By EditorDavid from Slashdot's fall-of-the-machines department
An anonymous reader quotes CNN:
As robots begin to appear on sidewalks and streets, they're being hazed and bullied. Last week, a drunken man allegedly tipped over a 300-pound security robot in Mountain View, California... Knightscope, which makes the robot that was targeted in Mountain View, said it's had three bullying incidents since launching its first prototype robot three years ago. In 2014, a person attempted to tackle a Knightscope robot. Last year in Los Angeles, people attempted to spray paint a Knightscope robot. The robot sensed the paint and sounded an alarm, alerting local security and the company's engineers... the robot's cameras filmed the pranksters' license plate, making it easy to track them down.
The company's security robots are deployed with 17 clients in five states, according to the article, which notes that at best the robots' cameras allow them to "rat out the bullies." But with delivery robots now also hitting the streets in San Francisco and Washington D.C., "the makers of these machines will have to figure out how to protect them from ill-intentioned humans."Read Replies (0)
By EditorDavid from Slashdot's free-Dmitry department
An anonymous reader writes:
"Dmitry Bogatov, Debian developer and Tor node admin, is still being held in a Moscow jail," tweeted the EFF Saturday. IT Wire reports that the 25-year-old math teacher was arrested earlier this month "on suspicion of organizing riots," and is expected to be held in custody until June 8. "The panel investigating the protests claims Bogatov posted several incitory messages on the sysadmin.ru forum; for example, one claim said he was asking people to bring 'bottles, fabric, gasoline, turpentine, foam plastic' to Red Square, according to a post at Hacker News. The messages were sent in the name of one Airat Bashirov and happened to be transmitted through the Tor node that Bogatov was running. The Hacker News post said Bogatov's lawyer had produced surveillance video footage to show that he was elsewhere at the time when the messages were posted.
"After Dmitry's arrest," reports the Free Bogatov site, "Airat Bashirov continue to post messages. News outlets 'Open Russia' and 'Mediazona' even got a chance to speak with him." Earlier this month the Debian GNU/Linux project also posted a message of support, noting Dmitry maintains several packages for command line and system tools, and saying their group "honours his good work and strong dedication to Debian and Free Software... we hope he is back as soon as possible to his endeavours... In the meantime, the Debian Project has taken measures to secure its systems by removing Dmitry's keys in the case that they are compromised."Read Replies (0)
By EditorDavid from Slashdot's judgement-day department
Wired's founding executive editor Kevin Kelly wrote a 5,000-word takedown on "the myth of a superhuman AI," challenging dire warnings from Bill Gates, Stephen Hawking, and Elon Musk about the potential extinction of humanity at the hands of a superintelligent constructs. Slashdot reader mirandakatz calls it an "impeccably argued debunking of this pervasive myth." Kelly writes:
Buried in this scenario of a takeover of superhuman artificial intelligence are five assumptions which, when examined closely, are not based on any evidence...
1.) Artificial intelligence is already getting smarter than us, at an exponential rate.
2.) We'll make AIs into a general purpose intelligence, like our own.
3.) We can make human intelligence in silicon.
4.) Intelligence can be expanded without limit.
5.) Once we have exploding superintelligence it can solve most of our problems...
If the expectation of a superhuman AI takeover is built on five key assumptions that have no basis in evidence, then this idea is more akin to a religious belief -- a myth
Kelly proposes "five heresies" which he says have more evidence to support them -- including the prediction that emulating human intelligence "will be constrained by cost" -- and he likens artificial intelligence to the physical powers of machines. "[W]hile all machines as a class can beat the physical achievements of an individual human...there is no one machine that can beat an average human in everything he or she does."Read Replies (0)
By EditorDavid from Slashdot's from-flush-to-flushed department
An anonymous reader quotes The Wall Street Journal:
Eighteen months ago, Beepi Inc. was rapidly expanding its online used-car business to 16 U.S. cities where people could buy cut-rate vehicles adorned with giant shiny bows. Beepi doesn't exist anymore. After burning through more than $120 million in capital, the startup failed to raise more cash and shut down in February. Its roughly 270 employees cleared out of the cavernous Mountain View, California headquarters, leaving behind the ping-pong table and putting green.
Beepi's rapid demise offers a glimpse into the changing fortunes of Silicon Valley startups, many of which have struggled to adjust since a two-year investment frenzy came to an end. In 2014 and 2015, mutual funds, hedge funds and other investors pumped billions into companies that they now see as overvalued, and unlikely to pull off an initial public offering. As venture capitalists became more discerning, investment in U.S. tech startups plummeted by 30% in dollar terms last year from a year earlier.
The article also points out that "much of the money still being invested is pouring into the upper echelon of highly valued start-ups like Airbnb and WeWork or younger ones with clear paths to profit," leaving "scores" of previously well-funded startups now struggling to survive.Read Replies (0)
By EditorDavid from Slashdot's no-more-secrets department
Bruce66423 brings word that a terrorist's WhatsApp message has been decrypted "using techniques that 'cannot be disclosed for security reasons', though 'sources said they now have the technical expertise to repeat the process in future.'" The Economic Times reports:
U.K. security services have managed to decode the last message sent out by Khalid Masood before he rammed his high-speed car into pedestrians on Westminster Bridge and stabbed to death a police officer at the gates of Parliament on March 22. The access to Masood's message was achieved by what has been described by security sources as a use of "human and technical intelligence"...
The issue of WhatsApp's encrypted service, which is closed to anyone besides the sender and recipient, had come under criticism soon after the attack. "It's completely unacceptable. There should be no place for terrorists to hide. We need to make sure that organisations like WhatsApp, and there are plenty of others like that, don't provide a secret place for terrorists to communicate with each other," U.K. home secretary Amber Rudd had said.
Security sources say the message showed the victim's motive was military action in Muslim countries, while the article adds that though ISIS claimed responsibility for the attack, "no evidence has emerged to back this up."Read Replies (0)
By EditorDavid from Slashdot's revision-history department
Nine hours ago, Ilgaz wrote:
The Turkey Blocks monitoring network has verified restrictions affecting the Wikipedia online encyclopedia in Turkey. A block affecting all language editions of the website [was] detected at 8:00AM local time Saturday 29 April. The loss of availability is consistent with internet filters used to censor content in the country.
Access to Wikipedia has been blocked in Turkey as a result of "a provisional administrative order" imposed by the Turkish Telecommunications Authority (BTK)... Turkey Blocks said an administrative blocking order is usually expected to precede a full court blocking order in coming days. While the reason for the order was unknown early on Saturday, a statement on the BTK's website said: "After technical analysis and legal consideration based on the Law Nr. 5651, ADMINISTRATION MEASURE has been taken for this website (wikipedia.org) according to Decision Nr. 490.05.01.2017.-182198 dated 29/04/2017 implemented by Information and Communication Technologies Authority."
The BBC adds reports from Turkish media that authorities "had asked Wikipedia to remove content by writers 'supporting terror.'"Read Replies (0)
By BeauHD from Slashdot's unintended-consequences department
sciencehabit quotes a report from Science Magazine: Your wireless router may be giving you away in a manner you never dreamed of. For the first time, physicists have used radio waves from a Wi-Fi transmitter to encode a 3D image of a real object in a hologram similar to the image of Princess Leia projected by R2D2 in the movie Star Wars. In principle, the technique could enable outsiders to "see" the inside of a room using only the Wi-Fi signals leaking out of it, although some researchers say such spying may be easier said than done. Their experiment relies on none of the billions of digital bits of information encoded in Wi-Fi signals, just the fact that the signals are clean, "coherent" waves. However, instead of recording the key interference pattern on a photographic plate, the researchers record it with a Wi-Fi receiver and reconstruct the object in a computer. They placed a Wi-Fi transmitter in a room, 0.9 meters behind the cross. Then they placed a standard Wi-Fi receiver 1.4 meters in front of the cross and moved it slowly back and forth to map out a "virtual screen" that substituted for the photographic plate. Also, instead of having a separate reference beam coming straight to the screen, they placed a second, stationary receiver a few meters away, where it had a direct view of the emitter. For each point on the virtual screen, the researchers compared the signals arriving simultaneously at both receivers, and made a hologram by mapping the delays caused by the aluminum cross. The virtual hologram isn't exactly like a traditional one, as researchers can't recover the image of the object by shining more radio waves on it. Instead, the scientists used the computer to run the radio waves backward in time from the screen to the distance where wave fronts hit the object. The cross then popped out.Read Replies (0)
By BeauHD from Slashdot's straight-out-of-science-fiction-novel department
Sergio Canavero, the Italian surgeon who plans to perform the world's first human head transplant within the next year, says he is preparing to reawaken cryogenically frozen brains and transplant them into someone else's skull. "In an interview with a German-language magazine, Canavero says he will attempt to bring the first brains frozen in liquid nitrogen at an Arizona-based cryogenics bank back to life 'not in 100 years,' but three years at the latest," reports National Post. From the report: Transplanting a brain only -- and not an entire head -- gets around formidable rejection issues, Canavero said, since there will be no need to reconnect and stitch up severed vessels, nerves, tendons and muscles as there is when a new head is fused onto a brain-dead donor body. Canavero allows that one "problematic" issue with brain transplants, however, would be that "no aspect of your original external body remains the same." "Your head is no longer there, your brain is transplanted into an entirely different skull," he told OOOM magazine, published by the same company that handles the Italian brain surgeon's public relations. The flamboyant neuroscientist who some ethicists have decried as "nuts" rattled the transplant world when he first outlined his plans for a human head transplant two years ago in the journal, Surgical Neurology International. Bioethicist Arthur Caplan called Canavero's latest proposal to merge head transplants with "resurrecting" the frozen dead beyond ridiculous. "People have their own doubts about whether anything can be salvaged from these frozen heads or bodies because of the damage freezing does," said Caplan, head of ethics at NYU Langone Medical Centre in New York City. "Then saying that he has some technique for making this happen, that has never been demonstrated in frozen animals, is absurd."Read Replies (0)
By BeauHD from Slashdot's be-afraid-be-very-afraid department
An anonymous reader writes: "Mobile applications that open ports on Android smartphones are opening those devices to remote hacking, claims a team of researchers from the University of Michigan," reports Bleeping Computer. Researchers say they've identified 410 popular mobile apps that open ports on people's smartphones. They claim that an attacker could connect to these ports, which in turn grant access to various phone features, such as photos, contacts, the camera, and more. This access could be leveraged to steal photos, contacts, or execute commands on the target's phone. Researchers recorded various demos to prove their attacks. Of these 410 apps, there were many that had between 10 and 50 million downloads on the official Google Play Store and even an app that came pre-installed on an OEMs smartphones. "Research on the mobile open port problem started after researchers read a Trend Micro report from 2015 about a vulnerability in the Baidu SDK, which opened a port on user devices, providing an attacker with a way to access the phone of a user who installed an app that used the Baidu SDK," reports Bleeping Computer. "That particular vulnerability affected over 100 million smartphones, but Baidu moved quickly to release an update. The paper detailing the team's work is entitled Open Doors for Bob and Mallory: Open Port Usage in Android Apps and Security Implications, and was presented Wednesday, April 26, at the 2nd IEEE European Symposium on Security and Privacy that took place this week in Paris, France."Read Replies (0)