Author name: Kris Guyer

flowers-grown-floating-on-polluted-waterways-can-help-clean-up-nutrient-runoff

Flowers grown floating on polluted waterways can help clean up nutrient runoff

here’s hoping it also masks the runoff smell —

Cut-flower farms could be a sustainable option for mitigating water pollution.

Hands cutting yellow flowers with scissors

Enlarge / The cut flowers could pay for themselves and even turn a profit.

Flowers grown on inexpensive floating platforms can help clean polluted waterways, over 12 weeks extracting 52 percent more phosphorus and 36 percent more nitrogen than the natural nitrogen cycle removes from untreated water, according to our new research. In addition to filtering water, the cut flowers can generate income via the multibillion-dollar floral market.

In our trials of various flowers, giant marigolds stood out as the most successful, producing long, marketable stems and large blooms. Their yield matched typical flower farm production.

Why it matters

Water pollution is caused in large part by runoff from farms, urban lawns, and even septic tanks. When it rains, excess phosphorus, nitrogen, and other chemicals wash into lakes and rivers.

These nutrients feed algae, leading to widespread and harmful algae blooms, which can severely lower oxygen in water, creating “dead zones” where aquatic life cannot survive. Nutrient runoff is a critical issue as urban areas expand, affecting the health of water ecosystems.

Water pollution is an escalating crisis in our area of Miami-Dade and Broward counties in Florida. The 2020 Biscayne Bay fish kill, the largest mass death of aquatic life on record for the region, serves as a stark reminder of this growing environmental issue.

How we do our work

We study sustainable agriculture and water pollution in South Florida.

Inspired by traditional floating farm practices, including the Aztecs’ chinampas in Mexico and the Miccosukees’ tree island settlements in Florida, we tested the idea of growing cut flowers on floating rafts as a way to remove excess nutrients from waterways. Our hope was not only that the flowers would pay for themselves, but that they could provide jobs here in Miami, the center of the US cut-flower trade.

Chemical conditions in the test tanks were the same as in nearby polluted waterways.

Enlarge / Chemical conditions in the test tanks were the same as in nearby polluted waterways.

We floated 4-by-6-foot (1.2-by-1.8-meter) mats of inexpensive polyethylene foam called Beemats in 620-gallon (2,300-liter) outdoor test tanks that mirrored water conditions of nearby polluted waterways. Into the mats, we transplanted flower seedlings, including zinnias, sunflowers, and giant marigolds. The polluted tank water was rich in nutrients, eliminating the need for any fertilizer. As the seedlings matured into plants over 12 weeks, we tracked the tanks’ improving water quality.

Encouraged by the success of the marigolds in our tanks, we moved our trials to the nearby canals of Coral Gables and Little River. We anchored the floating platforms with 50-pound (22.7-kilogram) weights and also tied them to shore for extra stability. No alterations to the landscape were needed, making the process simple and doable.

Some plants grow roots in places–such as the stem–other than where their original roots began.

Enlarge / Some plants grow roots in places–such as the stem–other than where their original roots began.

What still isn’t known

The success of the giant marigolds might be linked to the extra roots that grow from their stems known as adventitious roots. These roots likely help keep the plants stable on the floating platforms. Identifying additional plants with roots like these could help broaden plant choices.

Future raft designs may also need modifications to ensure better stability and growth for other cut-flower and crop species.

What’s next

Our promising findings show floating cut-flower farms could be a sustainable option for mitigating water pollution.

One of us (Locke-Rodriguez) is expanding this research and working to scale up floating farms in South Florida as a demonstration of what could take place in the many locations facing similar issues worldwide.

The Research Brief is a short take on interesting academic work.The Conversation

Jazmin Locke-Rodriguez, Post Doctoral Associate in the Institute of Environment, Florida International University, and Krishnaswamy Jayachandran, Professor of Agroecology, Florida International University.

This article is republished from The Conversation under a Creative Commons license. Read the original article.

Flowers grown floating on polluted waterways can help clean up nutrient runoff Read More »

doj-quietly-removed-russian-malware-from-routers-in-us-homes-and-businesses

DOJ quietly removed Russian malware from routers in US homes and businesses

Fancy Bear —

Feds once again fix up compromised retail routers under court order.

Ethernet cable plugged into a router LAN port

Getty Images

More than 1,000 Ubiquiti routers in homes and small businesses were infected with malware used by Russian-backed agents to coordinate them into a botnet for crime and spy operations, according to the Justice Department.

That malware, which worked as a botnet for the Russian hacking group Fancy Bear, was removed in January 2024 under a secret court order as part of “Operation Dying Ember,” according to the FBI’s director. It affected routers running Ubiquiti’s EdgeOS, but only those that had not changed their default administrative password. Access to the routers allowed the hacking group to “conceal and otherwise enable a variety of crimes,” the DOJ claims, including spearphishing and credential harvesting in the US and abroad.

Unlike previous attacks by Fancy Bear—that the DOJ ties to GRU Military Unit 26165, which is also known as APT 28, Sofacy Group, and Sednit, among other monikers—the Ubiquiti intrusion relied on a known malware, Moobot. Once infected by “Non-GRU cybercriminals,” GRU agents installed “bespoke scripts and files” to connect and repurpose the devices, according to the DOJ.

The DOJ also used the Moobot malware to copy and delete the botnet files and data, according to the DOJ, and then changed the routers’ firewall rules to block remote management access. During the court-sanctioned intrusion, the DOJ “enabled temporary collection of non-content routing information” that would “expose GRU attempts to thwart the operation.” This did not “impact the routers’ normal functionality or collect legitimate user content information,” the DOJ claims.

“For the second time in two months, we’ve disrupted state-sponsored hackers from launching cyber-attacks behind the cover of compromised US routers,” said Deputy Attorney General Lisa Monaco in a press release.

The DOJ states it will notify affected customers to ask them to perform a factory reset, install the latest firmware, and change their default administrative password.

Christopher A. Wray, director of the FBI, expanded on the Fancy Bear operation and international hacking threats generally at the ongoing Munich Security Conference. Russia has recently targeted underwater cables and industrial control systems worldwide, Wray said, according to a New York Times report. And since its invasion of Ukraine, Russia has focused on the US energy sector, Wray said.

The past year has been an active time for attacks on routers and other network infrastructure. TP-Link routers were found infected in May 2023 with malware from a reportedly Chinese-backed group. In September, modified firmware in Cisco routers was discovered as part of a Chinese-backed intrusion into multinational companies, according to US and Japanese authorities. Malware said by the DOJ to be tied to the Chinese government was removed from SOHO routers by the FBI last month in similar fashion to the most recently revealed operation, targeting Cisco and Netgear devices that had mostly reached their end of life and were no longer receiving security patches.

In each case, the routers provided a highly valuable service to the groups; that service was secondary to whatever primary aims later attacks might have. By nesting inside the routers, hackers could send commands from their overseas locations but have the traffic appear to be coming from a far more safe-looking location inside the target country or even inside a company.

Similar inside-the-house access has been sought by international attackers through VPN products, as in the three different Ivanti vulnerabilities discovered recently.

DOJ quietly removed Russian malware from routers in US homes and businesses Read More »

skyrocketing-ocean-temperatures-have-scientists-scratching-their-heads

Skyrocketing ocean temperatures have scientists scratching their heads

beach scene with thermometer

jay_zynism via Getty

For nearly a year now, a bizarre heating event has been unfolding across the world’s oceans. In March 2023, global sea surface temperatures started shattering record daily highs and have stayed that way since.

You can see 2023 in the orange line below, the other gray lines being previous years. That solid black line is where we are so far in 2024—way, way above even 2023. While we’re nowhere near the Atlantic hurricane season yet—that runs from June 1 through the autumn—keep in mind that cyclones feed on warm ocean water, which could well stay anomalously hot in the coming months. Regardless, these surface temperature anomalies could be triggering major ecological problems already.

“In the tropical eastern Atlantic, it’s four months ahead of pace—it’s looking like it’s already June out there,” says Brian McNoldy, a hurricane researcher at the University of Miami. “It’s really getting to be strange that we’re just seeing the records break by this much, and for this long.”

You’ll notice from these graphs and maps that the temperature anomalies may be a degree or two Celsius warmer, which may not sound like much. But for the seas, it really is: Unlike land, which rapidly heats and cools as day turns to night and back again, it takes a lot to warm up an ocean that may be thousands of feet deep. So even an anomaly of mere fractions of a degree is significant. “To get into the two or three or four degrees, like it is in a few places, it’s pretty exceptional,” says McNoldy.

University of Maine

So what’s going on here? For one, the oceans have been steadily warming over the decades, absorbing something like 90 percent of the extra heat that humans have added to the atmosphere. “The oceans are our saviors, in a way,” says biological oceanographer Francisco Chavez of the Monterey Bay Aquarium Research Institute in California. “Things might be a lot worse in terms of climate impacts, because a lot of that heat is not only kept at the surface, it’s taken to depths.”

A major concern with such warm surface temperatures is the health of the ecosystems floating there: phytoplankton that bloom by soaking up the sun’s energy and the tiny zooplankton that feed on them. If temperatures get too high, certain species might suffer, shaking the foundations of the ocean food web.

Skyrocketing ocean temperatures have scientists scratching their heads Read More »

rocket-report:-falcon-9-flies-for-300th-time;-an-intriguing-launch-from-russia

Rocket Report: Falcon 9 flies for 300th time; an intriguing launch from Russia

Co-planar —

Starship is fully stacked in South Texas for the rocket’s third test flight.

The upper stage for the first Ariane 6 flight vehicle is seen inside its factory in Bremen, Germany. The upper stage's hydrogen-fueled Vinci engine is visible in this image.

Enlarge / The upper stage for the first Ariane 6 flight vehicle is seen inside its factory in Bremen, Germany. The upper stage’s hydrogen-fueled Vinci engine is visible in this image.

Welcome to Edition 6.31 of the Rocket Report! Photographers at Cape Canaveral, Florida, noticed a change to the spaceport’s skyline this week. Blue Origin has erected a full-size simulator of its New Glenn rocket vertically on its launch pad for a series of fit checks and tests. Late last year, we reported Blue Origin was serious about getting the oft-delayed New Glenn rocket off the ground by the end of 2024. This is a good sign of progress toward that goal, but there’s a long, long way to go. It was fun to watch preparations for the inaugural flights of a few other heavy-lift rockets in the last couple of years (Starship, SLS, and Vulcan). This year, it’s New Glenn.

As always, we welcome reader submissions, and if you don’t want to miss an issue, please subscribe using the box below (the form will not appear on AMP-enabled versions of the site). Each report will include information on small-, medium-, and heavy-lift rockets, as well as a quick look ahead at the next three launches on the calendar.

Russia launches a classified satellite. On February 9, Russia launched its first orbital mission of the year with the liftoff of a Soyuz-2-1v rocket from the Plesetsk Cosmodrome in the far north of the country. The two-stage rocket delivered a classified satellite into orbit for the Russian military, Anatoly Zak of RussianSpaceWeb.com reports. In keeping with the Russian military’s naming convention, the satellite is known simply as Kosmos 2575, and there’s little indication about what it will do in space, except for one key fact.

But wait, there’s more … It turns out the launch of Kosmos 2575 occurred at exactly the same time of day as another Soyuz-2-1v rocket launched on December 27 with a Russian military satellite named Kosmos 2574. The newer spacecraft launched into the same orbital plane as Kosmos 2574, a strong indication that the two satellites have a shared mission. In recent years, Russia has tested rendezvous, proximity operations, and, at least in one instance, a projectile that would have applications for an anti-satellite weapon. You can be sure the US military and a global community of hobbyist satellite trackers will watch closely to see if these two satellites approach one another. If they do, they could continue technology demonstrations for an anti-satellite system. It’s unclear if the recent revelations regarding US officials’ concerns about Russian anti-satellite capabilities are related to these recent launches.

European startup testing methane-fueled rocket engine. Space transportation startup The Exploration Company has continued testing its methane-fueled Huracán engine, which will power an in-space and lunar transportation vehicle under development, European Spaceflight reports. Most recently, the Huracán engine completed another round of thrust chamber testing using liquid methane fuel as a coolant and tested a new thermal barrier coating. The methane/liquid oxygen engine is undergoing testing at a facility in Lampoldshausen, Germany, ahead of use on The Exploration Company’s Nyx Moon spacecraft, a transfer vehicle designed for transportation to and from cislunar space and also capable of Moon landings. The Nyx Moon is an evolution of a transfer vehicle the European startup is developing to ferry satellites between different orbits around Earth.

Other uses for Huracán… The Exploration Company appears to be positioning itself not only as a builder and operator of orbital and lunar transfer vehicles but also as a propulsion supplier to other space companies. In 2022, The Exploration Company received funding for the Huracán engine from the French government. At the time, the company described the engine as serving the needs of “the upper stages of small launchers and those of orbital vehicles.” (submitted by Ken the Bin)

The easiest way to keep up with Eric Berger’s space reporting is to sign up for his newsletter, we’ll collect his stories in your inbox.

Rocket Report: Falcon 9 flies for 300th time; an intriguing launch from Russia Read More »

doing-dns-and-dhcp-for-your-lan-the-old-way—the-way-that-works

Doing DNS and DHCP for your LAN the old way—the way that works

All shall tremble before your fully functional forward and reverse lookups!

Enlarge / All shall tremble before your fully functional forward and reverse lookups!

Aurich Lawson | Getty Images

Here’s a short summary of the next 7,000-ish words for folks who hate the thing recipe sites do where the authors babble about their personal lives for pages and pages before getting to the cooking: This article is about how to install bind and dhcpd and tie them together into a functional dynamic DNS setup for your LAN so that DHCP clients self-register with DNS, and you always have working forward and reverse DNS lookups. This article is intended to be part one of a two-part series, and in part two, we’ll combine our bind DNS instance with an ACME-enabled LAN certificate authority and set up LetsEncrypt-style auto-renewing certificates for LAN services.

If that sounds like a fun couple of weekend projects, you’re in the right place! If you want to fast-forward to where we start installing stuff, skip down a couple of subheds to the tutorial-y bits. Now, excuse me while I babble about my personal life.

My name is Lee, and I have a problem

(Hi, Lee.)

I am a tinkering homelab sysadmin forever chasing the enterprise dragon. My understanding of what “normal” means, in terms of the things I should be able to do in any minimally functioning networking environment, was formed in the days just before and just after 9/11, when I was a fledgling admin fresh out of college, working at an enormous company that made planes starting with the number “7.” I tutored at the knees of a whole bunch of different mentor sysadmins, who ranged on the graybeard scale from “fairly normal, just writes his own custom GURPS campaigns” to “lives in a Unabomber cabin in the woods and will only communicate via GPG.” If there was one consistent refrain throughout my formative years marinating in that enterprise IT soup, it was that forward and reverse DNS should always work. Why? Because just like a clean bathroom is generally a sign of a nice restaurant, having good, functional DNS (forward and reverse) is a sign that your IT team knows what it’s doing.

Just look at what the masses have to contend with outside of the datacenter, where madness reigns. Look at the state of the average user’s LAN—is there even a search domain configured? Do reverse queries on dynamic hosts work? Do forward queries on dynamic hosts even work? How can anyone live like this?!

I decided long ago that I didn’t have to, so I’ve maintained a linked bind and dhcpd setup on my LAN for more than ten years. Also, I have control issues, and I like my home LAN to function like the well-run enterprise LANs I used to spend my days administering. It’s kind of like how car people think: If you’re not driving a stick shift, you’re not really driving. I have the same kind of dumb hang-up, but for network services.

Honestly, though, running your LAN with bind and dhcpd isn’t even that much work—those two applications underpin a huge part of the modern Internet. The packaged versions that come with most modern Linux distros are ready to go out of the box. They certainly beat the pants off of the minimal DNS/DHCP services offered by most SOHO NAT routers. Once you have bind and dhcpd configured, they’re bulletproof. The only time I interact with my setup is if I need to add a new static DHCP mapping for a host I want to always grab the same IP address.

So, hey, if the idea of having perfect forward and reverse DNS lookups on your LAN sounds exciting—and, come on, who doesn’t want that?!—then pull up your terminal and strap in because we’re going make it happen.

(Note that I’m relying a bit on Past Lee and this old blog entry for some of the explanations in this piece, so if any of the three people who read my blog notice any similarities in some of the text, it’s because Past Lee wrote it first and I am absolutely stealing from him.)

But wait, there’s more!

This piece is intended to be part one of two. If the idea of having one’s own bind and dhcpd servers sounds a little silly (and it’s not—it’s awesome), it’s actually a prerequisite for an additional future project with serious practical implications: our own fully functioning local ACME-enabled certificate authority capable of answering DNS-01 challenges so we can issue our own certificates to LAN services and not have to deal with TLS warnings like plebes.

(“But Lee,” you say, “why not just use actual-for-real LetsEncrypt with a real domain on my LAN?” Because that’s considerably more complicated to implement if one does it the right way, and it means potentially dealing with split-horizon DNS and hairpinning if you also need to use that domain for any Internet-accessible stuff. Split-horizon DNS is handy and useful if you have requirements that demand it, but if you’re a home user, you probably don’t. We’ll keep this as simple as possible and use LAN-specific DNS zones rather than real public domain names.)

We’ll tackle all the certificate stuff in part two—because we have a ways to go before we can get there.

Doing DNS and DHCP for your LAN the old way—the way that works Read More »

can-you-sanitize-the-inside-of-your-nose-to-prevent-covid?-nope,-fda-says.

Can you sanitize the inside of your nose to prevent COVID? Nope, FDA says.

doesn’t pass the sniff test —

There are a lot of COVID nasal sprays for sale, but little data to show they work.

Can you sanitize the inside of your nose to prevent COVID? Nope, FDA says.

More than four years after SARS-CoV-2 made its global debut, the US Food and Drug Administration is still working to clear out the bogus and unproven products that flooded the market, claiming to prevent, treat, and cure COVID-19.

The latest example is an alcohol-based sanitizer meant to be smeared inside the nostrils. According to its maker, the rub can protect you from becoming infected with SARS-CoV-2 and other nasty germs, like MRSA, and that protection lasts up to 12 hours after each swabbing. That all sounds great, but according to the FDA, none of it is proven. In a warning letter released Tuesday, the agency determined the sanitizer, called Nozin, is an unapproved new drug and misbranded.

While ethyl alcohol is used in common topical antiseptics, like hand sanitizers, the FDA does not generally consider it safe for inside the nostrils—and the agency is unaware of any high-quality clinical data showing the Nozin is safe, let alone effective. The FDA also noted that, for general over-the-counter topical antiseptics, calling out specific pathogens it can fight off—like SARS-CoV-2 and MRSA—is not allowed under agency rules without further FDA review. Making claims about protection duration is also not allowed.

The FDA’s warning letter is nothing to sneeze at; the letter threatens seizure and injunction for failing to adequately respond.

Nozin’s maker, Maryland-based Global Life Technologies Corp., did not immediately respond to a request for comment from Ars. On its website, the company touts its product’s effectiveness with a link to a published study from 2014, indicating that use of Nozin lowered the colonization levels of S. aureus and other bacteria in the noses of 20 healthy health care workers. The study did not address protection from infection or carriage of any viruses. The company also lists unpublished studies indicating that the product can kill bacteria in laboratory conditions, does not irritate skin, and lowered bacterial growth in the noses of 30 people over a 12-hour period.

This is far from the first dubious, nasal-based COVID product the FDA has called out. There was the Corona-cure nasal spray of 2020, and the Halodine and the NanoBio Protect nasal antiseptics of 2021. That year, the Federal Trade Commission sued a company called Xlear over allegedly false claims that its nasal spray can prevent and treat COVID-19. At least two more nasal spray makers received FDA warning letters in 2022.

To date, the FDA has not approved any nasal sprays to prevent or treat COVID-19, and the scant data on their efficacy remains inconclusive. But there are still plenty of such products for sale online. Most, like Nozin, claim to work by killing bacteria and viruses directly. One product, a nitric oxide nasal spray called Sanotize, is currently in a Phase III clinical trial to test whether it can prevent SARS-CoV-2 infections. Others claim to work by coating the nasal passage with the gelling agent iota-carrageenan to provide a barrier to viral entry. A pilot clinical trial of 400 health care workers in Argentina published in 2021 found that the use of an iota-carrageenan nasal spray led to a 4 percent absolute risk reduction in SARS-CoV-2 infection.

Can you sanitize the inside of your nose to prevent COVID? Nope, FDA says. Read More »

asahi-linux-project’s-opengl-support-on-apple-silicon-officially-surpasses-apple’s

Asahi Linux project’s OpenGL support on Apple Silicon officially surpasses Apple’s

who needs metal? —

Newest driver supports the latest versions of OpenGL and OpenGL ES.

Slowly but surely, the Asahi Linux team is getting Linux up and running on Apple Silicon Macs.

Enlarge / Slowly but surely, the Asahi Linux team is getting Linux up and running on Apple Silicon Macs.

Apple/Asahi Linux

For around three years now, the team of independent developers behind the Asahi Linux project has worked to support Linux on Apple Silicon Macs, despite Apple’s total lack of involvement. Over the years, the project has gone from a “highly unstable experiment” to a “surprisingly functional and usable desktop operating system.” Even Linus Torvalds has used it to run Linux on Apple’s hardware.

The team has been steadily improving its open source, standards-conformant GPU driver for the M1 and M2 since releasing them in December 2022, and today, the team crossed an important symbolic milestone: The Asahi driver’s support for the OpenGL and OpenGL ES graphics have officially passed what Apple offers in macOS. The team’s latest graphics driver fully conforms with OpenGL version 4.6 and OpenGL ES version 3.2, the most recent version of either API. Apple’s support in macOS tops out at OpenGL 4.1, announced in July 2010.

Developer Alyssa Rosenzweig wrote a detailed blog post that announced the new driver, which had to pass “over 100,000 tests” to be deemed officially conformant. The team achieved this milestone despite the fact that Apple’s GPUs don’t support some features that would have made implementing these APIs more straightforward.

“Regrettably, the M1 doesn’t map well to any graphics standard newer than OpenGL ES 3.1,” writes Rosenzweig. “While Vulkan makes some of these features optional, the missing features are required to layer DirectX and OpenGL on top. No existing solution on M1 gets past the OpenGL 4.1 feature set… Without hardware support, new features need new tricks. Geometry shaders, tessellation, and transform feedback become compute shaders. Cull distance becomes a transformed interpolated value. Clip control becomes a vertex shader epilogue. The list goes on.”

Now that the Asahi GPU driver supports the latest OpenGL and OpenGL ES standards—released in 2017 and 2015, respectively—the work turns to supporting the low-overhead Vulkan API on Apple’s hardware. Vulkan support in macOS is limited to translation layers like MoltenVK, which translates Vulkan API calls to Metal ones that the hardware and OS can understand.

Apple’s OpenGL support has been stuck at the 4.1 level since macOS 10.9 Mavericks was released in 2013. Since then, the company has shifted its focus to its proprietary Metal graphics API, which, like DirectX 12 and Vulkan, is a “low-overhead” API meant to reduce the performance overhead sometimes associated with older APIs like OpenGL. But despite declaring OpenGL officially deprecated in 2018, Apple has left its existing OpenGL implementation alone since then, never updating it but also maintaining support even as it has transitioned from Intel’s processors to its own CPUs and GPUs.

Rosenzweig’s blog post didn’t give any specific updates on Vulkan except to say that the team was “well on the road” to supporting it. In addition to supporting native Linux apps, supporting more graphics APIs in Asahi will allow the operating system to take better advantage of software like Valve’s Proton, which already has a few games written for x86-based Windows PCs running on Arm-based Apple hardware.

Though there are still things that don’t work, Fedora Asahi Remix is surprisingly polished and supports a lot of the hardware available in most M1 and M2 Macs—including the webcam, speakers, Wi-Fi and Bluetooth, and graphics acceleration. Other features, like Thunderbolt, running displays over USB-C, the system’s built-in microphone, and the Touch ID fingerprint sensors, remain non-functional. Asahi’s most recent update blog post, published in mid-January, highlighted HDMI support, support for DRM-protected websites via Google’s proprietary Widevine package, Touchbar support for the handful of Apple Silicon Macs that use one, and more.

As for the newest wave of M3 Macs, Asahi developer Hector Martin said in October 2023 that basic support for the newest chips would take “at least six months.” Among other things, the team will need time to support the M3 GPU in their drivers; the team also relies primarily on Mac mini models for development, and the M3 Mac mini doesn’t exist yet.

Asahi Linux project’s OpenGL support on Apple Silicon officially surpasses Apple’s Read More »

deep-rock-galactic:-survivor-is-a-fine-entry-point-into-the-auto-shooting-depths

Deep Rock Galactic: Survivor is a fine entry point into the auto-shooting depths

Vampirock Stonevivors —

This fleshed-out Early Access version could convert first-timers to the genre.

Bugs overwhelming a player in Deep Rock Galactic: Survivor

Enlarge / Your author actually made it out of this, but not that much further.

Kevin Purdy/Ghost Ship Games

Deep Rock Galactic: Survivor started as a talk over a beer between two development teams, according to Søren Lundgaard, CEO of Ghost Ship Games. Ghost Ship, ramping up its publishing arm after the multi-year success of Deep Rock Galactic, gave Funday Games license to graft its quirky dwarven corporate dystopia onto the auto-shooting likes of Vampire Survivors.

I’m glad they had that beer, and even more glad they’ve offered up the resulting game for Early Access on Windows PC via Steam (and Steam Deck, and Linux via Proton). Deep Rock Galactic: Survivor is my favorite of the genre I sometimes call “strategic walking.” I am, of course, biased by the flavor and familiarity with Deep Rock Galactic (DRG). But the elements of DRG Funday has put into DRG: Survivor makes for a fun, cohesive game, one that’s easy to play in sessions and not be overwhelmed—mentally, at least. Bug-wise, you are absolutely going to get trampled.

Launch trailer for Deep Rock Galactic: Survivor.

We peeked at Survivor in June, and it’s gotten a lot of polish since then, along with entirely new character classes, biomes, and upgrade mechanics. The basic mechanics remain the same: You complete mission objectives and mine resources while an increasing horde of insectoids chases you, and your weapons automatically fire at them. Some weapons shoot in wide patterns, some blast up close, and others do things like hone in on the creature with the most hit points. The big decisions you make are where do you move, so as to pick up dropped experience points and angle your shooting, and what do you pick for your upgrades when they come available.

You start out with only one class available, the relatively balanced Scout, and no bonuses. As you accrue resources, experience, and hit achievements, you unlock permanent upgrades to things like damage, item pick-up radius, mining and walking speed, and toughness. Play a couple of sessions, and you can see the build possibilities come to life, with things like critical hits and reload speeds able to be pushed far beyond balance.

That’s just the one class, though. Each of DRG‘s classes gets a spot in DRG: Survivor, and what they do in that first-person game translates surprisingly well to an overhead shooter. Diggers move through stone and harvest more quickly and have their weapons oriented toward protecting them from behind. Gunners, well, shoot a lot, which means a different kind of movement so that you’re looping back on enemy hordes and mowing them down from the front. Engineers set up turrets and shepherd the mobs through them. Each one offers strategic variants, too, like the Digger that leaves trails of acid behind them as they burrow.

  • A moment where your author had things relatively under control. Which way should he go next?

    Kevin Purdy/Ghost Ship Games

  • An Engineer in a magma-ridden world.

    Ghost Ship Games

  • The Digger, choosing acid as his keep-away tool.

    Ghost Ship Games

  • Inside a multi-level mission, you’ll make choices between levels about how to spend your gold and Nitra.

    Kevin Purdy/Ghost Ship Games

  • Between runs, you can make universal upgrades to your characters, upping their damage, defense, criticals, speed, and other values.

    Kevin Purdy/Ghost Ship Games

  • The stat layout from one of my earlier runs.

    Kevin Purdy/Ghost Ship Games

Having played a few other auto-shooters since my first run with DRG: Survivor, what I appreciate most is how the procedural landscapes and inherent greed of mining challenge your thinking and reaction times. Rather than looping around a seemingly endless space, DRG: Survivor makes you think about the dynamics of a giant crowd of bugs that will always take the shortest route to get to you. I felt a bit like an ant in a glass-paned farm sometimes, digging into stone to avoid getting pinched or eking out an escape on the very edge of a map.

There are other DRG-related change-ups, too, like an upgrade station that will only land if you clear the space for it, and the familiar secondary resource objectives you can try and collect on each map. And there’s the core trade-off of stopping to chip away at a valuable resource with your pickax while the aliens not only grow in number but slowly get more powerful as time wears on.

I’ve only had a few hours with DRG: Survivor, but I’m already eager to see what kinds of builds can be unlocked through some combination of luck and stubborn upgrade choices. While there is likely tuning and some fan-requested upgrades to be added on (and the developer promises more capabilities for your robot assistant), it feels quite full for an Early Access release, and especially at $9. It feels like a good first risk/reward decision to make before the game puts hundreds of smaller ones on you.

Deep Rock Galactic: Survivor is a fine entry point into the auto-shooting depths Read More »

musk’s-x-sold-checkmarks-to-hezbollah-and-other-terrorist-groups,-report-says

Musk’s X sold checkmarks to Hezbollah and other terrorist groups, report says

A photo of Elon Musk next to the logo for X, the social network formerly known as Twitter,.

Getty Images | NurPhoto

A watchdog group’s investigation found that terrorist group Hezbollah and other US-sanctioned entities have accounts with paid checkmarks on X, the Elon Musk-owned social network that still resides at the twitter.com domain.

The Tech Transparency Project (TTP), a nonprofit that is critical of Big Tech companies, said in a report today that “X, the platform formerly known as Twitter, is providing premium, paid services to accounts for two leaders of a US-designated terrorist group and several other organizations sanctioned by the US government.”

After buying Twitter for $44 billion, Musk started charging users for checkmarks that were previously intended to verify that an account was notable and authentic. “Along with the checkmarks, which are intended to confer legitimacy, X promises various perks for premium accounts, including the ability to post longer text and videos and greater visibility for some posts,” the Tech Transparency Project report noted.

The Tech Transparency Project suggests that X may be violating US sanctions. “The accounts identified by TTP include two that apparently belong to the top leaders of Lebanon-based Hezbollah and others belonging to Iranian and Russian state-run media,” the report said. “The fact that X requires users to pay a monthly or annual fee for premium service suggests that X is engaging in financial transactions with these accounts, a potential violation of US sanctions.”

Some of the accounts were verified before Musk bought Twitter, but verification was a free service at the time. Musk’s decision to charge for checkmarks means that X is “providing a premium, paid service to sanctioned entities,” which may raise “new legal issues,” the Tech Transparency Project said.

Report details 28 checkmarked accounts

Musk’s X charges $1,000 a month for a Verified Organizations subscription and last month added a basic tier for $200 a month. For individuals, the X Premium tiers that come with checkmarks cost $8 or $16 a month.

It’s possible for US companies to receive a license from the government to engage in certain transactions with sanctioned entities, but it doesn’t seem likely that X has such a license. X’s rules explicitly prohibit users from purchasing X Premium “if you are a person with whom X is not permitted to have dealings under US and any other applicable economic sanctions and trade compliance law.”

In all, the Tech Transparency Project said it found 28 “verified” accounts tied to sanctioned individuals or entities. These include individuals and groups listed by the US Treasury Department’s Office of Foreign Assets Control (OFAC) as “Specially Designated Nationals.”

“Of the 28 X accounts identified by TTP, 18 show they got verified after April 1, 2023, when X began requiring accounts to subscribe to paid plans to get a checkmark. The other 10 were legacy verified accounts, which are required to pay for a subscription to retain their checkmarks,” the group wrote, adding that it “found advertising in the replies to posts in 19 of the 28 accounts.”

We contacted X today and will update this article if we get a comment. Our email to [email protected] triggered the standard auto-reply from [email protected] that says, “Busy now, please check back later.”

Update at 4: 28pm ET: After this article was published, X issued the following statement: “X has a robust and secure approach in place for our monetization features, adhering to legal obligations, along with independent screening by our payments providers. Several of the accounts listed in the Tech Transparency Report are not directly named on sanction lists, while some others may have visible account check marks without receiving any services that would be subject to sanctions. Our teams have reviewed the report and will take action if necessary. We’re always committed to ensuring that we maintain a safe, secure and compliant platform.”

Musk’s X sold checkmarks to Hezbollah and other terrorist groups, report says Read More »

us-says-ai-models-can’t-hold-patents

US says AI models can’t hold patents

Robot inventors dismayed —

Inventors must be human, but there’s still a condition where AI can officially help.

An illustrated concept of a digital brain, crossed out.

On Tuesday, the United States Patent and Trademark Office (USPTO) published guidance on inventorship for AI-assisted inventions, clarifying that while AI systems can play a role in the creative process, only natural persons (human beings) who make significant contributions to the conception of an invention can be named as inventors. It also rules out using AI models to churn out patent ideas without significant human input.

The USPTO says this position is supported by “the statutes, court decisions, and numerous policy considerations,” including the Executive Order on AI issued by President Biden. We’ve previously covered attempts, which have been repeatedly rejected by US courts, by Dr. Stephen Thaler to have an AI program called “DABUS” named as the inventor on a US patent (a process begun in 2019).

This guidance follows themes previously set by the US Copyright Office (and agreed upon by a judge) that an AI model cannot own a copyright for a piece of media and that substantial human contributions are required for copyright protection.

Even though an AI model itself cannot be named an inventor or joint inventor on a patent, using AI assistance to create an invention does not necessarily disqualify a human from holding a patent, as the USPTO explains:

“While AI systems and other non-natural persons cannot be listed as inventors on patent applications or patents, the use of an AI system by a natural person(s) does not preclude a natural person(s) from qualifying as an inventor (or joint inventors) if the natural person(s) significantly contributed to the claimed invention.”

However, the USPTO says that significant human input is required for an invention to be patentable: “Maintaining ‘intellectual domination’ over an AI system does not, on its own, make a person an inventor of any inventions created through the use of the AI system.” So a person simply overseeing an AI system isn’t suddenly an inventor. The person must make a significant contribution to the conception of the invention.

If someone does use an AI model to help create patents, the guidance describes how the application process would work. First, patent applications for AI-assisted inventions must name “the natural person(s) who significantly contributed to the invention as the inventor,” and additionally, applications must not list “any entity that is not a natural person as an inventor or joint inventor, even if an AI system may have been instrumental in the creation of the claimed invention.”

Reading between the lines, it seems the contributions made by AI systems are akin to contributions made by other tools that assist in the invention process. The document does not explicitly say that the use of AI is required to be disclosed during the application process.

Even with the published guidance, the USPTO is seeking public comment on the newly released guidelines and issues related to AI inventorship on its website.

US says AI models can’t hold patents Read More »

google,-environmental-defense-fund-will-track-methane-emissions-from-space

Google, Environmental Defense Fund will track methane emissions from space

It’s a gas —

Satellite data + Google Maps + AI should help figure out where methane is leaking.

computer-generated image of a satellite highlighting emissions over a small square on the globe.

Enlarge / With color, high resolution.

Google/EDF

When discussing climate change, attention generally focuses on our soaring carbon dioxide emissions. But levels of methane have risen just as dramatically, and it’s a far more potent greenhouse gas. And, unlike carbon dioxide, it’s not the end result of a valuable process; methane largely ends up in the atmosphere as the result of waste, lost during extraction and distribution.

Getting these losses under control would be one of the easiest ways to slow down greenhouse warming. But tracking methane emissions often comes from lots of smaller, individual sources. To help get a handle on all the leaks, the Environmental Defense Fund has been working to put its own methane-monitoring satellite in orbit. On Wednesday, it announced that it was partnering with Google to take the data from the satellite, make it publicly available, and tie it to specific sources.

The case for MethaneSAT

Over the course of 20 years, methane is 84 times more potent than carbon dioxide when it comes to greenhouse warming. And most methane in the atmosphere ultimately reacts with oxygen, producing water vapor and carbon dioxide—both of which are also greenhouse gasses. Those numbers are offset by the fact that methane levels in the atmosphere are very low, currently just under two parts per million (versus over 400 ppm for CO2). Still, levels have gone up considerably since monitoring started.

The primary source of the excess methane is the extraction and distribution of natural gas. In the US, the EPA has developed rules meant to force companies with natural gas infrastructure to find and fix leaks. (Unsurprisingly, Texas plans to sue to block this rule.) But finding leaks has turned out to be a challenge. The US has been using industry-wide estimates that turned out to be much lower than numbers based on monitoring a subset of facilities.

Globally, that sort of detailed surveying simply isn’t possible, and we don’t have the type of satellite-based instruments we need to focus on methane emissions. A researcher behind one global survey said, “We were quite disappointed because we discovered that the sensitivity of our system was pretty low.” (The survey did identify sites that were “ultra emitters” despite the sensitivity issues.)

To help identify the major sources of methane release, the Environmental Defense Fund, a US-based NGO, has spun off a project called MethaneSAT that will monitor the emissions from space. The project is backed by large philanthropic donations and has partnered with the New Zealand Space Agency. The Rocket Lab launch company will build the satellite control center in New Zealand, while SpaceX will carry the 350 kg satellite to orbit in a shared launch, expected in early March.

Once in orbit, the hardware will use methane’s ability to absorb in the infrared—the same property that causes all the problems—to track emissions globally at a resolution down below a square kilometer.

Handling the data

That will generate large volumes of data that countries may struggle to interpret. That’s where the new Google partnership will come in. Google will use the same AI capability it has developed to map features such as roads and sidewalks on satellite images but repurpose it to identify oil and gas infrastructure. Both the MethaneSAT’s emissions data and infrastructure details will be combined and made available via the company’s Google Earth service.

Top image: A view of an area undergoing oil/gas extraction. Left: a close-up of an individual drilling site. Right: Computer-generated color coding of the hardware present at the site.

Top image: A view of an area undergoing oil/gas extraction. Left: a close-up of an individual drilling site. Right: Computer-generated color coding of the hardware present at the site.

Google / EDF

The project builds off work Google has done previously by placing methane monitoring hardware on Street View photography vehicles, also in collaboration with the Environmental Defense Fund.

In a press briefing, Google’s Yael Maguire said that the challenge is keeping things up to date, as infrastructure in the oil and gas industry can change fairly rapidly. While he didn’t use it as an example, one illustration of that challenge was the rapid development of liquified natural gas import infrastructure in Europe in the wake of Russia’s invasion of Ukraine.

The key question, however, is one of who’s going to use this information. Extraction companies could use it to identify the sites of leaks and fix them but are unlikely to do that in the absence of a regulatory requirement. Governments could rely on this information to take regulatory actions but will probably want some sort of independent vetting of the data before doing so. At the moment, all EDF is saying is that it’s engaging in discussions with several parties about potentially using the data.

One clear user will be the academic community, which is already using less-targeted satellite data to explore the issue of methane emissions.

Regardless, as everyone involved in the project emphasizes, getting methane under control is probably the easiest and quickest way to eliminate a bit of impending warming. And that could help countries meet emissions targets without immediately starting on some of the slower and more expensive options. So, even if no one has currently committed to using this data, they may ultimately come around—because using it to do something is better than doing nothing.

Google, Environmental Defense Fund will track methane emissions from space Read More »

backdoors-that-let-cops-decrypt-messages-violate-human-rights,-eu-court-says

Backdoors that let cops decrypt messages violate human rights, EU court says

Building of the European Court of Human Rights in Strasbourg (France).

Enlarge / Building of the European Court of Human Rights in Strasbourg (France).

The European Court of Human Rights (ECHR) has ruled that weakening end-to-end encryption disproportionately risks undermining human rights. The international court’s decision could potentially disrupt the European Commission’s proposed plans to require email and messaging service providers to create backdoors that would allow law enforcement to easily decrypt users’ messages.

This ruling came after Russia’s intelligence agency, the Federal Security Service (FSS), began requiring Telegram to share users’ encrypted messages to deter “terrorism-related activities” in 2017, ECHR’s ruling said. A Russian Telegram user alleged that FSS’s requirement violated his rights to a private life and private communications, as well as all Telegram users’ rights.

The Telegram user was apparently disturbed, moving to block required disclosures after Telegram refused to comply with an FSS order to decrypt messages on six users suspected of terrorism. According to Telegram, “it was technically impossible to provide the authorities with encryption keys associated with specific users,” and therefore, “any disclosure of encryption keys” would affect the “privacy of the correspondence of all Telegram users,” the ECHR’s ruling said.

For refusing to comply, Telegram was fined, and one court even ordered the app to be blocked in Russia, while dozens of Telegram users rallied to continue challenging the order to maintain Telegram services in Russia. Ultimately, users’ multiple court challenges failed, sending the case before the ECHR while Telegram services seemingly tenuously remained available in Russia.

The Russian government told the ECHR that “allegations that the security services had access to the communications of all users” were “unsubstantiated” because their request only concerned six Telegram users.

They further argued that Telegram providing encryption keys to FSB “did not mean that the information necessary to decrypt encrypted electronic communications would become available to its entire staff.” Essentially, the government believed that FSB staff’s “duty of discretion” would prevent any intrusion on private life for Telegram users as described in the ECHR complaint.

Seemingly most critically, the government told the ECHR that any intrusion on private lives resulting from decrypting messages was “necessary” to combat terrorism in a democratic society. To back up this claim, the government pointed to a 2017 terrorist attack that was “coordinated from abroad through secret chats via Telegram.” The government claimed that a second terrorist attack that year was prevented after the government discovered it was being coordinated through Telegram chats.

However, privacy advocates backed up Telegram’s claims that the messaging services couldn’t technically build a backdoor for governments without impacting all its users. They also argued that the threat of mass surveillance could be enough to infringe on human rights. The European Information Society Institute (EISI) and Privacy International told the ECHR that even if governments never used required disclosures to mass surveil citizens, it could have a chilling effect on users’ speech or prompt service providers to issue radical software updates weakening encryption for all users.

In the end, the ECHR concluded that the Telegram user’s rights had been violated, partly due to privacy advocates and international reports that corroborated Telegram’s position that complying with the FSB’s disclosure order would force changes impacting all its users.

The “confidentiality of communications is an essential element of the right to respect for private life and correspondence,” the ECHR’s ruling said. Thus, requiring messages to be decrypted by law enforcement “cannot be regarded as necessary in a democratic society.”

Martin Husovec, a law professor who helped to draft EISI’s testimony, told Ars that EISI is “obviously pleased that the Court has recognized the value of encryption and agreed with us that state-imposed weakening of encryption is a form of indiscriminate surveillance because it affects everyone’s privacy.”

Backdoors that let cops decrypt messages violate human rights, EU court says Read More »