×
The Courts

Chess' $100 Million Showdown: Carlsen Moves To Dismiss Niemann Lawsuit Over Cheating Allegations (forbes.com) 88

An anonymous reader quotes a report from Forbes: Lawyers representing Norwegian World Chess Champion Magnus Carlsen and online chess platform Chess.com asked a federal judge Friday to toss a $100 million lawsuit filed by chess grandmaster Hans Niemann in October, which marked a dramatic escalation of tensions over cheating allegations levied against the 19-year-old American. The motion to dismiss argued the teenager spent years "trying to curate a reputation as the bad boy of chess" and "now wants to cash in by blaming others" after the allegations derailed his chess career.

Niemann acknowledged he cheated during a handful of matches as a young teen but an October report from Chess.com determined he "likely cheated" more than 100 times in online chess matches, after Carlsen released a statement in September saying Niemann "has cheated more -- and more recently -- than he has publicly admitted." Niemann stated in his defamation lawsuit the claims are a conspiracy from the chess community's establishment to smear him after he defeated Carlsen -- the five-time defending world champion -- during a tournament in St. Louis on September 4. The teen claimed the alleged conspiracy was an attempt to save Carlsen, 32, from reputational damage after Chess.com agreed to purchase his "Play Magnus" app for $83 million in August.

Friday's motion stated all of Niemann's claims are without merit, arguing he has not disproved the cheating allegations or offered evidence to back up his conspiracy assertion. The lawsuit, filed in the Eastern District of Missouri, also named Chess.com executive Daniel Rensch and a website streaming partner, Hikaru Nakamura, as defendants. "Niemann now seeks to shift blame to reigning World Chess Champion Magnus Carlsen and others, claiming a wholly implausible conspiracy to defame and boycott Niemann that somehow damaged his already dubious reputation to the tune of $100 million," the motion to dismiss states.

Australia

Australia Says Law Making Facebook and Google Pay For News Has Worked (reuters.com) 13

An anonymous reader quotes a report from Reuters: An Australian law giving the government power to make internet giants Facebook owner Meta and Alphabet's Google negotiate content supply deals with media outlets has largely worked, a government report said. But the law, which took effect in March 2021 after talks with the big tech firms led to a brief shutdown of Facebook news feeds in the country, may need to be extended to other online platforms, the review said.

Since the News Media Bargaining Code (PDF) took effect, the tech firms had inked more than 30 deals with media outlets compensating them for content which generated clicks and advertising dollars, said the Treasury department report, published late Thursday. "At least some of these agreements have enabled news businesses to, in particular, employ additional journalists and make other valuable investments to assist their operations," said the report. "While views on the success or otherwise of the Code will invariably differ, we consider it is reasonable to conclude that the Code has been a success to date."

The report mostly recommended that the government consider new methods of assessing the administration and effectiveness of the law, and did not suggest changing the law itself. But it did note the law lacked "a formal mechanism to extend the Code to other platforms", and suggested the government order the competition regulator, which led the design of the law, to "prepare reports on this question."
Google director of government affairs and public policy in Australia Lucinda Longcroft said the company had "furthered our significant contribution to the Australian news industry" by signing deals representing 200 mastheads across the country and "the majority of these outlets are regional or local."
Security

FBI, CISA Say Cuba Ransomware Gang Extorted $60 Million From Victims This Year (techcrunch.com) 12

An anonymous reader quotes a report from TechCrunch: The Cuba ransomware gang extorted more than $60 million in ransom payments from victims between December 2021 and August 2022, a joint advisory from CISA and the FBI has warned. The latest advisory is a follow-up to a flash alert (PDF) released by the FBI in December 2021, which revealed that the gang had earned close to $44 million in ransom payments after attacks on more than 49 entities in five critical infrastructure sectors in the United States. Since, the Cuba ransomware gang has brought in an additional $60 million from attacks against 100 organizations globally, almost half of the $145 million it demanded in ransom payments from these victims. "Since the release of the December 2021 FBI Flash, the number of U.S. entities compromised by Cuba ransomware has doubled, with ransoms demanded and paid on the increase," the two federal agencies said on Thursday.

Cuba ransomware actors, which have been active since 2019, continue to target U.S. entities in critical infrastructure, including financial services, government facilities, healthcare and public health, critical manufacturing and information technology. [...] FBI and CISA added that the ransomware gang has modified its tactics, techniques and procedures since the start of the year and has been linked to the RomCom malware, a custom remote access trojan for command and control, and the Industrial Spy ransomware. The advisory notes that the group -- which cybersecurity company Profero previously linked to Russian-speaking hackers -- typically extorts victims by threatening to leak stolen data. While this data was typically leaked on Cuba's dark web leak site, it began selling stolen data on Industrial Spy's online market in May this year. CISA and the FBI are urging at-risk organizations to prioritize patching known exploited vulnerabilities, to train employees to spot and report phishing attacks and to enable and enforce phishing-resistant multi-factor authentication.

Security

Florida State Tax Website Bug Exposed Filers' Data (techcrunch.com) 12

A security flaw on the Florida Department of Revenue website exposed at least hundreds of taxpayers' Social Security numbers and bank account numbers, a security researcher found. From a report: Kamran Mohsin said the security flaw -- now fixed -- allowed him, or anyone else who was logged in to the state's business tax registration website, to access, modify and delete the personal data of business owners whose information is on file with the state's tax authority by modifying the part of the web address that contains the taxpayers' application number. Mohsin said that application numbers are sequential, allowing anyone to enumerate taxpayers' information by incrementing the application number by a single digit. Mohsin said there were more than 713,000 applications in the system, which the department did not dispute when reached for comment.
Privacy

Hive Social Turns Off Servers After Researchers Warn Hackers Can Access All Data (arstechnica.com) 73

An anonymous reader quotes a report from Ars Technica: Hive Social, a social media platform that has seen meteoric growth since Elon Musk took over Twitter, abruptly shut down its service on Wednesday after a security advisory warned the site was riddled with vulnerabilities that exposed all data stored in user accounts. "The issues we reported allow any attacker to access all data, including private posts, private messages, shared media and even deleted direct messages," the advisory, published on Wednesday by Berlin-based security collective Zerforschung, claimed. "This also includes private email addresses and phone numbers entered during login." The post went on to say that after the researchers privately reported the vulnerabilities last Saturday, many of the flaws they reported remained unpatched. They headlined their post "Warning: do not use Hive Social." Hive Social responded by pulling down its entire service. "The Hive team has become aware of security issues that affect the stability of our application and the safety of our users," company officials wrote. "Fixing these issues will require temporarily turning off our servers for a couple of days while we fix this for a better and safer experience."

Technical details are being withheld to prevent the active exploitation of them by malicious hackers. According to Business Insider, Hive Social's user base has doubled in the last few weeks, going from about 1 million to 2 million as of last week. The site is only being staffed by two people, "neither of whom had much of a background in security," reports Ars.
Australia

Australia Will Now Fine Firms Up To $33.4 Million for Data Breaches (bleepingcomputer.com) 19

The Australian parliament has approved a bill to amend the country's privacy legislation, significantly increasing the maximum penalties to AU$50 million for companies and data controllers who suffered large-scale data breaches. From a report: The financial penalty introduced by the new bill is set to whichever is greater: AU$50 million, three times the value of any benefit obtained through the misuse of information, and 30% of a company's adjusted turnover in the relevant period.

Previously, the penalty for severe data exposures was AU$2.22 million, considered wholly inadequate to incentivize companies to improve their data security mechanisms. The new bill comes in response to a series of recent cyberattacks against Australian companies, including ransomware and network breaches, resulting in the exposure of highly sensitive data for millions of people in the country. "The Albanese Labor government has wasted no time in responding to recent major data breaches. We have announced, introduced, and delivered legislation in just over a month," reads the media announcement. "These new, larger penalties send a clear message to large companies that they must do better to protect the data they collect."

Portables (Apple)

Judge Approves Apple's Massive MacBook Keyboard Lawsuit Payout (mactrast.com) 21

A California federal judge has given preliminary approval to Apple's plan to pay $50 million to settle a long-running class-action lawsuit over the faulty MacBook butterfly keyboard. MacTrast reports: Law360 says the payment will include $13.6 million in attorney fees, up to $2 million in litigation costs, and $1.4 million in settlement administration costs, with the rest distributed to class members. The lawsuit covers customers in California, Florida, Illinois, Michigan, New Jersey, New York, and Washington, who complained that Apple knew of and concealed the fact that its 2015 and later MacBook, MacBook Air, and MacBook Pro machines were equipped with "butterfly" keyboards that were prone to failure, and that its repair program for the keyboard was insufficient, as the replacement keyboards could also fail. [...]

Apple initially agreed to the settlement in July 2022. Customers in the above-mentioned states are expected to receive maximum payouts of $395 to customers who replaced multiple keyboards, $125 to people who replaced one keyboard, and $50 to people who replaced keycaps. Mac owners who received butterfly keyboard replacements will begin receiving class notices later in December.

Privacy

Telegram Shares Users Data in Copyright Violation Lawsuit (techcrunch.com) 22

Telegram has disclosed names of administrators, their phone numbers and IP addresses of channels accused of copyright infringement in compliance with a court order in India in a remarkable illustration of the data the instant messaging platform stores on its users and can be made to disclose by authorities. From a report: The app operator was forced by a Delhi High Court order to shared the data after a teacher sued the firm for not doing enough to prevent unauthorised distribution of her course material on the platform. Neetu Singh, the plaintiff teacher, said a number of Telegram channels were re-selling her study materials without permission at discounted prices.

An Indian court earlier had ordered Telegram to adhere to the Indian law and disclose details about those operating such channels. Telegram unsuccessfully argued that disclosing user information would violate the privacy policy and the laws of Singapore, where it has located its physical servers for storing users data. In response, the Indian court said the copyright owners couldn't be left "completely remediless against the actual infringers" because Telegram has chosen to locate its servers outside the country. In an order last week, Justice Prathiba Singh said Telegram had complied with the earlier order and shared the data.

Piracy

Torrent Site User Who Transferred 120TB of Pirated Content Avoids Prison (torrentfreak.com) 45

A torrent site user accused of downloading and uploading at least 120TB of movies, TV shows, eBooks, music and software, has avoided an immediate prison term. The 28-year-old was arrested as part of a police operation against DanishBytes. A member of the same site was sentenced earlier this month after he uploaded Netflix content obtained using hacked credentials. TorrentFreak reports: Early November 2021, Denmark's Public Prosecutor for Special Economic and International Crime (SOIK) announced that six people had been arrested following criminal referrals by Rights Alliance. All were members and/or operators of ShareUniversity and DanishBytes. Prosecution of site operators is not uncommon but when it's deemed in the public interest, pirate site users can also face charges. Every case is unique so criteria differ, especially across national borders, but when evidence shows large volumes of infringement, successful prosecutions become more likely. That was the case when a former DanishBytes user was sentenced last week. According to Danish anti-piracy group Rights Alliance, the 28-year-old man was a regular site member and wasn't involved in running the site. That being said, evidence showed that for the period January 2021 to November 2021, he downloaded and/or uploaded no less than 3,000 copyrighted works, including movies, TV shows, music, books, audiobooks and comics.

Information released by the National Unit for Special Crimes (NSK), a Danish police unit focused on cybercrime, organized crime, and related financial crime, reveals that the user's traffic statistics interested prosecutors. "During the period, the man downloaded no less than 100 TB and uploaded no less than 20 TB of copyrighted material," NSK says. BitTorrent trackers operating a ratio model usually insist on a better ratio of downloads to uploads but DanishBytes' situation was out of the ordinary.

The site launched in January 2021 in the wake of other sites being shut down, so had to get going from a standing start with no users. Even when arrests were being made, the site still had a relatively small userbase, which can limit opportunities to upload more. That may have been a blessing in disguise. Faced with the evidence, the man decided to plead guilty and was sentenced last week at the Court in Vibourg. In common with similar prosecutions recently, he received a suspended conditional sentence of 60 days' probation, 80 hours of community service, and confiscation of his computer equipment. The case against the DanishBytes user began with a Rights Alliance investigation and a referral to the police. As part of his sentence, the man must pay the anti-piracy group DKK 5,000 (US$600) in compensation but Rights Alliance director Maria Fredenslund is focused on the deterrent effect of another successful prosecution.

Cloud

Anker's Eufy Cameras Caught Uploading Content To the Cloud Without User Consent (macrumors.com) 33

Anker's popular Eufy-branded security cameras appear to be sending some data to the cloud, even when cloud storage is disabled and local only storage settings are turned on. MacRumors reports: The information comes from security consultant Paul Moore, who last week published a video outlining the issue. According to Moore, he purchased a Eufy Doorbell Dual, which was meant to be a device that stored video recording on device. He found that Eufy is uploading thumbnail images of faces and user information to its cloud service when cloud functionality is not enabled. Moore demonstrates the unauthorized cloud uploading by allowing his camera to capture his image and turning off the Eufy HomeBase. The website is still able to access the content through cloud integration, though he had not signed up for cloud service, and it remains accessible even when the footage is removed from the Eufy app. It's important to note that Eufy does not appear to be automatically uploading full streaming video to the cloud, but rather taking captures of the video as thumbnails.

The thumbnails are used in the Eufy app to activate streaming video from the Eufy base station, allowing Eufy users to watch their videos when away from home, as well as for sending rich notifications. The problem is the thumbnails are uploaded to the cloud automatically even when the cloud functionality is not active, and Eufy also seems to be using facial recognition on the uploads. Some users have taken issue with the unauthorized cloud uploads because Eufy advertises local-only service and has been popular among those who want a more private camera solution. "No Clouds or Costs," reads the Eufy website. Moore suggests that Eufy is also able to link facial recognition data collected from two separate cameras and two separate apps to users, all without camera owners being aware.

Moore received a response from Eufy in which Eufy confirmed that it is uploading event lists and thumbnails to AWS, but said the data is not able to "leak to the public" because the URL is restricted, time limited, and requires account login. There is also another issue that Moore has highlighted, suggesting Eufy camera streams can be watched live using an app like VLC, but little information on the exploit is available at this time. Moore said that unencrypted Eufy camera content can be accessed without authentication, which is alarming for Eufy users.
There's a dedicated Reddit thread where other Eufy users are reporting the same thing happening.
The Courts

BlockFi Sues FTX's Bankman-Fried Over Shares In Robinhood (cointelegraph.com) 42

Newly-bankrupt crypto lending platform BlockFi has filed a lawsuit against Sam Bankman-Fried's holding company Emergent Fidelity Technologies seeking his shares in Robinhood that were pledged as collateral earlier in November. CoinTelegraph reports: The suit was filed on Nov. 28 in the United States Bankruptcy Court for the District of New Jersey just hours after BlockFi filed for Chapter 11 bankruptcy in the same court. As per the filing, BlockFi is demanding Emergent turnover collateral as part of a Nov. 9 pledge agreement that saw Emergent agree to a payment schedule with BlockFi that it has allegedly failed to pay.

BlockFi names the collateral as "including certain shares of common stock." In May, Bankman-Fried acquired a 7.6% stake in the online brokerage firm Robinhood, buying a total of $648 million in Robinhood shares through his Emergent investment company.

United Kingdom

UK Ditches Ban On 'Legal But Harmful' Online Content In Favor of Free Speech 80

Britain will not force tech giants to remove content that is "legal but harmful" from their platforms after campaigners and lawmakers raised concerns that the move could curtail free speech, the government said on Monday. Reuters reports: Online safety laws would instead focus on the protection of children and on ensuring companies removed content that was illegal or prohibited in their terms of service, it said, adding that it would not specify what legal content should be censored. Platform owners, such as Facebook-owner Meta and Twitter, would be banned from removing or restricting user-generated content, or suspending or banning users, where there is no breach of their terms of service or the law, it said.

The government had previously said social media companies could be fined up to 10% of turnover or 18 million pounds ($22 million) if they failed to stamp out harmful content such as abuse even if it fell below the criminal threshold, while senior managers could also face criminal action. The proposed legislation, which had already been beset by delays and rows before the latest version, would remove state influence on how private companies managed legal speech, the government said. It would also avoid the risk of platforms taking down legitimate posts to avoid sanctions. [...]

The revised Online Safety Bill, which returns to parliament next month, puts the onus on tech companies to take down material in breach of their own terms of service and to enforce their user age limits to stop children circumventing authentication methods, the government said. If users were likely to encounter controversial content such as the glorification of eating disorders, racism, anti-Semitism or misogyny not meeting the criminal threshold, the platform would have to offer tools to help adult users avoid it, it said. Only if platforms failed to uphold their own rules or remove criminal content could a fine of up to 10% of annual turnover apply. Britain said late on Saturday that a new criminal offense of assisting or encouraging self-harm online would be included in the bill.
Bitcoin

Major Canadian Crypto Exchange Coinsquare Says Client Data Breached (coindesk.com) 19

Coinsquare, one of Canada's largest cryptocurrency exchanges, may have been breached, but the company claims customer assets are "secure in cold storage and are not at risk." CoinDesk reports: The exchange, which touts itself as "Canada's trusted platform to securely buy, sell and trade Bitcoin, Ethereum, and more," emailed customers Friday to report a "data incident" in which an unauthorized third party accessed a customer database containing personal information. According to the email, the breach exposed "customer names, email addresses, residential addresses, phone numbers, dates of birth, device IDs, public wallet addresses, transaction history, and account balances." Although the email was sent Friday, Coinsquare discovered the breach last week and notified customers via Twitter. "No passwords were exposed. We have no evidence any of this information was viewed by the bad actor," the email stated.

Coinsquare suspended activities on its platform after detecting the vulnerability last week, triggering speculation of possible liquidity issues, given the momentous implosion of multi-billion-dollar crypto exchange, FTX, earlier this month. Full service was restored on Friday, according to a tweet. "We want to reiterate that 100% of client funds are safely held in cold storage and are not used for business activities," the company tweeted.

Facebook

Meta Fined $277 Million for Leak of Half a Billion Users (bloomberg.com) 22

Meta Platforms was slapped with a $277 million fine for failing to prevent the leak of the personal data of more than half a billion users of its Facebook service. From a report: The Irish Data Protection Commission, the main privacy watchdog for Meta in the European Union, levied the fine following a probe that found the social-media company had failed to apply strict safeguards required under the bloc's sweeping General Data Protection Regulation.

On top of the fine -- the third-biggest under GDPR -- the watchdog ordered Meta's Irish unit to make sure its processing complies with the law, according to an emailed statement on Monday. The Irish authority is the lead watchdog for some of Silicon Valley's biggest tech firms that have set up an EU base in the country, including Meta. It opened its probe following revelations that "a collated dataset of Facebook personal data" had been published on the internet. Personal information on 533 million Facebook users worldwide reemerged on a hacker website last year, including their phone numbers and email addresses.

United States

US Goverment Investigating Real-Estate Tech Company Accused of Helping Landlords Collude (propublica.org) 132

The anti-trust division of America's Department of Justice "has reportedly opened up an investigation into RealPage, the real estate technology company accused of contributing to higher-than-normal rent prices," reports the Verge.

ProPublica writes that the investigation explores "whether rent-setting software made by a Texas-based real estate tech company is facilitating collusion among landlords, according to a source with knowledge of the matter." *The inquiry is being launched as questions have arisen about a 2017 merger between RealPage and its largest pricing competitor.... Congressional leaders have pushed for an investigation into RealPage in three letters to the DOJ and the Federal Trade Commission, which were sent after a ProPublica report on the software's use in mid-October.

The letters raised concerns that RealPage's pricing software could be pushing rents above competitive levels and allowing big landlords to coordinate their pricing in violation of federal antitrust laws. "We are concerned that the use of this rate setting software essentially amounts to a cartel to artificially inflate rental rates in multifamily residential buildings," three senators said in a letter in early November. They included Sen. Amy Klobuchar, the Minnesota Democrat who chairs the Senate Subcommittee on Competition Policy, Antitrust and Consumer Rights....

In addition to the letters from congressional lawmakers, renters have filed three lawsuits in federal court in Seattle and San Diego since mid-October, alleging RealPage and a slew of large landlords are engaging in anticompetitive behavior through the company's software.

They note Capital Forum's report with additional details — but the Verge nicely summarizes the issue: ProPublica's report states that the algorithm's design has "raised questions among real estate and legal experts about whether RealPage has birthed a new kind of cartel that allows the nation's largest landlords to indirectly coordinate pricing, potentially in violation of federal law." These experts have also raised concerns with the RealPage user group, an online forum that lets apartment managers who use the service communicate — and potentially coordinate — with one another.
Privacy

Small Study Finds Computer Repair Shops Accessed Personal Data - And Sometimes Even Copied It (arstechnica.com) 128

Ars Technica reports on what happened when researchers at the University of Guelph in Ontario, Canada, left laptops overnight at 12 computer repair shops — and then recovered logs after receiving their repairs: The logs showed that technicians from six of the locations had accessed personal data and that two of those shops also copied data onto a personal device....

The amount of snooping may actually have been higher than recorded in the study, which was conducted from October to December 2021. In all, the researchers took the laptops to 16 shops in the greater Ontario region. Logs on devices from two of those visits weren't recoverable. Two of the repairs were performed on the spot and in the customer's presence, so the technician had no opportunity to surreptitiously view personal data. In three cases, Windows Quick Access or Recently Accessed Files had been deleted in what the researchers suspect was an attempt by the snooping technician to cover their tracks....

The vast majority of repair shops provide no privacy policy and those that do have no means of enforcing them. Even worse, repair technicians required a customer to surrender their login password even when it wasn't necessary for the repair needed. These findings came from a separate part of the study, in which the researchers brought an Asus UX330U laptop into 11 shops for a battery replacement. This repair doesn't require a technician to log in to the machine, since the removal of the back of the device and access to the device BIOS (for checking battery health) is all that's needed. Despite this, all but one of the repair service providers asked for the credentials to the device OS anyway.

When the customer asked if they could get the repair without providing the password, three refused to take the device without it, four agreed to take it but warned they wouldn't be able to verify their work or be responsible for it, one asked the customer to remove the password, and one said they would reset the device if it was required.

China

Protests Erupting Across China (cnn.com) 172

"Protesters clash with police as unrest rocks cities across China," reads CNN's headline. The Guardian calls it "the biggest wave of civil disobedience on the mainland since Xi Jinping assumed power a decade ago," noting one crowd numbered over 1,000 protesters. "Crowdsourced lists on social media claim protests have been documented at as many as 50 Chinese universities over the weekend."

Looking back over the last 10 years, CNN's correspondent in China calls it "an unprecedented level of public dissent". During lockdowns people struggled to get emergency care, food, and necessities, but CNN's correspondent warns now "what we're seeing is this tipping point across the country, after years of suffering and deaths." "What we're seeing is people past their breaking point — it's years of pent-up anger. This is three years of draconian lockdowns that have cost people's lives, their livelihoods — but the trigger for this wave of protests was a deadly fire at Xinjiang that killed at least 10 people. Videos of the scene indicated that Covid restrictions prevented victims from getting help.

"But these protesters — not just angry about Covid lockdowns. They're also targetting their anger towards the supreme leader himself."

[CNN shows what they call "extraordinary" footage of people in Shanghai calling on Jinping to step down.]

"Over and over again. Those chants go on for quite some time. They're also calling for the Communist party to step down. I can't overstate just how shocking it is to hear this, this crowd in Shanghai — China's wealthiest and most cosmopolitan city. And that chanting happening in a central, upscale part of the city, to be directly calling out for Xi Jinping to resign — I mean, this is virtually unheard of. In China it is extremely dangerous to publicly criticize the party, especially Xi himself. You risk prison time, or even worse.

"Some protesters also chanted they don't want dictatorship, they want freedom and democracy. Witnesses told CNN as well that rows of police officers were making arrests, forcefully pushing protesters into police cars — but the next day on Sunday, hundreds of Shanghai residents returned, to continue protesting, despite heavy police presence and roadblocks. Videos also showed some protesters violently dragged away, and now that area has been mostly cordoned off.

New videos now "showed hundreds of people at an intersection shouting 'Release the people!' in a demand for the police to free detained demonstrators," reports CNN, in an article shared by Slashdot reader LionKimbro: By Sunday evening, mass demonstrations had spread to Beijing, Chengdu, Guangzhou and Wuhan, where thousands of residents called for not only an end to Covid restrictions, but more remarkably, political freedoms. In Beijing, hundreds of mostly young people demonstrated in the commercial heart of the city well into the small hours of Monday.... People chanted slogans against zero-Covid, voiced support for the detained protesters in Shanghai, and called for greater civil liberties. "We want freedom! We want freedom!" the crowd chanted under an overpass. Speaking to CNN's Selina Wang at the protest, a demonstrator said he was shocked by the turnout....

In the southwestern metropolis of Chengdu, large crowds demonstrated along the bustling river banks in a popular food and shopping district, according to a protester interviewed by CNN and videos circulating online.... "Opposition to dictatorship!" the crowd chanted. "We don't want lifelong rulers. We don't want emperors!" they shouted in a thinly veiled reference to Xi, who last month began a norm-shattering third term in office.

In the southern city of Guangzhou, hundreds gathered on a public square in Haizhu district — the epicenter of the city's ongoing Covid outbreak that has been locked down for weeks. "We don't want lockdowns, we want freedom! Freedom of expression, freedom of the press, freedom of arts, freedom of movement, personal freedoms. Give me back my freedom!" The crowd shouted.

Across China, protests have also broken out on university campuses — which are particularly politically sensitive to the Communist Party, given the history of the student-led Tiananmen Square protests in 1989....

In one video, a university official could be heard warning the students: "You will pay for what you did today."

"You too, and so will the country," a student shouted in reply.

The campus protests continued on Sunday, CNN reports, with a crowd of hundreds of students at Tsinghua University, another top university in Beijing.

"Videos and images circulating on social media show students holding up sheets of white paper and shouting: 'Democracy and rule of law! Freedom of expression!'"
EU

'How Washington Chased Huawei Out of Europe' (politico.eu) 102

Huawei "is giving up on Europe," writes Politico, saying the Chinese telecommunications company is "retrenching its European operations and putting its ambitions for global leadership on ice."

"The reasons for doing this have little to do with the company's commercial potential — Huawei is still able to offer cutting-edge technology at lower costs than its competitors — and everything to do with politics, according to interviews with more than 20 current and former staff and strategic advisers to the company." Pressed by the United States and increasingly shunned on a Continent it once considered its most strategic overseas market, Huawei is pivoting back toward the Chinese market, focusing its remaining European attention on the few countries — Germany and Spain, but also Hungary — still willing to play host to a company widely viewed in the West as a security risk.

"It's no longer a company floating on globalization," said one Huawei official. "It's a company saving its ass on the domestic market...."

Huawei's predicament was summed up by the company's founder Ren Zhengfei in a speech to executives at the company's Shenzhen headquarters in July. He laid out the trifecta of challenges the company has faced over the last three years: hostility from Washington; disruptions from the coronavirus pandemic; and Russia's invasion of Ukraine, which upended global supply chains and heightened European concerns about over-dependence on countries like China. "The environment we faced in 2019 was different from the one we face today," Ren said in his speech, which wasn't made public but was seen by POLITICO. "Don't assume that we will have a brighter future."

"We previously had an ideal for globalization striving to serve all humanity," he added. "What is our ideal today? Survival....!"

The company is also retrenching elsewhere, according to Ren. "We will give up markets in some countries," the firm's founder said in his speech this summer. "For example, we will give up markets in the Five Eyes countries and India." The "Five Eyes" refers to an intelligence-sharing arrangement between the U.S., U.K., Canada, Australia and New Zealand. All five countries have banned or are in the process of banning Huawei and other Chinese companies from their critical infrastructure because of security concerns.

Thanks to Slashdot reader fbobraga for submitting the article.
Facebook

Meta Claims US Military Linked to Online Propaganda Campaign (bbc.com) 74

From the BBC: "Individuals associated with the U.S. military" are linked to an online propaganda campaign, Meta's latest adversarial-threat report says....

On Facebook, 39 accounts, 16 pages, and two groups were removed, as well as 26 accounts on Instagram, for violating the platforms' policy against "coordinated inauthentic behaviour". "This network originated in the United States," Meta wrote. It focused on countries including Afghanistan, Algeria, Iran, Iraq, Kazakhstan, Kyrgyzstan, Russia, Somalia, Syria, Tajikistan, Uzbekistan and Yemen — and mirrored tactics commonly used in propaganda campaigns against the West...

Some of those supporting the U.S. had posed as independent media outlets and some had tried to pass off content from legitimate outlets, such as BBC News Russian, as their own. The operation ran across many internet services, including Twitter, YouTube, Telegram, VKontakte and Odnoklassniki, according to Meta. "Although the people behind this operation attempted to conceal their identities and coordination, our investigation found links to individuals associated with the US military," its report says.

The article adds that experts believe the campaign "was largely ineffective."
China

The US Bans Huawei, ZTE Telecommunications Equipment Sales Over Chinese Spying Fears (cnn.com) 74

The U.S. government "has banned approvals of new telecommunications equipment from China's Huawei Technologies and ZTE," reports CNN, "because they pose 'an unacceptable risk' to US national security." The U.S. Federal Communications Commission said on Friday it had adopted the final rules, which also bar the sale or import of equipment made by China's surveillance equipment maker Dahua Technology, video surveillance firm Hangzhou Hikvision Digital Technology and telecoms firm Hytera Communications.

The move represents Washington's latest crackdown on the Chinese tech giants amid fears that Beijing could use Chinese tech companies to spy on Americans.

"These new rules are an important part of our ongoing actions to protect the American people from national security threats involving telecommunications," FCC Chairwoman Jessica Rosenworcel said in a statement.

Slashdot Top Deals