the BBC.
"But human rights groups accuse the government of trying to crush all political dissent in the country."Read Replies (0)
By EditorDavid from Slashdot's alternate-open-source-web-browsers department
Long-time Slashdot reader tdailey spotted a new version of Pale Moon, a customised version of Firefox optimized for speed and efficiency. Beta News reports it's the first major update since November of 2016:
There are virtually no visual or obvious changes in this new major build, but the under-the-hood changes are both extensive and necessary.... Despite all the updates, Moonchild is keen to stress certain things haven't changed -- unlike Firefox, for example, Pale Moon continues to support NPAPI plugins, complete themes and a fully customizable user interface. There is also no DRM built into the browser, although third-party plugins such as Silverlight are supported. It will also continue to work with certain "legacy" plugins of the type abandoned by Firefox.
Pale Moon strips out what one reviewer calls "little-used components" of Firefox, including parental controls and accessbility features, as well as crash reports and support for Internet Explorer's ActiveX and ActiveX scripting technology.
"Proving that open source leads to great development, Pale Moon takes the already decent Firefox web browser and makes it even better and a faster."Read Replies (0)
By EditorDavid from Slashdot's long-and-short-of-it department
An anonymous reader quotes Fortune:
Investors betting that Tesla stock will lose value -- so-called "shorts" -- have made $1.2 billion since CEO Elon Musk first tweeted about taking the company private. Much of that gain came on Friday, after the New York Times published a revealing, emotional interview with Musk that drove Tesla stock down nearly 9%. The tally comes from a report released Friday by stock analytics firm S3 Partners. The Friday collapse helped reverse a price spike after Musk's August 7 Tweet saying he was "considering taking Tesla private at $420," about 18% higher than the stock's market value at the time.
According to S3, the subsequent surge in Tesla stock cost short positions $1.3 billion. But soon after, it became clear that Musk had exaggerated the certainty of his funding, and the SEC began a probe of his statements, driving the stock back down. On Friday, the Times interview with Musk detailed his 120-hour work weeks, lack of social life, and reliance on Ambien to sleep. That sent the stock down 9% in one day, for a total drop of 19% over 10 days. That gave $2.5 billion back to the shorts, for a net gain of $1.2 billion since Musk's going-private tweet.
Tesla remains the most-shorted stock on the American stock exchanges, and the researchers note that only 4% of shorts have actually cashed in these on-paper gains.Read Replies (0)
By EditorDavid from Slashdot's not-passing-Go department
An anonymous reader quotes the Sophos security blog:
The Australian government wants to force companies to help it get at suspected criminals' data. If they can't, it would jail people for up to a decade if they refuse to unlock their phones. The country's Assistance and Access Bill, introduced this week for public consultation, strengthens the penalties for people who refuse to unlock their phones for the police. Under Australia's existing Crimes Act, judges could jail a person for two years for not handing over their data. The proposed Bill extends that to up to ten years, arguing that the existing penalty wasn't strong enough...
[C]ompanies would be subject to two kinds of government order that would compel them to help retrieve a suspect's information. The first of these is a "technical assistance notice" that requires telcos to hand over any decryption keys they hold. This notice would help the government in end-to-end encryption cases where the target lets a service provider hold their own encryption keys. But what if the suspect stores the keys themselves? In that case, the government would pull out the big guns with a second kind of order called a technical capability notice. It forces communications providers to build new capabilities that would help the government access a target's information where possible. In short, the government asks companies whether they can access the data. If they can't, then the second order asks them to figure out a way....
The government's explanatory note says that the Bill could force a manufacturer to hand over detailed specs of a device, install government software on it, help agencies develop their own "systems and capabilities", and notify agencies of major changes to their systems.
< article continued at Slashdot's not-passing-Go department
>Read Replies (0)
By EditorDavid from Slashdot's virtually-private department
"A new attack named VORACLE can recover HTTP traffic sent via encrypted VPN connections under certain conditions," reports Bleeping Computer, citing research presented last week at the Black Hat and DEF CON security conferences. An anonymous reader writes:
The conditions are that the VPN service/client uses the OpenVPN protocol and that the VPN app compresses the HTTP traffic before it encrypts it using TLS. To make matters worse, the OpenVPN protocol compresses all data by default before sending it via the VPN tunnel. At least one VPN provider, TunnelBear, has now updated its client to turn off the compression. [UPDATE: ExpressVPN has since also disabled compression to prevent VORACLE attacks.]
HTTPS traffic is safe, and only HTTP data sent via the VPN under these conditions can be recovered. Users can also stay safe by switching to another VPN protocol if their VPN client suppports multiple tunneling technologies.
In response to the security researcher's report, the OpenVPN project "has decided to add a more explicit warning in its documentation regarding the dangers of using pre-encryption compression."Read Replies (0)
By EditorDavid from Slashdot's seeking-CVEs department
Long-time Slashdot reader Mike Bouma shares a paper (via OS News) making the case for "a small microkernel as the core of the trusted computing base, with OS services separated into mutually-protected components (servers) -- in contrast to 'monolithic' designs such as Linux, Windows or MacOS."
While intuitive, the benefits of the small trusted computing base have not been quantified to date. We address this by a study of critical Linux CVEs [PDF] where we examine whether they would be prevented or mitigated by a microkernel-based design. We find that almost all exploits are at least mitigated to less than critical severity, and 40% completely eliminated by an OS design based on a verified microkernel, such as seL4....
Our results provide very strong evidence that operating system structure has a strong effect on security. 96% of critical Linux exploits would not reach critical severity in a microkernel-based system, 57% would be reduced to low severity, the majority of which would be eliminated altogether if the system was based on a verified microkernel. Even without verification, a microkernel-based design alone would completely prevent 29% of exploits...
The conclusion is inevitable: From the security point of view, the monolithic OS design is flawed and a root cause of the majority of compromises. It is time for the world to move to an OS structure appropriate for 21st century security requirements.Read Replies (0)