Epic Games CEO Criticized For Calling Apple’s ‘Find My’ Feature ‘Super Creepy’
Epic Games CEO Tim Sweeney commented on Apple’s ‘Find My’ service, referring to it as “super creepy surveillance tech” that “shouldn’t exist.” Sweeney went on to explain that several years ago, “a kid” stole a Mac laptop out of his car. Years later, Sweeney was checking Find My, and as the Mac was still connected to his Apple ID account, it showed him the location where the thief lived.
When someone asked Sweeney if he’d at least gotten his laptop back, Sweeney answered “No. I was creeped the hell out by having unexpectedly received the kid’s address, and turned off Find My iPhone on all of my devices.”
Slashdot reader crmarvin42 quipped “Tell me you are stupidly rich, without telling me you are stupidly rich… Next someone will be saying that it is ‘Creepy’ to have security footage of someone taking your Amazon packages off of your porch.” And they also questioned Sweeney’s sincerity, suggesting that he’s “just saying that to try and make Apple look bad because of all the lawsuits going on.”
MacRumors followed the ensuing discussion:
Sweeney said that the location of a device in someone’s possession can’t be tracked without tracking the person, and “people have a right to privacy.” [“This right applies to second hand device buyers and even to thieves.”] He claims that detection and recovery of a lost or stolen device should be “mediated by due process of law” and not exposed to the device owner “in vigilante fashion.”
Some responded to Sweeney’s comments by sharing the headline of a Vox news story about Epic’s own privacy polices. (“Fortnite maker Epic Games has to pay $520 million for tricking kids and violating their privacy.”)
MacRumors cited a 2014 report that thefts of iPhones dropped after the introduction of Apple’s “Activation Lock” feature (which prevents the disabling of ‘Find My’ without a password).
But when the blog AppleInsider accused Sweeney of “an incredibly bad leap of logic” — Sweeney responded. “You’re idealizing this issue as good guys tracking criminals to their lairs, but when Find My or Google’s similar tech points a device owner to a device possessor’s home, one must anticipate the presence of families and kids and innocent used device buyers, and ask whether it’s really appropriate for a platform to use GPS and shadowy mesh network tech to set up physical confrontations among individuals.”
Sweeney also posted a quote from Steve Jobs about how at Apple, “we worry that some 14-year-old is going to get stalked and something terrible is going to happen because of our phone.”
Read more of this story at Slashdot.
Why DARPA is Funding an AI-Powered Bug-Spotting Challenge
But as they see it, “The contest is one of the clearest signs to date that the government sees flaws in open-source software as one of the country’s biggest security risks, and considers artificial intelligence vital to addressing it.”
Free open-source programs, such as the Linux operating system, help run everything from websites to power stations. The code isn’t inherently worse than what’s in proprietary programs from companies like Microsoft and Oracle, but there aren’t enough skilled engineers tasked with testing it. As a result, poorly maintained free code has been at the root of some of the most expensive cybersecurity breaches of all time, including the 2017 Equifax disaster that exposed the personal information of half of all Americans. The incident, which led to the largest-ever data breach settlement, cost the company more than $1 billion in improvements and penalties.
If people can’t keep up with all the code being woven into every industrial sector, DARPA hopes machines can. “The goal is having an end-to-end ‘cyber reasoning system’ that leverages large language models to find vulnerabilities, prove that they are vulnerabilities, and patch them,” explained one of the advising professors, Arizona State’s Yan Shoshitaishvili…. Some large open-source projects are run by near-Wikipedia-size armies of volunteers and are generally in good shape. Some have maintainers who are given grants by big corporate users that turn it into a job. And then there is everything else, including programs written as homework assignments by authors who barely remember them.
“Open source has always been ‘Use at your own risk,'” said Brian Behlendorf, who started the Open Source Security Foundation after decades of maintaining a pioneering free server software, Apache, and other projects at the Apache Software Foundation. “It’s not free as in speech, or even free as in beer,” he said. “It’s free as in puppy, and it needs care and feeding.”
40 teams entered the contest, according to the article — and seven received $1 million in funding to continue on to the next round, with the finalists to be announced at this year’s Def Con, according to the article.
“Under the terms of the DARPA contest, all finalists must release their programs as open source,” the article points out, “so that software vendors and consumers will be able to run them.”
Read more of this story at Slashdot.
NFL to Roll Out Facial Authentication Software to All Stadiums, League-Wide
All 32 NFL stadiums will start using the technology this season, after the league signed a contract with a company that uses facial scans to verify the identity of people entering event venues and other secure spaces.
The facial authentication platform, which counts the Cleveland Browns’ owners as investors, will be used to “streamline and secure” entry for thousands of credentialed media, officials, staff and guests so they can easily access restricted areas such as press boxes and locker rooms, Jeff Boehm, the chief operating officer of Wicket, said in a LinkedIn post Monday. “Credential holders simply take a selfie before they come, and then Wicket verifies their identity and checks their credentials with Accredit (a credentialing platform) as they walk through security checkpoints,” Boehm added.
Wicket technology was deployed in a handful of NFL stadiums last year as part of a pilot program. Other stadiums will start rolling it out beginning on Aug. 8, when the pre-season kicks off. Some teams also have extended their use of the technology to scan the faces of ticket holders. The Cleveland Browns, Atlanta Falcons and New York Mets all have used the company’s facial authentication software to authenticate fans with tickets, according to Stadium Tech Report. “Fans come look at the tablet and, instantly, the tablet recognizes the fan,” Brandon Covert, the vice president of information technology for the Cleveland Browns, said in a testimonial appearing on Wicket’s website. “It’s almost a half-second stop. It’s not even a stop — more of a pause.”
“The Browns also use Wicket to verify the ages of fans purchasing alcohol at concession stands, according to Wicket’s LinkedIn page,” the article points out.
And a July report from Privacy International found that 25 of the top 100 soccer stadiums in the world are already using facial recognition technology.
Thanks to long-time Slashdot reader schwit1 for sharing the news.
Read more of this story at Slashdot.
Japan Mandates App To Ensure National ID Cards Aren’t Forged
My Number Card ran afoul of data breaches, reports of malfunctioning card readers, and database snafus that linked cards to other citizens’ bank accounts. Public trust in the scheme fell, and adoption stalled. Now, according to Japan’s Digital Ministry, counterfeit cards are proliferating to help miscreant purchase goods — particularly mobile phones — under fake identities. Digital minister Taro Kono yesterday presented his solution to the counterfeits: a soon to be mandatory app that confirms the legitimacy of the card. The app uses the camera on a smartphone to read information printed on the card — like date of birth and name. It compares those details to what it reads from info stored in the smartcard’s resident chip, and confirms the data match without the user ever needing to enter their four-digit PIN.
Read more of this story at Slashdot.
Suno & Udio To RIAA: Your Music Is Copyrighted, You Can’t Copyright Styles
“Those genres and styles — the recognizable sounds of opera, or jazz, or rap music — are not something that anyone owns,” the companies said. “Our intellectual property laws have always been carefully calibrated to avoid allowing anyone to monopolize a form of artistic expression, whether a sonnet or a pop song. IP rights can attach to a particular recorded rendition of a song in one of those genres or styles. But not to the genre or style itself.” TorrentFreak reports: “[The labels] frame their concern as one about ‘copies’ of their recordings made in the process of developing the technology — that is, copies never heard or seen by anyone, made solely to analyze the sonic and stylistic patterns of the universe of pre-existing musical expression. But what the major record labels really don’t want is competition.” The labels’ position is that any competition must be legal, and the AI companies state quite clearly that the law permits the use of copyrighted works in these circumstances. Suno and Udio also make it clear that snippets of copyrighted music aren’t stored as a library of pre-existing content in the neural networks of their AI models, “outputting a collage of ‘samples’ stitched together from existing recordings” when prompted by users.
“[The neural networks were] constructed by showing the program tens of millions of instances of different kinds of recordings,” Suno explains. “From analyzing their constitutive elements, the model derived a staggeringly complex collection of statistical insights about the auditory characteristics of those recordings — what types of sounds tend to appear in which kinds of music; what the shape of a pop song tends to look like; how the drum beat typically varies from country to rock to hip-hop; what the guitar tone tends to sound like in those different genres; and so on.” These models are vast stores, not of copyrighted music, the defendants say, but information about what musical styles consist of, and it’s from that information new music is made.
Most copyright lawsuits in the music industry are about reproduction and public distribution of identified copyright works, but that’s certainly not the case here. “The Complaint explicitly disavows any contention that any output ever generated by Udio has infringed their rights. While it includes a variety of examples of outputs that allegedly resemble certain pre-existing songs, the Complaint goes out of its way to say that it is not alleging that those outputs constitute actionable copyright infringement.” With Udio declaring that, as a matter of law, “that key point makes all the difference,” Suno’s conclusion is served raw. “That concession will ultimately prove fatal to Plaintiffs’ claims. It is fair use under copyright law to make a copy of a protected work as part of a back-end technological process, invisible to the public, in the service of creating an ultimately non-infringing new product.” Noting that Congress enacted the first copyright law in 1791, Suno says that in the 233 years since, not a single case has ever reached a contrary conclusion.
In addition to addressing allegations unique to their individual cases, the AI companies accuse the labels of various types of anti-competitive behavior. Imposing conditions to prevent streaming services obtaining licensed music from smaller labels at lower rates, seeking to impose a “no AI” policy on licensees, to claims that they “may have responded to outreach from potential commercial counterparties by engaging in one or more concerted refusals to deal.” The defendants say this type of behavior is fueled by the labels’ dominant control of copyrighted works and by extension, the overall market. Here, however, ownership of copyrighted music is trumped by the existence and knowledge of musical styles, over which nobody can claim ownership or seek to control. “No one owns musical styles. Developing a tool to empower many more people to create music, by scrupulously analyzing what the building blocks of different styles consist of, is a quintessential fair use under longstanding and unbroken copyright doctrine. “Plaintiffs’ contrary vision is fundamentally inconsistent with the law and its underlying values.” You can read Suno and Udio’s answers to the RIAA’s lawsuits here (PDF) and here (PDF).
Read more of this story at Slashdot.
iPad Sales Help ‘Bail Out’ Apple Amid a Continued iPhone Slide
The drop in Apple’s third-largest region (behind the Americas and Europe) had a clear impact on the company’s bottom line. The company aggressively discounted iPhone prices in China starting in May, as competition intensified from domestic rivals. The strategy resulted in strong iPhone sales that month, up close to 40% from a year prior. […] Q3 marked the second consecutive quarter decline for global iPhone sales. The news puts additional pressure on the generative AI strategy that the company laid out at WWDC in June.
Read more of this story at Slashdot.