#[1]alternate [2]News for nerds, stuff that matters [3]Search Slashdot [4]Slashdot RSS [5]Slashdot * [6]Stories * + Firehose + [7]All + [8]Popular * [9]Polls * [10]Software * [11]Thought Leadership * [12]Jobs [13]Submit Search Slashdot ____________________ (BUTTON) * [14]Login * or * [15]Sign up * Topics: * [16]Devices * [17]Build * [18]Entertainment * [19]Technology * [20]Open Source * [21]Science * [22]YRO * Follow us: * [23]RSS * [24]Facebook * [25]LinkedIn * [26]Twitter * [27]Youtube * [28]Mastodon * [29]Newsletter Catch up on stories from the past week (and beyond) at the [30]Slashdot story archive Nickname: ____________________ Password: ____________________ [ ] Public Terminal __________________________________________________________________ Log In [31]Forgot your password? [32]Close binspamdupenotthebestofftopicslownewsdaystalestupid freshfunnyinsightfulinterestingmaybe offtopicflamebaittrollredundantoverrated insightfulinterestinginformativefunnyunderrated descriptive typodupeerror Do you develop on GitHub? You can keep using GitHub but automatically [33]sync your GitHub releases to SourceForge quickly and easily with [34]this tool so your projects have a backup location, and get your project in front of SourceForge's nearly 20 million monthly users. It takes less than a minute. Get new users downloading your project releases today! [35]× 175198221 story [36]Space [37]New JWST Data Explores 'Hubble Constant' Tension for Universe's Expansion Rate [38](space.com) Posted by EditorDavid on Sunday October 06, 2024 @12:34PM from the expansion-packed dept. "Scientists can't agree on the exact rate of [39]expansion of the universe, dictated by the Hubble constant," a [40]new article at Space.com reminds us: The rate can be measured starting from the local (and therefore recent) universe, then going farther back in time — or, it can be calculated starting from the distant (and therefore early) universe, then working your way up. The issue is both methods deliver values that don't agree with each other. This is where the James Web Space Telescope (JWST) comes in. Gravitationally lensed supernovas in the early cosmos the JWST is observing could provide a third way of measuring the rate, potentially helping resolve this "Hubble trouble." "The supernova was named 'supernova Hope' since it gives astronomers hope to better understand the universe's changing expansion rate," Brenda Frye, study team leader and a University of Arizona researcher, said in a NASA [41]statement. This investigation of supernova Hope began when Frye and her global team of scientists found three curious points of light in a JWST image of a distant, densely packed cluster of galaxies. Those points of light in the image were not visible when the Hubble Space Telescope imaged the same cluster, known as PLCK G165.7+67.0 or, more simply, G165, back in 2015. "It all started with one question by the team: 'What are those three dots that weren't there before? Could that be a supernova?'" Frye said. The team noted a "high rate of star formation... more than 300 solar masses per year," [42]according to NASA's statement: Dr. Frye: "Initial analyses confirmed that these dots corresponded to an exploding star, one with rare qualities. First, it's a Type Ia supernova, an explosion of a white dwarf star. This type of supernova is generally called a 'standard candle,' meaning that the supernova had a known intrinsic brightness. Second, it is gravitationally lensed. Gravitational lensing is important to this experiment. The lens, consisting of a cluster of galaxies that is situated between the supernova and us, bends the supernova's light into multiple images... To achieve three images, the light traveled along three different paths. Since each path had a different length, and light traveled at the same speed, the supernova was imaged in this Webb observation at three different times during its explosion... Trifold supernova images are special: The time delays, supernova distance, and gravitational lensing properties yield a value for the Hubble constant... The team reports the value for the Hubble constant as 75.4 kilometers per second per megaparsec, plus 8.1 or minus 5.5... This is only the second measurement of the Hubble constant by this method, and the first time using a standard candle. Their result? "The Hubble constant value matches other measurements in the local universe, and is somewhat in tension with values obtained when the universe was young." apply tags__________ 175198105 story [43]Android [44]Google Starts Adding Anti-Theft Locking Features to Android Phones [45](engadget.com) [46]15 Posted by EditorDavid on Sunday October 06, 2024 @11:34AM from the locked-screens dept. An anonymous reader shared [47]this report from Engadget: Three new [48]theft protection features that Google [49]announced earlier this year have reportedly started rolling out on Android. The tools — Theft Detection Lock, Offline Device Lock and Remote Lock — are aimed at giving users a way to quickly lock down their devices if they've been swiped, so thieves can't access any sensitive information. Android reporter Mishaal Rahman [50]shared on social media that the first two tools had popped up on a Xiaomi 14T Pro, and said some Pixel users have started seeing Remote Lock. Theft Detection Lock is triggered by the literal act of snatching. The company said in May that the feature "uses Google AI to sense if someone snatches your phone from your hand and tries to run, bike or drive away." In such a scenario, it'll lock the phone's screen. The Android reporter summarized the other two locking features in [51]a post on Reddit: * Remote Lock "lets you remotely lock your phone using just your phone number in case you can't sign into Find My Device using your Google account password." * Offline Device Lock "automatically locks your screen if a thief tries to keep your phone disconnected from the Internet for an extended period of time." "All three features entered beta in August, starting in Brazil. Google told me the final versions of these features would more widely roll out this year, and it seems the features have begun expanding." apply tags__________ 175198475 story [52]Operating Systems [53]Hobbyist Builds a Modern System That Still Runs MS-DOS [54](yeokhengmeng.com) [55]11 Posted by EditorDavid on Sunday October 06, 2024 @10:34AM from the back-to-the-future dept. He's the long-time Slashdot reader who [56]installed Linux on a 1993 PC — and then [57]installed a 1994 version of MS-DOS on a modern Thinkpad X13. (And somewhere along the way, he even [58]built a ChatGPT client for DOS...) But in a new blog post, [59]yeokm1 reveals "I recently built myself a PC," salvaging parts from a previous desktop system to bootstrap an upgrade. And "I decided to [60]build one with the ability to still reach back into the past to run MS-DOS..." The result? A Ryzen 5 7600 and GeForce 4060 Ti system, but with a floppy drive, optical drive, Sound Blaster card, serial, parallel and PS/2 ports — that runs MS-DOS. The fact that a 30-year-old MS-DOS 6.22 can still work well enough on such a modern hardware is testament to the efforts made by the industry to ensure good x86 PC backward compatibility. AMD, Nvidia and Asus deserve to be commended on their efforts here. I'm also impressed that the modern Nvidia Geforce 4060 Ti still supports some legacy video BIOS modes to a usable level although this is not complete. I didn't document in this blog post but brief tests with other VESA modes and resolutions didn't work so well. I wonder how long more this amount of x86 PC backward-compatibility will continue to last though... It definitely feels like the end is near. Their blog post includes [61]a video about their system. (And yes, it plays Doom.) But their ultimate goal is to use it to play modern games like Cyberpunk 2077 and Flight Simulator 2020 (as well as the upcoming [62]Flight Simulator 2024) "at reasonably good settings and performance. (And also to experiment with light machine-learning workloads, do basic video editing, run virtual machines.) After successfully building their DOS-running system, they asked ChatGPT what it thought. Would the system's specs be powerful enough to handle the 30-year-old operation system? And ChatGPT confidently replied: "Neither the Ryzen 5 7600 nor the GeForce RTX 4060 Ti is designed to run DOS natively. DOS is an older operating system that was primarily used on x86 architecture from the late 20th century, and modern hardware like the Ryzen 5 7600 and GeForce RTX 4060 Ti are not compatible with DOS due to their 64-bit architecture and lack of necessary drivers to interface correctly with DOS, which relied on much older technology..." [63]yeokm1's blog post concludes: "I think I just proved ChatGPT wrong :P" apply tags__________ 175198499 story [64]Twitter [65]Brazil's Top Court Says X Paid Pending Fines to Wrong Bank [66](reuters.com) [67]34 Posted by EditorDavid on Sunday October 06, 2024 @06:46AM from the bank-shots dept. An anonymous reader shared [68]this report from Reuters: Brazil's Supreme Court said on Friday that lawyers representing social media platform X did not pay pending fines to the proper bank, postponing its decision on whether to allow the tech firm to resume services in Brazil. The payment of the fines, which X lawyers argued that the company had paid correctly, is the only outstanding measure demanded by the court in order to authorize X to operate again in Brazil... Earlier on Friday, X, owned by billionaire Elon Musk, filed a fresh request to have its services restored in Brazil, saying it had paid all pending fines. In response to the request, Supreme Court Justice Alexandre de Moraes requested the payment to be transferred to the right bank. He also determined that once fines are sorted out, Brazil's prosecutor general will give his opinion on the recent requests made by X's legal team in Brazil, which has been seeking to have the platform restored in the country. Following Moraes' decision on Friday, X lawyers again asked the court for authorization to resume operations in Brazil, denying that the company had paid the fines to the wrong account and saying they do not see the need for the prosecutor general to be consulted before the ban is lifted. apply tags__________ 175198349 story [69]China [70]China Trained a 1-Trillion-Parameter LLM Using Only Domestic Chips [71](theregister.com) [72]27 Posted by EditorDavid on Sunday October 06, 2024 @02:34AM from the in-the-chips dept. "China Telecom, one of the largest wireless carriers in mainland China, says that it has developed two large language models (LLMs) relying solely on domestically manufactured AI chips..." [73]reports Tom's Hardware. "If the information is accurate, this is a crucial milestone in China's attempt at becoming independent of other countries for its semiconductor needs, especially as the U.S. is increasingly tightening and banning the supply of the latest, highest-end chips for Beijing in the U.S.-China chip war." Huawei, which has mostly been banned from the U.S. and other allied countries, is one of the leaders in China's local chip industry... If China Telecom's LLMs were indeed fully trained using Huawei chips alone, then this would be a massive success for Huawei and the Chinese government. The project's [74]GitHub page "contains a hint about how China Telecom may have trained the model," [75]reports the Register, "in a mention of compatibility with the 'Ascend Atlas 800T A2 training server' — a Huawei product [76]listed as supporting the Kunpeng 920 7265 or Kunpeng 920 5250 processors, respectively running 64 cores at 3.0GHz and 48 cores at 2.6GHz. Huawei builds those processors using the Arm 8.2 architecture and [77]bills them as produced with a 7nm process." The South China Morning Post says the unnamed model [78]has 1 trillion parameters, according to China Telecom, while the TeleChat2t-115B model has over 100 billion parameters. Thanks to long-time Slashdot reader [79]hackingbear for sharing the news. apply tags__________ 175198031 story [80]IOS [81]iOS and Android Security Scare: Two Apps Found Supporting 'Pig Butchering' Scheme [82](forbes.com) [83]29 Posted by EditorDavid on Saturday October 05, 2024 @10:32PM from the phoning-it-in dept. "Pig Butchering Alert: [84]Fraudulent Trading App targeted iOS and Android users." That's the title of a new report released this week by cybersecurity company Group-IB revealing the official Apple App Store and Google Play store offered apps that were actually one part of a larger fraud campaign. "To complete the scam, the victim is asked to fund their account... After a few seemingly successful trades, the victim is persuaded to invest more and more money. The account balance appears to grow rapidly. However, when the victim attempts to withdraw funds, they are unable to do so." [85]Forbes reports: Group-IB determined that the frauds would begin with a period of social engineering reconnaissance and entrapment, during which the trust of the potential victim was gained through either a dating app, social media app or even a cold call. The attackers spent weeks on each target. Only when this "fattening up" process had reached a certain point would the fraudsters make their next move: recommending they download the trading app from the official App Store concerned. When it comes to the iOS app, which is the one that the report focussed on, Group-IB researchers said that the app remained on the App Store for several weeks before being removed, at which point the fraudsters switched to phishing websites to distribute both iOS and Android apps. The use of official app stores, albeit only fleetingly as Apple and Google removed the fake apps in due course, bestowed a sense of authenticity to the operation as people put trust in both the Apple and Google ecosystems to protect them from potentially dangerous apps. "The use of web-based applications further conceals the malicious activity," according to the researchers, "and makes detection more difficult." [A]fter the download is complete, the application cannot be launched immediately. The victim is then instructed by the cybercriminals to manually trust the Enterprise developer profile. Once this step is completed, the fraudulent application becomes operational... Once a user registers with the fraudulent application, they are tricked into completing several steps. First, they are asked to upload identification documents, such as an ID card or passport. Next, the user is asked to provide personal information, followed by job-related details... The first discovered application, distributed through the Apple App Store, functions as a downloader, merely retrieving and displaying a web-app URL. In contrast, the second application, downloaded from phishing websites, already contains the web-app within its assets. We believe this approach was deliberate, since the first app was available in the official store, and the cybercriminals likely sought to minimise the risk of detection. As previously noted, the app posed as a tool for mathematical formulas, and including personal trading accounts within an iOS app would have raised immediate suspicion. The app (which only runs on mobile phones) first launches a fake activity with formulas and graphics, according to the researchers. "We assume that this condition must bypass Apple's checks before being published to the store. As we can see, this simple trick allows cybercriminals to upload their fraudulent application to the Apple Store." They argue their research "reinforces the need for continued review of app store submissions to prevent such scams from reaching unsuspecting victims". But it also highlights "the importance of vigilance and end-user education, even when dealing with seemingly trustworthy apps..." "Our investigation began with an analysis of Android applications at the request of our client. The client reported that a user had been tricked into installing the application as part of a stock investment scam. During our research, we uncovered a list of similar fraudulent applications, one of which was available on the Google Play Store. These apps were designed to display stock-related news and articles, giving them a false sense of legitimacy." apply tags__________ 175197749 story [86]Privacy [87]License Plate Readers Are Creating a US-Wide Database of More Than Just Cars [88](wired.com) [89]65 Posted by EditorDavid on Saturday October 05, 2024 @08:32PM from the I'll-be-seeing-you dept. Wired reports on "AI-powered cameras mounted on cars and trucks, initially designed to capture license plates, but which are now [90]photographing political lawn signs outside private homes, individuals wearing T-shirts with text, and vehicles displaying pro-abortion bumper stickers — all while recordi00ng the precise locations of these observations..." The detailed photographs all surfaced in search results produced by the systems of DRN Data, a license-plate-recognition (LPR) company owned by Motorola Solutions. The LPR system can be used by private investigators, repossession agents, and insurance companies; a related Motorola business, called [91]Vigilant, gives cops access to the same LPR data. However, files shared with WIRED by artist Julia Weist, who is [92]documenting restricted datasets as part of her work, show how those with access to the LPR system can search for common phrases or names, such as those of politicians, and be served with photographs where the search term is present, even if it is not displayed on license plates... Beyond highlighting the far-reaching nature of LPR technology, which has collected billions of images of license plates, the research also shows how people's personal political views and their homes can be recorded into vast databases that can be queried. "It really reveals the extent to which surveillance is happening on a mass scale in the quiet streets of America," says Jay Stanley, a senior policy analyst at the American Civil Liberties Union. "That surveillance is not limited just to license plates, but also to a lot of other potentially very revealing information about people." DRN, in a statement issued to WIRED, said it complies with "all applicable laws and regulations...." Over more than a decade, DRN has amassed [93]more than 15 billion "vehicle sightings" across the United States, and it claims in its marketing materials that it amasses more than 250 million sightings per month. Images in DRN's commercial database are shared with police using its Vigilant system, but images captured by law enforcement are [94]not shared back into the wider database. The system is partly fueled by DRN "affiliates" who install cameras in their vehicles, such as repossession trucks, and capture license plates as they drive around. Each vehicle can have up to four cameras attached to it, capturing images in all angles. These affiliates [95]earn monthly bonuses and can also receive [96]free cameras and search credits... "License plate recognition (LPR) technology supports public safety and community services, from helping to find abducted children and stolen vehicles to automating toll collection and lowering insurance premiums by mitigating insurance fraud," Jeremiah Wheeler, the president of DRN, says in a statement... Wheeler did not respond to WIRED's questions about whether there are limits on what can be searched in license plate databases, why images of homes with lawn signs but no vehicles in sight appeared in search results, or if filters are used to reduce such images. Privacy experts shared their reactions with Wired * "Perhaps [people] want to express themselves in their communities, to their neighbors, but they don't necessarily want to be logged into a nationwide database that's accessible to police authorities." — Jay Stanley, a senior policy analyst at the American Civil Liberties Union * "When government or private companies promote license plate readers, they make it sound like the technology is only looking for lawbreakers or people suspected of stealing a car or involved in an amber alert, but that's just not how the technology works. The technology collects everyone's data and stores that data often for immense periods of time." — Dave Maass, an EFF director of [97]investigations * "The way that the country is set up was to protect citizens from government overreach, but there's not a lot put in place to protect us from private actors who are engaged in business meant to make money." — Nicole McConlogue, associate law professor at Mitchell Hamline School of Law (who has researched license-plate-surveillance systems) Thanks to long-time Slashdot reader [98]schwit1 for sharing the article. apply tags__________ 175197529 story [99]The Military [100]How Mossad Planned Its Exploding Pager Operation: Inside Israel's Penetration of Hezbollah [101](msn.com) [102]218 Posted by EditorDavid on Saturday October 05, 2024 @06:59PM from the incoming-message dept. The Washington Post interviewed Lebanese officials, people close to Hezbollah, and Israeli, Arab and U.S. security officials and politicians about a years-long plan (originated at Mossad headquarters) that ultimately [103]killed or maimed "as many as 3,000 Hezbollah officers and members — most of them rear-echelon figures... along with an unknown number of civilians... when Israel's Mossad intelligence service triggered the devices remotely on September 17." In the initial sales pitch to Hezbollah two years ago, the new line of Apollo pagers seemed precisely suited to the needs of a militia group with a sprawling network of fighters and a hard-earned reputation for paranoia... Best of all, there was no risk that the pagers could ever be tracked by Israel's intelligence services. Hezbollah's leaders were so impressed they bought 5,000 of them and began handing them out to mid-level fighters and support personnel in February. None of the users suspected they were wearing an ingeniously crafted Israeli bomb... Israeli officials had watched with increasing anxiety as the Lebanese group added new weapons to an arsenal already capable of striking Israeli cities with tens of thousands of precision-guided missiles. Mossad, the Israeli intelligence service responsible for combating foreign threats to the Jewish state, had worked for years to penetrate the group with electronic monitoring and human informants. Over time, Hezbollah leaders learned to worry about the group's vulnerability to Israeli surveillance and hacking, fearing that even ordinary cellphones could be turned into Israeli-controlled eavesdropping and tracking devices. Thus was born the idea of creating a kind of communications Trojan horse, the officials said. Hezbollah was looking for hack-proof electronic networks for relaying messages, and Mossad came up with a pair of ruses that would lead the militia group to purchase devices that seemed perfect for the job — equipment that Mossad designed and had assembled in Israel. The first part of the plan, booby-trapped walkie-talkies, began being inserted into Lebanon by Mossad nearly a decade ago, in 2015. The mobile two-way radios contained oversized battery packs, a hidden explosive and a transmission system that gave Israel complete access to Hezbollah communications. For nine years, the Israelis contented themselves with eavesdropping on Hezbollah, the officials said, while reserving the option to turn the walkie-talkies into bombs in a future crisis. But then came a new opportunity and a glitzy new product: a small pager equipped with a powerful explosive. In an irony that would not become clear for many months, Hezbollah would end up indirectly paying the Israelis for the tiny bombs that would kill or wound many of its operatives. Because Hezbollah leaders were alert to possible sabotage, the pagers could not originate in Israel, the United States or any other Israeli ally. So, in 2023, the group began receiving solicitations for the bulk purchase of Taiwanese-branded Apollo pagers, a well-recognized trademark and product line with a worldwide distribution and no discernible links to Israeli or Jewish interests. The Taiwanese company had no knowledge of the plan, officials said... The marketing official had no knowledge of the operation and was unaware that the pagers were physically assembled in Israel under Mossad oversight, officials said... In a feat of engineering, the bomb component was so carefully hidden as to be virtually undetectable, even if the device was taken apart, the officials said. Israeli officials believe that Hezbollah did disassemble some of the pagers and may have even X-rayed them. "Thousands of Apollo-branded pagers rang or vibrated at once, all across Lebanon and Syria," according to the article, with a short sentence in Arabic that said "You received an encrypted message." The two-button de-encryption procedure "ensured most users would be holding the pager with both hands when it detonated," according to the article, although "Less than a minute later, thousands of other pagers exploded by remote command, regardless of whether the user ever touched his device. The following day, on September 18, hundreds of walkie-talkies blew up in the same way, killing and maiming users and bystanders..." "As Hezbollah reeled, Israel struck again, pounding the group's headquarters, arsenals and logistic centers with 2,000-pound bombs," the article concludes. And the strike "convinced the country's political leaders that Hezbollah could be put on the ropes, susceptible to a systematic dismantling using airstrikes and, eventually a ground invasion..." apply tags__________ 175197209 story [104]China [105]U.S. Wiretap Systems Targeted in China-Linked Hack [106](msn.com) [107]20 Posted by EditorDavid on Saturday October 05, 2024 @05:21PM from the too-big-for-your-breaches dept. "A cyberattack tied to the Chinese government penetrated the networks of a swath of U.S. broadband providers," [108]reports the Wall Street Journal, "potentially accessing information from systems the federal government uses for court-authorized network wiretapping requests. "For months or longer, the hackers might have held access to network infrastructure used to cooperate with lawful U.S. requests for communications data, according to people familiar with the matter, which amounts to a major national security risk." The attackers also had access to other tranches of more generic internet traffic, they said. Verizon Communications, AT&T and Lumen Technologies are among the companies whose networks were breached by the recently discovered intrusion, the people said. The widespread compromise is considered a potentially catastrophic security breach and was carried out by a sophisticated Chinese hacking group dubbed Salt Typhoon. It appeared to be geared toward intelligence collection, the people said... The surveillance systems believed to be at issue are used to cooperate with requests for domestic information related to criminal and national security investigations. Under federal law, telecommunications and broadband companies must allow authorities to intercept electronic information pursuant to a court order. It couldn't be determined if systems that support foreign intelligence surveillance were also vulnerable in the breach... The hackers appear to have engaged in a vast collection of internet traffic from internet service providers that count businesses large and small, and millions of Americans, as their customers. Additionally, there are indications that the hacking campaign targeted a small number of service providers outside the U.S., the people said. A person familiar with the attack said the U.S. government considered the intrusions to be historically significant and worrisome... "It will take time to unravel how bad this is, but in the meantime it's the most significant in a long string of wake-up calls that show how the PRC has stepped up their cyber game," said Brandon Wales, former executive director at the Cybersecurity and Infrastructure Security Agency and now a vice president at SentinelOne, referring to the People's Republic of China. "If companies and governments weren't taking this seriously before, they absolutely need to now." Three weeks ago [109]TechCrunch also reported that the FBI "took control of a botnet made up of hundreds of thousands of internet-connected devices, such as cameras, video recorders, storage devices, and routers, which was run by a Chinese government hacking group, FBI director Christopher Wray and U.S. government agencies revealed Wednesday. apply tags__________ 175194527 story [110]Crime [111]Criminal Charges Announced Over Multi-Year Fraud Scheme in a Carbon Credits Market [112](marketwatch.com) [113]41 Posted by EditorDavid on Saturday October 05, 2024 @03:34PM from the up-in-smoke dept. This week the U.S. Attorney's Office for the Southern District of New York [114]unsealed charges over a "scheme to commit fraud" in carbon markets, which they say fraudulently netted one company "tens of millions of dollars" worth of credits — which led to "securing an investment of over $100 million." [115]MarketWatch reports: Ken Newcombe had spent years building a program to distribute more environmentally friendly cookstoves for free to rural communities in Africa and Southeast Asia. The benefit for his company, C-Quest Capital, would be the carbon credits it would receive in exchange for reducing the amount of fuel people burned in order to cook food — credits the company could then sell for a profit to big oil companies like BP. But when Newcombe tried to ramp up the program, federal prosecutors said in an indictment made public Wednesday, he quickly realized that the stoves wouldn't deliver the emissions savings he had promised investors. Rather than admit his mistake, he and his partners cooked the books instead, prosecutors said... That allowed them to obtain carbon credits worth tens of millions of dollars that they didn't deserve, prosecutors said. On the basis of the fraudulently gained credits, prosecutors said, C-Quest was able to secure $250 million in funding from an outside investor. "The alleged actions of the defendants and their co-conspirators risked undermining the integrity of [the global market for carbon credits], which is an important part of the fight against climate change," said Damian Williams, the U.S. attorney for the Southern District of New York. From [116]announced by the U.S. Attorney's Office: U.S. Attorney Damian Williams said... "The alleged actions of the defendants and their co-conspirators risked undermining the integrity of that market, which is an important part of the fight against climate change. Protecting the sanctity and integrity of the financial markets continues to be a cornerstone initiative for this Office, and we will continue to be vigilant in rooting out fraud in the market for carbon credits...." While most carbon credits are created through, and trade in compliance markets, there is also a voluntary carbon market. Voluntary markets revolve around companies and entities that voluntarily set goals to reduce or offset their carbon emissions, often to align with goals from employees or shareholders. In voluntary markets, the credits are issued by non-governmental organizations, using standards for measuring emission reductions that they develop based on input from market participants, rather than on mandates from governments. The non-governmental organizations issue voluntary carbon credits to project developers that run projects that reduce emissions or remove greenhouse gases from the atmosphere. CQC was a for-profit company that ran projects to generate carbon credits — including a type of credit known as a voluntary carbon unit ("VCU") — by reducing emissions of greenhouse gases. CQC profited by selling VCUs it obtained, often to companies seeking to offset the impact of greenhouse gases they emit in the course of operating their businesses. The company itself was not charged due to "voluntary and timely self-disclosure of misconduct," according to the announcement, along with "full and proactive cooperation, timely and appropriate remediation, and agreement to cancel or void certain voluntary carbon units. apply tags__________ 175194641 story [117]Earth [118]Plastic-Eating Bacteria Could Combat Pollution Problems, Scientists Hope [119](msn.com) [120]49 Posted by EditorDavid on Saturday October 05, 2024 @02:34PM from the junk-food dept. The Washington Post on scientists who "discovered that bacteria commonly found in wastewater [121]can break down plastic to turn it into a food source, a finding that researchers hope could be a promising answer to combat one of Earth's major pollution problems." In a [122]study published Thursday in Environmental Science and Technology, scientists laid out their examination of Comamonas testosteroni, a bacteria that grows on polyethylene terephthalate, or PET, a plastic commonly found in single-use food packaging and water bottles. PET makes up about 12 percent of global solid waste and [123]90 million tons of the plastic produced each year... Unlike most other bacteria, which thrive on sugar, C. testosteroni has a more refined palate, including chemically complex materials from plants and plastics that take longer to decompose. The researchers are the first to demonstrate not only that this bacteria can break down plastic, but they also illuminate exactly how they do it. Through six meticulous steps, involving complex imaging and gene editing techniques, the authors found that the bacteria first physically break down plastic by chewing it into smaller pieces. Then, they release enzymes — components of a cell that speed up chemical reactions — to chemically break down the plastic into a carbon-rich food source known as terephthalate... The bacteria take a few months to break down chunks of plastic, according to Rebecca Wilkes [a lead author on the study and postdoctoral researcher at the National Renewable Energy Laboratory]. As a result, if the bacteria are going to be efficient tools, a lot of optimization needs to take place to speed up the rate at which they decompose pollutants. One approach is to promote bacterial growth by providing them with an additional food source, such as a chemical known as acetate. A senior author on the study (and associate professor of civil and environmental engineering at Northwestern University) tells the Washington Post that "The machinery in environmental microbes is still a largely untapped potential for uncovering sustainable solutions we can exploit." apply tags__________ 175194025 story [124]Cellphones [125]America's FCC Orders T-Mobile To Deliver Better Cybersecurity [126](csoonline.com) [127]11 Posted by EditorDavid on Saturday October 05, 2024 @01:34PM from the phoning-it-in dept. T-Mobile experienced three major data breaches in [128]2021, 2022, and [129]2023, according [130]to CSO Online, "which impacted millions of its customers." After a series of investigations by America's Federal Communications Commission, T-Mobile agreed in court to a number of settlement conditions, including moving toward a "modern zero-trust architecture," designating a Chief Information Security Office, implementing phishing-resistant multifactor authentication, and adopting data minimization, data inventory, and data disposal processes designed to limit its collection and retention of customer information. Slashdot reader [131]itwbennett writes: According to a [132]consent decree published on Monday by the U.S. Federal Communications Commission, T-Mobile must pay a $15.75 million penalty and invest an equal amount "to strengthen its cybersecurity program, and develop and implement a compliance plan to protect consumers against similar data breaches in the future." "Implementing these practices will require significant — and long overdue — investments. To do so at T-Mobile's scale will likely require expenditures an order of magnitude greater than the civil penalty here,' the consent decree said. The article points out that order of magnitude greater than $15.75 million would be $157.5 million... apply tags__________ 175194095 story [133]Security [134]Akamai Warns CUPS Vulnerability Also Brings New Threat of DDoS Attacks [135](akamai.com) [136]58 Posted by EditorDavid on Saturday October 05, 2024 @12:34PM from the CUPS-runneth-over dept. Last week [137]the Register warned "If you're running the Unix printing system CUPS, with cups-browsed present and enabled, you may be vulnerable to attacks that could lead to your computer being commandeered over the network or internet." (Although the CEO of cybersecurity platform watchTowr told them "the vulnerability impacts less than a single-digit percentage of all deployed internet-facing Linux systems.") But Tuesday [138]generic (Slashdot reader #14,144) shared [139]this new warning from Akamai: Akamai researchers have confirmed a new attack vector using CUPS that could be leveraged to stage distributed denial-of-service (DDoS) attacks. Research shows that, to begin the attack, the attacking system only needs to send a single packet to a vulnerable and exposed CUPS service with internet connectivity. The Akamai Security Intelligence and Response Team (SIRT) found that more than 198,000 devices are vulnerable to this attack vector and are accessible on the public internet; roughly 34% of those could be used for DDoS abuse (58,000+). Of the 58,000+ vulnerable devices, hundreds exhibited an "infinite loop" of requests. The limited resources required to initiate a successful attack highlights the danger: It would take an attacker mere seconds to co-opt every vulnerable CUPS service currently exposed on the internet and cost the attacker less than a single US cent on modern hyperscaler platforms. apply tags__________ 175193985 story [140]Power [141]Will Hurricanes Prompt More Purchases of Electric Cars? [142](msn.com) [143]240 Posted by EditorDavid on Saturday October 05, 2024 @11:34AM from the power-moves dept. Days after a hurricane struck America's southeast, Florida's state's fire marshall "confirmed 16 lithium-ion battery fires related to storm surge," [144]according to local news reports. "Officials said six of those fires are associated with electric vehicles and they are working with fire departments statewide to gather more data." (Earlier this year America's [145]federal transportation safety agency estimated that after a 2022 hurricane "about 36 EVs caught on fire. In several instances, the fire erupted while the impacted EVs were being towed on their flatbed trailers.") But Tuesday, when over 1 million Americans were without electricity, the Atlantic pointed out the other side of the story. "[146]EV owners are using their cars to keep the lights on." When Hurricane Helene knocked out the power in Charlotte, North Carolina, on Friday, Dustin Baker, like many other people across the Southeast, turned to a backup power source. His just happened to be an electric pickup truck. Over the weekend, Baker ran extension cords from the back of his Ford F-150 Lightning, using the truck's battery to keep his refrigerator and freezer running. It worked so well that Baker became an energy Good Samaritan. "I ran another extension cord to my neighbor so they could run two refrigerators they have," he told me. Americans in hurricane territory have long kept diesel-powered generators as a way of life, but electric cars are a leap forward. An EV, at its most fundamental level, is just a big battery on wheels that can be used to power anything, not only the car itself. Some EVs pack enough juice to power a whole home for several days, or a few appliances for even longer. In the aftermath of Helene, as millions of Americans were left without power, many EV owners did just that. A [147]vet clinic that had lost power used an electric F-150 to keep its medicines cold and continue seeing patients during the blackout. One Tesla Cybertruck owner [148]used his car to power his home after his entire neighborhood lost power. One Louisiana man just ran cords straight from the outlets in the bed of his Tesla Cybertruck, according to the article. "We were able to run my internet router and TV, [plus] lamps, refrigerator, a window AC unit, and fans, as well as several phone, watch, and laptop chargers." Over the course of about 24 hours, he said, all of this activity ran his Cybertruck battery down from 99 percent to 80 percent... Bidirectional charging may prove to be the secret weapon that sells electrification to the South, which has generally [149]remained far behind the West and the Northeast in electric-vehicle purchases. If EVs become widely seen as the best option for blackouts, they could entice not just the climate conscious but also the suburban dads in hurricane country with a core belief in prepping for anything. It will take a lot to overcome the widespread distrust of EVs and anxiety about a new technology, but our loathing of power outages just might do the trick. The article notes that Tesla has confirmed all its electric vehicles [150]will support bidirectional charging by 2025. apply tags__________ 175193795 story [151]GNU is Not Unix [152]Free Software Foundation Celebrates 39th Anniversary [153](fsf.org) [154]14 Posted by EditorDavid on Saturday October 05, 2024 @10:34AM from the happy-birthday dept. "Can you believe that we've been demanding user freedom since 1985?" asks [155]a new blog post at FSF.org: Today, we're celebrating our thirty-ninth anniversary, the "lace year," which represents the intertwined nature and strength of our relationship with the free software community. We wouldn't be here without you, and we are so grateful for everyone who has stood with us, advocating for a world where complete user freedom is the norm and not the exception. As we celebrate our anniversary and reflect on the past thirty-nine years, we feel inspired by how far we've come, not only as a movement but as an organization, and the [156]changes that we've gone through. While we inevitably have challenges ahead, we feel encouraged and eager to take them on knowing that you'll be right there with us, working for a free future for everyone. Here's to many more years of fighting for user freedom! Their suggestions for celebrating include: * Try a [157]fully free distribution of GNU/Linux or help someone else give it a try * Learn how to [158]encrypt your emails and opt out of [159]bulk surveillance * Take a small step with big impact and swap out one nonfree program with one that's truly [160]free * If you have an Android phone, download [161]F-Droid, which is a catalogue of hundreds of free software applications * Wish us happy birthday [162]on social media. [Which for the FSF is [163]Mastodon, [164]PeerTube, and [165]GNU social.] * Join a [166]Free Software Directory (FSD) meeting, which we host every Friday from 16:00 to 19:00 UTC. * Become an [167]associate member or [168]gift a membership to a friend * [169]Donate $39 to help support free software advocacy * Print off [170]stickers of our 39th birthday cake * Change your desktop background to [171]an early-2000s-cyberspace-inspired image of our former front desk. (And then [172]switch out your browser theme to match your new desktop background.) And to help with the celebrations they share a [173]free video teaching the basics of SuperCollider (the free and open source [174]audio synthesis/algorithmic composition software). The video appears on FramaTube, an instance of the decentralized (and ActivityPub-federated) Peertube video platform, supported by the French non-profit Framasoft and powered by WebTorrent, using peer-to-peer technology to reduce load on individual servers. apply tags__________ [175]« Newer [176]Older » Slashdot Top Deals Slashdot Top Deals [177]Slashdot Deals Slashdot Poll Which desktop OS do you prefer? (*) Linux ( ) Mac ( ) Windows (BUTTON) vote now [178]Read the 100 comments | 12798 votes Looks like someone has already voted from this IP. If you would like to vote please login and try again. Which desktop OS do you prefer? 0 Percentage of others that also voted for: * [179]view results * Or * * [180]view more [181]Read the 100 comments | 12798 voted Most Discussed * 239 comments [182]Will Hurricanes Prompt More Purchases of Electric Cars? * 212 comments [183]How Mossad Planned Its Exploding Pager Operation: Inside Israel's Penetration of Hezbollah * 189 comments [184]Bird Flu Fears Stoke the Race for an mRNA Flu Vaccine * 154 comments [185]We May Have Passed Peak Obesity * 79 comments [186]Antarctica is 'Greening' at Dramatic Rate as Climate Heats Developers * [187]OpenAI Opens Its Speech AI Engine To Developers * [188]uBlock Origin Lite Maker Ends Firefox Store Support, Slams Mozilla For Hostile Reviews * [189]Are AI Coding Assistants Really Saving Developers Time? * [190]Can AI Developers Be Held Liable for Negligence? * [191]Oracle Owns Nearly a Third of Arm Chip House Ampere, Could Take Control In 2027 [192]This Day on Slashdot 2013 [193]Slashdot Asks: How Does the US Gov't Budget Crunch Affect You? 1144 comments 2012 [194]Hiring Smokers Banned In South Florida City 1199 comments 2011 [195]Steve Jobs Dead At 56 1613 comments 2010 [196]Firefighters Let House Burn Because Owner Didn't Pay Fee 2058 comments 2005 [197]EU, UN to Wrestle Internet Control From US 1974 comments [198]Sourceforge Top Downloads * [199]TrueType core fonts 2.2B downloads * [200]Notepad++ Plugin Mgr 1.5B downloads * [201]VLC media player 899M downloads * [202]eMule 686M downloads * [203]MinGW 631M downloads Powered By [204]sf [205]Slashdot * [206]Today * [207]Saturday * [208]Friday * [209]Thursday * [210]Wednesday * [211]Tuesday * [212]Monday * [213]Sunday * [214]Submit Story "You must have an IQ of at least half a million." -- Popeye * [215]FAQ * [216]Story Archive * [217]Hall of Fame * [218]Advertising * [219]Terms * [220]Privacy Statement * [221]About * [222]Feedback * [223]Mobile View * [224]Blog * * (BUTTON) Icon Do Not Sell or Share My Personal Information Copyright © 2024 Slashdot Media. All Rights Reserved. × [225]Close [226]Close [227]Slashdot [njs.gif?763] Working... References Visible links: 1. https://m.slashdot.org/ 2. https://slashdot.org/ 3. https://slashdot.org/search.pl 4. https://rss.slashdot.org/Slashdot/slashdotMain 5. https://slashdot.org/ 6. https://slashdot.org/ 7. https://slashdot.org/recent 8. https://slashdot.org/popular 9. https://slashdot.org/polls 10. https://slashdot.org/software/ 11. https://slashdot.org/content/ 12. https://slashdot.org/jobs 13. https://slashdot.org/submission 14. https://slashdot.org/my/login 15. https://slashdot.org/my/newuser 16. https://devices.slashdot.org/ 17. https://build.slashdot.org/ 18. https://entertainment.slashdot.org/ 19. https://technology.slashdot.org/ 20. https://slashdot.org/?fhfilter=opensource 21. https://science.slashdot.org/ 22. https://yro.slashdot.org/ 23. https://rss.slashdot.org/Slashdot/slashdotMain 24. https://www.facebook.com/slashdot 25. https://www.linkedin.com/company/slashdot 26. https://twitter.com/slashdot 27. https://www.youtube.com/channel/UCsW36751Gy-EAbHQwe9WBNw 28. https://mastodon.cloud/@slashdot 29. https://slashdot.org/newsletter 30. https://slashdot.org/archive.pl 31. https://slashdot.org/my/mailpassword 32. https://slashdot.org/ 33. https://sourceforge.net/p/forge/documentation/GitHub Importer/ 34. https://sourceforge.net/p/import_project/github/ 35. https://slashdot.org/ 36. https://slashdot.org/index2.pl?fhfilter=space 37. https://science.slashdot.org/story/24/10/06/0218226/new-jwst-data-explores-hubble-constant-tension-for-universes-expansion-rate 38. https://www.space.com/james-webb-space-telescope-hubble-tension-supernova-hope 39. https://www.space.com/52-the-expanding-universe-from-the-big-bang-to-today.html 40. https://www.space.com/james-webb-space-telescope-hubble-tension-supernova-hope 41. https://blogs.nasa.gov/webb/2024/10/01/webb-researchers-discover-lensed-supernova-confirm-hubble-tension/ 42. https://blogs.nasa.gov/webb/2024/10/01/webb-researchers-discover-lensed-supernova-confirm-hubble-tension/ 43. https://slashdot.org/index2.pl?fhfilter=android 44. https://it.slashdot.org/story/24/10/06/0140232/google-starts-adding-anti-theft-locking-features-to-android-phones 45. https://www.engadget.com/mobile/smartphones/googles-theft-protection-features-have-started-showing-up-for-some-android-users-210634941.html 46. https://it.slashdot.org/story/24/10/06/0140232/google-starts-adding-anti-theft-locking-features-to-android-phones#comments 47. https://www.engadget.com/mobile/smartphones/googles-theft-protection-features-have-started-showing-up-for-some-android-users-210634941.html 48. https://www.engadget.com/android-15-will-make-it-harder-for-phone-thieves-to-steal-your-data-170037992.html 49. https://blog.google/products/android/android-theft-protection/ 50. https://www.threads.net/@mishaal_rahman/post/DAvsUr-vliG?xmt=AQGzBhUX9k3B7KBxsuyG3h0vSEW0gqNaMm8vdt4U8MEcXA 51. https://www.reddit.com/r/Android/comments/1fwg6oc/google_is_starting_to_roll_out_theft_detection/ 52. https://slashdot.org/index2.pl?fhfilter=os 53. https://tech.slashdot.org/story/24/10/06/0342212/hobbyist-builds-a-modern-system-that-still-runs-ms-dos 54. https://yeokhengmeng.com/2024/10/modern-pc-vintage-twist/ 55. https://tech.slashdot.org/story/24/10/06/0342212/hobbyist-builds-a-modern-system-that-still-runs-ms-dos#comments 56. https://linux.slashdot.org/story/18/01/07/228222/can-you-install-linux-on-a-1993-pc 57. https://tech.slashdot.org/story/24/08/19/0324207/doss-last-stand-on-a-modern-thinkpad-x13-with-an-intel-10th-gen-core-cpu 58. https://slashdot.org/story/23/03/26/1811249/developer-builds-a-chatgpt-client-for-ms-dos 59. https://www.slashdot.org/~yeokm1 60. https://yeokhengmeng.com/2024/10/modern-pc-vintage-twist/ 61. https://youtu.be/yVtC54Ax3AU 62. https://www.flightsimulator.com/microsoft-flight-simulator-2024/ 63. https://www.slashdot.org/~yeokm1 64. https://slashdot.org/index2.pl?fhfilter=twitter 65. https://slashdot.org/story/24/10/06/0350219/brazils-top-court-says-x-paid-pending-fines-to-wrong-bank 66. https://www.reuters.com/technology/musks-x-seek-resumption-brazil-service-fines-paid-sources-say-2024-10-04/ 67. https://slashdot.org/story/24/10/06/0350219/brazils-top-court-says-x-paid-pending-fines-to-wrong-bank#comments 68. https://www.reuters.com/technology/musks-x-seek-resumption-brazil-service-fines-paid-sources-say-2024-10-04/ 69. https://slashdot.org/index2.pl?fhfilter=china 70. https://hardware.slashdot.org/story/24/10/06/036220/china-trained-a-1-trillion-parameter-llm-using-only-domestic-chips 71. https://www.theregister.com/2024/10/02/china_telecom_model_trained_local_tech/ 72. https://hardware.slashdot.org/story/24/10/06/036220/china-trained-a-1-trillion-parameter-llm-using-only-domestic-chips#comments 73. https://www.tomshardware.com/tech-industry/artificial-intelligence/state-owned-china-telecom-has-trained-domestic-ai-llms-using-homegrown-chips-one-model-reportedly-uses-1-trillion-parameters 74. https://github.com/Tele-AI/TeleChat2 75. https://www.theregister.com/2024/10/02/china_telecom_model_trained_local_tech/ 76. https://support.huawei.com/enterprise/en/doc/EDOC1100349801/cd591fd8/technical-specifications#EN-US_TOPIC_0000001530341030 77. https://www.hisilicon.com/en/products/Kunpeng/Huawei-Kunpeng/Huawei-Kunpeng-920 78. https://www.scmp.com/tech/big-tech/article/3280588/china-telecom-say-ai-model-1-trillion-parameters-trained-chinese-chips?module=perpetual_scroll_0 79. https://slashdot.org/~hackingbear 80. https://slashdot.org/index2.pl?fhfilter=ios 81. https://yro.slashdot.org/story/24/10/06/0122217/ios-and-android-security-scare-two-apps-found-supporting-pig-butchering-scheme 82. https://www.forbes.com/sites/daveywinder/2024/10/04/security-scare-over-2-dangerous-android-ios-apps-from-apple-app-store-google-play-store/ 83. https://yro.slashdot.org/story/24/10/06/0122217/ios-and-android-security-scare-two-apps-found-supporting-pig-butchering-scheme#comments 84. https://www.group-ib.com/blog/pig-butchering/ 85. https://www.forbes.com/sites/daveywinder/2024/10/04/security-scare-over-2-dangerous-android-ios-apps-from-apple-app-store-google-play-store/ 86. https://slashdot.org/index2.pl?fhfilter=privacy 87. https://yro.slashdot.org/story/24/10/05/2353244/license-plate-readers-are-creating-a-us-wide-database-of-more-than-just-cars 88. https://www.wired.com/story/license-plate-readers-political-signs-bumper-stickers/ 89. https://yro.slashdot.org/story/24/10/05/2353244/license-plate-readers-are-creating-a-us-wide-database-of-more-than-just-cars#comments 90. https://www.wired.com/story/license-plate-readers-political-signs-bumper-stickers/ 91. https://www.motorolasolutions.com/content/dam/msi/docs/products/license-plate-recognition-systems/vigilant-vehiclemanager/vigilant_vehiclemanager_brochure.pdf 92. https://work.deaccession.org/vehicle-sightings/ 93. https://drndata.com/wp-content/uploads/2022/11/DRNsights-Investigations-Fact-Sheet.pdf 94. https://www.motorolasolutions.com/content/dam/msi/docs/products/license-plate-recognition-systems/vigilant-vehiclemanager/lpr_data_management_faq_en_us.pdf 95. https://drndata.com/blog/content_library/drn-af-filiates-revenue-share-program/ 96. https://drndata.com/elevate-the-agent/ 97. https://www.eff.org/cases/automated-license-plate-readers 98. https://www.slashdot.org/~schwit1 99. https://slashdot.org/index2.pl?fhfilter=military 100. https://news.slashdot.org/story/24/10/05/2258205/how-mossad-planned-its-exploding-pager-operation-inside-israels-penetration-of-hezbollah 101. https://www.msn.com/en-us/news/other/mossad-s-pager-operation-inside-israel-s-penetration-of-hezbollah/ar-AA1rKXwe 102. https://news.slashdot.org/story/24/10/05/2258205/how-mossad-planned-its-exploding-pager-operation-inside-israels-penetration-of-hezbollah#comments 103. https://www.msn.com/en-us/news/other/mossad-s-pager-operation-inside-israel-s-penetration-of-hezbollah/ar-AA1rKXwe 104. https://slashdot.org/index2.pl?fhfilter=china 105. https://slashdot.org/story/24/10/05/2118247/us-wiretap-systems-targeted-in-china-linked-hack 106. https://www.msn.com/en-us/news/technology/u-s-wiretap-systems-targeted-in-china-linked-hack/ar-AA1rIZKx 107. https://slashdot.org/story/24/10/05/2118247/us-wiretap-systems-targeted-in-china-linked-hack#comments 108. https://www.msn.com/en-us/news/technology/u-s-wiretap-systems-targeted-in-china-linked-hack/ar-AA1rIZKx 109. https://techcrunch.com/2024/09/18/u-s-government-took-control-of-a-botnet-run-by-chinese-government-hackers-says-fbi-director/ 110. https://slashdot.org/index2.pl?fhfilter=crime 111. https://yro.slashdot.org/story/24/10/05/0543252/criminal-charges-announced-over-multi-year-fraud-scheme-in-a-carbon-credits-market 112. https://www.marketwatch.com/story/a-disaster-for-us-how-a-carbon-credit-pioneer-allegedly-stole-millions-of-dollars-by-cooking-the-books-1f4cc01d 113. https://yro.slashdot.org/story/24/10/05/0543252/criminal-charges-announced-over-multi-year-fraud-scheme-in-a-carbon-credits-market#comments 114. https://www.justice.gov/usao-sdny/pr/us-attorney-announces-criminal-charges-multi-year-fraud-scheme-market-carbon-credits 115. https://www.marketwatch.com/story/a-disaster-for-us-how-a-carbon-credit-pioneer-allegedly-stole-millions-of-dollars-by-cooking-the-books-1f4cc01d 116. https://www.justice.gov/usao-sdny/pr/us-attorney-announces-criminal-charges-multi-year-fraud-scheme-market-carbon-credits 117. https://slashdot.org/index2.pl?fhfilter=earth 118. https://news.slashdot.org/story/24/10/05/0634209/plastic-eating-bacteria-could-combat-pollution-problems-scientists-hope 119. https://www.msn.com/en-us/news/technology/plastic-eating-bacteria-could-combat-pollution-problems-scientists-hope/ar-AA1rFHUB 120. https://news.slashdot.org/story/24/10/05/0634209/plastic-eating-bacteria-could-combat-pollution-problems-scientists-hope#comments 121. https://www.msn.com/en-us/news/technology/plastic-eating-bacteria-could-combat-pollution-problems-scientists-hope/ar-AA1rFHUB 122. https://pubs.acs.org/doi/full/10.1021/acs.est.4c06645 123. https://www.nrel.gov/news/program/2021/researchers-engineer-microorganisms-to-tackle-pet-plastic-pollution.html 124. https://slashdot.org/index2.pl?fhfilter=cellphones 125. https://mobile.slashdot.org/story/24/10/05/0345219/americas-fcc-orders-t-mobile-to-deliver-better-cybersecurity 126. https://www.csoonline.com/article/3543785/fcc-orders-t-mobile-to-deliver-zero-trust-and-better-mfa.html 127. https://mobile.slashdot.org/story/24/10/05/0345219/americas-fcc-orders-t-mobile-to-deliver-better-cybersecurity#comments 128. https://www.csoonline.com/article/571199/the-t-mobile-data-breach-a-timeline.html 129. https://www.csoonline.com/article/574385/t-mobile-suffers-8th-data-breach-in-less-than-5-years.html 130. https://www.csoonline.com/article/3543785/fcc-orders-t-mobile-to-deliver-zero-trust-and-better-mfa.html 131. https://slashdot.org/~itwbennett 132. https://docs.fcc.gov/public/attachments/DA-24-860A1.docx 133. https://slashdot.org/index2.pl?fhfilter=security 134. https://it.slashdot.org/story/24/10/05/0413201/akamai-warns-cups-vulnerability-also-brings-new-threat-of-ddos-attacks 135. https://www.akamai.com/blog/security-research/october-cups-ddos-threat 136. https://it.slashdot.org/story/24/10/05/0413201/akamai-warns-cups-vulnerability-also-brings-new-threat-of-ddos-attacks#comments 137. https://www.theregister.com/2024/09/26/cups_linux_rce_disclosed/ 138. https://www.slashdot.org/~generic 139. https://www.akamai.com/blog/security-research/october-cups-ddos-threat 140. https://slashdot.org/index2.pl?fhfilter=power 141. https://hardware.slashdot.org/story/24/10/05/0323255/will-hurricanes-prompt-more-purchases-of-electric-cars 142. https://www.msn.com/en-us/news/us/hurricane-helene-just-made-the-case-for-electric-trucks/ar-AA1rxTyS 143. https://hardware.slashdot.org/story/24/10/05/0323255/will-hurricanes-prompt-more-purchases-of-electric-cars#comments 144. https://www.news4jax.com/news/local/2024/10/02/patronis-confirms-16-lithium-ion-battery-fires-related-to-hurricane-helene-storm-surge/ 145. https://www.nhtsa.gov/sites/nhtsa.gov/files/2024-02/16180-NSR-231214-003_SAE_Teardown Analysis of Flood-damaged Evs-tag.pdf 146. https://www.msn.com/en-us/news/us/hurricane-helene-just-made-the-case-for-electric-trucks/ar-AA1rxTyS 147. https://www.reddit.com/r/electricvehicles/comments/1fs61zl/f150_lightning_saved_the_day/ 148. https://x.com/niccruzpatane/status/1839491114270667228 149. https://www.visualcapitalist.com/mapped-electric-vehicle-adoption-by-state/ 150. https://www.whichcar.com.au/news/tesla-confirms-bidirectional-charging-coming-by-2025-but-musk-says-its-inconvenient 151. https://slashdot.org/index2.pl?fhfilter=gnu 152. https://news.slashdot.org/story/24/10/05/028237/free-software-foundation-celebrates-39th-anniversary 153. https://www.fsf.org/blogs/community/fsf-turns-39 154. https://news.slashdot.org/story/24/10/05/028237/free-software-foundation-celebrates-39th-anniversary#comments 155. https://www.fsf.org/blogs/community/fsf-turns-39 156. https://www.fsf.org/blogs/community/fsf-office-closing-party 157. https://www.gnu.org/distros/free-distros.html 158. https://emailselfdefense.fsf.org/en/ 159. https://www.fsf.org/campaigns/surveillance 160. https://directory.fsf.org/wiki/Category/All 161. https://f-droid.org/ 162. https://www.fsf.org/share 163. https://hostux.social/@fsf 164. https://framatube.org/video-channels/fsf_channel/videos 165. https://gnusocial.network/ 166. https://www.fsf.org/blogs/licensing/the-free-software-directory-needs-you-irc-meetups-every-friday 167. https://my.fsf.org/join_form 168. https://my.fsf.org/gift-a-membership 169. https://my.fsf.org/donate 170. https://static.fsf.org/nosvn/39birthdaysticker.jpg 171. https://static.fsf.org/nosvn/39birthday.jpg 172. https://libreplanet.org/wiki/Group:Free_Software_Foundation/Birthday_Theme 173. https://framatube.org/w/kqorDTpjZo7Z8ywwA5z48v 174. https://supercollider.github.io/ 175. https://slashdot.org/ 176. https://slashdot.org/?page=1 177. http://deals.slashdot.org/ 178. https://slashdot.org/poll/3259/which-desktop-os-do-you-prefer 179. https://slashdot.org/poll/3259/which-desktop-os-do-you-prefer 180. https://slashdot.org/polls 181. https://slashdot.org/poll/3259/which-desktop-os-do-you-prefer 182. https://hardware.slashdot.org/story/24/10/05/0323255/will-hurricanes-prompt-more-purchases-of-electric-cars?sbsrc=md 183. https://news.slashdot.org/story/24/10/05/2258205/how-mossad-planned-its-exploding-pager-operation-inside-israels-penetration-of-hezbollah?sbsrc=md 184. https://science.slashdot.org/story/24/10/04/1845237/bird-flu-fears-stoke-the-race-for-an-mrna-flu-vaccine?sbsrc=md 185. https://science.slashdot.org/story/24/10/04/1834239/we-may-have-passed-peak-obesity?sbsrc=md 186. https://news.slashdot.org/story/24/10/04/164230/antarctica-is-greening-at-dramatic-rate-as-climate-heats?sbsrc=md 187. https://developers.slashdot.org/story/24/10/01/2215220/openai-opens-its-speech-ai-engine-to-developers?utm_source=rss0.9mainlinkanon&utm_medium=feed&sbsrc=developers 188. https://news.slashdot.org/story/24/10/01/2210202/ublock-origin-lite-maker-ends-firefox-store-support-slams-mozilla-for-hostile-reviews?utm_source=rss0.9mainlinkanon&utm_medium=feed&sbsrc=developers 189. https://developers.slashdot.org/story/24/09/28/2132232/are-ai-coding-assistants-really-saving-developers-time?utm_source=rss0.9mainlinkanon&utm_medium=feed&sbsrc=developers 190. https://yro.slashdot.org/story/24/09/29/0122212/can-ai-developers-be-held-liable-for-negligence?utm_source=rss0.9mainlinkanon&utm_medium=feed&sbsrc=developers 191. https://developers.slashdot.org/story/24/09/27/2257245/oracle-owns-nearly-a-third-of-arm-chip-house-ampere-could-take-control-in-2027?utm_source=rss0.9mainlinkanon&utm_medium=feed&sbsrc=developers 192. https://slashdot.org/ 193. https://news.slashdot.org/story/13/10/06/2259224/slashdot-asks-how-does-the-us-govt-budget-crunch-affect-you?sbsrc=thisday 194. https://politics.slashdot.org/story/12/10/06/1334240/hiring-smokers-banned-in-south-florida-city?sbsrc=thisday 195. https://slashdot.org/story/11/10/06/000211/steve-jobs-dead-at-56?sbsrc=thisday 196. https://idle.slashdot.org/story/10/10/06/1332252/firefighters-let-house-burn-because-owner-didnt-pay-fee?sbsrc=thisday 197. https://tech.slashdot.org/story/05/10/06/1241227/eu-un-to-wrestle-internet-control-from-us?sbsrc=thisday 198. https://slashdot.org/ 199. https://sourceforge.net/projects/corefonts/?source=sd_slashbox 200. https://sourceforge.net/projects/npppluginmgr/?source=sd_slashbox 201. https://sourceforge.net/projects/vlc/?source=sd_slashbox 202. https://sourceforge.net/projects/emule/?source=sd_slashbox 203. https://sourceforge.net/projects/mingw/?source=sd_slashbox 204. https://sourceforge.net/?source=sd_slashbox 205. https://slashdot.org/ 206. https://meta.slashdot.org/?issue=20241006 207. https://meta.slashdot.org/?issue=20241005 208. https://meta.slashdot.org/?issue=20241004 209. https://meta.slashdot.org/?issue=20241003 210. https://meta.slashdot.org/?issue=20241002 211. https://meta.slashdot.org/?issue=20241001 212. https://meta.slashdot.org/?issue=20240930 213. https://meta.slashdot.org/?issue=20240929 214. https://slashdot.org/submit 215. https://slashdot.org/faq 216. https://slashdot.org/archive.pl 217. https://slashdot.org/hof.shtml 218. https://slashdotmedia.com/advertising-and-marketing-services/ 219. https://slashdotmedia.com/terms-of-use/ 220. https://slashdotmedia.com/privacy-statement/ 221. https://slashdot.org/faq/slashmeta.shtml 222. mailto:feedback@slashdot.org 223. https://slashdot.org/ 224. https://slashdot.org/blog 225. https://slashdot.org/ 226. https://slashdot.org/ 227. https://slashdot.org/ Hidden links: 229. https://slashdot.org/tag/ 230. https://slashdot.org/tag/ 231. https://slashdot.org/tag/ 232. https://slashdot.org/tag/ 233. https://slashdot.org/tag/ 234. https://slashdot.org/tag/ 235. https://slashdot.org/tag/ 236. https://slashdot.org/newsletter 237. https://slashdot.org/