Nvidia’s Open-Source Linux Kernel Driver Performing At Parity To Proprietary Driver

Nvidia’s new R555 Linux driver series has significantly improved their open-source GPU kernel driver modules, achieving near parity with their proprietary drivers. Phoronix’s Michael Larabel reports: The NVIDIA open-source kernel driver modules shipped by their driver installer and also available via their GitHub repository are in great shape. With the R555 series the support and performance is basically at parity of their open-source kernel modules compared to their proprietary kernel drivers. […] Across a range of different GPU-accelerated creator workloads, the performance of the open-source NVIDIA kernel modules matched that of the proprietary driver. No loss in performance going the open-source kernel driver route. Across various professional graphics workloads, both the NVIDIA RTX A2000 and A4000 graphics cards were also achieving the same performance whether on the open-source MIT/GPLv2 driver or using NVIDIA’s classic proprietary driver.

Across all of the tests I carried out using the NVIDIA 555 stable series Linux driver, the open-source NVIDIA kernel modules were able to achieve the same performance as the classic proprietary driver. Also important is that there was no increased power use or other difference in power management when switching over to the open-source NVIDIA kernel modules.

It’s great seeing how far the NVIDIA open-source kernel modules have evolved and that with the upcoming NVIDIA 560 Linux driver series they will be defaulting to them on supported GPUs. And moving forward with Blackwell and beyond, NVIDIA is just enabling the GPU support along their open-source kernel drivers with leaving the proprietary kernel drivers to older hardware. Tests I have done using NVIDIA GeForce RTX 40 graphics cards with Linux gaming workloads between the MIT/GPL and proprietary kernel drivers have yielded similar (boring but good) results: the same performance being achieved with no loss going the open-source route. You can view Phoronix’s performance results in charts here, here, and here.

Read more of this story at Slashdot.

Courts Close the Loophole Letting the Feds Search Your Phone At the Border

On Wednesday, Judge Nina Morrison ruled that cellphone searches at the border are “nonroutine” and require probable cause and a warrant, likening them to more invasive searches due to their heavy privacy impact. As reported by Reason, this decision closes the loophole in the Fourth Amendment’s protection against unreasonable searches and seizures, which Customs and Border Protection (CBP) agents have exploited. Courts have previously ruled that the government has the right to conduct routine warrantless searches for contraband at the border. From the report: Although the interests of stopping contraband are “undoubtedly served when the government searches the luggage or pockets of a person crossing the border carrying objects that can only be introduced to this country by being physically moved across its borders, the extent to which those interests are served when the government searches data stored on a person’s cell phone is far less clear,” the judge declared. Morrison noted that “reviewing the information in a person’s cell phone is the best approximation government officials have for mindreading,” so searching through cellphone data has an even heavier privacy impact than rummaging through physical possessions. Therefore, the court ruled, a cellphone search at the border requires both probable cause and a warrant. Morrison did not distinguish between scanning a phone’s contents with special software and manually flipping through it.

And in a victory for journalists, the judge specifically acknowledged the First Amendment implications of cellphone searches too. She cited reporting by The Intercept and VICE about CPB searching journalists’ cellphones “based on these journalists’ ongoing coverage of politically sensitive issues” and warned that those phone searches could put confidential sources at risk. Wednesday’s ruling adds to a stream of cases restricting the feds’ ability to search travelers’ electronics. The 4th and 9th Circuits, which cover the mid-Atlantic and Western states, have ruled that border police need at least “reasonable suspicion” of a crime to search cellphones. Last year, a judge in the Southern District of New York also ruled (PDF) that the government “may not copy and search an American citizen’s cell phone at the border without a warrant absent exigent circumstances.”

Read more of this story at Slashdot.

Crooks Bypassed Google’s Email Verification To Create Workspace Accounts, Access 3rd-Party Services

Brian Krebs writes via KrebsOnSecurity: Google says it recently fixed an authentication weakness that allowed crooks to circumvent the email verification required to create a Google Workspace account, and leverage that to impersonate a domain holder at third-party services that allow logins through Google’s “Sign in with Google” feature. […] Google Workspace offers a free trial that people can use to access services like Google Docs, but other services such as Gmail are only available to Workspace users who can validate control over the domain name associated with their email address. The weakness Google fixed allowed attackers to bypass this validation process. Google emphasized that none of the affected domains had previously been associated with Workspace accounts or services.

“The tactic here was to create a specifically-constructed request by a bad actor to circumvent email verification during the signup process,” [said Anu Yamunan, director of abuse and safety protections at Google Workspace]. “The vector here is they would use one email address to try to sign in, and a completely different email address to verify a token. Once they were email verified, in some cases we have seen them access third party services using Google single sign-on.” Yamunan said none of the potentially malicious workspace accounts were used to abuse Google services, but rather the attackers sought to impersonate the domain holder to other services online.

Read more of this story at Slashdot.

ServiceNow Embroiled In DOJ Probe of Government Contract Award

snydeq shares a report from CIO.com: ServiceNow has reported potential compliance issues to the US Department of Justice “related to one of its government contracts” as well as the hiring of the then-CIO of the US Army to be its head of global public sector, the company said in regulatory filings on Wednesday. The DOJ is looking into the matter. Following an internal investigation, ServiceNow said, its President and COO, CJ Desai, has resigned, while “the other individual has also departed the company.” That executive, Raj Iyer, told CIO.com, “I resigned because I didn’t want to be associated with this fiasco in any way. It’s not my fault.”

CEO Bill McDermott told financial analysts in a conference call Wednesday that someone within ServiceNow had complained about the situation and that an internal probe “determined that our company policy was violated.”

“Acting with total transparency, the company proactively disclosed the findings of the investigation to the proper government entities. And as a result, today, we’re announcing the departure of the individual whose hiring was the subject of the original complaint,” McDermott said. “We also came to a mutual agreement that CJ Desai, our President and COO, would offer his resignation from the company effective immediately. While we believe this was an isolated incident, we are further sharpening our hiring policies and procedures as a result of the situation.”

Read more of this story at Slashdot.