Become a fan of Slashdot on Facebook

 



Forgot your password?
typodupeerror
×
Censorship

Google Asked to Hide TorrentFreak Article Reporting that 'The Mandalorian' Was Widely Pirated (torrentfreak.com) 72

The file-sharing blog TorrentFreak reports: Google was asked to remove a TorrentFreak article from its search results this week. The article in question reported that "The Mandalorian" was the most pirated TV show of 2020.

This notice claims to identify several problematic URLs that allegedly infringe the copyrights of Disney's hit series The Mandalorian. This is not unexpected, as The Mandalorian was the most pirated TV show of last year, as we reported in late December. However, we didn't expect to see our article as one of the targeted links in the notice. Apparently, the news that The Mandalorian is widely pirated — which was repeated by dozens of other publications — is seen as copyright infringement?

Needless to say, we wholeheartedly disagree. This is not the way.

TorrentFreak specifies that the article in question "didn't host or link to any infringing content." (TorrentFreak's article was even linked to by major sites including CNET, Forbes, Variety, and even Slashdot.)

TorrentFreak also reports that it wasn't Disney who filed the takedown request, but GFM Films... At first, we thought that the German camera company GFM could have something to do with it, as they worked on The Mandalorian. However, earlier takedown notices from the same sender protected the film "The Last Witness," which is linked to the UK company GFM Film Sales. Since we obviously don't want to falsely accuse anyone, we're not pointing fingers.
So what happens next? We will certainly put up a fight if Google decides to remove the page. At the time of writing, this has yet to happen. The search engine currently lists the takedown request as 'pending,' which likely means that there will be a manual review. The good news is that Google is usually pretty good at catching overbroad takedown requests. This is also true for TorrentFreak articles that were targeted previously, including our coverage on the Green Book screener leak.
Bitcoin

Why People's Expensive NFTs Keep Vanishing (vice.com) 189

An anonymous reader shares a report from Motherboard, written by Ben Munster: When you buy an NFT for potentially as much as an actual house, in most cases you're not purchasing an artwork or even an image file. Instead, you are buying a little bit of code that references a piece of media located somewhere else on the internet. This is where the problems begin. Ed Clements is a community manager for OpenSea who fields these kinds of problems daily. In an interview, he explained that digital artworks themselves are not immutably registered "on the blockchain" when a purchase is made. When you buy an artwork, rather, you're "minting" a new cryptographic signature that, when decoded, points to an image hosted elsewhere. This could be a regular website, or it might be the InterPlanetary File System, a large peer-to-peer file storage system.

Clements distinguished between the NFT artwork (the image) and the NFT, which is the little cryptographic signature that actually gets logged. "I use the analogy of OpenSea and similar platforms acting like windows into a gallery where your NFT is hanging," he said. "The platform can close the window whenever they want, but the NFT still exists and it is up to each platform to decide whether or not they want to close their window." [...] "Closing the window" on an NFT isn't difficult. NFTs are rendered visually only on the front-end of a given marketplace, where you see all the images on offer. All the front-end code does is sift through the alphanumeric soup on the blockchain to produce a URL that links to where the image is hosted, or less commonly metadata which describes the image. According to Clement: "the code that finds the information on the blockchain and displays the images and information is simply told, 'don't display this one.'"

An important point to reiterate is that while NFT artworks can be taken down, the NFTs themselves live inside Ethereum. This means that the NFT marketplaces can only interact with and interpret that data, but cannot edit or remove it. As long as the linked image hasn't been removed from its source, an NFT bought on OpenSea could still be viewed on Rarible, SuperRare, or whatever -- they are all just interfaces to the ledger. The kind of suppression detailed by Clements is likely the explanation for many cases of "missing" NFTs, such as one case documented on Reddit when user "elm099" complained that an NFT called "Big Boy Pants" had disappeared from his wallet. In this case, the user could see the NFT transaction logged on the blockchain, but couldn't find the image itself. In the case that an NFT artwork was actually removed at the source, rather than suppressed by a marketplace, then it would not display no matter which website you used. If you saved the image to your phone before it was removed, you could gaze at it while absorbing the aura of a cryptographic signature displayed on a second screen, but that could lessen the already-tenuous connection between NFT and artwork.
If you're unable to find a record of the token itself on the Ethereum blockchain, it "has to do with even more arcane Ethereum minutiae," writes Ben Munster via Motherboard. He explains: "NFTs are generally represented by a form of token called the ERC-721. It's just as simple to locate this token's whereabouts as ether (Ethereum's in-house currency) and other tokens such as ERC-20s. The NFT marketplace SuperRare, for instance, sends tokens directly to buyers' wallets, where their movements can be tracked rather easily. The token can then generally be found under the ERC-721 tab. OpenSea, however, has been experimenting with a new new token variant: the ERC-1155, a 'multitoken' that designates collections of NFTs.

This token standard, novel as it is, isn't yet compatible with Etherscan. That means ERC-1155s saved on Ethereum don't show up, even if we know they are on the blockchain because the payments record is there, and the 'smart contracts' which process the sale are designed to fail instantly if the exchange can't be made. [...]"

In closing, Munster writes: "This is all illustrative of a common problem with Ethereum and cryptocurrencies generally, which despite being immutable and unhackable and abstractly perfect can only be taken advantage of via unreliable third-party applications."
IT

When Employers Mandate a 'Zoom Happy Hour' (zdnet.com) 104

In his "Technically Incorrect" column, Chris Matyszczyk shares one employee's gripe about their new lockdown-incuded online workplace: Writing to New York magazine's The Cut — specifically workplace advice columnist Alison Green — the employee expressed frustration about their boss's so-called Zoom Happy Hours. "These aren't really happy hours," the employee says. "They're more 'work meetings with alcohol on Zoom,' and while they're framed as not 'technically' obligatory, they definitely are, and I get pointed comments if I choose to not attend."

Worse, they're not in actual working hours. Their boss, though, believes everyone's in lockdown, so what's the difference...? This particular boss has decreed the (not really) optional Happy Hour is between 5 p.m. and 7:30 p.m...

I was struck by new research from the University of Sydney. The academic title is: "Collecting experimental network data from interventions on critical links in workplace networks." But drift to the press release and you find: "Benefits of team-building exercises jeopardized if not truly voluntary." Lead researcher Dr. Petr Matous described the situation quite baldly: "Many workers told us that they despise team building activities and see them as a waste of time."

The researchers recommend employers try to encourage a good relationship between two employees — but to let them ultimately work it out for themselves. And Matyszczyk believes this approach makes even more sense on Zoom. "If you're on a Zoom Happy Hour with, say, 50 people, there's still only one actual conversation. Even if you want to participate, it's hard to get a word in and have it instantly understood, never mind appreciated."

That is, unless your boss decides to distribute all the online Happy Hour participants into smaller "breakout rooms"...
China

China-Based Hackers Caught Using Facebook For Targeted Spying on Uighurs (nbcnews.com) 79

NBC News reports: Facebook said Wednesday that hackers based in China used the social media platform as part of a campaign to hack and spy on diasporas of Uyghurs, the minority group the country has been accused of putting in "re-education" camps. The hackers used Facebook to identify, track and send malicious links to Uyghur activists, dissidents and journalists living in the U.S., Australia, Canada and Turkey, among other countries, Facebook said.

Facebook stopped short of directly blaming the Chinese government for sponsoring the campaign. "We can see geographic attribution based on the activity, but we can't actually prove who's behind the operation," the company's head of cybersecurity policy, Nathaniel Gleicher, said in a phone call with journalists. But Facebook did say the hackers are part of the same operation that the cybersecurity company Volexity cited in 2019 as being affiliated with the Chinese government. It published research that revealed that the country's hackers had gone to extreme measures to hack and spy on Uyghurs. They used sophisticated, previously unknown tools to load malicious code into multiple Uyghur news sites so that they would hack and spy on nearly any smartphone that visited.

"Who else would have the resources, the time and effort to go after these people? If you told me it was Iceland I'd be pretty surprised," Volexity CEO Steven Adair said in a phone call Wednesday...

Facebook's head of cyberespionage, Mike Dvilyanski, said on the call that while it had found and removed fewer than 500 accounts that sent malicious links to Uyghurs, it was "an extremely targeted operation... We were seeing them create personas on Facebook that are designed to look like journalists that focus on issues critical to the Uyghur community, that are designed to look like activists that might be standing up for the Uyghur community, designed to look like members of the community," Dvilyanski said. "Then use that as a way to trick them into clicking into these links to expose their devices."

The article also cites "multiple investigative reports" showing China "maintains re-education camps that detain an estimated 1 million Uyghurs...

"With omnipresent cameras, face recognition technology and intense collection of residents' data, it's one of the most heavily surveilled areas in the world."
China

Apple Hosts Apps Run by China Paramilitary Group Accused of Uyghur Genocide (theinformation.com) 58

Apple's App Store has been distributing more than a dozen apps created by a Chinese organization sanctioned by the U.S. [Editor's note: the link may be paywalled; alternative source] for human rights abuses against Muslim minorities in China's Xinjiang region, The Information reported Friday. From the report: The apps, which provide news, offer information about government services and help small businesses manage orders for e-commerce, ride hailing and home repairs, were created by various units of the Xinjiang Production and Construction Corps, a paramilitary organization in charge of the region's economy and security. Several Western governments and human rights groups have accused the Corps and the regional government of detaining and physically abusing or sterilizing up to 2 million Uyghurs, the ethnically Turkic residents of northwestern China. Chinese officials have repeatedly denied the allegations.
GNOME

GNOME 40 Released (phoronix.com) 49

The GNOME 40 desktop update has been released with a bunch of new improvements. Phoronix summarizes the major changes: GNOME 40 is out with the GTK4 toolkit in tow, many improvements and alterations to the GNOME Shell including major changes to the dash and workspaces, Mutter has continued refining its Wayland support, Mutter also added a native headless back-end for testing, atomic mode-setting is now supported, input handling is now done in a separate thread, and a wide variety of other improvements. And, yes, there is also the big shift in GNOME's versioning practices moving forward while still sticking to the same six month release regiment. The release announcement and release notes can be found at their respective links.
Medicine

Hospitals Hide Pricing Data From Search Results (beckershospitalreview.com) 158

According to a Wall Street Journal investigation, hospitals are blocking confidential prices from web searches with special coding embedded on their websites. It's problematic because pricing information for hospital services must be disclosed under a new federal price transparency rule that went into effect on Jan. 1. Becker's Hospital Review reports: The code prevents pages from appearing in searches, such as a hospital's name and prices, computer experts told the Journal. While the prices are still there, it requires clicking through multiple layers of pages to find them. "It's technically there, but good luck finding it," Chirag Shah, an associate computer professor at the University of Washington, told the Journal. "It's one thing not to optimize your site for searchability, it's another thing to tag it so it can't be searched. It's a clear indication of intentionality."

Hospitals burying their pricing data include those owned by HCA Healthcare and Universal Health Services as well as the University of Pennsylvania Health System, NYU Langone Health, Beaumont Health and Novant Health, according to the Journal. Penn Medicine, NYU Langone Health and Novant Health told the publication they used the blocking code to direct patients first to information they "considered more useful than raw pricing data," for which they included web links. UHS uses the blocking code to ensure consumers acknowledge a disclosure statement before viewing prices and is making no effort to hide information, a hospital spokesperson told the Journal.

After the Journal reached out to hospitals about its discovery, the search-blocking code was removed from sites including those of HCA, Penn Medicine, Beaumont, Avera Health, Ballad Health and Northern Light Health. An HCA spokesperson told the publication the search blocker was "a legacy code that we removed," and Avera, Ballad, Beaumont and Northern Light said the code had been left on their websites by mistake.

Piracy

Adobe Goes After 27-Year Old 'Pirated' Copy of Acrobat Reader 1.0 for MS-DOS (torrentfreak.com) 58

"Adobe doesn't want third-parties to pirate its software, so the company regularly sends out DMCA notices to remove infringing copies," reports TorrentFreak. In a recent tweet, F-Secure researcher Mikko Hypponen mentioned that the software company removed one of his tweets that linked to an old copy of Acrobat Reader for MS-DOS, which came out more than 27-years ago, shortly after the PDF was invented. From the report: The security researcher posted the tweet five years ago and at the time there were no issues. The message was copied a few weeks ago by his own Twitter bot, which reposts all his original tweets five years later. "They sent a DMCA notice to my bot (@mikko__2016) when it posted that tweet on the tweet's 5th anniversary. The original tweet is fine," Hypponen notes. While the original tweet is still up, the reposted message was swiftly removed by Twitter. Not just that, the bot's account was locked as well, which is standard practice nowadays.

Looking more closely at the takedown notice, we see that it was sent by the "brand protection analyst" at Incopro, which is one of Adobe's anti-piracy partners. It doesn't provide any further details on the reasons for taking it down, other than an alleged copyright infringement. Things get even more curious when we look at the full DMCA notice, posted by the Lumen database. This shows that the tweet was listed among other links, which all point to "infringing' copies of more recent software. Intriguingly, the notice also reveals that Hypponen's original tweet was targeted as well, albeit indirectly. The takedown notice lists t.co/tbAT0CH25o, which still points to the 2016 tweet today, so Twitter decided not to take action there.

We wonder if the DMCA notice is intentional at all. Over the years we have seen many bizarre takedown claims, which are often the result of automated filters. That may be a plausible explanation here as well. In that case, it shows that DMCA takedown process is far from perfect. However, if Adobe seriously has a problem with the fact that a 27-year-old copy of Acrobat Reader is being shared on an external site, it's more effective to target the site where it's hosted. Not the person who links to it in a tweet.

The Courts

Xiaomi Wins Court Ruling Blocking US Restrictions On It (livemint.com) 113

"A federal judge in Washington blocked the Defense Department from restricting U.S. investment in the Chinese smartphone manufacturer Xiaomi Corp," reports Bloomberg: In the final days of the Trump administration, the Defense Department placed Xiaomi on a list of companies with alleged links to the Chinese military, triggering financial restrictions that were scheduled to go into effect next week. But on Friday, U.S. District Judge Rudolph Contreras put a temporary halt to the ban, siding with Xiaomi in a lawsuit that argued that the move was "arbitrary and capricious" and deprived the company of its due process rights. Contreras said Xiaomi was likely to win a full reversal of the ban as the litigation unfolds and issued an initial injunction to prevent the company from suffering "irreparable harm." After the ban was announced, the smartphone manufacturer faced the prospect of being de-listed from U.S. exchanges and deleted from global benchmark indexes.

Xiaomi is the third-largest smartphone manufacturer in the world by volume. In the third quarter, it surpassed Apple Inc. in smartphone sales, according to the International Data Corporation.

Data Storage

7-Zip Developer Releases the First Official Linux Version (bleepingcomputer.com) 87

An official version of the popular 7-zip archiving program has been released for Linux for the first time. Bleeping Computer reports: Linux already had support for the 7-zip archive file format through a POSIX port called p7zip but it was maintained by a different developer. As the p7zip developer has not maintained their project for 4-5 years, 7-Zip developer Igor Pavlov decided to create a new official Linux version based on the latest 7-Zip source code. Pavlov has released 7-Zip for Linux in AMD64, ARM64, x86, and armhf versions, which users can download [via their respective links].

"These new 7-Zip binaries for Linux were linked (compiled) by GCC without -static switch. And compiled 32-bit executables (x86 and armhf) didn't work on some arm64 and amd64 systems, probably because of missing of some required .so files." "Please write here, if you have some advices how to compile and link binaries that will work in most Linux systems," Pavlov stated on his release page.

Google

Google Slams Microsoft for Trying 'To Break the Way the Open Web Works' (theverge.com) 94

Google and Microsoft engineers might collaborate on the Chromium browser code, but that hasn't stopped corporate politics between the pair. From a report: Google has launched a scathing attack on Microsoft today, accusing it of trying "to break the way the open web works in an effort to undercut a rival." Google is upset about what it believes is an attack by Microsoft to undermine the company's efforts to support journalism and publishers.

In January, Google threatened to remove its search engine from Australia, in response to a law that would force Google to pay news publishers for their content. Australia passed the law in February, just days after Google caved and cut a deal with News Corp. and other publishers that ensured its services continue to be available in Australia. In the middle of all of this, Microsoft was very public about its support of Australia's new law, and it even teamed up with European publishers to call for online platforms to reach deals to pay news outlets for content. Google isn't happy about Microsoft getting involved and this is the first big public spat we've seen since the Scroogled era. "They are now making self-serving claims and are even willing to break the way the open web works in an effort to undercut a rival," says Kent Walker, Google's head of global affairs, in a blog post. "This latest attack marks a return to Microsoft's longtime practices. Walker links to the Wikipedia entry for Fear, uncertainty, and doubt (FUD), and accuses Microsoft of muddying the waters to distract from recent security issues."

"It's no coincidence that Microsoft's newfound interest in attacking us comes on the heels of the SolarWinds attack and at a moment when they've allowed tens of thousands of their customers ... to be actively hacked via major Microsoft vulnerabilities," says Walker. "Microsoft was warned about the vulnerabilities in their system, knew they were being exploited, and are now doing damage control while their customers scramble to pick up the pieces from what has been dubbed the Great Email Robbery. So maybe it's not surprising to see them dusting off the old diversionary Scroogled playbook."

Hardware

3D-Printed, Rock Pi-Powered Screensaver Aquarium Is Serene To Behold (hothardware.com) 35

MojoKid writes: Some may think it strange to design and build an entire PC and custom enclosure, dedicated to running a 20-year-old screensaver, but retro computing fans and well-seasoned enthusiasts may remember the SereneScreen Marine Aquarium. This classic screensaver from the late 90s was created by the legendary artist of Defender of the Crown and more, Jim Sachs. SereneScreen's combination of beautiful fish and technology is still mesmerizing, so why not build a miniature, 3D-printed aquarium and power it with a single board computer like the Rock Pi X and a 1920X480 resolution IPS LCD display? That's just what product developer Colton Westrate did.

Searching for an x86 PC in a Raspberry Pi-sized form factor, Westrate chose the Rock Pi X that purportedly packs the perfunctory punch to push the Windows OS and aquarium screen saver's pulsating pixels. The Rock Pi X is based on a circa 2016 Intel x5-Z8350 processor, which is a 2-watt, quad-core Cherry Trail Atom chip. From there, with a little Fusion 360 parametric modeling, a clear acrylic napkin holder, and some serious skills, Westrate created this adorable pint-sized digital fish tank. There's a full parts list and how-to guide on HotHardware, along with links to the CAD files up on Thingiverse, so you can build yourself one too, if you're feeling inspired.

Twitter

Russia Says It's Slowing Down Twitter To Protect Citizens From Illegal Content (cnbc.com) 51

Russia has announced that it is imposing restrictions on social media platform Twitter for failing to remove illegal content from its platform. CNBC reports: The Federal Communications, Information Technology, and Mass Communications Oversight Service, also known as Roskomnadzor, announced Wednesday that it is slowing down the speed of Twitter. The communications watchdog said it was taking the measures to keep Russia's citizens safe and that it could end up blocking the service completely if Twitter doesn't respond accordingly.

Speeds will be reduced on all mobile devices and 50% of non-mobile devices, such as computers, Roskomnadzor said in a statement on its website. Roskomnadzor accused Twitter of failing to remove content that encourages minors to commit suicide, as well as child pornography, and drug use. The regulator said it asked Twitter to remove links and publications more than 28,000 times between 2017 and March 2021. It said that other social networks had been more co-operative than Twitter on removing content that encourages minors to commit suicide.

AI

Furious AI Researcher Creates Site Shaming Non-Reproducible Machine Learning Papers (thenextweb.com) 128

The Next Web tells the story of an AI researcher who discovered the results of a machine learning research paper couldn't be reproduced. But then they'd heard similar stories from Reddit's Machine Learning forum: "Easier to compile a list of reproducible ones...," one user responded.

"Probably 50%-75% of all papers are unreproducible. It's sad, but it's true," another user wrote. "Think about it, most papers are 'optimized' to get into a conference. More often than not the authors know that a paper they're trying to get into a conference isn't very good! So they don't have to worry about reproducibility because nobody will try to reproduce them." A few other users posted links to machine learning papers they had failed to implement and voiced their frustration with code implementation not being a requirement in ML conferences.

The next day, ContributionSecure14 created "Papers Without Code," a website that aims to create a centralized list of machine learning papers that are not implementable...

Papers Without Code includes a submission page, where researchers can submit unreproducible machine learning papers along with the details of their efforts, such as how much time they spent trying to reproduce the results... If the authors do not reply in a timely fashion, the paper will be added to the list of unreproducible machine learning papers.

Apple

Apple Forced To Add iPhone and MacBook Repairability Scores To Comply With French Law (theverge.com) 88

Apple has added iPhone and MacBook repairability scores to its online store in France to comply with a new French law that came into effect this year. From a report: MacGeneration reports that the rating takes into account features like how easily a device can be disassembled and the availability of repair manuals and spare parts. Links to each product's final score, with details for how they were calculated, are available on this support page. The ratings for Apple's products vary between products and generations. Its iPhone 12 lineup all have scores of six out of 10 for example, while the previous year's iPhone 11s are rated lower at between 4.5 and 4.6. The improvement, according to the detailed scoring assessment, is due to the newer iPhones being easier to dismantle than the previous year's models, and spare parts being cheaper compared to the cost of the phone itself. There's less of a spread between the company's different MacBook models, whose scores range from 5.6 to 7.
Facebook

Facebook Strikes Last-Minute Deal With Australia Around News Content (axios.com) 96

Facebook on Monday said it had struck a deal with Australian lawmakers to pay local publishers for their news content, after the government finally agreed to change some of the terms within its new media code. From a report: The agreement ends Facebook's temporary ban on sharing news links on its platform in the country. Data showed that the link-sharing ban caused news traffic to plummet in the region. It also ends Facebook's global ban on users' sharing links to Australian news publishers. Facebook's decision to stop link-sharing was made in response to a new law that would have forced Google and Facebook to pay Australian news publishers for content, including headlines and links, with terms set by a third party, if they weren't able to come up with payout agreements with local publishers themselves. Google struck last-minute payout deals with big Australian publishers last week so that it wouldn't have to skirt the law and pull Google Search from the country. Facebook did not. The law was intended to benefit publishers, but the impact of Facebook's link ban showed the power the tech giants have over publishers, who lost a large volume of traffic during the confrontation.
China

WHO Team Member to New York Times: What We Learned in China (nytimes.com) 168

Peter Daszak is part of the World Health Organization's 14-member team investigating the origins of the coronavirus. This weekend on Twitter he described "explaining key findings of our exhausting month-long work in China" to journalists — only to see team members "selectively misquoted to fit a narrative that was prescribed before the work began."

Daszak was responding to a New York Times article which painted China as uncooperative for failing to hand over some raw data. But ironically, the next day the Times published a longer interview they'd done with Daszak, which acknowledges that Daszak "said that the visit had provided some new clues..."

The Times had even specifically asked him if China's attitude made their work difficult, to which Daszak had explicitly answered: no. "You've got a task to do. You've volunteered. You know what it's going to be like. You get caught up in the historical importance. I don't know if we were the first foreigners to walk around the Huanan seafood market, which is blocked off even to Chinese citizens. The only people that have been in there have been the Chinese disease investigators. We met with the doctors that treated the first known Covid patients."
The Times also asked if they'd learned anything they didn't know before. Daszak's response: From Day 1, the data we were seeing were new that had never been seen outside China. Who were the vendors in the Huanan seafood market? Where did they get their supply chains? And what were the contacts of the first cases? How real were the first cases? What other clusters were there? When you asked for more, the Chinese scientists would go off, and a couple of days later, they've done the analysis, and we've got new information. It was extremely useful.
The team also learned how extensively China's disease-control center had investigated the Wuhan market: They'd actually done over 900 swabs in the end, a huge amount of work. They had been through the sewage system. They'd been into the air ventilation shaft to look for bats. They'd caught animals around the market. They'd caught cats, stray cats, rats, they even caught one weasel. They'd sampled snakes. People had live snakes at the market, live turtles, live frogs. Rabbits were there, rabbit carcasses... Animals were coming into that market that could have carried the coronavirus. They could have been infected by bats somewhere else in China and brought it in. So that's clue No. 1... Some of these are coming from places where we know the nearest relatives of the virus are found. So there's the real red flag...

There were other markets. And we do know that some of the patients had links to other markets. We need to do some further work, and then the Chinese colleagues need to do some further work...

What is the next step?

For the animals chain, it's straightforward. The suppliers are known. They know the farm name; they know the owner of the farm. You've got to go down to the farm and interview the farmer and the family. You've got to test them. You've got to test the community. You've got to go and look and see if there are any animals left at any farms nearby and see if they've got evidence of infection, and see if there is any cross-border movement.

The Times' interview begins by specifically acknowledging Daszak's statement about new information obtained on the visit, "which all of the scientists, Chinese and international, agreed most likely pointed to an animal origin within China or Southeast Asia.

"The scientists have largely discounted claims that the virus originated in a lab, saying that possibility was so unlikely that it was not worth further investigation."
Microsoft

Microsoft Urges America to Force Google and Facebook to Pay for News (theregister.com) 81

"Microsoft has said the USA should copy Australia's plan to force Google and Facebook to pay for links to news content," reports The Register, "and suggested that doing so will help improve social cohesion and strengthen democracy." But Google has fired back with a statement asserting that Microsoft's motives are impure. "Of course they'd be eager to impose an unworkable levy on a rival and increase their market share," wrote Kent Walker, Google's chief legal officer.

Microsoft's suggestion to the Biden administration came from company president Brad Smith arrived in a Thursday blog post that opens: "As the dust slowly settles on a horrifying assault on the Capitol, it's apparent that American democracy is in a fragile state." Smith attributed much of that fragility to disinformation spreading on social media and "the erosion of more traditional, independent and professional journalism... The internet eroded the news business as dotcoms like Craigslist disrupted advertising revenue, news aggregators lured away readers, and search engines and social media giants devoured both," Smith wrote...

Smith also points out that Microsoft's decision to support Australia's plan and pay local news outlets quickly saw Google CEO Sundar Pichai call Australian prime minister Scott Morrison, then asserts that Pichai only did so once the prospect of increased competition roused him to action.

"At the end of the day, what is wrong with compensating independent news organizations for the benefits the tech gatekeepers derive from this content?" Smith asks.

Science

Can Dark Matter Be Explained By a Link to a Fifth Dimension? (popularmechanics.com) 107

The standard model of physics can't accommodate some observed phenomena, notes Popular Mechanics. Yet "In a new study, scientists say they can explain dark matter by positing a particle that links to a fifth dimension." While the "warped extra dimension" (WED) is a trademark of a popular physics model first introduced in 1999, this research, published in The European Physical Journal C, is the first to cohesively use the theory to explain the long-lasting dark matter problem within particle physics...

The scientists studied fermion masses, which they believe could be communicated into the fifth dimension through portals, creating dark matter relics and "fermionic dark matter" within the fifth dimension.

Could dimension-traveling fermions explain at least some of the dark matter scientists have so far not been able to observe? "We know that there is no viable [dark matter] candidate in the [standard model of physics]," the scientists say, "so already this fact asks for the presence of new physics...." This pocket "dark sector" is one possible way to explain the huge amount of dark matter that, so far, has eluded detection using any traditional measurements designed for the standard model of physics. Fermions jammed through a portal to a warped fifth dimension could be "acting as" dark matter...

All it would take to identify fermionic dark matter in a warped fifth dimension would be the right kind of gravitational wave detector, something growing in prevalence around the world. Indeed, the answer to the dark matter conundrum could be just around the corner.

Social Networks

Misleading Viral Claims Show Dangers of Preprint Servers, Researchers Warn (washingtonpost.com) 48

Scientific researchers worry that the capacity for spreading misinformation "goes far beyond the big-name social media sites," warns the Washington Post. Citing pre-print servers and unvetted "research repositories," they note that "Any online platform without robust and potentially expensive safeguards is equally vulnerable." "This is similar to the debate we're having with Facebook and Twitter. To what degree are we creating an instrument that speeds disinformation, and to what extent are you contributing to that?" said Stefano M. Bertozzi, editor in chief of the MIT Press online journal "Rapid Reviews: COVID-19...." Bertozzi added, "Most scientists have no interest in getting in a pissing match in cyberspace..."

Nonscientists also scan preprint servers for data that might appear to bolster their pet conspiracy theories. A research team led by computer scientist Jeremy Blackburn has tracked the appearance of links to preprints from social media sites, such as 4chan, popular with conspiracy theorists. Blackburn and a graduate student, Satrio Yudhoatmojo, found more than 4,000 references on 4chan to papers on major preprint servers between 2016 and 2020, with the leading subjects being biology, infectious diseases and epidemiology. He said the uneven review process has "lent an air of credibility" to preprints that experts might quickly spot as flawed but ordinary people wouldn't.

"That's where the risk is," said Blackburn, an assistant professor at Binghamton University. "Papers from the preprint servers show up in a variety of conspiracy theories...and are misinterpreted wildly because these people aren't scientists..."

[The executive director of ASAPbio, a nonprofit group that pushes for more transparency and wider use of preprint servers], added, in general, "Preprint servers do not have the resources to be arbiters of whether something is true or not."

MIT Press's new "Rapid Reviews: COVID-19" journal recently appended a scathing editor's note to its critique of articles that had been published on pre-print servers.

"While pre-print servers offer a mechanism to disseminate world-changing scientific research at unprecedented speed, they are also a forum through which misleading information can instantaneously undermine the international scientific community's credibility, destabilize diplomatic relationships, and compromise global safety."

Slashdot Top Deals

I owe the public nothing. -- J.P. Morgan

Working...