Nokia 9 Buggy Update Lets Anyone Bypass Fingerprint Scanner With a Pack of Gum

A buggy update for Nokia 9 PureView handsets has apparently impacted the smartphone model’s in-screen fingerprint scanner, which can now be bypassed using unregistered fingerprints or even with something as banal as a pack of gum. From a report: Multiple users have complained about this problem over the weekend, after installing an OS update (v4.22) released on April 18. The update was meant to improve the phone’s in-screen fingerprint scanner module — so that users won’t have to press their fingers too hard on the screen before the phone unlocks — yet it had the exact opposite effect the company hoped for. While initially, the reported issues appeared to be new, a video recorded by another user showed the same problem (unlocking phones with unregistered fingerprints) even before the v4.22 update, meaning that the update just made the unlocking bug worse than it already was.

Read more of this story at Slashdot.

Source: Slashdot – Nokia 9 Buggy Update Lets Anyone Bypass Fingerprint Scanner With a Pack of Gum

Samsung's Galaxy Fold Smartphone Release Delayed

Samsung Electronics is delaying the expected Friday rollout of its Galaxy Fold smartphone [Editor’s note: the link may be paywalled; alternative source] until at least next month, WSJ reported Monday citing people familiar with the matter, the latest fallout from a product headache that began with tech reviewers reporting their test devices had malfunctioned. From the report: The Galaxy Fold phone — priced at nearly $2,000 and the industry’s first mainstream foldable-screen device — was slated to hit shelves this week in the U.S. But problems with phones being used by reviewers have changed those plans, the people said. The new rollout is expected in the coming weeks, though a firm date has yet to be determined, they said. Though the company’s internal investigation remains ongoing, the Galaxy Fold phone’s reported issues stem from problems affecting the handset’s hinge and extra pressure applied to the internal screen, the people said. A Samsung spokeswoman didn’t have immediate comment. The company had previously said it would adhere to its plans for the Galaxy Fold phones to hit shelves on April 26 in the U.S. The delayed launch came hours after Samsung abruptly scrapped prerelease media events planned for Hong Kong on Tuesday and Shanghai on Wednesday.

Read more of this story at Slashdot.

Source: Slashdot – Samsung’s Galaxy Fold Smartphone Release Delayed

Apple Spends More Than $30 Million on Amazon's Cloud Every Month, Making It One of the Biggest AWS Customers

As Apple and Amazon compete for a greater share of consumer dollars and attention, they also have a particularly intimate business relationship: Apple is spending more than $30 million a month on Amazon’s cloud, CNBC reported Monday, citing citing people familiar with the matter. From the report: Apple’s cloud expenditure reflects the company’s determination to deliver online services like iCloud quickly and reliably, even if it must depend on a rival to do so. […] In a February job posting, Apple said it was looking for someone who could “lead and architect our growing AWS footprint.” Indeed, that expenditure is on track to expand. At the end of March, Apple’s spending was on track to average more than $30 million per month in the first quarter of 2019. That would be more than 10 percent higher than a year earlier, according to two people familiar with the spending. If Apple’s AWS use stays at those levels for the rest of 2019, its annual spending would exceed $360 million. Apple spent approximately $350 million in 2018, one of these people said.

Read more of this story at Slashdot.

Source: Slashdot – Apple Spends More Than Million on Amazon’s Cloud Every Month, Making It One of the Biggest AWS Customers

EU Votes To Create Gigantic Biometrics Database

The European Parliament voted last week to interconnect a series of border-control, migration, and law enforcement systems into a gigantic, biometrics-tracking, searchable database of EU and non-EU citizens. From a report: This new database will be known as the Common Identity Repository (CIR) and is set to unify records on over 350 million people. Per its design, CIR will aggregate both identity records (names, dates of birth, passport numbers, and other identification details) and biometrics (fingerprints and facial scans), and make its data available to all border and law enforcement authorities.

Its primary role will be to simplify the jobs of EU border and law enforcement officers who will be able to search a unified system much faster, rather than search through separate databases individually. “The systems covered by the new rules would include the Schengen Information System, Eurodac, the Visa Information System (VIS) and three new systems: the European Criminal Records System for Third Country Nationals (ECRIS-TCN), the Entry/Exit System (EES) and the European Travel Information and Authorisation System (ETIAS),” EU officials said last week.

Read more of this story at Slashdot.

Source: Slashdot – EU Votes To Create Gigantic Biometrics Database

Scientists Create 'Living' Machines That Eat, Grow, and Evolve

elainerd (Slashdot reader #94,528) shares an article from The Next Web:
Scientists from Cornell University have successfully constructed DNA-based machines with incredibly life-like capabilities. These human-engineered organic machines are capable of locomotion, consuming resources for energy, growing and decaying, and evolving. Eventually they die.

That sure sounds a lot like life, but Dan Luo, professor of biological and environmental engineering in the College of Agriculture and Life Sciences at Cornell, who worked on the research, says otherwise. He told The Stanford Chronicle, “We are introducing a brand-new, lifelike material concept powered by its very own artificial metabolism. We are not making something that’s alive, but we are creating materials that are much more lifelike than have ever been seen before.” Just how lifelike? According to the research they’re on par with biologically complex organisms such as mold…. “Dynamic biomaterials powered by artificial metabolism could provide a previously unexplored route to realize ‘artificial’ biological systems with regenerating and self-sustaining characteristics.”
Basically, the Cornell team grew their own robots using a DNA-based bio-material, observed them metabolizing resources for energy, watched as they decayed and grew, and then programmed them to race against each other… Lead author on the team’s paper, Shogo Hamada, told The Stanford Chronicle that “ultimately, the system may lead to lifelike self-reproducing machines.”

Read more of this story at Slashdot.

Source: Slashdot – Scientists Create ‘Living’ Machines That Eat, Grow, and Evolve

Kansas Towns 'Rebel' Against Zuckerberg-Funded School Programs

“I want to just take my Chromebook back and tell them I’m not doing it anymore,” said Kallee Forslund, 16, a 10th grader in Wellington.

The New York Times reports on a “rebellion” that started in Kansas against an online “personalized learning” program funded by Mark Zuckerberg and his wife, and developed by Facebook engineers — including a classroom walk-out, a sit-in, and parent protests at public school board meetings.
Read the Times’ pay-walled original article or this free alternate version. Some highlights:

Eight months earlier, public schools near Wichita had rolled out a web-based platform and curriculum from Summit Learning… Many families in the Kansas towns, which have grappled with underfunded public schools and deteriorating test scores, initially embraced the change. Under Summit’s program, students spend much of the day on their laptops and go online for lesson plans and quizzes, which they complete at their own pace. Teachers assist students with the work, hold mentoring sessions and lead special projects. The system is free to schools. The laptops are typically bought separately.

Then, students started coming home with headaches and hand cramps. Some said they felt more anxious. One child began having a recurrence of seizures. Another asked to bring her dad’s hunting earmuffs to class to block out classmates because work was now done largely alone. “We’re allowing the computers to teach and the kids all looked like zombies,” said Tyson Koenig, a factory supervisor in McPherson, who visited his son’s fourth-grade class. In October, he pulled the 10-year-old out of the school. In a school district survey of McPherson middle school parents released this month, 77 percent of respondents said they preferred their child not be in a classroom that uses Summit. More than 80 percent said their children had expressed concerns about the platform…

The resistance in Kansas is part of mounting nationwide opposition to Summit, which began trials of its system in public schools four years ago and is now in around 380 schools and used by 74,000 students. In Brooklyn, high school students walked out in November after their school started using Summit’s platform. In Indiana, Pa., after a survey by Indiana University of Pennsylvania found 70 percent of students wanted Summit dropped or made optional, the school board scaled it back and then voted this month to terminate it. And in Cheshire, Conn., the program was cut after protests in 2017…

By [this] winter, many McPherson and Wellington students were fed up. While Summit’s program asks schools to commit to having students meet weekly in person with teachers for at least 10 minutes, some children said the sessions lasted around two minutes or did not happen.

The Parent Coalition for Student Privacy says the program also “demands an extraordinary amount of personal information about each student and plans to track them through college and beyond.” But the real concern is whether the programs are effective. The Times also spoke to a senior scientist at the RAND corporation who’s studied digital customized learning programs, who acknowledges “There has not been enough research.” And a Wellington city councilman told them that 12 parents actually pulled their children out of the school system after this year’s first semester — and nearly 40 more plan to do so by summer vacation.
One church secretary (with two school-age children) even coined a pithy slogan for her yard sign: “Don’t Plummet With Summit.”

Read more of this story at Slashdot.

Source: Slashdot – Kansas Towns ‘Rebel’ Against Zuckerberg-Funded School Programs

The Incredibly Stupid Plot To Hijack a Domain By Breaking Into Its Owner's House With A Gun

CNN tells the story of 24-year-old “social media influencer” Rossi Lorathio Adams II who’d wanted his domain to be the slogan of his social media sites (which at one point had over a million followers on Snapchat, Instagram and Twitter). Unfortunately, that domain was already owned by another man in Iowa — but Adams came up with a solution:

In June 2017, Adams enlisted his cousin to break into the domain owner’s home and force him to transfer it. The cousin drove to the domain owner’s house and provided a demand note [which contained “a series of directions on how to change an Internet domain name from the domain owner’s GoDaddy account to one of Adams’ GoDaddy accounts.”] After entering the home, the intruder grabbed the victim’s arm and ordered him to connect his computer to the internet. He put the firearm against the victim’s head and ordered him to follow the instructions.

“Fearing for his life, the victim quickly turned to move the gun away from his head. The victim then managed to gain control of the gun,” court records show. The victim shot the intruder multiple times and called the police. The intruder, Adams’ cousin Sherman Hopkins Jr., was sentenced to 20 years in prison last year. Now it’s Adams’ turn. He will remain in custody pending sentencing. He faces a maximum 20 years in prison, a $250,000 fine and three years of supervised release.

Read more of this story at Slashdot.

Source: Slashdot – The Incredibly Stupid Plot To Hijack a Domain By Breaking Into Its Owner’s House With A Gun

Are We Sacrificing Too Much For Automation?

Fast Company shares an essay from an anthropologist who researches human agency, algorithms, AI, and automation in the context of social systems:

With the advent of computational tools for quantitative measurement and metrics, and the development of machine learning based on the big data developed by those metrics, organizations, Amazon among them, started to transition through a period of what I refer to as “extreme data analysis,” whereby anything and anyone that can be measured, is. This is a problem. Using counting, metrics, and implementation of outcomes from extreme data analysis to inform policies for humans is a threat to our well-being, and results in the stories we are hearing about in the warehouse, and in other areas of our lives, where humans are too often forfeiting their agency to algorithms and machines. Unfortunately, after decades of building this quantitative scaffolding, a company such as Amazon has pretty much baked it into their infrastructure and their culture….

As the world continues to automate things, processes, and services, humans are put in positions where we must constantly adapt, since at the moment, automation cannot, and does not, cooperate with us outside of its pre-programmed repertoire. Thus, in many instances we must do the yielding of our agency and our choices, to the algorithms or robots, to reach the cooperative outcomes we require…. If every process is eventually automated and restricts human agency, while simultaneously requiring our servitude to function, we will be pinned to the wall with no choices, nothing left to give, and no alternatives for coping with it.
One example provided was the Amazon worker who complained the warehouse temperatures were always kept too hot — to accommodate the needs of Amazon’s robots. But the article argues we also forfeit agency “Every time we use a computer, or any computationally based device…

“We do this by sitting or standing to use a keyboard, by typing, clicking, scrolling, checking boxes, pulling down menus, and filling in data in a way that the machine can understand.”

Read more of this story at Slashdot.

Source: Slashdot – Are We Sacrificing Too Much For Automation?

Why Modern C++ Still Isn't As Safe As Memory-Safe Languages Like Rust and Swift

Alex Gaynor is a software engineer at Mozilla working on Firefox, after previously serving as a director of both the Python Software Foundation and the Django Software Foundation.

In a new blog post today, he argues that memory unsafe languages, “principally C and C++,” induce an exceptional number of security vulnerabilities, and that the industry needs to migrate to memory-safe languages like Rust and Swift by default.
One of the responses I frequently receive is that the problem isn’t C and C++ themselves, developers are simply holding them wrong. In particular, I often receive defenses of C++ of the form, “C++ is safe if you don’t use any of the functionality inherited from C” or similarly that if you use modern C++ types and idioms you will be immune from the memory corruption vulnerabilities that plague other projects. I would like to credit C++’s smart pointer types, because they do significantly help. Unfortunately, my experience working on large C++ projects which use modern idioms is that these are not nearly sufficient to stop the flood of vulnerabilities…

Modern C++ idioms introduce many changes which have the potential to improve security: smart pointers better express expected lifetimes, std::span ensures you always have a correct length handy, std::variant provides a safer abstraction for unions. However modern C++ also introduces some incredible new sources of vulnerabilities: lambda capture use-after-free, uninitialized-value optionals, and un-bounds-checked span.
My professional experience writing relatively modern C++, and auditing Rust code (including Rust code that makes significant use of unsafe) is that the safety of modern C++ is simply no match for memory safe by default languages like Rust and Swift (or Python and JavaScript, though I find it rare in life to have a program that makes sense to write in either Python or C++). There are significant challenges to migrating existing, large, C and C++ codebases to a different language — no one can deny this. Nonetheless, the question simply must be how we can accomplish it, rather than if we should try.

The post highlights what he describes as “completely modern C++ idioms which produce vulnerabilities” — including an example of dangling pointers “despite our meticulous use of smart pointers throughout…”

“Even with the most modern C++ idioms available, the evidence is clear that, at scale, it’s simply not possible to hold C++ right.”

Read more of this story at Slashdot.

Source: Slashdot – Why Modern C++ Still Isn’t As Safe As Memory-Safe Languages Like Rust and Swift

Black Hole Photo Used Supercomputers and Cloud Computing To Prove Einstein Right

An anonymous reader quotes The Next Web:

As stunning and ground-breaking as it is, the EHT project is not just about taking on a challenge. It’s an unprecedented test of whether Einstein’s ideas about the very nature of space and time hold up in extreme circumstances, and looks closer than ever before at the role of black holes in the universe. To cut a long story short: Einstein was right….
His general theory of relativity has passed two serious tests from the universe’s most extreme conditions in the last few years. Here, Einstein’s theory predicted the observations from M87 with unerring accuracy, and is seemingly the correct description of the nature of space, time, and gravity. The measurements of the speeds of matter around the center of the black hole are consistent with being near the speed of light.

The advanced computing research center at the University of Texas at Austin says the data for the photo “was collected during a 2017 global campaign, after decades of scientific, engineering, and computational research and preparation.” And their own facility played a role in the finished photo, according to an article shared by aarondubrow:

Helping to lay the groundwork for the black hole imaging, and providing the theoretical underpinnings that enabled the researchers to interpret the mass, underlying structure, and orientations of the black hole and its environment, were supercomputers at The University of Texas at Austin’s Texas Advanced Computing Center (TACC) — Stampede1, Stampede2 and Jetstream — all three of which were supported by grants from the National Science Foundation (NSF), which also provided key funding for the EHT… “We are doing finite difference, three-dimensional simulations with not just gas dynamics, but also magnetic fields,” said Harvard University professor and EHT researcher Ramesh Narayan. “That includes radiation and what is called two-temperature physics in a general relativistic framework. For these, we really do need the TACC’s Stampede system with lots of cores and lots of hours…. The simulations are computationally very expensive and supercomputers are definitely needed….”

Alongside the simulation and modeling effort, another group of researchers from the University of Arizona (UA) were using Jetstream — a large-scale cloud environment for research located both at TACC and Indiana University — to develop cloud-based data analysis pipelines that proved crucial for combining huge amounts of data taken from the geographically-distributed observatories, and sharing the data with researchers around the world. “New technologies such as cloud computing are essential to support international collaborations like this,” said Chi-kwan Chan, leader of the EHT Computations and Software Working Group and an assistant astronomer at UA. “The production run was actually carried out on Google Cloud, but much of the early development was on Jetstream. Without Jetstream, it is unclear that we would have a cloud-based pipeline at all.”

Read more of this story at Slashdot.

Source: Slashdot – Black Hole Photo Used Supercomputers and Cloud Computing To Prove Einstein Right

Red Hat Takes Over Maintenance of OpenJDK 8 and OpenJDK 11 From Oracle

“Red Hat is taking over maintenance responsibilities for OpenJDK 8 and OpenJDK 11 from Oracle,” reports InfoWorld:

Red Hat will now oversee bug fixes and security patches for the two older releases, which serve as the basis for two long-term support releases of Java. Red Hat’s updates will feed into releases of Java from Oracle, Red Hat, and other providers… Previously, Red Hat led the OpenJDK 6 and OpenJDK 7 projects. Red Hat is not taking over OpenJDK 9 or OpenJDK 10, which were short-term releases with a six-month support window.

Read more of this story at Slashdot.

Source: Slashdot – Red Hat Takes Over Maintenance of OpenJDK 8 and OpenJDK 11 From Oracle

Bluecherry Open Sources Its Entire Linux Surveillance Server

“Big changes are here,” writes the official blog for Bluecherry:

In 2010 we released our multi-port MPEG4 video capture card with an open source driver (solo6x10) and in 2011 updated the driver to support our multi-port H.264 capture cards. Later, this open source driver was later added into the mainline Linux kernel. In 2013 we released our multi-platform surveillance application client with an open source (GPL) license.

We are proud to announce that Effective April 18, 2019 we have released the entire Bluecherry software application open source with a GPL license.

An anonymous reader writes: This includes the Linux based server application and the Windows / Linux / OS X client.

Bluecherry’s GitHub repo is now open for public viewing.

Read more of this story at Slashdot.

Source: Slashdot – Bluecherry Open Sources Its Entire Linux Surveillance Server

Linux 5.2 Will Introduce The Fieldbus Subsystem

“The new Fieldbus system has been deemed ready to be released into the staging area of the Linux kernel,” writes jwhyche (Slashdot reader #6,192).

Phoronix reports:

This newest subsystem for the Linux kernel benefits industrial systems. Fieldbus is a set of network protocols for real-time distributed control of automated industrial systems. Fieldbus is used for connecting different systems/components/instruments within industrial environments. Fieldbus is used for connecting facilities ranging from manufacturing plants up to nuclear energy facilities. The Fieldbus specification has been around for decades while now seeing a formal subsystem within the Linux kernel.

The subsystem allows for devices to exchange data over a Fieldbus whether it be Profinet, FLNet, or one of the other implementations. The subsystem provides a generic framework for exposing switches, lights, actuators, motors, and other hardware… The Linux kernel’s Fieldbus subsystem has gone through over ten rounds of public revisions in recent months and has been deemed ready to premiere with Linux 5.2 [which] should debut in July.

Read more of this story at Slashdot.

Source: Slashdot – Linux 5.2 Will Introduce The Fieldbus Subsystem

Historic 'Summit' with the Creators of Python, Java, TypeScript, and Perl

“At the first annual charity event conducted by Puget Sound Programming Python on April 2, four legendary language creators came together to discuss the past and future of language design,” reports PacktPub.

– Guido van Rossum, the creator of Python
– James Gosling, the founder, and lead designer behind the Java programming language
– Anders Hejlsberg, the original author of Turbo Pascal who has also worked on the development of C# and TypeScript
– Larry Wall, the creator of Perl

You can watch the video here — the speaker introductions start about 50 minutes into the video– or read PacktPub’s summary of the event:
Guido van Rossum said designing a programming language is very similar to the way JK Rowling writes her books, the Harry Potter series… He says JK Rowling is a genius in the way that some details that she mentioned in her first Harry Potter book ended up playing an important plot point in part six and seven… When designing a language we start with committing to certain details like the keywords we want to use, the style of coding we want to follow, etc. But, whatever we decide on we are stuck with them and in the future, we need to find new ways to use those details, just like Rowling…

When James Gosling was asked how Java came into existence and what were the design principles he abided by, he simply said, “it didn’t come out of like a personal passion project or something. It was actually from trying to build a prototype…. It started out as kind of doing better C and then it got out of control that the rest of the project really ended up just providing the context.” In the end, the only thing out of that project survived was Java…

Larry Wall wanted to create a language that was more like a natural language. Explaining through an example, he said, “Instead of putting people in a university campus and deciding where they go we’re just gonna see where people want to walk and then put shortcuts in all those places.” A basic principle behind creating Perl was to provide APIs to everything. It was aimed to be both a good text processing language linguistically but also a glue language….

Similar to the views of Guido van Rossum, Anders Hejlsberg adds that any decision that you make when designing a language you have to live with it. When designing a language you need to be very careful about reasoning over what “not” to introduce in the language.

There was also some discussion of types — Gosling believes they help improve performance, while Hejlsberg said types are also useful when building coding tools. “It turns out that you can actually be more productive by adding types if you do it in a non-intrusive manner and if you work hard on doing good type inference and so forth.” In fact, Hejlsberg told the audience that the TypeScript project was inspired by massive “write-only” JavaScript code bases, while a semantic understanding (including a type system) makes refactoring easier.

Guido van Rossum acknowledged that TypeScript “is actually incredibly useful and so we’re adding a very similar idea to Python. We are adding it in a slightly different way because we have a different context…. I’ve learned a painful lesson, that for small programs dynamic typing is great. For large programs, you have to have a more disciplined approach. And it helps if the language actually gives you that discipline, rather than telling you, ‘Well, you can do whatever you want.'”

In the video Larry Wall says the Perl 6 team had also noticed the limitations of loose typing, and added a robust type system to Perl 6 to “help with programming in the large.”

This was the first annual benefit for CSforALL, a group promoting high-quality computer science classes at every grade level.

Read more of this story at Slashdot.

Source: Slashdot – Historic ‘Summit’ with the Creators of Python, Java, TypeScript, and Perl

More Than 23 Million People Use the Password '123456'

Bearhouse shares a new study from the UK’s “National Cyber Security Centre,” which advises the public on computer security, about the world’s most-frequently cracked passwords.

It’s probably no surprise to the Slashdot readership: people use bad passwords. A recent study of publicly-available “hacked” accounts — by the UK National Cyber Security Centre — reveals “123456” was top, followed by the much more secure “123456789” and hard-to-guess “qwerty”. If you’re a soccer (football) fan, then try “Liverpool” or “Chelsea” — they’ll work in more than half a million cases. Finally, for musicians, Metallica gets beaten down by 50cent, 140k to 190k respectively.

The most common fictional names used as passwords were “superman” (333,139 users), “naruto” (242,749), “tigger” (237,290), “pokemon” (226,947), and “batman” (203,116).
The organization recommends instead choosing three random words as a password — and also checking “password blacklists” that show passwords that have already been found in past data breaches. (Developers and sysadmins are also advised to implement these checks as part of their rules for which user passwords will be allowed.) The organization also released a file from the “Have I Been Pwned” site containing the top 100,000 passwords.

So what are the top ten most-frequently used passwords?


Read more of this story at Slashdot.

Source: Slashdot – More Than 23 Million People Use the Password ‘123456’

Southwest Airlines Says They'll Purchase 'Hundreds' More Boeing 737 Max Aircraft

Inc. magazine describes as “stunning” announcement from Southwest Airlines, “by far the biggest 737 Max customer in the United States, with 34 of the planes among its fleet, and plans for many more. ”

Speaking at a chamber of commerce event in Dallas, Southwest chairman and CEO Gary Kelly said Southwest has no plans to abandon the 737 Max. In fact, he said it will purchase “hundreds” more 737 Max aircraft. “It’s a very good airplane, but Boeing has acknowledged that they’ve got some things they need to address with the software in that airplane,” Kelly said, according to the Dallas Business Journal. “It seems like it’s a relatively straight-forward modification. We’re obviously anxious to get the airplane back in service.”
That’s it: all-in on the 737 Max. Or at least close to it…

By flying just one aircraft, Southwest knows that almost any of its pilots can fly any of its planes. Its scheduling and maintenance tasks become a lot easier than for airlines with multiple types of aircraft. But it also means that ultimately, Southwest’s brand and its overall success are tied up with Boeing and the 737 in a way that few other airlines are.
Marketwatch adds that in fact, major airlines “are hungry for fuel-efficient single-aisle aircraft such as the Max, and there’s a long backlog for the jet’s closest competitor, Airbus SE, analysts at Oxford Economics said in a note Thursday.
“That will shield Boeing from a mass cancellation of orders,” the analysts said.

Read more of this story at Slashdot.

Source: Slashdot – Southwest Airlines Says They’ll Purchase ‘Hundreds’ More Boeing 737 Max Aircraft

Fortnite World Cup: More than 1,200 Accounts Banned For Cheating

“Epic Games gave bans to more than 1,200 Fortnite accounts and revoked cash prizes that more than 200 players had won following Epic’s investigations of cheating in the first week of Fortnite’s World Cup Online Open,” reports Polygon:

That cheater (whom Epic did not name) used the cheat software during the tournament’s semifinals. The account involved had played “for less than five minutes” before being discovered and banned, Epic said.

The great majority of the other accounts sanctioned received two-week bans for their misconduct. Of them, 196 players forfeited their winnings after they were caught circumventing region locks to play in several regions. Epic said that will change the prize payouts for others in the tournament, but their improved finishes won’t be reflected on Fortnite’s in-game leaderboard. Nine prize winners lost their money for sharing accounts, and one winner’s earnings were vacated for teaming.

Epic Games said it has added a “real-time teaming detection algorithm” to its competitive play. Teaming, in which players in a solo mode work cooperatively and create a competitive disadvantage for others, can get players banned even in competitive non-tournament play.

Read more of this story at Slashdot.

Source: Slashdot – Fortnite World Cup: More than 1,200 Accounts Banned For Cheating

How Facebook Mis-Captioned the Launch of a NASA Supply Rocket

An anonymous reader quotes Ars Technica:
An Antares rocket built by Northrop Grumman launched on Wednesday afternoon, boosting a Cygnus spacecraft with 3.4 tons of cargo toward the International Space Station. The launch from Wallops Island, Virginia, went flawlessly, and the spacecraft arrived at the station on Friday. However, when NASA’s International Space Station program posted the launch video to its Facebook page on Thursday, there was a problem. Apparently the agency’s caption service hadn’t gotten to this video clip yet, so viewers with captions enabled were treated not just to the glory of a rocket launch, but the glory of Facebook’s automatically generated crazywords…
Some of the captions are just hilariously bad. For example, when the announcer triumphantly declares, “And we have liftoff of the Antares NG-11 mission to the ISS,” the automatically generated caption service helpfully says, “And we have liftoff of the guitarist G 11 mission to the ice sets.”

There’s more examples in the photos at the top of their article — for example, a caption stating that the uncrewed launch “had a phenomenal displaced people at 60 seconds,” and translating the phrase “TVC is nominal” to “phenomenal.”

While the lift-off announcer does use what may be unfamiliar names for the rockets, along with other technical jargon, the article points out that YouTube’s auto-captioning of the same launch “seemed to have no problem with those bits of space argot.”

Read more of this story at Slashdot.

Source: Slashdot – How Facebook Mis-Captioned the Launch of a NASA Supply Rocket

A Secret Server For the Dead MMO 'City of Heroes' Has Players In an Uproar

eatmorekix quotes Vice:

In 2012, Paragon Studios announced it was shutting down City of Heroes, a massively multiplayer online game where a community of players created their own superheroes, went on adventures together, and formed lasting friendships.

The news was crushing to the game’s devoted community because they could no longer play and hang out in the virtual space they loved, and today, years after the game’s shutdown, the community is in an uproar again. As Massivelyop first reported, a group of City of Heroes players called the Secret Cabal of Reverse Engineers (SCORE) had created their own, private server where they could continue to play the game for the last six years, but kept it relatively secret.

“I like the rest of you have been lied to,” Reddit user avoca wrote in a thread titled “BE ANGRY” on the City of Heroes subreddit. “I have been told City of Heroes has been shutdown. Today, I learn I have been mistaken. For all of these years, City of Heroes has lived on. In secret. For every passing day and every withdrawal symptom, a person is playing on this secret server, and they are gaining xp, leveling up, performing task forces and forming supergroups.”

In 2004 the game’s lead designer answered questions from Slashdot’s reader.

15 years, a member of the emulator team tells Massivelyop that they’d tried to keep their City of Heroes server a secret for over six years because they were worried about getting a cease and desist notice from the game’s publishers.

Read more of this story at Slashdot.

Source: Slashdot – A Secret Server For the Dead MMO ‘City of Heroes’ Has Players In an Uproar

Did Google Sabotage Firefox and IE?

Firefox’s former VP accused Google of sabotaging Firefox — for example, when Gmail and Google Docs “started to experience selective performance issues and bugs on Firefox” and demo sites “would falsely block Firefox as ‘incompatible’… There were dozens of oopses. Hundreds maybe… [W]hen you see a sustained pattern of ‘oops’ and delays from this organization — you’re being outfoxed.”
Now Nightingale’s accusations have stirred up some follow-up from technology reporters. An anonymous reader shares a blog post by ZDNet security reporter Catalin Cimpanu:
Nightingale is not the first Firefox team member to come forward and make such accusations. In July 2018, Mozilla Program Manager Chris Peterson accused Google of intentionally slowing down YouTube performance on Firefox. He revealed that both Firefox and Edge were superior when loading YouTube content when compared to Chrome, and in order to counteract this performance issue, Google switched to using a JavaScript library for YouTube that they knew wasn’t supported by Firefox.
At this point, it’s very hard not to believe or take Nightingale’s comments seriously. Slowly but surely, Google is becoming the new Microsoft, and Chrome is slowly turning into the new IE, an opinion that more and more users are starting to share.
On Twitter, a senior editor at the Verge added “Google did a lot of ‘oops’ accidents to Windows Phone, too. Same pattern of behavior with its services and Edge. Oopsy this, oopsy that.” The site MSPowerUser also shares a similar story from former Microsoft Edge intern, Joshua Bakita. “I very recently worked on the Edge team, and one of the reasons we decided to end EdgeHTML was because Google kept making changes to its sites that broke other browsers, and we couldn’t keep up.”
Meanwhile, Computerworld argues that data “backs up Nightingale’s admission, to a point.”
[I]f Google monkey business contributed to Firefox’s fall, it must have really damaged Microsoft’s IE. During the time it took Chrome to replace Firefox as the No. 2 browser, Firefox lost just 9% of its user share, while IE shed 22%. And Chrome’s most explosive growth – which began in early 2016 – didn’t come at Firefox’s expense; instead, it first hollowed out IE, then suppressed any potential enthusiasm for the follow-on Edge.

Chrome didn’t reach its current place — last month capturing nearly 68% of all browser activity — by raiding Firefox. It did it by destroying IE.


Read more of this story at Slashdot.

Source: Slashdot – Did Google Sabotage Firefox and IE?