This pre-visualization setup uses a massive green screen, a motion-tracked camera, and some custom computer hardware to enable directors to see a performer interacting with a virtual environment while everyone is still on set. There’s a lot of expensive gear in use here, but in the long run this method may be cheaper than having to do reshoots, or extensive post-production, if the captured green screen footage isn’t exactly what’s needed for a final shot.
Movie-making aside, you can also find setups like this one used for TV news and many kids’ shows. Why would a network pay for separate studios and standing sets for multiple shows when they can all just share a single green screen set and composite in different virtual environments as needed?
Earlier this week, numerous reports of credit card fraud started pouring in from OnePlus users. On the company’s forums, customers said that credit cards used to purchase a OnePlus smartphone recently were also seeing bogus charges, so OnePlus launched an investigation into the reports. It’s now a few days later, and the company has admitted that its servers were compromised—”up to 40,000 users” may have had their credit card data stolen.
OnePlus has posted a FAQ on the incident. “One of our systems was attacked,” the post reads. “A malicious script was injected into the payment page code to sniff out credit card info while it was being entered.” OnePlus believes the script was functional from “mid-November 2017” to January 11, 2018, and it captured credit card numbers, expiration dates, and security codes that were typed into the site during that time. Users who paid via PayPal or previously entered credit card information are not believed to be affected.
OnePlus says it “cannot apologize enough for letting something like this happen.” The company is contacting accounts it believes to have been affected via email, and OnePlus says it is “working with our current payment providers to implement a more secure credit card payment method, as well as conducting an in-depth security audit.”
On Friday, Twitter took an end-of-the-week opportunity to dump some better-late-than-never news onto its userbase. For anybody who followed or engaged with a Twitter account that faked like an American during the 2016 election season but was actually linked to a major Russian propaganda campaign, you’re about to get an email.
Twitter announced that it would contact a massive number of users with that news: 677,775 users to be exact. This count includes those who interacted with the 3,814 accounts that Twitter has directly linked to the Internet Research Agency (IRA), the Russian troll farm whose election-related meddling was exposed in 2017.
That number of accounts, Twitter noted, is a jump from Twitter’s prior count of 2,812 IRA-linked trolls, which it had disclosed as part of an October 2017 hearing in Congress. Twitter says that this specific pool of troll accounts generated 175,993 posts during the 2016 period of activity that Twitter has been analyzing, and the service noted that 8.4 percent of those posts were “election-related.” In its Friday disclosure, Twitter did not take the opportunity to acknowledge how the remaining percentage of these posts, which included anything from “I’m a real person” idle banter to indirect and divisive messaging, may have ultimately contributed to the troll farm’s impact. (For example: Twitter CEO Jack Dorsey bit, and bit hard, on a known IRA account by retweeting two of its 2016 posts.)
The post included snapshots of five example posts from IRA-linked accounts, which are included in the above gallery. Since Twitter’s post included their actual handles, you can find more screencaps of their activity before being banned by diggingaround.
Twitter also announced it discovered a larger batch of “automated, election-related activity originating out of Russia.” This activity, which Twitter describes as distinct from the IRA-powered campaigns, has now been linked to “13,512 additional accounts, for a total of 50,258 automated accounts.” The announcement was a little more vague about the substance and approach of these accounts, however, and it did not clarify whether any Twitter members who engaged with these accounts would be among those receiving an email notice.
Twitter says it has suspended all accounts discovered via its latest findings—which means anybody who engaged with the accounts in question will not be able to log onto Twitter and see what exactly fooled them. The company has also shared the “handles” of offending accounts to US Congress; based on that phrasing, that could mean the accounts’ contents remain unshared with Congress.
The post points out internal Twitter efforts to better identify and block illegitimate accounts. Among other disclosures, the announcement claims that Twitter “detects and blocks approximately 523,000 suspicious logins daily for being generated through automation” and that its automatic detection tools have gotten better at noticing trends such as “near-instantaneous replies to Tweets, non-random Tweet timing, and coordinated engagement.” The platform has continued to resist letting users report suspicious, troll farm-like activity, however, but it does promise to better prepare for similar, potential disruptions in the 2018 election season. Twitter says it will spearhead a comprehensive verification process for candidates in this coming election season and that it will “monitor trends and spikes in conversations relating to the 2018 elections for potential manipulation activity.”