Facebook

Facebook Will Now Ask Users To Rank News Organizations They Trust (recode.net) 133

An anonymous reader quotes a report from Recode: Facebook is doing a very un-Facebooky thing: It's going to start declaring that some news sources you see in your Facebook feed are better than others, and act accordingly. But Facebook being Facebook, it's going about it in the most Facebooky way possible: It's going to rely on users -- not the super-smart people who work at Facebook -- to figure out which of those sources are better. Mark Zuckerberg says the move is part of an effort to prioritize "news that is trustworthy, informative, and local," within the network and suggests that there will be more announcements to come. The one he describes today will prioritize what kind of news sources pop up in your Facebook News Feed, and will reward ones that Facebook thinks are "broadly trusted," based on user polls, so it can "build a sense of common ground." Facebook is also using today's news to refine last week's roll-out: Zuckerberg says the previously announced changes will reduce the amount of news stories people see in their feed to 4 percent, down from 5 percent.
Education

Tim Cook: 'I Don't Want My Nephew on a Social Network' (theguardian.com) 93

Tim Cook, speaking at Harlow college in Essex, shared his views on the limits on technology and social media he feels should be imposed on kids. He said: "I don't believe in overuse [of technology]. I'm not a person that says we've achieved success if you're using it all the time," he said. "I don't subscribe to that at all." Even in computer-aided courses, such as graphic design, technology should not dominate, he said. "There are are still concepts that you want to talk about and understand. In a course on literature, do I think you should use technology a lot? Probably not." The 57-year old chief executive, who took the reins at Apple after the death of Steve Jobs in 2011, said the company cared deeply about children outside the classroom. "I don't have a kid, but I have a nephew that I put some boundaries on. There are some things that I won't allow; I don't want them on a social network."
Wireless Networking

Google Releases Fix For Chromecast Wi-Fi Crashes (zdnet.com) 32

An anonymous reader quotes a report from ZDNet: Google on Wednesday said it will release an update Jan. 18 to fix a bug in Cast software on Android phones that dramatically slows down WiFi networks. Reports have been circulating this week that the Google Home Max speaker can knock the TP-Link Archer C7 router offline. In a support page, Google explains a bug caused the Cast software that connects with Chromecast devices to send a large amount of network traffic routers can't handle. Google said the update will roll out via a Google Play services update. Until the update is released, Google advises users to try rebooting their Android phone, and check that their WiFi router is updated with the latest firmware. Google didn't list specific routers impacted by the bug, but reports have indicated routers from Linksys and Synology are seeing network crashes as well.
Crime

Facebook Is a 'Living, Breathing Crime Scene,' Says Former Tech Insider (nbcnews.com) 143

An anonymous reader quotes a report from NBC News: With more than 2 billion users, Facebook's reach now rivals that of Christianity and exceeds that of Islam. However, the network's laser focus on profits and user growth has come at the expense of its users, according to one former Facebook manager who is now speaking out against the social platform. "One of the things that I saw consistently as part of my job was the company just continuously prioritized user growth and making money over protecting users," the ex-manager, Sandy Parakilas, who worked at Facebook for 16 months, starting in 2011, told NBC News. During his tenure at Facebook, Parakilas led third-party advertising, privacy and policy compliance on Facebook's app platform. "Facebook is a living, breathing crime scene for what happened in the 2016 election -- and only they have full access to what happened," said Tristan Harris, a former design ethicist at Google. His work centers on how technology can ethically steer the thoughts and actions of the masses on social media and he's been called "the closest thing Silicon Valley has to a conscience" by The Atlantic magazine.

In response to the comments, Facebook issued a statement saying it is a "vastly different company" from when it was founded. "We are taking many steps to protect and improve people's experience on the platform," the statement said. "In the past year, we've worked to destroy the business model for false news and reduce its spread, stop bad actors from meddling in elections, and bring a new level of transparency to advertising. Last week, we started prioritizing meaningful posts from friends and family in News Feed to help bring people closer together. We have more work to do and we're heads down on getting it done."

Google

Project Fi Creates Its Own Version of An Unlimited Plan (theverge.com) 60

Google's Project Fi mobile virtual network operator (MVNO) has launched a new feature called Bill Protection that will cap your $10 per GB data bill at $60 a month, while still allowing you to use as much data as you want, essentially creating its own version of an unlimited data plan. The Verge reports: Prior to today, Project Fi users were charged $10 per GB no matter how much data they used, which could become quite costly for heavy users. Bill Protection should help alleviate those worries for most users. Google says those who use up to 15GB of data in a month won't experience any throttling, but if they cross that threshold -- Google says less than 1 percent of its users pass that mark -- they will "experience slower data" with speeds going down to 256kbps. If you don't want to be throttled when you pass 15GB in a month, Google says you can pay the usual $10 per GB to opt out of the slower speeds. It also noted that Bill Protection for Project Fi users on group plans will kick in at different usage levels, depending on the size of your group.
Bitcoin

Bitcoin Watchers Running Out of Explanations Blame Slump on Moon (bloomberg.com) 156

If regulatory concerns aren't enough to explain Bitcoin's 50 percent slump from its record high reached last month, how about blaming it on the moon? An anonymous reader writes: The Lunar New Year, which marks the first day of the year in the Chinese calendar, is being cited by some as contributing to Bitcoin's slump as Asian traders cash out their cryptocurrencies to travel and buy gifts for the holiday that starts Feb. 16 this year. The festivity is celebrated not just in China, but in other Asian countries including Singapore, Indonesia, Malaysia, Korea and Thailand. "The January drop is a recurring theme in cryptocurrencies as people celebrating the Chinese New Year, aka Lunar New Year, exchange their crypto for fiat currency," said Alexander Wallin, chief executive officer of trading social network SprinkleBit in New York. "The timing is about four to six weeks before the lunar year, when most people make their travel arrangements and start buying presents."
Businesses

'No One Wants Your Used Clothes Anymore' (bloomberg.com) 326

An anonymous reader shares a report: For decades, the donation bin has offered consumers in rich countries a guilt-free way to unload their old clothing. In a virtuous and profitable cycle, a global network of traders would collect these garments, grade them, and transport them around the world to be recycled, worn again, or turned into rags and stuffing. Now that cycle is breaking down. Fashion trends are accelerating, new clothes are becoming as cheap as used ones, and poor countries are turning their backs on the secondhand trade. Without significant changes in the way that clothes are made and marketed, this could add up to an environmental disaster in the making. [...] The tide of secondhand clothes keeps growing even as the markets to reuse them are disappearing. From an environmental standpoint, that's a big problem. Already, the textile industry accounts for more greenhouse-gas emissions than all international flights and maritime shipping combined; as recycling markets break down, its contribution could soar. The good news is that nobody has a bigger incentive to address this problem than the industry itself.
Google

Google Starts Certificate Program To Fill Empty IT Jobs (axios.com) 221

An anonymous reader shares a report: There are 150,000 open IT jobs in the U.S., and Google wants to make it easier to fill them. Today the company is announcing a certificate program on the Coursera platform to help give people with no prior IT experience the basic skills they need to get an entry-level IT support job in 8 to 12 months. Why it matters: Entry-level IT jobs are are typically higher-paying than similar roles in other fields. But they're harder to fill because, while IT support roles don't require a college degree, they do require prior experience. The median annual wage for a computer network support specialist was $62,670 in May 2016 The median annual wage for a computer user support specialist was $52,160 in May 2016. The impetus: Natalie Van Kleef Conley, head recruiter of Google's tech support program, was having trouble finding IT support specialists so she helped spearhead the certificate program. It's also part of Google's initiative to help Americans get skills needed to get a new job in a changing economy, the company told us.
The Almighty Buck

City-Owned Internet Services Offer Cheaper and More Transparent Pricing, Says Harvard Study (arstechnica.com) 113

An anonymous reader quotes a report from Ars Technica: Municipal broadband networks generally offer cheaper entry-level prices than private Internet providers, and the city-run networks also make it easier for customers to find out the real price of service, a new study from Harvard University researchers found. Researchers collected advertised prices for entry-level broadband plans -- those meeting the federal standard of at least 25Mbps download and 3Mbps upload speeds -- offered by 40 community-owned ISPs and compared them to advertised prices from private competitors. The report by researchers at the Berkman Klein Center for Internet & Society at Harvard doesn't provide a complete picture of municipal vs. private pricing. But that's largely because data about private ISPs' prices is often more difficult to get than information about municipal network pricing, the report says. In cases where the researchers were able to compare municipal prices to private ISP prices, the city-run networks almost always offered lower prices. This may help explain why the broadband industry has repeatedly fought against the expansion of municipal broadband networks.
Network

Lenovo Discovers and Removes Backdoor In Networking Switches (bleepingcomputer.com) 42

An anonymous reader writes: Lenovo engineers have discovered a backdoor in the firmware of RackSwitch and BladeCenter networking switches. The company released firmware updates last week. The Chinese company said it found the backdoor after an internal security audit of firmware for products added to its portfolio following the acquisitions of other companies. Lenovo says the backdoor affects only RackSwitch and BladeCenter switches running ENOS (Enterprise Network Operating System).

The backdoor was added to ENOS in 2004 when ENOS was maintained by Nortel's Blade Server Switch Business Unit (BSSBU). Lenovo claims Nortel appears to have authorized the addition of the backdoor "at the request of a BSSBU OEM customer." In a security advisory regarding this issue, Lenovo refers to the backdoor under the name of "HP backdoor." The backdoor code appears to have remained in the firmware even after Nortel spun BSSBU off in 2006 as BLADE Network Technologies (BNT). The backdoor also remained in the code even after IBM acquired BNT in 2010. Lenovo bought IBM's BNT portfolio in 2014.

Microsoft

AI Beats Humans at Reading Comprehension (bloomberg.com) 170

In what is being called a landmark moment for natural language processing, Alibaba and Microsoft have developed AIs that can outperform humans on a reading and comprehension test. From a report: Alibaba Group put its deep neural network model through its paces last week, asking the AI to provide exact answers to more than 100,000 questions comprising a quiz that's considered one of the world's most authoritative machine-reading gauges. The model developed by Alibaba's Institute of Data Science of Technologies scored 82.44, edging past the 82.304 that rival humans achieved. Alibaba said it's the first time a machine has out-done a real person in such a contest. Microsoft achieved a similar feat, scoring 82.650 on the same test, but those results were finalized a day after Alibaba's, the company said.
Moon

Scientists Think They've Discovered Lava Tubes Leading To the Moon's Polar Ice (sciencealert.com) 59

schwit1 quotes ScienceAlert: Small pits in a large crater on the Moon's North Pole could be "skylights" leading down to an underground network of lava tubes -- tubes holding hidden water on Earth's nearest neighbour, according to new research. There's no lava in them now of course, though that's originally how the tubes formed in the Moon's fiery past. But they could indicate easy access to a water source if we ever decide to develop a Moon base sometime in the future.

Despite the Moon's dry and dusty appearance, scientists think it contains a lot of water trapped as frozen ice. What these new observations carried out by NASA's Lunar Reconnaissance Orbiter (LRO) show is that it might be much more accessible than we thought... Scientists have long been thinking about how to extract the ice reserves we think are up there -- solar power was originally out of the question, as it's the freezing shadowed areas of the Moon that have preserved the ice in the first place. Not only would natural skylights like these provide easier access to the underground ice, it would also mean solar power would be back on the table as an idea.

Government

Chelsea Manning Files to Run for U.S. Senate in Maryland (washingtonpost.com) 313

An anonymous reader quotes the Washington Post: Chelsea E. Manning, the transgender former Army private who was convicted of passing sensitive government documents to WikiLeaks, is seeking to run for the U.S. Senate in Maryland, according to federal election filings. Manning would be challenging Democrat Benjamin L. Cardin, who is in his second term in the Senate and is up for reelection in November. Cardin is Maryland's senior senator and is considered an overwhelming favorite to win a third term... However, a candidate with national name recognition, such as Manning, who comes in from the outside could tap a network of donors interested in elevating a progressive agenda...

Evan Greer, campaign director of the nonprofit organization Fight for the Future and a close supporter of Manning's while she was imprisoned, said the news is exciting. "Chelsea Manning has fought for freedom and sacrificed for it in ways that few others have," Greer wrote in an email. "The world is a better place with her as a free woman, and this latest news makes it clear she is only beginning to make her mark on it."

Intel

Researcher Finds Another Security Flaw In Intel Management Firmware (arstechnica.com) 87

An anonymous reader quotes a report from Ars Technica: Meltdown and Spectre are not the only security problems Intel is facing these days. Today, researchers at F-Secure have revealed another weakness in Intel's management firmware that could allow an attacker with brief physical access to PCs to gain persistent remote access to the system, thanks to weak security in Intel's Active Management Technology (AMT) firmware -- remote "out of band" device management technology installed on 100 million systems over the last decade, according to Intel. [T]he latest vulnerability -- discovered in July of 2017 by F-Secure security consultant Harry Sintonen and revealed by the company today in a blog post -- is more of a feature than a bug. Notebook and desktop PCs with Intel AMT can be compromised in moments by someone with physical access to the computer -- even bypassing BIOS passwords, Trusted Platform Module personal identification numbers, and Bitlocker disk encryption passwords -- by rebooting the computer, entering its BIOS boot menu, and selecting configuration for Intel's Management Engine BIOS Extension (MEBx).

If MEBx hasn't been configured by the user or by their organization's IT department, the attacker can log into the configuration settings using Intel's default password of "admin." The attacker can then change the password, enable remote access, and set the firmware to not give the computer's user an "opt-in" message at boot time. "Now the attacker can gain access to the system remotely," F-Secure's release noted, "as long as they're able to insert themselves onto the same network segment with the victim (enabling wireless access requires a few extra steps)."

It's funny.  Laugh.

Bitcoin Conference Stops Accepting BTC Due To High Fees (bitcoin.com) 135

An anonymous reader shares a report: Next week the popular cryptocurrency event, The North American Bitcoin Conference (TNABC) will be hosted in downtown Miami at the James L Knight Center, January 18-19. However, bitcoin proponents got some unfortunate news this week as the event organizers have announced they have stopped accepting bitcoin payments for conference tickets due to network fees and congestion. Bitcoin settlement times, and the fee market associated with transactions, have become a hot topic these days as on-chain fees have risen to $30-60 per transaction. These issues have made it extremely difficult for businesses to operate, and many merchants have stopped accepting bitcoin for services and goods altogether.
Wireless Networking

With WPA3, Wi-Fi Security is About To Get a Lot Tougher (zdnet.com) 121

One of the biggest potential security vulnerabilities -- public Wi-Fi -- may soon get its fix. From a report: The Wi-Fi Alliance, an industry body made up of device makers including Apple, Microsoft, and Qualcomm, announced Monday its next-generation wireless network security standard, WPA3. The standard will replace WPA2, a near-two decades-old security protocol that's built in to protect almost every wireless device today -- including phones, laptops, and the Internet of Things.

One of the key improvements in WPA3 will aim to solve a common security problem: open Wi-Fi networks. Seen in coffee shops and airports, open Wi-Fi networks are convenient but unencrypted, allowing anyone on the same network to intercept data sent from other devices. WPA3 employs individualized data encryption, which scramble the connection between each device on the network and the router, ensuring secrets are kept safe and sites that you visit haven't been manipulated.
Further reading: WPA3 WiFi Standard Announced After Researchers KRACKed WPA2 Three Months Ago
Media

Ask Slashdot: What's the Best Media Streaming Device? 206

The network card died on Thelasko's smart TV -- and rather than spend $65 on a new one, they're considering buying a nice, simple streaming box. I am running a Rygel server on my PC, but rarely use it... I primarily only watch Amazon Prime, Netflix, and YouTube for streaming, and am wondering what Slashdot users have found to be the best option. I'm considering Roku or Chromecast because they are well known and supported. However, I have heard a lot of news about Kodi devices being more hackable.
AppleTV? Amazon Fire TV? The Emtec GEM Box? Building your own from a Raspberry Pi? Leave your own thoughts and suggestions in the comments.

What's the best media streaming device?
Piracy

Don't Pirate Or We'll Mess With Your Connected Thermostats, Warns East Coast ISP (engadget.com) 252

Internet service provider Armstrong Zoom has roughly a million subscribers in the Northeastern part of the U.S. and is keen to punish those it believes are using file-sharing services. According to Engadget, "the ISP's response to allegedly naughty customers is bandwidth throttling, which is when an ISP intentionally slows down your internet service based on what you're doing online. Armstrong Zoom's warning letter openly threatens its suspected file-sharing customers about its ability to use or control their webcams and connected thermostats." From the report: The East Coast company stated: "Please be advised that this may affect other services which you may have connected to your internet service, such as the ability to control your thermostat remotely or video monitoring services." All U.S. states served by Armstrong Zoom will be experiencing temperatures around or under freezing over the weekend and into the near future. Bandwidth throttling for customers in those areas who have connected thermostats could mean the difference between sickness and health, or even life and death. Seems like an extreme punishment for any allegedly downloaded Game of Thrones cam rips.
Businesses

What Happens When States Have Their Own Net Neutrality Rules? (bloomberg.com) 179

Last month FCC Chairman Ajit Pai dismantled Obama-era rules on net neutrality. A handful of lawmakers in liberal-leaning U.S. states plan to spend this year building them back up. FCC anticipated the move -- the commission's rules include language forbidding states from doing this, warning against an unwieldy patchwork of regulations. But lawmakers in New York and California aren't aiming to be exceptions to the national rules; they're looking to, in effect, create their own. From a report: In New York, Assemblywoman Patricia Fahy introduced a bill that would make it a requirement for internet providers to adhere to the principles of net neutrality as a requirement for landing state contracts. This would mean they couldn't block or slow down certain web traffic, and couldn't offer faster speeds to companies who pay them directly. Fahy said the restrictions on contractors would apply even if the behaviors in question took place outside New York. She acknowledged that the approach could run afoul of limits on states attempting to regulate interstate commerce, but thought the bill could "thread the needle." Even supporters of state legislation on net neutrality think this may go too far. California State Senator Scott Wiener introduced a bill this week that would only apply to behavior within the state, saying any other approach would be too vulnerable to legal challenge.

But this wouldn't be the first time a large state threw around its weight in ways that reverberate beyond its borders. The texbook industry, for instance, has long accommodated the standards of California and Texas. [...] The internet doesn't lend itself cleanly to state lines. It could be difficult for Comcast or Verizon to accept money from services seeking preferential treatment in one state, then make sure that its network didn't reflect those relationships in places where state lawmakers forbade them, said Geoffrey Manne, executive director of the International Center for Law & Economics, a research group.

The Internet

How Do Americans Define Online Harassment? (theverge.com) 148

An anonymous reader quotes a report from The Verge: According to a new Pew Research Center survey, defining online harassment is just as complicated for the average American user as it is for huge social media companies -- and the line gets even more fuzzy when gender or race come into the picture. The survey polled 4,151 respondents on various scenarios and asked them whether each one crossed the threshold for online harassment. In one hypothetical, a private disagreement between a man and his friend David is forwarded to a third party and posted online, which escalates to David receiving "unkind" messages, "vulgar" messages, and eventually being doxxed and threatened. When asked whether or not David was harassed, 89 percent of respondents agreed that he was. However, opinions on exactly when the harassment began varied widely: 5 percent considered it harassment when David offends his friend; 48 percent said it's when the friend forwards the conversation; 54 percent said it's when the conversation is shared publicly. Others agreed it crossed the line when David received the unkind messages (72 percent), the vulgar messages (82 percent), is doxxed (85 percent), and threatened (85 percent). There was little difference in responses by gender.

Questions regarding sexual harassment, perhaps unsurprisingly, are more divisive -- especially between men and women. In a second example, a woman named Julie receives "vulgar messages" about her looks and sexual behavior after posting on social media about a controversial issue. Women were about three times more likely than men (24 percent vs. 9 percent) to label it online harassment when Julie's post is shared by a popular blogger with thousands of followers. Fifty percent of women vs. 35 percent of men consider it harassment when Julie starts getting unkind messages. When it comes to vulgar messages, threats, or Julie's photo being edited to include sexual imagery, 8 out of 10 men consider it harassment, as opposed to 9 out of 10 women.

There's also a curious division between acknowledging something as harassment and believing that action should be taken by social media platforms. In the case of sexual harassment, for example, 43 percent of respondents considered the unkind messages harassment -- yet only 20 percent thought the social media platform should intervene. In a scenario where a woman's picture is edited to include sexual imagery, 84 percent called it harassment, but only 71 percent thought platforms should step in. The same can be said of an example involving racial harassment. Although 82 percent of respondents called messages with racial slurs and insults harassment, only 57 percent thought the platform should step in; the same goes for the person having their picture edited to include racially insensitive images (80 percent vs. 57 percent) and threats (82 percent vs. 67 percent). In both cases, respondents' gender is not provided.

Slashdot Top Deals