TeCHnology

519 readers
1 users here now

Technology discussion for Switzerland. This community shall discuss various topics of technology in and around Switzerland.

founded 2 years ago
MODERATORS
51
 
 

For the Swiss Association of Judges, artificial intelligence (AI) is an instrument that could be useful in the medium and long term in the administration of justice. However, it is likely to relieve the judiciary only to a limited extent.

AI could be used, for example, in mass cases and as an aid in the search for precedents, the association’s president Marie-Pierre de Montmollin told the Keystone-SDA Swiss News Agency.

It is also important to bear in mind that criminal proceedings are usually conducted orally and the sentence is determined individually. Under these conditions, AI could be a tool in the fight against judicial overload, she said at Neuchâtel cantonal court on behalf of the association’s board.

AI must also comply with the conditions set out by the Council of Europe in 2018 in an ethical charter on the use of artificial intelligence in and around the judiciary, she said. The Council of Europe demands, for example, certified sources and transparent data processing methods.

52
 
 

Internet criminals often target large companies. According to a study, 45% of Swiss companies with more than 250 employees have already been the victim of an attack at least once.

This is shown by the Swiss-VR-Monitor, a semi-annual survey published on Monday by the board of directors association swissVR in cooperation with the auditing and consulting firm Deloitte Switzerland and the Lucerne University of Applied Sciences and Arts. For the study, 400 board members were surveyed on cyber resilience.

In contrast to large companies, small and medium-sized companies (SMEs) appear to be significantly less affected: Only 18% of companies with fewer than 50 employees reported a serious attack.

As a reason for the correlation between company size and the frequency of attacks, Deloitte explained that large companies are more exposed globally and offer cybercriminals larger attack surfaces. “Another explanation for the supposedly lower level of concern among smaller companies is the partial lack of reporting of such incidents to the board of directors,” it said.

There is a need for action here, it said, pointing out that almost half of the companies lacked a clear cyber strategy. And 30% of the companies had not appointed a management team to adequately manage cyber issues. At least eight out of ten supervisory bodies have a risk policy that addresses cyber dangers.

Cyberattacks often have serious consequences for the operational business. By far the most frequent consequence is a business interruption. This is the case for 42% of the companies affected by a cyberattack. Data leaks occurred in a quarter of the companies attacked, and product malfunctions and faulty services in 20%.

In addition to lost sales due to business interruptions, there are high consequential costs, for example for the recovery of data. Only 7% of the attacked companies experienced an outflow of assets. But the financial consequences should not be underestimated, Deloitte wrote.

53
54
 
 

Linus Torvalds has decided the time is right to give the world a new version of the Linux kernel, announcing its delivery in a brief Sunday afternoon post.

"Nothing particularly odd or scary happened this last week, so there is no excuse to delay the 6.5 release," he wrote.

The emperor penguin admitted some trepidation about this release.

"I still have this nagging feeling that a lot of people are on vacation and that things have been quiet partly due to that. But this release has been going smoothly, so that's probably just me being paranoid," he wrote, adding "The biggest patches this last week were literally just to our selftests."

For the record, Torvalds has worried about the impact of Northern summer on this release ever since release candidate one debuted way back in the second week of July.

Whatever the reason for this release appearing on schedule, with no notable ructions, it has produced a version of the kernel unlikely to be regarded as particularly significant. Perhaps the most notable inclusion is default enablement of P-State on some AMD CPUs – meaning the kernel can manage cores more efficiently to balance performance and power consumption.

Intel CPUs that blend performance and efficiency cores have also gained improved load balancing, which should to get the most out of Chipzilla silicon based on the Alder Lake architecture.

The kernel also added tools to bring CPUs into operation in parallel – a boost for boot times on multisocket servers, which is relevant for hyperscalers.

Speaking of hyperscalers, China's Alibaba will be pleased that the kernel improved support for its homebrew T-Head Xuantie 910 TH1520 RISC-V 64-bit processor. T-Head, Alibaba's chip design house, suggests the Xuantie 910 will find its home in servers running AI workloads, 5G equipment, and edge servers. Running Linux is arguably a prerequisite for success in any of those roles. Also in version 6.5, USB 4.2 makes its initial appearance, albeit without full support. Wi-Fi 7 has received more kernel love.

On, then, to version 6.6 of the kernel, which might see the appearance of the bcachefs filesystem. It controversially didn't make it into version 6.5, but Torvalds perused it during the push for version 6.5, and expressed increased comfort at its debut in a future kernel cut.

Torvalds wrote that he already has "~20 pull requests pending and ready to go," but asked developers to test this new release before diving into the "next merge frenzy."

Linux 6.5 is the third release in a row to arrive on schedule after seven release candidates. Linux 6.1 needed an eighth release candidate, but Torvalds had planned for that in case work slowed over the 2022–23 Christmas/New Year period. ®

55
 
 

Most people think of Facebook as a social network and Google as a search engine. But tech geeks see these services as “platforms”: vast online territories that users inhabit. The companies that run them have mostly been free to make the rules in these digital places. But on August 25th they will lose much of this sovereignty when the rules of the European Union’s Digital Services Act (dsa) are put into action. What will this mean for internet users—not just in Europe, but worldwide?

With the dsa and its sister legislation, the Digital Markets Act, which will also be phased in over the coming months, the eu aims to change the oversight of large online platforms. Until now regulators have tried to fix problems—such as the spread of disinformation and violations of antitrust rules—after the fact. The new laws are meant to help them get ahead of the game by setting clear rules that online platforms must follow. The dsa will apply to all online businesses, but bigger services, defined as those with more than 45m users in the eu, will have to follow extra rules. In April the European Commission, the eu’s executive branch, designated 19 of these “very large online platforms” (vlops) and “very large online search engines”. This group includes the usual suspects, such as Facebook and Google, but also more surprising ones, such as Wikipedia, a free online encyclopaedia, and Zalando, a European e-commerce site.

Most web users will hardly notice some of the changes these firms will now have to implement. Platforms will have to share more information with regulators about how they moderate content, decide what users see and use artificial intelligence. They must allow vetted researchers and auditing firms to look at internal data to check if they are following the rules, too.

Other changes will be more obvious. Platforms must now make it easy for users to report content they think is illegal, and will have to remove it quickly if it breaks the law. They must also tell users if their content is removed or hidden, and explain why. Targeted advertisements will no longer be allowed if they are based on sensitive personal data such as religion and sexual orientation. Using personal data to show ads to children and teenagers will also be banned.

Companies have already started to tweak their services. Meta, which operates Facebook, is developing tools that will tell users when the visibility of their posts has been limited (and give them a chance to appeal). On Amazon, a big online retailer, European buyers will soon be able to flag potentially illegal products. And on TikTok, a social-media platform, users will have the option of seeing videos based on the content’s popularity in the area where they live, rather than what they have watched before, to minimise the personal data that is collected.

56
 
 

The data was stolen from the Swiss armed forces during the hacker attack on the IT service provider Xplain. Criminal charges have been filed against unknown persons.

Excerpts of military police reports as well as personal data of about 720 users of the platform have surfaced on the darknet. The data was stolen from the Swiss armed forces during the hacker attack on the IT service provider Xplain. Criminal charges have been filed against unknown persons.

According to a statement by the Defence Group and the General Secretariat of the Defence Department on Thursday, the IT infrastructure of the Swiss armed forces was not affected by the hacker attack. The information on the Darknet had no influence on the operational missions of the Armed Forces and did not pose a potential threat to the Armed Forces and its partner organisations. However, security monitoring has been additionally strengthened.

According to the Swiss armed forces, there are no risks for the persons concerned on the stolen list of the military police's journal and report management system "Jorasys". Comparable information was available in public directories such as the federal government calendar or other public sources. In addition, the Swiss armed forces had sensitised the people.

57
 
 

Microsoft is adding the Python programming language to Microsoft Excel, allowing users to create powerful functions for analyzing and manipulating data.

The public preview of the feature is now available to Microsoft 365 Insiders in the Beta channel, with the goal to ultimately roll out the feature to Excel for Windows in 16.0.16818.2000.

However, even if you join the Microsoft 365 Insiders Beta channel to test the new feature, there is no guarantee that Python in Excel will be available, as Microsoft is rolling it out slowly to test the feature.

Python in Excel

The new Python in Excel feature brings a new 'PY' function that allows users to embed Python code directly in a cell to be executed like any macro or regular Excel function.

However, instead of running the Python scripts locally, Excel will execute the code in the cloud using a hypervisor-isolated container on Azure Container Instances. Microsoft says this container environment will include Python and a curated set of Anaconda libraries to prevent security issues.

These libraries include the data visualization and analysis tool 'pandas' and the visualization tool 'Matplotlib.'

As the Python scripts will run in an isolated container, they will not have access to any local resources, including the local network, computer, files, and a Microsoft 365 authentication token.

To embed a Python script in Excel, users will use the =PY() function to open a text area where they can enter the Python code they wish to execute.

The code is then executed in the cloud container, and the results are sent back and displayed in the worksheet. Microsoft says this is all done anonymously so that your Python code is not linked back to a particular user.

"Python in Excel makes it possible to natively combine Python and Excel analytics within the same workbook - with no setup required," Microsoft explains in an announcement.

"With Python in Excel, you can type Python directly into a cell, the Python calculations run in the Microsoft Cloud, and your results are returned to the worksheet, including plots and visualizations."

58
 
 

In contrast to the House of Representatives, the responsible committee of the Senate says ‘no’ to a fixed price cap for roaming charges. Switzerland must coordinate internationally, it argues.

The Commission for Transport and Telecommunications of the Senate proposes to reject a corresponding motion by parliamentarian Elisabeth Schneider-Schneiter, as announced on Tuesday. In May, the motion had been adopted by 116 votes to 68 with 4 abstentions.

The motion demands that the Federal Council introduce an upper limit for roaming charges. According to the press release, the Senate committee agrees with the Federal Council that according to the current Telecommunications Act, price ceilings can be set based on international agreements. However, a unilateral decision by the Federal Council is not desirable.

Difficult fight against charges

Similar proposals to abolish excessive roaming charges had already failed several times in parliament. Earlier this year, communications minister, Albert Rösti, said that the Federal Council could not simply set a unilateral cap by decree. This was confirmed by an expert opinion. Moreover, without an international agreement, foreign providers would not have to comply with Swiss rules.

The Foundation for Consumer Protection repeatedly warns against high roaming charges. It is true that new customers of telecom providers have had to set their own limits for data roaming since summer 2021 according to a new regulation. Nevertheless, customers still run the risk of returning from their holidays with high bills.

The situation is different in the European Union (EU), where customers benefited from the removal of roaming charges. Negotiators of the EU states and the European Parliament agreed at the end of 2021 to extend the popular rules until summer 2032. This means that people can continue to make phone calls, surf the internet or write text messages with their mobile phones while travelling at the same cost as at home.

59
 
 

Swiss start-up AlpineAI announced on Monday the launch of SwissGPT.

This Swiss version of the ChatGPT text generator aims to counter the American and Chinese presence in this field and serve local companies more effectively.

The aim is to process company data securely using LLM (Large Language Model) and develop new solutions using algorithms, the start-up explained at a press conference.

Jointly created by several artificial intelligence research laboratories, including the Swiss Federal Institute of Technology in Zurich (ETHZ) and its Lausanne counterpart (EPFL), SwissGPT is aiming to assert itself against the technological supremacy of the USA and China, the main suppliers of such software.

60
 
 

Full names and phone numbers of all 2,800 employees of the Bernese cantonal police have been leaked to hackers.

The National Cyber Security Center (NCSC) informed the Bern cantonal police on July 21 about a previously unknown security vulnerability in the MobileIron app installed on smartphones of police employees. The app, which is provided by the IT software company Ivanti, is used worldwide to ensure a connection between a smartphone or laptop and servers at company headquarters.

The security gap was quickly closed, but the data had already been leaked, confirmed Flurina Schenk, media spokeswoman for the Bern cantonal police in an interview with Swiss public television, SRF.

The stolen information, including names and phone numbers of police officers, is considered sensitive because it could be used to target police officers. According to the Bern cantonal police, it is not known who stole the data. There’s no evidence thus far that the data has been published online. An investigation has been opened.

Authorities abroad, most recently in Norway, have also fallen victim to the MobileIron security vulnerability.

Switzerland has faced a surge in cyber attacks recently. In June, hackers published data from the Federal Office of Police (Fedpol) and the Federal Office for Customs and Border Security on the Darknet, after exploiting a vulnerability on the servers of the company that hosted it.

Swiss federal railways, Swiss media groups, defence contractor RUAG, the International Committee of the Red Cross (ICRC) and several websites of the federal administration also faced attacks.

61
 
 

A specially coated metal mesh can extract water from fog and remove environmental pollutants at the same time. The technology, developed in Zurich, can collect drinking water from the air even in regions with heavy air pollution.

Researchers from the federal technology institute ETH Zurich presented the findings on Thursday in the scientific journal Nature Sustainability.

So-called fog collectors are nothing new in themselves. They are already used in Peru, Bolivia, Chile, Morocco and Oman, ETH Zurich said in a statement on Thursday.

They work according to a simple principle: fine-meshed nets are hung vertically. When the wind blows through them, small droplets of fog stick to the net. Over time, the droplets grow until they are so heavy that gravity pulls them down. There, the water is collected in a trough. According to the university, up to several hundred litres of water can be obtained in this way in one day with a fog collector that is only a few square metres in size.

“For regions with little rain or spring water, but where fog is a common occurrence, this can be a blessing,” the researchers said.

The problem is that dirt particles in the air are also captured with the water. “In many of the world’s major cities, the air is so polluted that any water harvested from fog isn’t clean enough to be used untreated either for drinking or for cooking,” they said.

Activated with sunlight

Researchers at ETH Zurich therefore developed a method that collects water from fog and simultaneously purifies it.

This uses a close-​mesh lattice of metal wire coated with a mixture of specially selected polymers and titanium dioxide. The polymers ensure that droplets of water collect efficiently on the mesh and then trickle down as quickly as possible into a container before they can be blown off by the wind. The titanium dioxide acts as a chemical catalyst, breaking down the molecules of many of the organic pollutants contained in the droplets to render them harmless.

Once installed, the technology needs little or no maintenance. What’s more, no energy is required apart from a small but regular dose of UV to regenerate the catalyst. Half an hour of sunlight is enough to reactivate the titanium oxide for a further 24 hours – thanks to a property known as photocatalytic memory.

Following reactivation with UV, the catalyst also remains active for a lengthy period in the dark. With periods of sunlight often rare in areas prone to fog, this is a very useful quality, the researchers wrote.

62
 
 

Researchers seem to have solved the puzzle of LK-99. Scientific detective work has unearthed evidence that the material is not a superconductor, and clarified its actual properties.

The conclusion dashes hopes that LK-99 — a compound of copper, lead, phosphorus and oxygen — marked the discovery of the first superconductor that works at room temperature and ambient pressure. Instead, studies have shown that impurities in the material — in particular, copper sulfide — were responsible for the sharp drops in electrical resistivity and partial levitation over a magnet, which looked similar to properties exhibited by superconductors.

“I think things are pretty decisively settled at this point,” says Inna Vishik, a condensed-matter experimentalist at the University of California, Davis.

The LK-99 saga began in late July, when a team led by Sukbae Lee and Ji-Hoon Kim at the Quantum Energy Research Centre, a start-up firm in Seoul, published preprints1,2 claiming that LK-99 is a superconductor at normal pressure and temperatures up to at least 127 ºC (400 kelvin). All previously confirmed superconductors function only at extreme temperatures and pressures.

The extraordinary claim quickly grabbed the attention of the science-interested public and researchers, some of whom tried to replicate LK-99. Initial attempts did not see signs of room-temperature superconductivity, but were not conclusive. Now, after dozens of replication efforts, many experts are confidently saying that the evidence shows LK-99 is not a room-temperature superconductor. (Lee and Kim’s team did not respond to Nature’s request for comment.) Accumulating evidence

The South Korean team based its claim on two of LK-99’s properties: levitation above a magnet and abrupt drops in resistivity. But separate teams in Beijing, at Peking University3 and the Chinese Academy of Sciences4 (CAS), found mundane explanations for these phenomena.

Another study5, by US and European researchers, combined experimental and theoretical evidence to demonstrate how LK-99’s structure made superconductivity infeasible. And other experimenters synthesized and studied pure samples6 of LK-99, erasing doubts about the material’s structure and confirming that it is not a superconductor, but an insulator.

The only further confirmation would come from the Korean team sharing their samples, says Michael Fuhrer, a physicist at Monash University in Melbourne, Australia. “The burden’s on them to convince everybody else,” he says.

Perhaps the most striking evidence for LK-99’s superconductivity was a video taken by the Korean team that showed a coin-shaped sample of silvery material wobbling over a magnet. The team said the sample was levitating because of the Meissner effect — a hallmark of superconductivity in which a material expels magnetic fields. Multiple unverified videos of LK-99 levitating subsequently circulated on social media, but none of the researchers who initially tried to replicate the findings observed any levitation.

Half-baked levitation

Several red flags popped out to Derrick van Gennep, a former condensed-matter researcher at Harvard University in Cambridge, Massachusetts, who now works in finance but was intrigued by LK-99. In the video, the same edge of the sample seemed to stick to the magnet, and it seemed delicately balanced. By contrast, superconductors that levitate over magnets can be spun and even held upside-down. “None of those behaviors look like what we see in the LK-99 videos,” van Gennep says.

He thought LK-99’s properties were more likely the result of ferromagnetism. So he constructed a pellet of compressed graphite shavings with iron filings glued to it. A video made by Van Gennep shows that his disc — made of non-superconducting, ferromagnetic materials — mimicked LK-99’s behaviour.

On 7 August, the Peking University team reported that this “half-levitation” appeared in their LK-99 samples because of ferromagnetism. “It’s exactly like an iron-filing experiment,” says Yuan Li, a condensed-matter physicist and study co-author. The pellet experiences a lifting force but it’s not enough to levitate — only enough to balance on one end.

Li and his colleagues measured their sample’s resistivity, and found no sign of superconductivity. But they couldn’t explain the sharp resistivity drop seen by the Korean team. Impure samples

In their preprint, the Korean authors note one particular temperature at which LK-99 showed a tenfold drop in resistivity, from about 0.02 ohm-centimetres to 0.002 ohm-cm. “They were very precise about it. 104.8ºC,” says Prashant Jain, a chemist at the University of Illinois Urbana–Champaign. “I was like, wait a minute, I know this temperature.”

The reaction that synthesizes LK-99 uses an unbalanced recipe: for every 1 part it makes of copper-doped lead phosphate crystal — pure LK-99 — it produces 17 parts copper and 5 parts sulfur. These leftovers lead to numerous impurities — especially copper sulfide, which the Korean team reported in its sample.

Jain, a copper-sulfide expert, remembered 104ºC as the temperature at which Cu2S undergoes a phase transition. Below that temperature, the resistivity of air-exposed Cu2S drops dramatically — a signal almost identical to LK-99’s purported superconducting phase transition. “I was almost in disbelief that they missed it.” Jain published a preprint7 on the important confounding effect.

On 8 August, the CAS team reported on the effects of Cu2S impurities in LK-99. “Different contents of Cu2S can be synthesized using different processes,” says Jianlin Luo, a CAS physicist. The researchers tested two samples — the first heated in a vacuum, which resulted in 5% Cu2S content, and the second in air, which gave 70% Cu2S content.

The first sample’s resistivity increased relatively smoothly as it cooled, and appeared similar to samples from other replication attempts. But the second sample’s resistivity plunged near 112 ºC (385K) — closely matching the Korean team’s observations.

“That was the moment where I said, ‘Well, obviously, that’s what made them think this was a superconductor,’” says Fuhrer. “The nail in the coffin was this copper sulfide thing.”

Making conclusive statements about LK-99’s properties is difficult, because the material is finicky and samples contain varying impurities. “Even from our own growth, different batches will be slightly different,” says Li. But Li argues that samples that are close enough to the original are sufficient for checking whether LK-99 is a superconductor in ambient conditions.

63
64
 
 

Sam Bankman-Fried is heading to jail after a U.S judge on Friday revoked his bail, finding probable cause that the indicted founder of the bankrupt FTX cryptocurrency exchange tampered with witnesses at least twice.

U.S. District Judge Lewis Kaplan's decision to jail the 31-year-old former billionaire ahead of his Oct. 2 fraud trial over FTX's November 2022 collapse came after prosecutors said he had "crossed a line" by sharing private writings by former romantic partner Caroline Ellison with a New York Times reporter.

"He has already - without violating any other bail condition save that he not commit another crime - gone up to the line over and over again," Kaplan, who is known for his no-nonsense demeanor in the courtroom, said in a hearing in Manhattan federal court.

The judge rejected a defense request to delay Bankman-Fried's detention pending appeal of the decision.

The decision could complicate Bankman-Fried's efforts to prepare for trial. He faces charges of having stolen billions of dollars in FTX customer funds to plug losses at his Alameda Research hedge fund, where Ellison was chief executive officer.

She has pleaded guilty and is expected to testify against him at his Oct. 2 trial.

Bankman-Fried, who has pleaded not guilty, sat with his shoulders hunched, leaning forward on the table and fidgeting with a Post-It note as the judge order him detained.

He had a blank expression as he was led out of the courtroom in handcuffs by members of the U.S. Marshals Service after removing his shoelaces, watch, jacket and tie and emptying his pockets.

Bankman-Fried's parents, both law professors at Stanford University, were present in the courtroom's audience. His mother, Barbara Fried, nodded to him in tears as he left. His father, Joseph Bankman, placed his hand over his heart as he watched his son be led away.

Bankman-Fried rode a boom in the value of bitcoin and other digital assets to build a net worth of an estimated $26 billion and become an influential political donor in the United States, but FTX's collapse wiped out his fortune. He later said he had $100,000 in his bank account.

65
 
 

The Knight ransomware is being distributed in an ongoing spam campaign that pretends to be TripAdvisor complaints.

Knight ransomware is a recent rebrand of the Cyclop Ransomware-as-a-Service, which switched its name at the end of July 2023.

Who is Cyclops and Knight ransomware? The Cyclops ransomware operation launched in May 2023 when the operators began recruiting affiliates for the new ransomware-as-a-service (RaaS) on the RAMP hacking forum.

A report by Uptycs explains that the operation launched with encryptors for Windows, macOS, and Linux/ESXi. The operation also offers affiliates information-stealing malware for Windows and Linux, which is not normally seen in RaaS operations.

In addition to their normal encryptors, the operation offers a 'lite' version for use in spam and pray-and-spray mass distribution campaigns targeting large numbers of targeted users. This version appears to utilize a fixed ransom amount rather than negotiating with victims.

At the end of July, Cyclops rebranded as Knight, also stating they updated the lite encryptor to support 'batch distribution' and launched a new data leak site.

"We've updated our new panel and officially changed our name to Knight.We are looking for partners (of any kind) that!!!," reads an announcement on the old Cyclops and new Knight data leak sites.

"We have also updated the lite version to support batch distribution."

There are currently no victims or stolen files leaked on the Knight data leak site.

66
 
 

Google has started deploying a hybrid key encapsulation mechanism (KEM) to protect the sharing of symmetric encryption secrets during the establishment of secure TLS network connections.

Devon O'Brien, technical program manager for Chrome security, explained on Thursday that starting in Chrome 116 – due August 15 – Google's browser will include support for X25519Kyber768, an alphanumeric salad that desperately needs a catchy name.

The unwieldy term is a concatenation of X25519, an elliptic curve algorithm that's currently used in the key agreement process for establishing a secure TLS connection, and Kyber-768, a quantum-resistant KEM that last year won NIST's blessing for post-quantum cryptography.

A KEM is a way to establish a shared secret value between two people so they can communicate confidentiality using symmetric key encryption. It's a precursor ritual to secure information exchange over a network. Unless you're a cryptographer or just love math, you're probably fine not knowing the technical details.

Google is deploying a hybrid version of these two algorithms in Chrome so the web goliath, users of its technology, and other network providers like Cloudflare, can test quantum-resistant algorithms while maintaining current protections.

The Chocolate Factory is doing so because some day, many very bright people believe, quantum computers will be able to break at least some legacy encryption schemes. That belief is what motivated US technical agency NIST in 2016 to call for future-proof encryption algorithms.

67
 
 

Serve Robotics, the autonomous sidewalk delivery robot startup that spun out of Uber’s acquisition of Postmates, is going public via a reverse merger with a blank-check company.

The reverse merger with Patricia Acquisition Corp was completed this month, according to regulatory filings. Ahead of the merger, Serve raised $30 million in a round led by existing investors Uber, Nvidia and Wavemaker Partners. New investors Mark Tompkins and Republic Deal Room also participated. The startup-soon-to-be-public-company has raised a total of $56 million.

Upon the closing of the merger, Uber held a 16.2% stake and Nvidia an 11% stake in Serve, according to regulatory filings. Sarfraz Maredia, Uber’s vice president of delivery and head of its Americas region, has joined Serve’s board.

Serve Robotics started its life as Postmates X, the robotics division of on-demand delivery company Postmates. The autonomous sidewalk robots started delivering to Postmates customers in multiple Los Angeles neighborhoods in 2018. It started a commercial service in 2020.

Uber acquired Postmates in late 2020 for $2.65 billion. Three months later, Postmates X spun out as an independent company called Serve Robotics. The new name was taken from the autonomous sidewalk delivery bot that was developed and piloted by Postmates.

Ali Kashani, who led Postmates X, is co-founder and CEO of Serve Robotics.

Kashani told TechCrunch that he was never in a rush to take the autonomous delivery robot company public. However, he said he sees going public the faster and more efficient way to capitalize.

68
 
 

In a groundbreaking move, CIQ, Oracle, and SUSE have come together to announce the formation of the Open Enterprise Linux Association (OpenELA). The goal of this new collaborative trade association is to foster "the development of distributions compatible with Red Hat Enterprise Linux (RHEL) by providing open and free enterprise Linux source code."

The inception of OpenELA is a direct response to Red Hat's recent alterations to RHEL source code availability. This new Delaware 501(c)(6) US nonprofit association will provide an open process for organizations to access source code. This will enable it to build RHEL-compatible distributions. The initiative underscores the importance of community-driven source code, which serves as a foundation for creating compatible distributions.

Also: Why don't more people use desktop Linux? I have a theory you might not like

Mike McGrath, Red Hat's vice president of Red Hat Core Platforms, sparked this when he announced Red Hat would be changing how users can access RHEL's source code. For the non-Hatters among you, Core Platforms is the division in charge of RHEL. McGrath wrote, "CentOS Stream will now be the sole repository for public RHEL-related source code releases. For Red Hat customers and partners, source code will remain available via the Red Hat Customer Portal."

This made it much more difficult for RHEL clone vendors, such as AlmaLinux, Rocky Linux, and Oracle Linux, to create perfect RHEL variant distributions. AlmaLinux elected to try to work with Red Hat's new source code rules. Oracle restarted its old fighting ways with IBM/Red Hat; SUSE announced an RHEL-compatible distro fork plan; and Rocky Linux found new ways to obtain RHEL code. Now the last two, along with CIQ, which started Rocky Linux, have joined forces.

Thomas Di Giacomo, SUSE's Chief Technology and Product Officer, emphasized the significance of collaboration in driving innovation. He stated, "Collaboration is critical to fostering innovation, which is why we welcome everyone to be part of this association and help us uphold open community standards." Gregory Kurtzer, CIQ's CEO, echoed this sentiment, marking the announcement as the beginning of a new era for Enterprise Linux.

69
 
 

..today we are announcing that HashiCorp is changing its source code license from Mozilla Public License v2.0 (MPL 2.0) to the Business Source License (BSL, also known as BUSL) v1.1 on all future releases of HashiCorp products. HashiCorp APIs, SDKs, and almost all other libraries will remain MPL 2.0.

BSL 1.1 is a source-available license that allows copying, modification, redistribution, non-commercial use, and commercial use under specific conditions. With this change we are following a path similar to other companies in recent years. These companies include Couchbase, Cockroach Labs, Sentry, and MariaDB, which developed this license in 2013. Companies including Confluent, MongoDB, Elastic, Redis Labs, and others have also adopted alternative licenses that include restrictions on commercial usage. In all these cases, the license enables the commercial sponsor to have more control around commercialization.

...

Vendors who provide competitive services built on our community products will no longer be able to incorporate future releases, bug fixes, or security patches contributed to our products.

Our commitment to our community, partners, and customers has not changed. We understand the trust the community places in us and we’ve worked carefully to preserve our original goals in adopting an open approach. We look forward to continuing to invest in the community and our products.

70
 
 

Microsoft's Visual Studio Code (VS Code) code editor and development environment contains a flaw that allows malicious extensions to retrieve authentication tokens stored in Windows, Linux, and macOS credential managers.

These tokens are used for integrating with various third-party services and APIs, such as Git, GitHub, and other coding platforms, so stealing them could have significant consequences for a compromised organization's data security, potentially leading to unauthorized system access, data breaches, etc.

The flaw was discovered by Cycode researchers, who reported it to Microsoft along with a working proof-of-concept (PoC) they developed. Yet, the tech giant decided against fixing the issue, as extensions are not expected to be sandboxed from the rest of the environment.

71
 
 

Mullvad VPN: We tasked the Netherlands based security firm Radically Open Security (RoS) with performing the third audit towards our VPN infrastructure.

We asked them to focus solely on VPN servers that run from RAM, one OpenVPN and one WireGuard server.

We invite you to read the final report of our third security audit, concluded in mid-June 2023, with many fixes deployed late June 2023. Further re-tests and a verification pass was performed during July.

RoS discovered a number of new findings, and we would like to thank them for their thorough and detailed report. They stated , amongst other things that: that whilst they found some issues, that: “The Mullvad VPN relays which were the subject of this test showed a mature architecture…” and “During the test we found no logging of user activity data..”

We gave RoS full SSH access to two (2) VPN servers that were running from RAM, using our latest slimmed down Linux kernel (6.3.2) and customised Ubuntu 22.04 LTS based OS. These servers were deployed as though they were to be production customer-facing servers, however these servers have never been utilised as such.

72
 
 

YouTube is running a new test to auto-generate video summaries with the use of AI. As noted on the support page, the summaries have begun appearing on the watch and search pages, but are only available for a limited number of English-language videos and viewers.

The video platform explains that the AI auto-generated summaries provide a quick overview of a video, letting the user decide if it’s the right one for them. However, YouTube also notes, “While we hope these summaries are helpful and give you a quick overview of what a video is about, they do not replace video descriptions (which are written by creators!).”

No screenshots of the experiment were shared, so we’re not sure how viewers will differentiate a user-created video summary from one that was written by AI.

AI-powered YouTube video summarizer tools already exist, including Clipnote.ai, Skipit.ai and Scrivvy, among others. However, some YouTube creators say these tools fail to summarize longer videos.

“On my longer videos, it was complete nonsense,” wrote one Reddit user about Clipnote.ai. “It mostly just copied the first lines of what I had in my description. It basically served zero purpose. I was just curious to see if it could write a better description than I did, but it sadly performed horribly.”

Overall, it’s too early to tell how the AI summaries will affect YouTube creators and if it’ll actually help write their video summaries. But we’re curious to see how well the newest experiment performs and if it gets a wider rollout.

The AI auto-generated video summaries join YouTube’s other AI initiatives, such as AI-generated quizzes for educational videos and an AI-powered dubbing tool. Moreover, parent company Google recently announced more AI tools, like an AI-assisted note-taking app and AI-generated backgrounds for Google Meet calls.

73
 
 

As a follow-up to the first-on-Phoronix article last month that highlighted Linus Torvalds' frustrated views on the AMD fTPM random number generator continuing to cause problems for users even with updated firmware/BIOS, as of today the Linux kernel has gone ahead and blanket disabled RNG use for all current AMD fTPMs.

AMD Linux engineer Mario Limonciello authored the patch that was merged today to disable the RNG for all AMD fTPMs. Mario summed up in that commit:

tpm: Disable RNG for all AMD fTPMs

The TPM RNG functionality is not necessary for entropy when the CPU already supports the RDRAND instruction. The TPM RNG functionality was previously disabled on a subset of AMD fTPM series, but reports continue to show problems on some systems causing stutter root caused to TPM RNG functionality.

Expand disabling TPM RNG use for all AMD fTPMs whether they have versions that claim to have fixed or not.

This patch was merged to mainline today for the Linux 6.5 kernel while the patch is also marked for back-porting to the Linux 6.1 and newer stable kernels where this AMD fTPM RNG use is present. Thus over the next few days this change in behavior for modern AMD Ryzen systems will be rolling out in the next set of stable kernel point releases.

74
 
 

PayPal on Monday launched a stablecoin digital currency backed by US dollars to be used for transactions at its global online payments platform.

PayPal USD is issued by Paxos Trust Company and backed by dollar deposits and similar cash holdings, the online payments giant said in a release.

It comes as the cryptocurrency industry is suffering hard times after the spectacular collapse of FTX and various legal cases against the sector's biggest players.

As the biggest cryptocurrencies are famously volatile, entrepreneurs invented a theoretically more reliable alternative known as stablecoins.

These coins are pegged to the US dollar or other fiat currencies, but still come with concerns their value can tank.

"The shift toward digital currencies requires a stable instrument that is both digitally native and easily connected to fiat currency like the US dollar," said PayPal chief executive Dan Schulman.

PayPal USD is designed to make payments on across the global platform easier and open a door to more big brands getting involved with digital assets, according to the Silicon Valley-based company.

PayPal planned to soon make the stablecoin available at Venmo, its peer-to-peer payment service.

PayPal's decision to accept bitcoin in late 2020 helped kick off a precipitous rise in the value of crypto assets, driven partly by a sense that the digital tokens could potentially function like currencies one day.

However, scandals have rocked the cryptocurrency market and made regulators wary.

Financial regulators in the United States have argued that cryptocurrencies are securities and should face strict rules.

The debut of PayPal USD came two weeks after OpenAI chief executive Sam Altman and other co-founders unveiled a Worldcoin crypto project that relies on an eye scan to verify a user's identity.

Worldcoin said it will provide users with a private digital identity—a "World ID"—after they register in person using an "Orb" imaging device that scans their eye's unique iris pattern.

This was to help solve one of the main challenges facing the crypto industry that largely relies on pseudonyms to operate, leaving it vulnerable to spam bots and scams.

The company also launched its Worldcoin token, a cryptocurrency now tradable in certain locations and platforms, to millions of users who participated in early tests, the statement said.

In a sign of increased caution by regulators in treating crypto, Worldcoin wasn't available to trade in the US, where enthusiasm for the sector is significant, because of restrictions.

75
 
 

US government scientists have achieved net energy gain in a fusion reaction for the second time, a result that is set to fuel optimism that progress is being made toward the dream of limitless, zero-carbon power.

Physicists have since the 1950s sought to harness the fusion reaction that powers the Sun, but until December no group had been able to produce more energy from the reaction than it consumes—a condition also known as ignition.

Researchers at the federal Lawrence Livermore National Laboratory in California, who achieved ignition for the first time last year, repeated the breakthrough in an experiment on July 30 that produced a higher energy output than in December, according to three people with knowledge of the preliminary results.

The laboratory confirmed that energy gain had been achieved again at its laser facility, adding that analysis of the results was underway.

“Since demonstrating fusion ignition for the first time at the National Ignition Facility in December 2022, we have continued to perform experiments to study this exciting new scientific regime. In an experiment conducted on July 30, we repeated ignition at NIF,” it said. “As is our standard practice, we plan on reporting those results at upcoming scientific conferences and in peer-reviewed publications.”

Fusion is achieved by heating two hydrogen isotopes—usually deuterium and tritium—to such extreme temperatures that the atomic nuclei fuse, releasing helium and vast amounts of energy in the form of neutrons.

Although many scientists believe fusion power stations are still decades away, the technology’s potential is hard to ignore. Fusion reactions emit no carbon, produce no long-lived radioactive waste, and a small cup of hydrogen fuel could theoretically power a house for hundreds of years.

The most widely studied approach, known as magnetic confinement, uses huge magnets to hold the fuel in place while it is heated to temperatures hotter than the Sun.

The NIF uses a different process, called inertial confinement, in which it fires the world’s largest laser at a tiny capsule of the fuel triggering an implosion.

view more: ‹ prev next ›