Posts Tagged ‘technology’

Adobe Just Wants Unlimited Use Of Everything You Create

Monday, June 10th, 2024

Adobe has just changed the terms for subscription applications like Photoshop. Nothing big, just a demand of unlimited use of everything you ever create, forever. Oh, and you’re locked out of your existing work until you agree.

A change to Adobe terms & conditions for apps like Photoshop has outraged many professional users, concerned that the company is claiming the right to access their content, use it freely, and even sub-licence it to others.

The company is requiring users to agree to the new terms in order to continue using their Adobe apps, locking them out until they do so …

Adobe says that its new terms “clarify that we may access your content through both automated and manual methods, such as for content review.”

The terms say:

Solely for the purposes of operating or improving the Services and Software, you grant us a non-exclusive, worldwide, royalty-free sublicensable, license, to use, reproduce, publicly display, distribute, modify, create derivative works based on, publicly perform, and translate the Content. For example, we may sublicense our right to the Content to our service providers or to other users to allow the Services and Software to operate with others, such as enabling you to share photos

If you’re using our tools, we get unlimited rights to anything you ever created on our tools for any purpose forever, plus we get to sublicense them. It’s as if Microsoft announced that it was publishing Joe Schmoo’s Misery II: Misery Harder because Stephen King agreed to the license agreement for Word 4.0.

Designer Wetterschneider, who counts DC Comics and Nike among his clients, was one of the graphics pros to object to the terms.

Here it is. If you are a professional, if you are under NDA with your clients, if you are a creative, a lawyer, a doctor or anyone who works with proprietary files – it is time to cancel Adobe, delete all the apps and programs. Adobe can not be trusted.

But don’t worry! It gets worse! You can’t access your server-stored work or even uninstall the app until you agree to the term!

Concept artist Sam Santala pointed out that you can’t raise a support request to discuss the terms without first agreeing to them. You can’t even uninstall the apps!

I can’t even get ahold of your support chat to question this unless I agree to these terms beforehand.

I can’t even uninstall Photoshop unless I agree to these terms?? Are you f**king kidding me??

But don’t worry! Adobe has “clarified” that they’re really not going to steal your content, despite the terms and conditions clearly giving them the permissions to do precisely that. They also swear up and down that they’re never, ever, ever going to use your work to train AI on, despite the fact that we all know that’s exactly what they’re doing.

All of this points out how stupid it is to rely on a subscription model for your software.

Is there a Louis Rossmann rant on the subject? Yes. Yes there is.

  • “When you are at the mercy of connecting to somebody else’s computer to use your software, this means that your data can be held hostage and they can change the terms on you at any time.”
  • He states he feels anything he’s published on the Internet is fair game for training AI. But: “I do not want Adobe’s machine learning algorithms going through my personal private content. When I have something in my drawer, that belongs to me. That is not for anybody else to learn from.”
  • “If you have a halfway finished creative project, you are literally not able to access it unless you agree to terms and conditions that allow their machine learning algorithms to go through all of your private fucking library. You rapist pieces of shit!”
  • “The problem with having your data on somebody else’s computer is that they can roofy you anytime they want and get access to it.”
  • “Where on this page does it say that if you don’t want us to access your data, that you can grab all your data out of there and cancel? Does it say that? No, it says you either accept and continue you take the roofy or you don’t get access to any of your stuff ever again.”
  • Until Adobe actually changes the terms and conditions to provide the narrow permissions they claim they actually need (like the ability to create thumbnails), no one should agree to their terms. And not allowing someone to retrieve or delete their data without agreeing to draconian terms and conditions first is unconscionable extortion.

    Expect lawsuits.

    NYTimes Hacked, Source Code Stolen

    Sunday, June 9th, 2024

    This seems like a story that should be getting a lot more coverage: The New York Times was evidently hacked and hundred of gigabytes of their source code released.

    An anonymous hacker has claimed to have leaked 270 GB of internal data and source code from The New York Times (NYT) on the controversial image board 4chan.

    The leak, reportedly containing over 5,000 repositories and 3.6 million files, was published on June 6, 2024. It has since raised widespread concern and speculation about the potential implications for the historic news organization.

    The hacker, who has not been identified, posted a magnet link to the files on 4chan, encouraging users to download and share the data. According to the hacker, the leaked collection comprises uncompressed tar files with fewer than 30 encrypted repositories.

    The leaked data reportedly contains a variety of source code, including the blueprints of well-known games like Wordle, email marketing campaigns, and ad reports. The hacker’s message was signed “With love from /aicg/,” a nod to a 4chan community.

    While the leak’s legitimacy has not been independently verified, cybersecurity experts and media outlets have expressed serious concerns. The Register reported that it had seen a list of files in the purported leak but had not confirmed their authenticity.

    Bryan Lunduke of The Lunduke Journal (who’s covered leaked/hacked material like this before) downloaded the files. He says they’re 334GB worth of files (maybe the size discrepancy is zipped vs unzipped) and thinks they’re real.

  • This dropped June 6.
  • “We are talking about a 334 gigabyte archive containing supposedly 3.6 million and some change files, individual source code files. Massive. Off-the-charts massive.”
  • He though it might just be every New York Times story ever published, but it doesn’t appear to be. Nor does it look like an email server dump.
  • “This is massive. It almost is making my brain hurt simply going through all of this.”
  • “I went through it. I read a bunch of it in depth. When I say a bunch of it, I mean I spent a long time on it and barely made a dent.”
  • “It truly does look to be over 3 something million source code files.”
  • “The first things I looked through were tremendously boring. It was just stupid JavaScript files dealing with Markdown.” JavaScript is a front-end programming language used for performing a huge variety of tasks in your browser. Markdown is an HTML-like text markup language used as a basis for rendering documents in a variety of different formats (standard web page, phone webpage, PDF, online help, etc.
  • A lot of it appears to be internal website documents.
  • “It’s from a wide variety of stuff. I mean it’s all over the map. We’re talking onboarding documents and technical documents, hiring documents, switchboard documents, user attribute documents, a huge amount of documentation.”
  • Plus actual source code for iOS and Android applications.
  • Lunduke explains legal doctrine on leaked materials and reporting, saying he didn’t commit any crime to obtain the material, which should legally put him in the clear for talking about material therein relevant to the public interest. Normally I’d point out “Hacking is wrong, mkay,” but New York Times has itself published hacked/leaked/stolen material itself at least as far back as The Pentagon Papers, so this is a case of biter bit.
  • “There a reasonable assumption that publishing some of this leaked material would be of the public interest…There are a number of policies and other interesting things in place documented within this material that could be of the public interest.”
  • “This does appear to be real. I cannot fathom how all of this could have been created if it wasn’t real.” I am inclined to agree. But! It’s important to note that a real archive can be salted with false information for a variety of nefarious purposes, so caveat lector.
  • “It is an absolutely monstrous amount. Simply searching through it and scanning it is insane. There are over 5,000 individual mini-archives within this link each one appears to represent an individual source code repository, or at least a folder or subfolder within source code repositories.” He says it appears to be just the latest snapshot, and not all the versions you would find in a source code repository like GitHub.

  • The time stamps on the files look recent.
  • “Man, there’s some funky things going on here.”
  • I am most interested in how internal policies codify/enforce woke social justice priorities, if there are any special instructions for covering Donald Trump (or other Republicans), racial preferences in hiring policies, etc.

    I’m hoping for some juicy revelations…

    Paxton Takes On Big Data

    Wednesday, June 5th, 2024

    Texas Attorney general Ken Paxton is launching a new initiative to protect data privacy.

    Attorney General Ken Paxton announced today the launch of a new major initiative to protect citizens’ sensitive data from unauthorized exploitation by tech companies and artificial intelligence.

    The initiative was launched under the umbrella of the Attorney General Office Consumer Protection Division and established a team for “aggressive enforcement” of state privacy laws. It will also “ensure companies respect Texans’ privacy rights and safeguard their personal data.”

    According to a press release from Paxton’s office, the data protection team is set to be one of the largest privacy law enforcement teams in the entire United States.

    “Any entity abusing or exploiting Texans’ sensitive data will be met with the full force of the law,” said Paxton. “Companies that collect and sell data in an unauthorized manner, harm consumers financially, or use artificial intelligence irresponsibly present risks to our citizens that we take very seriously.

    “As many companies seek more and more ways to exploit data they collect about consumers, I am doubling down to protect privacy rights,” he continued. “With companies able to collect, aggregate, and use sensitive data on an unprecedented scale, we are strengthening our enforcement of privacy laws to protect our citizens.”

    Specifically, the new team will focus on enforcing the Data Privacy and Security Act, the Identify Theft Enforcement and Protection Act, the Data Broker Law, the Biometric Identifier Act, the Deceptive Trade Practices Act, and federal laws such as the Children’s Online Privacy Protection Act and the Health Insurance Portability and Accountability Act.

    “Texas has been a national leader in advancing conservative technology policy, and this initiative is the perfect complement to legislative wins in recent sessions as it will ensure Texas has the expertise and firepower to enforce laws that protect consumers and hold Big Tech accountable,” said David Dunmoyer—the Texas Public Policy Foundation Better Tech for Tomorrow campaign director.

    “Big Tech companies have gleefully flouted laws like the Children’s Online Privacy Protection Act for years, and in the absence of meaningful federal action, this initiative demonstrates Texas’ willingness to once again step into the breach and fight on behalf of Texans,” he continued. “This initiative will only further cement Texas’ national leadership in this space.”

    This is the latest development in Texas’ efforts to crack down on data privacy infringement. In mid-summer of last year, Gov. Greg Abbott signed the Texas Data Privacy & Security Act into law.

    The law applies to primarily businesses and entities who conduct business in the state of Texas or produce a product consumed by Texans, process or engage with the sale of personal data, and who are not considered “small businesses” unless the business has its hand in transactions of personal data.

    That enforcement effort sounds both needed and deserved, but the question is how you enforce those laws when they cows have not only left the barn, but have been sucked down and sliced up into thousands of vast international data farms far beyond the regulatory reach of the state of Texas.

    Big data lives and breathes on personal data that you’ve agreed to give up in variegated clauses scattered throughout the sprawling text swamps of terms and conditions for online sites you use for free.

    Have a Facebook account? Congratulations! Every bit of information you’ve shared with Facebook (your friends network, your interests, the sports teams you follow, the foods you favor, etc.) is now available to every partner of Facebook. And everyone partners with Facebook. If they have your email address or your phone number, they have your data.

    Ditto Google, with the additional proviso that Google has sucked up and cataloged pretty much every public database in the world, plus every single search query you’ve launched, ever, and every web page you’ve ever viewed through Chrome.

    Ditto Microsoft, for LinkedIn (yes, Microsoft bought LinkedIn), Windows, Explorer, Edge, Bing, etc.

    Ditto Twitter for everything you’ve ever tweeted or liked there.

    Ditto Sony, whose PlayStation Network data got hacked.

    Ditto Apple, though they seem to have better privacy protection provisions than most, mainly because they make their money off hardware. This doesn’t make them the good guys, just the least bad buys.

    Even Samsung sucks down data to target ads at you.

    And don’t forget state, location and federal government entities, whose data security is probably several orders of magnitude worse than the tech giants.

    Given that there’s so much personal data out there, so much legally acquired, how do you go about putting the genie back in the bottle? It’s a near impossible task, given that the tech giants not only hire armies of lawyers to defend themselves from lawsuits, but also lobbyists to write laws protecting them from said lawsuits.

    One place to start: Joining in a lawsuit where Facebook’s parent company Meta actually used stolen data to train AI, namely using a giant database of pirated books without paying authors. Paxton’s office could join one of the lawsuits against Meta, or file a new one on behalf of Texas authors whose work was used without compensation.

    Catching a tech giant with their pants down while actually breaking the law may give Paxton leverage to address other privacy concerns, and possibly the chance to do some eye-opening discovery…

    China Throws Money At Semiconductors Again

    Monday, May 27th, 2024

    Madness is doing the same thing over and expecting different results, and China is throwing money at semiconductors again.

    China has launched a massive $47 billion fund, the largest in its history, to bolster its semiconductor industry and establish a local supply chain. This fund, equivalent to 344 billion yuan, is the third phase initiated by the China Integrated Circuit Industry Investment Fund [also known as the National Integrated Circuit Industry investment Fund Company (ICF), or just “Big Fund.”-LP]. It’s worth noting that this amount is twice the total funds raised in the previous phases in 2014 and 2019.

    Do you remember the last time I covered where the money went to in those previous phases? The money went to companies like Wuhan Hongxin Semiconductor Manufacturing Co. Result? “Hongxin’s unfinished plant in the port city of Wuhan now stands abandoned. Its founders have vanished, despite owing contractors and investors billions of yuan.”

    Or maybe Tsinghua Unigroup. Result? The arrested a whole lot of executives, a lot of money disappeared into various pockets, and “Tsinghua Unigroup abandoned its plan to build DRAM memory chip manufacturing plants in Chongqing and Chengdu in southwest China earlier this year.”

    As I wrote before, China’s semiconductor industry is shell games all the way down.

    At lot of times, loans and investments are siphoned through four or five different entities from the purposes for which they were originally obtained. Everyone’s trying to get rich, and they hope to survive on smoke and mirrors long enough to get profitable. Imagine if Kleiner Perkins invested $25 million in a software startup, only to find that money was spent on a noodle shop, a used car dealership and a golf club manufacturer.

    Sometimes it works. You can build a company on margin, get profitable quickly, and be paying off investors and contractors before anyone realizes how shaky the entire enterprise is.

    But you can’t do that with semiconductor manufacturing. The startup costs are simply too high, easily in the billions. Very, very few companies can afford to be in a game that expensive. China’s two biggest semiconductor manufacturing success stories, SMIC and Tsinghua Unigroup, all have have CCP direct government investment.

    And bunches of Tsinghua Unigroup executive still got pinched for sticking their snouts into the trough.

    And everything should theoretically be harder now that the U.S. has imposed sanctions on China’s semiconductor industry. But one wonders just how effective these sanctions are when Applied Materials reported that 43% of its total revenue came from China in the second quarter. That suggests a certain kayfabe quality to the sanction, with just the right loopholes for AMAT (and presumably other semiconductor equipment manufacturing giants like Lam Research and Tokyo Electron) to keep getting those conveyor belts of Chinese money.

    My assumption is that, yet again, the funds earmarked for semiconductor companies will be siphoned off into a thousands unrelated pockets. (Though the rest of China’s business climate is sucking so badly that maybe some money will actually fund real semiconductor startups, if only through lack of other money-making opportunities to siphon funds off for.) Sanctions will continue to leak. A few years from now, China will announce the arrests of more executives using the Big Fund to play more investment shell games. And five years from now China will announce an even bigger set of subsidies…

    LinkSwarm for May 3, 2024

    Friday, May 3rd, 2024

    More corruption from the Biden family (plus a Texas Democratic congressman), more bad news from the Biden Recession, more pedophile sex offenders, more college madness, and virtue signaling, Third Reich style. It’s the Friday LinkSwarm!

    And remember: If you’re in a large Texas county, there’s a tax appraisal district election tomorrow, so be sure to get out and vote if you haven’t already voted early.

  • Another week, another corrupt Biden family scheme exposed. “Joe Biden’s Brother Embroiled In High-Ranking Qatari Scheme To ‘Provide Wealth Of Introductions’ Through ‘My Family.'”

    Qatar has had a lot of fingers in a lot of pies. While we knew about the EU’s ‘Qatargate,’ investments with the Kushner family, and of course Sen. Bob Menendez advancing Qatar’s interests, Politico reports that the Biden family’s ties to Qatar “would constitute some of the closest known financial links between a relative of President Joe Biden and a foreign government,” if courtroom testimony about Jim Biden’s foreign fundraising efforts is substantiated.

    In June 2017, Qatar’s neighbors – led by Saudi Arabia, banded together and cut diplomatic ties with the country, citing its alleged support for terrorism. As a result, the country was thrown into a sustained crisis.

    To dig themselves out, Qatari rulers began showering well-connected Westerners with gifts and financial benefits, according to Politico, “sometimes in the form of investment funding.”

    Around this time, Jim Biden was trying to raise $30 million for embattled hospital chain Americore – teaming up with Florida businessman Amer Rustom, CEO of the Platinum Group, who boasted of his ties to officials in the Middle East, as well as fund manager Michael Lewitt. Together, the three sought investment funding from various Middle Eastern sources for Americore and other ventures – “which came to focus largely on Qatar,” according to a former Americore executive who spoke on condition of anonymity.

    According to public records obtained by the outlet, Jim Biden leveraged ties to his older brother and “sought workarounds to restrictions on international money movements,” including one discussion about trying to move money across a Middle Eastern border in the form of gold bars that may or may not have happened.

    Let ye who has never smuggled gold across the border of an Arab country cast the first stone.

    “My family could provide a wealth of introductions and business opportunities at the highest levels that I believe would be worthy of the interest of His Excellency,” Jim Biden and Rustom wrote in a draft letter to an official at the Qatari sovereign wealth fund, the Qatar Investment Authority. “On behalf of the Biden family, I welcome your interest here,” the draft continues.

    Corrupt to the core.

  • More evidence from the Biden recession: “Job Openings Tumble, Quits Plunge, Hires Unexpectedly Crater To January 2018 Levels.”

    After several months of relatively boring JOLTS prints, this morning Janet Yellen’s favorite labor market indicator once again got exciting, and not in a good way.

    Starting at the top, according to the March JOLTS reported, job openings unexpectedly tumbled by 325K – the biggest drop since October 2023 – from an upward revised 8.813 million in February to just 8.488 million, far below the 8.690 million expected – and the lowest number since February 2021 when it last printed below 8 million.

    “Unexpectedly.”

  • “Chinese Nationals Charged With Conspiracy to Export US Technology.”

    The Department of Justice has arrested two Chinese nationals who allegedly plotted to export U.S. technology to advance the People’s Republic of China’s military operations.

    Han Li, 44, and Lin Chen, 64, have been charged with several counts of conspiracy to violate the International Emergency Economic Powers Act (IEEPA), in addition to the Export Administration Regulations (EAR), for attempting to export a machine used to process silicon microchips….

    “Specifically, the defendants sought to illegally obtain for CGTC a DTX-150 Automatic Diamond Scriber Breaker machine from Dynatex International, a Santa Rosa, California company.”

    That’s a backend semiconductor machine for slicing finished individual computer chips off a processed wafer.

  • “Texas Democrat Henry Cuellar Indicted on Bribery, Money-Laundering Charges.”

    Representative Henry Cuellar and his wife were indicted by a federal grand jury on bribery, foreign influence, and money-laundering charges, the U.S. Department of Justice announced on Friday afternoon.

    The Texas Democrat and his wife are accused of accepting roughly $600,000 in bribes from two foreign entities starting in December 2014 and continuing through 2021. The foreign entities are a Mexican bank and an oil and gas company linked to the government of Azerbaijan, according to the Justice Department.

    In exchange for the bribes, Cuellar agreed to use his office for promoting favorable U.S. foreign policy towards Azarbaijan and pushing legislative and executive branch officials to adopt policy measures beneficial to the bank, authorities said.

    In 2022, Cuellar’s home and office were searched during a federal investigation into Azerbaijan and American businessmen linked to the Middle Eastern nation. Cuellar formerly co-chaired the congressional Azerbaijan caucus.

    Cuellar represents TX28. Republicans Jay Furman and Lazaro Garza Jr. are competing in the runoff to challenge Cuellar this fall.

  • Columbia shows some semblance of a spine, threatens to expel students occupying administrative buildings.
  • Related: “Columbia Student Who Said ‘Zionists Don’t Deserve To Live’ Reportedly ‘Thrown Out Of School.'”
  • Also: “Police Begin Detaining UCLA Protesters Occupying Campus.”
  • “Tucked away in the $95 billion military aid package for Ukraine, Israel and Taiwan is a $3.5 billion slush fund to open new processing centers for Muslim migrants, in what Sen. Eric Schmitt described as a bid to “supercharge mass migration from the Middle East.” Republicans in congress asleep at the switch again.
  • Ukraine hits two more oil refineries.
  • It’s not just China that the CCP’s crazy policies are ruining. There are over 500 abandoned, unfinished buildings in Cambodia. A crackdown on online gambling also hastened the demise of many real estate ventures there.
  • Tranny sex offender tries to snatch a child from an elementary playground in broad daylight. “Trans-identifying male Solomon Galligan [simply] walked on campus last Friday afternoon during recess at Black Forest Hills Elementary School in Aurora, Colorado, and straight-up tried to steal a kid.”

    The suspect, who is identified as male in the arrest affidavit, shared news of his transition on Facebook back in 2011.

    ‘So im starting my hormone shots and i relly cant wait im on my hormone pills ive been on them for almost 4 months i wake up all depressed and crying but in the end its gonna be totally worth it you know what io mean im really excited my measurements are already changing and im super thrilled,’ he wrote.

    Galligan was put on the sex offender registry and was convicted that same year of non-consent sexual contact, according to his latest arrest affidavit.

  • Another week, three more Texas teachers arrested for having sex with students.

    Ernest Herrera, 56, was arrested Monday after he admitted to sexual contact with a 13-year-old student, claiming they had “developed a relationship.”

    Herrera taught social studies at Southside Independent School District’s Losoya Middle School in San Antonio.

    He was charged with improper relationship between educator and student, a second-degree felony punishable by 2 to 20 years in prison.

    Herrera was booked into Bexar County Jail and held on a $75,000 bond.

    The district superintendent stated that Herrera was fired “effective immediately.”

    Andrew McCown, 27, was arrested Wednesday and charged with having an “improper relationship” with a 17-year-old female student.

    McCown is a math teacher and football coach at Roosevelt High School in San Antonio’s North East ISD.

    He was reportedly placed on leave in March and will be terminated.

    McCown, who is related to former NFL quarterbacks Josh and Luke McCown, was arrested in 2022 for drunk driving while he was a teacher and coach at Robinson ISD.

    According to a statement to MySA, the district “conducted a background check on April 25, 2023, and at that time, it was clear and McCown was hired.”

    Another football coach, Perryton ISD athletic director Cole Underwood, was arrested Wednesday and charged with sexual assault of a child, a second-degree felony.

    The alleged victim is a Perryton High School student, reportedly a 14-year-old girl.

    Underwood was released from Ochiltree County Jail on Thursday after posting a $125,000 bond.

    According to a statement from Perryton ISD, Underwood resigned.

  • The new York case against Trump isn’t going so well for the prosecution. (Hat tip: Stephen Green at Instapundit.)
  • In a poll of Texas voters, Trump leads Biden by 9%, and Ted Cruz leads Democratic challenger Colin Allred by 13%. Usual “polls this far out are meaningless” caveats apply.
  • Four reform candidates elected to NRA board. Now they just need to replace all of Wayne’s cronies on the board for me to rejoin.

  • Democrats passing a “living wage” law for Seattle ensures that they can’t make a living wage.
  • Second Boeing whistleblower dies suddenly.

  • Chinese officials are asking villagers to take out fake business licenses. Is that for their own business scams, or to artificially pump up Chinese economic statistics?

  • Profiles in Cowardice: “PEN America, a leading nonprofit dedicated to free expression, canceled its 2024 World Voices Festival late last week under pressure from pro-Palestinian activists. Many writers affiliated with the organization either threatened to boycott the event unless PEN acceded to certain demands, including labeling Israel’s actions in Gaza ‘genocide,’ or distanced themselves from the free-speech group in response to online pressure from pro-Palestinian activists.”
  • Monroe County, New York, Democratic District Attorney Sandra Doorley wants you to know that she’s simply better than you and doesn’t have to pull over for police.
  • Virtue signaling: Third Reich Edition.
  • Brandon Herrera has both a meme review and an update on his runoff against Tony Gonzalez for TX23.
  • OnlyFans camgirl paid to propagandize for the Biden Administration. It’s a shame she wasn’t paid for sex, since then American taxpayers could see the Biden administration paying money to screw someone other than themselves…
  • Sale of books from the library of late Supreme Court Justice Ruth Bader Ginsburg results in $187,740 loss.
  • “Missionaries Travel From Africa To Bring The Gospel To United Methodist Church.”
  • History Repeats Itself As Communists Run Out Of Food.
  • Hit the tip jar if you’re so inclined.





    Samsung Snags $6.4 Billion For Texas Fabs

    Monday, April 15th, 2024

    Samsung’s Texas fabs are evidently going to be the beneficiary of CHIPS Act subsidies.

    The U.S. Department of Commerce (DOC) has announced that $6.4 billion will be sent to a Texas Samsung facility to bolster the supply chain of semiconductors.

    The multi-billion dollar investment is part of a larger $40 billion dollar federal funding agreement as part of the CHIPS and Science Act.

    As a White House press release states, the investment aims to “cement central Texas’s role as a state-of-the-art semiconductor ecosystem, creating at least 21,500 jobs and leveraging up to $40 million in CHIPS funding to train and develop the local workforce.”

    This investment would be used at both the research and development facilities in Taylor and the expansion of the fabrication factory in Austin.

    The Taylor facility isn’t just an R&D site, it’s a full-blown state-of-the-art fab, and they could start running the line as early as July. The chips Samsung will be producing are planned to be on their 4 nanometer node.

    The City of Austin has previously identified semiconductor production as part of its Opportunity Austin economic expansion plan where the city sees itself as a “top global destination for businesses and investment.”

    “We’re not just expanding production facilities; we’re strengthening the local semiconductor ecosystem and positioning the U.S. as a global semiconductor manufacturing destination,” said Kye Hyun Kyung, president and CEO of the Device Solutions (DS) Division at Samsung Electronics.

    “To meet the expected surge in demand from U.S. customers, for future products like AI chips, our fabs will be equipped for cutting-edge process technologies and help advance the security of the U.S. semiconductor supply chain.”

    As I’ve written before, semiconductor subsidies are the wrong solution for the wrong problem (especially if the Biden Administration demands Samsung pledge fealty to social justice before sucking the taxpayers teat). But if you are going to subsidize someone, and your goal is more cutting edge American fabs, then Samsung isn’t the worst recipient. Their fab tech is either second third best (depending on whether intel has actually gotten their act together or not) in the world behind TSMC, and 4nm is good enough for just about every fab customer in the world, save Apple (who is TSMC’s alpha customer), Intel (yes, Intel gets some of their cutting edge chips fabbed at TSMC), AMD, and a few others. Technical details here, assuming the difference between FinFET and GAAFET doesn’t make your eyes glaze over.

    But the American taxpayer might rightly question why they’re being asked to subsidize the twenty-first largest company in the world, and one headquartered in South Korea.

    Once again, the Biden Administration is taking money from the poor to give to the rich.

    Biden Admin Tries To Infect Chip Makers With DEI

    Wednesday, April 3rd, 2024

    I’ve already said repeatedly that semiconductor subsidies are the wrong solution for the wrong problem. However, this piece by Matt Cole and Chris Nicholson shows the CHIPS Act was far more poisonous than I thought.

    DEI — the identity-obsessed dogma that goes by “diversity, equity, and inclusion” — has now trained Google’s new AI to refuse to draw white people. What’s even more alarming is that it’s also infected the supply chain that makes the chips powering everything from AI to missiles, endangering national security.

    The Biden administration recently promised it will finally loosen the purse strings on $39 billion of CHIPS Act grants to encourage semiconductor fabrication in the U.S. But less than a week later, Intel announced that it’s putting the brakes on its Columbus factory. The Taiwan Semiconductor Manufacturing Company (TSMC) has pushed back production at its second Arizona foundry. The remaining major chipmaker, Samsung, just delayed its first Texas fab.

    Actually, Samsung opened it’s first Austin fab in 2007. The fab that was delayed was their second fab in Taylor.

    This is not the way companies typically respond to multi-billion-dollar subsidies. So what explains chipmakers’ apparent ingratitude? In large part, frustration with DEI requirements embedded in the CHIPS Act.

    Commentators have noted that CHIPS and Science Act money has been sluggish. What they haven’t noticed is that it’s because the CHIPS Act is so loaded with DEI pork that it can’t move.

    The law contains 19 sections aimed at helping minority groups, including one creating a Chief Diversity Officer at the National Science Foundation, and several prioritizing scientific cooperation with what it calls “minority-serving institutions.” A section called “Opportunity and Inclusion” instructs the Department of Commerce to work with minority-owned businesses and make sure chipmakers “increase the participation of economically disadvantaged individuals in the semiconductor workforce.”

    The department interprets that as license to diversify. Its factsheet asserts that diversity is “critical to strengthening the U.S. semiconductor ecosystem,” adding, “Critically, this must include significant investments to create opportunities for Americans from historically underserved communities.”

    The department does not call speed critical, even though the impetus for the CHIPS Act is that 90 percent of the world’s advanced microchips are made in Taiwan, which China is preparing to annex by 2027, maybe even 2025.

    Handouts abound. There’s plenty for the left—requirements that chipmakers submit detailed plans to educate, employ, and train lots of women and people of color, as well as “justice-involved individuals,” more commonly known as ex-cons. There’s plenty for the right—veterans and members of rural communities find their way into the typical DEI definition of minorities. There’s even plenty for the planet: Arizona Democrats just bragged they’ve won $15 million in CHIPS funding for an ASU project fighting climate change.

    That project is going better for Arizona than the actual chips part of the CHIPS Act. Because equity is so critical, the makers of humanity’s most complex technology must rely on local labor and apprentices from all those underrepresented groups, as TSMC discovered to its dismay.

    Tired of delays at its first fab, the company flew in 500 employees from Taiwan. This angered local workers, since the implication was that they weren’t skilled enough. With CHIPS grants at risk, TSMC caved in December, agreeing to rely on those workers and invest more in training them. A month later, it postponed its second Arizona fab.

    Now TSMC has revealed plans to build a second fab in Japan. Its first, which broke ground in 2021, is about to begin production. TSMC has learned that when the Japanese promise money, they actually give it, and they allow it to use competent workers. TSMC is also sampling Germany’s chip subsidies, as is Intel.

    Intel is also building fabs in Poland and Israel, which means it would rather risk Russian aggression and Hamas rockets over dealing with America’s DEI regime. Samsung is pivoting toward making its South Korean homeland the semiconductor superpower after Taiwan falls.

    To be fair, Intel has had fabs in Israel since since 1996, and Tower Semiconductor has had fabs in Israel since the 1980s. Poland, to the best of my knowledge, has never had a fab.

    In short, the world’s best chipmakers are tired of being pawns in the CHIPS Act’s political games. They’ve quietly given up on America. Intel must know the coming grants are election-year stunts — mere statements of intent that will not be followed up. Even after due diligence and final agreements, the funds will only be released in dribs and drabs as recipients prove they’re jumping through the appropriate hoops.

    So in the name of embedding the racist poison of social justice, the CHIPS Act, ostensibly designed to increase America’s share of cutting-edge semiconductor manufacturing, is actually driving new fab construction out of America.

    Heck of a Job, Brandon.

    Does Malicious Backdoor Compromise SSH?

    Monday, April 1st, 2024

    A newly discovered backdoor found in the xz liblzma library of XZ Utils, the XZ format compression utilities included in most Linux distributions, targets the RSA implementation of OpenSSH.

    For those outside of tech, that sentence was an unreadable jumble of acronyms. For those inside tech, a chill probably ran down their spine, as those technologies are everywhere. Anytime anyone buys something online, they’re going to be using SSH to create a secure channel to pass transaction information. [As a commenter noted, SSH is a command tool rather than Secure Socket Layer (SSL), which is used for encrypted transactions. Mental typo. My bad. – LP.] Depending on how many distros are using that library, the consequence range from “bad” to “really, really bad.”

    Details:

    A vulnerability (CVE-2024-3094) in XZ Utils, the XZ format compression utilities included in most Linux distributions, may “enable a malicious actor to break sshd authentication and gain unauthorized access to the entire system remotely,” Red Hat warns.

    The cause of the vulnerability is actually malicious code present in versions 5.6.0 (released in late February) and 5.6.1 (released on March 9) of the xz libraries, which was accidentally found by Andres Freund, a PostgreSQL developer and software engineer at Microsoft.

    “After observing a few odd symptoms around liblzma (part of the xz package) on Debian sid installations over the last weeks (logins with ssh taking a lot of CPU, valgrind errors) I figured out the answer: The upstream xz repository and the xz tarballs have been backdoored,” he shared via the oss-security mailing list.

    According to Red Hat, the malicious injection in the vulnerable versions of the libraries is obfuscated and only included in full in the download package.

    “The Git distribution lacks the M4 macro that triggers the build of the malicious code. The second-stage artifacts are present in the Git repository for the injection during the build time, in case the malicious M4 macro is present,” they added.

    “The resulting malicious build interferes with authentication in sshd via systemd.”

    I’m just going to note for the record that a whole lot of longtime Linux programmers absolutely hated the introduction of systemd. I don’t have deep enough Linux chops to take a side in this controversy, or know whether systemd was a significant factor in allowing the exploit to work.

    Moving on:

    The malicious script in the tarballs is obfuscated, as are the files containing the bulk of the exploit, so this is likely no accident.

    “Given the activity over several weeks, the committer is either directly involved or there was some quite severe compromise of their system. Unfortunately the latter looks like the less likely explanation, given they communicated on various lists about the “fixes” [for errors caused by the injected code in v5.6.0],” Freund commented.

    One silver lining is that the problem doesn’t look to be as widespread as it could be.

    “Luckily xz 5.6.0 and 5.6.1 have not yet widely been integrated by Linux distributions, and where they have, mostly in pre-release versions.”

    Red Hat says that the vulnerable packages are present in Fedora 41 and Fedora Rawhide, and have urged users of those distros to immediately stop using them.

    “If you are using an affected distribution in a business setting, we encourage you to contact your information security team for next steps,” they said, and added that no versions of Red Hat Enterprise Linux (RHEL) are affected.

    Since Red Hat is usually the default for big E-commerce platforms, it looks like this exploit is merely “bad” rather than “really, really bad,” which means its not nearly as bad as, say, Log4J was. Your Amazons and eBays are probably safe from the exploit.

    The people who are likely going to be hurt by this exploit are mom and pop E-commerce sites using their webhost’s “build an E-commerce site using these easy tools” feature. The smaller the site, the more likely they’re using a free distro, some of which may have this vulnerability.

    Whatever the site, they should run an updated software composition analysis tool on stacks and build-chains to see if they’re vulnerable.

    Did Facebook Run A Man-in-The-Middle Hack Against Competitors?

    Thursday, March 28th, 2024

    Newly unsealed court documents accuse Facebook of running a man-in-the-middle attack against several competitors.

    At the request of CEO Mark Zuckerberg, Facebook officials developed a program called In-App Action Panel (IAAP) that they deployed in 2016 and which was in use through mid-2019, according to the documents, which include internal emails.

    The program utilized cyberattacks to intercept information from Snapchat, YouTube, and Amazon. The program then decrypted the information.

    “Facebook’s IAAP Program used nation-state-level hacking technology developed by the company’s Onavo team, in which Facebook paid contractors (including teens) to designate Facebook a trusted ‘root’ certificate authority on their mobile devices, then generated fake digital certificates to redirect secure Snapchat analytics traffic (and later, analytics from YouTube and Amazon) from Snapchat’s servers to Onavo’s; decrypted these analytics and used them for competitive gain, including to inform Facebook’s product strategy; reencrypted them; and sent them up to Snapchat’s servers as though it came straight from Snapchat’s app, with Facebook’s Social Advertising competitor none the wiser,” lawyers said in one of the documents.

    This is a clever attack in several ways. If you can create and get a program/device to accept a false signing certificate, you bypass having to break a company’s encryption altogether. The program trusts your fake certificate and creates a secure connection to your backend, using your encryption, thinking it’s transmitting information back to the targeted company. Also, analytics data doesn’t have to be sent and received in real time, so a significant delay in gather and receive times may not tip off the targeted company to the attack.

    None of this is a walk in the park, but it’s something like ten orders of magnitude easier than breaking the targeted company’s encryption stream on a live session to seamlessly hack it in real time, which is the sort of God-level hacking limited to those with NSA-level computing power, or fictional characters.

    The lawyers, representing plaintiffs in a lawsuit that accuses Facebook of anti-competitive behavior, were describing emails they obtained through discovery.

    In one email, Mr. Zuckerberg wrote that there was a need to receive information about Snapchat but that their traffic was encrypted. “Given how quickly they’re growing, it seems important to figure out a new way to get reliable analytics about them. Perhaps we need to do panels or write custom software. You should figure out how to do this,” he wrote.

    After Facebook employees started working on figuring it out, Facebook Chief Operating Officer Javier Olivan wrote that the program could pay users to “let us install a really heavy piece of software (that could even do man in the middle, etc.).”

    Man in the middle refers to a type of cyberattack where attackers secretly intercept information.

    More specifically, it’s where a third party successfully inserts itself into the communication stream between two other parties, relaying (and possibly altering) both ends of the communication without either party knowing.

    “We are going to figure out a plan for a lockdown effort during June to bring a step change to our Snapchat visibility. This is an opportunity for our team to shine,” Guy Rosen, founder of Onavo, later wrote. Onavo was started in Israel and bought by Facebook in 2013.

    In a presentation on the program when it was being finalized, it was stated that there would be “’kits” that can be installed on iOS and Android that intercept traffic for specific sub-domains, allowing us to read what would otherwise be encrypted traffic so we can measure in-app usage.”

    Documents and testimony obtained in the case showed the program was launched in June 2016 and continued being used through 2019.

    The program initially targeted Snapchat but was later expanded to Google’s YouTube and Amazon, according to the documents.

    A few quick points:

    1. This is all from Snapchat’s court documents, so you have to put an “allegedly” on all this.
    2. If all the allegations are true, Facebook has just broken all sorts of federal anti-hacking laws, including the Computer Fraud and Abuse Act (CFAA), the Electronic Communications Privacy Act (ECPA), the Identity Theft and Assumption Deterrence Act, and probably half a dozen more I haven’t even thought of.
    3. That Zuckerberg himself is (allegedly) directly implicated in deliberately breaking federal law is pretty breathtaking. He could be looking at serious jail time. Or would be, if he weren’t such a big Democratic Party Donor. (We’ll see how much time Sam Bankman-Fried catches today.)
    4. Snapchat is one thing, but targeting fellow tech behemoths Google (which owns YouTube) and Amazon with this sort of attack would seem to be…unwise. (Maybe Google’s forgiveness was covered in the secret deal the two companies allegedly signed with each other.)
    5. The timeframe is important here. Back in 2016-2019, the handling of digital signing certificates was a lot more loosey-goosey than it is now. A whole lot of things have been tightened up. I wouldn’t say it’s impossible to carry out such an attack now, but it would be harder.

    We’ll see if the whole thing jumps from litigation land to the feds actually going after Facebook, but at a time when Facebook is being sued by all manner of plaintiffs (including Texas and other state attorney generals) over privacy violations and anti-competitive practices, the Snapchat revelations could certainly provide more fuel for the fire…

    “The Internet Is Unusable Without Ad Block”

    Monday, March 18th, 2024

    Here’s a rant from Charles White, AKA Cr1TiKaL, AKA penguinz0, about the pain of using the web without an ad-blocker.

    I have dialed in my ad-blocker so that the only time I see the damn things is when using my iPhone, when they make some sites unusable.

  • “There’s a few things that everyone knows human beings can’t live without water, air, a nice smile. But there’s actually something that’s often overlooked that’s a necessity for life on this planet, and it’s an ad blocker when using the worldwide web.”
  • He made the mistake of turning off adblock to look at something…and unleashed an unspeakable horror!
  • “It’s just a massive headache, just this visual nuisance, all this clutter with an inundation of ads that seems like it’s some kind of scene from a 90s movie where you get hacked, where it just has, like, ‘Virus Detected!'”
  • “If you try and watch a video on some of these mainstream media sites, you get an ad every 2 or 3 seconds, and I’m not exaggerating. I don’t mean you get a banner ad, I mean you get a full 20 to 30 second video ad that pauses your video to play that ad. So a 2-minute video that I was trying to watch about a bobblehead heist ended up taking over 10 minutes, and I still didn’t even finish the video.”
  • “It is absurd, it’s unusable.”
  • “I would argue it’s like a basic human right at this point to have an ad blocker when using the internet. It is that fucking atrocious.”
  • He then demonstrates, and it’s every bit as horrifying as described. “This can’t be legal.”
  • He mentions YouTube’s war on ad-blockers, which I seem to have defeated with a combination of scripts.
  • Which sites do you particularly find unusable without adblock?