Author Archives: pappp

Kids Online Safety Act passes Senate despite concerns it will harm kids

Source: Ars Technica

Article note: Ugh. Way too many folks are falling for this heinous shit. Above and beyond the general "Any law motivated on `Won't someone think of the children' is highly suspect" rule this one (1) will compel unnecessary de-anonimzation and PII collection by vendors, which puts everyone at risk (2) is clearly designed to separate at-risk youth from engaging with supportive sections of society under the premise of "anti-grooming," and (3) was actually written by Heritage Foundation ghouls from the "Better dead than qeer" school of child rearing.
Kids Online Safety Act passes Senate despite concerns it will harm kids

Enlarge (credit: Westend61 | Westend61)

The Kids Online Safety Act (KOSA) easily passed the Senate today despite critics' concerns that the bill may risk creating more harm than good for kids and perhaps censor speech for online users of all ages if it's signed into law.

KOSA received broad bipartisan support in the Senate, passing with a 91–3 vote alongside the Children’s Online Privacy Protection Action (COPPA) 2.0. Both laws seek to control how much data can be collected from minors, as well as regulate the platform features that could harm children's mental health.

Only Sens. Ron Wyden (D-Ore.), Rand Paul (R-Ky.), and Mike Lee (R-Utah) opposed the bills.

Read 23 remaining paragraphs | Comments

Posted in News | Leave a comment

Outsourcing emotion: The horror of Google’s “Dear Sydney” AI ad

Source: Ars Technica

Article note: The vast majority of writing _is_ extremely formular and ingenuine, but the value in doing it is typically in learning how to manipulate (with) the formula. ...and still, deciding to air an ad encouraging children to outsource expressing their (fake) emotions to a chatterbot is some sociopath shit that it's extremely goddamn alarming no one at google though the better of.
Here's an idea: Don't be a deadbeat and do it yourself!

Enlarge / Here's an idea: Don't be a deadbeat and do it yourself! (credit: Google)

If you've watched any Olympics coverage this week, you've likely been confronted with an ad for Google's Gemini AI called "Dear Sydney." In it, a proud father seeks help writing a letter on behalf of his daughter, who is an aspiring runner and superfan of world-record-holding hurdler Sydney McLaughlin-Levrone.

"I'm pretty good with words, but this has to be just right," the father intones before asking Gemini to "Help my daughter write a letter telling Sydney how inspiring she is..." Gemini dutifully responds with a draft letter in which the LLM tells the runner, on behalf of the daughter, that she wants to be "just like you."

Every time I see this ad, it puts me on edge in a way I've had trouble putting into words (though Gemini itself has some helpful thoughts). As someone who writes words for a living, the idea of outsourcing a writing task to a machine brings up some vocational anxiety. And the idea of someone who's "pretty good with words" doubting his abilities when the writing "has to be just right" sets off alarm bells regarding the superhuman framing of AI capabilities.

Read 18 remaining paragraphs | Comments

Posted in News | Leave a comment

Dear AI Companies, instead of scraping OpenStreetMap, how about a $10k donation?

Source: Hacker News

Article note: Apparently the AI douches are scraping the OSM web frontends via API instead of just ...downloading the dataset. Which is Free. They're doing surreptitious shit like cloaking their UAs and IPs because they know their behavior is generally unacceptable, and in doing so making it expensive for the hosts of free content they're perfectly allowed to download. That they're hoping to make money from without giving anything back.
Comments
Posted in News | Leave a comment

Pixel 9’s ‘Add Me’ feature puts you in a group photo even when you’re not there

Source: The Verge - All Posts

Article note: From someone currently wrapping a PhD in computational imaging, doing a lot of image-synthesis work: That is fucked up, creepy, socially dangerous shit. One of my _hard rules_ for the methods I work on is that you never, ever synthesize an apparently natural image using data that wasn't present in the scene, because that is how you build a truth-bending, history-revising propaganda engine that Stalin could only dream of. The "AI" (because I guess we're calling every heuristic/non-deterministic algorithm AI right now until winter sets in again) folks lack of compunctions about that is really a pressing social issue.
A screenshot showing what appears to be the Pixel 9’s Add Me feature
Image: OnLeaks via Android Headlines

While there’s been no shortage of Pixel 9 leaks over the past couple of days, a new ad for the device seems to have leaked in full — and it shows off a new feature that makes sure you aren’t left out of a group photo.

The feature, seemingly called “Add Me,” appears in a leaked ad shared with Android Headlines by OnLeaks. The ad shows someone using a Pixel 9 to take a picture of two friends in front of a van. After snapping a shot, the photographer trades spots with her two friends, allowing her to get a picture in front of the van — only the Pixel’s display shows the phantom-like image of the two friends standing beside her. Her friend snaps a photo, and boom, she appears in the picture as if she were there the entire time.

Judging by...

Continue reading…

Posted in News | Leave a comment

A hash table by any other name

Source: Hacker News

Article note: Huh, the "Someone has proposed a more performant cache-aware hash table for Linux Kernel use" article is _modestly_ interesting, but the discussion in the comments about the history of modified linear hashing and cuckoo hashing (similar ideas), how it shows up historically in GIRLS/Pick and such, calling out some bad analytic practices that are _super common_ in computing research, and discussing *where* these structures are actually used in the kernel and what pitfalls that might generate, are a great read.
Comments
Posted in News | Leave a comment

Secure Boot is completely broken on 200+ models from 5 big device makers

Source: Ars Technica

Article note: The PKI situation with SecureBoot has always been weird, but it grows ever more bullshit. The trust roots don't really make sense except in an emabling-anticompetitive-behavior sort of way, there isn't really any meaningful revocation mechanism, and there can't be without ...internet connected firmware that might effectively brick systems, and the necessary shimming support to eventually run arbitrary unsigned software makes the whole model feeble, and... The only mode it makes sense in is the "I'm signing my immutable system image with my own signing key which is the only enrolled key on a system" context and... that's neither possible on most firmwares or a configuration I've ever heard of anyone using outside of an experimental context.
Secure Boot is completely broken on 200+ models from 5 big device makers

Enlarge (credit: sasha85ru | Getty Imates)

In 2012, an industry-wide coalition of hardware and software makers adopted Secure Boot to protect against a long-looming security threat. The threat was the specter of malware that could infect the BIOS, the firmware that loaded the operating system each time a computer booted up. From there, it could remain immune to detection and removal and could load even before the OS and security apps did.

The threat of such BIOS-dwelling malware was largely theoretical and fueled in large part by the creation of ICLord Bioskit by a Chinese researcher in 2007. ICLord was a rootkit, a class of malware that gains and maintains stealthy root access by subverting key protections built into the operating system. The proof of concept demonstrated that such BIOS rootkits weren't only feasible; they were also powerful. In 2011, the threat became a reality with the discovery of Mebromi, the first-known BIOS rootkit to be used in the wild.

Keenly aware of Mebromi and its potential for a devastating new class of attack, the Secure Boot architects hashed out a complex new way to shore up security in the pre-boot environment. Built into UEFI—the Unified Extensible Firmware Interface that would become the successor to BIOS—Secure Boot used public-key cryptography to block the loading of any code that wasn’t signed with a pre-approved digital signature. To this day, key players in security—among them Microsoft and the US National Security Agency—regard Secure Boot as an important, if not essential, foundation of trust in securing devices in some of the most critical environments, including in industrial control and enterprise networks.

Read 36 remaining paragraphs | Comments

Posted in News | Leave a comment

Non-Google search engines blocked from showing recent Reddit results

Source: Ars Technica

Article note: Goodbye open internet, hello exploitative walled gardens. It's the warnings of 20 years ago coming exactly true.
Google is displayed on a mobile phone screen in front of logo of Reddit is displayed on a computer screen i

Enlarge (credit: Getty)

Recent discussions on Reddit are no longer showing up in non-Google search engine results. The absence is the result of updates to Reddit’s Content Policy that ban crawling its site without agreeing to Reddit’s rules, which bar using Reddit content for AI training without Reddit’s explicit consent.

As reported by 404 Media, using "site:reddit.com" on non-Google search engines, including Bing, DuckDuckGo, and Mojeek, brings up minimal or no Reddit results from the past week. Ars Technica made searches on these and other search engines and can confirm the findings. Brave, for example, brings up a few Reddit results sometimes (examples here and here) but not nearly as many as what appears on Google when using identical queries. A standout is Kagi, which is a paid-for engine that pays Google for some of its search index and still shows recent Reddit results.

As 404 Media noted, Reddit's Robots Exclusion Protocol (robots.txt file) blocks bots from scraping the site. The protocol also states, "Reddit believes in an open Internet, but not the misuse of public content." Reddit has approved scrapers from the Internet Archive and some research-focused entities.

Read 14 remaining paragraphs | Comments

Posted in News | Leave a comment

You got a null result. Will anyone publish it?

Source: Hacker News

Article note: No. It's why we have a replication crisis and part of why we spend inordinate amounts of time, money, and effort chasing bullshit. Nice irony that Nature, one of the Springer-affiliated journals especially famous for that behavior is publishing an editorial about it, though.
Comments
Posted in News | Leave a comment

Intel Addresses Desktop Raptor Lake Instability Issues: Faults Excessive Voltage from Microcode, Fix Coming in August

Source: AnandTech Articles

Article note: Cant wait to hear what the performance regressions from a microcode patch that prevents a localized power problem will be.

In what started last year as a handful of reports about instability with Intel's Raptor Lake desktop chips has, over the last several months, grown into a much larger saga. Facing their biggest client chip instability impediment in decades, Intel has been under increasing pressure to figure out the root cause of the issue and fix it, as claims of damaged chips have stacked up and rumors have swirled amidst the silence from Intel. But, at long last, it looks like Intel's latest saga is about to reach its end, as today the company has announced that they've found the cause of the issue, and will be rolling out a microcode fix next month to resolve it.

Officially, Intel has been working to identify the cause of desktop Raptor Lake’s instability issues since at least February of this year, if not sooner. In the interim they have discovered a couple of correlating factors – telling motherboard vendors to stop using ridiculous power settings for their out-of-the-box configurations, and finding a voltage-related bug in Enhanced Thermal Velocity Boost (eTVB) – but neither factor was the smoking gun that set all of this into motion. All of which had left Intel to continue searching for the root cause in private, and lots of awkward silence to fill the gaps in the public.

But it looks like Intel’s search has finally come to an end – even if Intel isn’t putting the smoking gun on public display quite yet. According to a fresh update posted to the company’s community website, Intel has determined the root cause at last, and has a fix in the works.

Per the company’s announcement, Intel has tracked down the cause of the instability issue to “elevated operating voltages”, that at its heart, stems from a flawed algorithm in Intel’s microcode that requested the wrong voltage. Consequently, Intel will be able to resolve the issue through a new microcode update, which pending validation, is expected to be released in the middle of August.

Based on extensive analysis of Intel Core 13th/14th Gen desktop processors returned to us due to instability issues, we have determined that elevated operating voltage is causing instability issues in some 13th/14th Gen desktop processors. Our analysis of returned processors confirms that the elevated operating voltage is stemming from a microcode algorithm resulting in incorrect voltage requests to the processor.

Intel is delivering a microcode patch which addresses the root cause of exposure to elevated voltages. We are continuing validation to ensure that scenarios of instability reported to Intel regarding its Core 13th/14th Gen desktop processors are addressed. Intel is currently targeting mid-August for patch release to partners following full validation.

Intel is committed to making this right with our customers, and we continue asking any customers currently experiencing instability issues on their Intel Core 13th/14th Gen desktop processors reach out to Intel Customer Support for further assistance.
-Intel Community Post

And while there’s nothing good for Intel about Raptor Lake’s instability issues or the need to fix them, that the problem can be ascribed to (or at least fixed by) microcode is about the best possible outcome the company could hope for. Across the full spectrum of potential causes, microcode is the easiest to fix at scale – microcode updates are already distributed through OS updates, and all chips of a given stepping (millions in all) run the same microcode. Even a motherboard BIOS-related issue would be much harder to fix given the vast number of different boards out there, never mind a true hardware flaw that would require Intel to replace even more chips than they already have.

Still, we’d also be remiss if we didn’t note that microcode is regularly used to paper over issues further down in the processor, as we’ve most famously seen with the Meltdown/Spectre fixes several years ago. So while Intel is publicly attributing the issue to microcode bugs, there are several more layers to the onion that is modern CPUs that could be playing a part. In that respect, a microcode fix grants the least amount of insight into the bug and the performance implications about its fix, since microcode can be used to mitigate so many different issues.

But for now, Intel’s focus is on communicating that they have fix and establishing a timeline for distributing it. The matter has certainly caused them a lot of consternation over the last year, and it will continue to do so for at least another month.

In the meantime, we’ve reached out to our Intel contacts to see if the company will be publishing additional details about the voltage bug and its fix. “Elevated operating voltages” is not a very satisfying answer on its own, and given the unprecedented nature of the issue, we’re hoping that Intel will be able to share additional details as to what’s going on, and how Intel will be preventing it in the future.

Intel Also Confirms a Via Oxidation Manufacturing Issue Affected Early Raptor Lake Chips

Tangential to this news, Intel has also made a couple of other statements regarding chip instability to the press and public over the last 48 hours that also warrant some attention.

First and foremost, leading up to Intel’s official root cause analysis of the desktop Raptor Lake instability issues, one possibility that couldn’t be written off at the time was that the root cause of the issue was a hardware flaw of some kind. And while the answer to that turned out to be “no,” there is a rather important “but” in there, as well.

As it turns out, Intel did have an early manufacturing flaw in the enhanced version of the Intel 7 process node used to build Raptor Lake. According to a post made by Intel to Reddit this afternoon, a “via Oxidation manufacturing issue” was addressed in 2023. However, despite the suspicious timing, according to Intel this is separate from the microcode issue driving instability issues with Raptor Lake desktop processors up to today.

Short answer: We can confirm there was a via Oxidation manufacturing issue (addressed back in 2023) but it is not related to the instability issue.

Long answer: We can confirm that the via Oxidation manufacturing issue affected some early Intel Core 13th Gen desktop processors. However, the issue was root caused and addressed with manufacturing improvements and screens in 2023. We have also looked at it from the instability reports on Intel Core 13th Gen desktop processors and the analysis to-date has determined that only a small number of instability reports can be connected to the manufacturing issue.

For the Instability issue, we are delivering a microcode patch which addresses exposure to elevated voltages which is a key element of the Instability issue. We are currently validating the microcode patch to ensure the instability issues for 13th/14th Gen are addressed.
-Intel Reddit Post

Ultimately, Intel says that they caught the issue early-on, and that only a small number of Raptor Lake were affected by the via oxidation manufacturing flaw. Which is hardly going to come as a comfort to Raptor Lake owners who are already worried about the instability issue, but if nothing else, it’s helpful that the issue is being publicly documented. Typically, these sorts of early teething issues go unmentioned, as even in the best of scenarios, some chips inevitably fail prematurely.

Unfortunately, Intel’s revelation here doesn’t offer any further details on what the issue is, or how it manifests itself beyond further instability. Though at the end of the day, as with the microcode voltage issue, the fix for any affected chips will be to RMA them with Intel to get a replacement.

Laptops Not Affected by Raptor Lake Microcode Issue

Finally, ahead of the previous two statements, Intel also released a statement to Digital Trends and a few other tech websites over the weekend, in response to accusations that Intel’s 13th generation Core mobile CPUs were also impacted by what we now know to be the microcode flaw. In the statement, Intel refuted those claims, stating that laptop chips were not suffering from the same instability issue.

Intel is aware of a small number of instability reports on Intel Core 13th/14th Gen mobile processors. Based on our in-depth analysis of the reported Intel Core 13th/14th Gen desktop processor instability issues, Intel has determined that mobile products are not exposed to the same issue. The symptoms being reported on 13th/14th Gen mobile systems – including system hangs and crashes – are common symptoms stemming from a broad range of potential software and hardware issues. As always, if users are experiencing issues with their Intel-powered laptops we encourage them to reach out to the system manufacturer for further assistance.
-Intel Rep to Digital Trends

Instead, Intel attributed any laptop instability issues to typical hardware and software issues – essentially claiming that they weren’t experiencing elevated instability issues. Whether this statement accounts for the via oxidation manufacturing issue is unclear (in large part because not all 13th Gen Core Mobile parts are Raptor Lake), but this is consistent with Intel’s statements from earlier this year, which have always explicitly cited the instability issues as desktop issues.

Posted in News | Leave a comment

How to use the new counted_by attribute in C (and Linux)

Source: Hacker News

Article note: Ooohh. That's an immediately obviously useful feature.
Comments
Posted in News | Leave a comment