By EditorDavid from Slashdot's big-bugs department
Malwarebytes had a bad day Saturday, pushing out an update "that gobbled up memory and CPU resources and turned off web protection," reports CSO.
The company's forums lit up with complaints that the software was hogging 90 percent or more of memory and CPU resources. One thread about RAM usage currently is 37-pages long. Aware of the problem, Malwarebytes tweeted that "all hands" were on deck to resolve the issue. Unfortunately, even though a new update package was pushed out in about an hour, it did not fix the problem. Even after rebooting their computers, some users reported that their systems locked up as soon as the Malwarebytes Service process started as it ate large amounts of RAM.
"Two bad updates later, Malwarebytes released a fix," CSO reports, noting the company's blog post with steps to resolve the issue.
Long-time Slashdot reader marquis111 shares a link to an apology from Malwarebytes CEO Marcin Kleczynski, who says that he'll be "personally available" to discuss the problem on both the forums and at his personal email address.Read Replies (0)
By EditorDavid from Slashdot's music-rules department
An anonymous reader quotes Bloomberg:
Songwriters will get a larger cut of revenue from streaming services after a court handed technology companies a big defeat. The Copyright Royalty Board ruled that songwriters will get at least a 15.1 percent share of streaming revenues over the next five years, from a previous 10.5 percent. That's the largest rate increase in CRB history, according to a statement from the National Music Publishers' Association. The decision is a major victory for songwriters, who have long complained they are insufficiently uncompensated by on-demand music services like Spotify and YouTube.
"The ratio of what labels are paid by the services versus what publishers are paid has significantly improved," argues the NMPA, "resulting in the most favorable balance in the history of the industry.
"While an effective ratio of 3.82 to 1 is still not a fair split that we might achieve in a free market, it is the best songwriters have ever had under the compulsory license... The decision represents two years of advocacy regarding how unfairly songwriters are treated under current law and how crucial their contributions are to streaming services."
Meanwhile, the U.S. Congress has introduced a bipartisan "Music Modernization Act" to overhaul the rate court, and to create a new governing agency to issue blanket licenses to streaming services and then collect and distribute the resulting roylaties.Read Replies (0)
By EditorDavid from Slashdot's putting-the-I-in-ion department
An anonymous reader quotes Quartz:
Consciousness permeates reality. Rather than being just a unique feature of human subjective experience, it's the foundation of the universe, present in every particle and all physical matter. This sounds like easily-dismissible bunkum, but as traditional attempts to explain consciousness continue to fail, the "panpsychist" view is increasingly being taken seriously by credible philosophers, neuroscientists, and physicists, including figures such as neuroscientist Christof Koch and physicist Roger Penrose...
"Physical science tells us a lot less about the nature of matter than we tend to assume," says Philip Goff, a philosophy professor at Central European University in Budapest, Hungary. "Arthur Eddington" -- the English scientist who experimentally confirmed Einstein's theory of general relativity in the early 20th century -- "argued there's a gap in our picture of the universe. We know what matter does but not what it is. We can put consciousness into this gap"...
An alternative panpsychist perspective holds that, rather than individual particles holding consciousness and coming together, the universe as a whole is conscious. This, says Goff, isn't the same as believing the universe is a unified divine being; it's more like seeing it as a "cosmic mess." Nevertheless, it does reflect a perspective that the world is a top-down creation, where every individual thing is derived from the universe, rather than a bottom-up version where objects are built from the smallest particles. Goff believes quantum entanglement -- the finding that certain particles behave as a single unified system even when they're separated by such immense distances there can't be a causal signal between them -- suggests the universe functions as a fundamental whole rather than a collection of discrete parts. Such theories sound incredible, and perhaps they are. But then again, so is every other possible theory that explains consciousness.Read Replies (0)
By EditorDavid from Slashdot's courts-of-last-resort department
An anonymous reader quotes the Guardian:
WikiLeaks founder, Julian Assange, has asked a UK court to drop the arrest warrant that prevents him from leaving the Ecuadorian embassy in London, where he has been living for five and a half years. Assange, 46, skipped bail to enter the embassy in 2012 in order to avoid extradition to Sweden over allegations of sexual assault and rape, which he denies... Mark Summers QC told senior district judge Emma Arbuthnot at Westminster magistrates court on Friday that now that the Swedish case had been dropped the warrant had "lost its purpose and its function". He said because Swedish extradition proceedings against Assange had come to an end, so had the life of the arrest warrant... Arbuthnot said she would give her judgment about the arrest warrant on 6 February.
Judge Arbuthnot said she'd rule only on the legal issue, though the court had also received evidence about medical problems which included "a terrible bad tooth, frozen shoulder and depression."
Representing the Crown Prosecution Service, Aaron Watkins it would be absurd for defendants to be "rewarded with effective immunity" simply for having evaded proceedings for long enough.Read Replies (0)
By EditorDavid from Slashdot's collectives-bargaining department
An anonymous reader quotes CNBC:
No drones or driverless vehicles for delivering packages -- that's one of the major demands from the Teamsters labor union in the big contract negotiation it's undertaking with UPS this week. The union wants to ban UPS from using such new-fangled technology, which the logistics company has been reportedly testing... The current agreement affects 260,000 full and part-time UPS employees and expires in July. "UPS is focused on a contract that provides the flexibility needed to remain highly competitive, given the challenge of an increasingly crowded logistics segment," the company told CNBC.
The Drive notes the smaller carbon footprint of drone deliveries, while adding that "one completely understands and empathizes with the aversion truck drivers have toward this stark, autonomous future.
"If it feels like their jobs are being endangered by the incredible exponential growth in technology, it's because they are."Read Replies (0)
By EditorDavid from Slashdot's window-frames department
Gnome contributor Tobias Bernard is on a crusade against title bars -- "the largely empty bars at the top of some application windows [that] contain only the window title and a close button." Instead he wants to see header bars -- "a newer, more flexible pattern that allows putting window controls and other UI elements in the same bar." Tobias Bernard writes:
Header bars are client-side decorations (CSD), which means they are drawn by the app rather than the display server. This allows for better integration between application and window chrome. All GNOME apps (except for Terminal) have moved to header bars over the past few years, and so have many third-party apps. However, there are still a few holdouts.
He's announcing the CSD Initiative, "an effort to get apps (both GNOME and third-party) to drop title bars and adopt GNOME-style client-side decorations... The only way to solve this problem long-term is to patch applications upstream to not use title bars. So this is what we'll have to do."
Talk to the maintainers and convince them that this is a good idea
Do the design work of adapting the layout and make mockups
Figure out what is required at a technical level
Actually implement the new layout and get it merged
Implementation is already in progress for Firefox, though it has not yet been started for other high-priority apps like LibreOffice, GNOME Terminal, and Skype. "If you want to help with any of the above tasks," writes Tobias, "come talk to us on #gnome-design on IRC/Matrix."Read Replies (0)
By EditorDavid from Slashdot's wrongfully-accused department
Long-time Slashdot reader kbahey writes:
Can a single pixel cost you your livelihood and/or freedom? Apparently, this has already happened in Turkey to thousands of people and their relatives. It all stems from the purge by president Edrogan following a failed coupe. The result is that many innocent people lost their jobs (and source of income), their freedom, their reputation, and more.
The details are frightening. The underlying technology is the use of 1x1 transparent pixels, as most web sites do, to track their visitors. This particular pixel was used by Bylock, a messaging app that the Turkish government deemed seditious, in their purge against Fethullah Gulen loyalists. Pre-dawn raids by police were conducted on those who have this pixel. The long legal proceedings caused a digital forensic expert to challenge those cases, because [the pixel using] the servers for Bylock was also being used by other applications for music streaming, and prayer times/direction of Mecca.
30,000 innocent people may have been swept up among the 150,000 Turks detained, arrested or forced from their jobs under state of emergency decrees since the summer of 2016. One 29-year-old high school teacher "wished the worst" for the revolutionaries accused of using Bylock, "until authorities said he was one of them."
The government eventually exonerated 11,480 of the wrongly accused, but some had already spent months in prison, and reportedly some even committed suicide.Read Replies (0)
By EditorDavid from Slashdot's I-spy department
Long-time Slashdot readers Agilulf, Sara Chan, and wiredmikey -- plus an anonymous reader -- all submitted the same story. Agilulf writes:
Dutch hackers from AIVD (their intelligence agency) infiltrated Russian hackers, had access to their CCTV system, and followed them for more than a year, watched their attack on the DNC, provided the proof to the U.S. intelligence community that Russia was behind those hacks and the stolen emails, and were disappointed with the response from the U.S.
The Dutch agents also watched Russian agents breach a non-classified network at the U.S. State Department in 2014, where the Russians then sent a phishing email to the White House, successfully stole login credentials, and then accessed email from embassies and diplomats.
"Three American intelligence services state with 'high confidence' that the Kremlin was behind the attack on the Democratic Party," according to the article, which adds that that certainty "is derived from the AIVD hackers having had access to the office-like space in the center of Moscow for years."Read Replies (0)
By EditorDavid from Slashdot's crimes-for-cryptocurrency department
An anonymous reader writes:
"I will be short. I've got an order to kill you," the note said, demanding $2,800 in U.S. dollars or Bitcoin. "I switched from being upset about it to, 'I need to get the word out'," one of its targets told a local newscaster. They filed a report through the FBI's web site.
"If only 1% of people send money -- there's no overhead for them; that's money in the bank," one FBI agent tells the news team. A quick Google search finds recent reports of two nearly identical threats using the same text.
"I have been thinking for a long time whether it is worth sending this notice, and decided that you still have the right to know... I've got an order to kill you, because some of your activity causes trouble to several people... I decided to break some rules, as this will be my final order... As soon as I receive the funds, I will forward you the name of the man [this] order came from, and all other information I have."Read Replies (0)
By EditorDavid from Slashdot's fake-stars department
A private satellite company launched a three-foot-wide, carbon-fiber orb called the Humanity Star into the sky last week. Rocket Lab has promised the Humanity Star will be "the brightest thing in the sky," presumably other than the sun. The orb will reflect light from the sun back to Earth to achieve this effect. It's expected to orbit the Earth once every 90 minutes for the next nine months before it falls out of the sky and burns up in the atmosphere. The reaction on social media has been largely swift and scornful...
The stated goal of the project, at least, seems admirable: "No matter where you are in the world, rich or in poverty, in conflict or at peace, everyone will be able to see the bright, blinking Humanity Star orbiting Earth in the night sky," Rocket Lab CEO Peter Beck said in a statement on the project's website. "Wait for when the Humanity Star is overhead, and take your loved ones outside to look up and reflect. You may just feel a connection to the more than 7 billion other people on this planet we share this ride with."
Slashdot reader dmoberhaus writes that "astronomers are annoyed by what they perceive as just another piece of space junk getting in the way."
"Wow. Intentionally bright long-term space graffiti. Thanks a lot Rocket Lab," complained an astronomer at the California Institute of Technology. And one New Zealand journalist accused Rocket Lab of "vandalising the night sky with shiny space rubbish."Read Replies (0)
By EditorDavid from Slashdot's like-a-bad-penny department
jwhyche, Slashdot reader #6,192, writes:
If you bought some illegal narcotics off Silk Road or even gave money to Wikileaks. Researchers at Qatar University and Hamad Bin Khalifa University have been able to link these transactions with real world identities. They have been able to do this even if the transactions are years old. Their research shows how easy it is to link accounts to these transactions without using any of the tools available to law enforcement like search warrants or subpoenas.
The researchers started with 88 unique bitcoin addresses from Tor hidden services, and then searched 5 billion tweets and 1 million pages on the Bitcoin Talk forum -- ultimately linking 125 unique users to 20 Tor hidden services. "Bitcoin addresses should always be considered exploitable," the researchers conclude, "as they can be used to deanonymize users retroactively."
Their paper is titled "When a Small Leak Sinks a Great Ship: Deanonymizing Tor Hidden Service Users Through Bitcoin Transactions Analysis," and Wired summarizes one of their conclusions. "Even deleting profile information that includes bitcoin addresses may not be enough if a post has been cached or captured by services like the Internet Archive, they point out. 'If you're vulnerable now, you're vulnerable in the future.'"Read Replies (0)
By EditorDavid from Slashdot's halt-who-goes-there department
An anonymous reader quotes CSO:
"The strategy around Zero Trust boils down to don't trust anyone. We're talking about, 'Let's cut off all access until the network knows who you are. Don't allow access to IP addresses, machines, etc. until you know who that user is and whether they're authorized,'" says Charlie Gero, CTO of Enterprise and Advanced Projects Group at Akamai Technologies in Cambridge, Mass... The Zero Trust model of information security basically kicks to the curb the old castle-and-moat mentality that had organizations focused on defending their perimeters while assuming everything already inside didn't pose a threat and therefore was cleared for access. Security and technology experts say the castle-and-moat approach isn't working. They point to the fact that some of the most egregious data breaches happened because hackers, once they gained access inside corporate firewalls, were able move through internal systems without much resistance...
< article continued at Slashdot's halt-who-goes-there department
>Read Replies (0)
By EditorDavid from Slashdot's I'm-feeling-private department
An anonymous reader quotes the Verge:
DuckDuckGo is launching updated versions of its browser extension and mobile app, with the promise of keeping internet users safe from snooping "beyond the search box." The company's flagship product, its privacy-focused search engine, will remain the same, but the revamped extension and app will offer new tools to help users keep their web-browsing as safe and private as possible. These include grade ratings for websites, factoring in their use of encryption and ad tracking networks, and offering summaries of their terms of service (with summaries provided by third-party Terms of Service Didn't Read). The app and extension are available for Firefox, Safari, Chrome, iOS, and Android.
The ability to block ad tracking networks is probably the most important feature here. These networks are used by companies like Google and Facebook to follow users around the web, stitching together their browsing history to create a more accurate profile for targeted advertising.
DuckDuckGo calls it "a major step to simplify online privacy," adding that without it, "It's hard to use the Internet without it feeling a bit creepy -- like there's a nosey neighbor watching everything you do from across the street."Read Replies (0)
By EditorDavid from Slashdot's along-for-the-ride department
Cory Doctorow writes:
Millions of new cars sold in the US and Europe are "connected," having some mechanism for exchanging data with their manufacturers after the cars are sold; these cars stream or batch-upload location data and other telemetry to their manufacturers, who argue that they are allowed to do virtually anything they want with this data, thanks to the "explicit consent" of the car owners -- who signed a lengthy contract at purchase time that contained a vague and misleading clause deep in its fine-print.
Slashdot reader Luthair adds that "OnStar infamously has done this for some time, even if the vehicle's owner was not a subscriber of their services." But now 78 million cars have an embedded cyber connection, according to one report, with analysts predicting 98% of new cars will be "connected" by 2021. The Washington Post calls it "Big Brother on Wheels."
"Carmakers have turned on a powerful spigot of precious personal data, often without owners' knowledge, transforming the automobile from a machine that helps us travel to a sophisticated computer on wheels that offers even more access to our personal habits and behaviors than smartphones do."Read Replies (0)
By EditorDavid from Slashdot's Bug-hunt-at-outpost-nine department
The Guardian quotes Paul Verhoeven, the director of Starship Troopers:
Robert Heinlein's original 1959 science-fiction novel was militaristic, if not fascistic. So I decided to make a movie about fascists who aren't aware of their fascism... I was looking for the prototype of blond, white and arrogant, and Casper Van Dien was so close to the images I remembered from Leni Riefenstahl's films. I borrowed from Triumph of the Will in the parody propaganda reel that opens the film, too. I was using Riefenstahl to point out, or so I thought, that these heroes and heroines were straight out of Nazi propaganda...
With a title like Starship Troopers, people were expecting a new Star Wars. They got that, but not really: it stuck in your throat. It said: "Here are your heroes and your heroines, but by the way -- they're fascists."
The actors weren't even clear on what the giant arachnids would look like, since their "Bug" battles were filmed entirely with green screens, remembers one of the movie's stars, Denise Richards. Instead Verhoeven "would be there jumping up and down with a broom in the air so we would have a sense of how big they were."
Verhoeven told one interviewer that he never actually read Robert Heinlein's original book. "I stopped after two chapters because it was so boring. It is really quite a bad book."Read Replies (0)
By EditorDavid from Slashdot's loving-languages department
An anonymous reader quotes InfoWorld:
The survey involved 39,441 developers, and concluded that "Python ruled among all age groups," according to Application Development Trends, "except for those 55 years or older, who narrowly prefer C."Read Replies (0)
By EditorDavid from Slashdot's violence-and-video-games department
A newly-released affidavit reveals that money was at stake in a game of Call Of Duty: World War II which led to the fatal real-life police shooting of Andrew Finch. The Wichita Eagle reports:
Investigators learned that Shane Gaskill, who lives in Wichita, was involved in an online video game with other people when he accidentally [virtually] shot and killed one of his teammates in the online game. The teammate who was killed in the game became "extremely upset" and began talking trash to Gaskill, the affidavit says. The dispute escalated until the teammate, who the document identifies as Casey Viner of North College Hill, Ohio, threatened via Twitter to "SWATT" Gaskill, according to the affidavit. Gaskill replied, "Please try some s---." He then posted the address...
Viner "is considered a suspect in several 'swatting' incidents in Cincinnati," reports the Los Angeles Times, adding that prosecutors are still deciding whether these two gamers should also face criminal charges.
Meanwhile, Kansas officials have been informed that the third gamer who actually made the phone call, 25-year-old Tyler Barriss, matches the voice on a fake 2015 bomb threat, and is already the subject of an open investigation by an FBI Joint Terrorism Task Force.Read Replies (0)