The Delta IV Heavy, a rocket whose time has come and gone, will fly once more

The final Delta IV Heavy rocket is scheduled to launch Thursday, weather permitting.

United Launch Alliance's final Delta IV Heavy rocket, seen here in December when ground crews rolled it to the launch pad at Cape Canaveral Space Force Station, Florida.

Enlarge / United Launch Alliance's final Delta IV Heavy rocket, seen here in December when ground crews rolled it to the launch pad at Cape Canaveral Space Force Station, Florida. (credit: United Launch Alliance)

This is the rocket that literally lights itself on fire before it heads to space. It's the world's largest rocket entirely fueled by liquid hydrogen, a propellant that is vexing to handle but rewarding in its efficiency.

The Delta IV Heavy was America's most powerful launch vehicle for nearly a decade and has been a cornerstone for the US military's space program for more than 20 years. It is also the world's most expensive commercially produced rocket, a fact driven not just by its outsized capability but also its complexity.

Now, United Launch Alliance's last Delta IV Heavy rocket is set to lift off Thursday from Cape Canaveral Space Force Station, Florida, with a classified payload for the National Reconnaissance Office, the US government's spy satellite agency.

Read 36 remaining paragraphs | Comments

Thousands of servers hacked in ongoing attack targeting Ray AI framework

Researchers say it’s the first known in-the-wild attack targeting AI workloads.

Thousands of servers hacked in ongoing attack targeting Ray AI framework

Enlarge (credit: Getty Images)

Thousands of servers storing AI workloads and network credentials have been hacked in an ongoing attack campaign targeting a reported vulnerability in Ray, a computing framework used by OpenAI, Uber, and Amazon.

The attacks, which have been active for at least seven months, have led to the tampering of AI models. They have also resulted in the compromise of network credentials, allowing access to internal networks and databases and tokens for accessing accounts on platforms including OpenAI, Hugging Face, Stripe, and Azure. Besides corrupting models and stealing credentials, attackers behind the campaign have installed cryptocurrency miners on compromised infrastructure, which typically provides massive amounts of computing power. Attackers have also installed reverse shells, which are text-based interfaces for remotely controlling servers.

Hitting the jackpot

“When attackers get their hands on a Ray production cluster, it is a jackpot,” researchers from Oligo, the security firm that spotted the attacks, wrote in a post. “Valuable company data plus remote code execution makes it easy to monetize attacks—all while remaining in the shadows, totally undetected (and, with static security tools, undetectable).”

Read 12 remaining paragraphs | Comments

Quantum computing progress: Higher temps, better error correction

Amazon, IBM, and traditional silicon makers all working toward error correction.

conceptual graphic of symbols representing quantum states floating above a stylized computer chip.

Enlarge (credit: vital)

There's a strong consensus that tackling most useful problems with a quantum computer will require that the computer be capable of error correction. There is absolutely no consensus, however, about what technology will allow us to get there. A large number of companies, including major players like Microsoft, Intel, Amazon, and IBM, have all committed to different technologies to get there, while a collection of startups are exploring an even wider range of potential solutions.

We probably won't have a clearer picture of what's likely to work for a few years. But there's going to be lots of interesting research and development work between now and then, some of which may ultimately represent key milestones in the development of quantum computing. To give you a sense of that work, we're going to look at three papers that were published within the last couple of weeks, each of which tackles a different aspect of quantum computing technology.

Hot stuff

Error correction will require connecting multiple hardware qubits to act as a single unit termed a logical qubit. This spreads a single bit of quantum information across multiple hardware qubits, making it more robust. Additional qubits are used to monitor the behavior of the ones holding the data and perform corrections as needed. Some error correction schemes require over a hundred hardware qubits for each logical qubit, meaning we'd need tens of thousands of hardware qubits before we could do anything practical.

Read 21 remaining paragraphs | Comments

Oregon governor signs nation’s first right-to-repair bill that bans parts pairing

Starting in 2025, devices can’t block repair parts with software pairing checks.

Cables emanating from an iPhone under repair, with gloves hands holding a tweezer over the phone

Enlarge / Oregon's repair bill prohibits companies from implementing software locks that prohibit aftermarket or used parts from being installed in their devices.

Oregon Governor Tina Kotek today signed the state's Right to Repair Act, which will push manufacturers to provide more repair options for their products than any other state so far.

The law, like those passed in New York, California, and Minnesota, will require many manufacturers to provide the same parts, tools, and documentation to individuals and repair shops that they provide to their own repair teams.

But Oregon's bill goes further, preventing companies from implementing schemes that require parts to be verified through encrypted software checks before they will function. Known as parts pairing or serialization, Oregon's bill, SB 1596, is the first in the nation to target that practice. Oregon State Senator Janeen Sollman (D) and Representative Courtney Neron (D) sponsored and pushed the bill in the state senate and legislature.

Read 5 remaining paragraphs | Comments

Lilbits: Another Linux laptop update, another Rockchip processor, another Pixel 9 leak

Google’s Pixel 9 series smartphones aren’t expected to launch until this fall, but details about the next-gen flagships started to leak earlier this year with a series of pictures that allegedly showed the Google Pixel 9 and Pixel 9 Pro. B…

Google’s Pixel 9 series smartphones aren’t expected to launch until this fall, but details about the next-gen flagships started to leak earlier this year with a series of pictures that allegedly showed the Google Pixel 9 and Pixel 9 Pro. But according to a new report, those pictures actually showed the Pixel 9 Pro and Pixel […]

The post Lilbits: Another Linux laptop update, another Rockchip processor, another Pixel 9 leak appeared first on Liliputing.

Puerto Rico declares public health emergency as dengue cases rise

Cases so far are up 140 percent compared to this point last year.

Female Aedes aegypti mosquito as she was in the process of obtaining a

Female Aedes aegypti mosquito as she was in the process of obtaining a "blood meal." (credit: US Department of Health and Human Services)

Puerto Rico has declared a public health emergency amid an ongoing outbreak of dengue infections, a mosquito-spread viral infection that can cause fever, aches, rash, vomiting, and, in about 5 percent of cases, a severe disease marked by internal bleeding and shock.

The US territory has tallied 549 cases since the start of the year, representing a 140 percent increase compared with cases tallied at this point last year, according to the territory's health department. The Associated Press reported that more than 340 of the 549 cases have been hospitalized.

In 2023, the island nation of more than 3.2 million people had over 1,000 cases of dengue throughout the year.

Read 4 remaining paragraphs | Comments

Starlink mobile plans hit snag as FCC dismisses SpaceX spectrum application

SpaceX application tossed but firm will get another shot in spectrum rulemaking.

Snow and ice cover part of a Starlink satellite dish.

Enlarge / A Starlink user terminal during winter. (credit: Getty Images | AntaresNS)

Starlink's mobile ambitions were dealt at least a temporary blow yesterday when the Federal Communications Commission dismissed SpaceX's application to use several spectrum bands for mobile service.

SpaceX is seeking approval to use up to 7,500 second-generation Starlink satellites with spectrum in the 1.6 GHz, 2 GHz, and 2.4 GHz bands. SpaceX could still end up getting what it wants but will have to go through new rulemaking processes in which the FCC will evaluate whether the spectrum bands can handle the system without affecting existing users.

The FCC Space Bureau's ruling dismissed the SpaceX application yesterday as "unacceptable for filing." The application was filed over a year ago.

Read 13 remaining paragraphs | Comments

Z-Library Scammers Use Email Campaigns to Lure Users and Extract Payments

Popular pirate ebook repository Z-Library remains online despite a criminal prosecution by the United States. The site continues to release new features with support from users who appear happy to chip-in as part of a new fundraising campaign. At the same time, however, scammers are trying to ‘steal’ the site’s traffic and money, through targeted email campaigns.

From: TF, for the latest news on copyright battles, piracy and more.

zlibraryZ-Library is one of the largest shadow libraries on the Internet, hosting millions of books and articles that can be downloaded for free.

The site defied all odds over the past two years. It continued to operate despite a full-fledged criminal prosecution by the United States, which resulted in the arrest of two alleged operators in Argentina.

According to the latest available information, these two defendants are still fighting their extradition. Meanwhile, the Z-Library site has continued to operate as if nothing ever happened, serving books to millions of people all over the world.

Z-Library Fundraising

A few days ago, the shadow library announced a new fundraising campaign to generate revenue. While users can buy premium access all year round to obtain access to additional features and downloads, Z-Library regularly hosts additional donation drives to fund project maintenance and development.

“Although the last 2 years have been challenging for the project and the team, we are not giving up and are continuing to work on the development of the library,” the team writes, asking users to contribute.

As last time, thousands of dollars are quickly pouring in from all over the world. Despite the legal challenges and the ongoing criminal investigation, many people seem happy to chip-in through various payment options, including cryptocurrencies.

Donation Options

donate zlibrary

This type of generosity from users is rarely seen on ‘pirate’ sites. While the shadow library’s operators are undoubtedly happy with the support, popularity also comes with a major downside; scammers.

Soon after Z-Library lost its main domain names following U.S.-orchestrated seizures, outsiders stepped in to hijack the traffic. The site has repeatedly warned against these “fraudulent” and “unsafe” copycats but the problem never went away. On the contrary, it’s getting worse.

Email Scams

Over the past several weeks, there have been dozens of reports from Z-Library users who received emails, purported to be from the Z-Library team, alerting them to a new domain name. One of the early versions included the following message:

“It is with a heavy heart yet hopeful spirit that we reach out to you. We’re entering a period of significant change at Z-Library.

As an integral part of our community we believe it’s important you’re among the first to learn of our transition to a new domain: z-lib.id. This change, though challenging, paves the way for an enhanced, more robust Z-Library experience.

Your steadfast support has been a beacon during our journey. As we navigate these new waters, your continued presence and advocacy are more important than ever. We hope you’ll join us in embracing this change and help in sharing our new address, z-lib.id, within your circles.”

These emails were received by actual Z-Library users but the domain being promoted has nothing to do with the original Z-Library project. On the contrary, it appears to be linked to a popular copycat site that’s been around for a while.

In recent weeks these ‘scammy’ emails have continued, but the messaging has changed somewhat. An email sent to many people this month is more to the point, urging people to visit and bookmark the new domain.

“Good news! Z-Library has a new web address: z-lib.id. You can simply type “z-lib.id” in Google or put it in your browser to visit us. We appreciate your support.”

Scam Email

zlibmail

Needless to say, these emails are not being sent by the Z-Library team but by scammers attempting to drive traffic to their site. There’s a clear profit motive, as “premium” access is currently required to download anything.

‘Not Compromised’

Of course, it’s no surprise that outsiders are trying to profit from the popularity of an existing piracy brand. We have seen variations of this theme for several decades. However, the email campaigns are rather novel.

At this point, it’s not clear how the scammers obtained the emails. In an email to TorrentFreak, the real Z-Library team acknowledges the scam problems but says that there’s no sign that their systems were compromised in any way.

“Unfortunately, the situation with fraudulent mailings is getting worse. Since our domains were blocked in November 2022, there have been at least a few independent scam sites posing as z-library. They use our name, design, and highly similar domain names.

“[W]e are confident that there have been no incidents of user data leakage. However, we strongly recommend that you change the password for your account,” a Z-Library spokesperson writes.

The team suggests that recipients of the scam emails may have tried to sign into one of the scam sites in the past. That would have exposed their email address and password to these people, which is why Z-Library believes it’s important to update this information.

Scam Connection

It’s not clear who is behind these misleading email campaigns, but there are some interesting patterns to observe. The .id domain name promoted in the emails uses the same Cloudflare nameservers as z-lib.is did in the past.

The identical nameservers are not solid proof, however, as there are thousands of sites using the same ones. However, there’s an additional traffic pattern that links the two domains as well.

zlib domains

As seen above, traffic to the .is domain tanked in February, around the time when the emails started coming in, while traffic to the new .id domain surged. This suggests a link between the two domains. Perhaps the scammers somehow lost control over their old domain, triggering them to launch the email campaign.

Seizures and other Troubles

Whatever the reason, the official Z-Library team continues to caution users to be on the lookout for copycats, including via an updated warning banner that mentions the new domain name.

Scam Banner

scams

The Z-Library team believes that scammers and copycats are regularly DDoSing its servers too. At the same time, they have tried to add their links to the official Wikipedia page and hijack the top positions in search engines.

Of course, scammers are only part of the challenge. The U.S. Government has also repeatedly seized the site’s domain names, which creates an opportunity for copycats to increase their traffic. The latest seizure round was last November, but that may not be the last.

On the legal front, there hasn’t been any movement in the U.S. criminal case recently. The two alleged operators filed a motion to dismiss the criminal complaint last summer, but news has been quiet since then.

From: TF, for the latest news on copyright battles, piracy and more.

Event Horizon Telescope captures stunning new image of Milky Way’s black hole

There are also hints of an elusive high-energy jet, similar to larger M87* black hole.

A new image from the Event Horizon Telescope has revealed powerful magnetic fields spiraling from the edge of a supermassive black hole at the center of the Milky Way, Sagittarius A*.

Enlarge / A new image from the Event Horizon Telescope has revealed powerful magnetic fields spiraling from the edge of a supermassive black hole at the center of the Milky Way, Sagittarius A*. (credit: EHT Collaboration)

Physicists have been confident since the1980s that there is a supermassive black hole at the center of the Milky Way galaxy, similar to those thought to be at the center of most spiral and elliptical galaxies. It's since been dubbed Sagittarius A* (pronounced A-star), or SgrA* for short. The Event Horizon Telescope (EHT) captured the first image of SgrA* two years ago. Now the collaboration has revealed a new polarized image (above) showcasing the black hole's swirling magnetic fields. The technical details appear in two new papers published in The Astrophysical Journal Letters. The new image is strikingly similar to another EHT image of a larger supermassive black hole, M87*, so this might be something that all such black holes share.

The only way to "see" a black hole is to image the shadow created by light as it bends in response to the object's powerful gravitational field. As Ars Science Editor John Timmer reported in 2019, the EHT isn't a telescope in the traditional sense. Instead, it's a collection of telescopes scattered around the globe. The EHT is created by interferometry, which uses light in the microwave regime of the electromagnetic spectrum captured at different locations. These recorded images are combined and processed to build an image with a resolution similar to that of a telescope the size of the most distant locations. Interferometry has been used at facilities like ALMA (the Atacama Large Millimeter/submillimeter Array) in northern Chile, where telescopes can be spread across 16 km of desert.

In theory, there's no upper limit on the size of the array, but to determine which photons originated simultaneously at the source, you need very precise location and timing information on each of the sites. And you still have to gather sufficient photons to see anything at all. So atomic clocks were installed at many of the locations, and exact GPS measurements were built up over time. For the EHT, the large collecting area of ALMA—combined with choosing a wavelength in which supermassive black holes are very bright—ensured sufficient photons.

Read 10 remaining paragraphs | Comments

Facebook secretly spied on Snapchat usage to confuse advertisers, court docs say

Zuckerberg told execs to “figure out” how to spy on encrypted Snapchat traffic.

Facebook secretly spied on Snapchat usage to confuse advertisers, court docs say

Enlarge (credit: NurPhoto / Contributor | NurPhoto)

Unsealed court documents have revealed more details about a secret Facebook project initially called "Ghostbusters," designed to sneakily access encrypted Snapchat usage data to give Facebook a leg up on its rival, just when Snapchat was experiencing rapid growth in 2016.

The documents were filed in a class-action lawsuit from consumers and advertisers, accusing Meta of anticompetitive behavior that blocks rivals from competing in the social media ads market.

"Whenever someone asks a question about Snapchat, the answer is usually that because their traffic is encrypted, we have no analytics about them," Facebook CEO Mark Zuckerberg (who has since rebranded his company as Meta) wrote in a 2016 email to Javier Olivan.

Read 18 remaining paragraphs | Comments