The 'Go' Team Releases Version 1.14

The new 1.14 release of the Go programming language “is dotted with performance and security improvements,” reports the developer news site DevClass, “but also gives devs more flexibility when it comes to module use.”

And they also give a nice overview of Go’s development process:
Go is the language most containerization projects are built with. The wide adoption of this approach is one of the reasons that made the Go team implement a new feedback-based system for language enhancements. In it, only a limited number of new features are proposed for an upcoming release, giving the community room to weigh in on them. If they decide a change will do more good than harm the feature will make it into the new version. However, since alterations affect a quite wide range of people, they are often heavily disputed. This already led to the abandoning of a proposal thought to improve the language’s often discussed error handling. Currently, a couple of new vet checks and minor adjustments are discussed for the 1.15 release.

Updates in Go 1.14 mainly concern the toolchain, runtime, and libraries. The only change to the language allows for methods of embedded interfaces to have the same name and signature as those on the embedding interface. Supposedly to facilitate the creation of somewhat safer applications, version 1.14 includes a hash/maphash package. The hash functions on byte sequences contained in it are meant to help with the implementation of hash tables or similar data structures. The Go team warns though that “the hash functions are collision-resistant but not cryptographically secure….”

Go 1.14 is the last release to run on macOS 10.11 and support 32-bit binaries on Apple’s operating system. Meanwhile binaries for Windows come with data execution prevention enabled, experimental support for 64-bit RISC-V on Linux is included, and v1.14 should work with 64-bit ARM architecture on FreeBSD 12.0 or later.

Read more of this story at Slashdot.



Source: Slashdot – The ‘Go’ Team Releases Version 1.14

LG Display halts work at phone screen factory after coronavirus infection

Samsung isn’t the only Korean tech giant grappling with coronavirus infections. LG Display has temporarily halted work at a smartphone screen factory in Gumi, South Korea after a bank worker near the facility tested positive for COVID-19. The compa…

Source: Engadget – LG Display halts work at phone screen factory after coronavirus infection

Is Microsoft Retaliating For Chrome's Warnings About Extension Security in Edge?

Several pundits criticized Google for warning Edge users to switch to Chrome if they wanted to use Chrome extensions “securely”. “In Chrome, a plugin can be remotely disabled by the Chrome team if it’s considered unsafe for whatever reason,” notes PC World. “Google lacks the ability to remotely disable the same plugin within Edge, prompting Google to recommend switching to Chrome, a source close to Google said.”

Though PC World notes that Google isn’t giving the same warning to Opera users…

Yet now when you try to add Chrome Extensions to Edge, Microsoft also gives you a warning of its own — that extensions installed from sources other than the Microsoft Store “are unverified [by Microsoft], and may affect browser performance.” And while Google.com is still displaying an ad for Chrome to web surfers using Edge, now if you search for “Chrome web store” on Bing, the first result is an ad (“promoted by Microsoft”) for Microsoft’s own Edge browser.

ZDNet’s Chris Matyszczyk asked both Google and Microsoft for a comment:

[N]othing from Google. But suddenly, a confirmation from Microsoft that it wouldn’t offer official comment. My sniffings around Google suggest the company may have been taken aback by the positive public reaction to Edge… My nasal probings around Redmond offer the reasoning that, well, Microsoft hasn’t tested or verified extensions that arrive from places other than they Microsoft Edge add-ons website. Why, they’re far too busy to do that. And, well, it’s the Chrome web store. Who knows what you’ll find over there? Oh, and Edge gives you more control over your data, so there.

Could it be, then, that Google is being vacuously childish and trying to scare people into resisting the lures of Microsoft’s browser handiwork? Could it also be that Microsoft is doing something rather similar in either retaliation or merely homage to the brutally competitive instincts of social activist Bill Gates?

Could it be that both of these companies should pause to examine their consciences, go sit in a corner and embrace their customers’ needs and choices a touch more fully?

Read more of this story at Slashdot.



Source: Slashdot – Is Microsoft Retaliating For Chrome’s Warnings About Extension Security in Edge?

Moment stops work on its Android camera app due to complexity

You may have to be pickier about your choice of phone if you’re a mobile photography enthusiast. Moment has stopped working on its Pro Camera app for Android due to a lack of “engineering bandwidth” (read: enough available staff) to develop the soft…

Source: Engadget – Moment stops work on its Android camera app due to complexity

A M.A.S.K. Movie Is Still Happening, and It Has a New Writer

M.A.S.K., the Kenner toyline about transforming war vehicles helmed by pilots in rejected sets of Destiny armor, has been on the rocky path to a film adaptation for a long time. Last we heard, it was still happening. But that was in 2018, and a lot can change in that time. But this is, apparently, not one of them—

Read more…



Source: io9 – A M.A.S.K. Movie Is Still Happening, and It Has a New Writer

Google Plans Stadia 'Digital Experience' Event Following GDC 2020 Postponement

Google Plans Stadia 'Digital Experience' Event Following GDC 2020 Postponement
One of the biggest things to happen in the tech world recently was the postponement of the Game Developer Conference (GDC) 2020. Rather than put off talking about what it wanted to at the show, Google has announced an alternative. It will offer what it calls a “digital experience” to learn more about Stadia and other topics it intended for

Source: Hot Hardware – Google Plans Stadia ‘Digital Experience’ Event Following GDC 2020 Postponement

Some Clever Farmers are Harvesting Metals From Plants

The New York Times reports:

Some of Earth’s plants have fallen in love with metal. With roots that act practically like magnets, these organisms — about 700 are known — flourish in metal-rich soils that make hundreds of thousands of other plant species flee or die….

The plants not only collect the soil’s minerals into their bodies but seem to hoard them to “ridiculous” levels, said Alan Baker, a visiting botany professor at the University of Melbourne who has researched the relationship between plants and their soils since the 1970s. This vegetation could be the world’s most efficient, solar-powered mineral smelters. What if, as a partial substitute to traditional, energy-intensive and environmentally costly mining and smelting, the world harvested nickel plants…?

On a plot of land rented from a rural village on the Malaysian side of the island of Borneo, Dr. Baker and an international team of colleagues have proved it at small scale. Every six to 12 months, a farmer shaves off one foot of growth from these nickel-hyper-accumulating plants and either burns or squeezes the metal out. After a short purification, farmers could hold in their hands roughly 500 pounds of nickel citrate, potentially worth thousands of dollars on international markets. Now, as the team scales up to the world’s largest trial at nearly 50 acres, their target audience is industry. In a decade, the researchers hope that a sizable portion of insatiable consumer demand for base metals and rare minerals could be filled by the same kind of farming that produces the world’s coconuts and coffee… [T]he technology has the additional value of enabling areas with toxic soils to be made productive…

Now, after decades behind the lock and key of patents, Dr. Baker said, “the brakes are off the system.”

Long-time Slashdot reader necro81 adds “This process, called phytomining, cannot supplant the scale of traditional mining, but could make a dent in the world’s demand for nickel, cobalt, and zinc.

“Small-holding farmers could earn more from phytomining than from coaxing food crops from metal-laden soils. Using these plants could also help clean brownfields left over from prior industrial use.”

Read more of this story at Slashdot.



Source: Slashdot – Some Clever Farmers are Harvesting Metals From Plants

Boeing didn't conduct end-to-end tests on Starliner before its failed flight

Boeing Starliner’s first unmanned flight failed in December, because the aerospace giant divided its tests in small chunks instead of conducting longer tests that simulate the whole process from launch to docking. Starliner program manager John Mulho…

Source: Engadget – Boeing didn’t conduct end-to-end tests on Starliner before its failed flight

EK Brings Fluid Gaming Water Cooled PCs to the Masses at PAX East

EK Brings Fluid Gaming Water Cooled PCs to the Masses at PAX East
Liquid cooling systems provide many benefits and look fantastic, but they are not always accessible to gamers on a budget. The company EK is known for their water blocks and liquid cooling solutions, but they have recently branched out to include fully-built systems. EK showed off their line of fluid-gaming PCs at PAX East 2020 in Boston,

Source: Hot Hardware – EK Brings Fluid Gaming Water Cooled PCs to the Masses at PAX East

Chasing AMD, Intel Promises Full Memory Encryption in Upcoming CPUs

“Intel’s security plans sound a lot like ‘we’re going to catch up to AMD,'” argues FOSS advocate and “mercenary sysadmin” Jim Salter at Ars Technica, citing a “present-and-future” presentation by Anil Rao and Scott Woodgate at Intel’s Security Day that promised a future with Full Memory Encryption but began with Intel SGX (launched with the Skylake microarchitecture in 2015).
Salter describes SGX as “one of the first hardware encryption technologies designed to protect areas of memory from unauthorized users, up to and including the system administrators themselves.”
SGX is a set of x86_64 CPU instructions which allows a process to create an “enclave” within memory which is hardware encrypted. Data stored in the encrypted enclave is only decrypted within the CPU — and even then, it is only decrypted at the request of instructions executed from within the enclave itself. As a result, even someone with root (system administrator) access to the running system can’t usefully read or alter SGX-protected enclaves. This is intended to allow confidential, high-stakes data processing to be safely possible on shared systems — such as cloud VM hosts. Enabling this kind of workload to move out of locally owned-and-operated data centers and into massive-scale public clouds allows for less expensive operation as well as potentially better uptime, scalability, and even lower power consumption.

Intel’s SGX has several problems. The first and most obvious is that it is proprietary and vendor-specific — if you design an application to utilize SGX to protect its memory, that application will only run on Intel processors… Finally, there are potentially severe performance impacts to utilization of SGX. IBM’s Danny Harnik tested SGX performance fairly extensively in 2017, and he found that many common workloads could easily see a throughput decrease of 20 to 50 percent when executed inside SGX enclaves. Harnik’s testing wasn’t 100 percent perfect, as he himself made clear — in particular, in some cases his compiler seemed to produce less-optimized code with SGX than it had without. Even if one decides to handwave those cases as “probably fixable,” they serve to highlight an earlier complaint — the need to carefully develop applications specifically for SGX use cases, not merely flip a hypothetical “yes, encrypt this please” switch….

After discussing real-world use of SGX, Rao moved on to future Intel technologies — specifically, full-memory encryption. Intel refers to its version of full-memory encryption as TME (Total Memory Encryption) or MKTME (Multi-Key Total Memory Encryption). Unfortunately, those features are vaporware for the moment. Although Intel submitted an enormous Linux kernel patchset last May for enabling those features, there are still no real-world processors that offer them… This is probably a difficult time to give exciting presentations on Intel’s security roadmap. Speculative prediction vulnerabilities have hurt Intel’s processors considerably more than their competitors’, and the company has been beaten significantly to market by faster, easier-to-use hardware memory encryption technologies as well. Rao and Woodgate put a brave face on things by talking up how SGX has been and is being used in Azure. But it seems apparent that the systemwide approach to memory encryption already implemented in AMD’s Epyc CPUs — and even in some of their desktop line — will have a far greater lasting impact.

Intel’s slides about their own upcoming full memory encryption are labeled “innovations,” but they look a lot more like catching up to their already-established competition.

Read more of this story at Slashdot.



Source: Slashdot – Chasing AMD, Intel Promises Full Memory Encryption in Upcoming CPUs