Category Archives: News

Shared items and notes from my feeds and browsing. Subscribe as feed.

The Reign of Terror That Sustains Belarus’s Leader, Aleksandr Lukashenko

Source: NYT > World

Article note: This is why we shouldn't (shouldn't have? It remains to be see if it's too late) tolerate the growth of security states.

Despite hundreds of thousands protesting against him for months, Aleksandr G. Lukashenko has been able to cling to power thanks to an all-pervasive security system.

Posted in News | Leave a comment

UK employee spent over $250,000 on 80 iPhones, other purchases, audit finds

Source: Kentucky.com -- Education

Article note: Oh damn it. Prepare for another wave of irritating and time-consuming bullshit every single time anyone on campus needs to buy anything, because a few jackasses fucked it up for everyone. Just like a couple years ago with the physics lab fraud case. Also, is a new deanlet of finance and administration going to cost more than the not quite $100,000 a year of fraud they uncovered?

A University of Kentucky employee spent $256,000 on the unauthorized purchase of more than 80 iPhones, other high-tech equipment, travel expenses and other personal items over the course of three … Click to Continue »

Posted in News | Leave a comment

Google Takes Down Repositories That Circumvent its Widevine DRM

Source: TorrentFreak

Article note: I've heard rumors that _all_ the Widevine levels are broken by 'serious' pirates at this point, so this shit is just theater to appease the media companies with their disproportionate influence, and harass users trying for compatibility and control of their systems. ...like everything about DRM.

widevine logoWith more ways to stream online video than ever before, protecting video continues to be a key issue for copyright holders.

This is often achieved through Digital Rights Management, which is often referred to by the initials DRM. In a nutshell, DRM is an anti-piracy tool that dictates when and where digital content can be accessed.

Google is an important player in this area. The company owns the Widevine DRM technology which is used by many of the largest streaming services including Amazon, Netflix and Disney+. As such, keeping it secure is vital.

Widevine DRM

Widevine DRM comes in different levels. The L1 variant is the most secure, followed by L2 and L3. While the latter still protects content from being easily downloaded, it’s certainly not impossible to bypass, as pirates have repeatedly shown.

Despite its vulnerabilities, Google doesn’t want to make it too easy for the public at large. This became apparent a few hours ago when the company asked the developer platform GitHub to remove dozens of “Widevine L3 Decryptor” repositories.

The code, originally published by security researcher Tomer Hadad, is a proof-of-concept code Chrome extension that shows how easy it is to bypass the low-security DRM. Google was aware of this vulnerability and previously informed Krebs Security that it would address the issue.

Google Targets Widevine L3 Decryptor Code

One option would be to patch the security flaw but, for now, Google appears to be focusing on the takedown route. In a DMCA notice sent to GitHub, the company requests the immediate takedown of dozens of “Widevine L3 Decryptor” copies.

“The following git repository [sic] contain circumvention technology that enables users to illegally access video and audio works protected by copyright,” Google writes.

“This Chrome extension demonstrates how it’s possible to bypass Widevine DRM by hijacking calls to the browser’s Encrypted Media Extensions (EME) and decrypting all Widevine content keys transferred – effectively turning it into a clearkey DRM,” Google adds.

Google sees the code, which was explicitly published for educational purposes only, as a circumvention tool. As such, it allegedly violates section 1201 of the DMCA, an allegation that was also made against the youtube-dl code last month.

widevine

The takedown notice includes a long list of repositories that were all made unavailable by GitHub. This doesn’t cover the original code from Tomer Hadad, who already removed his version in late October, citing “legal reasons.”

Google views this vulnerability as a serious matter and the company says that it has also filed a Sensitive Data takedown request to prevent the Widevine’s ‘secret’ private key from being publicly shared.

Sensitive Data Request

“In addition to this request, we have filed a separate Sensitive Data takedown request of this file: /widevine-l3-decryptor as it contains the secret Widevine RSA private key, which was extracted from the Widevine CDM and can be used in other circumvention technologies.”

That last mention is interesting as private keys, which are simply a string of characters, are not seen as copyrighted or private content by everyone.

“If you distribute your key with the software, then whatever form it is in, I would not consider it “private” at all,” a commenter on Hacker News points out.

Googling the AACS Key

This ‘key controversy’ is reminiscent of an issue that was widely debated thirteen years ago. At the time, a hacker leaked the AACS cryptographic key “09 F9” online which prompted the MPAA and AACS LA to issue DMCA takedown requests to sites where it surfaced.

This escalated into a censorship debate when sites started removing articles that referenced the leak, triggering a massive backlash.

At the time, the controversial AACS key was still readily available through Google’s search engine. In that regard very little has changed. Despite Google’s sensitive data takedown request, the Widevine RSA key is easy to find through its own search engine.

From: TF, for the latest news on copyright battles, piracy and more.

Posted in News | Leave a comment

macOS Big Sur launch appears to cause temporary slowdown in even non-Big Sur Macs

Source: OSNews

Article note: For your regularly scheduled "Stallman was right," your computer, which you paid for and physically control, calls home to check if it's OK whenever you go to run a piece of software. And it fails closed.

Mac users today began experiencing unexpected issues that included apps taking minutes to launch, stuttering and non-responsiveness throughout macOS, and other problems. The issues seemed to begin close to the time when Apple began rolling out the new version of macOS, Big Sur—but it affected users of other versions of macOS, like Catalina and Mojave.

Other Apple services faced slowdowns, outages, and odd behavior, too, including Apple Pay, Messages, and even Apple TV devices.

It didn’t take long for some Mac users to note that trustd—a macOS process responsible for checking with Apple’s servers to confirm that an app is notarized—was attempting to contact a host named oscp.apple.com but failing repeatedly. This resulted in systemwide slowdowns as apps attempted to launch, among other things.

What a brave new world – some server goes down, and you can’t use your applications anymore.

Posted in News | Leave a comment

Future Histories of the Internet Syllabus

Source: loriemerson

Article note: Well that's cool. _Someone_ is teaching some computer history. I'd argue about a few choices, its a little aggressively feminist for my taste (chooses some secondary sources over primaries and less-prominent alternative period documents to fit the frame - and yet still doesn't do Dean's _Why the Net is not a Public Sphere_ which is to me the most important feminist critique of the Internet). Also, it looks like it glosses Usenet and the pre-internet ARPA sites which are, IMO, the most important and immediate precedent - and generally skips the pre-interent computing culture in favor of pre-interent communication culture, which arguably was largely subsumed by the former. Though I suppose that last point might make sense if the frame is _other_ networks rather than understanding the one we got.

Below is a syllabus for a sophomore-level class I hope to teach in Fall 2021. This class is a reflection of my ongoing work on a cluster projects I call “Other Networks“–attempts to uncover and document the technical specs and functionalities of pre-internet networks (particularly from the 1970s and early 1980s) as well as artistic experiments on these same networks.

“To propose an alternate history is to propose that history can be altered, to change directions, to inaugurate an alternate future.”

Sofia Samatar, “Toward a Planetary History of Afrofuturism”

General Class Description:
This class explores questions, fears, and ideas about technology and the future through literature about technology, literary technologies, and narratives about the future that move across periods, regions, and disciplines.  We’ll get acquainted with literary styles, genres, movements, technologies, and histories.  Our cultural and historical approach will illuminate how race, gender and sexuality, class, and nationality structure seemingly neutral research and development, usage, and innovation.  Ultimately, our goal is to see how we’re not simply passive consumers but active participants in reimagining the present and future of technology. This class also fulfills the diversity requirement by providing students with skills to understand gender, race, marginalization, and multiculturalism to the study of literature and technology.

Specific Class Description:
This iteration of the class begins by introducing students to foundational works from media studies to give them tools to analyze media as well as analyze art and literature that actively works with and against media ranging from the book to the digital computer; these foundational works also demonstrate a range of historical imaginings of the future of digital media in particular.

We will then use claims from this unit, such as Ted Nelson’s 1974 urgent invocation for us to “understand computers NOW,” to move us into the next cluster of readings that first teach students about what the contemporary internet is as well as where it is. Subsequently, drawing heavily from thinkers such as Shoshana Zuboff, Safiya Noble and Siva Vaidynathan, we will learn about the extent which large corporations intentionally blackbox and obfuscate how the internet and their deeply biased (and therefore harmful) algorithms work.

However, since we take seriously Sofia Samatar’s declaration that “To propose an alternate history is to propose that history can be altered, to change directions, to inaugurate an alternate future,” at this point in the class we will promptly move back to the 1960s, 1970s, and early 1980s to investigate what alternatives to the internet have existed–and still might exist–and how artists and writers experimented with these networks. We will look at mail art networks, lesbian newsletter networks, socialist and countercultural teletype machine networks, time-sharing networks, slow scan TV networks, videotex networks, and Bulletin Board Systems.

Finally, in case students are left with the sense that the only viable alternatives to the contemporary internet are dead networks from the past, we will end our class by a) learning about a range of contemporary feminist, anti-capitalist, and artistic alternative networks and b) learning how to build your own sneakernet and your own mesh network. In this way, we will deeply internalize Lizzie O’Shea’s moving statement that “The networked computer represents an exciting opportunity to reshape the world in an image of sustainable prosperity, shared collective wealth, democratized knowledge and respectful social relations. But such a world is only possible if we actively decide to build it.” We will, then, learn how to build this future world.

Course Requirements and Policies
In addition to a class presentation on a writer or theorist, you will be required to contribute to online discussion forums on our class blog, write a research paper, and produce a group project. Since our class is paperless, I don’t mind if you bring your laptop to class but of course this means I expect you to use it appropriately. I’m sure you’ve probably already found you learn better, concentrate better, and distract others around you less if you don’t use your laptop in class

You will also be required to contribute to class regularly. Participation begins with attendance.  Both absences and tardiness will affect this portion of your grade.  For this course, you are allowed three absences without penalty; these should be reserved for sickness, holidays, tiredness, laziness etc.  A fourth absence will result in the reduction of this portion of your grade by a full letter grade.  A fifth absence will result in the reduction of this portion of your grade by two full letter grades.  A sixth absence will result in the reduction of your final grade by one full letter grade. A seventh absence will result in the reduction of your final grade by two full letter grades.  Anything more than seven absences results in failing the class (given how much class material and learning you’ll have missed out on).Arrival in class more than 15 minutes after it begins will be considered an absence.  You are responsible for contacting me or a class member if you miss a class, and you are expected to be fully prepared for the next class session.

Your participation grade will also reflect the quality and thoughtfulness of your contribution in class, respect shown to class members, your attitude and role in small group exercises, and evidence of completion of reading assignments.  Please remember, then, that ALL in-class discussions and exercises assume (and depend upon) you reading the assigned material.  Review your syllabus frequently, and plan your workload accordingly.

Your final grade will be calculated as follows:

  • Two Online Discussion Forums: 15% (or 7.5% each)
  • Essay (7 pages): 25%
  • Individual Presentation: 20%
  • Final Group Creative Project: 25%
  • Participation: 15%

Weekly Schedule

UNIT 1: Foundations for Reading/Writing Technology
Week 1

  • Walter Benjamin, “Art in the Age of Mechanical Reproduction” (1935)

Week 2

  • Marshall McLuhan, “The Medium is the Message” (1964)
  • Ted Nelson, excerpt from Computer Lib / Dream Machines (1974)

Week 3

  • Katherine Hayles, excerpt from Writing Machines (2002)

UNIT 2: Technology Today / The Internet: What, Where, Who
Week 4

  • Amy Wibowo, How Does the Internet (2015)

Week 5

  • Nicole Starosielski, excerpt from The Undersea Network (2015)

Week 6

  • Shoshana Zuboff, excerpt from The Age of Surveillance Capitalism (2018)

Week 7

  • Safiya Noble, excerpt from Algorithms of Oppression (2018)
  • Siva Vaidhynathan, excerpt from Antisocial Media (2018)

UNIT 3: Technology Past / From Mail Art to Bulletin Board Systems

Week 8

  • Mail art: Chuck Welch (ed.), excerpt from Eternal Network: A Mail Art Anthology (1995)
  • Simone Osthoff, “From Mail Art to Telepresence: Communication at a Distance in the Works of Paulo Bruscky and Eduardo Kac” (2016)
  • Electronic Museum of Mail Art

Week 9

  • Newsletters: Cait McKinney, “The Internet that Lesbians Built: Newsletter Networks” (2020)
  • Teletype Machines: Project Cybersyn (Eden Medina, excerpt from Cybernetic Revolutionaries) (1971-1973), Community Memory (1973-1975)

Week 10

Week 11

  • Videotex: Julie Malland and Kevin Driscoll, excerpt from MINITEL: Welcome to the Internet (2017)
  • Bulletin Board Systems: THE THING BBS Message Archive; Lori Emerson, “‘Did We Dream Enough?’ THE THING BBS as an Experiment in Social-Cyber Sculpture” (2020)

UNIT 4: Subversions Past and Present to Reimagine the Future
Week 12

  • Donna Haraway, “The Cyborg Manifesto” (1986)
  • VNS Matrix, “Cyberfeminist Manifesto” (1991)
  • Jaron Lanier, excerpt from Who Owns the Future? (2013)

Week 13

Week 14

Posted in News | Leave a comment

Kentucky high court upholds governor’s powers to fight virus

Source: Kentucky.com -- State

Article note: Good.

Kentucky’s Supreme Court on Thursday upheld the governor’s authority to issue coronavirus-related restrictions on businesses and individuals to try to contain the spread of COVID-19. The ruling delivered a victory … Click to Continue »

Posted in News | Leave a comment

Booting a macOS Apple Silicon Kernel in QEMU

Source: Hacker News

Article note: That was quick. Looks promising that Apple didn't do anything too demented.
Comments
Posted in News | Leave a comment

Apple dishes details on its new M1 chip

Source: Ars Technica

Article note: Neat, desktop-class ARM parts from a major vendor. I'm curious about the boot-loader situation, these things might be appliances. The benchmarks look a little cooked (I think the i7 comparisons are throttled to base clock?) Max 16GB memory cuts the current generation of machines off from any "high end" applications. Looks like their "Rosetta2" translation layer is a decent JIT, though it sounds like there are some quirks around memory behaviors (4k vs. 16k page size?), I'm excited to see how that works out.

(credit: Apple)

Apple's "One More Thing" event is all about Macs. Here's the scoop on Apple's latest chip, the M1, which is the first ARM-based computer chip the company is making in-house.

The M1 is the first computer chip built on a 5nm process with 16 billion transistors. Optimized for Apple's lower-power systems with minimal size and maximum efficiency, there are four performance cores and four efficiency cores in the CPU. Pound for pound, Apple says it has the highest CPU performance per watt, and the four efficiency cores alone match the performance of a dual-core MacBook Air while using much less power. This should contribute to longer battery life and better efficiency in low-power tasks like checking emails, for instance.

The integrated graphics card has eight cores and can process up to 2.6 teraflops, making it the world's fastest integrated graphics chip in a computer. In concert with the 16-core neural engine, which is capable of 11 trillion processes per second, Apple says apps like Garage Band can handle three times more instruments and effect plugins, while Final Cut Pro, for instance, can render complex timelines up to six-times faster. Compared to "previous-generation Macs," Apple says the M1 delivers "up to 3.5x faster CPU performance, up to 6x faster GPU performance, and up to 15x faster machine learning" with up to double the battery life.

Read 3 remaining paragraphs | Comments

Posted in News | Leave a comment

YouTube Premium members can get Stadia Premiere Edition for free

Source: Engadget

Article note: Oooh, my being slow to cancel my Youtube Premium because I mostly had it for Play Music (RIP) and YTM is a garbage fire just got me $100 worth of Chromecast Ultra and Stadia controller.
Google has quietly launched a killer deal for YouTube Premium members in the US and UK: free access to Stadia Premiere Edition, a $99 bundle that includes a Chromecast Ultra and Stadia Controller. Anyone with an active YouTube Premium subscription ca...
Posted in News | Leave a comment

Software development: should we stop? Maybe we should

Source: Hacker News

Article note: It's a nifty piece of writing, more thought-provoking poetry than a traditional argument. In several ways I agree. (Commented on HN:) Thinking about the state of the software world in the last several years always makes me think of Vernor Vinge's notion of a "Mature Programming Environment" from _A Deepness in the Sky_ (1999), "The word for all this is ‘mature programming environment.’ Basically, when hardware performance has been pushed to its final limit, and programmers have had several centuries to code, you reach a point where there is far more significant code than can be rationalized. The best you can do is understand the overall layering, and know how to search for the oddball tool that may come in handy" (Longer excerpt with an earlier bit about rewriting things always eventually just moving around the set of bugs, inconsistencies, and limitations rather than improving them here: http://akkartik.name/post/deepness ) And and Danny Hillis' idea about the Entanglement ( excerpt from a 2012 interview with SciAm) - "But what's happened though, and I don't think most people realize this has happened yet, is that our technology has actually now gotten so complicated that we actually no longer do understand it in that same way. So the way that we understand our technology, the most complicated pieces of technology like the Internet for example, are almost like we understand nature; which is that we understand pieces of them, we understand some basic principles according to which they operate, in which they operate. We don't really understand in detail their emerging behaviors. And so it's perfectly capable for the Internet to do something that nobody in the world can figure out why it did it and how it did it; it happens all the time actually. We don't bother to and but many things we might not be able to." (more: https://www.scientificamerican.com/podcast/episode/the-coming-entanglement-bill-joy-an-12-02-15/)
Comments
Posted in News | Leave a comment