Crooks Bypassed Google’s Email Verification To Create Workspace Accounts, Access 3rd-Party Services
“The tactic here was to create a specifically-constructed request by a bad actor to circumvent email verification during the signup process,” [said Anu Yamunan, director of abuse and safety protections at Google Workspace]. “The vector here is they would use one email address to try to sign in, and a completely different email address to verify a token. Once they were email verified, in some cases we have seen them access third party services using Google single sign-on.” Yamunan said none of the potentially malicious workspace accounts were used to abuse Google services, but rather the attackers sought to impersonate the domain holder to other services online.
Read more of this story at Slashdot.
Courts Close the Loophole Letting the Feds Search Your Phone At the Border
And in a victory for journalists, the judge specifically acknowledged the First Amendment implications of cellphone searches too. She cited reporting by The Intercept and VICE about CPB searching journalists’ cellphones “based on these journalists’ ongoing coverage of politically sensitive issues” and warned that those phone searches could put confidential sources at risk. Wednesday’s ruling adds to a stream of cases restricting the feds’ ability to search travelers’ electronics. The 4th and 9th Circuits, which cover the mid-Atlantic and Western states, have ruled that border police need at least “reasonable suspicion” of a crime to search cellphones. Last year, a judge in the Southern District of New York also ruled (PDF) that the government “may not copy and search an American citizen’s cell phone at the border without a warrant absent exigent circumstances.”
Read more of this story at Slashdot.
Nvidia’s Open-Source Linux Kernel Driver Performing At Parity To Proprietary Driver
Across all of the tests I carried out using the NVIDIA 555 stable series Linux driver, the open-source NVIDIA kernel modules were able to achieve the same performance as the classic proprietary driver. Also important is that there was no increased power use or other difference in power management when switching over to the open-source NVIDIA kernel modules.
It’s great seeing how far the NVIDIA open-source kernel modules have evolved and that with the upcoming NVIDIA 560 Linux driver series they will be defaulting to them on supported GPUs. And moving forward with Blackwell and beyond, NVIDIA is just enabling the GPU support along their open-source kernel drivers with leaving the proprietary kernel drivers to older hardware. Tests I have done using NVIDIA GeForce RTX 40 graphics cards with Linux gaming workloads between the MIT/GPL and proprietary kernel drivers have yielded similar (boring but good) results: the same performance being achieved with no loss going the open-source route. You can view Phoronix’s performance results in charts here, here, and here.
Read more of this story at Slashdot.
AI Models Face Collapse If They Overdose On Their Own Output
“If subsequent models are trained on an AI-generated data set that over-represents Golden Retrievers, the problem is compounded. With enough cycles of over-represented Golden Retriever, the model will forget that obscure dog breeds such as Petit Basset Griffon Vendeen exist and generate pictures of just Golden Retrievers. Eventually, the model will collapse, rendering it unable to generate meaningful content.” While she concedes an over-representation of Golden Retrievers may be no bad thing, the process of collapse is a serious problem for meaningful representative output that includes less-common ideas and ways of writing. “This is the problem at the heart of model collapse,” she said.
Read more of this story at Slashdot.