It’s ridiculous and dangerous. They aren’t pop stars. Support them if you agree with their policies, and criticize them when they are wrong. They are servants, not celebrities. And just in case you’re a fan of celebrities: they are monkeys who perform for our amusement. Also servants. I don’t want their political advice, and you shouldn’t want their advice, too.
I got frustrated at Gigabyte’s RGB control stuff (I just REALLY want to turn my GPU LEDs off!) so I caved in and started reverse engineering RGB Fusion and OH GOD WHY DID I DO THAT IT IS SO HORRIBLY CURSEDSource: Graham Sutherland [Polynomial^DSS]
So, basically, the RGB Fusion software flashes a new firmware when you set a new LED pattern. What an unbelievable mess! What do these software developers do for their living? Ah, yes, the develop software. I see.
Why has the user land software have to take care of this? Instead the firmware should just receive a call from the software and do the necessary steps. No need to flash a firmware for that if you do it correctly.
Still, reading this causes physical pain.
In what may be a huge milestone in computing, Google says it has achieved “quantum supremacy,” an experimental demonstration of the superiority of a quantum computer over a traditional one.
The claim, made in a new scientific paper, is the most serious indication yet that the promise of quantum computers—an emerging but unproven type of machine—is becoming reality, including their potential to solve formerly ungraspable mathematical problems.
Essentially, Google purports to have pulled off a stunt on a quantum computer that no classical machine—not even the world’s most powerful supercomputer—can replicate.Source: Fortune Magazine
Your crypto-currencies and shit are still save. No need to worry.
Just noticed the download server of Opera’s offline installation packages responds with an error 502. Checking for updates from within the browser is therefore also broken.
Additionally Opera’s add-ons page is down.
The U.S. government concluded within the last two years that Israel was most likely behind the placement of cell-phone surveillance devices that were found near the White House and other sensitive locations around Washington, D.C., according to three former senior U.S. officials with knowledge of the matter.
But unlike most other occasions when flagrant incidents of foreign spying have been discovered on American soil, the Trump administration did not rebuke the Israeli government, and there were no consequences for Israel’s behavior, one of the former officials said.
The miniature surveillance devices, colloquially known as “StingRays,” mimic regular cell towers to fool cell phones into giving them their locations and identity information. Formally called international mobile subscriber identity-catchers or IMSI-catchers, they also can capture the contents of calls and data use.
The devices were likely intended to spy on President Donald Trump, one of the former officials said, as well as his top aides and closest associates — though it’s not clear whether the Israeli efforts were successful.Source: Politico
We worry about face recognition just as we worried about databases – we worry what happens if they contain bad data and we worry what bad people might do with them.
It’s easy to point at China, but there are large grey areas where we don’t yet have a clear consensus of what ‘bad’ would actually mean, and how far we worry because this is different rather than just because it’s just new and unfamiliar.
Like much of machine learning, face recognition is quickly becoming a commodity tech that many people can and will use to build all sorts of things. ‘AI Ethics’ boards can go a certain way but can’t be a complete solution, and regulation (which will take many forms) will go further. But Chinese companies have their own ethics boards and are already exporting their products.Source: Ben Evans
For years, an enduring mystery has surrounded the Stuxnet virus attack that targeted Iran’s nuclear program: How did the U.S. and Israel get their malware onto computer systems at the highly secured uranium-enrichment plant?
The first-of-its-kind virus, designed to sabotage Iran’s nuclear program, effectively launched the era of digital warfare and was unleashed some time in 2007, after Iran began installing its first batch of centrifuges at a controversial enrichment plant near the village of Natanz.
The courier behind that intrusion, whose existence and role has not been previously reported, was an inside mole recruited by Dutch intelligence agents at the behest of the CIA and the Israeli intelligence agency, the Mossad, according to sources who spoke with Yahoo News.
An Iranian engineer recruited by the Dutch intelligence agency AIVD provided critical data that helped the U.S. developers target their code to the systems at Natanz, according to four intelligence sources. That mole then provided much-needed inside access when it came time to slip Stuxnet onto those systems using a USB flash drive.Source: Yahoo News
Hundreds of millions of phone numbers linked to Facebook accounts have been found online. The exposed server contained more than 419 million records over several databases on users across geographies, including 133 million records on U.S.-based Facebook users, 18 million records of users in the U.K., and another with more than 50 million records on users in Vietnam. But because the server wasn’t protected with a password, anyone could find and access the database. Each record contained a user’s unique Facebook ID and the phone number listed on the account. A user’s Facebook ID is typically a long, unique and public number associated with their account, which can be easily used to discern an account’s username.
But phone numbers have not been public in more than a year since Facebook restricted access to users’ phone numbers. TechCrunch verified a number of records in the database by matching a known Facebook user’s phone number against their listed Facebook ID. We also checked other records by matching phone numbers against Facebook’s own password reset feature, which can be used to partially reveal a user’s phone number linked to their account.Source: TechCrunch
Some of the records also had the user’s name, gender and location by country.
A federal judge ruled on Wednesday that a federal government database that compiles people deemed to be “known or suspected terrorists” violates the rights of American citizens who are on the watchlist, calling into question the constitutionality of a major tool the F.B.I. and the Department of Homeland Security use for screening potential terrorism suspects.
Being on the watchlist can restrict people from traveling or entering the country, subject them to greater scrutiny at airports and by the police, and deny them government benefits and contracts. In a 32-page opinion, Judge Anthony J. Trenga of United States District Court for the Eastern District of Virginia said the standard for inclusion in the database was too vague.
“The court concludes that the risk of erroneous deprivation of plaintiffs’ travel-related and reputational liberty interests is high, and the currently existing procedural safeguards are not sufficient to address that risk,” Judge Trenga wrote.Source: The New York Times
On june 22nd there was an alleged coup attempt in Ethiopia. The army chief of staff was murdered, as was the president of Amhara, one of the country’s nine regions. Ordinary Ethiopians were desperate to find out what was going on. And then the government shut down the internet. By midnight some 98% of Ethiopia was offline.
“People were getting distorted news and were getting very confused about what was happening…at that very moment there was no information at all,” recalls Gashaw Fentahun, a journalist at the Amhara Mass Media Agency, a state-owned outlet. He and his colleagues were trying to file a report. Rather than uploading audio and video files digitally, they had to send them to head office by plane, causing a huge delay.Source: The Economist