×
Your Rights Online

Facebook Accused of Using Your Phone To Wiretap Snapchat (gizmodo.com) 58

Court filings unsealed last week allege Meta created an internal effort to spy on Snapchat in a secret initiative called "Project Ghostbusters." Gizmodo: Meta did so through Onavo, a Virtual Private Network (VPN) service the company offered between 2016 and 2019 that, ultimately, wasn't private at all. "Whenever someone asks a question about Snapchat, the answer is usually that because their traffic is encrypted we have no analytics about them," said Mark Zuckerberg in an email to three Facebook executives in 2016, unsealed in Meta's antitrust case on Saturday. "It seems important to figure out a new way to get reliable analytics about them... You should figure out how to do this."

Thus, Project Ghostbusters was born. It's Meta's in-house wiretapping tool to spy on data analytics from Snapchat starting in 2016, later used on YouTube and Amazon. This involved creating "kits" that can be installed on iOS and Android devices, to intercept traffic for certain apps, according to the filings. This was described as a "man-in-the-middle" approach to get data on Facebook's rivals, but users of Onavo were the "men in the middle."

Meta's Onavo unit has a history of using invasive techniques to collect data on Facebook's users. Meta acquired Onavo from an Israeli firm over 10 years ago, promising users private networking, as most VPNs do. However, the service was reportedly used to spy on rival social media apps through tens of millions of people who downloaded Onavo. It gave Facebook valuable intel about competitors, and this week's court filings seem to confirm that. A team of senior executives and roughly 41 lawyers worked on Project Ghostbusters, according to court filings. The group was heavily concerned with whether to continue the program in the face of press scrutiny. Facebook ultimately shut down Onavo in 2019 after Apple booted the VPN from its app store.

IT

Cloudflare Says It's Automated Empathy To Avoid Fixing Flaky Hardware Too Often (theregister.com) 19

The Register: Cloudflare has revealed a little about how it maintains the millions of boxes it operates around the world -- including the concept of an "error budget" that enacts "empathy embedded in automation." In a Tuesday post titled "Autonomous hardware diagnostics and recovery at scale," the internet-taming biz explains that it built fault-tolerant infrastructure that can continue operating with "little to no impact" on its services. But as explained by infrastructure engineering tech lead Jet Marsical and systems engineers Aakash Shah and Yilin Xiong, when servers did break the Data Center Operations team relied on manual processes to identify dead boxes. And those processes could take "hours for a single server alone, and [could] easily consume an engineer's entire day."

Which does not work at hyperscale. Worse, dead servers would sometimes remain powered on, costing Cloudflare money without producing anything of value. Enter Phoenix -- a tool Cloudflare created to detect broken servers and automatically initiate workflows to get them fixed. Phoenix makes a "discovery run" every thirty minutes, during which it probes up to two datacenters known to house broken boxen. That pace of discovery means Phoenix can find dead machines across Cloudflare's network in no more than three days. If it spots machines already listed for repairs, it "takes care of ensuring that the Recovery phase is executed immediately."

AI

AI Will Suck Up 500% More Power in UK in 10 Years, Grid CEO Says (bloomberg.com) 50

Electricity demand from UK data centers will jump sixfold over the next 10 years as a boom in AI requires increased computing power, according to the head of National Grid. From a report: That will ramp up pressure on the country's electricity network, which must move vast quantities of renewable energy from as far away as Scottish wind farms to data centers around London. And it's a grid already under strain from the accelerating electrification of home heating, transportation and industries.

"Future growth in foundational technologies like artificial intelligence and quantum computing will mean larger-scale, energy-intensive computing infrastructure," National Grid Chief Executive Officer John Pettigrew said Tuesday at a conference in Oxford. It's an outlook replicated in many other countries, which are grappling with how to fund the massive spending required to expand capacity. Global electricity demand from data centers, AI and cryptocurrencies may more than double over the next three years, according to International Energy Agency forecasts.

Social Networks

'Federation Is the Future of Social Media' (theverge.com) 51

An anonymous reader quotes a report from The Verge, written by Nilay Patel: Today, I'm talking to Jay Graber, the CEO of Bluesky Social, which is a decentralized competitor to Twitter, er, X. Bluesky actually started inside of what was then known as Twitter — it was a project from then-CEO Jack Dorsey, who spent his days wandering the earth and saying things like Twitter should be a protocol and not a company. Bluesky was supposed to be that protocol, but Jack spun it out of Twitter in 2021, just before Elon Musk bought the company and renamed it X. Bluesky is now an independent company with a few dozen employees, and it finds itself in the middle of one of the most chaotic moments in the history of social media. There are a lot of companies and ideas competing for space on the post-Twitter internet, and Jay makes a convincing argument that decentralization -- the idea that you should be able to take your username and following to different servers as you wish -- is the future. It's a powerful concept that's been kicking around for a long time, but now it feels closer to reality than ever before. You've heard us talk about it a lot on Decoder: the core idea is that no single company -- or individual billionaire -- can amass too much power and control over our social networks and the conversations that happen on them.

Bluesky's approach to this is something called the AT Protocol, which powers Bluesky's own platform but which is also a technology that anyone can use right now to host their own servers and, eventually, interoperate with a bunch of other networks. You'll hear Jay explain how building Bluesky the product alongside AT Protocol the protocol has created a cooperate-compete dynamic that runs throughout the entire company and that also informs how it's building products and features -- not only for its own service but also for developers to build on top of. Jay and I also talked about the growth of the Bluesky app, which now has more than 5 million users, and how so many of the company's early decisions around product design and moderation have shaped the type of organic culture that's taken hold there. Content moderation is, of course, one of the biggest challenges any platform faces, and Bluesky, in particular, has had its fair share of controversies. But the idea behind AT Protocol and Bluesky is devolving control, so Bluesky users can pick their own moderation systems and recommendation algorithms -- a grand experiment that I wanted to know much more about.

Finally, Jay and I had the opportunity to get technical and go deeper on standards and protocols, which are the beating heart of the decentralization movement. Bluesky's AT Protocol is far from the only protocol in the mix -- there's also ActivityPub, which is what powers Mastodon and, soon, Meta's Threads. There's been some real animosity between these camps, and I asked Jay about the differences between the two, the benefits of Bluesky's approach, and how she sees the two coexisting in the future.

Books

Has 'Silicon Valley-style Startup Disruption' Arrived for Book Publishing? (thebaffler.com) 37

The Baffler says a new publishing house launched earlier this month "brings Silicon Valley-style startup disruption to the business of books."

Authors Equity has "a tiny core staff, offloading its labor to a network of freelancers," and like a handful of other publishers "is upending the way that authors get paid, eschewing advances and offering a higher percentage of profits instead." It is worth watching because its team includes several of the most important publishing people of the twenty-first century. And if it works, it will offer a model for tightening the connection between book culture and capitalism, a leap forward for the forces of efficiency and the fantasies of frictionless markets, ushering in a world where literature succeeds if and only if it sells....

Authors Equity's website presents its vision in strikingly neoliberal corporatespeak. The company has four Core Principles: Aligned Incentives; Bespoke Teams; Flexibility and Transparency; and Long-Term Collaboration. What do they mean by these MBA keywords? Aligned Incentives is explained in the language of human capital: "Our profit-share model rewards authors who want to bet on themselves." Authors, that is, take on more of the financial risk of publication. At a traditional publishing house, advances provide authors with guaranteed cash early in the process that they can use to live off while writing. With Authors Equity, nothing is guaranteed and nothing given ahead of time; an author's pay depends on their book's profits.

In an added twist, "Profit participation is also an option for key members of the book team, so we're in a position to win together." Typically, only an author's agent's income is directly tied to an author's financial success, but at Authors Equity, others could have a stake. This has huge consequences for the logic of literary production. If an editor, for example, receives a salary and not a cut of their books' profits, their incentives are less immediately about profit, offering more wiggle room for aesthetic value. The more the people working on books participate in their profits, the more, structurally, profit-seeking will shape what books look like.

"Bespoke Teams" is a euphemism for gigification. With a tiny initial staff of six, Authors Equity uses freelance workers to make books, unlike traditional publishers, which have many employees in many departments... Their fourth Core Principle — Long-Term Collaboration — addresses widespread frustration with a systemic problem in traditional publishing: the fetishization of debut authors who receive decent or better advances, fail to earn out, and then struggle to have a career. It's a real problem and one where authors' interests and capitalist rationalization are, as it were, aligned. Authors Equity sees that everyone might profit when an author can build a readership and develop their skill.

The article concludes with this prediction. "It's not impossible that we'll look back in twenty years and see its founding as auguring the beginning of the startup age in publishing."

Food for thought... Pulp-fiction mystery writer Mickey Spillane once said, "I'm a writer, not an author. The difference is, a writer makes money."
Classic Games (Games)

New Book Remembers LAN Parties and the 1990s 'Multiplayer Revolution' (cnn.com) 74

CNN looks back to when "dial-up internet (and its iconic dial tone) was 'still a thing..." "File-sharing services like Napster and LimeWire were just beginning to take off... And in sweaty dorm rooms and sparse basements across the world, people brought their desktop monitors together to set up a local area network (LAN) and play multiplayer games — "Half-Life," "Counter-Strike," "Starsiege: Tribes," "StarCraft," "WarCraft" or "Unreal Tournament," to name just a few. These were informal but high-stakes gatherings, then known as LAN parties, whether winning a box of energy drinks or just the joy of emerging victorious. The parties could last several days and nights, with gamers crowded together among heavy computers and fast food boxes, crashing underneath their desks in sleeping bags and taking breaks to pull pranks on each other or watch movies...

It's this nostalgia that prompted writer and podcaster Merritt K to document the era's gaming culture in her new photobook "LAN Party: Inside the Multiplayer Revolution." After floating the idea on X, the social media platform formerly known as Twitter, she received an immediate — and visceral — response from old-school gamers all too keen to share memories and photos from LAN parties and gaming conventions across the world... It's strange to remember that the internet was once a place you went to spend time with other real people; a tethered space, not a cling-film-like reality enveloping the corporeal world from your own pocket....

Growing up as a teenager in this era, you could feel a sense of hope (that perhaps now feels like naivete) about the possibilities of technology, K explained. The book is full of photos featuring people smiling and posing with their desktop monitors, pride and fanfare apparent... "It felt like, 'Wow, the future is coming,'" K said. "It was this exciting time where you felt like you were just charting your own way. I don't want to romanticize it too much, because obviously it wasn't perfect, but it was a very, very different experience...."

"We've kind of lost a lot of control, I think over our relationship to technology," K said. "We have lost a lot of privacy as well. There's less of a sense of exploration because there just isn't as much out there."

One photo shows a stack of Mountain Dew cans (remembering that by 2007 the company had even released a line of soda called "Game Fuel"). "It was a little more communal," the book's author told CNN. "If you're playing games in the same room with someone, it's a different experience than doing it online. You can only be so much of a jackass to somebody who was sitting three feet away from you..."

They adds that that feeling of connecting to people in other places "was cool. It wasn't something that was taken for granted yet."
Security

New 'Loop DoS' Attack May Impact Up to 300,000 Online Systems (thehackernews.com) 10

BleepingComputer reports on "a new denial-of-service attack dubbed 'Loop DoS' targeting application layer protocols."

According to their article, the attack "can pair network services into an indefinite communication loop that creates large volumes of traffic." Devised by researchers at the CISPA Helmholtz-Center for Information Security, the attack uses the User Datagram Protocol (UDP) and impacts an estimated 300,000 host and their networks. The attack is possible due to a vulnerability, currently tracked as CVE-2024-2169, in the implementation of the UDP protocol, which is susceptible to IP spoofing and does not provide sufficient packet verification. An attacker exploiting the vulnerability creates a self-perpetuating mechanism that generates excessive traffic without limits and without a way to stop it, leading to a denial-of-service (DoS) condition on the target system or even an entire network. Loop DoS relies on IP spoofing and can be triggered from a single host that sends one message to start the communication.

According to the Carnegie Mellon CERT Coordination Center (CERT/CC) there are three potential outcomes when an attacker leverages the vulnerability:

— Overloading of a vulnerable service and causing it to become unstable or unusable.
— DoS attack on the network backbone, causing network outages to other services.
— Amplification attacks that involve network loops causing amplified DOS or DDOS attacks.

CISPA researchers Yepeng Pan and Professor Dr. Christian Rossow say the potential impact is notable, spanning both outdated (QOTD, Chargen, Echo) and modern protocols (DNS, NTP, TFTP) that are crucial for basic internet-based functions like time synchronization, domain name resolution, and file transfer without authentication... The researchers warned that the attack is easy to exploit, noting that there is no evidence indicating active exploitation at this time. Rossow and Pan shared their findings with affected vendors and notified CERT/CC for coordinated disclosure. So far, vendors who confirmed their implementations are affected by CVE-2024-2169 are Broadcom, Cisco, Honeywell, Microsoft, and MikroTik.

To avoid the risk of denial of service via Loop DoS, CERT/CC recommends installing the latest patches from vendors that address the vulnerability and replace products that no longer receive security updates. Using firewall rules and access-control lists for UDP applications, turning off unnecessary UDP services, and implementing TCP or request validation are also measures that can mitigate the risk of an attack. Furthermore, the organization recommends deploying anti-spoofing solutions like BCP38 and Unicast Reverse Path Forwarding (uRPF), and using Quality-of-Service (QoS) measures to limit network traffic and protect against abuse from network loops and DoS amplifications.

Thanks to long-time Slashdot reader schneidafunk for sharing the article.
Transportation

Truck-To-Truck Worm Could Infect Entire US Fleet (theregister.com) 50

Jessica Lyons reports via The Register: Vulnerabilities in common Electronic Logging Devices (ELDs) required in US commercial trucks could be present in over 14 million medium- and heavy-duty rigs, according to boffins at Colorado State University. In a paper presented at the 2024 Network and Distributed System Security Symposium, associate professor Jeremy Daily and systems engineering graduate students Jake Jepson and Rik Chatterjee demonstrated how ELDs can be accessed over Bluetooth or Wi-Fi connections to take control of a truck, manipulate data, and spread malware between vehicles. "These findings highlight an urgent need to improve the security posture in ELD systems," the trio wrote [PDF].

The authors did not specify brands or models of ELDs that are vulnerable to the security flaws they highlight in the paper. But they do note there's not too much diversity of products on the market. While there are some 880 devices registered, "only a few tens of distinct ELD models" have hit the road in commercial trucks. A federal mandate requires most heavy-duty trucks to be equipped with ELDs, which track driving hours. These systems also log data on engine operation, vehicle movement and distances driven -- but they aren't required to have tested safety controls built in. And according to the researchers, they can be wirelessly manipulated by another car on the road to, for example, force a truck to pull over.

The academics pointed out three vulnerabilities in ELDs. They used bench level testing systems for the demo, as well as additional testing on a moving 2014 Kenworth T270 Class 6 research truck equipped with a vulnerable ELD. [...] For one of the attacks, the boffins showed how anyone within wireless range could use the device's Wi-Fi and Bluetooth radios to send an arbitrary CAN message that could disrupt of some of the vehicle's systems. A second attack scenario, which also required the attacker to be within wireless range, involved connecting to the device and uploading malicious firmware to manipulate data and vehicle operations. Finally, in what the authors described as the "most concerning" scenario, they uploaded a truck-to-truck worm. The worm uses the compromised device's Wi-Fi capabilities to search for other vulnerable ELDs nearby. After finding the right ELDs, the worm uses default credentials to establish a connection, drops its malicious code on the next ELD, overwrites existing firmware, and then starts the process over again, scanning for additional devices. "Such an attack could lead to widespread disruptions in commercial fleets, with severe safety and operational implications," the researchers warned.

Communications

Cable ISP Fined $10,000 For Lying To FCC About Where It Offers Broadband (arstechnica.com) 42

An Internet service provider that admitted lying to the FCC about where it offers broadband will pay a $10,000 fine and implement a compliance plan to prevent future violations. ArsTechnica: Jefferson County Cable (JCC), a small ISP in Toronto, Ohio, admitted that it falsely claimed to offer fiber service in an area that it hadn't expanded to yet. A company executive also admitted that the firm submitted false coverage data to prevent other ISPs from obtaining government grants to serve the area. Ars helped expose the incident in a February 2023 article.

The FCC announced the outcome of its investigation on March 15, saying that Jefferson County Cable violated the Broadband Data Collection program requirements and the Broadband DATA Act, a US law, "in connection with reporting inaccurate information or data with respect to the Company's ability to provide broadband Internet access service." The FCC said: "To settle this matter, Jefferson County Cable agrees to pay a $10,000 civil penalty to the United States Treasury. Jefferson County Cable also agrees to implement enhanced compliance measures. This action will help further the Commission's efforts to bridge the digital divide by having accurate data of locations where broadband service is available."

The Courts

Texas Sues xHamster and Chaturbate (404media.co) 292

An anonymous reader quotes a report from 404 Media: Texas Attorney General Ken Paxton just sued two more porn sites, xHamster and Chaturbate, alleging they aren't complying with age verification laws. As first reported by local news outlet KXAN, the Office of the Attorney General filed two civil lawsuits on Tuesday afternoon against Hammy Media, which owns xHamster, and Multi Media, which owns Chaturbate. Texas Governor Greg Abbott signed HB 1181 into law in June, which requires porn sites to verify the ages of users through a driver's license or passport. If porn sites don't force consenting adults to hand over a government-issued ID in order to watch other consenting adults have sex on camera, they face heavy fines.

Paxton's lawsuit against xHamster asks the court to force the site to pay a civil penalty of up to $1.67 million, with an additional $10,000 a day since filing. For Chaturbate, it's $1.78 million plus $10,000 per day. Last week, Pornhub's parent company Aylo blocked anyone accessing its network of sites from a Texas IP address, and replaced its network of sites -- which include Pornhub, Brazzers, YouPorn and many more -- with a message about its rejection of age verification legislation that requires adults to show government-issued ID to access porn. [...] As of writing, xHamster and Chaturbate are still accessible in Texas and don't have requirements to verify users' ages with a government ID.

Security

UnitedHealth Group Paid More Than $2 Billion To Providers Following Cyberattack (cnbc.com) 26

An anonymous reader quotes a report from CNBC: UnitedHealth Group said Monday that it's paid out more than $2 billion to help health-care providers who have been affected by the cyberattack on subsidiary Change Healthcare. "We continue to make significant progress in restoring the services impacted by this cyberattack," UnitedHealth CEO Andrew Witty said in a press release. "We know this has been an enormous challenge for health care providers and we encourage any in need to contact us."

UnitedHealth disclosed nearly a month ago that a cyber threat actor breached part of Change Healthcare's information technology network. The fallout has wreaked havoc across the U.S. health-care system. Change Healthcare offers e-prescription software and tools for payment management, so the interruptions left many providers temporarily unable to fill medications or get reimbursed for their services by insurers. UnitedHealth, which provides care for 152 million people, said on Monday that it began releasing medical claims preparation software, which will be available to thousands of customers in the next several days. The company called it "an important step in the resumption of services."

On Friday, UnitedHealth said it restored Change Healthcare's electronic payments platform, after rebooting 99% of its pharmacy network services earlier this month. It also introduced a temporary funding assistance program to help health-care providers experiencing cash flow trouble because of the attack. UnitedHealth said the advances will not need to be repaid until claims flows return to normal. Federal agencies like the Centers for Medicare & Medicaid Services have introduced additional options to ensure that states and other stakeholders can make interim payments to providers, according to a release.

Technology

Ethereum Foundation Under Investigation by 'State Authority' (coindesk.com) 29

CoinDesk: The Ethereum Foundation -- the Swiss non-profit organization at the heart of the Ethereum ecosystem -- is under investigation by an unnamed "state authority," according to the group's website's GitHub repository. The scope of the investigation and its focus was unknown at press time. According to the GitHub commit dated Feb. 26, 2024, "we have received a voluntary enquiry from a state authority that included a requirement for confidentiality."

The investigation comes during a time of change for Ethereum's technology. Ethereum is the second-largest blockchain by market cap after Bitcoin, launching in 2015 following an initial coin offering for the chain's native ETH token. Earlier this month, the chain underwent a major technical upgrade, dubbed Dencun, designed to bring down transaction costs for users of Ethereum-based layer-2 platforms.

AI

Nvidia Reveals Blackwell B200 GPU, the 'World's Most Powerful Chip' For AI (theverge.com) 65

Sean Hollister reports via The Verge: Nvidia's must-have H100 AI chip made it a multitrillion-dollar company, one that may be worth more than Alphabet and Amazon, and competitors have been fighting to catch up. But perhaps Nvidia is about to extend its lead -- with the new Blackwell B200 GPU and GB200 "superchip." Nvidia says the new B200 GPU offers up to 20 petaflops of FP4 horsepower from its 208 billion transistors and that a GB200 that combines two of those GPUs with a single Grace CPU can offer 30 times the performance for LLM inference workloads while also potentially being substantially more efficient. It "reduces cost and energy consumption by up to 25x" over an H100, says Nvidia.

Training a 1.8 trillion parameter model would have previously taken 8,000 Hopper GPUs and 15 megawatts of power, Nvidia claims. Today, Nvidia's CEO says 2,000 Blackwell GPUs can do it while consuming just four megawatts. On a GPT-3 LLM benchmark with 175 billion parameters, Nvidia says the GB200 has a somewhat more modest seven times the performance of an H100, and Nvidia says it offers 4x the training speed. Nvidia told journalists one of the key improvements is a second-gen transformer engine that doubles the compute, bandwidth, and model size by using four bits for each neuron instead of eight (thus, the 20 petaflops of FP4 I mentioned earlier). A second key difference only comes when you link up huge numbers of these GPUs: a next-gen NVLink switch that lets 576 GPUs talk to each other, with 1.8 terabytes per second of bidirectional bandwidth. That required Nvidia to build an entire new network switch chip, one with 50 billion transistors and some of its own onboard compute: 3.6 teraflops of FP8, says Nvidia.
Further reading: Nvidia in Talks To Acquire AI Infrastructure Platform Run:ai
PlayStation (Games)

Sony Reportedly Pauses PSVR 2 Production Due To Low Sales (roadtovr.com) 23

According to Bloomberg, Sony has paused production of its PlayStation VR 2 virtual reality headset, as sales have "slowed progressively" since its February 2023 launch. Road to VR reports: Citing people familiar with the company's plans, Sony has produced "well over 2 million units" since launch, noting that stocks of the $550 headset are building up. The report alleges the surplus is "throughout Sony's supply chain," indicating the issue isn't confined to a single location, but is spread across different stages of Sony's production and distribution network. This follows news that Sony Interactive Entertainment laid off eight percent of the company, which affected a number of its first-party game studios also involved in VR game production. Sony entirely shuttered its London Studio, which created VR action-adventure game Blood & Truth (2019), and reduced headcount at Firesprite, the studio behind PSVR 2 exclusive Horizon Call of the Mountain.

Meanwhile, Sony is making PSVR 2 officially compatible with PC VR games, as the company hopes to release some sort of PC support for the headset later this year. How and when Sony will do that is still unknown, although the move underlines just how little confidence the company has in its future lineup of exclusive content just one year after launch of PSVR 2.

Security

Fujitsu Says It Was Hacked, Warns of Data Breach (techcrunch.com) 10

Multinational technology giant Fujitsu confirmed a cyberattack in a statement Friday, and warned that hackers may have stolen personal data and customer information. From a report: "We confirmed the presence of malware on multiple work computers at our company, and as a result of an internal investigation, we discovered that files containing personal information and customer information could be illegally taken out," said Fujitsu in its statement on its website, translated from Japanese.

Fujitsu said it disconnected the affected systems from its network, and is investigating how its network was compromised by malware and "whether information has been leaked." The tech conglomerate did not specify what kind of malware was used, or the nature of the cyberattack. Fujitsu also did not say what kind of personal information may have been stolen, or who the personal information pertains to -- such as its employees, corporate customers, or citizens whose governments use the company's technologies.

Open Source

Grok AI Goes Open Source (venturebeat.com) 38

xAI has opened sourced its large language model Grok. From a report: The move, which Musk had previously proclaimed would happen this week, now enables any other entrepreneur, programmer, company, or individual to take Grok's weights -- the strength of connections between the model's artificial "neurons," or software modules that allow the model to make decisions and accept inputs and provide outputs in the form of text -- and other associated documentation and use a copy of the model for whatever they'd like, including for commercial applications.

"We are releasing the base model weights and network architecture of Grok-1, our large language model," the company announced in a blog post. "Grok-1 is a 314 billion parameter Mixture-of-Experts model trained from scratch by xAI." Those interested can download the code for Grok on its Github page or via a torrent link. Parameters refers to the weights and biases that govern the model -- the more parameters, generally the more advanced, complex and performant the model is. At 314 billion parameters, Grok is well ahead of open source competitors such as Meta's Llama 2 (70 billion parameters) and Mistral 8x7B (12 billion parameters). Grok was open sourced under an Apache License 2.0, which enables commercial use, modifications, and distribution, though it cannot be trademarked and there is no liability or warranty that users receive with it. In addition, they must reproduce the original license and copyright notice, and state the changes they've made.

Space

What's Next for SpaceX's Starship? (thestreet.com) 104

The Street interviewed Chad Anderson, founder/managing partner of the "space economy" investment firm Space Capital, who calls SpaceX's progress "unprecedented," and believes their next launch could carry "operational" payloads like Starlink satellites. Anderson added that Starship reaching orbital velocity and reentering the atmosphere at those speeds (roughly 16,000 miles per hour) was "a really big deal," though it's specifically important for the reusability of the vehicle, which would further cheapen the cost of launch.

"The fact that they did all those things and they can now move into operations as an investor is hugely important and significant," Anderson said. "Having an operational Starship vehicle is really important because, at the moment, they just can't launch Starlink satellites fast enough. Starship is going to be able to launch 10 times more than Falcon 9 can, and that's really important...."

The ship is so big that, according to Anderson, Starship could conceivably serve as a space station, or a hotel, or a manufacturing facility. There is also the potential of Starship actually competing with commercial airlines, flying, for example, from New York to Shanghai in 45 minutes.

Clayton Swope, senior fellow at CSIS, also believes Starship could be used for "last-mile delivery... where you could move something in less than an hour, anywhere from a point on Earth to another point on Earth, and you're just kind of using space as that transit point."

There's also defense applications. Defense One notes the U.S. Defense Department uses SpaceX to launch most of its satellites. "With a payload capacity of 100 to 150 tons, Starship could carry a bunch of satellites simultaneously and increase the Space Force's launch rate as it builds out a network of hundreds of satellites in low-Earth orbit." Once Starship is operational, it will be able to put things into higher orbits, which is key for the Pentagon's push to operate in the cislunar environment, the area between the geosynchronous orbit and the moon. "The Chinese have already begun cislunar operations and have put vehicles on the far side of the moon, which is something the U.S. doesn't really have the ability to do right now," said Bryan Clark, a senior fellow at the Hudson Institute.

However, the advantage the U.S. will get with Starship "won't last forever," and it will take years to build satellites specifically designed to take advantage of the rocket's payload capacity, said Todd Harrison, a senior fellow at the American Enterprise Institute. "At this rate, they will have Starship operational this year. We need payloads to go on that, if we're actually going to take advantage of it during this window of opportunity when it's a capability only we have. If you want those payloads available next year, you needed to start building them five years ago," Harrison said.

Starship could be used to put very large objects into space, such as fuel barges or energy stations, at a reasonable cost. "You could use this to put up an orbital bus that you can then put on and remove payloads from, so you can have a satellite on orbit that's basically a large docking station," Clark said... "[I]t could be a way to do that kind of thing where you establish essentially an unmanned, little space station that can carry various payloads."

NASA

Aging Voyager 1 Sends Back Response After 'Poke' Signal From Earth (cnn.com) 30

"Engineers have sent a 'poke' to the Voyager 1 probe," reports CNN, "and received a potentially encouraging response..."

"A new signal recently received from the spacecraft suggests that the NASA mission team may be making progress in its quest to understand what Voyager 1 is experiencing..." [T]hey hope to fix a communication issue with the aging spacecraft that has persisted for five months. Launched in 1977, Voyager 1 and its twin, Voyager 2, are venturing through uncharted cosmic territory along the outer reaches of the solar system. While Voyager 1 has continued to relay a steady radio signal to its mission control team on Earth, that signal has not carried any usable data since November, which has pointed to an issue with one of the spacecraft's three onboard computers...

On March 3, the team noticed that activity from one part of the flight data system stood out from the rest of the garbled data. While the signal wasn't in the format the Voyager team is used to when the flight data system is functioning as expected, an engineer with NASA's Deep Space Network was able to decode it... The decoded signal included a readout of the entire flight data system's memory, according to an update NASA shared.

"The (flight data system) memory includes its code, or instructions for what to do, as well as variables, or values used in the code that can change based on commands or the spacecraft's status," according to a NASA blog post. "It also contains science or engineering data for downlink. The team will compare this readout to the one that came down before the issue arose and look for discrepancies in the code and the variables to potentially find the source of the ongoing issue."

"The source of the issue appears to be with one of three onboard computers, the flight data subsystem (FDS), which is responsible for packaging the science and engineering data before it's sent to Earth," according to NASA's statement.

CNN reminds readers that Voyager 1 "is currently the farthest spacecraft from Earth at about 15 billion miles (24 billion kilometers) away." Both Voyager 1 and Voyager 2 are now in interstellar space.

Thanks to Slashdot reader Thelasko for sharing the news.
Space

Southern Oregon Now Boasts World's Largest Dark Sky Sanctuary (opb.org) 20

Sheraz Sadiq reports via Oregon Public Broadcasting: An area that's nearly half the size of New Jersey in southern Oregon was recently named the world's largest dark sky sanctuary by DarkSky International. The nonprofit works to combat light pollution through advocacy and conservation, including a program that has certified more than 200 places around the world to protect the night sky. The Oregon Outback International Dark Sky Sanctuary spans 2.5 million acres of mostly public land in eastern Lake County, and could eventually grow to more than four times that size to include parts of Harney and Malheur Counties. To win certification as a Dark Sky Sanctuary, the applicants had to work with numerous stakeholders to draw the site's boundaries, monitor night sky quality, inventory outdoor lights and replace more than 60 lights on public and private lands. With the inclusion of parts of Harney and Malheur Counties, the sanctuary would surpass 11 million acres, notes KLCC. More than half of the area is under the control of the U.S. Bureau of Land Management.
Microsoft

Trying Out Microsoft's Pre-Release OS/2 2.0 (theregister.com) 98

Last month, the only known surviving copy of 32-bit OS/2 from Microsoft was purchased for $650. "Now, two of the internet's experts in getting early PC operating systems running today have managed to fire it up, and you can see the results," reports The Register. From the report: Why such interest in this nearly third-of-a-century old, unreleased OS? Because this is the way the PC industry very nearly went. This SDK came out in June 1990, just one month after Windows 3.0. If 32-bit OS/2 had launched as planned, Windows 3 would have been the last version before it was absorbed into OS/2 and disappeared. There would never have been any 32-bit versions: no Windows NT, no Windows 95; no Explorer, no Start menu or taskbars. That, in turn, might well have killed off Apple as well. No iPod, no iPhone, no fondleslabs. Twenty-first century computers would be unimaginably different. The surprise here is that we can see a glimpse of this world that never happened. The discovery of this pre-release OS shows how very nearly ready it was in 1990. IBM didn't release its solo version until April 1992, the same month as Windows 3.1 -- but now, we can see it was nearly ready two years earlier.

That's why Michal Necasek of the OS/2 Museum called his look The Future That Never Was. He uncovered a couple of significant bugs, but more impressively, he found workarounds for both, and got both features working fine. OS/2 2 could run multiple DOS VMs at once, but in the preview, they wouldn't open -- due to use of an undocumented instruction which Intel did implement in the Pentium MMX and later processors. Secondly, the bundled network client wouldn't install -- but removing a single file got that working fine. That alone is a significant difference between Microsoft's OS/2 2.0 and IBM's version: Big Blue didn't include networking until Warp Connect 3 in 1995.

His verdict: "The 6.78 build of OS/2 2.0 feels surprisingly stable and complete. The cover letter that came with the SDK stressed that Microsoft developers had been using the OS/2 pre-release for day-to-day work." Over at Virtually Fun, Neozeed also took an actual look at Microsoft OS/2 2.0, carefully recreating that screenshot from PC Magazine in May 1990. He even managed to get some Windows 2 programs running, although this preview release did not yet have a Windows subsystem. On his Internet Archive page, he has disk images and downloadable virtual machines so that you can run this yourself under VMware or 86Box.

Slashdot Top Deals