Author name: Mike M.

ftc-bans-noncompete-clauses,-declares-vast-majority-unenforceable

FTC bans noncompete clauses, declares vast majority unenforceable

No more noncompetes —

Chamber of Commerce vows to sue FTC, will try to block ban on noncompetes.

Federal Trade Commission Chair Lina Khan smiles while talking with people at an event.

Enlarge / Federal Trade Commission Chair Lina Khan talks with guests during an event in the Eisenhower Executive Office Building on April 03, 2024

Getty Images | Chip Somodevilla

The Federal Trade Commission (FTC) today announced that it has issued a final rule banning noncompete clauses. The rule will render the vast majority of current noncompete clauses unenforceable, according to the agency.

“In the final rule, the Commission has determined that it is an unfair method of competition and therefore a violation of Section 5 of the FTC Act, for employers to enter into noncompetes with workers and to enforce certain noncompetes,” the FTC said.

The US Chamber of Commerce said it will sue the FTC in an effort to block the rule, claiming the ban is “a blatant power grab that will undermine American businesses’ ability to remain competitive.”

The FTC proposed the rule in January 2023 and received over 26,000 public comments on its proposal. Over 25,000 of the comments supported the proposed ban, the FTC said. The final rule announced today will take effect 120 days after it is published in the Federal Register, unless opponents of the rule secure a court order blocking it.

The FTC said that “noncompetes are a widespread and often exploitative practice imposing contractual conditions that prevent workers from taking a new job or starting a new business. Noncompetes often force workers to either stay in a job they want to leave or bear other significant harms and costs, such as being forced to switch to a lower-paying field, being forced to relocate, being forced to leave the workforce altogether, or being forced to defend against expensive litigation.”

Noncompete clauses currently bind about 30 million workers in the US, the agency said. “Under the FTC’s new rule, existing noncompetes for the vast majority of workers will no longer be enforceable after the rule’s effective date,” the FTC said.

FTC: “Noncompete clauses keep wages low”

The only existing noncompetes that won’t be nullified are those for senior executives, who represent less than 0.75 percent of workers, the FTC said. The rule defines senior executives as people earning more than $151,164 a year and who are in policy-making positions.

“The final rule allows existing noncompetes with senior executives to remain in force because this subset of workers is less likely to be subject to the kind of acute, ongoing harms currently being suffered by other workers subject to existing noncompetes and because commenters raised credible concerns about the practical impacts of extinguishing existing noncompetes for senior executives,” the FTC said.

Senior executives will be protected from new noncompete clauses after the rule takes effect. Employers will be “banned from entering into or attempting to enforce any new noncompetes, even if they involve senior executives,” the FTC said. “Employers will be required to provide notice to workers other than senior executives who are bound by an existing noncompete that they will not be enforcing any noncompetes against them.”

The FTC vote was 3-2, with Democrats supporting the noncompete ban and Republicans opposing.

“Noncompete clauses keep wages low, suppress new ideas, and rob the American economy of dynamism, including from the more than 8,500 new startups that would be created a year once noncompetes are banned,” FTC Chair Lina Khan said. “The FTC’s final rule to ban noncompetes will ensure Americans have the freedom to pursue a new job, start a new business, or bring a new idea to market.”

Chamber of Commerce CEO Suzanne Clark argued that “the FTC has never been granted the constitutional and statutory authority to write its own competition rules… The Chamber will sue the FTC to block this unnecessary and unlawful rule and put other agencies on notice that such overreach will not go unchecked.”

FTC cites authority, urges businesses to raise wages

The FTC argues that it can impose the rule using authority under sections 5 and 6(g) of the FTC Act:

Alongside section 5, Congress adopted section 6(g) of the Act, in which it authorized the Commission to “make rules and regulations for the purpose of carrying out the provisions of” the FTC Act, which include the Act’s prohibition of unfair methods of competition. The plain text of section 5 and section 6(g), taken together, empower the Commission to promulgate rules for the purpose of preventing unfair methods of competition. That includes legislative rules defining certain conduct as an unfair method of competition.

The FTC said it found evidence that “noncompetes tend to negatively affect competitive conditions in product and service markets, inhibiting new business formation and innovation” and “lead to increased market concentration and higher prices for consumers.”

Businesses can protect trade secrets without noncompetes, the agency said:

Trade secret laws and nondisclosure agreements (NDAs) both provide employers with well-established means to protect proprietary and other sensitive information. Researchers estimate that over 95 percent of workers with a noncompete already have an NDA.

The Commission also finds that instead of using noncompetes to lock in workers, employers that wish to retain employees can compete on the merits for the worker’s labor services by improving wages and working conditions.

FTC bans noncompete clauses, declares vast majority unenforceable Read More »

hackers-infect-users-of-antivirus-service-that-delivered-updates-over-http

Hackers infect users of antivirus service that delivered updates over HTTP

GOT HTTPS? —

eScan AV updates were delivered over HTTP for five years.

Hackers infect users of antivirus service that delivered updates over HTTP

Getty Images

Hackers abused an antivirus service for five years in order to infect end users with malware. The attack worked because the service delivered updates over HTTP, a protocol vulnerable to attacks that corrupt or tamper with data as it travels over the Internet.

The unknown hackers, who may have ties to the North Korean government, pulled off this feat by performing a man-in-the-middle (MiitM) attack that replaced the genuine update with a file that installed an advanced backdoor instead, said researchers from security firm Avast today.

eScan, an AV service headquartered in India, has delivered updates over HTTP since at least 2019, Avast researchers reported. This protocol presented a valuable opportunity for installing the malware, which is tracked in security circles under the name GuptiMiner.

“This sophisticated operation has been performing MitM attacks targeting an update mechanism of the eScan antivirus vendor,” Avast researchers Jan Rubín and Milánek wrote. “We disclosed the security vulnerability to both eScan and the India CERT and received confirmation on 2023-07-31 from eScan that the issue was fixed and successfully resolved.”

Complex infection chain

The complex infection chain started when eScan applications checked in with the eScan update system. The threat actors then performed a MitM attack that allowed them to intercept the package sent by the update server and replace it with a corrupted one that contained code to install GuptiMiner. The Avast researchers still don’t know precisely how the attackers were able to perform the interception. They suspect targeted networks may already have been compromised somehow to route traffic to a malicious intermediary.

To lower the chances of detection, the infection file used DLL hijacking, a technique that replaces legitimate dynamic link library files used by most Microsoft apps with maliciously crafted ones that use the same file name. For added stealth, the infection chain also relied on a custom domain name system (DNS)  server that allowed it to use legitimate domain names when connecting to attacker-controlled channels.

Last year, the attackers abandoned the DNS technique and replaced it with another obfuscation technique known as IP address masking. This involved the following steps:

  1. Obtain an IP address of a hardcoded server name registered to the attacker by standard use of the gethostbyname API function
  2. For that server, two IP addresses are returned—the first is an IP address which is a masked address, and the second one denotes an available payload version and starts with 23.195. as its first two octets
  3. If the version is newer than the current one, the masked IP address is de-masked, resulting in a real command-and-control (C&C) IP address
  4. The real C&C IP address is used along with a hardcoded constant string (part of a URL path) to download a file containing malicious shellcode

Some variants of the infection chain stashed the malicious code inside an image file to make them harder to detect. The variants also installed a custom root TLS certificate that satisfied requirements by some targeted systems that all apps must be digitally signed before being installed.

The payload contained multiple backdoors that were activated when installed on large networks. Curiously, the update also delivered XMRig, an open-source package for mining cryptocurrency.

The GuptiMiner infection chain.

Enlarge / The GuptiMiner infection chain.

Avast

GuptiMiner has circulated since at least 2018 and has undergone multiple revisions. One searched compromised networks for systems running Windows 7 and Windows Server 2008, presumably to deliver exploits that worked on those earlier versions. Another provided an interface for installing special-purpose modules that could be customized for different victims. (This version also scanned the local system for stored private keys and cryptocurrency wallets.)

The researchers were surprised that malware that took such pains to fly under the radar would also install a cryptocurrency miner, which by nature is usually easy to detect. One possibility is the attackers’ possible connection to Kimsuky, the tracking name for a group backed by the North Korean government. Over the years, North Korea’s government has generated billions of dollars in cryptocurrency through malware installed on the devices of unwitting victims. The researchers made the possible connection after finding similarities between a known Kimsuky keylogger and code fragments used during the GuptiMiner operation.

The GuptiMiner attack is notable for exposing major shortcomings in eScan that went unnoticed for at least five years. Besides not delivering updates over HTTPS, a medium not susceptible to MitM attacks, eScan also failed to enforce digital signing to ensure updates hadn’t been tampered with before being installed. Representatives of eScan didn’t respond to an email asking why engineers designed the update process this way.

People who use or have used eScan should check the Avast post for details on whether their systems are infected. It’s likely that most reputable AV scanners will also detect this infection.

Hackers infect users of antivirus service that delivered updates over HTTP Read More »

microsoft’s-phi-3-shows-the-surprising-power-of-small,-locally-run-ai-language-models

Microsoft’s Phi-3 shows the surprising power of small, locally run AI language models

small packages —

Microsoft’s 3.8B parameter Phi-3 may rival GPT-3.5, signaling a new era of “small language models.”

An illustration of lots of information being compressed into a smartphone with a funnel.

Getty Images

On Tuesday, Microsoft announced a new, freely available lightweight AI language model named Phi-3-mini, which is simpler and less expensive to operate than traditional large language models (LLMs) like OpenAI’s GPT-4 Turbo. Its small size is ideal for running locally, which could bring an AI model of similar capability to the free version of ChatGPT to a smartphone without needing an Internet connection to run it.

The AI field typically measures AI language model size by parameter count. Parameters are numerical values in a neural network that determine how the language model processes and generates text. They are learned during training on large datasets and essentially encode the model’s knowledge into quantified form. More parameters generally allow the model to capture more nuanced and complex language-generation capabilities but also require more computational resources to train and run.

Some of the largest language models today, like Google’s PaLM 2, have hundreds of billions of parameters. OpenAI’s GPT-4 is rumored to have over a trillion parameters but spread over eight 220-billion parameter models in a mixture-of-experts configuration. Both models require heavy-duty data center GPUs (and supporting systems) to run properly.

In contrast, Microsoft aimed small with Phi-3-mini, which contains only 3.8 billion parameters and was trained on 3.3 trillion tokens. That makes it ideal to run on consumer GPU or AI-acceleration hardware that can be found in smartphones and laptops. It’s a follow-up of two previous small language models from Microsoft: Phi-2, released in December, and Phi-1, released in June 2023.

A chart provided by Microsoft showing Phi-3 performance on various benchmarks.

Enlarge / A chart provided by Microsoft showing Phi-3 performance on various benchmarks.

Phi-3-mini features a 4,000-token context window, but Microsoft also introduced a 128K-token version called “phi-3-mini-128K.” Microsoft has also created 7-billion and 14-billion parameter versions of Phi-3 that it plans to release later that it claims are “significantly more capable” than phi-3-mini.

Microsoft says that Phi-3 features overall performance that “rivals that of models such as Mixtral 8x7B and GPT-3.5,” as detailed in a paper titled “Phi-3 Technical Report: A Highly Capable Language Model Locally on Your Phone.” Mixtral 8x7B, from French AI company Mistral, utilizes a mixture-of-experts model, and GPT-3.5 powers the free version of ChatGPT.

“[Phi-3] looks like it’s going to be a shockingly good small model if their benchmarks are reflective of what it can actually do,” said AI researcher Simon Willison in an interview with Ars. Shortly after providing that quote, Willison downloaded Phi-3 to his Macbook laptop locally and said, “I got it working, and it’s GOOD” in a text message sent to Ars.

A screenshot of Phi-3-mini running locally on Simon Willison's Macbook.

Enlarge / A screenshot of Phi-3-mini running locally on Simon Willison’s Macbook.

Simon Willison

Most models that run on a local device still need hefty hardware,” says Willison. “Phi-3-mini runs comfortably with less than 8GB of RAM, and can churn out tokens at a reasonable speed even on just a regular CPU. It’s licensed MIT and should work well on a $55 Raspberry Pi—and the quality of results I’ve seen from it so far are comparable to models 4x larger.

How did Microsoft cram a capability potentially similar to GPT-3.5, which has at least 175 billion parameters, into such a small model? Its researchers found the answer by using carefully curated, high-quality training data they initially pulled from textbooks. “The innovation lies entirely in our dataset for training, a scaled-up version of the one used for phi-2, composed of heavily filtered web data and synthetic data,” writes Microsoft. “The model is also further aligned for robustness, safety, and chat format.”

Much has been written about the potential environmental impact of AI models and datacenters themselves, including on Ars. With new techniques and research, it’s possible that machine learning experts may continue to increase the capability of smaller AI models, replacing the need for larger ones—at least for everyday tasks. That would theoretically not only save money in the long run but also require far less energy in aggregate, dramatically decreasing AI’s environmental footprint. AI models like Phi-3 may be a step toward that future if the benchmark results hold up to scrutiny.

Phi-3 is immediately available on Microsoft’s cloud service platform Azure, as well as through partnerships with machine learning model platform Hugging Face and Ollama, a framework that allows models to run locally on Macs and PCs.

Microsoft’s Phi-3 shows the surprising power of small, locally run AI language models Read More »

grindr-users-seek-payouts-after-dating-app-shared-hiv-status-with-vendors

Grindr users seek payouts after dating app shared HIV status with vendors

A person's finger hovering over a Grindr app icon on a phone screen

Getty Images | Thomas Trutschel

Grindr is facing a class action lawsuit from hundreds of users over the sharing of HIV statuses and other sensitive personal information with third-party firms.

UK law firm Austen Hays filed the claim in the High Court in London yesterday, the firm announced. The class action “alleges the misuse of private information of thousands of affected UK Grindr users, including highly sensitive information about their HIV status and latest tested date,” the law firm said.

The law firm said it has signed up over 670 potential class members and “is in discussions with thousands of other individuals who are interested in joining the claim.” Austen Hays said that “claimants could receive thousands in damages” from Grindr, a gay dating app, if the case is successful.

Austen Hays alleges that Grindr violated UK data protection laws by sharing sensitive data for commercial purposes without users’ consent, including when it “unlawfully processed and shared users’ data with third parties, including advertising companies Localytics and Apptimize.”

While Austen Hays describes Localytics and Apptimize as advertising firms, they do not seem to be in the business of selling ads. Localytics is software for mobile app marketing and analytics, while Apptimize says it provides A/B testing and feature release management for product teams.

Grindr admitted sharing HIV status, said it stopped

Grindr has admitted sharing HIV status with the firms but stressed that it wasn’t for advertising purposes and pledged to stop sharing that information. The sharing of HIV status came to light in 2018 thanks to the work of independent researchers. At the time, Grindr said it “has never sold, nor will we ever sell, personal user information—especially information regarding HIV status or last test date—to third parties or advertisers.”

Grindr said it “consult[ed] several international health organizations” before determining in 2016 that it would be “beneficial for the health and well-being of our community to give users the option to publish, at their discretion, their HIV status and their ‘Last Tested Date’ to their public profile.”

Grindr acknowledged that it had been “sharing HIV status information with our trusted vendors, Apptimize and Localytics.” Apptimize software helped Grindr test and deploy new app features including an “HIV Testing Reminder” feature, while Localytics software was used “to confirm that the new features were not causing problems with the functioning of the Grindr app,” Grindr said.

Today, Grindr provided Ars with a statement in response to the lawsuit. “We are committed to protecting our users’ data and complying with all applicable data privacy regulations, including in the UK,” the company said. Grindr has never shared user-reported health information for ‘commercial purposes’ and has never monetized such information. We intend to respond vigorously to this claim, which appears to be based on a mischaracterization of practices from more than four years ago, prior to early 2020.”

Grindr users seek payouts after dating app shared HIV status with vendors Read More »

ipados-18-could-ship-with-built-in-calculator-app,-after-14-calculator-less-years

iPadOS 18 could ship with built-in Calculator app, after 14 Calculator-less years

a calculated move —

Every single iPhone and Mac has come with a calculator app, but not the iPad.

iPadOS 18 could ship with built-in Calculator app, after 14 Calculator-less years

Apple/Andrew Cunningham

Last year, Apple introduced the ability to set multiple timers at once in the Clock app on its various platforms.

“We truly live in an age of wonders,” deadpanned Apple’s Craig Federighi in the company’s official presentation, tacitly acknowledging the gap between the apparent simplicity of the feature and the amount of time that Apple took to implement it.

The next version of iPadOS may contain another of these “age of wonders” features, an apparently simple thing that Apple has chosen never to do for reasons that the company can’t or won’t explain. According to MacRumors, iPadOS 18 may finally be the update that brings a version of Apple’s first-party Calculator app to the iPad.

Calculator was one of the very first iPhone apps that shipped with the iPhone back in 2007 but was mysteriously and inexplicably absent from the iPad when it launched in 2010. It’s also the very last of those original missing apps to find its way to the iPad’s home screen—Stocks, Clock, Voice Memos, and Weather had all made the jump previously, with the Weather app coming as recently as 2022.

It’s not that the iPad is incapable of calculating; the Spotlight search feature can already handle basic off-the-cuff math and conversion questions, and third-party calculator apps like PCalc, Numerical², Calcbot, and innumerable free-to-download no-name calculator apps have stepped up to fill the gap. But it was never clear why Apple decided against shipping a first-party Calculator app with the iPad, when it had shipped one with every iPhone since 2007 and every Mac since 1984.

The new Calculator app should be more than just a straightforward port of the current iOS or macOS app. Apple is apparently planning a small overhaul of the Calculator app for macOS 15 with a history tape for tracking past calculations, a resizable window, and an updated round-button design that more closely imitates the iOS version. The iPad and macOS versions of many of Apple’s apps share a lot of code these days—Stocks, Voice Memos, News, Home, Weather, Clock, and others share essentially the same design and layout in both operating systems—so it’s a fair bet that this redesigned Mac app and the newly introduced iPad app will be the same software.

At least one developer of a prominent iPad calculator seemed undaunted by the news that his app could be Sherlocked this fall.

“Yes, I saw the MacRumors article,” wrote PCalc developer James Thomson on his Mastodon account, responding to no one in particular. “Yes, it’s fine.”

iPadOS 18 could ship with built-in Calculator app, after 14 Calculator-less years Read More »

concern-grows-as-bird-flu-spreads-further-in-us-cows:-32-herds-in-8-states

Concern grows as bird flu spreads further in US cows: 32 herds in 8 states

Rapidly evolving —

Experts say the US is not sharing as much data on the outbreak as it should.

Greylag geese sit on a field and rest while a cow passes by in the background.

Enlarge / Greylag geese sit on a field and rest while a cow passes by in the background.

Researchers around the world are growing more uneasy with the spread of highly pathogenic avian influenza (H5N1) in US dairy cows as the virus continues to make its way into new herds and states. Several experts say the US is not sharing enough information from the federal investigation into the unexpected and growing outbreak, including genetic information from isolated viruses.

To date, the US Department of Agriculture has tallied 32 affected herds in eight states: Idaho, Kansas, Michigan, New Mexico, North Carolina, Ohio, South Dakota, and Texas. In some cases, the movement of cattle between herds can explain the spread of the virus. But the USDA has not publicly clarified if all the herds are linked in a single outbreak chain or if there is evidence that the virus has spilled over to cows multiple times. Early infections in Texas were linked to dead wild birds (pigeons, blackbirds, and grackles) found on dairy farms. But the USDA reportedly indicated to Stat News that the infections do not appear to be all linked to the Texas cases.

Spread of the virus via cattle movements indicates that there is cow-to-cow transmission occurring, the USDA said. But it’s unclear how the virus is spreading between cows. Given that even the most symptomatic cows show few respiratory symptoms, the USDA speculates that the most likely way it is spreading is via contaminated milking equipment.

Adding to the uncertainty of the virus’s spread, The New York Times on Friday reported that the one herd found infected with H5N1 in North Carolina showed no symptoms of the virus. This raises the possibility that the virus could be silently spreading in unknown numbers of other asymptomatic herds and states. In its most recent FAQ document, the USDA encouraged testing for H5N1 if herds show clinical symptoms, such as lethargy, fever, low milk production, and loose stools. But the Times noted that the agency has begun reimbursing farms for testing asymptomatic cows.

Meanwhile, the USDA also reported that it has evidence that H5N1 from dairy farms has spread back into birds in nearby poultry farms, but how this is happening is also unknown.

Data gaps

All the uncertainty and widespread transmission raises concern about how the virus is evolving to infect mammals and whether it is heading for humans. Last week, the chief scientist for the World Health Organization, Jeremy Farrar, told reporters in Geneva that the spread of the virus in US dairy cows is an “enormous concern,” according to CNN.  “The great concern, of course, is that in doing so and infecting ducks and chickens—but now increasingly mammals—that that virus now evolves and develops the ability to infect humans. And then critically, the ability to go from human-to-human transmission.”

In particular, experts are wary that the dairy cow outbreaks could spill over to nearby pig farms as it’s doing with nearby poultry farms. Pigs can be infected with both bird flu viruses and human flu viruses, making them potential melting pots for new recombinant flu strains.

So far, the USDA says that genetic sequences of H5N1 viruses infecting cows has not revealed any mutations that “would make it more transmissible to humans and between people.” But last Thursday, Stat reported that international experts have faulted the USDA for not sharing more genetic data from its investigation, among other information. Until this weekend, the agency had only shared a few genetic sequences in an international database of viral genome sequences (GISAID).

“A country with capacity like the United States should be able to generate this information within days,” Marion Koopmans, head of the department of viroscience at Erasmus Medical Center in the Dutch city of Rotterdam told Stat last week. “I would expect very fast, very transparent updates, and it’s somewhat amazing not to see that happening.”

On Sunday, facing mounting criticism, the USDA announced the release of 239 genetic sequences to GISAID. It noted it is also adding raw data to a US federal database “in the interest of public transparency and ensuring the scientific community has access to this information as quickly as possible.” The agency said it will continue to make such data available on a rolling basis.

Dr. Rosemary Sifford, the USDA’s chief veterinarian, told the Times, “Please recall that we’ve been engaged in this for less than a month. We are working very hard to generate more information,” she said.

Overall, the USDA and the US Centers for Disease Control and Prevention continue to consider the risk to the public to be low. Farmworkers and others who have direct contact with infected animals are encouraged to take precautions, however.

While deadly to birds, H5N1 in cows is relatively mild, rarely if ever causing deaths. Milk from sick animals contains high levels of virus, but it is being destroyed. Even if some infected milk makes its way into the milk supply, the Food and Drug Administration is confident that the virus would be killed in the pasteurization process. “Pasteurization has continually proven to inactivate bacteria and viruses, like influenza, in milk,” the agency said in an FAQ Friday. Some experts have called for data confirming this, though.

Concern grows as bird flu spreads further in US cows: 32 herds in 8 states Read More »

meta-debuts-horizon-os,-with-asus,-lenovo,-and-microsoft-on-board

Meta debuts Horizon OS, with Asus, Lenovo, and Microsoft on board

Face Operating Systems —

Rivalry with Apple now mirrors the Android/iOS competition more than ever.

The Meta Quest Pro at a Best Buy demo station in October 2022.

Enlarge / The Meta Quest Pro at a Best Buy demo station in October 2022.

Meta will open up the operating system that runs on its Quest mixed reality headsets to other technology companies, it announced today.

What was previously simply called Quest software will be called Horizon OS, and the goal will be to move beyond the general-use Quest devices to more purpose-specific devices, according to an Instagram video from Meta CEO Mark Zuckerberg.

There will be headsets focused purely on watching TV and movies on virtual screens, with the emphasis on high-end OLED displays. There will also be headsets that are designed to be as light as possible at the expense of performance for productivity and exercise uses. And there will be gaming-oriented ones.

The announcement named three partners to start. Asus will produce a gaming headset under its Republic of Gamers (ROG) brand, Lenovo will make general purpose headsets with an emphasize on “productivity, learning, and entertainment,” and Xbox and Meta will team up to deliver a special edition of the Meta Quest that will come bundled with an Xbox controller and Xbox Cloud Gaming and Game Pass.

Users running Horizon OS devices from different manufacturers will be able to stay connected in the operating system’s social layer of “identities, avatars, social graphs, and friend groups” and will be able to enjoy shared virtual spaces together across devices.

The announcement comes after Meta became an early leader in the relatively small but interesting consumer mixed reality space but with diminishing returns on new devices as the market saturates.

Further, Apple recently entered the fray with its Vision Pro headset. The Vision Pro is not really a direct competitor to Meta’s Quest devices today—it’s far more expensive and loaded with higher-end tech—but it may only be the opening volley in a long competition between the companies.

Meta’s decision to make Horizon OS a more open platform for partner OEMs in the face of Apple’s usual focus on owning and integrating as much of the software, hardware, and services in its device as it can mirrors the smartphone market. There, Google’s Android (on which Horizon OS is based) runs on a variety of devices from a wide range of companies, while Apple’s iOS runs only on Apple’s own iPhones.

Meta also says it is working on a new spatial app framework to make it easier for developers with experience on mobile to start making mixed reality apps for Horizon OS and that it will start “removing the barriers between the Meta Horizon Store and App Lab, which lets any developer who meets basic technical and content requirements release software on the platform.”

Pricing, specs, and release dates have not been announced for any of the new devices. Zuckerberg admitted it’s “probably going to take a couple of years” for this ecosystem of hardware devices to roll out.

Meta debuts Horizon OS, with Asus, Lenovo, and Microsoft on board Read More »

windows-vulnerability-reported-by-the-nsa-exploited-to-install-russian-malware

Windows vulnerability reported by the NSA exploited to install Russian malware

Windows vulnerability reported by the NSA exploited to install Russian malware

Getty Images

Kremlin-backed hackers have been exploiting a critical Microsoft vulnerability for four years in attacks that targeted a vast array of organizations with a previously undocumented tool, the software maker disclosed Monday.

When Microsoft patched the vulnerability in October 2022—at least two years after it came under attack by the Russian hackers—the company made no mention that it was under active exploitation. As of publication, the company’s advisory still made no mention of the in-the-wild targeting. Windows users frequently prioritize the installation of patches based on whether a vulnerability is likely to be exploited in real-world attacks.

Exploiting CVE-2022-38028, as the vulnerability is tracked, allows attackers to gain system privileges, the highest available in Windows, when combined with a separate exploit. Exploiting the flaw, which carries a 7.8 severity rating out of a possible 10, requires low existing privileges and little complexity. It resides in the Windows print spooler, a printer-management component that has harbored previous critical zero-days. Microsoft said at the time that it learned of the vulnerability from the US National Security Agency.

On Monday, Microsoft revealed that a hacking group tracked under the name Forest Blizzard has been exploiting CVE-2022-38028 since at least June 2020—and possibly as early as April 2019. The threat group—which is also tracked under names including APT28, Sednit, Sofacy, GRU Unit 26165, and Fancy Bear—has been linked by the US and the UK governments to Unit 26165 of the Main Intelligence Directorate, a Russian military intelligence arm better known as the GRU. Forest Blizzard focuses on intelligence gathering through the hacking of a wide array of organizations, mainly in the US, Europe, and the Middle East.

Since as early as April 2019, Forest Blizzard has been exploiting CVE-2022-38028 in attacks that, once system privileges are acquired, use a previously undocumented tool that Microsoft calls GooseEgg. The post-exploitation malware elevates privileges within a compromised system and goes on to provide a simple interface for installing additional pieces of malware that also run with system privileges. This additional malware, which includes credential stealers and tools for moving laterally through a compromised network, can be customized for each target.

“While a simple launcher application, GooseEgg is capable of spawning other applications specified at the command line with elevated permissions, allowing threat actors to support any follow-on objectives such as remote code execution, installing a backdoor, and moving laterally through compromised networks,” Microsoft officials wrote.

GooseEgg is typically installed using a simple batch script, which is executed following the successful exploitation of CVE-2022-38028 or another vulnerability, such as CVE-2023-23397, which Monday’s advisory said has also been exploited by Forest Blizzard. The script is responsible for installing the GooseEgg binary, often named justice.exe or DefragmentSrv.exe, then ensuring that they run each time the infected machine is rebooted.

Windows vulnerability reported by the NSA exploited to install Russian malware Read More »

high-speed-imaging-and-ai-help-us-understand-how-insect-wings-work

High-speed imaging and AI help us understand how insect wings work

Black and white images of a fly with its wings in a variety of positions, showing the details of a wing beat.

Enlarge / A time-lapse showing how an insect’s wing adopts very specific positions during flight.

Florian Muijres, Dickinson Lab

About 350 million years ago, our planet witnessed the evolution of the first flying creatures. They are still around, and some of them continue to annoy us with their buzzing. While scientists have classified these creatures as pterygotes, the rest of the world simply calls them winged insects.

There are many aspects of insect biology, especially their flight, that remain a mystery for scientists. One is simply how they move their wings. The insect wing hinge is a specialized joint that connects an insect’s wings with its body. It’s composed of five interconnected plate-like structures called sclerites. When these plates are shifted by the underlying muscles, it makes the insect wings flap.

Until now, it has been tricky for scientists to understand the biomechanics that govern the motion of the sclerites even using advanced imaging technologies. “The sclerites within the wing hinge are so small and move so rapidly that their mechanical operation during flight has not been accurately captured despite efforts using stroboscopic photography, high-speed videography, and X-ray tomography,” Michael Dickinson, Zarem professor of biology and bioengineering at the California Institute of Technology (Caltech), told Ars Technica.

As a result, scientists are unable to visualize exactly what’s going on at the micro-scale within the wing hinge as they fly, preventing them from studying insect flight in detail. However, a new study by Dickinson and his team finally revealed the working of sclerites and the insect wing hinge. They captured the wing motion of fruit flies (Drosophila melanogaster) analyzing 72,000 recorded wing beats using a neural network to decode the role individual sclerites played in shaping insect wing motion.

Understanding the insect wing hinge

The biomechanics that govern insect flight are quite different from those of birds and bats. This is because wings in insects didn’t evolve from limbs. “In the case of birds, bats, and pterosaurs we know exactly where the wings came from evolutionarily because all these animals fly with their forelimbs. They’re basically using their arms to fly. In insects, it’s a completely different story. They evolved from six-legged organisms and they kept all six legs. However, they added flapping appendages to the dorsal side of their body, and it is a mystery as to where those wings came from,” Dickinson explained.

Some researchers suggest that insect wings came from gill-like appendages present in ancient aquatic arthropods. Others argue that wings originated from “lobes,” special outgrowths found on the legs of ancient crustaceans, which were ancestors of insects. This debate is still ongoing, so its evolution can’t tell us much about how the hinge and the sclerites operate.

Understanding the hinge mechanics is crucial because this is what makes insects efficient flying creatures. It enables them to fly at impressive speeds relative to their body sizes (some insects can fly at 33 mph) and to demonstrate great maneuverability and stability while in flight.

“The insect wing hinge is arguably among the most sophisticated and evolutionarily important skeletal structures in the natural world,” according to the study authors.

However, imaging the activity of four of the five sclerites that form the hinge has been impossible due to their size and the speeds at which they move. Dickinson and his team employed a multidisciplinary approach to overcome this challenge. They designed an apparatus equipped with three high-speed cameras that recorded the activity of tethered fruit flies at 15,000 frames per second using infrared light.

They also used a calcium-sensitive protein to track changes in the activity of the steering muscles of the insects as they flew (calcium helps trigger muscle contractions). “We recorded a total of 485 flight sequences from 82 flies. After excluding a subset of wingbeats from sequences when the fly either stopped flying or flew at an abnormally low wingbeat frequency, we obtained a final dataset of 72,219 wingbeats,” the researchers note.

Next, they trained a machine-learning-based convolutional neural network (CNN) using 85 percent of the dataset. “We used the CNN model to investigate the transformation between muscle activity and wing motion by performing a set of virtual manipulations, exploiting the network to execute experiments that would be difficult to perform on actual flies,” they explained.

In addition to the neural network, they also developed an encoder-decoder neural network (an architecture used in machine learning) and fed it data related to steering muscle activity. While the CNN model could predict wing motion, the encoder/decoder could predict the action of individual sclerite muscles during the movement of the wings. Now, it was time to check whether the data they predicted was accurate.

High-speed imaging and AI help us understand how insect wings work Read More »

nasa-officially-greenlights-$3.35-billion-mission-to-saturn’s-moon-titan

NASA officially greenlights $3.35 billion mission to Saturn’s moon Titan

Artist's illustration of Dragonfly soaring over the dunes of Titan.

Enlarge / Artist’s illustration of Dragonfly soaring over the dunes of Titan.

NASA has formally approved the robotic Dragonfly mission for full development, committing to a revolutionary project to explore Saturn’s largest moon with a quadcopter drone.

Agency officials announced the outcome of Dragonfly’s confirmation review last week. This review is a checkpoint in the lifetime of most NASA projects and marks the moment when the agency formally commits to the final design, construction, and launch of a space mission. The outcome of each mission’s confirmation review typically establishes a budgetary and schedule commitment.

“Dragonfly is a spectacular science mission with broad community interest, and we are excited to take the next steps on this mission,” said Nicky Fox, associate administrator of NASA’s science mission directorate. “Exploring Titan will push the boundaries of what we can do with rotorcraft outside of Earth.”

In the case of Dragonfly, NASA confirmed the mission with a total lifecycle cost of $3.35 billion and a launch date of July 2028. That is roughly twice the mission’s original proposed cost and a delay of more than two years from when the mission was originally selected in 2019, according to NASA.

Busting the cost cap

Rising costs are not necessarily a surprise on a mission as innovative as Dragonfly. After reaching Titan, the eight-bladed rotorcraft lander will soar from place to place on Saturn’s hazy moon, exploring environments rich in organic molecules, the building blocks of life.

Dragonfly will be the first mobile robot explorer to land on any other planetary body besides the Moon and Mars, and only the second flying drone to explore another planet. NASA’s Ingenuity helicopter on Mars was the first. Dragonfly will be more than 200 times as massive as Ingenuity and will operate six times farther from Earth.

Despite its distant position in the cold outer Solar System, Titan appears to be reminiscent of the ancient Earth. A shroud of orange haze envelops Saturn’s largest moon, and Titan’s surface is covered with sand dunes and methane lakes.

Titan’s frigid temperatures—hovering near minus 290° Fahrenheit (minus 179° Celsius)—mean water ice behaves like bedrock. NASA’s Cassini spacecraft, which flew past Titan numerous times before its mission ended in 2017, discovered weather systems on the hazy moon. Observations from Cassini found evidence for hydrocarbon rains and winds that appear to generate waves in Titan’s methane lakes.

Clearly, Titan is an exotic world. Most of what scientists know about Titan comes from measurements collected by Cassini and the European Space Agency’s Huygens probe, which Cassini released to land on Titan in 2005. Huygens returned the first pictures from Titan’s surface, but it only transmitted data for 72 minutes.

Dragonfly will explore Titan for around three years, flying tens of kilometers about once per month to measure the prebiotic chemistry of Titan’s surface, study its soupy atmosphere, and search for biosignatures that could be indications of life. The mission will visit more than 30 locations within Titan’s equatorial region, according to a presentation by Elizabeth Turtle, Dragonfly’s principal investigator at the Johns Hopkins University Applied Physics Laboratory.

“The Dragonfly mission is an incredible opportunity to explore an ocean world in a way that we have never done before,” Turtle said in a statement. “The team is dedicated and enthusiastic about accomplishing this unprecedented investigation of the complex carbon chemistry that exists on the surface of Titan and the innovative technology bringing this first-of-its-kind space mission to life.”

However, this high level of ambition comes at a high cost. NASA selected Dragonfly to proceed into initial development in 2019. Turtle’s science team proposed Dragonfly to NASA through the agency’s New Frontiers program, which has developed a series of medium-class Solar System exploration missions. The New Frontiers program has an impressive pedigree, beginning with the New Horizons mission that flew by Pluto in 2015, the Juno mission to Jupiter, and the OSIRIS-REx asteroid sample return mission.

NASA officially greenlights $3.35 billion mission to Saturn’s moon Titan Read More »

biden-signs-bill-criticized-as-“major-expansion-of-warrantless-surveillance”

Biden signs bill criticized as “major expansion of warrantless surveillance”

Abstract image of human eye on a digital background

Getty Images | Yuichiro Chino

Congress passed and President Biden signed a reauthorization of Title VII of the Foreign Intelligence Surveillance Act (FISA), approving a bill that opponents say includes a “major expansion of warrantless surveillance” under Section 702 of FISA.

Over the weekend, the Reforming Intelligence and Securing America Act was approved by the Senate in a 60-34 vote. The yes votes included 30 Republicans, 28 Democrats, and two independents who caucus with Democrats. The bill, which was previously passed by the House and reauthorizes Section 702 of FISA for two years, was signed by President Biden on Saturday.

“Thousands and thousands of Americans could be forced into spying for the government by this new bill and with no warrant or direct court oversight whatsoever,” Sen. Ron Wyden (D-Ore.), a member of the Senate Select Committee on Intelligence, said on Friday. “Forcing ordinary Americans and small businesses to conduct secret, warrantless spying is what authoritarian countries do, not democracies.”

Wyden and Sen. Cynthia Lummis (R-Wyo.) led a bipartisan group of eight senators who submitted an amendment to reverse what Wyden’s office called “a major expansion of warrantless surveillance under Section 702 of the Foreign Intelligence Surveillance Act that was included in the House-passed bill.” After the bill was approved by the Senate without the amendment, Wyden said it seemed “that senators were unwilling to send this bill back to the House, no matter how common-sense the amendment before them.”

Sen. Ted Cruz (R-Texas) said he voted against the reauthorization “because it failed to include the most important requirement to protect Americans’ civil rights: that law enforcement get a warrant before targeting a US citizen.”

Bill expands definition of service provider

The Wyden/Lummis amendment would have struck language that expands the definition of an electronic communication service provider to include, with some exceptions, any “service provider who has access to equipment that is being or may be used to transmit or store wire or electronic communications.” The exceptions are for public accommodation facilities, dwellings, community facilities, and food service establishments.

“Instead of using the opportunity to curb warrantless surveillance of Americans’ private communications and protect the public’s privacy, Congress passed an expansive, unchecked surveillance authority,” Sen. Edward J. Markey (D-Mass.) said after the vote. “This FISA reauthorization legislation is a step backwards, doing nothing to address the extent to which the government conducts surveillance over its own citizens.”

Under the 2008 FISA Amendments Act, electronic communication service providers already included telecommunications carriers, providers of electronic communication services, providers of remote computing services, and “any other communication service provider who has access to wire or electronic communications either as such communications are transmitted or as such communications are stored.” These entities must provide the government with information, facilities, and assistance necessary to obtain communications.

The Brennan Center for Justice at New York University School of Law called the reauthorization “the largest expansion of domestic surveillance authority since the Patriot Act.”

“The bill, which would effectively grant the federal government access to the communications equipment of almost any business in the United States, is a gift to any president who may wish to spy on political enemies,” said Elizabeth Goitein, senior director of the Brennan Center’s Liberty and National Security Program.

Biden signs bill criticized as “major expansion of warrantless surveillance” Read More »

first-real-life-pixel-9-pro-pictures-leak,-and-it-has-16gb-of-ram

First real-life Pixel 9 Pro pictures leak, and it has 16GB of RAM

OK, but what if I don’t care about generative AI? —

With 16GB of RAM, there’s lot of room for Google’s AI models to live in memory.

OnLeak's renders of the <a href='https://www.mysmartprice.com/gear/pixel-9-pro-5k-renders-360-degree-video-exclusive/'>Pixel 9 Pro XL</a>, the <a href='https://www.91mobiles.com/hub/google-pixel-9-design-render-exclusive/'>Pixel 9 Pro</a>, and the <a href = 'https://www.91mobiles.com/hub/google-pixel-9-renders-design-exclusive/'>Pixel 9.</a>” src=”https://cdn.arstechnica.net/wp-content/uploads/2024/03/pixel-9-lineup-800×446.jpg”></img><figcaption>
<div>
<p><a data-height=Enlarge / OnLeak’s renders of the Pixel 9 Pro XL, the Pixel 9 Pro, and the Pixel 9.

OnLeaks / 91Mobiles / MySmartPrice

The usual timeline would put the Google Pixel 9 at something like five months away from launching, but that doesn’t mean it’s too early to leak! Real-life pictures of the “Pixel 9 Pro” model have landed over at Rozetked.

This prototype looks just like the renders from OnLeaks that first came out back in January. The biggest change is a new pill-shaped camera bump instead of the edge-to-edge design of old models. It looks rather stylish in real-life photos, with the rounded corners of the pill and camera glass matching the body shape. The matte back looks like it still uses the excellent “soft-touch glass” material from last year. The front and back of the phone are totally flat, with a metal band around the side. The top edge still has a signal window cut out of it, which is usually for mmWave. The Pixel 8 Pro’s near-useless temperature sensor appears to still be on the back of this prototype. At least, the spot for the temperature sensor—the silver disk right below the LED camera flash—looks identical to the Pixel 8 Pro. As a prototype any of this could change before the final release, but this is what it looks like right now.

The phone was helpfully photographed next to an iPhone 14 Pro Max, and you might notice that the Pixel 9 Pro looks a little small! That’s because this is one of the small models, with only a 6.1-inch display. Previously for Pixels, “Pro” meant “the big model,” but this year Google is supposedly shipping three models, adding in a top-tier small phone. There’s the usual big Pixel 9, with a 6.7-inch display, which will reportedly be called the “Pixel 9 Pro XL.” The new model is the “Pixel 9 Pro”—no XL—which is a small model but still with all the “Pro” trimmings, like three rear cameras. There’s also the Pixel 9 base model, which is the usual smaller phone (6.03-inch) with cut-down specs like only two rear cameras.

Rozetked.” data-height=”1056″ data-width=”1408″ href=”https://cdn.arstechnica.net/wp-content/uploads/2024/04/4.jpg”>The Pixel 9 Pro prototype. It's small because this is the Rozetked.” height=”735″ src=”https://cdn.arstechnica.net/wp-content/uploads/2024/04/4-980×735.jpg” width=”980″>

Enlarge / The Pixel 9 Pro prototype. It’s small because this is the “small Pro” model. There are more pictures over at Rozetked.

Rozetked says (through translation) that the phone is  “similar in size to the iPhone 15 Pro.” It runs a Tensor G4 SoC, of course, and—here’s a noteworthy spec—has a whopping 16GB of RAM according to the bootloader screen. The Pixel 8 Pro tops out at 12GB.

Anything could change between prototype and product, especially for RAM, which is usually scaled up and down in various phone tiers. A jump in RAM is something we were expecting though. As part of Google’s new AI-focused era, it wants generative AI models turned on 24/7 for some use cases. Google said as much in a recent in-house podcast, pointing to some features like a new version of Smart Reply built right into the keyboard, which “requires the models to be RAM-resident”—in other words, loaded all the time. Google’s desire to keep generative AI models in memory means less RAM for your operating system to actually do operating system things, and one solution to that is to just add more RAM. So how much RAM is enough? At one point Google said the smaller Pixel 8’s 8GB of RAM was too much of a “hardware limitation” for this approach. Google PR also recently told us the company still hasn’t enabled generative AI smart reply on Pixel 8 Pro by default with its 12GB of RAM, so expect these RAM numbers to start shooting up.

The downside is that more RAM means a more expensive phone, but this is the path Google is going down. There’s also the issue of whether or not you view generative AI as something that is so incredibly useful you need it built into your keyboard 24/7. Google wants its hardware to be “the intersection of hardware, software, and AI,” so keeping all this ChatGPT-like stuff quarantined to a single app apparently won’t be an option.

One final note: It’s weird how normal this phone looks. Usually, Pixel prototypes have a unique logo that isn’t the Google “G,” and often they are covered in identifying patterns for leak tracing. This looks like a production-worthy design, though.

First real-life Pixel 9 Pro pictures leak, and it has 16GB of RAM Read More »