Let us begin with Jasmin Paris completes the Barkley Marathons race, the first woman to do the five loop race, with only 99 seconds to spare before the time limit would have stopped her attempt. Which is extremely impressive, given that part of the Barkley tradition involves finding books, running laps on presumably-memorized courses, having to meet time checkpoints along the way, and a whole lot of other things that make it not just a test of physical endurance, but mental capacity. So with no ACL from a decades-old injury, and with a fair amount of hallucinations along the way, Jasmin still completed the Barkley on her third attempt. It turns out that while she was doing this feat, there had been serious worries from the race directors as to whether to stop Jasmin from going out while she was having issues keeping food down. But she completed it, taking several records and firsts along the way, not that she was concerned with such things while out on the course.
The men's side had several finishers, including one who completed the event on his first run.
An important technology note: if you are the kind of person who runs a rolling-release Linux system, or you have pinned your installation to the more unstable parts of your release, the xz package was targeted for malicious code inclusion, and versions that had backdoors that would make ssh sessions insecure through exploitation of systemd were pushed to some of the unstable or rolling-release repositories. The general advice is that if you have an affected version, that you run an update through your package manager immediately, so as to either revert to a safer version or to install a patched version that has removed the backdoor from it. The exploit was discovered by someone running diagnostics on why their sessions with ssh were taking extra time and CPU and why other parts of the system were throwing errors and crashes, and then was able to trace the fault to the xz and lzma tarballs that had been uploaded by a new contributor to xz. Timeline construction and behavior analysis of the contributor and possible sockpuppet accounts is ongoing, while the still sole legitimate maintainer of the package has put up a site about the backdoor, including a link to a FAQ. Much of the other commentary I have seen around about this has been basically about xkcd 2347 and how vulnerable this can make that sole developer, anywhere in the world, especially if they're having crises and would more than happily welcome another person to help maintain a package that a significant amount of people depend upon. Even more so if they're not, y'know, getting paid for their software maintenance by anyone so they can make a living paying attention to such things.
For the most part, the response has been "Fuck, we got lucky", as there are now people spidering out to try and reverse-engineer the payload and see if there are any other attack vectors that could accomplish the same tasks as this one. One person noticed and analyzed and found something suspicious. And then the ethos of open source and analysis went to work.
Spreading the ashes of loved ones on their favorite Disney rides apparently shuts down said ride for significant cleaning, because human remains are sufficiently a biohazard that they need extra-deep cleaning. There are better places to spread ashes. Or, perhaps, only a very small amount of ashes have to be left. Odds are good, however, that there's nowhere in the park or on the attractions where you could do such a thing without it being caught on a camera.
A large amount of 21st century Christian (and a fair few secular) attitudes about women, adornment, makeup, and the process of being a beautiful woman in public are traceable to early Christian writers trying to make a distinction between the women they wanted, who kept their beauty on the inside, and the ones they were afraid of, the ones who wore their beauty on the outside.
Trialing ways to get people who have lost sight to experience artworks in conjunction with actual people who have sight loss, and therefore are both getting useful feedback on how to make the things work better and not getting caught in the trap of believing they already know what disabled people need to experience art.
An Australia art exhibit that created a closed-off space that men could not enter has had the museum hosting the exhibit sued for discrimination, which, in its own way, also contributes to the art exhibition and the point of how often women have been excluded from spaces and needed to sue (sometimes repeatedly) to be included in places that otherwise would not have been open to them. The account also points out a certain amount of coordinated action and artwork during the trial from members of the gallery, suggesting they also see the suit and trial as part of the exhibition.
A container ship suffered a power loss at a critical point in trying to get out of the Port of Baltimore and crashed into a support for the Francis Scott Key bridge, collapsing the bridge. The ship immediately sent a mayday and attempted to avoid striking the bridge support, but could not evade the hit. There are six now presumed dead who were working on the bridge at the time of the strike, but because the incident happened around 01:30 and because authorities worked to ensure that there was no traffic on the bridge as soon as they received the mayday, the casualty count is far less than it could have been.
Some states are fighting to make voter registration data less available to anyone who expresses an interest in it, and they are running into courts who decide that the right for someone to doxx you and harass you because you voted a way they didn't approve of is more important. I would be more charitable to the idea of needing to examine the rolls for irregularities and find possible voting fraud, except that "voter fraud" has become a shibboleth for those who believe anything other than perpetual rule by them is illegitimate, because nobody would ever vote against them and their perfect plans for all of us.
The democratization of printing and distribution produced a plethora of women's newsletters in the UK where keeping the dialogue and information flowing was the point, rather than scoring points. Which also then included the printing of some deliberately provocative material so as to keep the discussion going. It's what, I think, many of the users of modern social media want their social media site to be, and why they are so incensed by the ways that the algorithms instead put them in contact with people who are not interested in listening and continuing the dialogue, but insisting they are the sole arbiters of truth and reality.
People who lived through the period of lockdowns and adjustments to the pandemic way of doing things remember that there were some good things, at least afforded to those who could make their lives and work work in the new virtual and distanced environments. And that those good things at least some of them, can continue, a the pandemic has. (I get so many meetings done and scheduled for the day where I don't have to be interrupted by the possibility of something happening in the location that I have to deal with.)
A college at Cambridge University was a significant recruiter of women who helped break Enigma codes and otherwise decrypt the communications of the Third Reich. Many of these women carried the secret of having worked as codebreakers to their grave, and the people who went looking in the archives to find these particular codebreakers had to work their way around the official covers and other things in the way, like mixing maiden and married names in the records. Funny how when you look at history, especially important history, all these women are right there for the spotting, even if many dudes seem to believe that it's all dudes, all the time, except for those few domains where women might actually be allowed to excel.
The portfolio of Helena Pornsiri, who creates artwork our of plant shapes, including detailed and intricate creations of animals and other natural creatures using plant shapes.
In technology, the concept of the disability dongle, a techno-utopian device that will make it possible for a disabled person to perform as if they were abled, or at least interface with abled society well enough that the abled people will be comfortable they don't have to remember there's a disabled person there. Most of these dongles are not made with any consultation of a disabled person to find out what their needs actually are and are instead what someone imagines the problem to be, and then develops a solution for that nonexistent problem.
Another Boeing aircraft lost a piece of itself, but it was an older model, and the part lost was not one that created issues with the operation of the aircraft. Still a fair amount of scrutiny that Boeing is going to keep undergoing as it continues to need to convince the regulators that its aircraft are still sky-worthy.
The most recent head of the office that investigates unexplained aerial phenomena lasted 18 months and spoke of the fervor with which those who believe the government is covering up aliens and alien technology are trying to discover what they believe is the truth and threaten anyone who isn't on board with them. His report also concluded that at no point has the government ever had aliens or alien technology in its possession. (And if they had, it would be NASA's department, and NASA would hustle to publicize it as soon as they did have such things.)
The Federal Trade Commission and the Department of Justice have asked the Copyright Office to exempt McDonalds ice cream machines from the protections afforded by the DMCA that otherwise prevents third parties from diagnosing and repairing the machines. Among other things, but the big ask here is that since McDonalds requires their franchisees to specifically buy one type of ice cream machine, a machine prone to breaking, and one that locks diagnostic codes and repair elements behind DRM, it's not particularly fair that the manufacturer is the only one who can then repair the machines, and they take their sweet time doing so, since nobody else can legally do it. Competition would certainly increase if companies were no longer able to use a shoddy DRM lock to give themselves monopoly power over repairs. Of course, they could probably increase competition even more if they repealed DMCA 1201 and replaced it with something that was much better tailored.
One of the things promoted around various social media sites of mine is pleas for donations so that Palestinians currently being sieged, bombed, and attacked by Israeli forces can use e-SIM devices and get mobile phone access in those places where connectivity has been interdicted. Which tells me that I don't know quite enough about how an electronic-SIM actually works, since I'm old enough to have dealt with physical cards of various sizes over time. I think the acronym expands to Subscriber Information Module, and therefore could presumably be replicated by a file that has the correct information in it that identifies an authorized user to the mobile network (or at least to a mobile network, even if it has to turn on roaming privileges to use a network that's not its own.) The e-SIM, from my understanding, is also significantly cheaper (and presumably easier to transfer than physical chips) such that the donations are usually asked for in terms of how many batches of e-SIMs can be bought with the donation. Assuming that the interdictors are essentially revoking access to any network that matches a particular SIM, I can see why having a few of them in reserve is a useful thing when you're in a place that intends to remove any contact you have with the outside world. (The NBC News article says at the end that both sides of the conflict have accused the other of pursuing genocide against each other, but the Israeli campaign has certainly been more effective toward those ends, in terms of destruction and death.)
Social psychologist sings "Blame Canada! Blame Canada!" when confronted with the reality that much of the younger generation spends significant amounts of time on social media feeds and technological devices. Of the suggestions made to stop the "Phone-based childhood," three of them are simply "if we ban access to the tools, then all of the underlying social problems will easily be defeated." It's justified with the idea that "most kids get phones and accounts at early ages because their peers do, so remove the peer pressure and things will be better," but it's still "Ban access to smartphones before 14/15 and social media before 16" and "ban the use of smartphones in school." As if children and teenagers won't find ways of making each other feel unsafe, gossiping about each other, and otherwise engaging in the social dynamics that we have come to expect as simply the expected aspects of high school. "Be 'normal,' according to the definition of an arbitrarily selected group of people, or get made fun of." Getting rid of the phones might loosen the idea that grownups are entitled to spy, surveil, and otherwise control all of the aspects of a child's life, which is a different form of peer pressure - "give them the devices so you can track what they're doing and make sure they're not doing anything you disapprove of." Only the last of the suggestions, the one about giving younglings more access to play spaces, independent actions, and responsibilities, works on the underlying social issues that can be exacerbated and accelerated through the presence of technology and mass media and/or social media. The rat experiments made it much clearer that "addictive" things are often addictive when there's nothing that someone else would rather be doing (and that they have the ability and capacity to do). So, perhaps instead of bemoaning how kids and teens prefer to be in spaces where they are less surveilled and more among their peers, provide things they want to do and spaces for them to hang out with each other.
Phishers have found some kind of exploit in Apple's systems that allows them to spam specific targets with password reset notifications, and then call them as "Apple Support" and ask them to enter the multi-factor authentication code so as to make the problem go away. Which, if done, gives the attackers control of the Apple account and access to all of the data and devices associated with such. Given what kind of cachet having an iProduct apparently confers, it's probably not surprising that people who are buying details and data from brokers to loan verisimilitude to their phish also find that plenty of them have iProducts.
There's been a fair amount of consternation over the adoption of compatible protocols or the use of bridges from centralized corporate-owned microblogging services like Threads and Bluesky parts of the microblogging universe connected through compatible protocols like ActivityPub and OStatus and so forth. A lot of the people who are in and around the spaces I'm in do not want Meta, an entity that fails to enforce its own Terms of Services against anti-trans hatred on its platforms, to join or be compatible with their pocket of the universe. This is in addition to their acquisition and deployment of VPN services that were used to spy on the traffic going to rival services that were otherwise end-to-end encrypted. Which says a lot about Meta. Bluesky is also under scrutiny as a monolithic entity whose moderation capabilities are also usually questioned. Other pockets of that universe welcome the corporations moving in and using the protocols for compatibility and reach, and it is probably a useful question as to whether those pockets are also sanguine about connecting to the pockets that run Gab or Truth Social or other explicitly anti-social instances and platforms.
The Russian Federation is looking into developing a home-grown console and games industry, to try and replaced a sanctioned market with one much more friendly to its anti-queer agenda. This would be a greater threat, and one more likely to succeed, were it not for, well, the unlikeliness that the domestic product will be able to compete with international products, interdicted or not, but also because the necessary brainpower and advanced equipment to routinely manufacture working chips isn't present in the Russian Federation at the moment, which results in a lot of bad chips and lost chips.
This is probably one of those things that shouldn't need to be said, but here we are, once again. Do not send pictures of a dick to a service claiming that it can use its superior AI to detect whether or not that dick has an STI. It also does a fun run through all kinds of privacy problems and issues, including a significant smattering of laws around medical privacy and you know, avoiding being a repository for underage content or actual CSAM.
Last for tonight, a person with a phenomenal talent for word recall who makes a living playing (and mostly winning) Scrabble tournaments with an eerie ability to find the maximum-scoring play.
(Materials via
adrian_turtle,
azurelunatic,
boxofdelights,
cmcmck,
conuly,
cosmolinguist,
elf,
finch,
firecat,
jadelennox,
jenett,
jjhunter,
kaberett,
lilysea,
oursin,
rydra_wong,
snowynight,
sonia,
the_future_modernes,
thewayne,
umadoshi,
vass, the
meta_warehouse community,
little_details, and anyone else I've neglected to mention or who I suspect would rather not be on the list. If you want to know where I get the neat stuff, my reading list has most of it.)
The men's side had several finishers, including one who completed the event on his first run.
An important technology note: if you are the kind of person who runs a rolling-release Linux system, or you have pinned your installation to the more unstable parts of your release, the xz package was targeted for malicious code inclusion, and versions that had backdoors that would make ssh sessions insecure through exploitation of systemd were pushed to some of the unstable or rolling-release repositories. The general advice is that if you have an affected version, that you run an update through your package manager immediately, so as to either revert to a safer version or to install a patched version that has removed the backdoor from it. The exploit was discovered by someone running diagnostics on why their sessions with ssh were taking extra time and CPU and why other parts of the system were throwing errors and crashes, and then was able to trace the fault to the xz and lzma tarballs that had been uploaded by a new contributor to xz. Timeline construction and behavior analysis of the contributor and possible sockpuppet accounts is ongoing, while the still sole legitimate maintainer of the package has put up a site about the backdoor, including a link to a FAQ. Much of the other commentary I have seen around about this has been basically about xkcd 2347 and how vulnerable this can make that sole developer, anywhere in the world, especially if they're having crises and would more than happily welcome another person to help maintain a package that a significant amount of people depend upon. Even more so if they're not, y'know, getting paid for their software maintenance by anyone so they can make a living paying attention to such things.
For the most part, the response has been "Fuck, we got lucky", as there are now people spidering out to try and reverse-engineer the payload and see if there are any other attack vectors that could accomplish the same tasks as this one. One person noticed and analyzed and found something suspicious. And then the ethos of open source and analysis went to work.
Spreading the ashes of loved ones on their favorite Disney rides apparently shuts down said ride for significant cleaning, because human remains are sufficiently a biohazard that they need extra-deep cleaning. There are better places to spread ashes. Or, perhaps, only a very small amount of ashes have to be left. Odds are good, however, that there's nowhere in the park or on the attractions where you could do such a thing without it being caught on a camera.
A large amount of 21st century Christian (and a fair few secular) attitudes about women, adornment, makeup, and the process of being a beautiful woman in public are traceable to early Christian writers trying to make a distinction between the women they wanted, who kept their beauty on the inside, and the ones they were afraid of, the ones who wore their beauty on the outside.
Trialing ways to get people who have lost sight to experience artworks in conjunction with actual people who have sight loss, and therefore are both getting useful feedback on how to make the things work better and not getting caught in the trap of believing they already know what disabled people need to experience art.
An Australia art exhibit that created a closed-off space that men could not enter has had the museum hosting the exhibit sued for discrimination, which, in its own way, also contributes to the art exhibition and the point of how often women have been excluded from spaces and needed to sue (sometimes repeatedly) to be included in places that otherwise would not have been open to them. The account also points out a certain amount of coordinated action and artwork during the trial from members of the gallery, suggesting they also see the suit and trial as part of the exhibition.
A container ship suffered a power loss at a critical point in trying to get out of the Port of Baltimore and crashed into a support for the Francis Scott Key bridge, collapsing the bridge. The ship immediately sent a mayday and attempted to avoid striking the bridge support, but could not evade the hit. There are six now presumed dead who were working on the bridge at the time of the strike, but because the incident happened around 01:30 and because authorities worked to ensure that there was no traffic on the bridge as soon as they received the mayday, the casualty count is far less than it could have been.
Some states are fighting to make voter registration data less available to anyone who expresses an interest in it, and they are running into courts who decide that the right for someone to doxx you and harass you because you voted a way they didn't approve of is more important. I would be more charitable to the idea of needing to examine the rolls for irregularities and find possible voting fraud, except that "voter fraud" has become a shibboleth for those who believe anything other than perpetual rule by them is illegitimate, because nobody would ever vote against them and their perfect plans for all of us.
The democratization of printing and distribution produced a plethora of women's newsletters in the UK where keeping the dialogue and information flowing was the point, rather than scoring points. Which also then included the printing of some deliberately provocative material so as to keep the discussion going. It's what, I think, many of the users of modern social media want their social media site to be, and why they are so incensed by the ways that the algorithms instead put them in contact with people who are not interested in listening and continuing the dialogue, but insisting they are the sole arbiters of truth and reality.
People who lived through the period of lockdowns and adjustments to the pandemic way of doing things remember that there were some good things, at least afforded to those who could make their lives and work work in the new virtual and distanced environments. And that those good things at least some of them, can continue, a the pandemic has. (I get so many meetings done and scheduled for the day where I don't have to be interrupted by the possibility of something happening in the location that I have to deal with.)
A college at Cambridge University was a significant recruiter of women who helped break Enigma codes and otherwise decrypt the communications of the Third Reich. Many of these women carried the secret of having worked as codebreakers to their grave, and the people who went looking in the archives to find these particular codebreakers had to work their way around the official covers and other things in the way, like mixing maiden and married names in the records. Funny how when you look at history, especially important history, all these women are right there for the spotting, even if many dudes seem to believe that it's all dudes, all the time, except for those few domains where women might actually be allowed to excel.
The portfolio of Helena Pornsiri, who creates artwork our of plant shapes, including detailed and intricate creations of animals and other natural creatures using plant shapes.
In technology, the concept of the disability dongle, a techno-utopian device that will make it possible for a disabled person to perform as if they were abled, or at least interface with abled society well enough that the abled people will be comfortable they don't have to remember there's a disabled person there. Most of these dongles are not made with any consultation of a disabled person to find out what their needs actually are and are instead what someone imagines the problem to be, and then develops a solution for that nonexistent problem.
Another Boeing aircraft lost a piece of itself, but it was an older model, and the part lost was not one that created issues with the operation of the aircraft. Still a fair amount of scrutiny that Boeing is going to keep undergoing as it continues to need to convince the regulators that its aircraft are still sky-worthy.
The most recent head of the office that investigates unexplained aerial phenomena lasted 18 months and spoke of the fervor with which those who believe the government is covering up aliens and alien technology are trying to discover what they believe is the truth and threaten anyone who isn't on board with them. His report also concluded that at no point has the government ever had aliens or alien technology in its possession. (And if they had, it would be NASA's department, and NASA would hustle to publicize it as soon as they did have such things.)
The Federal Trade Commission and the Department of Justice have asked the Copyright Office to exempt McDonalds ice cream machines from the protections afforded by the DMCA that otherwise prevents third parties from diagnosing and repairing the machines. Among other things, but the big ask here is that since McDonalds requires their franchisees to specifically buy one type of ice cream machine, a machine prone to breaking, and one that locks diagnostic codes and repair elements behind DRM, it's not particularly fair that the manufacturer is the only one who can then repair the machines, and they take their sweet time doing so, since nobody else can legally do it. Competition would certainly increase if companies were no longer able to use a shoddy DRM lock to give themselves monopoly power over repairs. Of course, they could probably increase competition even more if they repealed DMCA 1201 and replaced it with something that was much better tailored.
One of the things promoted around various social media sites of mine is pleas for donations so that Palestinians currently being sieged, bombed, and attacked by Israeli forces can use e-SIM devices and get mobile phone access in those places where connectivity has been interdicted. Which tells me that I don't know quite enough about how an electronic-SIM actually works, since I'm old enough to have dealt with physical cards of various sizes over time. I think the acronym expands to Subscriber Information Module, and therefore could presumably be replicated by a file that has the correct information in it that identifies an authorized user to the mobile network (or at least to a mobile network, even if it has to turn on roaming privileges to use a network that's not its own.) The e-SIM, from my understanding, is also significantly cheaper (and presumably easier to transfer than physical chips) such that the donations are usually asked for in terms of how many batches of e-SIMs can be bought with the donation. Assuming that the interdictors are essentially revoking access to any network that matches a particular SIM, I can see why having a few of them in reserve is a useful thing when you're in a place that intends to remove any contact you have with the outside world. (The NBC News article says at the end that both sides of the conflict have accused the other of pursuing genocide against each other, but the Israeli campaign has certainly been more effective toward those ends, in terms of destruction and death.)
Social psychologist sings "Blame Canada! Blame Canada!" when confronted with the reality that much of the younger generation spends significant amounts of time on social media feeds and technological devices. Of the suggestions made to stop the "Phone-based childhood," three of them are simply "if we ban access to the tools, then all of the underlying social problems will easily be defeated." It's justified with the idea that "most kids get phones and accounts at early ages because their peers do, so remove the peer pressure and things will be better," but it's still "Ban access to smartphones before 14/15 and social media before 16" and "ban the use of smartphones in school." As if children and teenagers won't find ways of making each other feel unsafe, gossiping about each other, and otherwise engaging in the social dynamics that we have come to expect as simply the expected aspects of high school. "Be 'normal,' according to the definition of an arbitrarily selected group of people, or get made fun of." Getting rid of the phones might loosen the idea that grownups are entitled to spy, surveil, and otherwise control all of the aspects of a child's life, which is a different form of peer pressure - "give them the devices so you can track what they're doing and make sure they're not doing anything you disapprove of." Only the last of the suggestions, the one about giving younglings more access to play spaces, independent actions, and responsibilities, works on the underlying social issues that can be exacerbated and accelerated through the presence of technology and mass media and/or social media. The rat experiments made it much clearer that "addictive" things are often addictive when there's nothing that someone else would rather be doing (and that they have the ability and capacity to do). So, perhaps instead of bemoaning how kids and teens prefer to be in spaces where they are less surveilled and more among their peers, provide things they want to do and spaces for them to hang out with each other.
Phishers have found some kind of exploit in Apple's systems that allows them to spam specific targets with password reset notifications, and then call them as "Apple Support" and ask them to enter the multi-factor authentication code so as to make the problem go away. Which, if done, gives the attackers control of the Apple account and access to all of the data and devices associated with such. Given what kind of cachet having an iProduct apparently confers, it's probably not surprising that people who are buying details and data from brokers to loan verisimilitude to their phish also find that plenty of them have iProducts.
There's been a fair amount of consternation over the adoption of compatible protocols or the use of bridges from centralized corporate-owned microblogging services like Threads and Bluesky parts of the microblogging universe connected through compatible protocols like ActivityPub and OStatus and so forth. A lot of the people who are in and around the spaces I'm in do not want Meta, an entity that fails to enforce its own Terms of Services against anti-trans hatred on its platforms, to join or be compatible with their pocket of the universe. This is in addition to their acquisition and deployment of VPN services that were used to spy on the traffic going to rival services that were otherwise end-to-end encrypted. Which says a lot about Meta. Bluesky is also under scrutiny as a monolithic entity whose moderation capabilities are also usually questioned. Other pockets of that universe welcome the corporations moving in and using the protocols for compatibility and reach, and it is probably a useful question as to whether those pockets are also sanguine about connecting to the pockets that run Gab or Truth Social or other explicitly anti-social instances and platforms.
The Russian Federation is looking into developing a home-grown console and games industry, to try and replaced a sanctioned market with one much more friendly to its anti-queer agenda. This would be a greater threat, and one more likely to succeed, were it not for, well, the unlikeliness that the domestic product will be able to compete with international products, interdicted or not, but also because the necessary brainpower and advanced equipment to routinely manufacture working chips isn't present in the Russian Federation at the moment, which results in a lot of bad chips and lost chips.
This is probably one of those things that shouldn't need to be said, but here we are, once again. Do not send pictures of a dick to a service claiming that it can use its superior AI to detect whether or not that dick has an STI. It also does a fun run through all kinds of privacy problems and issues, including a significant smattering of laws around medical privacy and you know, avoiding being a repository for underage content or actual CSAM.
Last for tonight, a person with a phenomenal talent for word recall who makes a living playing (and mostly winning) Scrabble tournaments with an eerie ability to find the maximum-scoring play.
(Materials via
no subject
Date: 2024-04-01 01:06 pm (UTC)I appreciate the heads-up, but I'm still giggling about how you phrased this because it reads like if I weren't the kind of person I am, the attack wouldn't have happened (or that because I'm the kind of person I am, even my point release systems would be at risk; or if I weren't the kind of person who runs a rolling-release Linux system but somehow tripped and fell into running one anyway then that system wouldn't have been exposed.)
no subject
Date: 2024-04-01 03:13 pm (UTC)But I appreciate that it can make you giggle all the same.