8BitDo’s Reimagining of IBM’s Model-M Keyboard Draws Reactions Online

“Few computer keyboards are as iconic, as influential, or as beige as the IBM Model-M,” writes the blog OMG Ubuntu adding that it’s “no surprise then that it’s been given a modern reimagining by 8BitDo.”

Following on from their Nintendo NES and Famicom and Commodore 64 homages, 8BitDo has unveiled its latest retro-inspired mechanical keyboard. This one pays tribute to a true computing classic: the IBM Model-M keyboard.

Lest anyone familiar with the real thing get too excited I’ll mention up front that 8BitDo’s Keyboard-M is a mechanical keyboard, using Kailh Box V2 white switches (swappable, of course) and not the buckling spring mechanism synonymous with the original. On Linux you can enable a buckling spring sound effect for every key press though, should you buy this and want the clatter to accompany it…!

Like 8BitDo’s other retro keyboards you can use this over Bluetooth, 2.4G wireless (USB adapter sits underneath), or wired. It has a built-in rechargeable 2000mAh Li-on battery that’s good for 200 hours between charges.

“It certainly looks the business,” writes the Verge, “especially with the slick new wireless numpad / calculator combo pad 8BitDo will sell alongside it for another $44.99.”

And Ars Technica adds that “The M Edition’s color scheme, chunkier build, and typeface selection, including on the Tab key with arrows and elsewhere, are nods to IBM’s Model M,” (noting that the Model M first succeeded the Model F keyboard in 1985). “Of course, the keyboard’s naming, and the IBM behemoth and floppy disks strategically placed in marketing images, are notes of that, too…”
“The M Edition also comes with the detachable A and B “Super Buttons” that connect to the keyboard via a 3.5 mm jack and are programmable without software.”

“The paint job is pretty faithful to the original,” notes Windows Central, “with a combination of gray and white throughout, right down to the accurately recreated LED status panel in the right-hand corner. There are even two key caps with an IBM-inspired blue font on them. It’s just tremendous.”
Ars Technica offers this advice to unconvinced purists:
If you want a real Model M, there’s a market of found and restored models available online and in thrift stores and electronics stores. For a modern spin, like USB ports and Mac support, Unicomp also makes new Model M keyboards that are truer to the original IBM design, particularly in their use of buckling spring switches.

Read more of this story at Slashdot.

Male Birth Control Gel Continues to Show Promise

Gizmodo reports there’s been progress on a male birth-control gel “being developed with the help of several organizations, including the U.S. government’s National Institute of Child Health and Human Development, part of the larger NIH.”

It’s now being tested in a larger-scale Phase IIB trial, which involves around 400 couples. [Five milliliters of gel — about a teaspon — is applied to each shoulder blade once a day, reports NBC News.] That trial is still ongoing, but researchers have already begun to pore through some of the available data, which has provided encouraging results. In the summer of 2022, for instance, Diana Blithe, chief of the NICHD’s Contraceptive Development Program, reported that the NES/T gel’s efficacy rate so far appeared to be on par or even better than contraceptive hormonal options for women…
The findings are still preliminary, and it will take more time for the full Phase II data to be collected and analyzed. But Blithe and her team have been encouraged by everything they’ve seen to date. In the team’s early assessments, the gel appears to be both effective and safe, with minimal side effects for men taking it… Blithe and her colleagues are set to meet with the FDA next year about the steps needed to begin a larger Phase III trial and are still seeking a commercial partner to help bring the NES/T gel to the market.
Initial findings also showed that the contraceptive worked faster than expected, Blithe said, according to NBC News. They add that at least three other companies are also working on male birth control:
Also at the Boston conference on Sunday, YourChoice Therapeutics said a very small trial in the U.K. — just 16 men — showed that its nonhormonal pill, YCT-529, was safe and free of side effects. The San Francisco company’s nonhormonal pill works by blocking the vitamin A receptor important for male fertility.YourChoice is planning a larger trial, according to CEO Akash Bakshi.

Read more of this story at Slashdot.

How Facial Recognition Tech Is Being Used In London By Shops – and Police

“Within less than a minute, I’m approached by a store worker who comes up to me and says, ‘You’re a thief, you need to leave the store’.”

That’s a quote from the BBC by a wrongly accused customer who was flagged by a facial-recognition system called Facewatch. “She says after her bag was searched she was led out of the shop, and told she was banned from all stores using the technology.”

Facewatch later wrote to her and acknowledged it had made an error — but declined to comment on the incident in the BBC’s report:

[Facewatch] did say its technology helped to prevent crime and protect frontline workers. Home Bargains, too, declined to comment. It’s not just retailers who are turning to the technology… [I]n east London, we joined the police as they positioned a modified white van on the high street. Cameras attached to its roof captured thousands of images of people’s faces. If they matched people on a police watchlist, officers would speak to them and potentially arrest them…

On the day we were filming, the Metropolitan Police said they made six arrests with the assistance of the tech… The BBC spoke to several people approached by the police who confirmed that they had been correctly identified by the system — 192 arrests have been made so far this year as a result of it.
Lindsey Chiswick, director of intelligence for the Met, told the BBC that “It takes less than a second for the technology to create a biometric image of a person’s face, assess it against the bespoke watchlist and automatically delete it when there is no match.”

“That is the correct and acceptable way to do it,” writes long-time Slashdot reader Baron_Yam, “without infringing unnecessarily on the freedoms of the average citizen. Just tell me they have appropriate rules, effective oversight, and a penalty system with teeth to catch and punish the inevitable violators.”

But one critic of the tech complains to the BBC that everyone scanned automatically joins “a digital police line-up,” while the article adds that others “liken the process to a supermarket checkout — where your face becomes a bar code.” And “The error count is much higher once someone is actually flagged. One in 40 alerts so far this year has been a false positive…”

Thanks to Slashdot reader Bruce66423 for sharing the article.

Read more of this story at Slashdot.

Federal Agency Warns (Patched) Critical Linux Vulnerability Being Actively Exploited

“The US Cybersecurity and Infrastructure Security Agency has added a critical security bug in Linux to its list of vulnerabilities known to be actively exploited in the wild,” reported Ars Technica on Friday.

“The vulnerability, tracked as CVE-2024-1086 and carrying a severity rating of 7.8 out of a possible 10, allows people who have already gained a foothold inside an affected system to escalate their system privileges.”

It’s the result of a use-after-free error, a class of vulnerability that occurs in software written in the C and C++ languages when a process continues to access a memory location after it has been freed or deallocated. Use-after-free vulnerabilities can result in remote code or privilege escalation. The vulnerability, which affects Linux kernel versions 5.14 through 6.6, resides in the NF_tables, a kernel component enabling the Netfilter, which in turn facilitates a variety of network operations… It was patched in January, but as the CISA advisory indicates, some production systems have yet to install it. At the time this Ars post went live, there were no known details about the active exploitation.

A deep-dive write-up of the vulnerability reveals that these exploits provide “a very powerful double-free primitive when the correct code paths are hit.” Double-free vulnerabilities are a subclass of use-after-free errors…

Read more of this story at Slashdot.