AI

Companies Deploy AI To Curb Hiring as 'Cost Avoidance' Gains Ground (msn.com) 114

U.S. companies are increasingly using AI to curb hiring plans, citing "cost avoidance" as a key metric to justify AI investments amid pressure to show returns. At software firm TS Imagine, AI-powered email sorting saves 4,000 work hours annually at 3% of employee costs, while Palantir reported AI reduced future headcount needs by 10-15%, according to company executives.

The trend is most pronounced in software development and customer service sectors, where companies are deferring or scaling back hiring plans, said Gartner analyst Arun Chandrasekaran. This shift comes as long-term unemployment in the U.S. has risen more than 50% since late 2022, though tech sector unemployment dropped to 2% in December.
GNU is Not Unix

Why the FSF is Structured the Way It Is (fsf.org) 69

Richard Stallman founded the Free Software Foundation as a nonprofit in 1985 with four other directors (including MIT computer science professor Gerald Jay Sussman). Sussman remains on the Board of directors, along with EFF co-founder John Gilmore and five others.

Friday the eight directors published a new article explaining how their goal and principles are protected by the nonprofit's governance structure: An obvious option, used by many organizations, was to let supporters sign up as members and have the members' votes control everything about the organization. We rejected that approach because it would have made the organization vulnerable to being taken over by people who disagreed with its mission... [A]ctivist organizations should be steady in their mission. Already in 1985, we could see that many of the people who appreciated the GNU Project's work (developing useful GNU software packages) did not support our goal and values. To look at software issues in terms of freedom was radical and many were reluctant to consider it... So we chose a structure whereby the FSF's governing body would appoint new people to itself... [T]he FSF voting members consist of all the present board members and some past board members. We have found that having some former board members remain as voting members helps stabilize the base of FSF governance.

The divergence between our values and those of most users was expressed differently after 1998, when the term "open source" was coined. It referred to a class of programs which were free/libre or pretty close, but it stood for the same old values of convenience and success, not the goal of freedom for the users of those programs. For them, "scratching your own itch" replaced liberating the community around us. People could become supporters of "open source" without any change in their ideas of right and wrong... It would have been almost inevitable for supporters of "open source" to join the FSF, then vote to convert it into an "open source" organization, if its structure allowed such a course. Fortunately, we had made sure it did not. So we were able to continue spreading the idea that software freedom is a freedom that everyone needs and everyone is entitled to, just like freedom of speech.

In recent years, several influential "open source" organizations have come to be dominated by large companies. Large companies are accustomed to seeking indirect political power, and astroturf campaigns are one of their usual methods. It would be easy for companies to pay thousands of people to join the FSF if by doing so they could alter its goals and values. Once again, our defensive structure has protected us...

A recent source of disagreement with the free software movement's philosophy comes from those who would like to make software licenses forbid the use of programs for various practices they consider harmful. Such license restrictions would not achieve the goal of ending those practices and each restriction would split the free software community. Use restrictions are inimical to the free software community; whatever we think of the practices they try to forbid, we must oppose making software licenses restrict them. Software developers should not have the power to control what jobs people do with their computers by attaching license restrictions. And when some acts that can be done by using computing call for systematic prohibition, we must not allow companies that offer software or online services to decide which ones. Such restrictions, when they are necessary, must be laws, adopted democratically by legislatures...

What new political disagreements will exist in the free software community ten, twenty or thirty years from now? People may try to disconnect the FSF from its values for reasons we have not anticipated, but we can be confident that our structure will give us a base for standing firm. We recently asked our associate members to help us evaluate the current members of the FSF board of directors through a process that will help us preserve the basic structure that protects the FSF from pressure to change its values. A year ago we used this process to select new board members, and it worked very well.

Sincerely,

The Free Software Foundation Board of Directors

Youtube

CES 'Worst In Show' Devices Mocked In IFixit Video - While YouTube Inserts Ads For Them (worstinshowces.com) 55

While CES wraps up this week, "Not all innovation is good innovation," warns Elizabeth Chamberlain, iFixit's Director of Sustainability (heading their Right to Repair advocacy team). So this year the group held its fourth annual "anti-awards ceremony" to call out CES's "least repairable, least private, and least sustainable products..." (iFixit co-founder Kyle Wiens mocked a $2,200 "smart ring" with a battery that only lasts for 500 charges. "Wanna open it up and change the battery? Well you can't! Trying to open it will completely destroy this device...") There's also a category for the worst in security — plus a special award titled "Who asked for this?" — and then a final inglorious prize declaring "the Overall Worst in Show..."

Thursday their "panel of dystopia experts" livestreamed to iFixit's feed of over 1 million subscribers on YouTube, with the video's description warning about manufacturers "hoping to convince us that they have invented the future. But will their vision make our lives better, or lead humanity down a dark and twisted path?" The video "is a fun and rollicking romp that tries to forestall a future clogged with power-hungry AI and data-collecting sensors," writes The New Stack — though noting one final irony.

"While the ceremony criticized these products, YouTube was displaying ads for them..."

UPDATE: Slashdot reached out to iFixit co-founder Kyle Wiens, who says this teaches us all a lesson. "The gadget industry is insidious and has their tentacles everywhere."

"Of course they injected ads into our video. The beast can't stop feeding, and will keep growing until we knife it in the heart."

Long-time Slashdot reader destinyland summarizes the article: "We're seeing more and more of these things that have basically surveillance technology built into them," iFixit's Chamberlain told The Associated Press... Proving this point was EFF executive director Cindy Cohn, who gave a truly impassioned takedown for "smart" infant products that "end up traumatizing new parents with false reports that their baby has stopped breathing." But worst for privacy was the $1,200 "Revol" baby bassinet — equipped with a camera, a microphone, and a radar sensor. The video also mocks Samsung's "AI Home" initiative which let you answer phone calls with your washing machine, oven, or refrigerator. (And LG's overpowered "smart" refrigerator won the "Overall Worst in Show" award.)

One of the scariest presentations came from Paul Roberts, founder of SecuRepairs, a group advocating both cybersecurity and the right to repair. Roberts notes that about 65% of the routers sold in the U.S. are from a Chinese company named TP-Link — both wifi routers and the wifi/ethernet routers sold for homes and small offices.Roberts reminded viewers that in October, Microsoft reported "thousands" of compromised routers — most of them manufactured by TP-Link — were found working together in a malicious network trying to crack passwords and penetrate "think tanks, government organizations, non-governmental organizations, law firms, defense industrial base, and others" in North America and in Europe. The U.S. Justice Department soon launched an investigation (as did the U.S. Commerce Department) into TP-Link's ties to China's government and military, according to a SecuRepairs blog post.

The reason? "As a China-based company, TP-Link is required by law to disclose flaws it discovers in its software to China's Ministry of Industry and Information Technology before making them public." Inevitably, this creates a window "to exploit the publicly undisclosed flaw... That fact, and the coincidence of TP-Link devices playing a role in state-sponsored hacking campaigns, raises the prospects of the U.S. government declaring a ban on the sale of TP-Link technology at some point in the next year."

TP-Link won the award for the worst in security.

Privacy

Database Tables of Student, Teacher Info Stolen From PowerSchool In Cyberattack (theregister.com) 18

An anonymous reader quotes a report from The Register: A leading education software maker has admitted its IT environment was compromised in a cyberattack, with students and teachers' personal data -- including some Social Security Numbers and medical info -- stolen. PowerSchool says its cloud-based student information system is used by 18,000 customers around the globe, including the US and Canada, to handle grading, attendance records, and personal information of more than 60 million K-12 students and teachers. On December 28 someone managed to get into its systems and access their contents "using a compromised credential," the California-based biz told its clients in an email seen by Register this week.

[...] "We believe the unauthorized actor extracted two tables within the student information system database," a spokesperson told us. "These tables primarily include contact information with data elements such as name and address information for families and educators. "For a certain subset of the customers, these tables may also include Social Security Number, other personally identifiable information, and limited medical and grade information. "Not all PowerSchool student information system customers were impacted, and we anticipate that only a subset of impacted customers will have notification obligations."
While the company has tightened security measures and offered identity protection services to affected individuals, cybersecurity firm Cyble suggests the intrusion "may have been more serious and gone on much longer than has been publicly acknowledged so far," reports The Register. The cybersecurity vendor says the intrusion could have occurred as far back as June 16, 2011, with it ending on January 2 of this year.

"Critical systems and applications such as Oracle Netsuite ERP, HR software UltiPro, Zoom, Slack, Jira, GitLab, and sensitive credentials for platforms like Microsoft login, LogMeIn, Windows AD Azure, and BeyondTrust" may have been compromised, too.
Security

Hackers Are Exploiting a New Ivanti VPN Security Bug To Hack Into Company Networks (techcrunch.com) 14

U.S. software giant Ivanti has warned that a zero-day vulnerability in its widely-used enterprise VPN appliance has been exploited to compromise the networks of its corporate customers. From a report: Ivanti said on Wednesday that the critical-rated vulnerability, tracked as CVE-2025-0282, can be exploited without any authentication to remotely plant malicious code on Ivanti's Connect Secure, Policy Secure, and ZTA Gateways products. Ivanti says its Connect Secure remote-access VPN solution is "the most widely adopted SSL VPN by organizations of every size, across every major industry."

This is the latest exploited security vulnerability to target Ivanti's products in recent years. Last year, the technology maker pledged to overhaul its security processes after hackers targeted vulnerabilities in several of its products to launch mass-hacks against its customers. The company said it became aware of the latest vulnerability after its Ivanti Integrity Checker Tool (ICT) flagged malicious activity on some customer appliances.

Open Source

VLC Tops 6 Billion Downloads, Previews AI-Generated Subtitles (techcrunch.com) 68

VLC media player, the popular open-source software developed by nonprofit VideoLAN, has topped 6 billion downloads worldwide and teased an AI-powered subtitle system. From a report: The new feature automatically generates real-time subtitles -- which can then also be translated in many languages -- for any video using open-source AI models that run locally on users' devices, eliminating the need for internet connectivity or cloud services, VideoLAN demoed at CES.
Government

White House Launches 'Cyber Trust' Safety Label For Smart Devices 32

BleepingComputer's Sergiu Gatlan reports: "Today, the White House announced the launch of the U.S. Cyber Trust Mark, a new cybersecurity safety label for internet-connected consumer devices. The Cyber Trust Mark label, which will appear on smart products sold in the United States later this year, will help American consumers determine whether the devices they want to buy are safe to install in their homes. It's designed for consumer smart devices, such as home security cameras, TVs, internet-connected appliances, fitness trackers, climate control systems, and baby monitors, and it signals that the internet-connected device comes with a set of security features approved by NIST.

Vendors will label their products with the Cyber Trust Mark logo if they meet the National Institute of Standards and Technology (NIST) cybersecurity criteria. These criteria include using unique and strong default passwords, software updates, data protection, and incident detection capabilities. Consumers can scan the QR code included next to the Cyber Trust Mark labels for additional security information, such as instructions on changing the default password, steps for securely configuring the device, details on automatic updates (including how to access them if they are not automatic), the product's minimum support period, and a notification if the manufacturer does not offer updates for the device.
"Americans are worried about the rise of criminals remotely hacking into home security systems to unlock doors, or malicious attackers tapping into insecure home cameras to illicitly record conversations," the Biden administration said on Tuesday.

"The White House launched this bipartisan effort to educate American consumers and give them an easy way to assess the cybersecurity of such products, as well as incentivize companies to produce more cybersecure devise [sic], much as EnergyStar labels did for energy efficiency.
Government

Big Landlord Settles With US, Will Cooperate In Price-Fixing Investigation (arstechnica.com) 76

An anonymous reader quotes a report from Ars Technica: The US Justice Department today announced it filed an antitrust lawsuit against "six of the nation's largest landlords for participating in algorithmic pricing schemes that harmed renters." One of the landlords, Cortland Management, agreed to a settlement "that requires it to cooperate with the government, stop using its competitors' sensitive data to set rents and stop using the same algorithm as its competitors without a corporate monitor," the DOJ said. The pending settlement requires Cortland to "cooperate fully and truthfully... in any civil investigation or civil litigation the United States brings or has brought" on this subject matter.

The US previously sued RealPage, a software maker accused of helping landlords collectively set prices by giving them access to competitors' nonpublic pricing and occupancy information. The original version of the lawsuit described actions by landlords but did not name any as defendants. The Justice Department filed an amended complaint (PDF) today in order to add the landlords as defendants. The landlord defendants are Greystar, LivCor, Camden, Cushman, Willow Bridge, and Cortland, which collectively "operate more than 1.3 million units in 43 states and the District of Columbia," the DOJ said. "The amended complaint alleges that the six landlords actively participated in a scheme to set their rents using each other's competitively sensitive information through common pricing algorithms," the DOJ said.
The phrase "price fixing" came up in discussions between landlords, the amended complaint said: "For example, in Minnesota, property managers from Cushman & Wakefield, Greystar, and other landlords regularly discussed competitively sensitive topics, including their future pricing. When a property manager from Greystar remarked that another property manager had declined to fully participate due to 'price fixing laws,' the Cushman & Wakefield property manager replied to Greystar, 'Hmm... Price fixing laws huh? That's a new one! Well, I'm happy to keep sharing so ask away. Hoping we can kick these concessions soon or at least only have you guys be the only ones with big concessions! It's so frustrating to have to offer so much.'"

The Justice Department is joined in the case by the attorneys general of California, Colorado, Connecticut, Illinois, Massachusetts, Minnesota, North Carolina, Oregon, Tennessee, and Washington. The case is in US District Court for the Middle District of North Carolina.

Further reading: Are We Entering an AI Price-Fixing Dystopia?
Transportation

John Deere Thinks Driverless Tractors Are the Answer To Labor Shortages (qz.com) 120

An anonymous reader quotes a report from Quartz: John Deere is going all in on autonomous tractors. The company, which first introduced a driverless vehicle in 2022, said self-driving machines will revolutionize the field and address labor shortages. It will soon be selling self-driving dump trucks, more driverless tractors, and a robot lawn mower. "When we talk about autonomy, we mean full autonomy," Jahmy Hindman, chief technology officer at John Deere, said at CES on Monday, according to The Verge. "No one's in the machine."

Hindman said the company wants "more of our machines to safely run autonomously in these unique and complex environments that our customers work in every day." John Deere says many farmers in the states currently utilize the first model of its driverless tractor, The Verge reported. "Those tractors are already being used by farmers to prepare the soil for planting in the next year," Hindman said. By 2030, the company is hoping to sell a fully self-driving corn and soybean farming system.

Between now and then, John Deere says its articulated dump truck will hit the market. That vehicle can carry more than 92,000 pounds at a time, The Verge reported, and the company says it will improve safety and productivity in sites like quarries. "It's unsupervised, it's capable of making decisions and operating safely on its own," Maya Sripadam, senior product manager of John Deere's subsidiary Blue River Technology, said. John Deere also plans to release driverless tractors that can spray nut orchards with pesticides, growth regulators, and nutrients for the trees. It thinks those vehicles will have a particular benefit to the California nut farming industry, which has faced labor shortages. [...] John Deere hasn't said how much the vehicles will cost.
Further reading: Software Fees To Make Up 10% of John Deere's Revenues By 2030
Intel

Intel Says New Laptop Chips Will Extend Computer Battery Life (yahoo.com) 29

Intel, which has been fending off mounting competition in notebook processors, says a new range of chips will help enable the longest battery life available in laptops. From a report: New computers based on the latest version of its Core Ultra processors will go on sale starting this month, the company said Monday at CES, an annual consumer electronics show.

Intel was for decades the world's largest chipmaker thanks to its dominance of the computer processor market. Production technology stumbles and slow product introductions have opened the door to both long-time rivals and firms just entering the space. The company's board last month ousted its chief executive officer, citing the need to improve its offerings.

The new chips, intended for corporate PCs and high-end consumer devices, are aimed at boosting performance in two areas the company considers key selling points: battery life and the ability to run artificial intelligence functions. According to Intel, an HP laptop that uses one of the new processors can run Microsoft's Teams software for as long as 10.5 hours on a single charge. It can go 20.3 hours between charges when the user is running Microsoft's cloud-based 365 suite, Intel added. By comparison, Intel says a Dell device using a Qualcomm Snapdragon processor can last as long as 9.2 hours and 18.5 hours, respectively, under those conditions.

Businesses

Unemployed Office Workers Are Having a Harder Time Finding New Jobs (msn.com) 232

More than 1.6 million Americans have been jobless for at least six months, up 50% since late 2022, despite the economy adding over two million jobs last year, Labor Department data shows.

The average job search now takes six months, primarily affecting high-paying sectors like tech, law, and media. While the 4.2% unemployment rate remains below pre-pandemic averages, job postings have dropped to one per unemployed worker from two in early 2022.

Software development, data science, and marketing roles are 20% below pre-pandemic levels, while healthcare and government sectors account for half of recent job creation. The number of Americans receiving unemployment benefits reached 1.8 million in late December, approaching post-pandemic highs, as wage growth declined to 4% from 6% during the early 2020s hiring peak.
Open Source

New York Times Recognizes Open-Source Maintainers With 2024 'Good Tech' Award (thestar.com.my) 7

This week New York Times technology columnist Kevin Roose published his annual "Good Tech" awards to "shine the spotlight on a few tech projects that I think contributed positively to humanity."

And high on the list is "Andres Freund, and every open-source software maintainer saving us from doom." The most fun column I wrote this past year was about a Microsoft database engineer, Andres Freund, who got some odd errors while doing routine maintenance on an obscure open-source software package called xz Utils. While investigating, Freund inadvertently discovered a huge security vulnerability in the Linux operating system, which could have allowed a hacker to take control of hundreds of millions of computers and bring the world to its knees.

It turns out that much of our digital infrastructure rests on similar acts of nerdy heroism. After writing about Freund's discovery, I received tips about other near disasters involving open-source software projects, many of which were averted by sharp-eyed volunteers catching bugs and fixing critical code just in time to foil the bad guys. I could not write about them all, but this award is to say: I see you, open-source maintainers, and I thank you for your service.

Roose also acknowledges the NASA engineers who kept Voyager 1 transmitting back to earth from interstellar space — and Bluesky, "for making my social media feeds interesting again."

Roose also notes it was a big year for AI. There's a shout-out to Epoch AI, a small nonprofit research group in Spain, "for giving us reliable data on the AI boom." ("The firm maintains public databases of AI models and AI hardware, and publishes research on AI trends, including an influential report last year about whether AI models can continue to grow at their current pace. Epoch AI concluded they most likely could until 2030.") And there's also a shout-out to groups "pushing AI forward" and positive uses "to improve health care, identify new drugs and treatments for debilitating diseases and accelerate important scientific research."
  • The nonprofit Arc Institute released Evo, an AI model that "can predict and generate genomic sequences, using technology similar to the kind that allows systems like ChatGPT to predict the next words in a sequence."
  • A Harvard University lab led by Dr. Jeffrey Lichtman teamed with researchers from Google for "the most detailed map of a human brain sample ever created. The team used AI to map more than 150 million synapses in a tiny sample of brain tissue at nanometer-level resolution..."
  • Researchers at Stanford and McMaster universities developed SyntheMol, "a generative AI model that can design new antibiotics from scratch."

Transportation

Man Trapped in Circling Waymo on Way to Airport (cbsnews.com) 137

It "felt like a Disneyland ride," reports CBS News. A man took a Waymo takes to the airport — only to discover the car "wouldn't stop driving around a parking lot in circles." And because the car was in motion, he also couldn't get out.

Still stuck in the car, Michael Johns — a tech-industry worker — then phoned Waymo for help. ("Has this been hacked? What's going on? I feel like I'm in the movies. Is somebody playing a joke on me?") But he also filmed the incident... "Why is this thing going in a circle? I'm getting dizzy," Johns said in a video posted on social media that has since gone viral, garnering more than two million views and interactions....

The Waymo representative was finally able to get the car under control after a few minutes, allowing him to get to the airport just in time to catch his flight back to LA. He says that the lack of empathy from the representative who attempted to help him, on top of the point that he's unsure if he was talking to a human or AI, are major concerns. "Where's the empathy? Where's the human connection to this?" Johns said while speaking with CBS News Los Angeles. "It's just, again, a case of today's digital world. A half-baked product and nobody meeting the customer, the consumers, in the middle."

Johns, who ironically works in the tech industry himself, says he would love to see services like Waymo succeed, but he has no plans to hop in for a ride until he's sure that the kinks have been fixed. In the meantime, he's still waiting for someone from Waymo to contact him in regards to his concerns, which hasn't yet happened despite how much attention his video has attracted since last week.

"My Monday was fine till i got into one of Waymo 's 'humanless' cars," he posted on LinkedIn . "I get in, buckle up ( safety first) and the saga begins.... [T]he car just went around in circles, eight circles at that..."

A Waymo spokesperson admitted they'd added about five minutes to his travel time, but then "said the software glitch had since been resolved," reports the Los Angeles Times, "and that Johns was not charged for the ride."

One final irony? According to his LinkedIn profile, Johns is a CES Innovations Awards judge.
Operating Systems

How the OS/2 Flop Went On To Shape Modern Software (theregister.com) 167

"It's fair to say that by 1995, OS/2 was dead software walking," remembers a new article from the Register (which begins with a 1995 Usenet post from Gordon Letwin, Microsoft's lead architect on the OS/2 project).

But the real question is why this Microsoft-IBM collaboration on a DOS-replacing operating system ultimately lost out to Windows...? If OS/2 1.0 had been an 80386 OS, and had been able to multitask DOS apps, we think it would have been a big hit.... OS/2's initial 1980s versions were 16-bit products, at IBM's insistence. That is when the war was lost. That is when OS/2 flopped. Because its initial versions were even more crippled than the Deskpro 386...

Because OS/2 1.x flopped, Microsoft launched a product that fixed the key weakness of OS/2 1.x. That product was Windows 3, which worked perfectly acceptably on 286 machines, but if you ran the same installed copy on a 32-bit 386 PC, it worked better. Windows 3.0 could use the more sophisticated hardware of a 386 to give better multitasking of the market-dominating DOS apps...

IBM's poor planning shaped the PC industry of the 1990s more than Microsoft's successes. Windows 3.0 wasn't great, but it was good enough. It reversed people's perception of Windows after the failures of Windows 1 and Windows 2. Windows 3 achieved what OS/2 had intended to do. It transformed IBM PC compatibles from single-tasking text-only computers into graphical computers, with poor but just about usable multitasking...

Soon after Windows 3.0 turned out to be a hit, OS/2 NT was rebranded as Windows NT. Even the most ardent Linux enthusiast must c\oncede that Windows NT did quite well over three decades.

Back in 1995, the Register's author says they'd moved from OS/2 to Windows 95 "while it was still in beta.

"The UI was far superior, more hardware worked, and Doom ran much better."
China

Are US Computer Networks A 'Key Battlefield' in any Future Conflict with China? (msn.com) 72

In a potential U.S.-China conflict, cyberattackers are military weapons. That's the thrust of a new article from the Wall Street Journal: The message from President Biden's national security adviser was startling. Chinese hackers had gained the ability to shut down dozens of U.S. ports, power grids and other infrastructure targets at will, Jake Sullivan told telecommunications and technology executives at a secret meeting at the White House in the fall of 2023, according to people familiar with it. The attack could threaten lives, and the government needed the companies' help to root out the intruders.

What no one at the briefing knew, including Sullivan: China's hackers were already working their way deep inside U.S. telecom networks, too. The two massive hacking operations have upended the West's understanding of what Beijing wants, while revealing the astonishing skill level and stealth of its keyboard warriors — once seen as the cyber equivalent of noisy, drunken burglars. China's hackers were once thought to be interested chiefly in business secrets and huge sets of private consumer data. But the latest hacks make clear they are now soldiers on the front lines of potential geopolitical conflict between the U.S. and China, in which cyberwarfare tools are expected to be powerful weapons. U.S. computer networks are a "key battlefield in any future conflict" with China, said Brandon Wales, a former top U.S. cybersecurity official at the Department of Homeland Security, who closely tracked China's hacking operations against American infrastructure. He said prepositioning and intelligence collection by the hackers "are designed to ensure they prevail by keeping the U.S. from projecting power, and inducing chaos at home."

As China increasingly threatens Taiwan, working toward what Western intelligence officials see as a target of being ready to invade by 2027, the U.S. could be pulled into the fray as the island's most important backer... Top U.S. officials in both parties have warned that China is the greatest danger to American security.

In the infrastructure attacks, which began at least as early as 2019 and are still taking place, hackers connected to China's military embedded themselves in arenas that spies usually ignored, including a water utility in Hawaii, a port in Houston and an oil-and-gas processing facility. Investigators, both at the Federal Bureau of Investigation and in the private sector, found the hackers lurked, sometimes for years, periodically testing access. At a regional airport, investigators found the hackers had secured access, and then returned every six months to make sure they could still get in. Hackers spent at least nine months in the network of a water-treatment system, moving into an adjacent server to study the operations of the plant. At a utility in Los Angeles, the hackers searched for material about how the utility would respond in the event of an emergency or crisis. The precise location and other details of the infrastructure victims are closely guarded secrets, and couldn't be fully determined.

American security officials said they believe the infrastructure intrusions — carried out by a group dubbed Volt Typhoon — are at least in part aimed at disrupting Pacific military supply lines and otherwise impeding America's ability to respond to a future conflict with China, including over a potential invasion of Taiwan... The focus on Guam and West Coast targets suggested to many senior national-security officials across several Biden administration agencies that the hackers were focused on Taiwan, and doing everything they could to slow a U.S. response in a potential Chinese invasion, buying Beijing precious days to complete a takeover even before U.S. support could arrive.

The telecom breachers "were also able to swipe from Verizon and AT&T a list of individuals the U.S. government was surveilling in recent months under court order, which included suspected Chinese agents. The intruders used known software flaws that had been publicly warned about but hadn't been patched."

And ultimately nine U.S. telecoms were breached, according to America's deputy national security adviser for cybersecurity — including what appears to have been a preventable breach at AT&T (according to "one personal familiar with the matter"): [T]hey took control of a high-level network management account that wasn't protected by multifactor authentication, a basic safeguard. That granted them access to more than 100,000 routers from which they could further their attack — a serious lapse that may have allowed the hackers to copy traffic back to China and delete their own digital tracks.
The details of the various breaches are stunning: Chinese hackers gained a foothold in the digital underpinnings of one of America's largest ports in just 31 seconds. At the Port of Houston, an intruder acting like an engineer from one of the port's software vendors entered a server designed to let employees reset their passwords from home. The hackers managed to download an encrypted set of passwords from all the port's staff before the port recognized the threat and cut off the password server from its network...
Stats

Steam On Linux Ends 2024 With Small Marketshare Boost, AMD Linux CPU Use Near 74% (techspot.com) 26

Phoronix reports on Valve's "Steam Survey" results for December 2024, saying the new numbers "reflect a nice upward trend for the Linux gaming statistics and a high point in recent times." In November the Steam Survey reflected a 2.03% marketshare for Linux... Roughly inline with what we have been seeing for Linux right at around the 2% threshold. With the just-published December survey numbers, there is a 0.29% increase to 2.29%...! When looking at the Linux numbers, SteamOS Holo accounts for around 36% of all Linux gamers... SteamOS Holo being the operating system of the Steam Deck and beginning to appear on other devices as well... Driven in large part by the Steam Deck relying on a custom AMD SoC/APU and AMD being popular with Linux gamers/enthusiasts for their open-source driver support, AMD CPU use on Linux commands a 73.6% marketshare.
In fact, December "saw AMD reach another record-high share among participants of Valve's survey," according to TechSpot — "up 3.02% last month, taking its total to 38.7% as Intel fell slightly to 63.4%..." Elsewhere, Windows 11 is now comfortably the most popular OS in the survey. It pulled ahead another 2% to an almost 55% share in December as Windows 10 dropped to 42.3%... However, it's a different story when looking at global users: Windows 10's share has increased two months in a row to 62.7% while Windows 11 has declined to 34.1%. Rounding up the rest of the survey, 16GB of RAM remains the most popular amount of system RAM but it's lead is declining as second-place 32GB grows; a trend that is mirrored in the VRAM category...
Phoronix adds that the Windows percent "pulled back by 0.51% to 96.1% while Apple macOS also gained 0.22% going up to a 1.61% marketshare."
Microsoft

FSF Urges Moving Off Microsoft's GitHub to Protest Windows 11's Requiring TPM 2.0 (fsf.org) 152

TPM is a dedicated chip or firmware enabling hardware-level security, housing encryption keys, certificates, passwords, and sensitive data, "and shielding them from unauthorized access," Microsoft senior product manager Steven Hosking wrote last month, declaring TPM 2.0 to be "a non-negotiable standard for the future of Windows."

Or, as BleepingComputer put it, Microsoft "made it abundantly clear... that Windows 10 users won't be able to upgrade to Windows 11 unless their systems come with TPM 2.0 support." (This despite the fact that Statcounter Global data "shows that more than 61% of all Windows systems worldwide still run Windows 10.") They add that Microsoft "announced on October 31 that Windows 10 home users will be able to delay the switch to Windows 11 for one more year if they're willing to pay $30 for Extended Security Updates."

But last week the Free Software Foundation's campaigns manager delivered a message on the FSF's official blog: "Keep putting pressure on Microsoft." Grassroots organization against a corporation as large as Microsoft is never easy. They have the advertising budget to claim that they "love Linux" (sic), not to mention the money and political willpower to corral free software developers from around the world on their nonfree platform Microsoft GitHub. This year's International Day Against DRM took aim at one specific injustice: their requiring a hardware TPM module for users being forced to "upgrade" to Windows 11. As Windows 10 will soon stop receiving security updates, this is a (Microsoft-manufactured) problem for users still on this operating system. Normally, offloading cryptography to a different hardware module could be seen as a good thing — but with nonfree software, it can only spell trouble for the user...

What's crucial now is to keep putting pressure on Microsoft, whether that's through switching to GNU/Linux, avoiding new releases of their software, or actions as simple as moving your projects off of Microsoft GitHub. If you're concerned about e-waste or have friends who work to combat climate change, getting them together to tell them about free software is the perfect way to help our movement grow, and free a few more users from Microsoft's digital restrictions. If you're concerned about e-waste or have friends who work to combat climate change, getting them together to tell them about free software is the perfect way to help our movement grow, and free a few more users from Microsoft's digital restrictions.

AI

How AI-Based Military Intelligence Powered Israel's Attacks on Gaza (msn.com) 131

It's "what some experts consider the most advanced military AI initiative ever to be deployed," reports the Washington Post.

But the Israeli military's AI-powered intelligence practices are also "under scrutiny. Genocide charges against Israel brought to The Hague by South Africa question whether crucial decisions about bombing targets in Gaza were made by software, an investigation that could hasten a global debate about the role of AI technology in warfare." After the brutal Oct. 7, 2023, attack by Hamas, the Israel Defense Forces deluged Gaza with bombs, drawing on a database painstakingly compiled through the years that detailed home addresses, tunnels and other infrastructure critical to the militant group. But then the target bank ran low. To maintain the war's breakneck pace, the IDF turned to an elaborate artificial intelligence tool called Habsora — or "the Gospel" — which could quickly generate hundreds of additional targets. The use of AI to rapidly refill IDF's target bank allowed the military to continue its campaign uninterrupted, according to two people familiar with the operation. It is an example of how the decade-long program to place advanced AI tools at the center of IDF's intelligence operations has contributed to the violence of Israel's 14-month war in Gaza... People familiar with the IDF's practices, including soldiers who have served in the war, say Israel's military has significantly expanded the number of acceptable civilian casualties from historic norms. Some argue this shift is enabled by automation, which has made it easier to speedily generate large quantities of targets, including of low-level militants who participated in the Oct. 7 attacks.
In a statement to The Post, the IDF argued that "If anything, these tools have minimized collateral damage and raised the accuracy of the human-led process." The IDF requires an officer to sign off on any recommendations from its "big data processing" systems, according to an intelligence official who spoke on the condition of anonymity because Israel does not release division leaders' names. The Gospel and other AI tools do not make decisions autonomously, the person added...Recommendations that survive vetting by an intelligence analyst are placed in the target bank by a senior officer...

Another machine learning tool, called Lavender, uses a percentage score to predict how likely a Palestinian is to be a member of a militant group, allowing the IDF to quickly generate a large volume of potential human targets... The rule mandating two pieces of human-derived intelligence to validate a prediction from Lavender was dropped to one at the outset of the war, according to two people familiar with the efforts. In some cases in the Gaza division, soldiers who were poorly trained in using the technology attacked human targets without corroborating Lavender's predictions at all, the soldier said.

The article includes an ominous quote from Steven Feldstein, a senior fellow at the Carnegie Endowment who researches the use of AI in war. Feldstein acknowledges questions of accuracy, but also notes the accelerated speed of the systems, and the ultimate higher death count. His conclusion?

"What's happening in Gaza is a forerunner of a broader shift in how war is being fought."
Robotics

'Why the World Needs Lazier Robots' (msn.com) 16

"Robots and AI models share one crucial characteristic," writes the Washington Post. "Whether to move around, conduct conversations or solve problems, they function by constantly taking in and computing increasingly vast quantities of data. It's a brute-force approach to automation. Processing all that data makes them such energy guzzlers that their planet-warming pollution could outweigh any benefits they offer."

But then the article visits the robot soccer team of René van de Molengraft (chair of robotics at Eindhoven University of Technology in the Netherlands). "One solution, Molengraft thinks, might lie in 'lazy robotics,' a cheeky term to describe machines doing less and taking shortcuts..." There may be ceilings for laziness: limits to how much superfluous energy use can be stripped away before robots stop functioning as they should. Still, Molengraft said, "The truth is: Robots are still doing a lot of things that they shouldn't be doing." To waste less energy, robots need to do less of everything: move less, and think less, and sense less. They need to focus only on what's important at any particular moment. Which, after all, is what humans do, even if we don't always realize it....

Lazy robotics is already percolating out of university labs and into the R&D wings of corporations.... On the outskirts of Eindhoven, engineers at health technology firm Philips have encoded lazy robotics into two porcelain-white machines. These robots, named FlexArm and Biplane, move around an operating theater with smooth hums, taking X-ray images to help surgeons install cardiac stents or work on the brain with greater precision.... The robots use proximity sensors, which use far less energy. Lazy robotics can also cut down on the number of X-rays during a procedure. Frequently, surgeons take multiple X-rays to make their work as precise as possible. But with the robots' help, they can track the exact coordinates on a patient's body they are operating on in real time...

The theories behind lazy robotics make robots smart in a more practical way: by coding in an awareness of what they don't need to know. It may be a while before these solutions are deployed at scale out in the world, but their potential applications are already evident... Molengraft sees an extension of lazy robotics into the realm of generative AI, in which machines don't learn how to move but learn how to learn by processing veritable oceans of data... It's wiser to build versions that contain only the necessary information. A language model used by software engineers, for instance, shouldn't need to run through its training data about world history, sporting records or children's literature. "Not every AI model has to be able to tell us about the first Harry Potter book," Molengraft said.

The less data an AI model crunches, the less energy it uses — a vital efficiency fillip given that ChatGPT now uses 500,000 kilowatt-hours of energy a day, responding to 200 million queries. A U.S. household would need more than 17,000 days on average to rack up the same electricity bill... Molengraft sees this work as indispensable if the forthcoming age of machines is to be a cleaner time as well.

Microsoft

A New Year's Gift From Microsoft: Surprise, Your Scanners Don't Work (theregister.com) 39

Windows 11 24H2 continues to experience issues with multifunction devices using the eSCL scan protocol, despite Microsoft marking the problem as resolved. According to a Register reader, "It works on a Windows 10 machine, but not on Windows 11, unless both the computer and the scanner are on wired Ethernet." From the report: Microsoft issued a compatibility safeguard hold on USB-connected devices using the Scanner Communication Language (eSCL) protocol in November after users who installed the Windows update experienced glitches with device discovery. The issue was reported resolved by Microsoft in December. However, it seems that KB5048667 might not have fixed all the problems for Canon owners. According to our reader: "Canon support tells me that the 24H2 eSCL issue still is not fixed." We asked Microsoft about the situation, but despite telling us it was looking into the problem on Friday, December 20, the company has yet to provide any further details. Canon was more forthcoming. A spokesperson told The Register it was aware of a problem impacting devices using ScanGear MF.

ScanGear MF is a scanner driver provided by Canon and allows customers to configure advanced settings for scanning. Canon does not appear to be changing its code to rectify whatever problems had been brought on by the Windows 11 update. The spokesperson said: "Microsoft is currently working on an OS amendment to resolve this and we are keeping in close contact with them. The timing for resolving this is yet to be confirmed by Microsoft, however we expect to receive the plan to fix in January 2025." Customers affected by the issue, which manifests itself with a communications error message, according to Canon's support forum, are advised to use either native Microsoft software solutions or go fully wired via USB.

Slashdot Top Deals