×
EU

EU Adopts Rules on One-Hour Takedowns for Terrorist Content (techcrunch.com) 52

The European Parliament approved a new law on terrorist content takedowns yesterday, paving the way for one-hour removals to become the legal standard across the EU. From a report: The regulation "addressing the dissemination of terrorist content online" will come into force shortly after publication in the EU's Official Journal -- and start applying 12 months after that. The incoming regime means providers serving users in the region must act on terrorist content removal notices from Member State authorities within one hour of receipt, or else provide an explanation why they have been unable to do so. There are exceptions for educational, research, artistic and journalistic work -- with lawmakers aiming to target terrorism propaganda being spread on online platforms like social media sites.

The types of content they want speedily removed under this regime includes material that incites, solicits or contributes to terrorist offences; provides instructions for such offences; or solicits people to participate in a terrorist group. Material posted online that provides guidance on how to make and use explosives, firearms or other weapons for terrorist purposes is also in scope. However concerns have been raised over the impact on online freedom of expression -- including if platforms use content filters to shrink their risk, given the tight turnaround times required for removals.

China

China Orders Companies To Step Up Monitoring of Foreigners In Anti-Spying Campaign (theguardian.com) 43

An anonymous reader quotes a report from The Guardian: Chinese social groups, enterprises and public entities will have increased responsibility to combat foreign espionage under new regulations issued by the country's ministry of state security. The regulations, which were released and took effect on Monday, come amid deepening hostilities between China and some western governments, including over the detention of foreigners accused of national security crimes. According to state media, state security will work with other government departments to "adjust" the list of groups susceptible to foreign espionage and to develop measures to safeguard against it, including Chinese Communist Party and state organs, social groups, enterprises and public institutions.

Once organizations are designated as having anti-espionage responsibility, state security will provide "guidance, supervision and inspection" of their efforts, including personnel vetting, and strict training, monitoring and debriefing for staff trips overseas. Identified organizations must report suspicions and incidents to authorities. It come amid increasing public campaigns to watch out for foreign spies, which state media has warned could be an "intimate lover" or "an online friend with the same interests."
According to Li Wei, an expert on national security and anti-terrorism at the China Institute of Contemporary International Relations, the new regulation "places emphasis on companies and institutions taking precautionary measures against foreign espionage." Li said key fields would include companies or institutions working in national defense, diplomacy, economy, finance and tech.
IT

Mighty's Plan To Reignite the Future of Desktop Computing (mightyapp.com) 219

New submitter oblom writes about Mighty, a new approach to web browsing: In short, server-side web navigation, with client-side rendering. Per Y Combinator founder Paul Graham: "Usually when people talk about grand things like changing "the future of computing," they're full of it. But not this time. Suhail [founder of Mighty] has been working on this for 2 years. There's a good chance it's the new default infrastructure. Suhail writes in a blog post: After 2 years of hard work, we've created something that's indistinguishable from a Google Chrome that runs at 4K, 60 frames a second, takes no more than 500 MB of RAM, and often less than 30% CPU with 50+ tabs open. This is the first step in making a new kind of computer. [...] When you switch to Mighty, it will feel like you went out and bought a new computer with a much faster processor and much more memory. But you don't have [to] buy a new computer. All you have to do is download a desktop app.

To make Mighty work, we had to solve a lot of complex engineering problems, including designing a custom server to keep costs low, building a custom low-latency networking protocol, forking Chromium to integrate directly with various low-level render/encoder pipelines, and making the software interoperate with a long list of macOS features. We are working hard at ramping up server capacity across the world as we roll it out to users. You might be thinking: "Yeah but what about the lag?" Lag would have been a real problem 5 years ago, but new advances since then have allowed us to eliminate nearly all of it: 5 Ghz WiFi bands, H.265 hardware-accelerated low-latency encoders, widespread 100 Mbps Internet, and cheaper, more powerful GPUs. We also designed a new low-latency network protocol, and we locate servers as close to users geographically as possible. As a result, a user with 100 Mbps internet will rarely notice lag while using Mighty. Watch this demo video and see for yourself.

Security

Ask Slashdot: How Harmful Are In-House Phishing Campaigns? 128

tiltowait writes: My organization has an acceptable use policy which forbids sending out spam. Every few months, however, the central IT office exempts itself from this rule by delivering deceptive e-mails to all employees as a test of their ability to ignore phishing scams. For those who simply delete the messages, they are a small annoyance, comparable to the overhead of having to regularly change passwords -- also done largely unnecessarily, perhaps even to the point of being another bad practice. As someone working in a departmental systems office, I can also attest that these campaigns generate a fair amount of workload from inquiries about their legitimacy. Aside from the "gotcha" angle, which perpetuates some ill will amongst staff, I can't help but think that these exercises are of questionable net value, especially with other countermeasures, such as MFA and Safelinks, already in place. Is it worth spreading misinformation to experiment on your colleagues in such a fashion?
Books

Popular Science Is Now a Fully Digital Magazine (popsci.com) 20

kackle writes: I just received an email telling me that "Popular Science" magazine is no more. That is, it is to be delivered to readers from now on only via ones and zeros. I can't say I had a subscription since its beginnings in 1872, but I did learn much from the rag and will sincerely miss it. "Today, we're unveiling our biggest change in my tenure: Popular Science is now a fully digital magazine," writes Editor-in-Chief Corinne Iozzio. In addition to "redesigned" and "reimagined stories" made especially for mobile devices, Iozzio notes that their various apps "include an archive of 15-plus years of back issues..."

"The mediums may change, but even after all these evolutions and iterations, our core belief remains as fixed and focused as it was in 1872: Embracing science and tech means living in the realm of possibility."
It's funny.  Laugh.

The Day People Named Josh Fought in Nebraska (wsj.com) 57

A viral internet joke becomes a real-life, good-natured 'battle' for a lot of people with the same first name. Behind the scenes of the 'JoshFight.' From a report: It began as a joke, Josh Swain emphasized. Spring, a year ago. As a pandemic surged, and millions idled at home, Swain, an engineering student at the University of Arizona, was very bored online. He noted that every time he tried to create a social media account, the name Josh Swain was already taken. An amused Swain logged onto Facebook, gathered every "Josh Swain" he could find into a group message, and offered a brash challenge, which was basically this: On April 24, 2021, everyone named Josh Swain should meet at these select coordinates -- 40.8223286, -96.79820002; it turned out to be farmland in Nebraska -- and duel for the right to be The One and Only Josh Swain. "We fight, whoever wins gets to keep the name, everyone else has to change their name, you have a year to prepare, good luck," Swain wrote.

Over time, Swain's terse, off-the-cuff, throw-down to all Josh Swains became a viral internet meme, leaping the curb from a bored joke into something quite real. The battle would broaden from Josh Swains to anyone named Josh, with Joshes from all over suggesting they, too, would come to Nebraska for a fight to be the The Only Josh. Terms of engagement were offered: they'd fight with foam pool noodles. Last Josh Standing wins. A public location was settled upon. (The original one turned out to be a private farm.) There was even a charitable angle: Supporters were asked to make contributions to the Nebraska Children's Hospital and Medical Center Foundation, and bring an item for the local food bank. On Friday, Joshua Swain, 22, got on a plane for Nebraska. And this past Saturday, on a grassy field in Lincoln, it actually happened. Josh vs. Josh vs. Josh vs. Josh vs. Josh, in the JoshFight of the Century. "It was insane," Swain said. "I can't describe it. It's so heartwarming, so incredible. It was a beautiful day."

United States

FCC Green-Lights SpaceX Satellite Plans (axios.com) 50

SpaceX scored a regulatory victory at the Federal Communications Commission Tuesday, overcoming opposition from Amazon and other satellite companies on a key change to its plans for a satellite network that will beam internet access across the globe. From a report: SpaceX needed FCC approval to move forward with its plan to provide internet access in hard-to-reach areas. SpaceX asked the FCC for permission to lower the orbit of its future Starlink satellites.
United States

Pentagon Explains Odd Transfer of 175 Million IP Addresses To Obscure Company (arstechnica.com) 48

An anonymous reader quotes a report from Ars Technica: The US Department of Defense puzzled Internet experts by apparently transferring control of tens of millions of dormant IP addresses to an obscure Florida company just before President Donald Trump left the White House, but the Pentagon has finally offered a partial explanation for why it happened. The Defense Department says it still owns the addresses but that it is using a third-party company in a "pilot" project to conduct security research. "Minutes before Trump left office, millions of the Pentagon's dormant IP addresses sprang to life" was the title of a Washington Post article on Saturday. Literally three minutes before Joe Biden became president, a company called Global Resource Systems LLC "discreetly announced to the world's computer networks a startling development: It now was managing a huge unused swath of the Internet that, for several decades, had been owned by the US military," the Post said.

The number of Pentagon-owned IP addresses announced by the company rose to 56 million by late January and 175 million by April, making it the world's largest announcer of IP addresses in the IPv4 global routing table. The Post said it got an answer from the Defense Department on Friday in the form of a statement from the director of "an elite Pentagon unit known as the Defense Digital Service." The Post wrote: "'Brett Goldstein, the DDS's director, said in a statement that his unit had authorized a 'pilot effort' publicizing the IP space owned by the Pentagon. 'This pilot will assess, evaluate, and prevent unauthorized use of DoD IP address space,' Goldstein said. 'Additionally, this pilot may identify potential vulnerabilities.' Goldstein described the project as one of the Defense Department's 'many efforts focused on continually improving our cyber posture and defense in response to advanced persistent threats. We are partnering throughout DoD to ensure potential vulnerabilities are mitigated.'"

Security

A Software Bug Let Malware Bypass macOS' Security Defenses (techcrunch.com) 28

Apple has spent years reinforcing macOS with new security features to make it tougher for malware to break in. But a newly discovered vulnerability broke through most of macOS' newer security protections with a double-click of a malicious app, a feat not meant to be allowed under Apple's watch. From a report: Worse, evidence shows a notorious family of Mac malware has already been exploiting this vulnerability for months before it was subsequently patched by Apple this week. Over the years, Macs have adapted to catch the most common types of malware by putting technical obstacles in their way. macOS flags potentially malicious apps masquerading as documents that have been downloaded from the internet. And if macOS hasn't reviewed the app -- a process Apple calls notarization -- or if it doesn't recognize its developer, the app won't be allowed to run without user intervention.

But security researcher Cedric Owens said the bug he found in mid-March bypasses those checks and allows a malicious app to run. Owens told TechCrunch that the bug allowed him to build a potentially malicious app to look like a harmless document, which when opened bypasses macOS' built-in defenses when opened. "All the user would need to do is double click -- and no macOS prompts or warnings are generated," he told TechCrunch. Owens built a proof-of-concept app disguised as a harmless document that exploits the bug to launch the Calculator app, a way of demonstrating that the bug works without dropping malware. But a malicious attacker could exploit this vulnerability to remotely access a user's sensitive data simply by tricking a victim into opening a spoofed document, he explained.

The Internet

Internet Outage in Canada Blamed on Beavers Gnawing Through Fiber Cables (gizmodo.com) 40

Beavers took down internet service for about 900 customers in a remote Canadian community this weekend after gnawing through crucial fiber cables, the Candian Broadcasting Corporation reported Sunday. From a report: The outage, which has since been resolved, also affected 60 cable TV customers and disrupted local cell phone service, according to a statement from the area's provider, Telus. Tumbler Ridge, a tiny municipality in northeastern British Columbia with a population of about 2,000 people, lost service for roughly 36 hours in what Telus described as a "uniquely Canadian disruption!"

"Beavers have chewed through our fibre cable at multiple points, causing extensive damage," said Telus spokesperson Liz Sauve in an email to Gizmodo. "Our team located a nearby dam, and it appears the beavers dug underground alongside the creek to reach our cable, which is buried about three feet underground and protected by a 4.5-inch thick conduit. The beavers first chewed through the conduit before chewing through the cable in multiple locations." After going down early Saturday morning, service was restored just before 6:30 p.m. ET on Sunday, Sauve confirmed. In its statement, the company said crews worked "around the clock" to address the issue and determine how far the damage continued up the cable line. Telus brought in additional equipment and technicians to tackle "challenging conditions" due to the fact that the ground above the cable is partially frozen this time of year.

United States

Apple To Establish North Carolina Campus, Increase US Spending Targets (reuters.com) 19

Apple on Monday said it will establish a new campus in North Carolina that will house up to 3,000 employees, expand its operations in several other U.S. states and increase its spending targets with U.S. supplierst. From a report: Apple said it plans to spend $1 billion as it builds a new campus and engineering hub in the Research Triangle area of North Carolina, with most of the jobs expected to focus on machine learning, artificial intelligence, software engineering and other technology fields. It joins a $1 billion Austin, Texas campus announced in 2019. The iPhone maker said it would also establish a $100 million fund to support schools in the Raleigh-Durham area of North Carolina and throughout the state, as well as contribute $110 million to help build infrastructure such as broadband internet, roads, bridges and public schools in 80 North Carolina counties.

Apple also said it expanded hiring targets at other U.S. locations to hit a goal 20,000 additional jobs by 2026, setting new goals for facilities in Colorado, Massachusetts and Washington state. In Apple's home state of California, the company said it will aim to hire 5,000 people in San Diego and 3,000 people in Culver City in the Los Angeles area. Apple also increased a U.S. spending target to $430 billion by 2026, up from a five-year goal of $350 billion Apple set in 2018, and said it was on track to exceed.

Facebook

How Mark Zuckerberg and Tim Cook Became Foes (nytimes.com) 118

The chief executives of Facebook and Apple have opposing visions for the future of the internet. Their differences are set to escalate later today. The New York Times: At a confab for tech and media moguls in Sun Valley, Idaho, in July 2019, Timothy D. Cook of Apple and Mark Zuckerberg of Facebook sat down to repair their fraying relationship. For years, the chief executives had met annually at the conference, which was held by the investment bank Allen & Company, to catch up. But this time, Facebook was grappling with a data privacy scandal. Mr. Zuckerberg had been blasted by lawmakers, regulators and executives -- including Mr. Cook -- for letting the information of more than 50 million Facebook users be harvested by a voter-profiling firm, Cambridge Analytica, without their consent. At the meeting, Mr. Zuckerberg asked Mr. Cook how he would handle the fallout from the controversy, people with knowledge of the conversation said. Mr. Cook responded acidly that Facebook should delete any information that it had collected about people outside of its core apps.

Mr. Zuckerberg was stunned, said the people, who were not authorized to speak publicly. Facebook depends on data about its users to target them with online ads and to make money. By urging Facebook to stop gathering that information, Mr. Cook was in effect telling Mr. Zuckerberg that his business was untenable. He ignored Mr. Cook's advice. Two years later, Mr. Zuckerberg and Mr. Cook's opposing positions have exploded into an all-out war. On Monday, Apple plans to release a new privacy feature that requires iPhone owners to explicitly choose whether to let apps like Facebook track them across other apps. One of the secrets of digital advertising is that companies like Facebook follow people's online habits as they click on other programs, like Spotify and Amazon, on smartphones. That data helps advertisers pinpoint users' interests and better target finely tuned ads. Now, many people are expected to say no to that tracking, delivering a blow to online advertising -- and Facebook's $70 billion business.

At the center of the fight are the two C.E.O.s. Their differences have long been evident. Mr. Cook, 60, is a polished executive who rose through Apple's ranks by constructing efficient supply chains. Mr. Zuckerberg, 36, is a Harvard dropout who built a social-media empire with an anything-goes stance toward free speech. Those contrasts have widened with their deeply divergent visions for the digital future. Mr. Cook wants people to pay a premium -- often to Apple -- for a safer, more private version of the internet. It is a strategy that keeps Apple firmly in control. But Mr. Zuckerberg champions an "open' internet where services like Facebook are effectively free. In that scenario, advertisers foot the bill. The relationship between the chief executives has become increasingly chilly, people familiar with the men said. While Mr. Zuckerberg once took walks and dined with Steve Jobs, Apple's late co-founder, he does not do so with Mr. Cook. Mr. Cook regularly met with Larry Page, Google's co-founder, but he and Mr. Zuckerberg see each other infrequently at events like the Allen & Company conference, these people said.

China

China Censors 'Nomadland' Director Chloe Zhao's Oscar Win (wsj.com) 76

"Nomadland" director Chloe Zhao made history on Sunday by becoming the first woman of color and first Chinese woman to win the Oscar for best director. Official media, major search engines and internet censors in her home country are making as if it didn't happen. From a report: Ms. Zhao's win, just the second time a woman has walked away with best director, unleashed a flurry of congratulatory messages on Chinese social-media sites when it was announced Monday morning Beijing time. By midafternoon, nearly all of the posts had been erased. Searches for her name on Baidu and Sogou, the country's dominant search engines, produced numerous links to news of her previous accolades but only scattered links to deleted articles about the Academy Award honor.

State broadcaster China Central Television, the official Xinhua News Agency, and Communist Party mouthpiece the People's Daily stayed silent on the award throughout the day. Two state media reporters told the Journal they had received orders from China's propaganda ministry not to report on her victory, despite what they described as her status as a Chinese national, because of "previous public opinion." China's Foreign Ministry declined to comment on the removal of social-media posts during a regular news conference on Monday, saying it wasn't a diplomatic issue.

Businesses

Is SpaceX's Starlink Becoming the World's Dominant ISP? (cringely.com) 162

Technology/space pundit Robert Cringely writes that SpaceX's winning bid on NASA's Artemis lunar lander contract was helped by its flexibility in how it would be paid — made possibly by SpaceX's cushy financial position.

But he believes that's part of a larger story about SpaceX's "steadily crushing its competitors by building a hyper-efficient space ecosystem where the other guys are just building rockets," arguing that SpaceX has already won the global war of ISPs "at a net cost of ZERO dollars," if not a negative net cost, while realizing a dream of a satellite internet service that for 30 years has eluded investors like Bill Gates:

SpaceX making a profit where one would not normally exist comes thanks to U.S. residents who pay telephone and Internet bills. The U.S. Federal Communications Commission (FCC) has been socking-away for a decade about $1.8 billion per year from you and me, saving-up to pay for expansions of rural telephony and broadband. There is now about $16 billion in this federal kitty and the FCC is starting to spend it with telephone and internet service providers, paying them to extend broadband and voice services to remote rural users who are presently underserved or unserved completely. All of this is both perfectly legal and even a good idea. Everybody wins. But circumstances are turning out to indicate that SpaceX is probably winning more than anyone else... So far SpaceX has won auctions for service in parts of 35 states for a total of $885 million... SpaceX just bid for potential customers in places where other companies typically didn't even bother to bid. They took the obvious remote customers and apparently won't be over-charging them or the government, either...

There is no FCC rule saying Comcast couldn't sub-contract...difficult customers to Starlink... Instead of earning $885 million of those FCC subsidies, Starlink is more likely to gain half of the full $9.2 billion — money that can be used for any purpose including financing that Artemis lander. But remember that satellites are a global resource. If SpaceX launches 4000 or 12,000 Starlink satellites to serve the USA, they'll also serve anywhere else the satellites overfly, even North Korea. The same level of service Starlink offers in Omaha will be available in Vietnam or on tankers in the Pacific ocean.

Once Starlink becomes effectively the dominant ISP in America, it will also become the dominant ISP in the world. And all at no cost to SpaceX since the expansion will have been financed from our phone bills.

Cringely cites estimates that 40,000 satellites would be enough to serve every Internet user on Earth, as well as IoT devices and even future as-yet-uninvented network services.

He also asks whether this might ultimately make it harder for China to censor the internet — and whether Apple might attempt a competing satellite-to-phone network, possibly using technology from Samsung.
The Internet

Millions of the Pentagon's Dormant IP Addresses Have Mysteriously Sprung to Life (msn.com) 82

"Just before the end of the Trump administration, an obscure Florida company began announcing routes to IP addresses owned by the Pentagon," writes long-time Slashdot reader whoever57. The Washington Post calls it "a huge unused swath of the Internet that, for several decades, had been owned by the U.S. military." What happened next was stranger still. The company, Global Resource Systems LLC, kept adding to its zone of control. Soon it had claimed 56 million IP addresses owned by the Pentagon. Three months later, the total was nearly 175 million. That's almost 6 percent of a coveted traditional section of Internet real estate — called IPv4 — where such large chunks are worth billions of dollars on the open market... "They are now announcing more address space than anything ever in the history of the Internet," said Doug Madory, director of Internet analysis for Kentik, a network monitoring company, who was among those trying to figure out what was happening...

The change is the handiwork of an elite Pentagon unit known as the Defense Digital Service, which reports directly to the secretary of defense. The DDS bills itself as a "SWAT team of nerds" tasked with solving emergency problems for the department and conducting experimental work to make big technological leaps for the military... Brett Goldstein, the DDS's director, said in a statement that his unit had authorized a "pilot effort" publicizing the IP space owned by the Pentagon. "This pilot will assess, evaluate and prevent unauthorized use of DoD IP address space," Goldstein said. "Additionally, this pilot may identify potential vulnerabilities...."

The specifics of what the effort is trying to achieve remain unclear... What is clear, however, is the Global Resource Systems announcements directed a fire hose of Internet traffic toward the Defense Department addresses...

Russell Goemaere, a spokesman for the Defense Department, confirmed in a statement to The Washington Post that the Pentagon still owns all the IP address space and hadn't sold any of it to a private party.

Bitcoin

Elon Musk, Jack Dorsey Argue that Bitcoin Incentivises Renewable Energy (bbc.com) 135

Jack Dorsey, the co-founder and CEO of Twitter, tweeted Wednesday that bitcoin "incentivises renewable energy." And Elon Musk responded "True."

The BBC adds that the tweets came "despite experts warning otherwise." The cyrptocurrency's carbon footprint is as large as some of the world's biggest cities, studies suggest. But Mr Dorsey claims that could change if bitcoin miners worked hand-in-hand with renewable energy firms.

One expert said it was a "cynical attempt to greenwash" bitcoin. China, where more than two-thirds of power is from coal, accounts for more than 75% of bitcoin mining around the world...

The tweet comes soon after the release of a White Paper from Mr Dorsey's digital payment services firm Square, and global asset management business ARK Invest. Entitled "Bitcoin as key to an abundant, clean energy future", the paper argues that "bitcoin miners are unique energy buyers", because they offer flexibility, pay in a cryptocurrency, and can be based anywhere with an internet connection. "By combining miners with renewables and storage projects, we believe it could improve the returns for project investors and developers, moving more solar and wind projects into profitable territory," it said.

Author and bitcoin critic David Gerard described the paper as a "cynical exercise in bitcoin greenwashing".

"The reality is: bitcoin runs on coal," he told the BBC.... "Bitcoin mining is so ghastly and egregious that the number one job of bitcoin promoters is to make excuses for it — any excuse at all."

Security

Security Researcher Dan Kaminsky Has Died 56

Security researcher Marc Rogers (also a BBC contributor) tweeted this morning "I guess theres no hiding it now. We lost Dan Kaminsky yesterday. One of the brightest lights in infosec and probably the kindest soul I knew. The vacuum he leaves behind is impossible to measure. Please keep speculation to yourself and be respectful of his family and friends."

In later tweets, Rogers says he was proud that Kaminsky was his friend, adding "I could literally wrote a book of Dan Kaminsky tales. From shenanigans at events all over the world, to parties and just crazy stuff that happened at the spur of a moment. But most about his crazy brilliant kind generous ideas and offers of help and support. He was one of a kind."

Even the stories in Kaminsky's Wikipedia entry are impressive: He is known among computer security experts for his work on DNS cache poisoning, and for showing that the Sony Rootkit had infected at least 568,200 computers and for his talks at the Black Hat Briefings.

In June 2010, Kaminsky released Interpolique, a beta framework for addressing injection attacks such as SQL injection and cross-site scripting in a manner comfortable to developers.

On June 16, 2010, he was named by ICANN as one of the Trusted Community Representatives for the DNSSEC root.

"Dan was a force of nature," adds Marc Rogers on Twitter. "A hacker who saw not just 1 or 2 moves ahead but so many you sometimes wondered if he was playing the same game: I asked him for a demo. He brought a record turntable he used to move a VM forwards & backwards in time like a DJ scratching."
Social Networks

'Not Even Student Work': MyPillow CEO's Social Media Site Botches Rollout (salon.com) 191

"Salon reports amateur-hour mistakes in the attempted rollout of FRANK, a social media site envisioned by Mike Lindell of MyPillow," writes Slashdot reader Tom239. "A Drupal expert described the code as 'not even student work.'" From the report: Speaking to Salon on Thursday afternoon about Lindell's site, one "Acquia Certified Drupal Grand Master," who oversees a technology firm that employs numerous other "grandmasters," said that Lindell's site was set up for failure from its inception, noting that its developers -- whom Lindell compared to Navy SEALs -- had failed to carry out basic "Drupal 101" tasks. One coder who spoke to Salon in great detail explained the potential shortcomings of the pillow maven's program code and the patchy work done by his developer team. "Drupal can power high powerful websites, sites with lots of traffic," the expert said, adding that it isn't the right software to build a social media site with, since it's not designed to handle a large amount of user-generated content. "Lindell's website was basically trying to make soup for scratch for everybody," said the expert, who claimed more than 25 years of experience in the IT field.

"In my professional opinion, it will be extremely unlikely, if not impossible, for Lindell to accomplish his vision with Drupal and his own servers," the expert told Salon. "Despite how much I love it, Drupal simply isn't the right tool for the number of users with the features that he wants to provide. It would take a massive effort of 12 to 18 months to build out the needed hosting setup and application architecture, and this would come with an enormous degree of risk. The idea that he could do this in just a couple of months is patently absurd, and I think the results speak for themselves."

"When I was looking at the code, in the browser, they basically launched the site while it was still in development mode," one expert told Salon, citing the fact that developers had failed to check a box to aggregate files on the platform as the first red flag he ran across. "Their files were not aggregated, and by the way, that's a check box in Drupal -- you literally check a box and click save, My jaw dropped when I saw that. I was like, 'They did not try to launch this thing without aggregation turned on!'" The second major red flag another Drupal expert found was that Lindell's site was spitting out coded error messages to users, which leaves the platform vulnerable to attacks. "This is a shit show," the expert said, calling this an "obvious" issue that coders learn how to prevent in "Drupal 101."

Elsewhere it was reported that Lindell's supposed free-speech haven will not allow swearing, pornography, or the use of 'god's name in vain'.
Network

One Step Closer To Getting 10 Gigabit At Home 71

An anonymous reader quotes a report from ZDNet: Now, thanks to Comcast and Broadcom, we're seeing the first tests of full-duplex (FDX) DOCSIS 4 system-on-chip (SoC) devices. Comcast's tests, done between Philadelphia and Denver, show that FDX can work with DOCSIS 4. FDX enables cable internet providers to run a high-speed internet connection both upstream and downstream simultaneously. In other words, while you won't see symmetric speeds, you will someday see 10 Gbps downstream and 6 Gbps upstream over Comcast's hybrid-fiber coaxial (HFC) network. Comcast has been working towards this for years. The company has been working to bring DOCSIS 4 FDX to market pretty much since CableLabs' set the specification in 2017.

There is another way to deliver DOCSIS 4 speeds: Extended Spectrum DOCSIS (ESD). This is easier to deploy since it "only" raises to 1.8Gbps while keeping downstream and upstream traffic separate as has been the case with previous DOCSIS versions. Comcast, though, is investing heavily in chasing the top price of 10Gbps. It's possible that a single chipset could support both FDX and ESD, but we're still years away from that silicon being forged. [...] In the tests, which use experimental Broadcom SoCs, in a simulated network environment, they hit speeds of over 4Gbps both up and downstream simultaneously. This was done using DOCSIS 4's echo cancellation and overlapping spectrum techniques. The businesses expect future optimization to push the throughput even faster. We still don't know when these speeds will arrive in our small offices/home offices (SOHO). CableLabs doesn't even expect to test hardware for DOCSIS 4 certification until 2022. Nor, has Comcast announced any kind of deployment roadmap.
United States

New Rules Allowing Small Drones To Fly Over People In US Take Effect (reuters.com) 36

An anonymous reader quotes a report from Reuters: The Federal Aviation Administration (FAA) said that final rules announced in December took effect on Wednesday allowing for small drones to fly over people and at night, a significant step toward their eventual use for widespread commercial deliveries. The effective date was delayed about a month during the change in administration. The FAA said its long-awaited rules for the drones, also known as unmanned aerial vehicles, will address security concerns by requiring remote identification technology in most cases to enable their identification from the ground. Previously, small drone operations over people were limited to operations over people who were directly participating in the operation, located under a covered structure, or inside a stationary vehicle -- unless operators had obtained a waiver from the FAA.

Drone manufacturers have 18 months to begin producing drones with Remote ID, and operators will have an additional year to provide Remote ID. The new rules eliminate requirements that drones be connected to the internet to transmit location data but do require that they broadcast remote ID messages via radio frequency broadcast. One change, since the rules were first proposed in 2019, requires that small drones not have any exposed rotating parts that would lacerate human skin.

Slashdot Top Deals