Twitter

What Happened After Matt Taibbi Revealed Twitter's Deliberations on Hunter Biden Tweets? (wired.com) 377

"Twitter CEO Elon Musk turned to journalist Matt Taibbi on Friday to reveal the decision-making behind the platform's suppression of a 2020 article from the New York Post regarding Hunter Biden's laptop," reports Newsweek.

"Taibbi later deleted a tweet showing [former Twitter CEO] Jack Dorsey's email address," adds the Verge, covering reactions to Taibbi's thread — and the controversial events that the tweets described: At the time, it was not clear if the materials were genuine, and Twitter decided to ban links to or images of the Post's story, citing its policy on the distribution of hacked materials. The move was controversial even then, primarily among Republicans but also with speech advocates worried about Twitter's decision to block a news outlet. While Musk might be hoping we see documents showing Twitter's (largely former) staffers nefariously deciding to act in a way that helped now-President Joe Biden, the communications mostly show a team debating how to finalize and communicate a difficult moderation decision.
Taibbi himself tweeted that "Although several sources recalled hearing about a 'general' warning from federal law enforcement that summer about possible foreign hacks, there's no evidence - that I've seen - of any government involvement in the laptop story."

More from the Verge: Meanwhile, Taibbi's handling of the emails — which seem to have been handed to him at Musk's direction, though he only refers to "sources at Twitter" — appears to have exposed personal email addresses for two high-profile leaders: Dorsey and Representative Ro Khanna. An email address that belongs to someone Taibbi identifies as Dorsey is included in one message, in which Dorsey forwards an article Taibbi wrote criticizing Twitter's handling of the Post story. Meanwhile, Khanna confirmed to The Verge that his personal Gmail address is included in another email, in which Khanna reaches out to criticize Twitter's decision to restrict the Post's story as well.

"As the congressman who represents Silicon Valley, I felt Twitter's actions were a violation of First Amendment principles so I raised those concerns," Khanna said in a statement to The Verge. "Our democracy can only thrive if we are open to a marketplace of ideas and engaging with people with whom we disagree."

The story also revealed the names of multiple Twitter employees who were in communications about the moderation decision. While it's not out of line for journalists to report on the involvement of public-facing individuals or major decision makers, that doesn't describe all of the people named in the leaked communications.... "I don't get why naming names is necessary. Seems dangerous," Twitter co-founder Biz Stone wrote Friday in apparent reference to the leaks.... The Verge reached out to Taibbi for comment but didn't immediately hear back.

Twitter, which had its communications team dismantled during layoffs last month, also did not respond to a request for comment.

Wired adds: What did the world learn about Twitter's handling of the incident from the so-called Twitter Files? Not much. After all, Twitter reversed its decision two days later, and then-CEO Jack Dorsey said the moderation decision was "wrong."
In other news, "Twitter will start showing view count for all tweets," Elon Musk announced Friday, "just as view count is shown for all videos." And he shared other insights into his plans for Twitter's future.

"Freedom of speech doesn't mean freedom of reach. Negativity should & will get less reach than positivity."
United States

America's TSA Begins Quietly Testing Facial Recognition Tech at 16 Airports (msn.com) 87

America's Transportation Security Administration "has been quietly testing controversial facial recognition technology for passenger screening at 16 major domestic airports — from Washington to Los Angeles," reports the Washington Post.

Their article adds that the agency "hopes to expand it across the United States as soon as next year." Kiosks with cameras are doing a job that used to be completed by humans: checking the photos on travelers' IDs to make sure they're not impostors.... You step up to the travel document checker kiosk and stick your ID into a machine. Then you look into a camera for up to five seconds and the machine compares your live photo to the one it sees on your ID. They call this a "one to one" verification system, comparing one face to one ID. Even though the software is judging if you're an impostor, there's still a human agent there to make the final call (at least for now).

So how accurate is it? The TSA says it's been better at verifying IDs than the manual process. "This technology is definitely a security enhancement," said [TSA program manager Jason] Lim. "We are so far very satisfied with the performance of the machine's ability to conduct facial recognition accurately...." But the TSA hasn't actually released hard data about how often its system falsely identifies people, through incorrect positive or negative matches. Some of that might come to light next year when the TSA has to make its case to the Department of Homeland Security to convert airports all over the United States into facial recognition systems....

The TSA says it doesn't use facial recognition for law-enforcement purposes. It also says it minimizes holding on to our face data, so it isn't using the scans to build out a new national database of face IDs. "The scanning and match is made and immediately overwritten at the Travel Document Checker podium. We keep neither the live photo nor the photo of the ID," said Lim. But the TSA did acknowledge there are cases in which it holds on to the data for up to 24 months so its science and technology office can evaluate the system's effectiveness....

"None of this facial recognition technology is mandated," said Lim. "Those who do not feel comfortable will still have to present their ID — but they can tell the officer that they do not want their photo taken, and the officer will turn off the live camera." There are also supposed to be signs around informing you of your rights.

Here's the TSA's web page about the program. Thanks to long-time Slashdot reader SonicSpike for sharing the article.
The Courts

Chess' $100 Million Showdown: Carlsen Moves To Dismiss Niemann Lawsuit Over Cheating Allegations (forbes.com) 88

An anonymous reader quotes a report from Forbes: Lawyers representing Norwegian World Chess Champion Magnus Carlsen and online chess platform Chess.com asked a federal judge Friday to toss a $100 million lawsuit filed by chess grandmaster Hans Niemann in October, which marked a dramatic escalation of tensions over cheating allegations levied against the 19-year-old American. The motion to dismiss argued the teenager spent years "trying to curate a reputation as the bad boy of chess" and "now wants to cash in by blaming others" after the allegations derailed his chess career.

Niemann acknowledged he cheated during a handful of matches as a young teen but an October report from Chess.com determined he "likely cheated" more than 100 times in online chess matches, after Carlsen released a statement in September saying Niemann "has cheated more -- and more recently -- than he has publicly admitted." Niemann stated in his defamation lawsuit the claims are a conspiracy from the chess community's establishment to smear him after he defeated Carlsen -- the five-time defending world champion -- during a tournament in St. Louis on September 4. The teen claimed the alleged conspiracy was an attempt to save Carlsen, 32, from reputational damage after Chess.com agreed to purchase his "Play Magnus" app for $83 million in August.

Friday's motion stated all of Niemann's claims are without merit, arguing he has not disproved the cheating allegations or offered evidence to back up his conspiracy assertion. The lawsuit, filed in the Eastern District of Missouri, also named Chess.com executive Daniel Rensch and a website streaming partner, Hikaru Nakamura, as defendants. "Niemann now seeks to shift blame to reigning World Chess Champion Magnus Carlsen and others, claiming a wholly implausible conspiracy to defame and boycott Niemann that somehow damaged his already dubious reputation to the tune of $100 million," the motion to dismiss states.

Australia

Australia Says Law Making Facebook and Google Pay For News Has Worked (reuters.com) 13

An anonymous reader quotes a report from Reuters: An Australian law giving the government power to make internet giants Facebook owner Meta and Alphabet's Google negotiate content supply deals with media outlets has largely worked, a government report said. But the law, which took effect in March 2021 after talks with the big tech firms led to a brief shutdown of Facebook news feeds in the country, may need to be extended to other online platforms, the review said.

Since the News Media Bargaining Code (PDF) took effect, the tech firms had inked more than 30 deals with media outlets compensating them for content which generated clicks and advertising dollars, said the Treasury department report, published late Thursday. "At least some of these agreements have enabled news businesses to, in particular, employ additional journalists and make other valuable investments to assist their operations," said the report. "While views on the success or otherwise of the Code will invariably differ, we consider it is reasonable to conclude that the Code has been a success to date."

The report mostly recommended that the government consider new methods of assessing the administration and effectiveness of the law, and did not suggest changing the law itself. But it did note the law lacked "a formal mechanism to extend the Code to other platforms", and suggested the government order the competition regulator, which led the design of the law, to "prepare reports on this question."
Google director of government affairs and public policy in Australia Lucinda Longcroft said the company had "furthered our significant contribution to the Australian news industry" by signing deals representing 200 mastheads across the country and "the majority of these outlets are regional or local."
Security

FBI, CISA Say Cuba Ransomware Gang Extorted $60 Million From Victims This Year (techcrunch.com) 12

An anonymous reader quotes a report from TechCrunch: The Cuba ransomware gang extorted more than $60 million in ransom payments from victims between December 2021 and August 2022, a joint advisory from CISA and the FBI has warned. The latest advisory is a follow-up to a flash alert (PDF) released by the FBI in December 2021, which revealed that the gang had earned close to $44 million in ransom payments after attacks on more than 49 entities in five critical infrastructure sectors in the United States. Since, the Cuba ransomware gang has brought in an additional $60 million from attacks against 100 organizations globally, almost half of the $145 million it demanded in ransom payments from these victims. "Since the release of the December 2021 FBI Flash, the number of U.S. entities compromised by Cuba ransomware has doubled, with ransoms demanded and paid on the increase," the two federal agencies said on Thursday.

Cuba ransomware actors, which have been active since 2019, continue to target U.S. entities in critical infrastructure, including financial services, government facilities, healthcare and public health, critical manufacturing and information technology. [...] FBI and CISA added that the ransomware gang has modified its tactics, techniques and procedures since the start of the year and has been linked to the RomCom malware, a custom remote access trojan for command and control, and the Industrial Spy ransomware. The advisory notes that the group -- which cybersecurity company Profero previously linked to Russian-speaking hackers -- typically extorts victims by threatening to leak stolen data. While this data was typically leaked on Cuba's dark web leak site, it began selling stolen data on Industrial Spy's online market in May this year. CISA and the FBI are urging at-risk organizations to prioritize patching known exploited vulnerabilities, to train employees to spot and report phishing attacks and to enable and enforce phishing-resistant multi-factor authentication.

Security

Florida State Tax Website Bug Exposed Filers' Data (techcrunch.com) 12

A security flaw on the Florida Department of Revenue website exposed at least hundreds of taxpayers' Social Security numbers and bank account numbers, a security researcher found. From a report: Kamran Mohsin said the security flaw -- now fixed -- allowed him, or anyone else who was logged in to the state's business tax registration website, to access, modify and delete the personal data of business owners whose information is on file with the state's tax authority by modifying the part of the web address that contains the taxpayers' application number. Mohsin said that application numbers are sequential, allowing anyone to enumerate taxpayers' information by incrementing the application number by a single digit. Mohsin said there were more than 713,000 applications in the system, which the department did not dispute when reached for comment.
Privacy

Hive Social Turns Off Servers After Researchers Warn Hackers Can Access All Data (arstechnica.com) 73

An anonymous reader quotes a report from Ars Technica: Hive Social, a social media platform that has seen meteoric growth since Elon Musk took over Twitter, abruptly shut down its service on Wednesday after a security advisory warned the site was riddled with vulnerabilities that exposed all data stored in user accounts. "The issues we reported allow any attacker to access all data, including private posts, private messages, shared media and even deleted direct messages," the advisory, published on Wednesday by Berlin-based security collective Zerforschung, claimed. "This also includes private email addresses and phone numbers entered during login." The post went on to say that after the researchers privately reported the vulnerabilities last Saturday, many of the flaws they reported remained unpatched. They headlined their post "Warning: do not use Hive Social." Hive Social responded by pulling down its entire service. "The Hive team has become aware of security issues that affect the stability of our application and the safety of our users," company officials wrote. "Fixing these issues will require temporarily turning off our servers for a couple of days while we fix this for a better and safer experience."

Technical details are being withheld to prevent the active exploitation of them by malicious hackers. According to Business Insider, Hive Social's user base has doubled in the last few weeks, going from about 1 million to 2 million as of last week. The site is only being staffed by two people, "neither of whom had much of a background in security," reports Ars.
Australia

Australia Will Now Fine Firms Up To $33.4 Million for Data Breaches (bleepingcomputer.com) 19

The Australian parliament has approved a bill to amend the country's privacy legislation, significantly increasing the maximum penalties to AU$50 million for companies and data controllers who suffered large-scale data breaches. From a report: The financial penalty introduced by the new bill is set to whichever is greater: AU$50 million, three times the value of any benefit obtained through the misuse of information, and 30% of a company's adjusted turnover in the relevant period.

Previously, the penalty for severe data exposures was AU$2.22 million, considered wholly inadequate to incentivize companies to improve their data security mechanisms. The new bill comes in response to a series of recent cyberattacks against Australian companies, including ransomware and network breaches, resulting in the exposure of highly sensitive data for millions of people in the country. "The Albanese Labor government has wasted no time in responding to recent major data breaches. We have announced, introduced, and delivered legislation in just over a month," reads the media announcement. "These new, larger penalties send a clear message to large companies that they must do better to protect the data they collect."

Portables (Apple)

Judge Approves Apple's Massive MacBook Keyboard Lawsuit Payout (mactrast.com) 21

A California federal judge has given preliminary approval to Apple's plan to pay $50 million to settle a long-running class-action lawsuit over the faulty MacBook butterfly keyboard. MacTrast reports: Law360 says the payment will include $13.6 million in attorney fees, up to $2 million in litigation costs, and $1.4 million in settlement administration costs, with the rest distributed to class members. The lawsuit covers customers in California, Florida, Illinois, Michigan, New Jersey, New York, and Washington, who complained that Apple knew of and concealed the fact that its 2015 and later MacBook, MacBook Air, and MacBook Pro machines were equipped with "butterfly" keyboards that were prone to failure, and that its repair program for the keyboard was insufficient, as the replacement keyboards could also fail. [...]

Apple initially agreed to the settlement in July 2022. Customers in the above-mentioned states are expected to receive maximum payouts of $395 to customers who replaced multiple keyboards, $125 to people who replaced one keyboard, and $50 to people who replaced keycaps. Mac owners who received butterfly keyboard replacements will begin receiving class notices later in December.

Privacy

Telegram Shares Users Data in Copyright Violation Lawsuit (techcrunch.com) 22

Telegram has disclosed names of administrators, their phone numbers and IP addresses of channels accused of copyright infringement in compliance with a court order in India in a remarkable illustration of the data the instant messaging platform stores on its users and can be made to disclose by authorities. From a report: The app operator was forced by a Delhi High Court order to shared the data after a teacher sued the firm for not doing enough to prevent unauthorised distribution of her course material on the platform. Neetu Singh, the plaintiff teacher, said a number of Telegram channels were re-selling her study materials without permission at discounted prices.

An Indian court earlier had ordered Telegram to adhere to the Indian law and disclose details about those operating such channels. Telegram unsuccessfully argued that disclosing user information would violate the privacy policy and the laws of Singapore, where it has located its physical servers for storing users data. In response, the Indian court said the copyright owners couldn't be left "completely remediless against the actual infringers" because Telegram has chosen to locate its servers outside the country. In an order last week, Justice Prathiba Singh said Telegram had complied with the earlier order and shared the data.

Piracy

Torrent Site User Who Transferred 120TB of Pirated Content Avoids Prison (torrentfreak.com) 45

A torrent site user accused of downloading and uploading at least 120TB of movies, TV shows, eBooks, music and software, has avoided an immediate prison term. The 28-year-old was arrested as part of a police operation against DanishBytes. A member of the same site was sentenced earlier this month after he uploaded Netflix content obtained using hacked credentials. TorrentFreak reports: Early November 2021, Denmark's Public Prosecutor for Special Economic and International Crime (SOIK) announced that six people had been arrested following criminal referrals by Rights Alliance. All were members and/or operators of ShareUniversity and DanishBytes. Prosecution of site operators is not uncommon but when it's deemed in the public interest, pirate site users can also face charges. Every case is unique so criteria differ, especially across national borders, but when evidence shows large volumes of infringement, successful prosecutions become more likely. That was the case when a former DanishBytes user was sentenced last week. According to Danish anti-piracy group Rights Alliance, the 28-year-old man was a regular site member and wasn't involved in running the site. That being said, evidence showed that for the period January 2021 to November 2021, he downloaded and/or uploaded no less than 3,000 copyrighted works, including movies, TV shows, music, books, audiobooks and comics.

Information released by the National Unit for Special Crimes (NSK), a Danish police unit focused on cybercrime, organized crime, and related financial crime, reveals that the user's traffic statistics interested prosecutors. "During the period, the man downloaded no less than 100 TB and uploaded no less than 20 TB of copyrighted material," NSK says. BitTorrent trackers operating a ratio model usually insist on a better ratio of downloads to uploads but DanishBytes' situation was out of the ordinary.

The site launched in January 2021 in the wake of other sites being shut down, so had to get going from a standing start with no users. Even when arrests were being made, the site still had a relatively small userbase, which can limit opportunities to upload more. That may have been a blessing in disguise. Faced with the evidence, the man decided to plead guilty and was sentenced last week at the Court in Vibourg. In common with similar prosecutions recently, he received a suspended conditional sentence of 60 days' probation, 80 hours of community service, and confiscation of his computer equipment. The case against the DanishBytes user began with a Rights Alliance investigation and a referral to the police. As part of his sentence, the man must pay the anti-piracy group DKK 5,000 (US$600) in compensation but Rights Alliance director Maria Fredenslund is focused on the deterrent effect of another successful prosecution.

Cloud

Anker's Eufy Cameras Caught Uploading Content To the Cloud Without User Consent (macrumors.com) 33

Anker's popular Eufy-branded security cameras appear to be sending some data to the cloud, even when cloud storage is disabled and local only storage settings are turned on. MacRumors reports: The information comes from security consultant Paul Moore, who last week published a video outlining the issue. According to Moore, he purchased a Eufy Doorbell Dual, which was meant to be a device that stored video recording on device. He found that Eufy is uploading thumbnail images of faces and user information to its cloud service when cloud functionality is not enabled. Moore demonstrates the unauthorized cloud uploading by allowing his camera to capture his image and turning off the Eufy HomeBase. The website is still able to access the content through cloud integration, though he had not signed up for cloud service, and it remains accessible even when the footage is removed from the Eufy app. It's important to note that Eufy does not appear to be automatically uploading full streaming video to the cloud, but rather taking captures of the video as thumbnails.

The thumbnails are used in the Eufy app to activate streaming video from the Eufy base station, allowing Eufy users to watch their videos when away from home, as well as for sending rich notifications. The problem is the thumbnails are uploaded to the cloud automatically even when the cloud functionality is not active, and Eufy also seems to be using facial recognition on the uploads. Some users have taken issue with the unauthorized cloud uploads because Eufy advertises local-only service and has been popular among those who want a more private camera solution. "No Clouds or Costs," reads the Eufy website. Moore suggests that Eufy is also able to link facial recognition data collected from two separate cameras and two separate apps to users, all without camera owners being aware.

Moore received a response from Eufy in which Eufy confirmed that it is uploading event lists and thumbnails to AWS, but said the data is not able to "leak to the public" because the URL is restricted, time limited, and requires account login. There is also another issue that Moore has highlighted, suggesting Eufy camera streams can be watched live using an app like VLC, but little information on the exploit is available at this time. Moore said that unencrypted Eufy camera content can be accessed without authentication, which is alarming for Eufy users.
There's a dedicated Reddit thread where other Eufy users are reporting the same thing happening.
The Courts

BlockFi Sues FTX's Bankman-Fried Over Shares In Robinhood (cointelegraph.com) 42

Newly-bankrupt crypto lending platform BlockFi has filed a lawsuit against Sam Bankman-Fried's holding company Emergent Fidelity Technologies seeking his shares in Robinhood that were pledged as collateral earlier in November. CoinTelegraph reports: The suit was filed on Nov. 28 in the United States Bankruptcy Court for the District of New Jersey just hours after BlockFi filed for Chapter 11 bankruptcy in the same court. As per the filing, BlockFi is demanding Emergent turnover collateral as part of a Nov. 9 pledge agreement that saw Emergent agree to a payment schedule with BlockFi that it has allegedly failed to pay.

BlockFi names the collateral as "including certain shares of common stock." In May, Bankman-Fried acquired a 7.6% stake in the online brokerage firm Robinhood, buying a total of $648 million in Robinhood shares through his Emergent investment company.

United Kingdom

UK Ditches Ban On 'Legal But Harmful' Online Content In Favor of Free Speech 80

Britain will not force tech giants to remove content that is "legal but harmful" from their platforms after campaigners and lawmakers raised concerns that the move could curtail free speech, the government said on Monday. Reuters reports: Online safety laws would instead focus on the protection of children and on ensuring companies removed content that was illegal or prohibited in their terms of service, it said, adding that it would not specify what legal content should be censored. Platform owners, such as Facebook-owner Meta and Twitter, would be banned from removing or restricting user-generated content, or suspending or banning users, where there is no breach of their terms of service or the law, it said.

The government had previously said social media companies could be fined up to 10% of turnover or 18 million pounds ($22 million) if they failed to stamp out harmful content such as abuse even if it fell below the criminal threshold, while senior managers could also face criminal action. The proposed legislation, which had already been beset by delays and rows before the latest version, would remove state influence on how private companies managed legal speech, the government said. It would also avoid the risk of platforms taking down legitimate posts to avoid sanctions. [...]

The revised Online Safety Bill, which returns to parliament next month, puts the onus on tech companies to take down material in breach of their own terms of service and to enforce their user age limits to stop children circumventing authentication methods, the government said. If users were likely to encounter controversial content such as the glorification of eating disorders, racism, anti-Semitism or misogyny not meeting the criminal threshold, the platform would have to offer tools to help adult users avoid it, it said. Only if platforms failed to uphold their own rules or remove criminal content could a fine of up to 10% of annual turnover apply. Britain said late on Saturday that a new criminal offense of assisting or encouraging self-harm online would be included in the bill.
Bitcoin

Major Canadian Crypto Exchange Coinsquare Says Client Data Breached (coindesk.com) 19

Coinsquare, one of Canada's largest cryptocurrency exchanges, may have been breached, but the company claims customer assets are "secure in cold storage and are not at risk." CoinDesk reports: The exchange, which touts itself as "Canada's trusted platform to securely buy, sell and trade Bitcoin, Ethereum, and more," emailed customers Friday to report a "data incident" in which an unauthorized third party accessed a customer database containing personal information. According to the email, the breach exposed "customer names, email addresses, residential addresses, phone numbers, dates of birth, device IDs, public wallet addresses, transaction history, and account balances." Although the email was sent Friday, Coinsquare discovered the breach last week and notified customers via Twitter. "No passwords were exposed. We have no evidence any of this information was viewed by the bad actor," the email stated.

Coinsquare suspended activities on its platform after detecting the vulnerability last week, triggering speculation of possible liquidity issues, given the momentous implosion of multi-billion-dollar crypto exchange, FTX, earlier this month. Full service was restored on Friday, according to a tweet. "We want to reiterate that 100% of client funds are safely held in cold storage and are not used for business activities," the company tweeted.

Facebook

Meta Fined $277 Million for Leak of Half a Billion Users (bloomberg.com) 22

Meta Platforms was slapped with a $277 million fine for failing to prevent the leak of the personal data of more than half a billion users of its Facebook service. From a report: The Irish Data Protection Commission, the main privacy watchdog for Meta in the European Union, levied the fine following a probe that found the social-media company had failed to apply strict safeguards required under the bloc's sweeping General Data Protection Regulation.

On top of the fine -- the third-biggest under GDPR -- the watchdog ordered Meta's Irish unit to make sure its processing complies with the law, according to an emailed statement on Monday. The Irish authority is the lead watchdog for some of Silicon Valley's biggest tech firms that have set up an EU base in the country, including Meta. It opened its probe following revelations that "a collated dataset of Facebook personal data" had been published on the internet. Personal information on 533 million Facebook users worldwide reemerged on a hacker website last year, including their phone numbers and email addresses.

United States

US Goverment Investigating Real-Estate Tech Company Accused of Helping Landlords Collude (propublica.org) 132

The anti-trust division of America's Department of Justice "has reportedly opened up an investigation into RealPage, the real estate technology company accused of contributing to higher-than-normal rent prices," reports the Verge.

ProPublica writes that the investigation explores "whether rent-setting software made by a Texas-based real estate tech company is facilitating collusion among landlords, according to a source with knowledge of the matter." *The inquiry is being launched as questions have arisen about a 2017 merger between RealPage and its largest pricing competitor.... Congressional leaders have pushed for an investigation into RealPage in three letters to the DOJ and the Federal Trade Commission, which were sent after a ProPublica report on the software's use in mid-October.

The letters raised concerns that RealPage's pricing software could be pushing rents above competitive levels and allowing big landlords to coordinate their pricing in violation of federal antitrust laws. "We are concerned that the use of this rate setting software essentially amounts to a cartel to artificially inflate rental rates in multifamily residential buildings," three senators said in a letter in early November. They included Sen. Amy Klobuchar, the Minnesota Democrat who chairs the Senate Subcommittee on Competition Policy, Antitrust and Consumer Rights....

In addition to the letters from congressional lawmakers, renters have filed three lawsuits in federal court in Seattle and San Diego since mid-October, alleging RealPage and a slew of large landlords are engaging in anticompetitive behavior through the company's software.

They note Capital Forum's report with additional details — but the Verge nicely summarizes the issue: ProPublica's report states that the algorithm's design has "raised questions among real estate and legal experts about whether RealPage has birthed a new kind of cartel that allows the nation's largest landlords to indirectly coordinate pricing, potentially in violation of federal law." These experts have also raised concerns with the RealPage user group, an online forum that lets apartment managers who use the service communicate — and potentially coordinate — with one another.
Privacy

Small Study Finds Computer Repair Shops Accessed Personal Data - And Sometimes Even Copied It (arstechnica.com) 128

Ars Technica reports on what happened when researchers at the University of Guelph in Ontario, Canada, left laptops overnight at 12 computer repair shops — and then recovered logs after receiving their repairs: The logs showed that technicians from six of the locations had accessed personal data and that two of those shops also copied data onto a personal device....

The amount of snooping may actually have been higher than recorded in the study, which was conducted from October to December 2021. In all, the researchers took the laptops to 16 shops in the greater Ontario region. Logs on devices from two of those visits weren't recoverable. Two of the repairs were performed on the spot and in the customer's presence, so the technician had no opportunity to surreptitiously view personal data. In three cases, Windows Quick Access or Recently Accessed Files had been deleted in what the researchers suspect was an attempt by the snooping technician to cover their tracks....

The vast majority of repair shops provide no privacy policy and those that do have no means of enforcing them. Even worse, repair technicians required a customer to surrender their login password even when it wasn't necessary for the repair needed. These findings came from a separate part of the study, in which the researchers brought an Asus UX330U laptop into 11 shops for a battery replacement. This repair doesn't require a technician to log in to the machine, since the removal of the back of the device and access to the device BIOS (for checking battery health) is all that's needed. Despite this, all but one of the repair service providers asked for the credentials to the device OS anyway.

When the customer asked if they could get the repair without providing the password, three refused to take the device without it, four agreed to take it but warned they wouldn't be able to verify their work or be responsible for it, one asked the customer to remove the password, and one said they would reset the device if it was required.

China

Protests Erupting Across China (cnn.com) 172

"Protesters clash with police as unrest rocks cities across China," reads CNN's headline. The Guardian calls it "the biggest wave of civil disobedience on the mainland since Xi Jinping assumed power a decade ago," noting one crowd numbered over 1,000 protesters. "Crowdsourced lists on social media claim protests have been documented at as many as 50 Chinese universities over the weekend."

Looking back over the last 10 years, CNN's correspondent in China calls it "an unprecedented level of public dissent". During lockdowns people struggled to get emergency care, food, and necessities, but CNN's correspondent warns now "what we're seeing is this tipping point across the country, after years of suffering and deaths." "What we're seeing is people past their breaking point — it's years of pent-up anger. This is three years of draconian lockdowns that have cost people's lives, their livelihoods — but the trigger for this wave of protests was a deadly fire at Xinjiang that killed at least 10 people. Videos of the scene indicated that Covid restrictions prevented victims from getting help.

"But these protesters — not just angry about Covid lockdowns. They're also targetting their anger towards the supreme leader himself."

[CNN shows what they call "extraordinary" footage of people in Shanghai calling on Jinping to step down.]

"Over and over again. Those chants go on for quite some time. They're also calling for the Communist party to step down. I can't overstate just how shocking it is to hear this, this crowd in Shanghai — China's wealthiest and most cosmopolitan city. And that chanting happening in a central, upscale part of the city, to be directly calling out for Xi Jinping to resign — I mean, this is virtually unheard of. In China it is extremely dangerous to publicly criticize the party, especially Xi himself. You risk prison time, or even worse.

"Some protesters also chanted they don't want dictatorship, they want freedom and democracy. Witnesses told CNN as well that rows of police officers were making arrests, forcefully pushing protesters into police cars — but the next day on Sunday, hundreds of Shanghai residents returned, to continue protesting, despite heavy police presence and roadblocks. Videos also showed some protesters violently dragged away, and now that area has been mostly cordoned off.

New videos now "showed hundreds of people at an intersection shouting 'Release the people!' in a demand for the police to free detained demonstrators," reports CNN, in an article shared by Slashdot reader LionKimbro: By Sunday evening, mass demonstrations had spread to Beijing, Chengdu, Guangzhou and Wuhan, where thousands of residents called for not only an end to Covid restrictions, but more remarkably, political freedoms. In Beijing, hundreds of mostly young people demonstrated in the commercial heart of the city well into the small hours of Monday.... People chanted slogans against zero-Covid, voiced support for the detained protesters in Shanghai, and called for greater civil liberties. "We want freedom! We want freedom!" the crowd chanted under an overpass. Speaking to CNN's Selina Wang at the protest, a demonstrator said he was shocked by the turnout....

In the southwestern metropolis of Chengdu, large crowds demonstrated along the bustling river banks in a popular food and shopping district, according to a protester interviewed by CNN and videos circulating online.... "Opposition to dictatorship!" the crowd chanted. "We don't want lifelong rulers. We don't want emperors!" they shouted in a thinly veiled reference to Xi, who last month began a norm-shattering third term in office.

In the southern city of Guangzhou, hundreds gathered on a public square in Haizhu district — the epicenter of the city's ongoing Covid outbreak that has been locked down for weeks. "We don't want lockdowns, we want freedom! Freedom of expression, freedom of the press, freedom of arts, freedom of movement, personal freedoms. Give me back my freedom!" The crowd shouted.

Across China, protests have also broken out on university campuses — which are particularly politically sensitive to the Communist Party, given the history of the student-led Tiananmen Square protests in 1989....

In one video, a university official could be heard warning the students: "You will pay for what you did today."

"You too, and so will the country," a student shouted in reply.

The campus protests continued on Sunday, CNN reports, with a crowd of hundreds of students at Tsinghua University, another top university in Beijing.

"Videos and images circulating on social media show students holding up sheets of white paper and shouting: 'Democracy and rule of law! Freedom of expression!'"
EU

'How Washington Chased Huawei Out of Europe' (politico.eu) 102

Huawei "is giving up on Europe," writes Politico, saying the Chinese telecommunications company is "retrenching its European operations and putting its ambitions for global leadership on ice."

"The reasons for doing this have little to do with the company's commercial potential — Huawei is still able to offer cutting-edge technology at lower costs than its competitors — and everything to do with politics, according to interviews with more than 20 current and former staff and strategic advisers to the company." Pressed by the United States and increasingly shunned on a Continent it once considered its most strategic overseas market, Huawei is pivoting back toward the Chinese market, focusing its remaining European attention on the few countries — Germany and Spain, but also Hungary — still willing to play host to a company widely viewed in the West as a security risk.

"It's no longer a company floating on globalization," said one Huawei official. "It's a company saving its ass on the domestic market...."

Huawei's predicament was summed up by the company's founder Ren Zhengfei in a speech to executives at the company's Shenzhen headquarters in July. He laid out the trifecta of challenges the company has faced over the last three years: hostility from Washington; disruptions from the coronavirus pandemic; and Russia's invasion of Ukraine, which upended global supply chains and heightened European concerns about over-dependence on countries like China. "The environment we faced in 2019 was different from the one we face today," Ren said in his speech, which wasn't made public but was seen by POLITICO. "Don't assume that we will have a brighter future."

"We previously had an ideal for globalization striving to serve all humanity," he added. "What is our ideal today? Survival....!"

The company is also retrenching elsewhere, according to Ren. "We will give up markets in some countries," the firm's founder said in his speech this summer. "For example, we will give up markets in the Five Eyes countries and India." The "Five Eyes" refers to an intelligence-sharing arrangement between the U.S., U.K., Canada, Australia and New Zealand. All five countries have banned or are in the process of banning Huawei and other Chinese companies from their critical infrastructure because of security concerns.

Thanks to Slashdot reader fbobraga for submitting the article.

Slashdot Top Deals