Klimabewegung zwischen Notstand und Tarifkampf

Die Klimabewegung bewegt sich auf der gleichen Diskursebene wie die Vertreter der Corona-Notstandsmaßnahmen. Ihnen ist gemein, dass sie eine Katastrophe beschwören, der nur mit starken Notstandsmaßnahmen begegnet werden kann

Die Klimabewegung bewegt sich auf der gleichen Diskursebene wie die Vertreter der Corona-Notstandsmaßnahmen. Ihnen ist gemein, dass sie eine Katastrophe beschwören, der nur mit starken Notstandsmaßnahmen begegnet werden kann

Good sci-fi speaks to the times, and Domain has done that twice in four years

“After a deadly virus,” people only have a “video interface for communication.” Hmm.

The email hit my inbox in mid-May. The reader kept things succinct.

Subject: Remember Domain?

Body: I've been thinking about this a lot lately:

https://arstechnica.com/gaming/2016/12/the-domain-review-the-internet-can-be-worse-than-humanity-ravaging-epidemics/

Two months into a global pandemic obviously sticking around for a bit, I can't say I had put much thought into a sci-fi B-movie I saw once several years back. But upon mention, I did instantly and vaguely remember Domain. I caught a screener for Ars ahead of a small sci-fi-only film festival in December 2016, and the premise stuck with me more than the plot or any single performance. In this unabashedly indie film (read: high-concept, super specific, and low-budget aesthetic), a viral pandemic called the Saharan Flu keeps racking up a body count. "The World Health Organization says it's potentially civilization-threatening," public broadcasts declare within the film's opening minutes after 5,000 deaths (only!) sweep across Germany, Egypt, and Italy.

Ho-hum, another pandemic film, you say. We have a million of those. In fact, not even writer/director Nathaniel Atcheson had been recently thinking about Domain in light of our current predicament (I called and asked in June). But what happens in-film after its fictional pandemic makes Domain disturbingly prescient four years later. The movie follows seven people from across the United States, but most of the action takes place in similar-looking bunkers because humanity has been forced to quarantine en masse. And in this alternate version of the present day, the government requires these groups to keep tabs on each other by communicating through ever-present video chat—it's not Zoom, FaceTime, Google Meet, or Skype; it's the titular Domain.

Read 9 remaining paragraphs | Comments

Stricken die USA am seidenen Vorhang?

Eine turbulente Woche für die diplomatischen Beziehungen zwischen den USA und China zeigt: Die “Entkopplung” von China nimmt weiter Gestalt an

Eine turbulente Woche für die diplomatischen Beziehungen zwischen den USA und China zeigt: Die "Entkopplung" von China nimmt weiter Gestalt an

The real science behind SETI’s hunt for intelligent aliens

Inside the current hunt for “technosignatures” in radio waves.

The real science behind SETI’s hunt for intelligent aliens

Enlarge (credit: Aurich Lawson / Getty)

In 1993, a team of scientists published a paper in the scientific journal Nature that announced the detection of a planet harboring life. Using instruments on the spacecraft Galileo, they imaged the planet’s surface and saw continents with colors “compatible with mineral soils” and agriculture, large expanses of ocean with “spectacular reflection,” and frozen water at the poles. An analysis of the planet’s chemistry revealed an atmosphere with oxygen and methane so abundant that they must come from biological sources. “Galileo found such profound departures from equilibrium that the presence of life seems the most probable cause,” the authors wrote.

But the most telltale sign of life was measured by Galileo’s spectrogram: radio transmissions from the planet’s surface. “Of all Galileo science measurements, these signals provide the only indication of intelligent, technological life,” wrote the authors.

The paper’s first author was Carl Sagan, the astronomer, author, and science communicator. The planet that he and his co-authors described was Earth.

Read 48 remaining paragraphs | Comments

Your next smartphone will be a lot harder to scratch

Corning’s Gorilla Glass Victus is a significant improvement in scratch prevention.

The new generation of Gorilla Glass promises double the scratch resistance of 2018’s Gorilla Glass 6.

Enlarge / The new generation of Gorilla Glass promises double the scratch resistance of 2018’s Gorilla Glass 6. (credit: Corning)

It takes about two years for Corning to develop each new generation of Gorilla Glass, the resilient material that graces a critical mass of smartphones. That process has for several update cycles focused on protecting screens against drops, fending off shatters and cracks by boosting what’s known as compressive strength. The newly announced Gorilla Glass Victus, though, gives equal weight to preventing scratches. That’s harder than it sounds and more useful than you’d think.

It’s not that Gorilla Glass has dismissed scratches entirely. But the last time Corning prioritized it as a threat was in Gorilla Glass 3, which came out all of seven years ago. Since then, smartphones have gotten much better about bouncing back from sidewalk run-ins, but handle an inadvertent key dig about the same as they did when the iPhone 5S came out. (Corning still provides glass for the iPhone, but a custom formulation distinct from the Gorilla Glass line.) Enter Victus, which promises double the scratch resistance of 2018’s Gorilla Glass 6. It performs better in a drop test, too, surviving a 2-meter fall compared to its predecessor’s 1.6m durability.

Scratch that itch

Read 10 remaining paragraphs | Comments

What is the Most Dangerous Pirate Content to Download?

While many users are attracted to the lure of free content, piracy sites that allow user uploads always carry the risk of a download not being what it claims to be. So what are the most dangerous downloads and should people risk them? It’s a question of balances but for the novice, abstinence is the safest all-round solution.

From: TF, for the latest news on copyright battles, piracy and more.

DangerOver the past couple of years, anti-piracy strategies have taken an interesting turn.

Where once people were asked to “think of the creators”, they’re now more likely to be told that visiting a pirate site is akin to Russian roulette and just a step away from digital doomsday.

If that strategy had worked, piracy would be a thing of the past. As things stand, most people simply ignore the scaremongering, instead preferring to employ a more measured response.

The concerning thing about these campaigns is that while anti-piracy groups have a job to do, they should consider how insincere the messages sound. Genuine concern would be accompanied by helpful advice to avoid trouble but that’s never going to happen because user safety isn’t the big issue here, reducing piracy is.

Not to say that any of this is fundamentally wrong. Business is business after all. But what is really interesting is that the companies making the most noise about supposed malware don’t have a product through which it is easily spread.

Video formats used to shift movies, TV shows and live sports aren’t known for delivering malware – software is – and software companies rarely if ever issue stark warnings about malicious payloads. All things considered, perhaps they should.

Downloading Software is Indeed Russian Roulette

While there are sites and forums containing curated material that has a much lower chance of infecting the user, the same cannot be said about many public torrent sites and similar platforms. If a site allows users to upload files and doesn’t moderate uploads 24/7/365, there is a not insignificant chance that there will be viruses and malware ready to pounce.

The screenshot below was taken on The Pirate Bay on Wednesday. To novice users, there’s little to arouse suspicion but for those who have been around for a while, this is a disaster zone.

TPB Virus

What we have here is a range of software and games that would’ve ordinarily appeared in isolation, scattered around TPB indexes. The reason they’re here in one list is that they were all uploaded by the same user so, for illustration purposes, we grouped them together. They are not so easily noticed on the site itself when unsorted.

The Signs Aren’t Hard to Spot – At Least With a Little Patience

There are many observations one can make just from the list above. The most obvious is that the uploads are all exactly the same size, meaning that whatever malware lies beneath is identical for all files. This is a big red flag that can be easily spotted by checking other uploads made by the same user as they tend to upload in bulk.

The second is the filesizes themselves. People who spread malware often like to get their poison out there as quickly as possible so the smaller the download, the more likely it is that inexperienced users will download the file. What is needed here, however, is a little bit of common sense and a pause for thought.

In the screenshot above, Song of Horror Complete Edition and Trine 4: The Nightmare Prince are not going to arrive in tiny 14MB packages. However, despite that obvious issue, more than 350 people had downloaded each ‘game’ at the time of checking. That’s certainly not good for the users but it’s fair to say that other problems are less easily spotted using the filesize rule.

Even in its official form, WinRAR is a very small download of just 3MB so given that the package being offered above supposedly contains a key generator too, a few extra megabytes isn’t particularly shocking. However, the ridiculous thing here is that not only is it the most popular download on the list, but WinRAR is essentially free forever, downloadable from the official platform. And that version doesn’t come with a virus either.

Downloads Don’t Have to Be Small to Be Dangerous

One of the attractions for downloaders is that they can get expensive software for free. This includes copies of Windows, Microsoft Office and various top-tier Adobe products, to name a few. In many cases it’s possible to seek out ‘safe’ copies of these tools on pirate sites but in reality, this is a game for the experienced – or the lucky.

Novice pirates can often download exactly what they wanted with little trouble but there are always risks and with limited knowledge to fall back on, they are not always apparent.

This problem is amplified among the often younger audiences seeking out pirated games and the associated cracks. With tunnel vision at the prospect of getting the latest AAA title for free, people take risks fueled by emotion and after a 50GB download, security isn’t as high on the agenda as it should be.

Software and Games Are the Riskiest Content, Period

Unlike formats such as MP4 and MP3, which are widely used to distribute video and audio via pirate sites and require a third-party player to consume, executable files (.exe, for example) gain direct access to a user’s computer. While this might take place to install a game or software application, it is trivial for this process to install viruses and malware.

Sure, users can take defensive measures such as having a decent up-to-date anti-virus and/or anti-malware tool activated but in some cases, pirate downloads actually instruct users to turn off their protection if the game/software doesn’t install properly. This is often due to anti-virus tools detecting cracks as PUPs (Potentially Unwanted Program), thereby preventing them from running.

Fairly obviously, this also provides the perfect free-for-all environment to install something nasty as well or instead, turning the dream of expensive software or gaming heaven into an immediate security nightmare, thanks to the overly-trusting nature of the user.

It’s Really a Question of Trade-Offs

There will be no shortage of readers who have never had a problem with pirated software/games and also some who simply believe they haven’t. That being said, software and videogame piracy has always been a trade-off between saving money, avoiding DRM and, at least potentially, facing the prospect of machine that won’t boot or worse still, stubbornly boots every time while doing its evil work.

Personally speaking, I’d rather use Open Office and GIMP than pirate copies of MS Office and Photoshop. When it comes to games, waiting a few months for a significantly cheaper price isn’t a problem since there’s no craving for the latest titles on launch. And for me, a free copy of Z-Zip is always preferred to a suspect copy of WinRAR downloaded from anywhere.

Then again, I absolutely must have my PC in perfect working order every single day and the risk of malware or viruses never trumps that. The bottom line is that if anyone needs a completely stress-free and risk-averse computing life, installing software from unvetted sources always has the potential to undermine that.

Of course, the technically skilled out there will be shouting that it’s all really quite simple and malware is mostly easy to avoid and they would be right. However, balance that confidence against the years it’s taken to amass the relevant knowledge and it’s clear that a significant investment is involved.

For novices that don’t have that time, open-source software and paying for something every now and again can be the cheaper and safer option.

From: TF, for the latest news on copyright battles, piracy and more.

Russia’s GRU hackers hit US government and energy targets

A previously unreported Fancy Bear campaign persisted for well over a year.

The FBI notified organizations in May that Russia's elite hackers had targeted them. The campaign likely remains ongoing.

Enlarge / The FBI notified organizations in May that Russia's elite hackers had targeted them. The campaign likely remains ongoing. (credit: Natalia Koleskinova | Getty Images)

Russia's GRU military intelligence agency has carried out many of the most aggressive acts of hacking in history: destructive worms, blackouts, and—closest to home for Americans—a broad hacking-and-leaking operation designed to influence the outcome of the 2016 US presidential election. Now it appears the GRU has been hitting US networks again, in a series of previously unreported intrusions that targeted organizations ranging from government agencies to critical infrastructure.

From December 2018 until at least May of this year, the GRU hacker group known as APT28 or Fancy Bear carried out a broad hacking campaign against US targets, according to an FBI notification sent to victims of the breaches in May and obtained by WIRED. According to the FBI, the GRU hackers primarily attempted to break into victims’ mail servers, Microsoft Office 365 and email accounts, and VPN servers. The targets included "a wide range of US-based organizations, state and federal government agencies, and educational institutions," the FBI notification states. And technical breadcrumbs included in that notice reveal that APT28 hackers have targeted the US energy sector, too, apparently as part of the same effort.

Read 12 remaining paragraphs | Comments