How playing Edith Finch was like losing my religion again

Or: how I lost my blind faith in unreliable narrators.

Enlarge / Sorry... no one is getting saved in this game.

Note: This piece contains pretty significant spoilers for What Remains of Edith Finch.

What Remains of Edith Finch wastes no time explaining that it's a game about death. Perhaps unsurprisingly, however, the game's much more interesting themes are a considerably slower burn. As instantly, world-turning-ly impactful as death can be, Edith Finch ably shows that death’s got nothing on the decay that comes afterwards.

The game's plot, told in a series of vignettes, follows the final days and moments of Finch family members. The title character rummages through journals, drawings, ad hoc shrines to her dead ancestors—she even flips through one mass market comic book written about their passing. Together, the materials weave the tale of a supposed family curse that's been stalking the Finches for generations.

Read 20 remaining paragraphs | Comments

Smartphones: Lenovo will in Zukunft Stock-Android verwenden

Einem Lenovo-Manager zufolge will der Hersteller künftig bei seinen Smartphones auf die eigene Benutzeroberfläche verzichten. Stattdessen soll pures Android eingesetzt werden, das bis auf Audio- und Videoverbesserungen keine zusätzliche Software enthalten soll. (Lenovo, Smartphone)

Einem Lenovo-Manager zufolge will der Hersteller künftig bei seinen Smartphones auf die eigene Benutzeroberfläche verzichten. Stattdessen soll pures Android eingesetzt werden, das bis auf Audio- und Videoverbesserungen keine zusätzliche Software enthalten soll. (Lenovo, Smartphone)

Smartwatch: Nächste Apple Watch soll mit LTE-Funktion kommen

Apple soll Insidern zufolge planen, das nächste Modell der Apple Watch mit einer SIM-Funktion zu versehen – das Modem soll von Intel stammen. Es ist nicht das erste Mal, dass es derartige Gerüchte gibt. (Apple Watch, Apple)

Apple soll Insidern zufolge planen, das nächste Modell der Apple Watch mit einer SIM-Funktion zu versehen - das Modem soll von Intel stammen. Es ist nicht das erste Mal, dass es derartige Gerüchte gibt. (Apple Watch, Apple)

With genetic morph, a weird type of anthrax has emerged—and it’s on a rampage

It’s killing wildlife in African rainforests and may wipe out some chimp populations.

Enlarge (credit: Getty | Barcroft Media)

After getting ahold of the genetic blueprints for molecular weapons, relatively harmless bacteria transformed into one that can cause anthrax—in places and animals where the original anthrax bacteria doesn’t. And it’s wreaking havoc.

Using data collected over a 26-year period, researchers found that this strange version of anthrax is running rampant in tropical rainforest habitats of Sub-Saharan Africa, killing off broad swaths of mammals. In fact, researchers estimated this week in Nature that this "rainforest anthrax" could wipe out chimpanzee populations in the Côte d’Ivoire’s Taï National Park within the next 150 years. It’s currently associated with nearly 40 percent of all chimp deaths there. And researchers are just getting started on understanding risks to humans, which have so far been thought to be low.

Among the living

Figuring out the scale and prevalence of this rainforest anthrax will be “critical for mitigating against the detrimental effects” to wildlife and “assessing human infection risk,” the researchers, led by infectious disease expert Fabien Leendertz of the Robert Koch Institute in Germany, conclude.

Read 10 remaining paragraphs | Comments

STAMP: Google arbeitet an Medieninhalten wie bei Snapchat

In Snapchats Discover-Sektion gibt es mit Videos und Fotos aufgearbeitete Nachrichten – ein Konzept, für das sich nun offenbar auch Google interessiert. Berichten zufolge soll es bereits Gespräche mit verschiedenen Medienunternehmen über eine Kooperation geben. (Google, Internet)

In Snapchats Discover-Sektion gibt es mit Videos und Fotos aufgearbeitete Nachrichten - ein Konzept, für das sich nun offenbar auch Google interessiert. Berichten zufolge soll es bereits Gespräche mit verschiedenen Medienunternehmen über eine Kooperation geben. (Google, Internet)

Monkey selfie animal rights brouhaha devolves into a settlement

Every conceivable joke has been made of this Planet of the Apes-styled litigation.

Enlarge / The famous selfie.

It appears that another animal will have to take over the fight being waged by Naruto, an Indonesian macaque monkey who is the named plaintiff in a lawsuit weighing whether animals have a right to own property. In this instance, it's about whether animals can own US copyrights.

Naruto, via his self-appointed lawyers from the People for the Ethical Treatment of Animals, is in the process of dropping his lawsuit over the now infamous monkey selfies. That's according to a Friday legal filing with the San Francisco-based 9th US Circuit Court of Appeals, which is being asked to hold off on issuing a ruling that everybody believes is going to go against Naruto.

About every conceivable joke has been made about this Planet of the Apes-styled litigation that we've been following for two years now. A lower court judge had already ruled against Naruto, stating that monkeys cannot own US copyrights even if they snapped the picture (which actually happened in this case).

Read 8 remaining paragraphs | Comments

Gratisaktion: Sony verärgert Vorbesteller des Xperia XZ Premium

Wer Sonys Xperia XZ Premium vorbestellt hat, sollte im Rahmen einer Aktion eigentlich einen Bluetooth-Kopfhörer im Wert von derzeit 200 Euro gratis erhalten. Zahlreiche Vorbesteller haben nun ein wesentlich preiswerteres Modell bekommen – entgegen den ursprünglichen Teilnahmebedingungen. (Sony, Smartphone)

Wer Sonys Xperia XZ Premium vorbestellt hat, sollte im Rahmen einer Aktion eigentlich einen Bluetooth-Kopfhörer im Wert von derzeit 200 Euro gratis erhalten. Zahlreiche Vorbesteller haben nun ein wesentlich preiswerteres Modell bekommen - entgegen den ursprünglichen Teilnahmebedingungen. (Sony, Smartphone)

ESET Tries to Scare People Away From Using Torrents

IT security company ESET has published a rather curious article which portrays the use of BitTorrent as a security threat. Noting that merely downloading a torrent client could “infect your machine and irreversibly damage your files”, the piece focuses on a pair of rare incidents to present an overall climate of fear. The reality is much more nuanced.

Source: TF, for the latest info on copyright, file-sharing, torrent sites and ANONYMOUS VPN services.

Any company in the security game can be expected to play up threats among its customer base in order to get sales.

Sellers of CCTV equipment, for example, would have us believe that criminals don’t want to be photographed and will often go elsewhere in the face of that. Car alarm companies warn us that since X thousand cars are stolen every minute, an expensive Immobilizer is an anti-theft must.

Of course, they’re absolutely right to point these things out. People want to know about these offline risks since they affect our quality of life. The same can be said of those that occur in the online world too.

We ARE all at risk of horrible malware that will trash our computers and steal our banking information so we should all be running adequate protection. That being said, how many times do our anti-virus programs actually trap a piece of nasty-ware in a year? Once? Twice? Ten times? Almost never?

The truth is we all need to be informed but it should be done in a measured way. That’s why an article just published by security firm ESET on the subject of torrents strikes a couple of bad chords, particularly with people who like torrents. It’s titled “Why you should view torrents as a threat” and predictably proceeds to outline why.

“Despite their popularity among users, torrents are very risky ‘business’,” it begins.

“Apart from the obvious legal trouble you could face for violating the copyright of musicians, filmmakers or software developers, there are security issues linked to downloading them that could put you or your computer in the crosshairs of the black hats.”

Aside from the use of the phrase “very risky” (‘some risk’ is a better description), there’s probably very little to complain about in this opening shot. However, things soon go downhill.

“Merely downloading the newest version of BitTorrent clients – software necessary for any user who wants to download or seed files from this ‘ecosystem’ – could infect your machine and irreversibly damage your files,” ESET writes.

Following that scary statement, some readers will have already vowed never to use a torrent again and moved on without reading any more, but the details are really important.

To support its claim, ESET points to two incidents in 2016 (which to its great credit the company actually discovered) which involved the Transmission torrent client. Both involved deliberate third-party infection and in the latter hackers attacked Transmission’s servers and embedded malware in its OSX client before distribution to the public.

No doubt these were both miserable incidents (to which the Transmission team quickly responded) but to characterize this as a torrent client problem seems somewhat unfair.

People intent on spreading viruses and malware do not discriminate and will happily infect ANY piece of computer software they can. Sadly, many non-technical people reading the ESET post won’t read beyond the claim that installing torrent clients can “infect your machine and irreversibly damage your files.”

That’s a huge disservice to the hundreds of millions of torrent client installations that have taken place over a decade and a half and were absolutely trouble free. On a similar basis, we could argue that installing Windows is the main initial problem for people getting viruses from the Internet. It’s true but it’s also not the full picture.

Finally, the piece goes on to detail other incidents over the years where torrents have been found to contain malware. The several cases highlighted by ESET are both real and pretty unpleasant for victims but the important thing to note here is torrent users are no different to any other online user, no matter how they use the Internet.

People who download files from the Internet, from ALL untrusted sources, are putting themselves at risk of getting a virus or other malware. Whether that content is obtained from a website or a P2P network, the risks are ever-present and only a foolish person would do so without decent security software (such as ESET’s) protecting them.

The take home point here is to be aware of security risks and put them into perspective. It’s hard to put a percentage on these things but of the hundreds of millions of torrent and torrent client downloads that have taken place since their inception 15 years ago, the overwhelming majority have been absolutely fine.

Security situations do arise and we need to be aware of them, but presenting things in a way that spreads unnecessary concern in a particular sector isn’t necessary to sell products.

The AV-TEST Institute registers around 390,000 new malicious programs every day that don’t involve torrents, plenty for any anti-virus firm to deal with.

Source: TF, for the latest info on copyright, file-sharing, torrent sites and ANONYMOUS VPN services.

BLU phones return to Amazon following privacy scare

BLU phones return to Amazon following privacy scare

Earlier this week Amazon suspended sales of some smartphones from BLU Products. The move came in response to concerns raised by security firm Kryptowire, which reported that some user data was being sent by software on those phones to servers in China without first obtaining permission from users. But now Amazon is selling BLU phones […]

BLU phones return to Amazon following privacy scare is a post from: Liliputing

BLU phones return to Amazon following privacy scare

Earlier this week Amazon suspended sales of some smartphones from BLU Products. The move came in response to concerns raised by security firm Kryptowire, which reported that some user data was being sent by software on those phones to servers in China without first obtaining permission from users. But now Amazon is selling BLU phones […]

BLU phones return to Amazon following privacy scare is a post from: Liliputing

Security researcher who neutralized WCry to be released on $30,000 bond

Prosecutors say Marcus Hutchins admitted he wrote alleged malware. Defense disagrees.

Enlarge (credit: Penn State)

Marcus Hutchins, the celebrated security professional who was arrested Wednesday on federal charges he helped create and distribute malware that steals banking credentials, will be released from detention pending $30,000 bail, according to Las Vegas reporter Christy Wilcox and other news outlets.

Wilcox reported on Twitter that Hutchins will stay in a halfway house until more permanent housing arrangements are made. She said Hutchins would spend at least one more night in detention, because defense attorneys were unable to raise the required funds in time. The security researcher, who was instrumental in neutralizing the virulent WCry ransomware worm that shut down computers worldwide in May, appeared at a federal court hearing in Las Vegas late Friday afternoon wearing a yellow detainee jumpsuit with orange Crocs and socks.

According to the reporter, federal prosecutors told the court that Hutchins admitted to developing the malware at the heart of the criminal case and to playing a role in its sale. She said Hutchins' attorney disagreed with that claim. Federal prosecutors also attempted to block Hutchins' request for bail on grounds he had shot firearms at a shooting range last week while in Vegas for the Black Hat and Defcon security gatherings. Magistrate Judge Nancy Koppe ruled that Hutchins is not a danger to the community and has sufficient community support to not be a flight risk, the Associated Press reported.

Read 4 remaining paragraphs | Comments