Businesses

Germany Spends Big To Win $11 Billion TSMC Chip Plant (reuters.com) 35

TSMC is committing $3.8 billion to establish its first European factory in Germany, benefiting from significant state support for the $11 billion project as Europe aims to shorten supply chains. Reuters reports: The plant, which will be TSMC's third outside of traditional manufacturing bases Taiwan and China, is central to Berlin's ambition to foster the domestic semiconductor industry its car industry will need to remain globally competitive. Germany, which has been courting the world's largest contract chipmaker since 2021, will contribute up to 5 billion euros to the factory in Dresden, capital of the eastern state of Saxony, German officials said.

"Germany is now probably becoming the major location for semiconductor production in Europe," German Chancellor Olaf Scholz said, less than two months after Intel announced a 30 billion euro plan to build two chip-making plants in the country. "That is important for the resilience of production structures around the world, but it is also important for the future viability of our European continent, and it is of course particularly important for the future viability of Germany."

TSMC said it would invest up to 3.499 billion euros into a subsidiary, European Semiconductor Manufacturing Company (ESMC), of which it will own 70%. Germany's Bosch and Infineon and the Netherlands' NXP (NXPI.O) will each own 10% of the plant, which will make up to 40,000 wafers a month for cars and industrial and home products when it opens in 2017. The factory will cost around 10 billion euros in total.

United Kingdom

Millions of UK Voters' Data Accessible In Cyber Attack (theguardian.com) 14

The UK's Electoral Commission revealed that a cyber attack granted access to the data of 40 million voters. It went unnoticed for a year and was not disclosed to the public for an additional 10 months. The Guardian reports: The Electoral Commission apologized for the security breach in which the names and addresses of all voters registered between 2014 and 2022 were open to "hostile actors" as far back as August 2021. The attack was discovered last October and reported within 72 hours to the Information Commissioner's Office (ICO), as well as the National Crime Agency. However, the public has only now been informed that the electoral registers containing the data of millions of voters may have been accessible throughout that time.

The Electoral Commission said it was "not able to know conclusively" what information had been accessed. It is not known whether the attackers were linked to a hostile state, such as Russia, or a criminal cyber gang. The watchdog said "much of the data" was already in the public domain and insisted it would be difficult for anyone to influence the outcome of the UK's largely paper-based electoral system, but it acknowledged that voters would still be concerned.

The attackers were able to access full copies of the electoral registers, held by the commission for research purposes and to enable permissibility checks on political donations. These registers include the name and address of anyone in the UK who was registered to vote between 2014 and 2022. The commission's email system was also accessible during the attack. The full register held by the Electoral Commission contains name and address data that can be inspected by the public but only locally through electoral registration officers, with only handwritten notes allowed. The information is not permitted to be used for commercial or marketing purposes. The data of anonymous voters whose details are private for safety reasons and the addresses of overseas voters were not accessible to the intruders in the IT system.
A spokesperson for the ICO, the UK's independent regulator on data protection, said: "The Electoral Commission has contacted us regarding this incident and we are currently making inquiries."

They added: "We recognize this news may cause alarm to those who are worried they may be affected and we want to reassure the public that we are investigating as a matter of urgency. In the meantime, if anyone is concerned about how their data has been handled, they should get in touch with the ICO or check our website for advice and support."
Google

Google Fails To End $5 Billion Consumer Privacy Lawsuit (reuters.com) 29

A U.S. judge rejected Google's bid to dismiss a lawsuit claiming it invaded the privacy of millions of people by secretly tracking their internet use. From a report: U.S. District Judge Yvonne Gonzalez Rogers on Monday said she could not find that users consented to letting Google collect information about what they viewed online because the Alphabet unit never explicitly told them it would. David Boies, a lawyer for the plaintiffs in the proposed $5 billion class action, called the decision "an important step in protecting the privacy interests of millions of Americans."

The plaintiffs alleged that Google's analytics, cookies and apps let the Mountain View, California-based company track their activity even when they set Google's Chrome browser to "Incognito" mode and other browsers to "private" browsing mode. They said this let Google learn enough about their friends, hobbies, favorite foods, shopping habits, and "potentially embarrassing things" they seek out online, becoming "an unaccountable trove of information so detailed and expansive that George Orwell could never have dreamed it."

Crime

Serial Murders Have Dwindled, Thanks To a Cautious Citizenry and Improved Technology (nytimes.com) 184

An anonymous reader quotes a report from the New York Times: Rex Heuermann, the meticulous architectural consultant who the authorities say murdered three women and buried them on a Long Island beach more than a decade ago, may have been among the last of the dying breed of American serial killers. Even as serial killers came to inhabit a central place in the nation's imagination -- inspiring hit movies, television shows, books, podcasts and more -- their actual number was dwindling dramatically. There were once hundreds at large, and a spike in the 1970s and '80s terrified the country. Now only a handful at most are known to be active, researchers say. The techniques that led to the arrest of Mr. Heuermann, who has pleaded not guilty to the crimes, help explain the waning of serial killing, which the F.B.I. defines as the same person killing two or more victims in separate events at different times.

It is harder to hide. Rapid advances in investigative technology, video and other digital surveillance tools, as well as the ability to analyze mountains of information, quickly allow the authorities to find killers who before would have gone undetected. At the same time, Americans have adopted more cautious habits in their everyday lives -- hitchhiking, for example, is less common, and children are driven to and from school. That reduces easy targets. And, some theorize, those bent on killing now opt for spectacular mass murders. "The 'perfect crime' concept is more of a concept than it ever has been before," said Adam Scott Wandt, an assistant professor at John Jay College of Criminal Justice. More than a decade ago, prosecutors said, Mr. Heuermann tried to cover his digital tracks by communicating with victims using so-called burner phones, prepaid units purchased anonymously for temporary use. But thanks to exponential progress in technology since 2010, investigators were able not only to chart Mr. Heuermann's decade-old movements; they could also monitor exactly what he was searching online in recent months. They saw that he was using an anonymous account for internet queries like "Why could law enforcement not trace the calls made by the long island serial killer," prosecutors said. He had also been visiting massage parlors and contacting women working as escorts, they said.

The ubiquity of technology has made it harder to get away with murder, Mr. Wandt said. The amount of data people create in their daily lives is more than many can conceptualize, he said. Just by walking outside, people are now tracked by ever-present cameras, from Amazon's Ring units outside homes to surveillance at banks and retail stores, he said. Every use of a phone or computer creates streams of data that are collected directly on devices or immortalized on servers, he said. A concerted effort by the federal government to ensure that even the smallest police departments can use technology to their benefit has also helped give investigators an upper hand, Mr. Wandt said. In 1987, there were 198 known active serial killers -- people connected to at least two murders -- and 404 known victims across the United States, according to a report published three years ago by researchers who run Radford University and Florida Gulf Coast University's Serial Killer Database. By 2018, there were only 12 known serial killers and 44 victims, according to the report.
"The big question is: Are they going underground and finding other techniques?â said Terence Leary, an associate professor in the psychology department at Florida Gulf Coast University and the team leader for the database.

He said that some serial murderers have killed for discrete periods before taking prolonged breaks: "Maybe they decided to give it up. Who knows?"
Links

Google Search Asked To Remove One Billion 'Pirate' Links In 9 Months (torrentfreak.com) 22

In a period of less than nine months, Google received requests to remove over a billion links to pirate sites from its search engine. This is a significant increase compared to recent years, but not necessarily a new trend. More than a quarter of all reported links, relating to a single website, were sent by MindGeek, the parent company of PornHub. TorrentFreak reports: Google first started to keep track of these takedown notices at the beginning of the last decade. In the spring of 2012, Google launched its Transparency Report which publishes all DMCA requests the company receives, including the targeted links and their senders. This provided fuel for hundreds of news reports as well as academic research. A few days ago, Google reached a new milestone when it processed the seven billionth removal request. It's a mind-boggling number that comes less than a year after the six billionth takedown was recorded.

Looking more closely at the timeline, we see that a billion URLs were reported to Google search in less than nine months. For comparison, it took twice as long to go from five to six billion, suggesting that the takedown volume picked up again after a previously reported decline. There's no denying the recent surge in reported links but much of the increase was generated by a single rightsholder in an effort to remove a particular pirate operation from Google search.

Around the start of the year MG Premium began to increase its takedown efforts. The company is an intellectual property vehicle of the MindGeek conglomerate, known for popular adult sites such as PornHub. One of MG Premium's main goals is to shut down âunlicensed' sites or at least make when unfindable. [...] The surge is clearly visible in the graph above and at times the company was averaging more than two million takedown requests per day. More recently the volume has come down a bit, but it's been a major contributor to Google's takedown uptick.

Privacy

Zoom Contradicts Its Own Policy About Training AI on Your Data (gizmodo.com) 31

An anonymous reader shares a report: Zoom updated its Terms of Service in March, spelling out that the company reserves the right to train AI on user data with no mention of a way to opt out. On Monday, the company said in a blog post that there's no need to worry about that. Zoom execs swear the company won't actually train its AI on your video calls even though the Terms of Service still say it can.

The company's legal documents call your video, audio, and chat transcripts "Customer Content." When you click through Zoom's terms, you agree to give Zoom "perpetual, worldwide, non-exclusive, royalty-free, sublicensable, and transferable license and all other rights" to use that Customer Content for "machine learning, artificial intelligence, training, testing," and a variety of other product development purposes. The company reserves similar rights for "Service Generated Data," which includes telemetry data, product usage data, diagnostic data, and other information it gets from analyzing your content and behavior.

Transportation

California Will Probe Data-Collecting, Internet-Connected Cars (msn.com) 25

The Washington Post reports: California's newly empowered privacy regulators announced their first case Monday, a probe of the data practices of newer-generation cars that are often or always connected to the internet. The California Privacy Protection Agency said its enforcement division would review manufacturer's treatment of data collected from vehicles, including locations, smartphone connections and images from cameras.

The agency was established by a 2020 ballot initiative that toughened the California Consumer Privacy Act of 2018. As of July 1, it can conduct operations to enforce Californians' right to learn what is being collected about them, the right to stop that information from being spread and the right to have it deleted...

When combined with web surfing habits and other internet data collated by brokers, movement tracking can paint a full portrait that includes a person's home, workplace, shopping habits, religious attendance and medical treatments. Insurance companies also want data on how quickly drivers brake ahead of problems on the road, along with other performance indicators, and they are willing to pay to get it.

The Post notes that data is beamed to business partners of automakers under "vague privacy policies."
Encryption

Ask Slashdot: What's the Best (Encrypted) Password Manager? 154

For storing passwords, Slashdot reader eggegick has a simple, easy solution: "I use Vim to keep my passwords in an encrypted file."

But what's the easiest solution for people who don't use Vim? My wife is not a Linux geek like I am, so she's using [free and open-source] KeePass. It's relatively simple to install and use, but I seem to recall it used to be even much simpler... Does anybody know of a really simple password manager or encrypting notepad?

I've looked at a number of them, and they use Java or Javascript, or they involve an external web site, or they have way too many features, or they use an installation program. Or Windows Defender objects to them.

Share your own suggestions and thoughts in the comments.

What's the best (encrypted) password manager?
Power

Judge Tosses Criminal Charges Against South Carolina Nuclear Executive - But Case May Continue (apnews.com) 41

An anonymous reader shared this report from the Associated Press: A judge has ordered criminal charges dropped against the final executive accused of lying about problems building two nuclear reactors in South Carolina that were abandoned without generating a watt of power. The judge tossed the charges Wednesday because ratepayers of the utility that lost billions of dollars on the project were improperly allowed on the grand jury that indicted Westinghouse Electric Co. executive Jeffrey Benjamin. But federal judge Mary Geiger Lewis also ruled that nothing is stopping prosecutors from properly seeking another indictment. "We're not going away," said assistant U.S. Attorney Winston Holliday, who said prosecutors are still reviewing the ruling to decide their next steps...

The project fell apart in 2017 after nearly a decade of work, when executives and regulators determined construction of the reactors was so hopelessly behind schedule they could not get nearly $2 billion of tax breaks needed to help pay for the work. SCANA contracted with Westinghouse to build the reactors. Prosecutors said Benjamin , who was in charge of major projects, knew of delays and cost overruns but lied to regulators, utility executives and others. The lies led to electric rate increases while keeping the price of SCANA's stock from plummeting...

Two former SCANA executives have been sentenced to federal prison after pleading guilty to their roles in lying to ratepayers, regulators and investors. Former CEO Kevin Marsh received two years while chief operating officer Stephen Byrne was sentenced to 15 months. Former Westinghouse project director Carl Churchman has pleaded guilty to lying to FBI agents investigating the project's failure and is awaiting sentencing.

The Courts

Federal Judge Clears Way for US Antitrust Case Against Google (msn.com) 32

The Washington Post reports: A federal judge said the Department of Justice's landmark case alleging Google's dominance over the online search business is anti-competitive can go ahead, throwing out some of the government's claims but ruling that a trial is still necessary.

Google had asked for the judge to make a ruling before the trial, which is scheduled for September.

Some of the government's claims, including those put together by a consortium of state attorneys general that argued the way Google designed its search engine page was unfairly harming competitors like Yelp, were dismissed. But D.C. District Court Judge Amit Mehta said the allegations that Google's overall business practices constitute a monopoly that violates the 1890 Sherman Antitrust Act still deserve a trial. "This is a significant victory for Google, knocking out several claims and narrowing the range of activities at issue for trial," said David Olson, an associate professor and antitrust expert at Boston College's law school. "Having said that, the strongest claims against Google remain, so Google still remains at risk of a significant antitrust ruling against it."

The trial will be a major test for Google and the massive business empire it has assembled over the past two decades. The company is still the dominant portal to the internet, exercising immense power over what people see online... The eventual ruling will also be seen as a test for the U.S. government's more aggressive posture on antitrust.

Medicine

EPA Approved a Chevron Fuel Ingredient That Has a Lifetime Cancer Risk 121

An anonymous reader quotes a report from ProPublica: The Environmental Protection Agency approved a component of boat fuel made from discarded plastic that the agency's own risk formula determined was so hazardous, everyone exposed to the substance continually over a lifetime would be expected to develop cancer. Current and former EPA scientists said that threat level is unheard of. It is a million times higher than what the agency usually considers acceptable for new chemicals and six times worse than the risk of lung cancer from a lifetime of smoking. Federal law requires the EPA to conduct safety reviews before allowing new chemical products onto the market. If the agency finds that a substance causes unreasonable risk to health or the environment, the EPA is not allowed to approve it without first finding ways to reduce that risk. But the agency did not do that in this case. Instead, the EPA decided its scientists were overstating the risks and gave Chevron the go-ahead to make the new boat fuel ingredient at its refinery in Pascagoula, Mississippi. Though the substance can poison air and contaminate water, EPA officials mandated no remedies other than requiring workers to wear gloves, records show.

ProPublica and the Guardian in February reported on the risks of other new plastic-based Chevron fuels that were also approved under an EPA program that the agency had touted as a "climate-friendly" way to boost alternatives to petroleum-based fuels. That story was based on an EPA consent order, a legally binding document the agency issues to address risks to health or the environment. In the Chevron consent order, the highest noted risk came from a jet fuel that was expected to create air pollution so toxic that 1 out of 4 people exposed to it over a lifetime could get cancer. In February, ProPublica and the Guardian asked the EPA for its scientists' risk assessment, which underpinned the consent order. The agency declined to provide it, so ProPublica requested it under the Freedom of Information Act. The 203-page risk assessment revealed that, for the boat fuel ingredient, there was a far higher risk that was not in the consent order. EPA scientists included figures that made it possible for ProPublica to calculate the lifetime cancer risk from breathing air pollution that comes from a boat engine burning the fuel. That calculation, which was confirmed by the EPA, came out to 1.3 in 1, meaning every person exposed to it over the course of a full lifetime would be expected to get cancer.

Another serious cancer risk associated with the boat fuel ingredient that was documented in the risk assessment was also missing from the consent order. For every 100 people who ate fish raised in water contaminated with that same product over a lifetime, seven would be expected to develop cancer -- a risk that's 70,000 times what the agency usually considers acceptable. When asked why it didn't include those sky-high risks in the consent order, the EPA acknowledged having made a mistake. This information "was inadvertently not included in the consent order," an agency spokesperson said in an email. [...] The risk assessment makes it clear that cancer is not the only problem. Some of the new fuels pose additional risks to infants, the document said, but the EPA didn't quantify the effects or do anything to limit those harms, and the agency wouldn't answer questions about them. Some of these newly approved toxic chemicals are expected to persist in nature and accumulate in living things, the risk assessment said. That combination is supposed to trigger additional restrictions under EPA policy, including prohibitions on releasing the chemicals into water. Yet the agency lists the risk from eating fish contaminated with several of the compounds, suggesting they are expected to get into water. When asked about this, an EPA spokesperson wrote that the agency's testing protocols for persistence, bioaccumulation and toxicity are "unsuitable for complex mixtures" and contended that these substances are similar to existing petroleum-based fuels.
The EPA did address the concerns in June when it proposed a rule that "would require companies to contact the agency before making any of 18 fuels and related compounds listed in the Chevron consent order," notes ProPublica. "The EPA would then have the option of requiring tests to ensure that the oil used to create the new fuels doesn't contain unsafe contaminants often found in plastic, including certain flame retardants, heavy metals, dioxins and PFAS. If approved, the rule will require Chevron to undergo such a review before producing the fuels, according to the EPA."
Piracy

Z-Library Rolls Out Browser Extensions In Anticipation of Domain Name Troubles (torrentfreak.com) 15

Pirate eBook repository Z-Library has launched browser extensions that should make it easier for users to find the site if its current domains are seized in the future. While the site doesn't explicitly mention the U.S. Government crackdown, it likely plays a key role in the decision to make these extensions available. TorrentFreak reports: Since the shadow library is now well aware that its domain names could be taken away at any moment, numerous precautions are being taken to mitigate the risks. A few weeks ago, Z-Library released a dedicated desktop application that should make it easier to access the site. The software has the ability to redirect users to working domains and whenever necessary, connect over the Tor network, which also helps to evade blocking efforts. In an announcement this week, the operators of the shadow library unveiled new precautionary tools to redirect users to working domains, including any new ones, should they be needed.

The new browser extensions are available for both Chrome and Firefox and promise 'seamless access' to alternative domains in the event that existing ones run into trouble. "Say goodbye to searching for available domains, as this handy extension takes care of everything for you. Simplify your online library experience and enjoy seamless access to a world of knowledge, right at your fingertips. "After launching the extension, the process of searching for an available domain will begin. Within some seconds when the domain is found, you will be redirected to the library homepage," Z-Library explains.

While installing browser extensions should always happen with caution, in just a few hours thousands of Z-Library users have already installed the new software. According to the Chrome store, the Z-Library Finder currently has over 7,000 users. These extensions may indeed help to point users to new domain names, but the solution isn't bulletproof. The authorities may attempt to remove the listings from the Chrome and Firefox extension libraries, for example. Even if Z-Library decides to self-host these tools, they still rely on technical infrastructure that could be targeted in the future. That being said, the releases are still notable; it's rare to a service going full steam ahead in the face of an active criminal case.

Bitcoin

Razzlekhan and Husband Guilty of Bitcoin Launder (bbc.com) 45

A husband and wife cyber-crime team have pleaded guilty to trying to launder $4.5bn of Bitcoin that he had stolen in a hack in 2016. From a report: Heather Morgan and Ilya Lichtenstein were arrested last year in New York after police traced their riches back to the crypto heist. While evading police, Morgan masqueraded as a rapper and tech entrepreneur. As part of a plea deal, Lichtenstein admitted he was behind the hack. The couple both pleaded guilty to money laundering, but Morgan pleaded guilty to an additional count of conspiracy to defraud the United States. In spite of attempting to cover up her crimes, Morgan published dozens of expletive-filled music videos and rap songs filmed in locations around New York, under the name Razzlekhan. In her lyrics she called herself a "bad-ass money maker" and "the crocodile of Wall Street."

In articles published in Forbes, Morgan also claimed to be a successful tech businesswoman, calling herself an "economist, serial entrepreneur, software investor and rapper." But while developing her rapping and tech persona, she and her computer programmer husband were attempting to cash out their fortune stolen from the crypto firm Bitfinex. The couple now face prison sentences with Lichtenstein in line for a possible maximum 20 years in prison and Morgan a possible 10. At the time of their arrest in February 2022, the stash of 119,000 Bitcoins was worth about $4.5bn -- making it the US Department of Justice's largest single financial seizure in its history. When the hack was carried out, the Bitcoins were worth about $71m.

Businesses

SoftBank Sues Former IRL CEO For Fraud (theinformation.com) 14

SoftBank sued former IRL CEO Abraham Shafi and five siblings and cousins for allegedly misleading the investor about the messaging app's growth, prompting the Japanese conglomerate to buy $150 million worth of shares in the company in 2021 at the height of a pandemic-fueled consumer internet boom. The Information: SoftBank said Shafi and his family members defrauded investors by lying about the company's millions of users, which were actually bots. The lawsuit said the defendants deleted data and communications about the fraud after U.S. securities regulators began investigating the company following a report in The Information questioning the user figures. Last month, The Information reported the company was being shut down following an external investigation initiated by its board of directors that found 95% of its users were fake. The conduct described in the lawsuit, including allegedly deleting evidence during a federal investigation, could put Shafi in further legal trouble.
Canada

Canadian Government Services To Become 'Digital First' (www.cbc.ca) 55

Canadians will soon be able to access and apply for more federal government services online -- from passports to payments, says Canada's first minister of citizens' services. From a report: Terry Beech says he's also open to innovation and using new technologies like artificial intelligence to improve the way the government delivers services to Canadians. "I think, fundamentally, it's my job to wake up every day thinking about how we're improving the customer service experience for Canadians," Beech said in an interview with CBC News. Beech's appointment to the newly created position comes as the government has been hammered in headlines and by the opposition in recent months over problems delivering basic services to Canadians. News reports have featured images of long lineups and people camping out to apply for passports. In the House of Commons, Conservative MPs have repeatedly talked about a "broken" government, saying lineups have been getting longer, backlogs bigger and services slower.
Security

Hackers Could Have Scored Unlimited Airline Miles By Targeting One Platform (wired.com) 5

An anonymous reader quotes a report from Wired: Travel rewards programslike those offered by airlines and hotels tout the specific perks of joining their club over others. Under the hood, though, the digital infrastructure for many of these programs -- including Delta SkyMiles, United MileagePlus, Hilton Honors, and Marriott Bonvoy -- is built on the same platform. The backend comes from the loyalty commerce company Points and its suite of services, including an expansive application programming interface (API).But new findings, published today by a group of security researchers, show that vulnerabilities in the Points.com API could have been exploited to expose customer data, steal customers' "loyalty currency" (like miles), or even compromise Points global administration accounts to gain control of entire loyalty programs. The researchers -- Ian Carroll, Shubham Shah, and Sam Curry -- reported a series of vulnerabilities to Points between March and May, and all the bugs have since been fixed.

"The surprise for me was related to the fact that there is a central entity for loyalty and points systems, which almost every big brand in the world uses," Shah says. "From this point, it was clear to me that finding flaws in this system would have a cascading effect to every company utilizing their loyalty backend. I believe that once other hackers realized that targeting Points meant that they could potentially have unlimited points on loyalty systems, they would have also been successful in targeting Points.com eventually." One bug involved a manipulation that allowed the researchers to traverse from one part of the Points API infrastructure to another internal portion and then query it for reward program customer orders. The system included 22 million order records, which contain data like customer rewards account numbers, addresses, phone numbers, email addresses, and partial credit card numbers. Points.com had limits in place on how many responses the system could return at a time, meaning an attacker couldn't simply dump the whole data trove at once. But the researchers note that it would have been possible to look up specific individuals of interest or slowly siphon data from the system over time.

Another bug the researchers found was an API configuration issue that could have allowed an attacker to generate an account authorization token for any user with just their last name and rewards number. These two pieces of data could potentially be found through past breaches or could be taken by exploiting the first vulnerability. With this token, attackers could take over customer accounts and transfer miles or other rewards points to themselves, draining the victim's accounts. The researchers found two vulnerabilities similar to the other pair of bugs, one of which only impacted Virgin Red while the other affected just United MileagePlus. Points.com fixed both of these vulnerabilities as well. Most significantly, the researchers found a vulnerability in the Points.com global administration website in which an encrypted cookie assigned to each user had been encrypted with an easily guessable secret -- the word "secret" itself. By guessing this, the researchers could decrypt their cookie, reassign themselves global administrator privileges for the site, reencrypt the cookie, and essentially assume god-mode-like capabilities to access any Points reward system and even grant accounts unlimited miles or other benefits.

United States

Biden Puts Final Nail In the Coffin For Incandescent Light Bulbs (cnbc.com) 267

Long-time Slashdot reader SonicSpike shares a report from CNBC: On Tuesday, the Biden administration put the final nail in the coffin for incandescent light bulbs, the result of a decade-plus-long legislative path. The journey began in 2007 when the Energy Independence and Security Act passed. That law required the Department of Energy to evaluate whether efficiency standards for light bulbs needed to be set or amended and required a minimum standard of energy efficiency for light bulbs of 45 lumens per watt to be considered. The 2007 law required that if the DOE determined a new energy efficiency standard was necessary, it should go into effect by January 1, 2017. But politics intervened as the Trump administration appealed those rules.

The Biden administration picked the issue back up. And in April 2022, the Biden administration issued a rule requiring the minimum standard efficiency of 45 lumens per watt, which became effective in July. At that time, the Department of Energy said it would have a gradual transition to the new rule so that stores with inventory would not be stuck with light bulbs they could no longer sell. In Department of Energy lingo, this is called "progressive enforcement." Full enforcement of the ban for retailers took effect on Tuesday. The DOE does not disclose its techniques for enforcing these step-wise implementation of the rule. However, the agency's new regulations will be enforced in "a fair and equitable manner," and smaller retailers are advised to reach out to the DOE to speak about existing inventory they may still have on hand, a spokesperson told CNBC.

Enforcing the sale of the more energy-efficient light bulbs will save consumers nearly $3 billion per year on their utility bills, according to DOE estimates, and cut carbon emissions by 222 million metric tons over the next 30 years. That's about the quantity of emissions that 28 million homes generate in a year, the Department of Energy said. [...] Not all light bulbs are included in the ban. Exceptions include a whole slew of specific light bulb implications, including appliance lamps, black light lamps, bug lamps, colored lamps, general service fluorescent lamps, marine lamps, marine signal service lamps, mine service lamps, sliver bowl lamps, showcase lamps, and traffic signal lamp, to name a few.

Security

Microsoft Comes Under Blistering Criticism For 'Grossly Irresponsible' Security (arstechnica.com) 55

An anonymous reader quotes a report from Ars Technica: Microsoft has once again come under blistering criticism for the security practices of Azure and its other cloud offerings, with the CEO of security firm Tenable saying Microsoft is "grossly irresponsible" and mired in a "culture of toxic obfuscation." The comments from Amit Yoran, chairman and CEO of Tenable, come six days after Sen. Ron Wyden (D-Ore.) blasted Microsoft for what he said were "negligent cybersecurity practices" that enabled hackers backed by the Chinese government to steal hundreds of thousands of emails from cloud customers, including officials in the US Departments of State and Commerce. Microsoft has yet to provide key details about the mysterious breach, which involved the hackers obtaining an extraordinarily powerful encryption key granting access to a variety of its other cloud services. The company has taken pains ever since to obscure its infrastructure's role in the mass breach.

On Wednesday, Yoran took to LinkedIn to castigate Microsoft for failing to fix what the company said on Monday was a "critical" issue that gives hackers unauthorized access to data and apps managed by Azure AD, a Microsoft cloud offering for managing user authentication inside large organizations. Monday's disclosure said that the firm notified Microsoft of the problem in March and that Microsoft reported 16 weeks later that it had been fixed. Tenable researchers told Microsoft that the fix was incomplete. Microsoft set the date for providing a complete fix to September 28.

"To give you an idea of how bad this is, our team very quickly discovered authentication secrets to a bank," Yoran wrote. "They were so concerned about the seriousness and the ethics of the issue that we immediately notified Microsoft." He continued: "Did Microsoft quickly fix the issue that could effectively lead to the breach of multiple customers' networks and services? Of course not. They took more than 90 days to implement a partial fix -- and only for new applications loaded in the service."
In response, Microsoft officials wrote: "We appreciate the collaboration with the security community to responsibly disclose product issues. We follow an extensive process involving a thorough investigation, update development for all versions of affected products, and compatibility testing among other operating systems and applications. Ultimately, developing a security update is a delicate balance between timeliness and quality, while ensuring maximized customer protection with minimized customer disruption." Microsoft went on to say that the initial fix in June "mitigated the issue for the majority of customers" and "no customer action is required."

In a separate email, Yoran responded: "It now appears that it's either fixed, or we are blocked from testing. We don't know the fix, or mitigation, so hard to say if it's truly fixed, or Microsoft put a control in place like a firewall rule or ACL to block us. When we find vulns in other products, vendors usually inform us of the fix so we can validate it effectively. With Microsoft Azure that doesn't happen, so it's a black box, which is also part of the problem. The 'just trust us' lacks credibility when you have the current track record."
Privacy

Brave Cuts Ties With Bing To Offer Its Own Image and Video Search Results (theregister.com) 14

Brave Software, maker of the Brave web browser, has tuned its search engine to run on a homegrown index of images and videos in an effort to end its dependency on "Big Tech" rivals. The Register reports: On Thursday, the company said that image and video results from Brave Search -- available on the web at search.brave.com and via its browser -- will be served from Brave's own index. Search indexes are made by visiting online resources -- typically web pages, images, videos, or other files -- with a crawler bot and recording the locations of these resources in a database. And when an internet user submits a query to a search engine, the search engine checks its index (and possible other sources) to find the addresses of resources that correspond to the query keywords. There's actually a lot more to it but that's the basic idea.

Brave now aims to ride the wave of discontent with "Big Tech" by highlighting its commitment to privacy and independence â" small tech. "Brave Search is 100 percent private and anonymous, which sets a high bar for image/video search to meet," the company said in a blog post provided to The Register. "Whether it's a matter of personal safety or personal preference, users should be able to discover content without their search engine reporting and profiling those results to a Big Tech company." [...] Brave argues that having its own index frees the company from content decisions made by others.
"Brave is on a mission to build a user-first Web," the company said in its blog post. "That mission starts with the Brave browser and Brave Search. With the release of image and video search, we're continuing to innovate within the search industry, providing viable and preferable products for users who want choice and transparency in their search for information online."
Government

IRS Vows To Digitize All Taxpayer Documents By 2025 (arstechnica.com) 59

An anonymous reader writes: Today, the US Treasury Department announced that taxpayers will have the choice to go paperless for all Internal Revenue Service (IRS) correspondence in the upcoming 2024 filing season. By 2025, the IRS plans to achieve paperless processing for all tax returns, still accepting paper documents but immediately digitizing them, to "cut processing times in half" and "expedite refunds by several weeks," the Treasury Department said. "The IRS receives about 76 million paper tax returns and forms and 125 million pieces of correspondence, notice responses, and non-tax forms each year, and its limited capability to accept these forms digitally or digitize paper it receives has prevented the IRS from delivering the world-class service taxpayers deserve," the Treasury Department said.

By accelerating paperless processing, the IRS expects to simplify how Americans access their taxpayer data and save millions historically spent on storing more than a billion documents. Digitization can also help eliminate errors, the Treasury Department said, which can "result from manually inputting data from paper returns." And it will help taxpayers more quickly get answers to questions, as IRS customer service employees "do not currently have easy access to the information from paper returns." Starting in 2024, they will. Next filing season, taxpayers will have the option to e-file 20 additional tax forms among the most commonly submitted when amending returns, including forms used to submit information on things like identity theft or proof of eligibility for "key credits and deductions that help low-income households."

"Taxpayers who want to submit paper returns and correspondence can continue to do so," the Treasury Department said, but "all paper will be converted into digital form as soon as it arrives at the IRS." In 2024, the IRS estimates that "more than 94 percent of individual taxpayers will no longer ever need to send mail to the IRS." Once taxpayers arrive at the 2025 filing season, they'll have the option to e-file "an additional 150 of the most used non-tax forms," the Treasury Department said, which "will be available in digital, mobile-friendly formats that make them easy for taxpayers to complete and submit." The IRS prioritized mobile-friendly formats because the agency estimates that "15 percent of Americans rely solely on mobile phones for their Internet access."
"When combined with an improved data platform, digitization and data extraction will enable data scientists to implement advanced analytics and pattern recognition methods to pursue cases that can help address the tax gap, including wealthy individuals and large corporations using complex structures to evade taxes they owe," the Treasury Department added.

Slashdot Top Deals