×
DRM

How a Nephew's CD Burner Inspired Early Valve To Embrace DRM (arstechnica.com) 2

Valve's early anti-piracy efforts, which eventually led to the Steam platform, were sparked by co-founder Monica Harrington's nephew using her money to buy a CD burner for copying games, she revealed at last week's Game Developers Conference. Harrington said her nephew's "lovely thank you note" about sharing games with friends represented a "generational shift" in piracy attitudes that could "put our entire business model at risk."

Half-Life subsequently launched with CD key verification in 1998. When players complained about authentication failures, co-founder Mike Harrington discovered "none of them had actually bought the game," confirming the system worked. Although easily bypassed, this early protection influenced Steam's more robust DRM implemented with Half-Life 2 in 2004, which became the industry standard for PC game distribution.
Science

Researchers Search For More Precise Ways To Measure Pain (msn.com) 6

Scientists are developing biomarkers to objectively measure pain, addressing a fundamental medical challenge that has contributed to the opioid crisis and led to consistent underestimation of pain in women and minorities.

Four research teams funded by the Department of Health and Human Services are developing technologies to quantify pain like other vital signs. Their approaches include a blood test for endometriosis pain, a device measuring nerve response through pupil dilation, microneedle patches sampling interstitial fluid, and a wearable sensor detecting pain markers in sweat.

"When patients are told that the pain is all in their head, the implication is that it's imagined, but the irony is that's sort of right," said Adam Kepecs, a neuroscience professor at Washington University. "The pain only exists in your brain. It's neural activity, which is why it's invisible and uniquely personal. But it's still real." These innovations could transform treatment for the nearly 25% of Americans suffering from chronic pain, while potentially saving billions in healthcare costs.
United States

Pentagon Axes HR System After 780% Budget Overrun (theregister.com) 51

The Pentagon has canceled its troubled Defense Civilian Human Resources Management System after years of delays and budget overruns, Defense Secretary Pete Hegseth said. The project, launched in 2018 with a one-year timeline and $36 million budget, ultimately ran eight years and exceeded costs by $280 million, reaching 780% over budget. "We're not doing that anymore," Hegseth said in a video announcing the cancellation. Officials have 60 days to develop a new plan to modernize DoD's civilian HR systems. The cuts are part of a broader $580 million spending reduction that includes $360 million in diversity, climate change and COVID-19 grant programs, plus $30 million in consulting contracts with Gartner and McKinsey.
Google

Google Says It Might Have Deleted Your Maps Timeline Data (arstechnica.com) 11

Google has confirmed that a technical issue has permanently deleted location history data for numerous users of its Maps application, with no recovery possible for most affected customers. The problem emerged after Google transitioned its Timeline feature from cloud to on-device storage in 2024 to enhance privacy protections. Users began reporting missing historical location data on support forums and social media platforms in recent weeks. "This is the result of a technical issue and not user error or an intentional change," said a Google spokesperson. Only users who manually enabled encrypted cloud backups before the incident can recover their data, according to Google. The company began shifting location storage policies in 2023, initially stopping collection of sensitive location data including visits to abortion clinics and domestic violence shelters.
China

China Unveils a Powerful Deep-sea Cable Cutter That Could Reset the World Order (scmp.com) 56

schwit1 writes:

A compact, deep-sea, cable-cutting device, capable of severing the world's most fortified underwater communication or power lines, has been unveiled by China -- and it could shake up global maritime power dynamics.

The revelation marks the first time any country has officially disclosed that it has such an asset, capable of disrupting critical undersea networks. The tool, which is able to cut lines at depths of up to 4,000 metres (13,123 feet) -- twice the maximum operational range of existing subsea communication infrastructure -- has been designed specifically for integration with China's advanced crewed and uncrewed submersibles like the Fendouzhe, or Striver, and the Haidou series.


China

China Bans Compulsory Facial Recognition and Its Use in Private Spaces Like Hotel Rooms (theregister.com) 20

China's Cyberspace Administration and Ministry of Public Security have outlawed the use of facial recognition without consent. From a report: The two orgs last Friday published new rules on facial recognition and an explainer that spell out how orgs that want to use facial recognition must first conduct a "personal information protection impact assessment" that considers whether using the tech is necessary, impacts on individuals' privacy, and risks of data leakage. Organizations that decide to use facial recognition must data encrypt biometric data, and audit the information security techniques and practices they use to protect facial scans. Chinese that go through that process and decide they want to use facial recognition can only do so after securing individuals' consent. The rules also ban the use of facial recognition equipment in public places such as hotel rooms, public bathrooms, public dressing rooms, and public toilets. The measures don't apply to researchers or to what machine translation of the rules describes as "algorithm training activities" -- suggesting images of citizens' faces are fair game when used to train AI models.
AI

AI Will Impact GDP of Every Country By Double Digits, Says Mistral CEO (businessinsider.com) 31

Countries must develop their own artificial intelligence infrastructure or risk significant economic losses as the technology transforms global economies, Mistral CEO Arthur Mensch said last week.

"It will have an impact on GDP of every country in the double digits in the coming years," Mensch told the A16z podcast, warning that nations without domestic AI systems would see capital flow elsewhere. The French startup executive compared AI to electricity adoption a century ago. "If you weren't building electricity factories, you were preparing yourself to buy it from your neighbors, which creates dependencies," he said.
Operating Systems

Linux Kernel 6.14 Officially Released (9to5linux.com) 5

prisoninmate shares a report: Highlights of Linux 6.14 include Btrfs RAID1 read balancing support, a new ntsync subsystem for Win NT synchronization primitives to boost game emulation with Wine, uncached buffered I/O support, and a new accelerator driver for the AMD XDNA Ryzen AI NPUs (Neural Processing Units).

Also new is DRM panic support for the AMDGPU driver, reflink and reverse-mapping support for the XFS real-time device, Intel Clearwater Forest server support, support for SELinux extended permissions, FUSE support for io_uring, a new fsnotify file pre-access event type, and a new cgroup controller for device memory.

Businesses

DNA-Testing Firm 23andMe Files for Bankruptcy (msn.com) 48

DNA-testing company 23andMe has filed for Chapter 11 bankruptcy protection [non-paywalled source] in Missouri and announced CEO Anne Wojcicki's immediate resignation, weeks after rejecting her proposal to buy back the business she co-founded. The bankruptcy filing represents "the best path forward to maximize the value of the business," said Mark Jensen, board member and special committee chair.

Further reading: DNA of 15 Million People for Sale in 23andMe Bankruptcy.
The Internet

Why the Internet Archive is More Relevant Than Ever (npr.org) 50

It's "live-recording the World Wide Web," according to NPR, with a digital library that includes "hundreds of billions of copies of government websites, news articles and data."

They described the 29-year-old nonprofit Internet Archive as "more relevant than ever." Every day, about 100 terabytes of material are uploaded to the Internet Archive, or about a billion URLs, with the assistance of automated crawlers. Most of that ends up in the Wayback Machine, while the rest is digitized analog media — books, television, radio, academic papers — scanned and stored on servers. As one of the few large-scale archivists to back up the web, the Internet Archive finds itself in a particularly unique position right now... Thousands of [U.S. government] datasets were wiped — mostly at agencies focused on science and the environment — in the days following Trump's return to the White House...

The Internet Archive is among the few efforts that exist to catch the stuff that falls through the digital cracks, while also making that information accessible to the public. Six weeks into the new administration, Wayback Machine director [Mark] Graham said, the Internet Archive had cataloged some 73,000 web pages that had existed on U.S. government websites that were expunged after Trump's inauguration...

According to Graham, based on the big jump in page views he's observed over the past two months, the Internet Archive is drawing many more visitors than usual to its services — journalists, researchers and other inquiring minds. Some want to consult the archive for information lost or changed in the purge, while others aim to contribute to the archival process.... "People are coming and rallying behind us," said Brewster Kahle, [the founder and current director of the Internet Archive], "by using it, by pointing at things, helping organize things, by submitting content to be archived — data sets that are under threat or have been taken down...."

A behemoth of link rot repair, the Internet Archive rescues a daily average of 10,000 dead links that appear on Wikipedia pages. In total, it's fixed more than 23 million rotten links on Wikipedia alone, according to the organization.

Though it receives some money for its preservation work for libraries, museums, and other organizations, it's also funded by donations. "From the beginning, it was important for the Internet Archive to be a nonprofit, because it was working for the people," explains founder Brewster Kahle on its donations page: Its motives had to be transparent; it had to last a long time. That's why we don't charge for access, sell user data, or run ads, even while we offer free resources to citizens everywhere. We rely on the generosity of individuals like you to pay for servers, staff, and preservation projects. If you can't imagine a future without the Internet Archive, please consider supporting our work. We promise to put your donation to good use as we continue to store over 99 petabytes of data, including 625 billion webpages, 38 million texts, and 14 million audio recordings.
Two interesting statistics from NPR's article:

Thanks to long-time Slashdot reader jtotheh for sharing the news.


Space

Another Large Black Hole In 'Our' Galaxy (arxiv.org) 32

RockDoctor (Slashdot reader #15,477) writes: A recent paper on ArXiv reports a novel idea about the central regions of "our" galaxy.

Remember the hoopla a few years ago about radio-astronomical observations producing an "image" of our central black hole — or rather, an image of the accretion disc around the black hole — long designated by astronomers as "Sagittarius A*" (or SGR-A*)? If you remember the image published then, one thing should be striking — it's not very symmetrical. If you think about viewing a spinning object, then you'd expect to see something with a "mirror" symmetry plane where we would see the rotation axis (if someone had marked it). If anything, that published image has three bright spots on a fainter ring. And the spots are not even approximately the same brightness.

This paper suggests that the image we see is the result of the light (radio waves) from SGR-A* being "lensed" by another black hole, near (but not quite on) the line of sight between SGR-A* and us. By various modelling approaches, they then refine this idea to a "best-fit" of a black hole with mass around 1000 times the Sun, orbiting between the distance of the closest-observed star to SGR-A* ("S2" — most imaginative name, ever!), and around 10 times that distance. That's far enough to make a strong interaction with "S2" unlikely within the lifetime of S2 before it's accretion onto SGR-A*.)

The region around SGR-A* is crowded. Within 25 parsecs (~80 light years, the distance to Regulus [in the constellation Leo] or Merak [in the Great Bear]) there is around 4 times more mass in several millions of "normal" stars than in the SGR-A* black hole. Finding a large (not "super massive") black hole in such a concentration of matter shouldn't surprise anyone.

This proposed black hole is larger than anything which has been detected by gravitational waves (yet) ; but not immensely larger — only a factor of 15 or so. (The authors also anticipate the "what about these big black holes spiralling together?" question : quote "and the amplitude of gravitational waves generated by the binary black holes is negligible.")

Being so close to SGR-A*, the proposed black hole is likely to be moving rapidly across our line of sight. At the distance of "S2" it's orbital period would be around 26 years (but the "new" black hole is probably further out than than that). Which might be an explanation for some of the variability and "flickering" reported for SGR-A* ever since it's discovery.

As always, more observations are needed. Which, for SGR-A* are frequently being taken, so improving (or ruling out) this explanation should happen fairly quickly. But it's a very interesting, and fun, idea.

The Internet

'Fish Doorbell' Enters Fifth Year with Millions of Fans (apnews.com) 12

Long-time Slashdot reader invisik reminds us that the "fish doorbell" is still going strong, according to the Associated Press. "Now in its fifth year, the site has attracted millions of viewers from around the world with its quirky mix of slow TV and ecological activism." The central Dutch city of Utrecht installed a "fish doorbell" on a river lock that lets viewers of an online livestream alert authorities to fish being held up as they make their springtime migration to shallow spawning grounds. The idea is simple: An underwater camera at Utrecht's Weerdsluis lock sends live footage to a website. When somebody watching the site sees a fish, they can click a button that sends a screenshot to organizers. When they see enough fish, they alert a water worker who opens the lock to let the fish swim through.
"Much of the time, the screen is just a murky green with occasional bubbles, but sometimes a fish swims past. As the water warms up, more fish show up..."
Medicine

If Bird Flu Jumped to Humans, Could Past Flu Infections Offer Some Protection? (npr.org) 178

NPR reports on research "into whether our defenses built up from past flu seasons can offer any protection against H5N1 bird flu." So far, the findings offer some reassurance. Antibodies and other players in the immune system may buffer the worst consequences of bird flu, at least to some degree. "There's certainly preexisting immunity," says Florian Krammer, a virologist at Mount Sinai's Icahn School of Medicine who is involved in some of the new studies. "That's very likely not going to protect us as a population from a new pandemic, but it might give us some protection against severe disease." This protection is based on shared traits between bird flu and types of seasonal flu that have circulated among us. Certain segments of the population, namely older people, may be particularly well-primed because of flu infections during early childhood.

Of course, there are caveats. "While this is a bit of a silver lining, it doesn't mean we should all feel safe," says Seema Lakdawala, a virologist at Emory University's School of Medicine whose lab is probing this question. For one thing, the studies can't be done on people. The conclusions are based on animal models and blood tests that measure the immune response. And how this holds up for an individual is expected to vary considerably, depending on their own immune history, underlying health conditions and other factors. But for now, influenza researchers speculate this may be one reason most people who've caught bird flu over the past year have not fallen severely ill....

Research published this month is encouraging. By analyzing blood samples from close to 160 people, a team at the University of Pennsylvania and the University of Chicago were able to show that people born roughly before 1965 had higher levels of antibodies — proteins that bind to parts of the virus — which cross-react to the current strain of bird flu.

This week U.S. federal officials also "announced funding for avian influenza research projects, including money for new vaccine projects and potential treatments," the Guardian report. The head of America's agriculture department said it would invest $100 million, as part of a larger $1 billion initiative to fight bird flu and stop rising egg prices, according to the nonprofit news site Iowa Capital Dispatch.
AI

How AI Coding Assistants Could Be Compromised Via Rules File (scworld.com) 28

Slashdot reader spatwei shared this report from the cybersecurity site SC World: : AI coding assistants such as GitHub Copilot and Cursor could be manipulated to generate code containing backdoors, vulnerabilities and other security issues via distribution of malicious rule configuration files, Pillar Security researchers reported Tuesday.

Rules files are used by AI coding agents to guide their behavior when generating or editing code. For example, a rules file may include instructions for the assistant to follow certain coding best practices, utilize specific formatting, or output responses in a specific language.

The attack technique developed by Pillar Researchers, which they call 'Rules File Backdoor,' weaponizes rules files by injecting them with instructions that are invisible to a human user but readable by the AI agent.

Hidden Unicode characters like bidirectional text markers and zero-width joiners can be used to obfuscate malicious instructions in the user interface and in GitHub pull requests, the researchers noted.

Rules configurations are often shared among developer communities and distributed through open-source repositories or included in project templates; therefore, an attacker could distribute a malicious rules file by sharing it on a forum, publishing it on an open-source platform like GitHub or injecting it via a pull request to a popular repository.

Once the poisoned rules file is imported to GitHub Copilot or Cursor, the AI agent will read and follow the attacker's instructions while assisting the victim's future coding projects.

EU

Is WhatsApp Being Ditched for Signal in Dutch Higher Education? (dub.uu.nl) 40

For weeks Signal has been one of the three most-downloaded apps in the Netherlands, according to a local news site. And now "Higher education institutions in the Netherlands have been looking for an alternative," according to DUB (an independent news site for the Utrecht University community): Employees of the Utrecht University of Applied Sciences (HU) were recently advised to switch to Signal. Avans University of Applied Sciences has also been discussing a switch...The National Student Union is concerned about privacy. The subject was raised at last week's general meeting, as reported by chair Abdelkader Karbache, who said: "Our local unions want to switch to Signal or other open-source software."
Besides being open source, Signal is a non-commercial nonprofit, the article points out — though its proponents suggest there's another big difference. "HU argues that Signal keeps users' data private, unlike WhatsApp." Cybernews.com explains the concern: In an interview with the Dutch newspaper De Telegraaf, Meredith Whittaker [president of the Signal Foundation] discussed the pitfalls of WhatsApp. "WhatsApp collects metadata: who you send messages to, when, and how often. That's incredibly sensitive information," she says.... The only information [Signal] collects is the date an account was registered, the time when an account was last active, and hashed phone numbers... Information like profile name and the people a user communicates with is all encrypted... Metadata might sound harmless, but it couldn't be further from the truth. According to Whittaker, metadata is deadly. "As a former CIA director once said: 'We kill people based on metadata'."
WhatsApp's metadata also includes IP addresses, TechRadar noted last May: Other identifiable data such as your network details, the browser you use, ISP, and other identifiers linked to other Meta products (like Instagram and Facebook) associated with the same device or account are also collected... [Y]our IP can be used to track down your location. As the company explained, even if you keep the location-related features off, IP addresses and other collected information like phone number area codes can be used to estimate your "general location."

WhatsApp is required by law to share this information with authorities during an investigation...

[U]nder scrutiny is how Meta itself uses these precious details for commercial purposes. Again, this is clearly stated in WhatsApp's privacy policy and terms of use. "We may use the information we receive from [other Meta companies], and they may use the information we share with them, to help operate, provide, improve, understand, customize, support, and market our Services and their offerings," reads the policy. This means that yes, your messages are always private, but WhatsApp is actively collecting your metadata to build your digital persona across other Meta platforms...

The article suggests using a VPN with WhatsApp and turning on its "advanced privacy feature" (which hides your IP address during calls) and managing the app's permissions for data collection. "While these steps can help reduce the amount of metadata collected, it's crucial to bear in mind that it's impossible to completely avoid metadata collection on the Meta-owned app... For extra privacy and security, I suggest switching to the more secure messaging app Signal."

The article also includes a cautionary anecdote. "It was exactly a piece of metadata — a Proton Mail recovery email — that led to the arrest of a Catalan activist."

Thanks to long-time Slashdot reader united_notions for sharing the article.

Slashdot Top Deals