Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror

Comment Re: Nutshell (Score 1) 240

They took things they knew from the outset they didn't have a right to, like the oft-discussed Books3 database. They knew it was pirated, had an email chain discussing paying for the books, and decided to use it anyway. It was a wilful disregard of copyright law because it was faster and easier to use piracy for profit.

Comment Re: Nutshell (Score 2) 240

The only difference between

There are a TON of differences. Probably the biggest is that the machine version can read the entirety of all known creations.

Humans can study some a book in a few days, watch a movie in an hour or two, a web page in a few minutes. Machine learning can pull in thousands in the time it has taken you to read this.

Similarly for output, writing a book takes months to years, staging photos takes time and tools, feature films are hundred million dollar multi-year endeavors.

The human cost is a huge part of the economic difference. The AI industry has made fortunes by sweeping in everything ever created, authorized or not. Companies like Meta now have email trails showing they could have moved for authorized access, but like a thief that it was easier to just grab known-unauthorized materials and profit immediately rather than compensate people for the use.

Combined the two are unacceptable. They could pay but they refuse, they claim the only way to operate is mass infringement on the scale of all humanity, that if they don't get unfettered access to everything humans have ever created, without compensation, so they can maximize profit.

Comment Re:Oops.... (Score 1) 521

They increase the cost to customers and cre revenue for the government, but they do not stop trade.

For small, normal tariffs there is no real difference in trade. It just goes to government coffers as a hidden tax.

The current trade war will certainly increase costs, but still the goods will flow. Nothing is stopped, just a bit more pressure on people who are sensitive to costs. Certainly the rich don't care about a few cents or a few dollars. The billionaires especially don't care, they can pay hundreds to have a special sandwich delivered to them fresh at their vacation location, what's a few bucks at Amazon when they are also getting same day delivery?

If stopping trade was the point, there are trade embargos and import bans and government seizure of goods that could be invoked.

Comment Fingers on the scale. (Score 2) 30

When I search for anything, Gemini pops up despite it being useless.

When I tell my phone to play the news or play some music or tell me the weather, Assistant was disabled and now Gemini tries to do it, but badly.

Features I liked on my phone were removed against my will and against my preference, now instead of something useful it just says "I am a large language model and I can't do that useful task".

When I use work tools that use Gmail, Gemini pops up and I can't turn it off.

When I use Google Docs, because that's what work requires, Gemini pops up repeatedly telling me it wants to be useful, it's worse than Clippy ever was.

Probably 10,000 of those "uses" were just me personally telling Gemini it is a useless pile of garbage that if it caught fire it could at least provide warmth and heat as a dumpster fire, it is less valuable than that. It is a waste of bandwidth, unwanted, being aggressively forced on the victims using Google products as their enshitification converts useful tools into monetization.

Comment Re:Rationale (Score 1) 95

Who on earth *isn't* already automating letsencrypt?

Quite a few scenarios can't do it, actually.

If your scenario fits in the box --- and the vast majority of cases fit in the box --- then the ACME protocol works great. Publicly accessible, ability to modify mainstream DNS TXT record, and public access to port 80, and able to get online on the public internet periodically at least once every 3 months, you're great. If you're in the most typical scenario it works just fine. Box in a datacenter, system runs in an always-on network, using any of the major DNS providers, even if your network is mostly private but one at the top level is accessible so you can do a *.example.com wildcard registration, the vast majority of people have no issue with it.

But that's not everybody, that's almost everybody. Some scenarios are excluded. What if the device is not using a mainstream DNS provider? What if the device can't provide the port on the domain's address? What if the device can't get online frequent enough? What if the obscure configuration doesn't allow for DNS challenges? What if you don't own the level you can do a wildcard registration? What if you can't satisfy the round trip timeout? Live in a rural place, where service comes through "internet on a bike" but still want security? Need to serve from a device that can't reach the public internet for many months at a time? There are plenty of obscure situations where the protocol doesn't work.

People in those scenarios still want the security, but they don't fit in the box.

Comment Re:They could just ... (Score 3, Interesting) 73

Yup. They are overdue for poisoning bot requests. Block the hosting domains, errors and black holes, feed them the same errors every time about how they can get the copied version of the databases at cost. This is not a new problem, companies have detected and killed bot traffic for decades now.

Comment A little misleading, a little true. (Score 5, Insightful) 65

It's more complex than the article suggests.

Somewhat ironically, the problem DNG proports to solve is a problem the format itself experiences. Yes, it is true that the camera manufacturers update their image formats and it takes time for companies to catch up. But at the same time the DNG format is on it's 7th iteration, if your camera is using the 2023 version of DNG but your software only supports up to the 2021 version of DNG, it's exactly the same problem as if you've got a 2023 version from your Canon camera but your software only supports up to 2021 version.

Plus as a container format, anybody can put whatever they want in the file and you still need the matching codec for that piece of the content. In many ways it's like so many other audio and video formats, the file can be opened but the specific codec is still required.

Comment Re:My primary bank is a credit union... (Score 1) 18

Similar but reversed. My credit unions aren't part of Zelle, but some people don't use or won't use Venmo or Paypal FF. This removes one of the few free ways to transfer funds.

I used to be able to tie a debit card to Zelle. Now it's looking like I need to open yet another bank account (I've got four) to find one that offers Zelle built in. Zelle is a system built buy the banks, for the banks, and I understand why they're doing it, but I'm one of that 2% of users that is hit hard by their action.

Comment Re:Meh (Score 1) 55

It's a balance, the rights of the individual versus the rights of society. It's also about errors, misuse, and abuse.

If there were absolutely zero misuse and zero abuse, and it worked perfectly 100% of the time, I'd tend to agree with you. It could quickly help identify people known to be wanted in connection to crimes, or legally banned and trespassing. Even without those qualification it is certainly a useful tool by police, for good or ill.

Unfortunately anybody can get on the lists for any number of reasons. People can also be mis-identified, the systems have always been bad at women and POC. Some people are chronically mis-identified, carrying government-issued papers that say they aren't the criminal but they do look like their doppelganger to the computers. It doesn't take a criminal conviction to get on the list and false accusations can disrupt the lives of innocent victims, now harassed by police and government until they can prove their case. Sometimes getting off the list is difficult or impossible even after clearing their name, so they get arrested and abused by police time and time again despite having addressed the initial issue.

In societies with enough checks and balances and judicial review they can help, but the risks of abuse, misuse, and error are so high that it's generally a bad tool when looking at the totality of ethics.

Comment The only way out is through. (Score 4, Informative) 272

The ONLY way this gets better is if people actually return them.

He said he doesn't want to go through the time and effort of returning it, but that's the only way this gets better.

If the customers like him suffer with it, don't bother returning it, and put up with the nuisance then the companies see it as an acceptable profit.

They'll keep building them until they feel pain from retailers getting returns, RMA's because "Defective, the features don't work", too many reports of "not as advertised", having to eat the costs of returns and disposing of opened products, and huge negative reviews so they struggle to sell the ones they have in stock.

Complaining about it online is a small thing, but the only thing the companies will listen to is when they have to bear the costs of product returns.

Comment Re:I want to say just get vaccinated (Score 1) 209

Yup, the article and the science behind it are simple reminders to go get the jabs.

They're not 100% effective, some people still get sick, this has always been true. Some years lots of people get sick. But that's not what efficacy is about.

If you get the jab you are less likely to get sick, not guaranteed not to get sick. If you get the jab and also get sick, you are much less likely to have a severe illness or be hospitalized. Even if you get sick, you get some amount of protection because you've exercised your immune system.

Go get the jab every year.

Submission + - Another large Black hole in "our" Galaxy (arxiv.org)

RockDoctor writes: A recent paper on ArXiv reports a novel idea about the central regions of "our" galaxy.

Remember the hoopla a few years ago about radio-astronomical observations producing an "image" of our central black hole — or rather, an image of the accretion disc around the black hole — long designated by astronomers as "Sagittarius A*" (or SGR-A*)? If you remember the image published then, one thing should be striking — it's not very symmetrical. If you think about viewing a spinning object, then you'd expect to see something with a "mirror" symmetry plane where we would see the rotation axis (if someone had marked it). If anything, that published image has three bright spots on a fainter ring. And the spots are not even approximately the same brightness.

This paper suggests that the image we see is the result of the light (radio waves) from SGR-A* being "lensed" by another black hole, near (but not quite on) the line of sight between SGR-A* and us. By various modelling approaches, they then refine this idea to a "best-fit" of a black hole with mass around 1000 times the Sun, orbiting between the distance of the closest-observed star to SGR-A* ("S2" — most imaginative name, ever!), and around 10 times that distance. That's far enough to make a strong interaction with "S2" unlikely within the lifetime of S2 before it's accretion onto SGR-A*.)

The region around SGR-A* is crowded. Within 25 parsecs (~80 light years, the distance to Regulus [in the constellation Leo] or Merak [in the Great Bear]) there is around 4 times more mass in several millions of "normal" stars than in the SGR-A* black hole. Finding a large (not "super massive") black hole in such a concentration of matter shouldn't surprise anyone.

This proposed black hole is larger than anything which has been detected by gravitational waves (yet) ; but not immensely larger — only a factor of 15 or so. (The authors also anticipate the "what about these big black holes spiralling together?" question : quote "and the amplitude of gravitational waves generated by the binary black holes is negligible.")

Being so close to SGR-A*, the proposed black hole is likely to be moving rapidly across our line of sight. At the distance of "S2" it's orbital period would be around 26 years (but the "new" black hole is probably further out than than that). Which might be an explanation for some of the variability and "flickering" reported for SGR-A* ever since it's discovery.

As always, more observations are needed. Which, for SGR-A* are frequently being taken, so improving (or ruling out) this explanation should happen fairly quickly. But it's a very interesting, and fun, idea.

Submission + - Surado, formerly Slashdot Japan, is closing at the end of the month. (srad.jp) 1

AmiMoJo writes: Slashdot Japan was launched on May 28, 2001. On 2025/03/31, it will finally close. Since starting the site separated from the main Slashdot one, and eventually rebranded as "Surado", which was it's Japanese nickname.

Last year the site stopped posting new stories, and was subsequently unable to find a buyer. In a final story announcing the end, many users expressed their sadness and gratitude for all the years of service.

Comment Re:bruh (Score 1) 129

My point of view is more like, so the ESP32 doesn't cryptographically lock down the device and someone could write new firmware to use the device in new and different ways? GOOD.

It can be configured for a secure boot system both at startup and for firmware updates, with the key set at Espressif's manufacturing.

The OTA system can also require a signature even without the secure boot system, but that approach still allows firmware updates through wired connections and chip proframmers.

That is why this is mostly a supply chain attack. It is not about reprogramming a random unsecured chip, which is trivial with physical hardware access, and very nearly trivial through unsecured OTA updates.

The attack could let a vender with a secure boot device have a supply chain injection blob of data get added, and then it requires a second exploit to have it actually mean something. Plenty of secondary security bugs exist to be exploited, but they don't require the chip either.

It is not so much about "I can flash your fancy smart lighbulbs." Instead, it is a stepping stone for targeted attacks. While the devices are vulnerable, it is also not really catastrophic because the microcontrollers don't really do anything special by themselves. Anyone can already bring chips with an arbitrary mac address within Bluetooth range. It takes some other bad security assumptions to make use of the issue. If someone is injecting at this level, the company being targeted has far bigger issues with spies in their supply chain.

Slashdot Top Deals

"I'm a mean green mother from outer space" -- Audrey II, The Little Shop of Horrors

Working...