Connect with us

TECH

Twitter glitches hinder DeSantis’ debut as presidential candidate: NPR

Published

on


In this photo illustration, businessman and Twitter owner Elon Musk is tweeting about the Twitter Spaces event he will host with Florida Gov. Ron DeSantis on May 24, 2023 in Chicago, Illinois.

Scott Olson/Getty Images


hide title

toggle signature

Scott Olson/Getty Images


In this photo illustration, businessman and Twitter owner Elon Musk is tweeting about the Twitter Spaces event he will host with Florida Gov. Ron DeSantis on May 24, 2023 in Chicago, Illinois.

Scott Olson/Getty Images

This was to be a historic moment for Twitter: Florida Gov. Ron DeSantis smoothly announced his presidential candidacy on the social media platform.

An ongoing conversation between DeSantis and Twitter CEO Elon Musk will be streamed live on Twitter Spaces to mark the occasion.

But instead, there were technical problems on the air. After about 20 minutes of rumble, echo and chaos, it all ended abruptly.

A lot of on Twitter had a one-word description for it: “catastrophe.”

The start of the broadcast was delayed for several minutes, and then interrupted twice. Tech investor David Sachs, who was supposed to present the event, was heard to say, “The servers are melting.”

At another moment, when Sachs tried to speak, his words were echoed. “He just keeps falling, doesn’t he?” the voice of an unknown speaker was heard as Musk and his team tried to fix the problem.

A few minutes later, Musk was promoting the new space, which seemed to work, but most of the audience didn’t seem to respond. The first space seemed to draw over 500,000 visitors at its peak, while the second seemed to hover around 150,000.

During the discussion, Sachs stated that Spaces’ audience was one of the largest on the platform, but Ernest Wilkins, a former Twitter employee who helped create Spaces, said “Lol, this isn’t in the top 150 best-sized Spaces in the history of the product.”

The platform’s resounding malfunction was no surprise to those who have been following the social networking site since Musk took over it.

Since being acquired by Twitter in October, the company has become a shell of itself.

His workforce has shrunk to about 10% of what it was before the Musk acquisition, following mass layoffs and the departure of hundreds of others. Outages have become much more frequent. General system buggy has also become the norm for many users.

So perhaps it’s not a stunning turn of events that Spaces blew up just as DeSantis was delivering his big news, despite Musk’s enthusiasm for the event.

“Musk has reduced the staff needed to prevent disruptions to Twitter. It’s fitting that his reckless management style will delight him just as many tune in to him,” said Nora Benavidez of Free Press, a digital rights advocacy group.

One Twitter user, competitor to Bluesky, put it this way: “Although you knew it would happen, it’s still amazing that it happened lol.”

TECH

App that lets people rent their pools sparks anger and calls for regulation

Published

on

Hot potato: The idea for an app that’s essentially Airbnb but for pools has drawn a lot of ire from residents in one county who say it’s turned their neighborhood into a pool club. This has led to calls for tighter regulation of these types of rental apps, especially after the death of a 7-year-old last year.

smooth was founded in 2018 for people who want to use the pool. It has gained a lot of popularity since the closure of many community pools due to the pandemic and has listings in over 125 markets in the US, Canada and Australia. Like Airbnb, users can rent out their backyard pools to strangers using the app, charging between $25 and $100 an hour.

Washington Post writes that not everyone likes Swimply, especially in Montgomery County, Maryland’s most populous county. Residents complained to the county authorities about the noise from the pools, which were rented out.

One resident said they were forced to close windows and deal with swimsuit-clad people roaming the streets waiting for their turn to use the pool.

“It’s a recurring stream of paying ‘guests’ looking to make the most of their time by the pool,” they said. Parking, congested roads and security issues are what other residents have been worried about Swimply and similar amenity rental apps.

One homeowner was fined and the county closed the pool lease due to complaints.

Calls for tighter regulation come a year after a 7-year-old girl drowned in a New Jersey pool rented by Swimply for a party. The company says it instructs hosts on basic check-in security measures, although it never specified what that entails.

This isn’t the first time Swimply has made nasty headlines. Last year, there were reports of people discovering their pools were placed on the rental app without their permission or knowledge. It turned out that the scammers created fake accounts that tried to deceive users.

Montgomery County has introduced a joint economy bill that proposes new rules for renting swimming pools, home gyms and greyhound racing. It encourages homeowners to register their lease with the county, pay for an operating license, and pay taxes. There are also calls for annual inspections of rental properties. Places in other states are also calling for tighter regulation or a total ban on pool rentals, though nothing has been done so far.

Continue Reading

TECH

Revealed the inner workings of “Predator”, Android malware that used 5 0-day

Published

on

Smartphone malware sold to governments around the world can covertly record voice calls and nearby audio, collect data from apps like Signal and WhatsApp, and hide apps or prevent them from running when the device is rebooted, researchers at the Cisco Talos security team have found. .

IN analysis Talos, published on Thursday, provides the most detailed review of Predator, an advanced spyware that can be used against Android and iOS mobile devices. Predator is developed by Cytrox, a company that Citizen Lab said is part of the Intellexa Alliance, “a marketing label for a range of hired video surveillance vendors launched in 2019.” Other companies in the consortium include Nexa Technologies (formerly Amesys), WiSpear/Passitora Ltd. and Senpai.

Last year, researchers at Google’s Threat Intelligence Group, which monitors government-led or government-sponsored cyberattacks, reported that Predator bundled with five separate zero-day exploits in one package and sold it to various government-backed entities. These buyers used the package in three different campaigns. The researchers said the Predator worked closely with a component known as Alien, which “lives inside a few privileged processes and receives commands from the Predator.” Teams included recording audio, adding digital certificates, and hiding apps.

Meanwhile, Citizen Lab said the Predator is being sold to a wide range of government entities from countries such as Armenia, Egypt, Greece, Indonesia, Madagascar, Oman, Saudi Arabia and Serbia. Citizen Lab went on to report that the Predator was used to attack Ayman Nur, an Egyptian political opposition member living in exile in Turkey and an Egyptian exiled journalist who runs a popular news program and requested to remain anonymous.

unknown so far

Much of the inner workings of Predator were previously unknown. This has changed now that Talos has obtained key pieces of malware written for Android devices.

According to Talos, the malware is based on Predator and Alien. Contrary to previous beliefs, the Alien is more than just a Predator loader. Rather, it actively implements the low-level capabilities that the Predator needs to spy on its victims.

“A new analysis of Talos has revealed the inner workings of PREDATOR and the mechanisms it uses to communicate with another spy component deployed alongside it, known as ‘ALIEN,'” the report said Thursday. “The two components work together to bypass traditional security features in the Android operating system. Our results show the degree of interweaving of features between PREDATOR and ALIEN, proving that ALIEN is much more than just a loader for PREDATOR as previously thought.”

In the sample analyzed by Talos, Alien took over target devices using five vulnerabilities – CVE-2021-37973, CVE-2021-37976, CVE-2021-38000, CVE-2021-38003, CVE-2021-1048 – the first four of which affected Google Chrome , and in the last – Linux and Android.

Alien and Predator work hand in hand to bypass restrictions in the Android security model, primarily those imposed by the security known as SELinux. Among other things, SELinux on Android carefully guards access to most sockets, which serve as communication channels between various running processes and are often used by malware.

One way to do this is to load Alien into the memory space reserved for Zygote64, a method that Android uses to launch apps. This maneuver allows the malware to better manage the stolen data.

“By storing the recorded audio in a shared memory area with ALIEN, then saving it to disk and deleting it with PREDATOR, this limitation can be circumvented,” write the Talos researchers. “This is a simplified representation of a process – keep in mind that ALIEN is injected into the zygote address space to jump to specialized privileged processes within the Android permissions model. Because zygote is the parent process of most Android processes, it can change to most UIDs and change to other SELinux contexts with different privileges. Thus, this makes zygote an excellent target for initiating operations that require multiple sets of permissions.”

Predator, in turn, relied on two additional components:

  • Tcore is the main component and contains the main functions of spyware. Spying capabilities include recording audio and collecting information from Signal, WhatsApp and Telegram and other applications. Peripheral features include the ability to hide apps and prevent apps from running when the device reboots.
  • Kmem, which provides random read/write access to the kernel address space. This access is granted by Alien using CVE-2021-1048, allowing the spyware to perform most of its functions.

The deep dive will likely help engineers build better defenses to detect Predator spyware and prevent it from misbehaving. Talos researchers were unable to obtain versions of Predator designed for iOS devices.

Continue Reading

TECH

How to talk about AI and the TikTok ban in Montana

Published

on

Everyone seems to be talking about AI. But if you’re feeling overwhelmed or insecure about what the hell people are talking about, don’t worry. We have you.

Melissa Heikkila, our Senior AI Reporter, asked the top journalists in the business to share their top tips for talking about AI with confidence.

Considering they’re tech-obsessed all day, listening to AI people, and then translating what they’re saying into clear, understandable language with important context, it’s fair to say they know a thing or two about what they’re talking about.

Read the whole story to learn about seven things to pay special attention to when talking about AI.

This story is taken from Melissa’s weekly Algorithm newsletter, which gives you the inside on everything to do with AI. register to receive it in your mailbox every Monday.

The Future of TikTok Bans

Montana recently banned TikTok in what was the most dramatic move by U.S. lawmakers against the company to date.

U.S. politicians have been scrutinizing the app in recent months over concerns about Chinese spying, and under the new changes, marketplaces like Google Play and the Apple App Store could be fined $10,000 a day if they make TikTok accessible. for users in Montana starting January 1st. Next year.

Continue Reading
Advertisement

Trending