6780 stories
·
161 followers

Digital River Runs Dry

1 Comment
Digital River has not paid numerous merchants since midsummer for software and digital products they sold through its MyCommerce platform. The Register: "After over 20 years of partnership with Digital River, Traction Software Ltd has been left feeling as though we've been 'rug pulled,'" Lee Midgley, managing director of Traction Software, told The Register. "For the past three months, we've experienced a complete halt in software sales revenue payments with no support, no direct contact, and only additional terms and conditions designed to delay resolution and extract more money from us.

"Astonishingly, Digital River continued to take sales from our loyal customers until we removed them from the order system. It now appears they have no intention of making payments and may be entering a liquidation process under a new CEO who has been involved in similar situations before."

The new CEO, Barry Kasoff, was first noted on the e-commerce biz website in August. Kasoff is also listed as the president of Realization Services, "a full-service strategic consulting firm specializing in turnaround management and value enhancement..." The privately-owned, Minnesota-based business appears to have laid off a significant number of employees, presumably the result of what its UK subsidiary describes as cost reduction initiatives implemented in late 2022.

Read the whole story
jepler
1 day ago
reply
yi-i-i-i-kes
Earth, Sol system, Western spiral arm
Share this story
Delete

Android 15 is now available for Pixels

1 Comment and 2 Shares
Android logo on a green and blue background
Illustration by Alex Castro / The Verge

Android 15 is now rolling out to Pixel devices, bringing them new privacy features, security tools, and improvements for foldables and tablets. The operating system first launched last month through the Android Open Source Project, but at the time, it wasn’t yet available on Pixel phones and tablets — or other major Android devices. Google announced today that it’s finally coming to Pixels alongside a series of Pixel feature drops.

One major new feature in Android 15 is the ability to make a “private space” for apps you might want to keep hidden from other people who get ahold of your phone. (Google gives the examples of social, dating, or banking apps.) Apps you put in the private space won’t show up in your recent apps, notifications, or settings, according to Google. To access the space, you’ll have to provide additional authentication, and you can even “hide the existence of private space from view on your phone,” Google says.

On foldables and tablets, Android 15 will let users pin and unpin the taskbar so they can choose to have somewhat easier access to their apps. And if you have certain apps that you frequently use side by side, you can set up an app pairing and access that pairing from one icon.

Many devices running Android — not just Android 15 — will also be getting Theft Detection Lock, which lets your phone automatically lock itself if it detects (with the help of AI) that it has been stolen. Google is also adding a feature called Remote Lock that lets you lock your phone using another Android phone, your phone number, and a “simple security check.” The company says that “most” devices on Android 10 and newer will get these features, and some people already have them.

If you want to learn more about what’s included in Android 15, we have a post with a full rundown of the biggest features.

Google is also starting to roll out a new Pixel feature drop for October that includes Night Sight for Instagram for taking better low-light photos and more controls for Audio Magic Eraser. In “the next few weeks,” Google is also adding a feature that lets you move media from a Pixel Tablet to a Pixel phone by holding the devices next to each other.

Read the whole story
jepler
1 day ago
reply
dreading the new AI features honestly
Earth, Sol system, Western spiral arm
zipcube
2 days ago
reply
Dallas, Texas
Share this story
Delete

Chinese Scientists Report Using Quantum Computer To Hack Military-grade Encryption

1 Comment
schwit1 writes: Chinese scientists have mounted what they say is the world's first effective attack on a widely used encryption method using a quantum computer. The breakthrough poses a "real and substantial threat" to the long-standing password-protection mechanism employed across critical sectors, including banking and the military, according to the researchers.

Despite the slow progress in general-purpose quantum computing, which currently poses no threat to modern cryptography, scientists have been exploring various attack approaches on specialised quantum computers. In the latest work led by Wang Chao, of Shanghai University, the team said it used a quantum computer produced by Canada's D-Wave Systems to successfully breach cryptographic algorithms.

Using the D-Wave Advantage, they successfully attacked the Present, Gift-64 and Rectangle algorithms -- all representative of the SPN (Substitution-Permutation Network) structure, which forms part of the foundation for advanced encryption standard (AES) widely used in the military and finance. AES-256, for instance, is considered the best encryption available and often referred to as military-grade encryption. While the exact passcode is not immediately available yet, it is closer than ever before, according to the study. "This is the first time that a real quantum computer has posed a real and substantial threat to multiple full-scale SPN structured algorithms in use today," they said in the peer-reviewed paper.

Read the whole story
jepler
3 days ago
reply
Weird, reading the abstract and passing key parts of the paper text to translation, it all seems to pertain to integer factorization. Rather, researchers report using a D-Wave system to factor a 7-digit number without using Shor's algorithm. (Shor's algorithm is unworkable on D-Wave devices even though they call them "quantum)

There's definitely some confusion going on beyond linking to a paper that is unrelated to "Substitution-Permutation Networks" of AES. GIFT and PRESENT are ciphers distinct from AES, and Rectangle is an existing (classical) attack on GIFT.

The full text paper from the main link here, in chinese: http://cjc.ict.ac.cn/online/onlinepaper/wc-202458160402.pdf
PRESENT at least merited a wikipedia algorithm: https://en.wikipedia.org/wiki/PRESENT
GIFT: https://eprint.iacr.org/2017/622.pdf
(improving the) Rectangle attack on GIFT-64: https://dl.acm.org/doi/10.1007/978-3-031-53368-6_3
Earth, Sol system, Western spiral arm
Share this story
Delete

Solving a Retrocomputing Mystery with an Album Cover: Greengate DS:3

1 Comment

[Bea Thurman] had a retro music conundrum. She loved the classic Greengate DS:3 sampler, but couldn’t buy one, and couldn’t find enough information to build her own. [Bea’s] plea for help caught the attention of [Eric Schlaepfer], aka  [TubeTime]. The collaboration that followed ultimately solved a decades-old mystery. 

In the 1980s, there were two types of musicians: Those who could afford a Fairlight CMI and everyone else. If you were an Apple II owner, the solution was a Greengate DS:3. The DS:3 was a music keyboard and a sampler card for the Apple II+ (or better). The plug-in card was a bit mysterious, though. The cards were not very well documented, and only a few survive today. To make matters worse, some chips had part numbers sanded off. It was a bit of a mystery until [Bea and Tubetime] got involved. 

A vinyl record jacket with pcb art
Eric Schlaepfer

While [Bea] didn’t have the card itself, she had a photo of the board and a picture of an album that contained the key to everything. The Greengate came packed with a vinyl album, “Into Trouble with the Noise of Art.” An apt title, since the album art was the Greengate PCB top layer. Now if you know [Eric], you know he wrote the book (literally) on taking things apart and taking photos of them, even producing replicas

Thoroughly nerdsniped, [Eric] loaded the photos KiCad and started tracing. With the entire top layer artwork and most of the bottom layer, the 8-bit card wasn’t too hard to figure out. The sticky point was one chip. A big 40-pin part with the numbers scrubbed off. One owner pulled the chip to check for fab information on the back, only to be greeted by a proper British “You Nosey S.O.B.” penciled on top of more sanded part numbers. 

If the chip was an ASIC, the project would be blocked until they could get their hands on an actual board for analysis. An ASIC would have custom part numbers on it from the fab though – no need for sanding. It had to be something off the shelf. [Eric] used some context clues to determine that the Mystery chip had to be a DMA controller. This narrowed the field down. From there, he had to compare pinouts until he had a match with the venerable MC6844. 

With the mystery part out of the way, [Eric] put the finishing touches on the PCB, saved it to his GitHub as the GoodGreat DS:3, and sent it off.  A few days later, the bare boards arrived and were quickly populated with vintage parts. [Eric] ran a few tests and sent the card off to [Bea], where we will pick up with part 2. 

At least the device wasn’t protected with a self-destruct code.

Read the whole story
jepler
3 days ago
reply
I met Bea at VCFMW last month and got to play on the DS:3!
Earth, Sol system, Western spiral arm
Share this story
Delete

Galaxy Gals

1 Share
The queen of suspense: how Ann Radcliffe inspired Dickens and Austen – then got written out of the canon - "She was all but forgotten. Now the 18th-century author's republished novels reveal why she made such an extraordinary contribution to literature."

"She offers us a heroine-centred narrative where a young, unprotected, often orphaned heroine is thrown into really dangerous situations where somebody is trying to force her into marriage and take her property rights." The heroines are often imprisoned in remote, atmospheric locations where supernatural events appear to take place. "That gives us a real sense of terror," said Wright. "It's quite psychological, before psychology was invented. She uses the image of the decayed castle or crumbling convent to explore the precarious and outmoded issue of marriage laws in England, where coverture meant a woman's legal identity and her property effectively disappeared when she married. So she shows young women in distress, in really exciting, action-packed narratives, with the aim of showing the precarious nature of a young female's existence who has no protection in society." By empowering her heroines with the strength and resilience they need to escape and marry the men they choose, Radcliffe is "very staunchly" showing that women can successfully resist domination, Wright said. "There is a sense of Radcliffe critiquing patriarchy and men who think they can dictate to women precisely what we should do and what we should give to them in marriage. So in many ways it is feminist literature, on a par with what Mary Wollstonecraft was arguing in A Vindication of the Rights of Women." At one point, a Radcliffe villain tells his victim: "You speak like a heroine, let us see if you can suffer like one." Wright added: "There's always a happy ending and a good resolution. But there's a sense of a heroine being able to manoeuvre that resolution."
also btw...
I think hard times are coming when we will be wanting the voices of writers who can see alternatives, can see through our fear-stricken society and its obsessive technologies, to other ways of being. We will need writers who can remember freedom, the realists of a larger reality.
--Ursula K. Le Guin
Read the whole story
jepler
6 days ago
reply
Earth, Sol system, Western spiral arm
Share this story
Delete

FEMA Adds Misinformation To Its List of Disasters To Clean Up

1 Comment
The Federal Emergency Management Agency (FEMA) is fighting misinformation on top of a major storm cleanup in Florida as Hurricane Milton rapidly intensifies just after Hurricane Helene rocked the state. From a report: FEMA Administrator Deanne Criswell told reporters on a call Tuesday that misinformation around the storms is "absolutely the worst I have ever seen," according to Politico. FEMA posted a rumor response page about the hurricane, and though it's not the first time it's taken that kind of approach, Criswell said, "I anticipated some of this, but not to the extent that we're seeing."

FEMA's rumor response page includes fact-checks to claims made by former President Donald Trump, like that the agency will only provide $750 to disaster survivors. FEMA says that's just the amount provided quickly through "Serious Needs Assistance" for food and emergency supplies, but survivors could still be eligible for other types of funds, too. Other fact-checks include debunking the false claim that FEMA disaster response resources were diverted to border issues. FEMA says "Disaster Relief Fund money has not been diverted to other, non-disaster related efforts."

Read the whole story
jepler
7 days ago
reply
Entire states could be designated as "misinformation superfund sites"
Earth, Sol system, Western spiral arm
Share this story
Delete
Next Page of Stories