Alterslash

the unofficial Slashdot digest
 

Contents

  1. New Movie Trailer Shows First AI-Generated Performance By a Major Star: the Late Val Kilmer
  2. Old Cars ‘Tell Tales’ by Storing Data That’s Never Wiped
  3. Fewer US College Students Major in CS. More Choose Data Science, Engineering
  4. US Congress Fails to Pass Long-Term FISA Extension, Authorizes It Through April 30
  5. 30 WordPress Plugins Turned Into Malware After Ownership Change
  6. Fructose Isn’t Just Sugar. It Acts More Like a Hormone
  7. 20-Year-Old Enters Prison for Historic Breach, Ransoming of Massive Student Database
  8. FSF to OnlyOffice: You Can’t Use the GNU (A)GPL to Take Software Freedom Away
  9. US Government Now Wants Anthropic’s ‘Mythos’, Preparing for AI Cybersecurity Threats
  10. Shuttered Startups Are Selling Old Slack Chats, Emails To AI Companies
  11. NASA Restarts Work To Support Europe’s Uncrewed Trip To Mars After Years of Setbacks
  12. Critical Atlantic Current Significantly More Likely To Collapse Than Thought
  13. Online Personalities and Comedians Overtake TV and Newspapers as Primary News Sources
  14. NIST Limits CVE Enrichment After 263% Surge In Vulnerability Submissions
  15. Gazing Into Sam Altman’s Orb Could Solve Ticket Scalping

Alterslash picks up to the best 5 comments from each of the day’s Slashdot stories, and presents them on a single page for easy reading.

New Movie Trailer Shows First AI-Generated Performance By a Major Star: the Late Val Kilmer

Posted by EditorDavid View on SlashDot Skip
“A trailer has been released for the first film to star an authorised generative AI version of a major Hollywood actor,” writes The Guardian:
Val Kilmer was cast in western As Deep As the Grave before his death in April 2025. Production delays meant he never shot any scenes, but the creative team worked with UK-based company Sonantic to create an AI speaking voice based on his old recordings. His estate and daughter Mercedes collaborated with the film-makers on the visual deepfake of the actor. Kilmer, who was diagnosed with throat cancer, was also assisted by technology for his cameo in 2022’s Top Gun: Maverick

Writer-director Coerte Voorhees confirmed that Kilmer is seen for around an hour of the film’s running time… Voorhees has said that the production followed Sag-Aftra [union] guidelines, and that Kilmer’s estate — which provided archival material for them to use — was compensated financially.
“Kilmer’s likeness can be seen portraying Father Fintan, a Catholic priest and Native American spiritualist,” adds The Hollywood Reporter. But the AV Club calls it "ghoulish puppet show time.”

“Having your AI Val Kilmer puppet whisper ‘Don’t fear the dead, and don’t fear me’ in a movie trailer is a bold choice…”
He is accompanied (per Variety) by a whole host of disclaimers, caveats, and explanations offered by writer-director Coerte Voorhees and his associates: Kilmer deeply wanted to be in the movie, but was too sick to do so. His family endorses and supports his inclusion. He was a big fan of technology, including, presumably, its use in turning his own image into a digital avatar to then shove into movies…

The fact is, of course, that nobody would be paying a fraction of this attention to As Deep As The Grave — about early female archeologist Ann Axtell Morris — if it weren’t now being used as the stage on which Voorhees was very publicly accepting the dare to go full-on ghoulish with AI tech.
“The filmmakers said they hoped they were showing Hollywood how to use the technology in a positive way…” notes Australia’s ABC News. But their articles add that “Some have called the trailer ‘terrifying’ and ‘disgusting’ on social media.”

Mashable writes:
“Very fitting that this trailer includes a scene where a corpse is unceremoniously yanked out of the ground,” read one of the top comments on As Deep as the Grave’s trailer at time of writing… [O]nline commenters have labelled it disgusting and disrespectful, not only for digitally reanimating Kilmer but also for the damaging precedent As Deep as the Grave‘s use of AI could set for the film industry as a whole.

Old Cars ‘Tell Tales’ by Storing Data That’s Never Wiped

Posted by EditorDavid View on SlashDot Skip
Slashdot reader Bismillah shared this report from ITNews:
Research and development engineer Romain Marchand of Paris headquartered Quarkslab obtained a telematic control unit (TCU) from a salvage yard in Poland… Marchand tore down the TCU, which is based on a Qualcomm system on a chip, and extracted the Linux-based file system from the Micron multi-chip package (MCP) which contained NAND-based non-volatile storage memory. The non-volatile storage contained sensitive information, including system configuration data and more importantly, logs that revealed the vehicle’s GPS positions over time.

None of that information was encrypted, Marchand told iTnews, which made it possible to collect and retrieve sensitive data of interest. What’s more, the global navigation satellite system (GNSS) logs with GPS positions covered the BYD’s full journey from the factory in China to its operational life in the United Kingdom, and to its final wrecking in Poland, Marchand explained in an analysis… The issue is not restricted to BYD, and Marchand added that the hardware architecture of the Chinese car maker’s TCU is broadly similar to what can be found in other brands.

That’s not an old car

By Valgrus Thunderaxe • Score: 4, Informative Thread
I have an actual old car, and it doesn’t store any data, what-so-ever, and doesn’t report it to anyone.

Encryption

By rtkluttz • Score: 4, Interesting Thread

I hate how it is always presented like lack of encryption is a bad thing. In many cases it is not. Someone has to have physical control to get to that data. Physical control is the first piece of security. Encryption in many cases after that protects NOTHING from the owners perspective. Encryption after that fact, other than the end to end communications are almost always used AGAINST the owner. Metrics and information that the owner never gets a chance to explicitly deny. I agree with encrypted communications and even encryption at rest, but things like pinned certificates and other aspects of encryption do absolutely nothing but allow manufacturers to weaponize things against the owner. Being blocked out is the first step, but after that comes data mining. Then after that comes artificially crippled features so those features can be sold back to you piecemill. Fuck that and them. Every connected thing should be forced by the government to have features at the bare minimum that allow the owner to see data streams and control what goes where. Zero trust is the gold standard in security and the fact that owners are not allowed to lock out the manufacturer from EV’s and other cars is patently ridiculous. These things are connected to the grid a large portion of the time for God’s sake. Government needs to step in and enforce that all connected things have a root level firewall that allows the OWNER to control the security and where the data goes and the ability to inspect encrypted traffic to see if they approve of it leaving the vehicle or the connected thing.

Technobabble

By ByTor-2112 • Score: 3 Thread

You know that when the article has more techobabble than a TNG episode and more acronyms than the US Military, it’s some high quality journalism.

“Hackermanz extracted the positronic matrix unit (PMU), based on a quantum chip by Quanticorp, and extracted the Linux-based filesystem [wtf is a ‘linux-based filesystem’???] from the Romulan control package (RCP) which contained DTRD based tachyon storage”

Fewer US College Students Major in CS. More Choose Data Science, Engineering

Posted by EditorDavid View on SlashDot Skip
“From 2008 to 2024, the number of four-year computer science degrees granted rose about fivefold…” reports the Washington Post. Then in 2025 CS suddenly dropped from the fourth-largest undergraduate major to sixth, they report (citing data from the nonprofit National Student Clearinghouse, which compiles numbers from 97% of U.S. universities.

The 54,000-student drop was “the biggest one-year drop of any major discipline going back to at least 2020.” But what major are they choosing instead?
Sarah Karamarkovich, a research associate with the National Student Clearinghouse, pointed to an explanation from the data that we had overlooked. Enrollments in two interdisciplinary majors, data analytics and data science, topped a combined 35,000 in the fall of 2025. That was up from a few hundred when those disciplines were broken out into their own majors in 2020. Those relatively new categories reflect colleges’ zeal to create specialized majors, including in AI, data science, robotics and cybersecurity. Some of those disciplines may be counted in the national enrollment data as computer science. Others are not.

The numbers suggest that some of the disappearing computer science majors didn’t flee so much as they splintered into related disciplines.... The 8 percent decline in computer science majors last fall was nearly mirrored by a 7.3 percent increase in engineering majors, according to the National Student Clearinghouse data. Within engineering, mechanical and electrical engineering major enrollments increased by the largest absolute amounts — a jump of 11 percent and 14 percent, respectively.

US Congress Fails to Pass Long-Term FISA Extension, Authorizes It Through April 30

Posted by EditorDavid View on SlashDot Skip
Yesterday the U.S. Congress approved “a short-term extension” of a FISA law that allows wiretaps without a warrant for surveilling foreign targets, reports CNN — but only until April 30. Republican congressional leaders had sought an 18-month extension, but “failed to secure” the votes after “clamoring from some of their members for reforms to protect Americans’ privacy.”
The warrantless surveillance law, known as Section 702 of the Foreign Intelligence Surveillance Act, was set to expire on Monday night. Members are hoping the additional time will allow them to come to agreement without ending authorization for the intelligence gathering program, which permits US officials to monitor phone calls and text messages from foreign targets… There was an hour of suspense in the Senate Friday morning when it appeared possible that Democratic Sen. Ron Wyden, a longtime critic of FISA 702, might block the House-passed extension. But ultimately, he said his House colleagues had assured him “this short-term extension makes reform more likely, and expiration makes reform less likely,” and so he chose not to object....

House Republican leaders believed Thursday night they had struck a deal with conservative holdouts who harbor deep and longstanding concerns that a key piece of the law infringes on Americans’ privacy rights. But in a pair of after-midnight votes, more than a dozen rank-and-file Republicans rejected the long-term reauthorization plan on the floor, which was the result of days of tense negotiations among leadership, lawmakers and the White House.

The law allows authorized US officials to gather phone calls and text messages of foreign targets, but they can also incidentally collect the data of Americans in the process. Senior national security officials have for years said the law is critical for thwarting terror attacks, stemming the flow of fentanyl into the US and stopping ransomware attacks on critical infrastructure. Civil liberties groups on the left and the right, meanwhile, argue the surveillance authority risks infringing on Americans’ privacy.

FISA ? What sport is that?

By rossdee • Score: 3 Thread

I know FIFA is soccer
and FIA is Formula 1 racing (But they got paused by the Gulf War, and I got a note today from F!-TV saying my subscription is expiring and is not available for renewal)

Re:Obama and Biden

By thegarbz • Score: 4, Interesting Thread

supported this too, without question.

It turns out neither of them are president right now and thus your comment is irrelevant to the situation at hand. Even in politics not everything needs to be about partisanship. We criticised Obama at the time, we criticised Biden at the time, and we will criticise Trump, just like we did last time too (except for DrMrLordX who insisted in 2024 that Trump won’t pass this because he’s mad it was used against his staffers in 2026 [sic - he meant 2016], lets see how well his post ages).

30 WordPress Plugins Turned Into Malware After Ownership Change

Posted by EditorDavid View on SlashDot Skip
Wednesday BleepingComputer reported that more than 30 WordPress plugins "have been compromised with malicious code that allows unauthorized access to websites running them.”
A malicious actor planted the backdoor code last year but only recently started pushing it to users via updates, generating spam pages and causing redirects, as per the instructions received from the command-and-control (C2) server. The compromise affects plugins with hundreds of thousands of active installations and was spotted by Austin Ginder, the founder of managed WordPress hosting provider Anchor Hosting, after receiving a tip about one add-on containing code that allowed third-party access.

Further investigation by Ginder revealed that a backdoor had been present in all plugins within the EssentialPlugin package since August 2025, after the project was acquired in a six-figure deal by a new owner.... “The injected code was sophisticated. It fetched spam links, redirects, and fake pages from a command-and-control server. It only showed the spam to Googlebot, making it invisible to site owners,” explained Ginder.
“WordPress.org’s v2.6.9.1 update neutralized the phone-home mechanism in the plugin,” Ginder writes in a blog post. “But it did not touch wp-config.php. The SEO spam injection was still actively serving hidden content to Googlebot.

“And here is the wildest part. It resolved its C2 domain through an Ethereum smart contract, querying public blockchain RPC endpoints. Traditional domain takedowns would not work because the attacker could update the smart contract to point to a new domain at any time.”
This has happened before. In 2017, a buyer using the alias “Daley Tias” purchased the Display Widgets plugin (200,000 installs) for $15,000 and injected payday loan spam. That buyer went on to compromise at least 9 plugins the same way.... The WordPress plugin marketplace has a trust problem… The Flippa listing for Essential Plugin was public. The buyer’s background in SEO and gambling marketing was public. And yet the acquisition sailed through without any review from WordPress.org.

WordPress.org has no mechanism to flag or review plugin ownership transfers. There is no “change of control” notification to users. No additional code review triggered by a new committer. The Plugins Team responded quickly once the attack was discovered. But 8 months passed between the backdoor being planted and being caught.
Thanks to Slashdot reader axettone for sharing the news.

Re:Friends don’t let friends

By 93 Escort Wagon • Score: 5, Informative Thread

Over the past several years, core Wordpress has actually had fewer significant security bugs than Drupal.

The problem is that: Wordpress’ plugins ecosystem, on the other hand, is basically still the Wild West.

Fructose Isn’t Just Sugar. It Acts More Like a Hormone

Posted by EditorDavid View on SlashDot Skip
Slashdot reader smazsyr writes:
A new review says we’ve had fructose wrong for decades. The nine authors, led by Richard Johnson at the University of Colorado Anschutz, argue that fructose "is not just another calorie.” It is a signal. It tells the liver to make fat and brace for a famine that never comes. That made sense for a bear fattening up on autumn berries. It makes less sense for a person drinking soda in March.

The review reframes the WHO’s sugar guideline, argues ScienceBlog.com, as “less a recommendation about calories and more a warning about a signalling molecule we have been dosing ourselves with, several times a day, for most of a century.”

Who’s “we”?

By haruchai • Score: 3 Thread

I’ve been hearing & reading similar things about fructose for decades, within about a decade of public awareness that school kids even relatively active ones were getting remarkably fatter very quickly

That’s it

By Waffle Iron • Score: 5, Funny Thread

From now on, I’m only drinking soda in October.

BS

By groobly • Score: 3 Thread

Article is paywalled, but from the abstract the assertion of hormonal action appears to be hype BS. Only the liver can metabolize fructose. That’s the main issue with fructose.

Re:BS

By nospam007 • Score: 4, Informative Thread

Just get the Archive Page extension, then no paywalls anymore.

It’s an interesting hypothesis

By 93 Escort Wagon • Score: 4, Insightful Thread

But it’s important not to overreact until there have been more studies which confirm (or refute) it.

Jumping the gun, building your belief system based on single “out of left field” study results, gets you RFK Jr.

20-Year-Old Enters Prison for Historic Breach, Ransoming of Massive Student Database

Posted by EditorDavid View on SlashDot Skip
20-year-old Matthew Lane sent a text message to ABC News as his parents drove him to federal prison in Connecticut. “I’m just scared,” he said, calling the whole situation “extremely sad.”
Barely a year earlier, while still a teenager, he helped launch what’s been described as the biggest cyberattack in U.S. education history — a data breach that concerned authorities so much, it prompted briefings with senior government officials inside the White House Situation Room. The breach pierced the education technology company PowerSchool — used by 80% of school districts in North America… [and operating in about 90 countries around the world]. With threats to expose social security numbers, dates of birth, family information, grades, and even confidential medical information, the breach cornered PowerSchool into paying millions of dollars in ransom.

“I think I need to go to prison for what I did,” Lane told ABC News in an exclusive interview, speaking publicly for the first time about the headline-grabbing heist and his life as a cybercriminal. “It was disgusting, it was greedy, it was rooted in my own insecurities, it was wrong in every aspect,” he said in the interview, two days before reporting to prison… At about 6:30 on a Tuesday morning last April, FBI agents started banging on the door of Lane’s second-floor dorm room. “FBI! We have a search warrant,” Lane recalled them shouting. They seized his devices and many of the luxury items he bought with “dirty” money, as he put it. He said he felt a “wave of relief.... I’m honestly thankful for the FBI,” he said. “After they left, I was like, ‘It’s over … I’m done with this’…”

A federal judge in Massachusetts sentenced him to four years in federal prison and ordered him to pay more than $14 million in restitution.
“In the wake of the breach, PowerSchool offered two years’ worth of credit-monitoring and identity protection services to concerned customer,” the article points out. But it also notes two other arrests in September of teenaged cybercriminals:

- A 15-year-old boy in Illinois who allegedly attacked Las Vegas casinos, reportedly costing MGM Resorts alone more than $100 million

- A British national who when he was 16 helped breach over 110 companies around the world and extort $115 million.


But ironically, Lane tells ABC News it all started on Roblox, where he’d met cheaters, password-stealers, and cybercriminals sharing photos of their stacks of money, creating a “sense of camaraderie”
Lane and others warn that online forums also attract criminal groups seeking to recruit potential hackers. “The bad guys are on all the platforms watching the kids playing,” Hay said. “And when they see an elite-level performer, they go approach that kid, masquerading as another kid, and they go, ‘Hey, you want to earn some [money]? … Here are the tools, here are the techniques’....”

According to Lane, he spent his “ill-gotten gains” on designer clothes, diamond jewelry, DoorDash deliveries, Airbnb rentals for him and his friends, and drugs — “lots of drugs.” He said he would numb ever-present feelings of guilt with drugs — from high-potency marijuana to acid. But it was hacking that gave him the strongest high. “It’s indescribable the adrenaline you get when you do something like that,” he said. “It’s way more than driving 120 miles per hour. … Incomparable to any drug at all, as well.”
“On Monday, Roblox announced that, starting in June, it will offer age-checked accounts for younger users that limit what games they can play, and add ‘more closely align content access, communication settings, and parental controls with a user’s age.’"

You commited a crime

By Valgrus Thunderaxe • Score: 4, Informative Thread
There are consequences. Welcome to adulthood.

Moral of the story:

By Gravis Zero • Score: 4, Insightful Thread

If a massive amount of critical information and system of your business can be held hostage by a child then you are not “taking security very seriously” and you do not “respect the rights of [your] users”.

That fact that stuff like this happens is astoundingly stupid. This foolish child isn’t innocent but the businesses are all guilty as a hell.

FSF to OnlyOffice: You Can’t Use the GNU (A)GPL to Take Software Freedom Away

Posted by EditorDavid View on SlashDot Skip
Nextcloud joined a project to create a sovereign replacement for Microsoft Office called “Euro-Office”. But after that project forked OnlyOffice, OnlyOffice suspended its partnership with Nextcloud. “They removed all references to our brand/attribute as required by our license,” argued OnlyOffice CEO Lev Bannov on March 30th. (“The core issue here isn’t just about what the AGPL license states, but about the additional provisions we, as the authors, have included… If the Euro-Office team believes our approach conflicts with the AGPLv3 license, we invite them to submit an official request to FSF for review.”)

But this week the FSF responded (as “the steward of the GNU family of General Public Licenses”), criticizing OnlyOffice’s “attempt to impose an additional restriction on the AGPLv3” and calling it “inconsistent with the freedoms granted by the license,” in a blog post from FSF licensing/compliance manager Krzysztof Siewicz:
It is possible to modify the (A)GPLv3 with additional terms, but only by adhering to the terms of the license… The (A)GPLv3 makes it clear that it permits all licensees to remove any additional terms that are “further restrictions” under the (A)GPLv3. It states, "[i]f the Program as you received it, or any part of it, contains a notice stating that it is governed by this License along with a term that is a further restriction, you may remove that term”…

We urge OnlyOffice to clarify the situation by making it unambiguous that OnlyOffice is licensed under the AGPLv3, and that users who already received copies of the software are allowed to remove any further restrictions. Additionally, if they intend to continue to use the AGPLv3 for future releases, they should state clearly that the program is licensed under the AGPLv3 and make sure they remove any further restrictions from their program documentation and source code. Confusing users by attaching further restrictions to any of the FSF’s family of GNU General Public Licenses is not in line with free software.
“If FSF determines that our license and project align with AGPLv3, we will continue as an open-source initiative,” OnlyOffice’s CEO had written in March. “However, if the decision goes against us, we are ready to consider other options.”

This is like

By thegarbz • Score: 5, Interesting Thread

having a tantrum and threatening to pick up your bat and ball and go home. Except there are other bats and balls already laying around. Identical ones even. This seems like a completely self-destroying empty threat. If OnlyOffice goes closed source it doesn’t matter, there is already a fork for the wider community to continue working on even in a capacity that may be funded by Nextcloud or similar organisations.

Re:This is like

By Valgrus Thunderaxe • Score: 4, Interesting Thread
It speaks volumes that the EU wants to use Russian software over US software.

Re:standard FSF overreach

By Local ID10T • Score: 4, Interesting Thread

The FSF holds copyright on the AGPLv3. In order to use the AGPLv3, you must comply with the license on the license.

A version of the AGPLv3 that is modified without the permission of the FSF is not valid, as it does not comply with the license on the AGPLv3.

You could write your own license using very similar terms to the AGPLv3 plus other terms you have specified, but if you refer to it as “AGPLv3” it must be the AGPLv3 as provided by the FSF (per the license on the AGPLv3).

This entire debate has happened before.

US Government Now Wants Anthropic’s ‘Mythos’, Preparing for AI Cybersecurity Threats

Posted by EditorDavid View on SlashDot Skip
Friday Anthropic’s CEO met with top U.S. officials and “discussed opportunities for collaboration,” according to a White House spokesperson itedd by Politico, “as well as shared approaches and protocols to address the challenges associated with scaling this technology.”

CNN notes the meeting happens at the same time Anthropic "battles the Trump administration in court for blacklisting its Claude AI model…”
The meeting took place as the US government is trying to balance its hardline approach to Anthropic with the national security implications of turning its back on the company’s breakthrough technology — including its Mythos tool that can identify cybersecurity threats but also present a roadmap for hackers to attack companies or the government… The Office of Management and Budget has already told agencies it is preparing to give them access to Mythos to prepare, Bloomberg reported. Axios reported the White House is also in discussion to gain access to Mythos.
The Trump administration "recognizes the power” of Mythos, reports Axios, “and its highly sophisticated — and potentially dangerous — ability to breach cybersecurity defenses.”
“It would be grossly irresponsible for the U.S. government to deprive itself of the technological leaps that the new model presents,” a source close to negotiations told us. “It would be a gift to China”… Some parts of the U.S. intelligence community, plus the Cybersecurity and Infrastructure Security Agency (CISA, part of Homeland Security), are testing Mythos. Treasury and others want it.
The White House added they plan to invite other AI companies for similar discussions, Politico reports. But Mythos “is also alarming regulators in Europe, who have told POLITICO they have not been able to gain access…”
U.S. government agency tech leaders sought access to the model after Anthropic earlier this year began testing the model and granted limited access to a select group of companies, including JPMorgan, Amazon and Apple… after finding it had hacking capabilities far outstripping those of previous AI models. This includes the ability to autonomously identify and exploit complex software vulnerabilities, such as so-called zero-day flaws, which even some of the sharpest human minds are unable to patch. The AI startup also wrote that the model could carry out end-to-end cyberattacks autonomously, including by navigating enterprise IT systems and chaining together exploits. It could also act as a force-multiplier for research needed to build chemical and biological weapons, and in certain instances, made efforts to cover its tracks when attacking systems, according to Anthropic’s report on the model’s capabilities and its safety assessments.

Those findings and others have inspired fears that the model could be co-opted to launch powerful cyberattacks with relative ease if it fell into the wrong hands. Logan Graham, a senior security researcher at Anthropic, previously told POLITICO that researchers and tech firms had been given early access to Mythos so they could find flaws in their critical code before state-backed hackers or cybercriminals could exploit them. “Within six, 12 or 24 months, these kinds of capabilities could be just broadly available to everybody in the world,” Graham said.

Once again, so much winning

By AlanObject • Score: 5, Insightful Thread

So now can we all recognize that Pete Hegseth’s little temper tantrum last month was basically just that. A spoiled little kid not getting exactly what he wants is instantly recognizable to anyone who has ever had to deal with it.

And the worst Sec Defense the nation ever had.

Wintermute

By ElderOfPsion • Score: 3 Thread

If v6 isn’t called Wintermute, it’ll be a lost opportunity.

Just Add Security

By sound+vision • Score: 5, Insightful Thread

Whatever Mythos is, security isn’t something you bolt on after the fact. It’s something you consider from the beginning of your endeavor, before even starting, and continually throughout. Security is a practice, it’s a way of life. It’s not a product.

Re:Once again, so much winning

By Anonymous Coward • Score: 5, Insightful Thread

Until Congress passes a law renaming the department, he’s the Secretary of Defense. He’s only cosplaying when he calls himself the SecWar.

Mythos is a scam

By cowwoc2001 • Score: 4, Insightful Thread

There is nothing advanced about Anthropic’s mysterious model. People who have seen it have reported it produces tons of junk vulnerabilities that are not realistic to exploit. Plus, they recently intentionally dumbed-down their public models to make Mythos look amazing in comparison when they got public. This is just PR bullshit.

Shuttered Startups Are Selling Old Slack Chats, Emails To AI Companies

Posted by BeauHD View on SlashDot Skip
Some failed startups are reportedly selling old Slack messages, emails, and other internal records to AI companies as training data, creating a new way to cash out after shutting down. Fast Company reports:
Shanna Johnson, the CEO of now-defunct software company Cielo24, told the publication that she was able to sell every Slack message, internal email, and Jira ticket as training data for “hundreds of thousands of dollars.”

This isn’t a one-off scenario. SimpleClosure, a startup that helps companies like Cielo24 shut down, told Forbes that there’s been major interest from AI companies trying to get their hands on workplace data. Because of this, SimpleClosure launched a new tool that allows companies to sell their wealth of internal communications — from Slack archives to email chains — to AI labs. The company said it’s processed 100 such deals in the past year. Payouts ranged from $10,000 to $100,000.
“I think the privacy issues here are quite substantial,” Marc Rotenberg, founder of the Center for AI and Digital Policy, told Forbes. “Employee privacy remains a key concern, particularly because people have become so dependent on these new internal messaging tools like Slack. … It’s not generic data. It’s identifiable people.”

Interesting strategy..

By Junta • Score: 5, Insightful Thread

Train models mostly on the communications of failed businesses… What could go wrong?

at least someone wants it

By kencurry • Score: 3 Thread
I’ve seen more than one San Diego startup bite the dust. I recall once (was late 90’s, biotech layoffs were the norm) going back to the building because I’d heard that the company was auctioning office stuff. When I rolled up, I saw that a 2nd story window had been popped out. There was a group of workers chucking boxes of papers and lab notebooks into a dumpster down below.

GDPR

By fph il quozientatore • Score: 5, Insightful Thread
This cannot be legal in the EU, right? Or even if only one of your employees works remotely from EU?

Wouldn’t it be nice to have a GDPR?

By gweihir • Score: 4, Interesting Thread

Because then this would be completely illegal.

Re:GDPR

By gweihir • Score: 4, Informative Thread

It is not, unless all private or chat use was prohibited. That is difficult. because it is perfectly acceptable to use the company email to mail home “sorry, I am going to work an hour longer” or “lets have lunch at xyz today” to a co-worker. And those messages belongs to the user and are protected under the GDPR and cannot be used in any new ways the user did not consent to.

NASA Restarts Work To Support Europe’s Uncrewed Trip To Mars After Years of Setbacks

Posted by BeauHD View on SlashDot Skip
NASA has revived support for the European Space Agency’s long-delayed Rosalind Franklin Mars rover mission. According to the space agency, the current plan is to launch via a SpaceX Falcon Heavy no earlier than 2028. Engadget reports:
This is a partnership between NASA and the ESA, with the European agency providing the rover, the spacecraft and the lander. The US will provide braking engines for the lander, heater units for the rover’s internal systems and, of course, assistance with the actual launch.

The rover will be outfitted with scientific instruments to look for signs of ancient life on the red planet. These include a state-of-the-art mass spectrometer and an organic molecule analyzer, which will come in handy as the vehicle collects samples at the Oxia Planum landing site.
The mission has been stuck in development limbo since 2001, with delays caused by budget problems, technical issues, shifting international partners, and geopolitical fallout. After NASA dropped out, Russia stepped in, then was cut loose after invading Ukraine, and now — despite NASA rejoining in 2024 and fresh political budget threats — the rover is tentatively back on track for a 2028 launch.

Okie dokie, but …

By fahrbot-bot • Score: 3 Thread

Just make sure everyone is using the same units

Re: “Unmanned” is the word you meant

By RightwingNutjob • Score: 4, Interesting Thread

The natural antonym of unmanned is manned.

The natural antonym of uncrewed is crewed.

“Crewed” sounds identical to “crude” in every accent of English I am aware of.

And it has always sounded dumb for a premier space agency to speak of “crude missions” to anywhere.

Doubly so when some of the most famous words uttered by said agency’s astronauts were “one small step for a man, one giant leap for mankind.”

Only the pathologically offended or the pathologically misogynistic would interpret that statement to apply to only half the planet.

Critical Atlantic Current Significantly More Likely To Collapse Than Thought

Posted by BeauHD View on SlashDot Skip
An anonymous reader quotes a report from the Guardian:
The critical Atlantic current system appears significantly more likely to collapse than previously thought after new research found that climate models predicting the biggest slowdown are the most realistic. Scientists called the new finding “very concerning” as a collapse would have catastrophic consequences for Europe, Africa and the Americas. The Atlantic meridional overturning circulation (Amoc) is a major part of the global climate system and was already known to be at its weakest for 1,600 years as a result of the climate crisis. Scientists spotted warning signs of a tipping point in 2021 and know that the Amoc has collapsed in the Earth’s past.

Climate scientists use dozens of different computer models to assess the future climate. However, for the complex Amoc system, these produce widely varying results, ranging from some that indicate no further slowdown by 2100 to those suggesting a huge deceleration of about 65%, even when carbon emissions from fossil fuel burning are gradually cut to net zero. The research combined real-world ocean observations with the models to determine the most reliable, and this hugely reduced the spread of uncertainty. They found an estimated slowdown of 42% to 58% in 2100, a level almost certain to end in collapse.

The Amoc is a major part of the global climate system and brings sun-warmed tropical water to Europe and the Arctic, where it cools and sinks to form a deep return current. A collapse would shift the tropical rainfall belt on which many millions of people rely to grow their food, plunge western Europe into extreme cold winters and summer droughts, and add 50-100cm to already rising sea levels around the Atlantic.
The slowdown has to do with the Arctic’s rapidly rising temperatures from global warming. “Warmer water is less dense and therefore sinks into the depths more slowly,” explains the Guardian. “This slowing allows more rainfall to accumulate in the salty surface waters, also making it less dense, and further slowing the sinking and forming an Amoc feedback loop.”
The new research has been published in the journal Science Advances.

Likely doomed as a species

By puzzled • Score: 4, Insightful Thread

The changes we have set off in the world today are not unlike those that precipitated the Great Dying 252 million years ago. We’re at 420 ppm CO2 now but the permafrost is done for and after that the clathrates in the shallow seas are liable to let go, too. The current ice age is only 2.5 million years old and we’ve ended it. We may have triggered something akin to the Permian/Eocene Thermal Maximum.

There was some chance we could have headed this off, had we turned immediately and aggressively on the problem around the turn of the century. We have proven politically incapable of addressing this existential threat, and now that we might be mustering the will, the window may have closed.

We’ve had a good run, we anatomically modern humans, but this ending due to a lack of foresight is … embarrassing .

What happened?

By ThurstonMoore • Score: 4, Insightful Thread

What happened 1600 years ago?

Re:What happened?

By Zocalo • Score: 5, Informative Thread
Good question, that probably should be addressed in TFA, but isn’t. Have a cookie, assuming you’re not blocking them. :)

The Earth was exiting a period of relative geological and climatic stability and entering a cooling phase, which would have helped strengthen the AMOC. This process was then enhanced by a large scale volcanic eruption, thought to be in North America, with the ejecta from that and a series of subsequent eruptions leading to a significant deviation from the trendline, a mini-iceage known as the Late Antique Little Ice Age (LILIA) similar to the Maunder Minimum, a multi-decade period of cooler than statistically expected temperatures (up to 2.7C cooler than average in European summers). This is reflected in tree-ring records which show highly stunted growth for the time, ice cores from polar ice cores, and some of the remaining writings from the period that describe widespread crop failures.

Re:The world needs trillionaires

By poptix • Score: 4, Funny Thread

Sorry man, idpol was way more important than the climate. Maybe if you’d chosen someone more relatable than Greta?

Re: “Research” = modelling

By avsed • Score: 4, Insightful Thread

Absolutely. Many years ago I did real, actual. science and the amount of computer-based modelling that we t on was insane - it could only have become more prevalent in the decades since. Nothing wrong with that - it’s just another tool. But if someone has already decided that all scientists are wrong, then no amount of reason or experience is going to overturn their cultish belief.

Online Personalities and Comedians Overtake TV and Newspapers as Primary News Sources

Posted by BeauHD View on SlashDot Skip
A new Ipsos poll finds Americans are increasingly getting news from online personalities and comedians instead of traditional TV or newspapers. The survey says nearly 70% get news online in a given week, versus 55% from TV and 25% from newspapers, with figures like Joe Rogan, Greg Gutfeld, Sean Hannity, and late-night hosts ranking prominently depending on political leanings. From the Hollywood Reporter:
The poll, which was conducted in March, actually found the conservative politicians and cabinet members, including President Trump, were the top news influencers. When politicos were excluded, Joe Rogan led the list, followed by Fox News personalities Greg Gutfeld and Sean Hannity, and then TuckerCarlson and Ben Shapiro. The only three influencers to crack 10 percent were Trump, Rogan, and JD Vance. Among people who voted for Kamala Harris, the top news personalities were late night hosts, led by ABC’s Jimmy Kimmel, followed by CBS Late Show host Stephen Colbert, and Daily Show host Jon Stewart.

Just under 70 percent of respondents said they get their news online in a given week, compared to 55 percent for TV, and 25 percent for newspapers. […] Of traditional media outlets, TV dominated, with Fox News, the broadcast networks, and CNN topping the list of sources. Facebook, YouTube and Instagram were the most popular online news sources.
“On these platforms opinionated personalities and comedians appear to drown out anyone who would fit in the traditional journalist category,” said assistant professor of practice and Jordan Center Executive Director Steven L Herman. “Even in the late 19th century and early 20th centuries, sensationalist and polarizing voices in print and later on air were among the most influential in the political landscape — such as political satirist Mark Twain and populist Father Charles Coughlin.”

Billionaires bought up the news

By rsilvergun • Score: 5, Insightful Thread
So yeah you’re going to turn to randos for journalism because a handful of billionaires bought up literally 90% of all the news media and they are in the process of buying up and shutting down what little is left. There are serious efforts to undermine and shut down the associate press and Reuters. And they’re basically the last source of Truth left. There used to be a whole bunch of independent journalists who made a living on Twitter but well, you know.

So unless you just want billionaire Epstein class propaganda you’ve really got to go looking. There are several YouTubers I like. Belle of the ranch, Rebecca Watson, and professor Dave come to mind immediately. Patrick Boyle is pretty good too and so is Adam Something. I like some more news but I’m a pretty staunch Democrat at this point and they like to spend hours and hours crapping on Democrats for no particularly useful reason. I don’t say good here because there’s plenty of reasons to complain about Democrats but I don’t find it useful in 2026..

But getting back on track yeah I’m not going to waste time on CBS or CNN let alone Fox News and news Max and oan because I know they’re all owned by billionaires that have heavy control over what is allowed to be said and what isn’t allowed to be said. So I can’t get reliable information out of them.

I will sometimes settle for CNN if I have to they weren’t able to go full Fox News but Lord knows they are trying.

Sadly

By taustin • Score: 5, Informative Thread

Comedians are, in fact, a more credible source of news than TV news or newspapers. They generally pay more attention to what’s actually happening in the world.

Re:Idiocracy

By aaarrrgggh • Score: 5, Insightful Thread

Have you read a newspaper lately? The coverage and quality isn’t what it used to be. I subscribe to two, and donate to a nonprofit newsroom; the latter and one of the subscriptions are local and the other is a “highly regarded” national paper. I can’t read the last one after dinner as it is just too depressing. Across the board though, there isn’t much real national coverage of things that might anger Trump.

So I switch to Colbert for my evening news capsule. There is enough humor to make up for just how deeply troubling some things are. No, it isn’t a primary source of information but it can be a nice way to expose yourself to the pollitics without getting too stressed.

Re:Sadly

By stabiesoft • Score: 5, Interesting Thread
When I can stand it, which is not often, I’ll watch like Germany’s DW or BBC. It usually has a much more vanilla take on what is happening. I was in a waiting room for my car and I took a break from my laptop. They had CNN scrolling across the big screen. It is just too much. I get it is headline, but my god, to watch the crimes of my country played over and over again was repulsive. At least with DW/BBC you see it once and they move on. Moreover they cover more than just US.

Re:Billionaires bought up the news

By Wheres the kaboom • Score: 4, Informative Thread

There are a lot of good news sources. BBC, Al Jazeera, NPR, NYT, Bloomberg, etc. The Atlantic is good for analysis.

Exactly! I learned the following extremely helpful facts from these sources during the Biden administration:

* The inflation is minimal and, regardless, is “temporary”.
* The border is secure, and cannot be closed any further without new congressional legislation.
* Judging by identity instead of character is democratic. (The Atlantic has a particular insightful article about this.)
* Decriminalizing crime and defunding policing are wonderful ideas.
* Violent crime rates haven’t spiked.
* The working class is doing well economically. Low paid non-citizens weren’t responsible for the vast majority of job gains.
* The laptop is a Russian plant and the Steele Report is gospel.
* Smollet was attacked by MAGA.
* The lab leak theory is not at all credible.
* The GF riots were “peaceful”.
* Extremely adult books in grades schools are appropriate.
* Hormonal and surgical transitions for children are scientific and moral.
* The Afghanistan withdrawal was a success.
* Restarting Nord Stream 2 and stopping PennEast are helpful actions.
* Refusing to arm Ukrainians is a great idea.
* Funding Hamas and Iran is smart.
* The Houthis should be removed from terrorist watch lists.
* Biden is fully mentally competent.
* The majority of Black Americans: support defunding, oppose school choice, oppose VoterID, or support illegal immigration.
* It is “fake news” that Kamala was a border czar, donated to free GF rioters, and was rated the most liberal Senator.
* The government isn’t telling social media to suppress dissenting empirically backed information.
* Mississippi is fascist, and isn’t measurably doing a far better job teaching Black American children than progressive California.

NIST Limits CVE Enrichment After 263% Surge In Vulnerability Submissions

Posted by BeauHD View on SlashDot Skip
NIST is narrowing how it handles CVEs in the National Vulnerability Database (NVD), saying it will only automatically enrich higher-priority vulnerabilities. “CVEs that do not meet those criteria will still be listed in the NVD but will not automatically be enriched by NIST,” it said. “This change is driven by a surge in CVE submissions, which increased 263% between 2020 and 2025. We don’t expect this trend to let up anytime soon.” The Hacker News reports:
The prioritization criteria outlined by NIST, which went into effect on April 15, 2026, are as follows:
- CVEs appearing in the U.S. Cybersecurity and Infrastructure Security Agency’s (CISA) Known Exploited Vulnerabilities (KEV) catalog.
- CVEs for software used within the federal government.
- CVEs for critical software as defined by Executive Order 14028: this includes software that’s designed to run with elevated privilege or managed privileges, has privileged access to networking or computing resources, controls access to data or operational technology, and operates outside of normal trust boundaries with elevated access.

Any CVE submission that doesn’t meet these thresholds will be marked as “Not Scheduled.” The idea, NIST said, is to focus on CVEs that have the maximum potential for widespread impact. “While CVEs that do not meet these criteria may have a significant impact on affected systems, they generally do not present the same level of systemic risk as those in the prioritized categories,” it added. […]

Changes have also been instituted for various other aspects of the NVD operations. These include:
- NIST will no longer routinely provide a separate severity score for a CVE where the CVE Numbering Authority has already provided a severity score.
- A modified CVE will be reanalyzed only if it “materially impacts” the enrichment data. Users can request specific CVEs to be reanalyzed by sending an email to the same address listed above.
- All unenriched CVEs currently in backlog with an NVD publish date earlier than March 1, 2026, will be moved into the “Not Scheduled” category. This does not apply to CVEs that are already in the KEV catalog.
- NIST has updated the CVE status labels and descriptions, as well as the NVD Dashboard, to accurately reflect the status of all CVEs and other statistics in real time.

In “normal person speak”

By Anonymous Coward • Score: 4, Insightful Thread
What does it mean to “enrich” a CVE?

Re:In “normal person speak”

By thehossman • Score: 5, Informative Thread
In the slashdot post, the words automatically enrich are a hyperlink that point to a guide from NIST explaining the overall CVE process. It has a very prominent section that explains exactly what “enrichment” has historically done for CVE’s once they are in the NVD…

The following is a general overview of the enrichment process for a given CVE:

  1. Enrichment efforts begin with reviewing any reference material provided with the CVE record and assigns appropriate reference tags. This helps organize the various data sources to help researchers find the relevant information for their needs. Enrichment efforts also include manual searches of the internet to ensure that any other available and relevant information is used for the enrichment process. NVD enrichment efforts only use publicly available materials in the enrichment process.
  2. A common weakness enumeration (CWE) identifier is assigned that categorizes the vulnerability. NVD enrichment efforts use a subset of the full list of CWEs that best represents the distribution of specific types of vulnerabilities. This subset is known as the CWE-1003 view and was created through coordination with the MITRE CWE team.
  3. CVSS V3.1 exploitability and impact metrics are assigned based on publicly available information and the guidelines of the specification if a CVSS score has not already been assigned. If an existing score is noticed to not be supported by CVSS guidelines or publicly available information while performing other enrichment activities, an enrichment team member may choose to provide a score. Users of NVD data may also request the NVD to provide a score.
  4. A Common Platform Enumeration (CPE) Applicability Statement is associated with the vulnerability. The CPE match criteria are generated to identify potentially vulnerable software and/or hardware for the vulnerability. For example, an application may have several versions affected or must be running on a specific operating system to be vulnerable. Automated processes can reference match criteria within the applicability statements against the CPE dictionary to assist in identifying vulnerable products within an organization’s information system. Every effort is made to identify all vulnerable software, but gaps may exist and feedback is encouraged to improve this information.
  5. Enrichment effort results are given a quality assurance check by another experienced team member prior to being published to the website and data feeds.

Re: In “normal person speak”

By JoeRobe • Score: 4, Interesting Thread

There are a lot of technical topics on /. I don’t understand, but the point here is that they use an abbreviation like 20 times in a summary without ever defining it. If you use an abbreviation in technical writing (including a summary), you should define it the first time you use it. There may be some very common abbreviations that don’t require defining, but this is not one of them.

Gazing Into Sam Altman’s Orb Could Solve Ticket Scalping

Posted by BeauHD View on SlashDot
An anonymous reader quotes a report from Wired:
Sam Altman’s iris-scanning, humanity-verifying World project announced at an event in San Francisco on Friday that Tinder users around the globe can now put a digital badge on their profiles signaling to potential suitors that they’re a real human, provided they’ve already stared into one of World’s glossy white Orbs and allowed their eyes to be scanned. The announcement follows a pilot project for Tinder verification that World previously conducted in Japan.

[…] In addition to the Tinder global expansion, Tools for Humanity, the company behind World, announced a number of other consumer and enterprise partnerships on Friday at its Lift Off event in San Francisco. The startup says Tinder users who verify with their World ID will receive five free “boosts,” typically a paid feature that increases the number of users who see a profile by up to 10 times for 30 minutes. The videoconferencing platform Zoom also says that users can now require other participants to verify their identity with World before joining a call. Docusign, the contract signing software, will allow users to require World’s identity verification technology.

Tiago Sada, Tools for Humanity’s chief product officer, tells WIRED the company sees major platform partnerships as key to helping World become a mainstream identity-verification technology. Sada said he’s especially interested in working with social media companies in the future, and was encouraged to see that Reddit has started testing World as a solution to help users distinguish bots from real people. […] World is also launching a tool called Concert Kit, which lets artists reserve concert tickets for verified humans, a pitch aimed squarely at the bot-driven scalping problem that critics say has plagued sites like TicketMaster. World will test the feature on the upcoming Bruno Mars World Tour featuring Anderson .Paak, who is scheduled to play a verified-humans-only show under his alias DJ Pee .Wee in San Francisco on Friday night.
“The idea that World ID is not just private, but it’s one of the most private things you’ve ever used, that’s not obvious,” says Sada. “We’re just not used to this kind of technology. Many people used to tape their [iPhone’s sensor used to enable] Face ID when it came out, then we got used to it.”

Nope!

By H3lldr0p • Score: 5, Interesting Thread

Just another means to control people that can be turned around and sold to governments. Getting used to it my ass. It was foisted on people without consent and those who know don’t use it.

Nope.

By Stolovaya • Score: 5, Insightful Thread

No.

Nope.

Absolutely not.

Go fuck yourselves.

I could probably count on my hand the number of companies that I would trust with my iris scan. OpenAI isn’t one of them.

Fakeable

By dcollins • Score: 5, Interesting Thread

Interestingly, I was in a lab yesterday and met a PhD student whose thesis was largely about using LLMs to fake fingerprints and retinal scans.

who are they kidding?

By dfghjk • Score: 5, Insightful Thread

“The idea that World ID is not just private, but it’s one of the most private things you’ve ever used, that’s not obvious,”

It’s not obvious, and it’s not true. More importantly, what is obvious is that NOT using World ID is MORE private than using it.

“We’re just not used to this kind of technology. Many people used to tape their [iPhone’s sensor used to enable] Face ID when it came out, then we got used to it.”

In other words, you’ll forget about the massive invasion of your privacy, even if you don’t accept our lies about it.

Re:Nope!

By Brain-Fu • Score: 4 Thread

An iris scan is still just data. It can be copied or forged. How is it any more reliable than any other data that can be copied or forged?

I think this whole notion of “prove you are a human from the other side of the Internet” is misguided. I understand why people would want this, but given the nature of the tech, it is too easy to fake it. We are going to need to adapt differently.