Apple Blocks Google From Running Its Internal iOS Apps Slashdotby msmash on business at January 1, 1970, 1:00 am (cached at January 31, 2019, 11:35 pm)

Apple has now shut down Google's ability to distribute its internal iOS apps, following a similar shutdown that was issued to Facebook earlier this week. From a report: A person familiar with the situation tells The Verge that early versions of Google Maps, Hangouts, Gmail, and other pre-release beta apps have stopped working today, alongside employee-only apps like a Gbus app for transportation and Google's internal cafe app.

Read more of this story at Slashdot.

The real American Dream Scripting News(cached at January 31, 2019, 11:03 pm)

We need to revise The American Dream because Howard Shultz seems to think he is the model of it. Fact is that most of the money he has is of no use to him. It can't buy him more time, he's still just one person. He can buy good health care, but he can't buy good health.

I reject that The American Dream is creating soul-crushing wealth, the expectation that wealth entitles you to anything you want at any cost for everyone else. We're entering the climate crisis with no hope of surviving it if that's our view of the dream.

I think JFK came closer than Schultz. Ask not what your country can do for you, ask what you can do for your country. Once you've achieved financial independence, try to be the change you seek, not to buy it.

[no title] Scripting News(cached at January 31, 2019, 11:03 pm)

The Knicks traded Kristaps Porzingas (and Tim Hardaway and Courtnely Lee) to Dallas. I don't know if it's good or bad. Hard to see how a star like KP fits into the current Knicks lineup. The Knicks got Dennis Smith Jr, DeAndre Jordan and Wesley Matthews.
Guatemalans protest against bill that would free war criminals AL JAZEERA ENGLISH (AJE)(cached at January 31, 2019, 11:00 pm)

Hundreds, including survivors and families of victims of the country's armed conflict, protest proposed amnesty law.
Prisons Across the US Are Quietly Building Databases of Incarcerated People's Voice Slashdotby msmash on usa at January 1, 1970, 1:00 am (cached at January 31, 2019, 10:35 pm)

In New York and other states across the country, authorities are acquiring technology to extract and digitize the voices of incarcerated people into unique biometric signatures, known as voice prints. From a report: Prison authorities have quietly enrolled hundreds of thousands of incarcerated people's voice prints into large-scale biometric databases. Computer algorithms then draw on these databases to identify the voices taking part in a call and to search for other calls in which the voices of interest are detected. Some programs, like New York's, even analyze the voices of call recipients outside prisons to track which outsiders speak to multiple prisoners regularly. Corrections officials representing the states of Texas, Florida, and Arkansas, along with Arizona's Yavapai and Pinal counties; Alachua County, Florida; and Travis County, Texas, also confirmed that they are actively using voice recognition technology today. And a review of contracting documents identified other jurisdictions that have acquired similar voice-print capture capabilities: Connecticut and Georgia state corrections officials have signed contracts for the technology Authorities and prison technology companies say this mass biometric surveillance supports prison security and fraud prevention efforts. But civil liberties advocates argue that the biometric buildup has been neither transparent nor consensual. Some jurisdictions, for example, limit incarcerated people's phone access if they refuse to enroll in the voice recognition system, while others enroll incarcerated people without their knowledge. Once the data exists, they note, it could potentially be used by other agencies, without any say from the public.

Read more of this story at Slashdot.

Players, fans hopeful as Qatar take on Japan in Asian Cup final AL JAZEERA ENGLISH (AJE)(cached at January 31, 2019, 10:30 pm)

Qatar fans resting high hopes on national football team which is set to play its first Asian Cup final.
Uganda seizes 750 pieces of ivory being smuggled from S Sudan AL JAZEERA ENGLISH (AJE)(cached at January 31, 2019, 10:30 pm)

Agency estimates that at least 325 elephants would have been killed to acquire the ivory.
Amazon Begins Pulling Products From Its India Site as Local Government's Strict New Slashdotby msmash on business at January 1, 1970, 1:00 am (cached at January 31, 2019, 10:05 pm)

An anonymous reader writes: Amazon and Walmart have been dealt a big blow in India, one of their most important markets, after the local government today declined a request to extend the deadline for the implementation of revised rules regarding how foreign ecommerce platforms sell goods and conduct business in the country. The local government, which revised its ecommerce policies late December, prohibit Amazon and Flipkart from selling goods from companies in which they have a stake. The two companies were hoping the Department of Industrial Policy and Promotion, the government agency that issued the revised policies, would extend the February 1 deadline. But efforts to gain more time were unsuccessful. (At around 6:50 p.m. local time -- 8.20 a.m. Pacific, the government said it won't be extending the deadline.) Under the current laws, foreign-owned ecommerce companies are not allowed to sell directly to customers (in other words, to operate under an inventory-based model of ecommerce). Instead, they can only provide a marketplace that acts as "an information technology platform" and serves as a facilitator between "buyer and seller." To bypass this restriction, both Amazon and Flipkart, which sold a majority stake to Walmart last year, have acquired stakes in some of the biggest third-party sellers in the country. For instance, Amazon owns stake in parent companies of Cloudtail India and Appario Retail, while Flipkart until recently controlled WS Retail, the largest seller on its platform. The local government's revised policies fixed that loophole. Starting at 1.30 am Friday local time, several Amazon-owned products, including select Echo smart speakers, as well as some travel bags, batteries, and chargers under Basics brand, have become unavailable on Amazon's website.

Read more of this story at Slashdot.

US army says at least 24 Al-Shabab members killed in air strike AL JAZEERA ENGLISH (AJE)(cached at January 31, 2019, 10:00 pm)

The strike took place on a camp near Shebeeley Hiran in central Somalia, US Africa Command said.
Venezuela's Guaido lays out broad vision for the country AL JAZEERA ENGLISH (AJE)(cached at January 31, 2019, 10:00 pm)

During the speech, the self-declared interim president said police had gone to his home in an attempt to intimidate him.
Will the US end its involvement in the Yemen war? AL JAZEERA ENGLISH (AJE)(cached at January 31, 2019, 10:00 pm)

A group of senators, led by Bernie Sanders, plans to re-submit a draft bill to stop US support for the war in Yemen.
Many Windows 10 Users Unable To Connect To Windows Update Service Slashdotby msmash on windows at January 1, 1970, 1:00 am (cached at January 31, 2019, 9:35 pm)

For the past two days, some Windows 10 users from around the world have been reporting that they are unable to connect to Windows Update. When they attempt to do so, Windows 10 will complain that they are unable to connect to the update service. From a report: We first learned about this problem yesterday when our member Opera contacted us stating that they, and many others, were having issues connecting to Windows Update. When they tried updating, Windows would report that it could not connect to the update service. The wording of the error, shown below, indicates that this is an Internet connectivity issue, but others are not so sure. "We couldn't connect to the update service. We'll try again later, or you can check now. If it still doesn't work, make sure you're connected to the Internet" Unfortunately, there is no clear cut answer as to what is causing this issue and some feel it is related to a botched Windows Defender update and others state that this could be a DNS issue.

Read more of this story at Slashdot.

Engineers Create a Robot That Can 'Imagine' Itself Slashdotby msmash on robot at January 1, 1970, 1:00 am (cached at January 31, 2019, 9:05 pm)

Columbia Engineering researchers have made a major advance in robotics by creating a robot that learns what it is, from scratch, with zero prior knowledge of physics, geometry, or motor dynamics. Initially the robot does not know if it is a spider, a snake, an arm -- it has no clue what its shape is. After a brief period of "babbling," and within about a day of intensive computing, their robot creates a self-simulation. The robot can then use that self-simulator internally to contemplate and adapt to different situations, handling new tasks as well as detecting and repairing damage in its own body. From a report: The work is published today in Science Robotics. To date, robots have operated by having a human explicitly model the robot. "But if we want robots to become independent, to adapt quickly to scenarios unforeseen by their creators, then it's essential that they learn to simulate themselves," says Hod Lipson, professor of mechanical engineering, and director of the Creative Machines lab, where the research was done. For the study, Lipson and his PhD student Robert Kwiatkowski used a four-degree-of-freedom articulated robotic arm. Initially, the robot moved randomly and collected approximately one thousand trajectories, each comprising one hundred points. The robot then used deep learning, a modern machine learning technique, to create a self-model. The first self-models were quite inaccurate, and the robot did not know what it was, or how its joints were connected. But after less than 35 hours of training, the self-model became consistent with the physical robot to within about four centimeters. The self-model performed a pick-and-place task in a closed loop system that enabled the robot to recalibrate its original position between each step along the trajectory based entirely on the internal self-model. With the closed loop control, the robot was able to grasp objects at specific locations on the ground and deposit them into a receptacle with 100 percent success.

Read more of this story at Slashdot.

Criminals Are Tapping Into the Phone Network Backbone to Empty Bank Accounts Slashdotby msmash on communications at January 1, 1970, 1:00 am (cached at January 31, 2019, 9:05 pm)

Sophisticated hackers have long exploited flaws in SS7, a protocol used by telecom companies to coordinate how they route texts and calls around the world. Those who exploit SS7 can potentially track phones across the other side of the planet, and intercept text messages and phone calls without hacking the phone itself. From a report: This activity was typically only within reach of intelligence agencies or surveillance contractors, but now Motherboard has confirmed that this capability is much more widely available in the hands of financially-driven cybercriminal groups, who are using it to empty bank accounts. So-called SS7 attacks against banks are, although still relatively rare, much more prevalent than previously reported. Motherboard has identified a specific bank -- the UK's Metro Bank -- that fell victim to such an attack. The news highlights the gaping holes in the world's telecommunications infrastructure that the telco industry has known about for years despite ongoing attacks from criminals. The National Cyber Security Centre (NCSC), the defensive arm of the UK's signals intelligence agency GCHQ, confirmed that SS7 is being used to intercept codes used for banking. "We are aware of a known telecommunications vulnerability being exploited to target bank accounts by intercepting SMS text messages used as 2-Factor Authentication (2FA)," The NCSC told Motherboard in a statement. "Some of our clients in the banking industry or other financial services; they see more and more SS7- based [requests],â Karsten Nohl, a researcher from Security Research Labs who has worked on SS7 for years, told Motherboard in a phone call. "All of a sudden you have someone's text messages."

Read more of this story at Slashdot.

New Security Flaw Impacts 5G, 4G, and 3G Telephony Protocols Slashdotby msmash on security at January 1, 1970, 1:00 am (cached at January 31, 2019, 8:35 pm)

A new vulnerability has been discovered in the upcoming 5G cellular mobile communications protocol. Researchers have described this new flaw as more severe than any of the previous vulnerabilities that affected the 3G and 4G standards. From a report: Further, besides 5G, this new vulnerability also impacts the older 3G and 4G protocols, providing surveillance tech vendors with a new flaw they can abuse to create next-gen IMSI-catchers that work across all modern telephony protocols. This new vulnerability has been detailed in a research paper named "New Privacy Threat on 3G, 4G, and Upcoming5G AKA Protocols," published last year. According to researchers, the vulnerability impacts AKA, which stands for Authentication and Key Agreement, a protocol that provides authentication between a user's phone and the cellular networks. The AKA protocol works by negotiating and establishing keys for encrypting the communications between a phone and the cellular network.

Read more of this story at Slashdot.