×
United States

'Plan To Save Downtown San Francisco From Doom Loop Approved by Lawmakers' (sfstandard.com) 233

An anonymous reader shared this report from the nonprofit journalism site, the San Francisco Standard: The San Francisco Board of Supervisors on Tuesday approved legislation that aims to shore up the city's beleaguered Downtown by filling empty storefronts and expediting the conversion of underused office buildings into housing. The bill is a major component of Mayor London Breed's recovery agenda. Co-sponsored by Board President Aaron Peskin, it amends the city's planning code to expand residential uses and Downtown office conversions. It also streamlines the review of certain projects, among other changes...

Even with speedier project approvals, converting San Francisco office buildings to housing remains a costly endeavor; few developers have explored the option to date. At an April 3 hearing of the board's Land Use Committee, lawmakers outlined the need for multiple reforms to make conversions economically feasible; Supervisor Dean Preston voiced concerns that even those reforms would not accommodate low-income housing. Many say San Francisco's Downtown is currently caught in a "doom loop" driven by economic knock-on effects of the pandemic, including an office vacancy rate approaching 30% and trophy office towers changing hands at deep discounts...

The bill passed Tuesday is one of several legislative efforts to aid Downtown and the city's overall economy. Initiatives have included legislation to delay tax increases for retail, food service and other businesses hit hard by the pandemic, an "Office Attraction Tax Credit" for new companies opening in the city and a program called "Vacant to Vibrant," which provides grants to businesses which open "pop-up" shops and art spaces in Downtown's empty storefronts.

The Courts

You're Owed a Little Money From a 2010 Google Class Action Lawsuit (yakimaherald.com) 57

An anonymous reader shared this report from The Penny Hoarder: If you Googled anything between 2006 and 2013, then Google owes you money for violating your privacy. Those are the terms of a class-action lawsuit that Google has settled for $23 million.

How much money does Google owe you? Well, it depends on how many people come forward to claim their share of the settlement. The current estimated payout is about $7.70 per person.

Of course, that number could go up or down before it's all over. If fewer people than expected file claims, the payout amount will go up. But if more people than expected file claims, the payout amount will go down because more people are sharing the settlement money... The deadline to file a claim is July 31...

Basically, the class-action lawsuit alleges that Google Search "improperly shared your search queries with third-party websites and companies" during the time period in question. This has to do with how Google allegedly included your search query in the link that's created whenever you click on a website in a Google search. This involves something called a "referrer header."

Even though Google settled the case, it still denies any wrongdoing or liability. As part of the lawsuit settlement, Google is updating its FAQ page.

Some interesting history from SFGate: The lawsuit was filed in 2010 over allegations that Google shared its users' search terms with third-party websites based on its use of referrer headers, which essentially shows websites how a user found them. In 2015, the case reached an $8.5 million settlement in the Northern District of California, with a vast majority of the settlement going to a collection of internet privacy groups, because the amount allocated for each individual would have been mere pennies. But the case was brought all the way up to the Supreme Court after Ted Frank, a conservative activist and vocal class action suit critic, disputed the settlement being sent to those nonprofit groups instead of the users affected by the suit. In 2019, the case made its way back down to the district court, where the preliminary settlement was approved in 2022...

The final approval hearing for the settlement, which includes whether the class action representatives will receive $5,000 and the representing attorneys will receive 25% of the $23 million sum, is scheduled for Oct. 12.

From the Settlement agreement: If the Settlement becomes final, Settlement Class Members will be releasing Google (and certain others related to Google, such as Google directors, officers and employees) from all of the settled claims. This means that you will no longer be able to sue Google (or the other released parties) regarding any of the settled claims if you are a Settlement Class Member and do not timely and properly exclude yourself from the Settlement Class...


YOUR LEGAL RIGHTS AND OPTIONS IN THIS SETTLEMENT:

FILE A CLAIM BY JULY 31, 2023
This is the only way to get a payment under the Settlement.

DO NOTHING
Get no payment under the Settlement and give up your right to compensation for the claims and allegations in this case.

EXCLUDE YOURSELF BY JULY 31, 2023
Get no payment under the Settlement. This is the only option that allows you to be a part of any other lawsuit against Google about the claims and allegations in this case.

OBJECT BY JULY 31, 2023
Write to the Court about why you think the Settlement should not be approved. You may also ask to speak in Court about the fairness of the Settlement.

Government

Daniel Ellsberg, Who Leaked the Pentagon Papers, Is Dead At 92 (nytimes.com) 23

Daniel Ellsberg, a military analyst who leaked what came to be known as the Pentagon Papers, died on Friday at the age of 92. The cause was pancreatic cancer. The New York Times reports: The disclosure of the Pentagon Papers -- 7,000 government pages of damning revelations about deceptions by successive presidents who exceeded their authority, bypassed Congress and misled the American people -- plunged a nation that was already wounded and divided by the war deeper into angry controversy. It led to illegal countermeasures by the White House to discredit Mr. Ellsberg, halt leaks of government information and attack perceived political enemies, forming a constellation of crimes known as the Watergate scandal that led to the disgrace and resignation of President Richard M. Nixon. And it set up a First Amendment confrontation between the Nixon administration and The New York Times, whose publication of the papers was denounced by the government as an act of espionage that jeopardized national security. The U.S. Supreme Court upheld the freedom of the press.

Mr. Ellsberg was charged with espionage, conspiracy and other crimes and tried in federal court in Los Angeles. But on the eve of jury deliberations, the judge threw out the case, citing government misconduct, including illegal wiretapping, a break-in at the office of Mr. Ellsberg's former psychiatrist and an offer by President Nixon to appoint the judge himself as director of the Federal Bureau of Investigation. "The demystification and de-sanctification of the president has begun," Mr. Ellsberg said after being released. "It's like the defrocking of the Wizard of Oz." The story of Daniel Ellsberg in many ways mirrored the American experience in Vietnam, which began in the 1950s as a struggle to contain communism in Indochina and ended in 1975 with humiliating defeat in a corrosive war that killed more than 58,000 Americans and millions of Vietnamese, Cambodians and Laotians. [...]
Over the years, Ellsberg was mentioned on Slashdot several times. In late 2000, Ellsberg was mentioned in a story about Clinton's veto of what would have been a new law to prevent leaks of classified information.

Ellsberg also expressed his support for WikiLeaks founder Julian Assange in 2010 and called Edward Snowden the "greatest patriot whistleblower of our time."

He was also featured in a Slashdot story for his view on the growing role of internet companies in the public sphere. In 2011, Ellsberg said companies such as Google, Facebook, and Twitter need to take a stand and push back on excessive requests for personal data.
Security

Millions of Americans' Personal Data Exposed in Global Hack (cnn.com) 17

Millions of people in Louisiana and Oregon have had their data compromised in the sprawling cyberattack that has also hit the US federal government, state agencies said late Thursday. From a report: The breach has affected 3.5 million Oregonians with driver's licenses or state ID cards, and anyone with that documentation in Louisiana, authorities said. The Louisiana governor's office did not put a number on the number of victims but over 3 million Louisianians hold driver's licenses, according to public data. The states did not blame anyone in particular for the hack, but federal officials have attributed a broader hacking campaign using the same software vulnerability to a Russian ransomware gang. The sweeping hack has likely exposed data at hundreds of organizations across the globe and also compromised multiple US federal agencies, including the Department of Energy, as well as data from major corporations in Britain like the BBC and British Airways. The Russian-speaking hackers that claimed credit are known to demand multimillion-dollar ransoms, though US and state governments say they have not received any demands.
Google

New Google Lawsuit Aims To Curb Fake Business Reviews (reuters.com) 3

Alphabet's Google on Friday sued a Los Angeles man and his companies in San Jose, California federal court, claiming he created hundreds of fake business listings on its platforms and sold them to real businesses to lure in unsuspecting customers. From a report: Fake reviews have been a recurring problem on internet commerce sites. Google said in a statement that it filed the lawsuit against Ethan QiQi Hu to "help put an end to these types of malicious schemes." Google's lawsuit said Hu creates sham businesses that appear in its search engine and Google Maps, using an "elaborate set of props" to verify them on video calls with the tech giant's agents. The lawsuit said Hu keeps a tool bench as a prop to verify fraudulent listings for garage repair, tree cutting and plumbing, and essential oils for verifying fake aromatherapy and reiki therapy businesses. Google said Hu buys thousands of fake positive reviews to make the businesses appear legitimate. He then allegedly sells the profiles as "leads" to real businesses in the same fields, which receive contacts from potential customers who reach out to the fake businesses.
AI

EU Votes To Ban AI In Biometric Surveillance, Require Disclosure From AI Systems 34

European Union officials have voted in favor of stricter regulations on artificial intelligence, including a ban on AI use in biometric surveillance and a requirement for AI systems like OpenAI's ChatGPT to disclose when content is generated by AI. Ars Technica reports: On Wednesday, European Union officials voted to implement stricter proposed regulations concerning AI, according to Reuters. The updated draft of the "AI Act" law includes a ban on the use of AI in biometric surveillance and requires systems like OpenAI's ChatGPT to reveal when content has been generated by AI. While the draft is still non-binding, it gives a strong indication of how EU regulators are thinking about AI. The new changes to the European Commission's proposed law -- which have not yet been finalized -- intend to shield EU citizens from potential threats linked to machine learning technology.

The new draft of the AI Act includes a provision that would ban companies from scraping biometric data (such as user photos) from social media for facial recognition training purposes. News of firms like Clearview AI using this practice to create facial recognition systems drew severe criticism from privacy advocates in 2020. However, Reuters reports that this rule might be a source of contention with some EU countries who oppose a blanket ban on AI in biometric surveillance. The new EU draft also imposes disclosure and transparency measures on generative AI. Image synthesis services like Midjourney would be required to disclose AI-generated content to help people identify synthesized images. The bill would also require that generative AI companies provide summaries of copyrighted material scraped and utilized in the training of each system. While the publishing industry backs this proposal, according to The New York Times, tech developers argue against its technical feasibility.

Additionally, creators of generative AI systems would be required to implement safeguards to prevent the generation of illegal content, and companies working on "high-risk applications" must assess their potential impact on fundamental rights and the environment. The current draft of the EU law designates AI systems that could influence voters and elections as "high-risk." It also classifies systems used by social media platforms with over 45 million users under the same category, thus encompassing platforms like Meta and Twitter. [...] Experts say that after considerable debate over the new rules among EU member nations, a final version of the AI Act isn't expected until later this year.
Security

US Government Agencies Hit In Global Cyberattack (cnn.com) 19

An anonymous reader quotes a report from CNN: Several US federal government agencies have been hit in a global cyberattack that exploits a vulnerability in widely used software, according to a top US cybersecurity agency. The US Cybersecurity and Infrastructure Security Agency "is providing support to several federal agencies that have experienced intrusions affecting their MOVEit applications," Eric Goldstein, the agency's executive assistant director for cybersecurity, said in a statement on Thursday to CNN, referring to the software impacted. "We are working urgently to understand impacts and ensure timely remediation." It was not immediately clear if the hackers responsible for breaching the federal agencies were a Russian-speaking ransomware group that has claimed credit for numerous other victims in the hacking campaign.

Agencies were much quicker Thursday to deny they'd been affected by the hacking than to confirm they were. The Transportation Security Administration and the State Department said they were not victims of the hack. CISA Director Jen Easterly told MSNBC on Thursday that she was "confident" that there will not be "significant impacts" to federal agencies from the hacks because of the government's defensive improvements. But the news adds to a growing tally of victims of a sprawling hacking campaign that began two weeks ago and has hit major US universities and state governments. The hacking spree mounts pressure on federal officials who have pledged to put a dent in the scourge of ransomware attacks that have hobbled schools, hospitals and local governments across the US.

The new hacking campaign shows the widespread impact that a single software flaw can have if exploited by skilled criminals. The hackers -- a well-known group whose favored malware emerged in 2019 -- in late May began exploiting a new flaw in a widely used file-transfer software known as MOVEit, appearing to target as many exposed organizations as they could. The opportunistic nature of the hack left a broad swath of organizations vulnerable to extortion. Progress, the US firm that owns the MOVEit software, has also urged victims to update their software packages and has issued security advice.

Piracy

2 Men Who Helped Run Popular Pirating Website Megaupload Sentenced To Prison in New Zealand (apnews.com) 60

Two men who helped run the once wildly popular pirating website Megaupload were each sentenced by a New Zealand court on Thursday to more than two years in prison. From a report: The sentencing of Mathias Ortmann and Bram van der Kolk ended an 11-year legal battle by the men to avoid extradition to the United States on more serious charges that included racketeering. The men last year struck a deal with prosecutors from New Zealand and the U.S. in which they pleaded guilty to being part of a criminal group and causing artists to lose money by deception. Meanwhile Kim Dotcom, the founder of Megaupload, is continuing to fight the U.S. charges and threat of extradition. He has said he expects his former colleagues to testify against him as part of the deal they struck.

U.S. prosecutors say Megaupload raked in at least $175 million -- mainly from people who used the site to illegally download songs, television shows and movies -- before the FBI shut it down in early 2012 and arrested Dotcom and other company officers. Ortmann was sentenced to 2 years and 7 months while van der Kolk was sentenced to 2 years and 6 months. Each had faced a maximum sentence of 10 years in prison but argued they should be allowed to serve their sentences in home detention.

Government

Texas Bans Kids From Social Media Without Parental Consent (theverge.com) 254

Texas Governor Greg Abbott has signed a bill prohibiting children under 18 from joining various social media platforms without parental consent. Similar legislation has been passed in Utah and Louisiana. The Verge reports: The bill, HB 18, requires social media companies to receive explicit consent from a minor's parent or guardian before they'd be allowed to create their own accounts starting in September of next year. It also forces these companies to prevent children from seeing "harmful" content -- like content related to eating disorders, substance abuse, or "grooming" -- by creating new filtering systems.

Texas' definition of a "digital service" is extremely broad. Under the law, parental consent would be necessary for kids trying to access nearly any site that collects identifying information, like an email address. There are some exceptions, including sites that primarily deliver educational or news content and email services. The Texas attorney general could sue companies found to have violated this law. The law's requirements to filter loosely defined "harmful material" and provide parents with control over their child's accounts mirror language in some federal legislation that has spooked civil and digital rights groups.

Like HB 18, the US Senate-led Kids Online Safety Act orders platforms to prevent minors from being exposed to content related to disordered eating and other destructive behaviors. But critics fear this language could encourage companies like Instagram or TikTok to overmoderate non-harmful content to avoid legal challenges. Overly strict parental controls could also harm kids in abusive households, allowing parents to spy on marginalized children searching for helpful resources online.

Microsoft

Microsoft Now Sells Surface Replacement Parts, Including Displays, Batteries, and SSDs (theverge.com) 18

Microsoft is starting to sell replacement components for its Surface devices. The software giant now supplies replacement parts in the Microsoft Store, allowing Surface owners to replace their displays, batteries, SSDs, and more. From a report: "We are excited to offer replacement components to technically inclined consumers for out-of-warranty, self repair," says Tim McGuiggan, VP of devices services and product engineering at Microsoft. "When purchasing a replacement component, you will receive the part and relevant collateral components (such as screws if applicable)." Tools to help you repair a Microsoft Surface device are sold separately by iFixit, which Microsoft partnered with in 2021 to sell official Surface repair tools. iFixit supplies tools like battery covers to protect against punctures during repair, debonding cradles to help cut the adhesive that holds screen glass in place, and a tool to properly replace a screen.
Businesses

US Judge Temporarily Blocks Microsoft Acquisition of Activision (reuters.com) 40

A U.S. judge has granted the FTC request to temporarily block Microsoft's acquisition of Activision Blizzard, scheduling a hearing for a preliminary injunction and preventing the deal from closing until a court ruling is made. Reuters reports: U.S. District Judge Edward Davila scheduled a two-day evidentiary hearing on the FTC's request for a preliminary injunction for June 22-23 in San Francisco. Without a court order, Microsoft could have closed on the $69 billion deal as early as Friday. Davila said the temporary restraining order "is necessary to maintain the status quo while the complaint is pending (and) preserve this court's ability to order effective relief in the event it determines a preliminary injunction is warranted and preserve the FTC's ability to obtain an effective permanent remedy in the event that it prevails in its pending administrative proceeding."

Microsoft and Activision must submit legal arguments opposing a preliminary injunction by June 16; the FTC must reply on June 20. Davila said the bar on closing will remain in place until at least five days after the court rules on the preliminary injunction request. The case reflects the muscular approach to antitrust enforcement taken by the administration of U.S. President Joe Biden.

The Almighty Buck

NYC Establishes First Minimum Wage For Food Delivery Workers (gothamist.com) 128

New York City's food delivery workers will be guaranteed a minimum wage for the first time under new regulations announced by Mayor Eric Adams. Gothamist reports: Tens of thousands of delivery workers are slated to make at least $17.96 per hour plus tips by July 12, and at least $19.96 an hour by 2025, city officials said. That's a sharp increase from what delivery workers make now. Many take home less than the city's minimum wage of $15 an hour. The $19.96 hourly rate is less than the $23.82 the Department of Consumer and Worker Protections originally proposed last November -- but is still almost three times more than what delivery workers currently make, according to the city agency.

Sunday's announcement comes after months of back-and-forth between delivery workers, elected officials and app companies over the minimum wage rates. City officials blew past a Jan. 1 deadline set by City Council legislation to establish the new wage rules. Delivery companies, like Uber and DoorDash, argued that the new legislation will force a raise in prices and less schedule flexibility, while some advocates claim these companies are manipulating employees into testifying against the measure. DoorDash spokesperson Eli Scheinholtz said the company was considering litigation against the city over the new pay rules.
"The ones that bring you pizza in the snow, and that Thai food you like in the rain," said Mayor Adams. "This new minimum pay rate will guarantee these workers, and their families, can earn a living. They should not be delivering food to your household, if they can't put food on the plate in their household."
Encryption

Hackers Can Steal Cryptographic Keys By Video-Recording Power LEDs 60 Feet Away (arstechnica.com) 26

An anonymous reader quotes a report from Ars Technica: Researchers have devised a novel attack that recovers the secret encryption keys stored in smart cards and smartphones by using cameras in iPhones or commercial surveillance systems to video record power LEDs that show when the card reader or smartphone is turned on. The attacks enable a new way to exploit two previously disclosed side channels, a class of attack that measures physical effects that leak from a device as it performs a cryptographic operation. By carefully monitoring characteristics such as power consumption, sound, electromagnetic emissions, or the amount of time it takes for an operation to occur, attackers can assemble enough information to recover secret keys that underpin the security and confidentiality of a cryptographic algorithm. [...]

On Tuesday, academic researchers unveiled new research demonstrating attacks that provide a novel way to exploit these types of side channels. The first attack uses an Internet-connected surveillance camera to take a high-speed video of the power LED on a smart card reader -- or of an attached peripheral device -- during cryptographic operations. This technique allowed the researchers to pull a 256-bit ECDSA key off the same government-approved smart card used in Minerva. The other allowed the researchers to recover the private SIKE key of a Samsung Galaxy S8 phone by training the camera of an iPhone 13 on the power LED of a USB speaker connected to the handset, in a similar way to how Hertzbleed pulled SIKE keys off Intel and AMD CPUs. Power LEDs are designed to indicate when a device is turned on. They typically cast a blue or violet light that varies in brightness and color depending on the power consumption of the device they are connected to.

There are limitations to both attacks that make them unfeasible in many (but not all) real-world scenarios (more on that later). Despite this, the published research is groundbreaking because it provides an entirely new way to facilitate side-channel attacks. Not only that, but the new method removes the biggest barrier holding back previously existing methods from exploiting side channels: the need to have instruments such as an oscilloscope, electric probes, or other objects touching or being in proximity to the device being attacked. In Minerva's case, the device hosting the smart card reader had to be compromised for researchers to collect precise-enough measurements. Hertzbleed, by contrast, didn't rely on a compromised device but instead took 18 days of constant interaction with the vulnerable device to recover the private SIKE key. To attack many other side channels, such as the one in the World War II encrypted teletype terminal, attackers must have specialized and often expensive instruments attached or near the targeted device. The video-based attacks presented on Tuesday reduce or completely eliminate such requirements. All that's required to steal the private key stored on the smart card is an Internet-connected surveillance camera that can be as far as 62 feet away from the targeted reader. The side-channel attack on the Samsung Galaxy handset can be performed by an iPhone 13 camera that's already present in the same room.
Videos here and here show the video-capture process of a smart card reader and a Samsung Galaxy phone, respectively, as they perform cryptographic operations. "To the naked eye, the captured video looks unremarkable," adds Ars.

"But by analyzing the video frames for different RGB values in the green channel, an attacker can identify the start and finish of a cryptographic operation."
Government

Microsoft Is Bringing OpenAI's GPT-4 AI Model To US Government Agencies (bloomberg.com) 8

Microsoft will make it possible for users of its Azure Government cloud computing service, which include a variety of US agencies, to access artificial intelligence models from ChatGPT creator OpenAI. From a report: Microsoft, which is the largest investor in OpenAI and uses its technology to power its Bing chatbot, plans to announce Wednesday that Azure Government customers can now use two of OpenAI's large language models: The startup's latest and most powerful model, GPT-4, and an earlier one, GPT-3, via Microsoft's Azure OpenAI service.

The Redmond, Washington-based company plans Wednesday to release a blog post, viewed by Bloomberg, about the program, although its doesn't name specific US agencies expected to use the large language models at launch. The Defense Department, the Energy Department and NASA are among the federal government customers of Azure Government. The Defense Technical Information Center -- a part of the Defense Department that focuses on gathering and sharing military research -- will be experimenting with the OpenAI models through Microsoft's new offering, a DTIC official confirmed.

Privacy

US Intelligence Confirms It Buys Americans' Personal Data (techcrunch.com) 90

A newly declassified government report confirms for the first time that U.S. intelligence and spy agencies purchase vast amounts of commercially available information on Americans, including data from connected vehicles, web browsing data, and smartphones. From a report: By the U.S. government's own admission, the data it purchases "clearly provides intelligence value," but also "raises significant issues related to privacy and civil liberties." The Office of the Director of National Intelligence (ODNI) declassified and released the January 2022-dated report on Friday, following a request by Sen. Ron Wyden (D-OR) to disclose how the intelligence community uses commercially available data. This kind of data is generated from internet-connected devices and made available by data brokers for purchase, such as phone apps and vehicles that collect granular location data and web browsing data that tracks users as they browse the internet.

The declassified report is the U.S. government's first public disclosure revealing the risks associated with commercially available data of Americans that can be readily purchased by anyone, including adversaries and hostile nations. The United States does not have a privacy or data protection law governing the sharing or selling of Americans' private information. "In a way that far fewer Americans seem to understand, and even fewer of them can avoid, [commercially available information] includes information on nearly everyone that is of a type and level of sensitivity that historically could have been obtained" by other intelligence gathering capabilities, such as search warrants, wiretaps and surveillance, the report says.

Patents

US Patent Office Proposes Rule To Make It Much Harder To Kill Bad Patents (techdirt.com) 110

An anonymous reader quotes a report from Techdirt: So, this is bad. Over the last few years, we've written plenty about the so-called "inter partes review" or "IPR" that came into being about a decade ago as part of the "America Invents Act," which was the first major change to the patent system in decades. For much of the first decade of the 2000s, patent trolls were running wild and creating a massive tax on innovation. There were so many stories of people (mostly lawyers) getting vague and broad patents that they never had any intention of commercializing, then waiting for someone to come along and build something actually useful and innovative... and then shaking them down with the threat of patent litigation. The IPR process, while not perfect, was at least an important tool in pushing back on some of the worst of the worst patents. In its most basic form, the IPR process allows nearly anyone to challenge a bad patent and have the special Patent Trial and Appeal Board (PTAB) review the patent to determine if it should have been granted in the first place. Given that a bad patent can completely stifle innovation for decades this seems like the very least that the Patent Office should offer to try to get rid of innovation-killing bad patents.

However, patent trolls absolutely loathe the IPR process for fairly obvious reasons. It kills their terrible patents. The entire IPR process has been challenged over and over again and (thankfully) the Supreme Court said that it's perfectly fine for the Patent Office to review granted patents to see if they made a mistake. But, of course, that never stops the patent trolls. They've complained to Congress. And, now, it seems that the Patent Office itself is trying to help them out. Recently, the USPTO announced a possible change to the IPR process that would basically lead to limiting who can actually challenge bad patents, and which patents could be challenged.

The wording of the proposed changes seems to be written in a manner to be as confusing as possible. But there are a few different elements to the proposal. One part would limit who can bring challenges to patents under the IPR system, utilizing the power of the director to do a "discretionary denial." For example, it would say that "certain for-profit entities" are not allowed to bring challenges. Why? That's not clear. [...] But the more worrisome change is this one: "Recognizing the important role the USPTO plays in encouraging and protecting innovation by individual inventors, startups, and under-resourced innovators who are working to bring their ideas to market, the Office is considering limiting the impact of AIA post-grant proceedings on such entities by denying institution when certain conditions are met." Basically, if a patent holder is designated as an "individual inventor, startup" or "under-resourced innovator" then their patents are protected from the IPR process. But, as anyone studying this space well knows, patent trolls often present themselves as all three of those things (even though it's quite frequently not at all true). [...] And, again, none of this should matter. A bad patent is a bad patent. Why should the USPTO create different rules that protect bad patents? If the patent is legit, it will survive the IPR process.
The Electronic Frontier Foundation issued a response to the proposed changes: "The U.S. Patent Office has proposed new rules about who can challenge wrongly granted patents. If the rules become official, they will offer new protections to patent trolls. Challenging patents will become far more onerous, and impossible for some. The new rules could stop organizations like EFF, which used this process to fight the Personal Audio 'podcasting patent,' from filing patent challenges altogether."

The digital rights group added: "If these rules were in force, it's not clear that EFF would have been able to protect the podcasting community by fighting, and ultimately winning, a patent challenge against Personal Audio LLC. Personal Audio claimed to be an inventor-owned company that was ready to charge patent royalties against podcasters large and small. EFF crowd-funded a patent challenge and took out the Personal Audio patent after a 5-year legal battle (that included a full IPR process and multiple appeals)."
Television

TV Torrent Group CAKES Quits the Scene and Shuts Down 18

Piracy release group CAKES has shut down, dealing yet another hit for the piracy ecosystem. TorrentFreak reports: For several decades, The Scene has been the main source of all pirated content made available on the Internet. Technically, release groups operate in a closed ecosystem, but the reality is different. The vast majority of the files published on private Scene servers eventually find their way to public pirate sites. The secretive nature of The Scene has been a major challenge for law enforcement but in the summer of 2020, the US Department of Justice made a major breakthrough. Following a thorough investigation, three members of the illustrious SPARKS group were indicted. The raids and the criminal investigation sent shockwaves around The Scene. Some groups stopped releasing entirely and others significantly slowed down their output, which was felt in many parts of the public piracy ecosystem too.

Amid this turmoil, a new TV release group going by the name of CAKES emerged. The group published its first release "The 100 S07E16" on October 1, 2020, and many more would follow. During the next few years, CAKES built its reputation as a steady release group, one that eventually covered 7,000 titles. That's an impressive average of more than 50 new releases per week. Aside from the massive output, CAKES was also known for including four lines from Drake's track "Pound Cake" in its release notes. These same lines are also at the start of its farewell message.

The message explains that when CAKES started out, the team made an internal promise to pull the plug when "the love" is gone. Without going into further details, that time has apparently arrived. While some people may be disappointed with this decision, CAKES has clearly made up its mind. The group prefers to highlight the achievements and experiences instead, referring to the past few years as a "crazy journey." "If you had told us how the last few years would go, we wouldn't have believed you. The skills learnt, the massive lows, the euphoric highs, it couldn't have happened with a better group of people." "I couldn't be prouder of our team, not just for what was achieved but knowing the right moment to call time. As sad as this is, goodbye from team CAKES," the group adds.
GLHF, another piracy group, is mentioned in the farewell message. While no official shut down has been announced, TorrentFreak notes that "GLHF stopped releasing new titles over a week ago, which is highly atypical."
Privacy

UK Communications Regulator Ofcom Says Hackers Stole Confidential Data (bloomberg.com) 5

The hackers responsible for the MOVEit cyberattack downloaded confidential information from UK communications regulator Ofcom about companies it regulates, as well as its own employees -- adding to a string of victims which includes IAG SA's British Airways and the British Broadcasting Corporation. From a report: "A limited amount of information about certain companies we regulate -- some of it confidential -- along with personal data of 412 Ofcom employees, was downloaded during the attack," an Ofcom spokesman said by email. "We took immediate action to prevent further use of the MOVEit service and to implement the recommended security measures. We also swiftly alerted all affected Ofcom-regulated companies, and we continue to offer support and assistance to our colleagues."
Privacy

Edge Sends Images You View Online To Microsoft 39

An anonymous reader shares a report: Not so long ago, Microsoft Edge ended up in hot waters after users discovered a bug leaking your browser history to Bing. Now you may want to toggle off another feature to ensure Edge is not sending every picture you view online to Microsoft. Edge has a built-in image enhancement tool that, according to Microsoft, can use "super-resolution to improve clarity, sharpness, lighting, and contrast in images on the web." Although the feature sounds exciting, recent Microsoft Edge Canary updates have provided more information on how image enhancement works. The browser now warns that it sends image links to Microsoft instead of performing on-device enhancements.
Government

Does the US Government Want You to Believe in UFOs? (msn.com) 293

A New York Times columnist considers alternate reasons for the upcoming House hearings with a whistleblower former intelligence official, David Grusch, who claims the US government possesses "intact and partially intact" alien vehicles: This whistle-blower's mere existence is evidence of a fascinating shift in public U.F.O. discourse. There may not be alien spacecraft, but there is clearly now a faction within the national security complex that wants Americans to think there might be alien spacecraft, to give these stories credence rather than dismissal.

The evidence for this shift includes the military's newfound willingness to disclose weird atmospheric encounters. It includes the establishment of the task force that Grusch was assigned to... It also includes other examples of credentialed figures, like the Stanford pathology professor Garry Nolan, who claim they're being handed evidence of extraterrestrial contact. And it includes the range of strange stories being fed to writers willing to operate in the weird-science zone...

I have no definite theory of why this push is happening. Maybe it's because there really is something Out There and we're being prepared for the big reveal... [M]aybe it's a cynical effort to use unexplained phenomena as an excuse to goose military funding. Or maybe it's a psy-op to discredit critics of the national security state...

Slashdot Top Deals