Author name: Shannon Garcia

the-next-two-fifa-women’s-world-cups-will-only-air-on-netflix

The next two FIFA Women’s World Cups will only air on Netflix

FIFA’s announcement suggested that it expects to reach a larger audience and increase US engagement by airing on Netflix. FIFA said that 1.2 billion people watched the 2019 Women’s World Cup, ESPN noted. Netflix has already demonstrated the ability to lure a massive amount of viewers to exclusive sports matches. In November, Netflix claimed the “most-streamed sporting event ever” when it streamed a boxing event centered on a Mike Tyson and Jake Paul fight and reportedly garnered 65 million live concurrent streams.

Per FIFA’s announcement, Netflix will stream the tournaments in English and Spanish via a “dual telecast.” Under the deal, Netflix will also release a documentary series about the biggest players ahead of both tournaments. Brazil will host the 2027 event, while the host country for the 2031 Women’s World Cup has yet to be announced.

The news comes as streaming platforms continue battling over sports. Currently, Disney, Warner Bros. Discovery, and Fox are in a legal battle over plans to launch a joint sports streaming app, Venu, which is being challenged by sports streamer Fubo over antitrust allegations. The case is set to go to trial in October.

Meanwhile, fans are adjusting to changes in how sports events are aired, learning to bounce between channels and streaming services to find their events and dealing with buffering and other technical problems. At times, some of the biggest fans, like NFL player Tariq Woolen, have resorted to illegal pirating to avoid complications and fees, underscoring pressure for streaming services to perfect and simplify the streaming of the live events that they’re eagerly snatching up.

The next two FIFA Women’s World Cups will only air on Netflix Read More »

google-will-apparently-offer-“ai-mode”-right-on-its-main-search-page

Google will apparently offer “AI Mode” right on its main search page

Google will soon take more steps to make AI a part of search, exposing more users to its Gemini agent, according to recent reports and app teardowns.

“AI Mode,” shown at the top left of the web results page and inside the Google app, will provide an interface similar to a Gemini AI chat, according to The Information.

This tracks with a finding from Android Authority earlier this month, which noted a dedicated “AI mode” button inside an early beta of the Google app. This shortcut also appeared on Google’s Android search widget, and a conversation history button was added to the Google app. Going even deeper into the app, 9to5Google found references to “aim” (AI mode) and “ai_mode” which suggest a dedicated tab in the Google app, with buttons for speaking to an AI or sending it pictures.

Google already promotes Gemini with links below its search homepage. (“5 ways Gemini can help during the Holidays” is currently showing for me.) Search results on Google can also contain an “AI Overview,” which launched with some “use glue for pizza sauce” notoriety. People averse to AI answers can avoid them with URL parameters and proxy sites (or sticking to the “web” tab). Gemini has also been prominently added to other Google products, like Pixel phones, Gmail, and Drive/Workspace. And the search giant has also been testing the ability to attach files to a web search for analysis.

Google will apparently offer “AI Mode” right on its main search page Read More »

amazon’s-rto-delays-exemplify-why-workers-get-so-mad-about-mandates

Amazon’s RTO delays exemplify why workers get so mad about mandates

Concern about RTO planning is underscored by Amazon reportedly lacking enough space for its current in-office policy. Bloomberg said that “in recent interviews, employees complained of working from shared desks, crowded corporate canteens, and a lack of conference rooms for confidential calls or team meetings.”

The publication also pointed to employee displeasure with having to work in an office full-time when other tech firms have more lax policies. This could result in Amazon losing some of its best talent. Per the study from the University of Pittsburgh, Baylor University, The Chinese University of Hong Kong, and Cheung Kong Graduate School of Business researchers, senior, skilled workers are more likely to depart a company over an RTO mandate because they have “more connections with other companies.”

Employees eyeing greener pastures could put Amazon at risk of losing some of its most experienced employees. That also reportedly happened to Apple, Microsoft, and SpaceX following their RTO mandates, per a May study from University of Chicago and University of Michigan researchers (PDF). Following Amazon’s RTO announcement, 73 percent of 2,285 workers that Blind surveyed said they were “considering looking for another job” due to the rule change.

Finally, banning remote work while giving workers a few months to figure out how to adjust resulted in a lot of negative discourse, including Garman reportedly telling workers that if they don’t work well in offices, “that’s okay; there are other companies around.” As the November RTO study put it:

“An RTO announcement can be a big and sudden event that is distasteful to most employees, especially when the decision has not been well communicated, potentially triggering an immediate response of employees searching for and switching to new jobs.”

If Amazon had communicated RTO dates with greater accuracy once office plans were finalized, it could have alleviated some of the drama that followed the announcement and the negative impact that had on employee morale.

For its part, Amazon has instituted a tool for reserving conference rooms, which requires workers to commit to using the space so it’s not wasted, Bloomberg reported.

But with companies now having had years to plot their RTO approaches, employees are expecting more accurate communication and smooth transitions that align with their respective department’s culture. Amazon’s approach missed those marks.

Amazon’s RTO delays exemplify why workers get so mad about mandates Read More »

“unprecedented”-decline-in-teen-drug-use-continues,-surprising-experts

“Unprecedented” decline in teen drug use continues, surprising experts

A new era

“Kids who were in eighth grade at the start of the pandemic will be graduating from high school this year, and this unique cohort has ushered in the lowest rates of substance use we’ve seen in decades,” Miech noted.

For alcohol, use in the past 12 months among eighth graders was at 12.9 percent in 2024, similar to 2023 levels, which are all-time lows. For 10th graders, the rate dropped significantly from 30.6 percent in 2023 to 26.1 percent, and for 12th graders, from 45.7 percent to 41.7 percent—both record lows.

For nicotine vaping, rates fell for 10th graders (from 17.5 percent to 15.4 percent) and remained at low levels for eighth and 12th graders. For marijuana, use remained low for eighth and 10th graders and fell significantly for 12th graders (from 29 percent to 25.8 percent). All three grades are at lows not seen since 1990.

For abstainers from alcohol, marijuana, and nicotine in the prior 30 days, the rate among eighth graders hit 90 percent, up from 87 percent in 2017, when it was first measured. The rate was 80 percent among 10th graders, up from 69 percent in 2017, and 67 percent for 12th graders, up from 53 percent in 2017.

“This trend in the reduction of substance use among teenagers is unprecedented,” Nora Volkow, director of NIH’s National Institute on Drug Abuse (NIDA), said. “We must continue to investigate factors that have contributed to this lowered risk of substance use to tailor interventions to support the continuation of this trend.”

“Unprecedented” decline in teen drug use continues, surprising experts Read More »

here’s-the-new-hybrid-honda-prelude,-on-sale-late-2025

Here’s the new hybrid Honda Prelude, on sale late 2025

The fact that Honda was working on a new Prelude coupe was not entirely secret—not after the automaker unveiled a show car at this year’s Long Beach Grand Prix. This morning, the Japanese automaker confirmed that the new Prelude will go on sale here in the US late in 2025.

“The return of the Honda Prelude as a hybrid-electric sports model demonstrates our continued commitment to offer a variety of exhilarating products to meet the needs of our customers,” said Jessika Laudermilk, assistant vice president of Honda Auto Sales. “The first three products in the Honda lineup in the 1970s were Civic, Accord, and Prelude, and soon all three will be back together again in our passenger car lineup as hybrids.”

Honda has often used the two-door Prelude coupe as a testbed for new technologies, including torque vectoring and four-wheel steering, and was praised by the late automotive writer LJK Setright, who owned several Preludes across the years.

An innovation in the next Prelude will be a new drive mode, called Honda S+ Shift, which it says “advances linear shift control to deliver maximum levels of driver engagement.” But as the Prelude will use a hybrid powertrain, there won’t be an option for a manual transmission in this generation.

Beyond that, Honda is keeping quiet on Prelude details until closer to the car’s arrival on sale next year.

Here’s the new hybrid Honda Prelude, on sale late 2025 Read More »

in-it?-need-cash?-cybersecurity-whistleblowers-are-earning-big-payouts.

In IT? Need cash? Cybersecurity whistleblowers are earning big payouts.

Matthew Decker is the former chief information officer for Penn State University’s Applied Research Laboratory. As of October, he’s also $250,000 richer.

In his Penn State position, Decker was well placed to see that the university was not implementing all of the cybersecurity controls that were required by its various contracts with NASA and the Department of Defense (DoD). It did not, for instance, use an external cloud services provider that met the DoD’s security guidelines, and it fudged some of the self-submitted “scores” it made to the government about Penn State’s IT security.

So Decker sued the school under the False Claims Act, which lets private individuals bring cases against organizations on behalf of the government if they come across evidence of wrongdoing related to government contracts. In many of these cases, the government later “intervenes” to assist with the case (as it did here), but whether it does so or not, whistleblowers stand to collect a percentage of any fines if they win.

In October, Penn State agreed to a $1.25 million settlement with the government; Decker got $250,000 of the money.

On the regular

This now happens in IT with some regularity. In November, Dell, Dell Federal Systems, and Iron Bow Technologies settled with the government for $4.3 million over claims that they “violated the False Claims Act by submitting and causing the submission of non-competitive bids to the Army and thereby overcharging the Army under the Army Desktop and Mobile Computing 3 (ADMC-3) contract.”

But once again, this wasn’t something the government uncovered on its own; a whistleblower named Brent Lillard, who was an executive at another company in the industry, brought the initial complaint. For his work, Lillard just made $345,000.

In early December, Gen Digital (formerly Symantec) paid a much larger fee—$55.1 million—after losing a trial in 2022. Gen Digital/Symantec was found liable for charging the government higher prices than it charged to companies.

Once again, the issue was brought to light by a whistleblower, Lori Morsell, who oversaw the contract for Gen Digital/Symantec. Morsell’s award has not yet been determined by the court, but given the amount of the payout, it should be substantial.

False Claims Act goes digital

Due to the complexity of investigating—or even finding out about—technical failures and False Claims Act cases from the outside of an organization, the government has increasingly relied on whistleblowers to kick-start these sorts of IT cases.

In IT? Need cash? Cybersecurity whistleblowers are earning big payouts. Read More »

hackers-seek-ransom-after-getting-ssns,-banking-info-from-state-gov’t-portal

Hackers seek ransom after getting SSNs, banking info from state gov’t portal

Hackers trying to extort the Rhode Island government infiltrated the state’s public benefits system, causing state officials to shut down online services that let residents apply for Medicaid and other assistance programs.

“As part of this investigation today, we discovered that within the Rhode Island Bridges system, a cybercriminal had installed dangerous malware that constituted an urgent threat,” Governor Dan McKee said at a Friday night press conference, according to The Providence Journal. “That is why tonight we have shut down the system. That means customers will temporarily not be able to access any customer portal related to the services on Rhode Island Bridges.”

The vendor “Deloitte confirmed that there is a high probability that a cybercriminal has obtained files with personally identifiable information from RIBridges,” McKee’s office said in a press release. Rhode Island has “proactively taken the system offline so that the State and Deloitte can work to address the threat and restore the system as quickly as possible.”

The state decided to sign a new three-year contract with Deloitte in 2021 despite its earlier failure to build a stable system. RIBridges, originally called Unified Health Infrastructure Project (UHIP), launched in 2016 and “suffered from massive cost overruns before launch and catastrophic failures afterward,” WPRI wrote in 2021.

The hack disclosed on Friday has already inspired a class-action lawsuit against Deloitte. The lawsuit was filed in a federal court yesterday.

Many state programs impacted

Information obtained by hackers “may include names, addresses, dates of birth and Social Security numbers, as well as certain banking information,” the governor’s office said Friday, noting that analysis of the breach was not complete.

“To the best of our knowledge, any individual who has received or applied for health coverage and/or health and human services programs or benefits could be impacted by this leak,” the governor’s office said. This includes Medicaid, Supplemental Nutrition Assistance Program (SNAP), Temporary Assistance for Needy Families (TANF), Child Care Assistance Program (CCAP), health coverage purchased through HealthSource RI, Rhode Island Works (RIW), Long-Term Services and Supports (LTSS), and the General Public Assistance (GPA) Program.

An updates page said the state and Deloitte are still “focused on addressing the threat” and aren’t yet saying when the RIBridges system will be restored. “We understand this is an alarming situation for our customers. Current customers will not be able to log into their account through the portal or the mobile app while the system is offline… Rhode Islanders seeking to apply for benefits can still submit a paper application.”

Hackers seek ransom after getting SSNs, banking info from state gov’t portal Read More »

t-mobile-users-can-try-starlink-enabled-phone-service-for-free-during-beta

T-Mobile users can try Starlink-enabled phone service for free during beta

T-Mobile today said it opened registration for the “T-Mobile Starlink” beta service that will enable text messaging via satellites in dead zones not covered by cell towers.

T-Mobile’s announcement said the service using Starlink’s low-Earth orbit satellites will “provid[e] coverage for the 500,000 square miles of land in the United States not covered by earth-bound cell towers.” Starlink parent SpaceX has so far launched over 300 satellites with direct-to-cell capabilities, T-Mobile noted.

A registration page says, “We expect the beta to begin in early 2025, starting with texting and expanding to data and voice over time. The beta is open to all T-Mobile postpaid customers for free, but capacity is limited.”

T-Mobile said the beta “is expected to work with most modern mobile phones” but will work best with “select smartphones.” People with those “select” devices will apparently have a better chance of getting into the beta.

“T-Mobile postpaid customers with optimized devices will be admitted on a ‘first come, first served’ basis,” T-Mobile said. “We’ll expand the beta to more customers and more devices as more satellites launch.”

Businesses and first responders can also register. “Because of the critical role these first responder agencies and individuals play in safeguarding our communities, T-Mobile is prioritizing this audience for the beta program,” the carrier said.

Commercial service sometime in 2025

T-Mobile said the commercial service will launch “sometime in 2025” but did not say how much it will cost.

T-Mobile users can try Starlink-enabled phone service for free during beta Read More »

the-optical-disc-onslaught-continues,-with-lg-quitting-blu-ray-players

The optical disc onslaught continues, with LG quitting Blu-ray players

Speaking of things staying the same, Blu-rays and DVDs also won’t have their content altered after purchase, as we’ve seen happen to digital versions of media.

While certainly in decline, the US Blu-ray and DVD disc market made $1.34 billion in the year ending in March 2023, according to market research group Circana. Data from the first half of 2024 from entertainment trade association The Digital Entertainment Group (DEG) found that while overall Blu-ray and DVD sales declined 22.2 percent during that time period, there were some areas of growth, too:

Consumers continue to show strong demand for collectible disc formats with SteelBooks, [or Blu-rays sold in collectible steel cases], up 44 percent and 4K UHD Blu-ray catalog sales growing by 16 percent.

A Dune: Part Two SteelBook. Credit: Steelbook

Furthermore, sales of newly released Blu-rays decreased more slowly, at 14 percent, according to DEG. A look at the top-selling Blu-rays for the week ending on November 30 based on data from Circana shows recent films, like Beetlejuice Beetlejuice and Deadpool & Wolverine, topping the list.

And it was only about a year ago that 4K Blu-rays of the megahit Oppenheimer actually sold out.

There are still options

For those interested in a new Blu-ray player, though, the options are more limited with LG exiting the market, but that doesn’t mean you’re out of luck. Even though brands like Panasonic and Sony haven’t made new Blu-ray players in years, they continue to sell them. And the market still sees the occasional new release, such as the Magnetar UPD900 that came out last year.

With the benefits of physical media still present, the demise of LG Blu-ray players is notable, but not defining, for physical media aficionados.

For those who don’t want to use their Blu-ray player anymore, there’s always the option to turn it into a laser-scanning microscope.

The optical disc onslaught continues, with LG quitting Blu-ray players Read More »

photobucket-opted-inactive-users-into-privacy-nightmare,-lawsuit-says

Photobucket opted inactive users into privacy nightmare, lawsuit says

Photobucket was sued Wednesday after a recent privacy policy update revealed plans to sell users’ photos—including biometric identifiers like face and iris scans—to companies training generative AI models.

The proposed class action seeks to stop Photobucket from selling users’ data without first obtaining written consent, alleging that Photobucket either intentionally or negligently failed to comply with strict privacy laws in states like Illinois, New York, and California by claiming it can’t reliably determine users’ geolocation.

Two separate classes could be protected by the litigation. The first includes anyone who ever uploaded a photo between 2003—when Photobucket was founded—and May 1, 2024. Another potentially even larger class includes any non-users depicted in photographs uploaded to Photobucket, whose biometric data has also allegedly been sold without consent.

Photobucket risks huge fines if a jury agrees with Photobucket users that the photo-storing site unjustly enriched itself by breaching its user contracts and illegally seizing biometric data without consent. As many as 100 million users could be awarded untold punitive damages, as well as up to $5,000 per “willful or reckless violation” of various statutes.

If a substantial portion of Photobucket’s entire 13 billion-plus photo collection is found infringing, the fines could add up quickly. In October, Photobucket estimated that “about half of its 13 billion images are public and eligible for AI licensing,” Business Insider reported.

Users suing include a mother of a minor whose biometric data was collected and a professional photographer in Illinois who should have been protected by one of the country’s strongest biometric privacy laws.

So far, Photobucket has confirmed that at least one “alarmed” Illinois user’s data may have already been sold to train AI. The lawsuit alleged that most users eligible to join the class action likely similarly only learned of the “conduct long after the date that Photobucket began selling, licensing, and/or otherwise disclosing Class Members’ biometric data to third parties.”

Photobucket opted inactive users into privacy nightmare, lawsuit says Read More »

amd’s-trusted-execution-environment-blown-wide-open-by-new-badram-attack

AMD’s trusted execution environment blown wide open by new BadRAM attack


Attack bypasses AMD protection promising security, even when a server is compromised.

One of the oldest maxims in hacking is that once an attacker has physical access to a device, it’s game over for its security. The basis is sound. It doesn’t matter how locked down a phone, computer, or other machine is; if someone intent on hacking it gains the ability to physically manipulate it, the chances of success are all but guaranteed.

In the age of cloud computing, this widely accepted principle is no longer universally true. Some of the world’s most sensitive information—health records, financial account information, sealed legal documents, and the like—now often resides on servers that receive day-to-day maintenance from unknown administrators working in cloud centers thousands of miles from the companies responsible for safeguarding it.

Bad (RAM) to the bone

In response, chipmakers have begun baking protections into their silicon to provide assurances that even if a server has been physically tampered with or infected with malware, sensitive data funneled through virtual machines can’t be accessed without an encryption key that’s known only to the VM administrator. Under this scenario, admins inside the cloud provider, law enforcement agencies with a court warrant, and hackers who manage to compromise the server are out of luck.

On Tuesday, an international team of researchers unveiled BadRAM, a proof-of-concept attack that completely undermines security assurances that chipmaker AMD makes to users of one of its most expensive and well-fortified microprocessor product lines. Starting with the AMD Epyc 7003 processor, a feature known as SEV-SNP—short for Secure Encrypted Virtualization and Secure Nested Paging—has provided the cryptographic means for certifying that a VM hasn’t been compromised by any sort of backdoor installed by someone with access to the physical machine running it.

If a VM has been backdoored, the cryptographic attestation will fail and immediately alert the VM admin of the compromise. Or at least that’s how SEV-SNP is designed to work. BadRAM is an attack that a server admin can carry out in minutes, using either about $10 of hardware, or in some cases, software only, to cause DDR4 or DDR5 memory modules to misreport during bootup the amount of memory capacity they have. From then on, SEV-SNP will be permanently made to suppress the cryptographic hash attesting its integrity even when the VM has been badly compromised.

“BadRAM completely undermines trust in AMD’s latest Secure Encrypted Virtualization (SEV-SNP) technology, which is widely deployed by major cloud providers, including Amazon AWS, Google Cloud, and Microsoft Azure,” members of the research team wrote in an email. “BadRAM for the first time studies the security risks of bad RAM—rogue memory modules that deliberately provide false information to the processor during startup. We show how BadRAM attackers can fake critical remote attestation reports and insert undetectable backdoors into _any_ SEV-protected VM.”

Compromising the AMD SEV ecosystem

On a website providing more information about the attack, the researchers wrote:

Modern computers increasingly use encryption to protect sensitive data in DRAM, especially in shared cloud environments with pervasive data breaches and insider threats. AMD’s Secure Encrypted Virtualization (SEV) is a cutting-edge technology that protects privacy and trust in cloud computing by encrypting a virtual machine’s (VM’s) memory and isolating it from advanced attackers, even those compromising critical infrastructure like the virtual machine manager or firmware.

We found that tampering with the embedded SPD chip on commercial DRAM modules allows attackers to bypass SEV protections—including AMD’s latest SEV-SNP version. For less than $10 in off-the-shelf equipment, we can trick the processor into allowing access to encrypted memory. We build on this BadRAM attack primitive to completely compromise the AMD SEV ecosystem, faking remote attestation reports and inserting backdoors into any SEV-protected VM.

In response to a vulnerability report filed by the researchers, AMD has already shipped patches to affected customers, a company spokesperson said. The researchers say there are no performance penalties, other than the possibility of additional time required during boot up. The BadRAM vulnerability is tracked in the industry as CVE-2024-21944 and AMD-SB-3015 by the chipmaker.

A stroll down memory lane

Modern dynamic random access memory for servers typically comes in the form of DIMMs, short for Dual In-Line Memory Modules. The basic building block of these rectangular sticks are capacitors, which, when charged, represent a binary 1 and, when discharged, represent a 0. The capacitors are organized into cells, which are organized into arrays of rows and columns, which are further arranged into ranks and banks. The more capacitors that are stuffed into a DIMM, the more capacity it has to store data. Servers usually have multiple DIMMs that are organized into channels that can be processed in parallel.

For a server to store or access a particular piece of data, it first must locate where the bits representing it are stored in this vast configuration of transistors. Locations are tracked through addresses that map the channel, rank, bank row, and column. For performance reasons, the task of translating these physical addresses to DRAM address bits—a job assigned to the memory controller—isn’t a one-to-one mapping. Rather, consecutive addresses are spread across different channels, ranks, and banks.

Before the server can map these locations, it must first know how many DIMMs are connected and the total capacity of memory they provide. This information is provided each time the server boots, when the BIOS queries the SPD—short for Serial Presence Detect—chip found on the surface of the DIMM. This chip is responsible for providing the BIOS basic information about available memory. BadRAM causes the SPD chip to report that its capacity is twice what it actually is. It does this by adding an extra addressing bit.

To do this, a server admin need only briefly connect a specially programmed Raspberry Pi to the SPD chip just once.

The researchers’ Raspberry Pi connected to the SPD chip of a DIMM. Credit: De Meulemeester et al.

Hacking by numbers, 1, 2, 3

In some cases, with certain DIMM models that don’t adequately lock down the chip, the modification can likely be done through software. In either case, the modification need only occur once. From then on, the SPD chip will falsify the memory capacity available.

Next, the server admin configures the operating system to ignore the newly created “ghost memory,” meaning the top half of the capacity reported by the compromised SPD chip, but continue to map to the lower half of the real memory. On Linux, this configuration can be done with the `memmap` kernel command-line parameter. The researchers’ paper, titled BadRAM: Practical Memory Aliasing Attacks on Trusted Execution Environments, provides many more details about the attack.

Next, a script developed as part of BadRAM allows the attacker to quickly find the memory locations of ghost memory bits. These aliases give the attacker access to memory regions that SEV-SNP is supposed to make inaccessible. This allows the attacker to read and write to these protected memory regions.

Access to this normally fortified region of memory allows the attacker to copy the cryptographic hash SEV-SNP creates to attest to the integrity of the VM. The access also permits the attacker to boot an SEV-compliant VM that has been backdoored. Normally, this malicious VM would trigger a warning in the form of a cryptographic hash. BadRAM allows the attacker to replace this attestation failure hash with the attestation success hash collected earlier.

The primary steps involved in BadRAM attacks are:

  1. Compromise the memory module to lie about its size and thus trick the CPU into accessing the nonexistent ghost addresses that have been silently mapped to existing memory regions.
  2. Find aliases. These addresses map to the same DRAM location.
  3. Bypass CPU Access Control. The aliases allow the attacker to bypass memory protections that are supposed to prevent the reading of and writing to regions storing sensitive data.

Beware of the ghost bit

For those looking for more technical details, Jesse De Meulemeester, who along with Luca Wilke was lead co-author of the paper, provided the following, which more casual readers can skip:

In our attack, there are two addresses that go to the same DRAM location; one is the original address, the other one is what we call the alias.

When we modify the SPD, we double its size. At a low level, this means all memory addresses now appear to have one extra bit. This extra bit is what we call the “ghost” bit, it is the address bit that is used by the CPU, but is not used (thus ignored) by the DIMM. The addresses for which this “ghost” bit is 0 are the original addresses, and the addresses for which this bit is 1 is the “ghost” memory.

This explains how we can access protected data like the launch digest. The launch digest is stored at an address with the ghost bit set to 0, and this address is protected; any attempt to access it is blocked by the CPU. However, if we try to access the same address with the ghost bit set to 1, the CPU treats it as a completely new address and allows access. On the DIMM side, the ghost bit is ignored, so both addresses (with ghost bit 0 or 1) point to the same physical memory location.

A small example to illustrate this:

Original SPD: 4 bit addresses:

CPU: address 1101 -> DIMM: address 1101

Modified SPD: Reports 5 bits even though it only has 4:

CPU: address 01101 -> DIMM: address 1101

CPU: address 11101 -> DIMM: address 1101

In this case 01101 is the protected address, 11101 is the alias. Even though to the CPU they seem like two different addresses, they go to the same DRAM location.

As noted earlier, some DIMM models don’t lock down the SPD chip, a failure that likely makes software-only modifications possible. Specifically, the researchers found that two DDR4 models made by Corsair contained this flaw.

In a statement, AMD officials wrote:

AMD believes exploiting the disclosed vulnerability requires an attacker either having physical access to the system, operating system kernel access on a system with unlocked memory modules, or installing a customized, malicious BIOS. AMD recommends utilizing memory modules that lock Serial Presence Detect (SPD), as well as following physical system security best practices. AMD has also released firmware updates to customers to mitigate the vulnerability.

Members of the research team are from KU Leuven, the University of Lübeck, and the University of Birmingham. Specifically, they are:

The researchers tested BadRAM against the Intel SGX, a competing microprocessor sold by AMD’s much bigger rival promising integrity assurances comparable to SEV-SNP. The classic, now-discontinued version of the SGX did allow reading of protected regions, but not writing to them. The current Intel Scalable SGX and Intel TDX processors, however, allowed no reading or writing. Since a comparable Arm processor wasn’t available for testing, it’s unknown if it’s vulnerable.

Despite the lack of universality, the researchers warned that the design flaws underpinning the BadRAM vulnerability may creep into other systems and should always use the mitigations AMD has now put in place.

“Since our BadRAM primitive is generic, we argue that such countermeasures should be considered when designing a system against untrusted DRAM,” the researchers wrote in their paper. “While advanced hardware-level attacks could potentially circumvent the currently used countermeasures, further research is required to judge whether they can be carried out in an impactful attacker model.”

Photo of Dan Goodin

Dan Goodin is Senior Security Editor at Ars Technica, where he oversees coverage of malware, computer espionage, botnets, hardware hacking, encryption, and passwords. In his spare time, he enjoys gardening, cooking, and following the independent music scene. Dan is based in San Francisco. Follow him at here on Mastodon and here on Bluesky. Contact him on Signal at DanArs.82.

AMD’s trusted execution environment blown wide open by new BadRAM attack Read More »

paleolithic-deep-cave-compound-likely-used-for-rituals

Paleolithic deep-cave compound likely used for rituals

Archaeologists excavating a paleolithic cave site in Galilee, Israel, have found evidence that a deep-cave compound at the site may have been used for ritualistic gatherings, according to a new paper published in the Proceedings of the National Academy of Sciences (PNAS). That evidence includes the presence of a symbolically carved boulder in a prominent placement, and well as the remains of what may have been torches used to light the interior. And the acoustics would have been conducive to communal gatherings.

Dating back to the Early Upper Paleolithic period, Manot Cave was found accidentally when a bulldozer broke open its roof during construction in 2008. Archaeologists soon swooped in and recovered such artifacts as stone tools, bits of charcoal, remains of various animals, and a nearly complete human skull.

The latter proved to be especially significant, as subsequent analysis showed that the skull (dubbed Manot 1) had both Neanderthal and modern features and was estimated to be about 54,700 years old. That lent support to the hypothesis that modern humans co-existed and possibly interbred with Neanderthals during a crucial transition period in the region, further bolstered by genome sequencing.

The Manot Cave features an 80-meter-long hall connecting to two lower chambers from the north and south. The living section is near the entrance and was a hub for activities like flint-knapping, butchering animals, eating, and other aspects of daily life. But about eight stories below, there is a large cavern consisting of a high gallery and an adjoining smaller “hidden” chamber separated from the main area by a cluster of mineral deposits called speleothems.

That’s the area that is the subject of the new PNAS paper. Unlike the main living section, the authors found no evidence of daily human activities in this compound, suggesting it served another purpose—most likely ritual gatherings.

Paleolithic deep-cave compound likely used for rituals Read More »