By msmash from Slashdot's china's-influence department
Paul Mozur, reporting for the New York Times: China does not allow its people to gain access to Facebook, a powerful tool for disseminating information and influencing opinion. As if to demonstrate the platform's effectiveness, outside its borders China uses it to spread state-produced propaganda around the world, including the United States (Editor's note: the link could be paywalled; alternative source). So much do China's government and companies value Facebook that the country is Facebook's biggest advertising market in Asia, even as it is the only major country in the region that blocks the social network. A look at the Facebook pages of China Central Television, the leading state-owned broadcast network better known as CCTV, and Xinhua, China's official news agency, reveals hundreds of English-language posts intended for an English-speaking audience. Each quarter China's government, through its state media agencies, spends hundreds of thousands of dollars to buy Facebook ads, according to a person with knowledge of those deals, who was unauthorized to talk publicly about the company's revenue streams. China's propaganda efforts are in the spotlight with President Trump visiting the country and American lawmakers investigating foreign powers's use of technology to sway voters in the United States.Read Replies (0)
By msmash from Slashdot's tussle-continues department
Alyssa Hertig, writing for CoinDesk: The organizers of a controversial bitcoin scaling proposal are suspending an attempt to increase the block size by way of a software upgrade. Known for its strong early support from bitcoin startups and mining pools, the plan, called Segwit2x, or simply 2x, was to trigger a block size increase at block 494784, expected to occur on or around November 16th. The suspension was announced today in an email, written by Mike Belshe, CEO and co-founder of bitcoin wallet software provider BitGo. One of the leaders of the Segwit2x project, he argued that the scaling proposal is too controversial to move forward. He wrote: "Unfortunately, it is clear that we have not built sufficient consensus for
a clean block size upgrade at this time. Continuing on the current path could divide the community and be a setback to Bitcoin's growth. This was never the goal of Segwit2x."Read Replies (0)
'How Chrome Broke the Web'
Posted by News Fetcher on November 08 '17 at 07:21 AM
By msmash from Slashdot's interesting-insights department
Reader Tablizer writes (edited and condensed): The Chrome team "broke the web" to make Chrome perform better, according to Nikita Prokopov, a software engineer. So the story goes like this: there's a widely-used piece of DOM API called "addEventListener." Almost every web site or web app that does anything dynamic with JS probably depends on this method in some way. In 2016, Google came along and decided that this API was not extensible enough. But that's not the end of the story. Chrome team proposed the API change to add passive option because it allowed them to speed up scrolling on mobile websites. The gist of it: if you mark onscroll/ontouch event listener as passive, Mobile Google can scroll your page faster (let's not go into details, but that's how things are). Old websites continue to work (slow, as before), and new websites have an option to be made faster at the cost of an additional feature check and one more option. It's a win-win, right? Turned out, Google wasn't concerned about your websites at all. It was more concerned about its own product performance, Google Chrome Mobile. That's why on February 1, 2017, they made all top-level event listeners passive by default. They call it "an intervention." Now, this is a terrible thing to do. It's very, very, very bad. Basically, Chrome broke half of user websites, the ones that were relying on touch/scroll events being cancellable, at the benefit of winning some performance for websites that were not yet aware of this optional optimization. This was not backward compatible change by any means. All websites and web apps that did any sort of draggable UI (sliders, maps, reorderable lists, even slide-in panels) were affected and essentially broken by this change.Read Replies (0)
By BeauHD from Slashdot's time-is-money department
Google Search and Maps already show you the peak traffic times for your favorite restaurants, but it will soon show you the wait times as well. Google says the feature begins rolling out today, and will eventually expand to include grocery stores. TechCrunch reports: Google's new restaurant wait times also comes from the aggregated and anonymized data from users who opted in to Google Location History -- the same data that powers popular times, wait times and visit duration. In the case of restaurants, Google will now include a pop-up box that appears when you click on a time frame in the popular times' chart. The box shows the live or historical data labeled as "busy," "usually busy," "usually not busy," etc., along with the wait time. Below the popular times chart, there's also a section that helps users plan their visit by offering info on the peak wait times and duration. (e.g. "People typically spend 45 mins to 2 hr here.") The new wait time feature will be supported on nearly a million sit-down restaurant listings worldwide, initially in Google Search.Read Replies (0)
By BeauHD from Slashdot's rest-in-peace department
sconeu writes: Dick Gordon, pilot of Gemini 11 and command module pilot of Apollo 12, has died at the age of 88. Gordon was also slated to command the cancelled Apollo 18 mission. "Dick Gordon is an American hero, and a true renaissance man by any measure. He was an American naval officer and aviator, chemist, test pilot, NASA astronaut, professional football executive, oil and gas executive and generous contributor to worthy causes," said Curt Brown, board chairman of the Orlando-based Astronaut Scholarship Foundation and an astronaut and veteran of six space flights. "He was in a category all his own." The Astronaut Scholarship Foundation has a touching write-up that details Gordon's childhood and career successes. You can read the full article here.Read Replies (0)
By BeauHD from Slashdot's care-package department
schwit1 writes: The U.S. Environmental Protection Agency (EPA) has approved the use of a common bacterium to kill wild mosquitoes that transmit viruses such as dengue, yellow fever and Zika, Nature's news team has learned. On November 3rd, the agency told biotechnology start-up MosquitoMate that it could release the bacterium Wolbachia pipientis into the environment as a tool against the Asian tiger mosquito (Aedes albopictus). Lab-reared mosquitoes will deliver the bacterium to wild mosquito populations. The decision -- which the EPA has not formally announced -- allows the company, which is based in Lexington, Kentucky, to release the bacteria-infected mosquitoes in 20 U.S. states and Washington DC.
MosquitoMate will rear the Wolbachia-infected A. albopictus mosquitoes in its laboratories, and then sort males from females. Then the laboratory males, which don't bite, will be released at treatment sites. When these males mate with wild females, which do not carry the same strain of Wolbachia, the resulting fertilized eggs don't hatch because the paternal chromosomes do not form properly. The company says that over time, as more of the Wolbachia-infected males are released and breed with the wild partners, the pest population of A. albopictus mosquitoes dwindles. Other insects, including other species of mosquito, are not harmed by the practice, says Stephen Dobson, an entomologist at the University of Kentucky in Lexington and founder of MosquitoMate.Read Replies (0)
By BeauHD from Slashdot's cheaper-by-the-dozen department
An anonymous reader quotes a report from Ars Technica: A crippling flaw affecting millions -- and possibly hundreds of millions -- of encryption keys used in some of the highest-stakes security settings is considerably easier to exploit than originally reported, cryptographers declared over the weekend. The assessment came as Estonia abruptly suspended 760,000 national ID cards used for voting, filing taxes, and encrypting sensitive documents. The critical weakness allows attackers to calculate the private portion of any vulnerable key using nothing more than the corresponding public portion. Hackers can then use the private key to impersonate key owners, decrypt sensitive data, sneak malicious code into digitally signed software, and bypass protections that prevent accessing or tampering with stolen PCs. When researchers first disclosed the flaw three weeks ago, they estimated it would cost an attacker renting time on a commercial cloud service an average of $38 and 25 minutes to break a vulnerable 1024-bit key and $20,000 and nine days for a 2048-bit key. Organizations known to use keys vulnerable to ROCA—named for the Return of the Coppersmith Attack the factorization method is based on—have largely downplayed the severity of the weakness.
On Sunday, researchers Daniel J. Bernstein and Tanja Lange reported they developed an attack that was 25 percent more efficient than the one created by original ROCA researchers. The new attack was solely the result of Bernstein and Lange based only on the public disclosure information from October 16, which at the time omitted specifics of the factorization attack in an attempt to
increase the time hackers would need to carry out real-world attacks. After creating their more efficient attack, they submitted it to the original researchers. The release last week of the original attack may help to improve attacks further and to stoke additional improvements from other researchers as well.Read Replies (0)
By BeauHD from Slashdot's theoretical-forms-of-energy department
walterbyrd shares a report from Futurism: This new source of energy, according to researchers Marek Karliner and Jonathan Rosner, comes from the fusion of subatomic particles known as quarks. These particles are usually produced as a result of colliding atoms that move at high speeds within the Large Hadron Collider (LHC), where these component parts split from their parent atoms. It doesn't stop there, however, as these disassociated quarks also tend to collide with one another and fuse into particles called baryons. It is this fusion of quarks that Karliner and Rosner focused on, as they found that this fusion is capable of producing energy even greater than what's produced in hydrogen fusion. In particular, they studied how fused quarks configure into what's called a doubly-charmed baryon. Fusing quarks require 130 MeV to become doubly-charmed baryons, which, in turn, releases energy that's 12 MeV more energy. Turning their calculations to heavier bottom quarks, which need 230 MeV to fuse, they found that a resulting baryon could produce approximately 138 MeV of net energy -- about eight times more than what hydrogen fusion releases. The new study has been published in the journal Nature.Read Replies (0)
By BeauHD from Slashdot's proprietary-technologies department
Corephotonics, an Israeli maker of dual-lens camera technologies for smartphones, has filed a lawsuit against Apple this week alleging that the iPhone 7 Plus and iPhone 8 Plus infringe upon four of its patents. Mac Rumors reports: The patents, filed with the U.S. Patent and Trademark Office between November 2013 and June 2016, relate to dual-lens camera technologies appropriate for smartphones, including optical zoom and a mini telephoto lens assembly: U.S. Patent No. 9,402,032; U.S. Patent No. 9,568,712; U.S. Patent No. 9,185,291; U.S. Patent No. 9,538,152. Corephotonics alleges that the two iPhone models copy its patented telephoto lens design, optical zoom method, and a method for intelligently fusing images from the wide-angle and telephoto lenses to improve image quality. iPhone X isn't listed as an infringing product, despite having a dual-lens camera, perhaps because the device launched just four days ago.Read Replies (0)