Modder gets Android on the Rabbit R1 AI gadget, makes it actually useful

https://www.pcworld.com/article/2361716/modder-gets-android-on-the-rabbit-r1-ai-gadget-makes-it-actually-useful.html

For all the hullabaloo around AI this year, the consumer products that feature AI seem a bit lackluster. They’re either augmenting existing designs (like “AI PCs”) or they’ve flopped hard.

Take the Rabbit R1, which was such an instant failure that it made its way into mainstream news. But one modder is determined to make the thing useful—with a bit of old-fashioned Android ROM power.

If you missed the feeding frenzy that was the Rabbit R1 launch, here’s a quick recap: the Rabbit R1 is a handheld gadget that claims to leverage the power of artificial intelligence to replace some (or all) of the functions of a smartphone, automatically performing the tasks that you’d normally do yourself via apps and texts.

At launch, the barebones hardware (basically just a front-end for APIs and a lot of ChatGPT-style voice interfaces) was blasted as essentially useless, with almost all of the promised near-magical functionality either broken or unavailable until an unspecified date. It was so bad, the makers of the Rabbit R1 have been accused of running a multi-million-dollar scam.

Despite all its problems, the Rabbit R1 is actually kind of cute. With its squat orange case and prominent scroll wheel, it looks like one of those experimental smartphones you would’ve seen ten years ago (like the Blackberry Passport).

Maybe that’s why smartphone modder Facundo Holzmeister of the HowToMen YouTube channel decided to get a custom-baked version of Android running on the thing.

Unsurprisingly, the Rabbit R1’s mobile hardware already runs Android under its hood. The open-source OS is, after all, the easiest way to customize any kind of small gadget with a touchscreen.

But in order to turn the thing into something closer to a conventional smartphone—a small, goofy-looking one—Holzmeister needed to get a slightly customized version of the Lineage custom ROM on the thing, building on initial work done by others since the device’s launch.

Running a more fully-baked version of Android 13, the Rabbit R1 becomes a tiny, functional phone that’s a bit slow and janky. The rotating camera is now working, which is more than you could say for the “AI detection” functionality of the original software.

You can even use the chunky scroll wheel as a volume dial, and you can send and receive texts with the device’s SIM card. (Sadly, phone calls aren’t working at the moment.) But perhaps most impressive is that many apps from the Google Play Store can run on the 2.8-inch screen.

The $200 Rabbit R1 likely won’t be a favorite of Android modders like other oddball hardware, such as the old Barnes & Noble Nook Color or the HP Touchpad. Its tiny size and abysmal battery life when running a more fully-fledged OS make it impractical for everyday use.

But if you’re a fan of weird, doomed gadgets, it might just get a spot on your shelf next to, say, the HTC First “Facebook Phone” or the OUYA.

via PCWorld https://www.pcworld.com

June 10, 2024 at 10:18AM

A US Company Enabled a North Korean Scam That Raised Money for WMDs

https://www.wired.com/story/registered-agents-north-korean-scam-wmds/

For years, the Federal Bureau of Investigation has been unraveling what it asserts is a scam perpetrated by agents of North Korea, which used fake companies employing real IT workers to funnel money back to the regime’s military.

An American company played a key role in creating shell companies used as part of the scheme, a WIRED review of public records shows. Elected officials are now contemplating addressing loopholes in business-registration law that the scheme exposed.

In May, Wyoming secretary of state Chuck Gray revoked the business licenses of three companies linked to the North Korean scam: Culture Box LLC, Next Nets LLC, and Blackish Tech LLC. Gray said his office made the decision after receiving information from the FBI and conducting an investigation.

“The communist, authoritarian Kim Jong Un regime has no place in Wyoming,” Gray said in a May press release.

The companies posed as legitimate operations where businesses could hire contract workers to perform IT solutions, complete with fake websites featuring smiling photos of apparent employees. The companies all had one thing in common: Their incorporation documents were filed by a company called Registered Agents Inc., which says its global headquarters is in Sheridan, Wyoming.

Registered Agents, which provides incorporation services in every US state, takes the practice of business privacy to the extreme, and regularly uses fake personae to file formation documents with state agencies, a WIRED investigation previously found.

Culture Box LLC, one of the companies that Gray and the FBI linked to North Korea, listed “Riley Park” as the name of a Registered Agents employee on documents submitted to the Wyoming secretary of state. Park, according to several former employees of Registered Agents, is a fake persona that the company regularly used to file incorporation documents.

In a statement provided to WIRED, Registered Agents wrote, “The Wyoming Secretary of State dissolved the entities and we initiated the 30-day process to resign as their agent in mid-May. Ours and Wyoming’s processes to identify bad actors works. It strikes the best balance of individual privacy and business transparency supported by an entire ecosystem that cares about supporting entrepreneurs while rooting out the small percent of scammers.” The FBI’s St. Louis office, which led the investigation, did not respond to a request for comment.

The North Korean operation worked like this: Agents of the regime created fake companies purporting to be legitimate firms offering freelance IT services. Workers hired by North Koreans, or North Koreans themselves, would then perform legitimate contractor work, often using assumed identities.

In some instances, Americans would set up low-cost laptops with remote-access software, allowing North Korean workers to perform freelance IT work while appearing to use American IP addresses. The FBI referred to these Americans as “virtual assistants.”

The payments for the IT work were eventually funneled back to North Korea—where, the Department of Justice asserts, it was directed to the country’s Ministry of Defense and other agencies involved in WMD work. The scheme was so expansive that any company that hired freelance IT workers “more than likely” hired someone involved in the operation, according to FBI agent Jay Greenberg.

via Wired Top Stories https://www.wired.com

June 5, 2024 at 04:39AM

Qualcomm wants 50% of the PC market by 2029

https://www.pcworld.com/article/2356320/qualcomm-wants-50-of-the-pc-market-by-2029.html

The biggest news at Computex is how Snapdragon chips are storming the beaches of the Windows-based PC market, spearheading Microsoft’s huge Copilot+ laptop push. We’ve seen Arm-based PC hardware before, but the designs have improved so much that they’re meeting and sometimes beating the Intel and AMD competition. Qualcomm’s CEO thinks they might be good enough to dominate, and do it very quickly.

Speaking to Tom’s Hardware, Cristiano Amon doubled down on bullish projections from Arm, the company that designs the architecture behind the chips in smartphones, tablets, most integrated electronics, and now, Macs and PCs. Amon said that he subscribed to the idea that Arm-based chips could take over 50 percent of the PC market within five years.

“Some OEMs are talking about 40 to 60 percent of their total sales within three years,” Amon said. “I also saw some OEMs talking about 50 percent, but those are the order of magnitudes. That’s kind of the opportunity that we have.”

Yesterday PCWorld’s Mark Hachman spoke with Arm CEO Rene Haas about Qualcomm’s designs for Arm Snapdragon chips, the rise of AI in consumer PCs, and how Apple pushed the industry to open up to Arm processors. For a more practical look at what an Arm-based Windows PC might mean for you, be sure to check out Gordon Ung’s analysis of benchmarks between laptops powered by Qualcomm, Apple, and Intel hardware.

via PCWorld https://www.pcworld.com

June 4, 2024 at 10:41AM

Google Is an Even Bigger Privacy Nightmare Than You Think

https://lifehacker.com/tech/google-is-a-bigger-privacy-nightmare-than-you-think

Saying "Google is a privacy nightmare" in 2024 probably isn’t telling you anything you don’t already know. It’s an open secret that one of the biggest tech companies in the world gobbles up our data, with and without our consent, and uses it in a bunch of different ways, some of which you might find unscrupulous.

But Google still has the capacity to shock: 404 Media has revealed details from six years’ worth of privacy and security reports contained within an internal Google database. These previously unreported privacy incidents number into the thousands, and were disclosed by Google employees to the company.

The incidents run the gamut in terms of severity, and it’s worth noting that some affected only a limited pool of users, or were rapidly addressed by Google. However, as a whole, the collection of incidents 404 Media shared today is as fascinating as it is concerning.

Privacy issues affecting children, YouTube users

Many of these incidents affected children. One claim suggests Google exposed over one million email addresses from Socratic.org users following an acquisition of the company, including those belonging to minors—and it’s possible those users’ IP addresses and geolocation data were also exposed. Another claim says a "Google speech service" logged all audio for an hour, and the recordings included speech information for around 1,000 children; a filter that was set to block data collection when it detects children’s voices failed to work. And during the launch of the YouTube Kids app, children that pressed the microphone button on an Android keyboard had their audio logged.

Other incidents also involved YouTube. Most notably, Nintendo’s YouTube account was mildly compromised after a Google employee was able to access its private videos. That employee then leaked news that Nintendo was preparing to reveal in an upcoming announcement, although Google says the incident was "non-intentional." YouTube also suggested videos to users based on videos those people had deleted from their watch histories, which goes against YouTube’s internal policies. It’s not clear why it happened. YouTube’s blurring feature also left uncensored versions of pictures available for view, and videos uploaded as "Unlisted" or "Private" had a short window when they were publicly viewable.

Waze leaked addresses and Google Docs links were made public

It doesn’t stop there. Other general privacy and security issues include problems with the carpool feature in Waze, which reportedly leaked both trip information and the addresses of users. Someone reportedly manipulated affiliate tracking codes through AdWords (Google’s ad platform at the time) by modifying customer accounts; a raid of Google’s Jakarta office was leaked through a warning from Google’s security service; and for a time, Google Drive and Google Docs on iOS treated the “Anyone with the link" setting as a "Public" link.

The most egregious incident, in my view, impacted people who weren’t actively using a Google service in the first place. The report alleges that Google’s Street View feature transcribed and saved license plate numbers alongside geolocation information. That’s a pretty big mistake, Google. Not that any of us actually consented to Google taking photographs of nearly every street in the world, but the company is supposed to censor identifying information, like faces, license plates, and, of course, where in the world you happened to be when that Street View photo was taken—not log it away.

To Google’s credit, the company told 404 Media that these reports were all addressed, and are from over six years ago. Google says it is all part of the company’s process for reporting product issues: If an employee detects a problem, such as a privacy or security violation, they can flag it and send along to the appropriate department for triage. The company also said some of these flags ended up not being issues at all, or stemmed from problems impacting third-party services.

Too big to avoid

Admittedly, all products and services, especially at the scale at which Google operates, are going to have issues from time to time. No company makes the perfect system, and when issues happen, what’s important is how the company responds, and what it changes to ensure the issue doesn’t occur again. It’s tough to be so understanding, though, when you’re talking about a company as gargantuan as Google. The search giant owns a piece of all of our data in some way, shape, or form, so when one of their products has an issue, whether it involves revealing censored images, logging audio from users, or storing private data with geolocation tags, it’s going to affect an outsized number of people.

It doesn’t even matter if you pledge to swear off using Google products for good: You could abstain from internet-connected devices entirely, and still have your license plate scraped and stored by Street View. There’s no getting away from it: Google is now everywhere, and we can only hope they are being as responsive and thorough as they claim in safeguarding our data.

via Lifehacker https://ift.tt/RGswXSj

June 3, 2024 at 04:36PM

China lands Chang’e 6 sample-return probe on far side of the moon, a lunar success (video)

https://www.space.com/china-change-6-lands-on-moon-far-side-sample-return-mission

China has landed on the moon’s mysterious far side — again.

The robotic Chang’e 6 mission touched down inside Apollo Crater, within the giant South Pole-Aitken basin, at 6:23 a.m. Beijing Time on Sunday (June 2) , according to Chinese space officials. It was 6:23 p.m. EDT (2223 GMT) on June 1 at the time of the landing. The probe "successfully landed in the pre-selected area," China’s space agency said.

The China National Space Administration (CNSA) now has two far-side landings under its belt — this one and Chang’e 4, which dropped a lander-rover combo onto the gray dirt in January 2019. No other country has done it once.

A depiction of China’s Chang’e 6 moon lander on the far side of the moon after landing on June 2, 2024. (Image credit: CCTV)

And Chang’e 6 will make further history for China, if all goes according to plan: The mission aims to scoop up samples and send them back to Earth, giving researchers their first-ever up-close looks at material from this part of the moon.

"The Chang’e-6 mission is the first human sampling and return mission from the far side of the moon," CNSA officials said in a translated statement. (To be clear: Chang’e 6 is a robotic, not crewed, mission.) "It involves many engineering innovations, high risks and great difficulty." 

Related: China’s Chang’e 6 mission has a big lunar mystery to solve

Sampling a new environment

Chang’e 6 launched on May 3 with a bold and unprecedented task: haul home samples from the moon’s far side, which always faces away from us. (The moon is tidally locked to Earth, completing one rotation on its axis in roughly the same amount of time it takes to orbit our planet. So observers here on Earth always see the same side of our natural satellite.)

Breaking space news, the latest updates on rocket launches, skywatching events and more!

Every lunar surface mission before Chang’e 4 targeted the near side, largely because that area is easier to explore. It’s harder to communicate with robots operating on the far side, for example; doing so generally requires special relay orbiters, which China launched ahead of both Chang’e 4 and Chang’e 6. China’s newest moon relay satellite, called Queqiao-2, aided the Chang’e 6 landing, CNSA officials said.

Chang’e 6 arrived in lunar orbit about four days after liftoff. It spent the next few weeks scrutinizing its planned landing site and gearing up for today’s big event, which went according to plan: Chang’e 6’s lander came down softly in Apollo Crater, leaving the mission’s orbiter, with its attached Earth-reentry module, circling the moon.

Diagram showing the various phases of the Chang’e 6 lunar sample-return mission. (Image credit: CNSA)

The lander will spend the next few days studying its surroundings and collecting about 4.4 pounds (2 kilograms) of lunar dirt and rock. Some of these samples will be scooped from the surface and some will be dug from up to 6.5 feet (2 meters) underground, using Chang’e 6’s onboard drill.

This material will then be launched into lunar orbit by a rocket that rode down with the lander. The sample container will rendezvous with the Chang’e 6 orbiter, then make the long trek back to Earth, eventually touching down here under parachutes on June 25.

Chang’e 6 is also carrying a tiny moon rover and has a variety of scientific experiments onboard the lander.

The China National Space Administration’s Chang’e 6 sample-return probe and its mini-rover (circled) seen before launching to the far side of the moon. (Image credit: CAST)

Scientists will study the returned material in detail, seeking insights about the moon’s history and evolution and clues about why the lunar far side is so different than the near. The dark volcanic seas known as maria are common on the near side, for example, but are rare on the far side, for reasons that remain mysterious.

Researchers will doubtless compare the Chang’e 6 material to the samples collected on the moon’s near side by Chang’e 5, which came down to Earth in December 2020. (Chang’e 5 and Chang’e 6 are sister missions, with virtually identical architectures.)

Related: The moon: Everything you need to know

Big lunar dreams

The Chang’e moon program, which is named after the Chinese moon goddess, has launched increasingly complex and ambitious missions over the past 17 years.

Chang’e 1 and Chang’e 2 sent orbiters to the moon in 2007 and 2010, respectively. Chang’e 3 marked China’s first trip to the lunar surface, putting a lander-rover duo on the near side in late 2013. Chang’e 4 landed a similar pair on the far side in early 2019. Chang’e 5-T1 launched a test capsule around the moon and back to Earth in 2014, proving out the gear that could get lunar samples here safely, which Chang’e 5 did in late 2020.

And there are more missions to come. Chang’e 7 is scheduled to launch in 2026 to assess the resource potential of the moon’s south polar region, which is thought to harbor large stores of water ice. Chang’e 8, which will lift off two years later, will test ways to use those resources on-site — building a structure out of lunar dirt and rock, for example.

And all of this robotic work will lead to something even bigger, if all goes according to plan: crewed missions to the moon, which China aims to start launching by 2030. The nation wants to build an astronaut outpost near the south pole called the International Lunar Research Station later in the 2030s, with help from partners such as Russia, Belarus and Pakistan.

The United States has similar aims with its Artemis program, which is targeting late 2026 for its first crewed lunar landing. The U.S. is also building a moon-exploration coalition via a diplomatic framework called the Artemis Accords; more than 40 nations have signed on to date.

via Space https://www.space.com

June 3, 2024 at 04:59AM

‘Largest Botnet Ever’ Tied to Billions in Stolen Covid-19 Relief Funds

https://www.wired.com/story/911-s5-botnet-arrest/

The United States Department of Justice on Wednesday announced charges against a 35-year-old Chinese national, YunHe Wang, accused of operating a massive botnet allegedly linked to billions of dollars in fraud, child exploitation, and bomb threats, among other crimes.

Wang, identified by numerous pseudonyms—Tom Long and Jack Wan, among others—was arrested on May 24 and is accused of distributing malware through various pop-up VPN services, such as “ProxyGate” and “MaskVPN,” and by embedding viruses in internet files distributed via peer-to-peer networks known as torrents.

The malware is said to have compromised computers located in nearly every country in the world, turning them into proxies through which criminals were able to hide their identities while committing countless crimes. According to prosecutors in the US, this included the theft of billions of dollars slated for Covid-19 pandemic relief; funds allegedly stolen by foreign actors posing as unemployed US citizens.

According to an indictment, the infected computers allegedly provided Wang’s customers with a persistent backdoor, allowing them to disguise themselves as any one of the victims of Wang’s malware. This illicit proxy service, known as “911 S5,” launched as early as 2014, the US government says.

“The 911 S5 Botnet infected computers in nearly 200 countries and facilitated a whole host of computer-enabled crimes, including financial frauds, identity theft, and child exploitation,” says FBI director Christopher Wray, who described the illicit service as “likely the world’s largest botnet ever.”

The US Treasury Department has also sanctioned Wang and two other individuals allegedly tied to 911 S5.

Wang is said to have amassed access to nearly 614,000 IP addresses in the US and more than 18 million others worldwide—collectively, forming the botnet. 911 S5’s customers were able to filter the IPs geographically, choosing where they’d like to appear to be located down to a specific US zip code, the DOJ claims.

The indictment states that of the 150 dedicated servers used to manage the botnet, as many as 76 were leased by US-based service providers, including the one hosting 911 S5’s client interface, which allowed criminals overseas to purchase goods using stolen credit cards, in many cases for the alleged purpose of circumventing US export laws.

More than a half million fraudulent claims lodged with pandemic relief programs in the United States are allegedly tied to 911 S5. According to the indictment, nearly $6 billion in losses have been linked to IP addresses captured by 911 S5. Many of the IP addresses have been reportedly tied to more insidious crimes, including bomb threats and the trafficking of child sexual abuse material, or CSAM.

“Proxy services like 911 S5 are pervasive threats that shield criminals behind the compromised IP addresses of residential computers worldwide,” says Damien Diggs, the US attorney for the Eastern District of Texas, where the charges against Wang were brought by a grand jury earlier this month.

Adds Nicole Argentieri, head of the Justice Department’s Criminal Division: “These criminals used the hijacked computers to conceal their identities and commit a host of crimes, from fraud to cyberstalking.”

At the time of writing, it is unclear whether these virtual impersonations resulted in any criminal investigations or charges against US-based victims whose IP addresses were hijacked as part of the 911 S5 botnet. WIRED is awaiting a response from the Department of Justice regarding this concern.

According to the Justice Department, law enforcement agencies in Singapore, Thailand, and Germany collaborated with US authorities to effect Wang’s arrest.

Wang faces charges of conspiracy, computer fraud, conspiracy to commit wire fraud, and conspiracy to money laundering, with a maximum penalty of 65 years in prison. The US is also seeking to seize a mountain of luxury cars and goods allegedly owned by Wang, including a 2022 Ferrari Spider valued at roughly half a million dollars as well as a Patek Philippe watch worth potentially several times that amount.

via Wired Top Stories https://www.wired.com

May 29, 2024 at 04:24PM