GPU Mining No Longer Profitable After Ethereum Merge

Just one day after the Ethereum Merge, where the cryptocoin successfully switched from Proof of Work (PoW) to Proof of Stake (PoS), profitability of GPU mining has completely collapsed. Tom’s Hardware reports: That means the best graphics cards should finally be back where they belonged, in your gaming PC, just as god intended. That’s a quick drop, considering yesterday there were still a few cryptocurrencies that were technically profitable. Looking at WhatToMine, and using the standard $0.10 per kWh, the best-case results are with the GeForce RTX 3090 and Radeon RX 6800 and 6800 XT. Those are technically showing slightly positive results, to the tune of around $0.06 per day after power costs. However, that doesn’t factor in the cost of the PC power, or the wear and tear on your graphics card.

Even at a slightly positive net result, it would still take over 20 years to break even on the cost of an RX 6800. We say that tongue-in-cheek, because if there’s one thing we know for certain, it’s that no one can predict what the cryptocurrency market will look like even one year out, never mind 20 years in the future. It’s a volatile market, and there are definitely lots of groups and individuals hoping to figure out a way to Make GPU Mining Profitable Again (MGMPA hats inbound…)

Of the 21 current generation graphics cards from the AMD RX 6000-series and the Nvidia RTX 30-series, only five are theoretically profitable right now, and those are all just barely in the black. This is using data from NiceHash and WhatToMine, so perhaps there are ways to tune other GPUs to get into the net positive, but the bottom line is that no one should be using GPUs for mining right now, and certainly not buying more GPUs for mining purposes. [You can see a full list of the current profitability of the current generation graphics cards here.]

Read more of this story at Slashdot.

Increase in LED Lighting ‘Risks Harming Human and Animal Health’

Blue light from artificial sources is on the rise, which may have negative consequences for human health and the wider environment, according to a study. From a report: Academics at the University of Exeter have identified a shift in the kind of lighting technologies European countries are using at night to brighten streets and buildings. Using images produced by the International Space Station (ISS), they have found that the orange-coloured emissions from older sodium lights are rapidly being replaced by white-coloured emissions produced by LEDs. While LED lighting is more energy-efficient and costs less to run, the researchers say the increased blue light radiation associated with it is causing “substantial biological impacts” across the continent. The study also claims that previous research into the effects of light pollution have underestimated the impacts of blue light radiation.

Chief among the health consequences of blue light is its ability to suppress the production of melatonin, the hormone that regulates sleep patterns in humans and other organisms. Numerous scientific studies have warned that increased exposure to artificial blue light can worsen people’s sleeping habits, which in turn can lead to a variety of chronic health conditions over time. The increase in blue light radiation in Europe has also reduced the visibility of stars in the night sky, which the study says “may have impacts on people’s sense of nature.” Blue light can also alter the behavioural patterns of animals including bats and moths, as it can change their movements towards or away from light sources.

Read more of this story at Slashdot.

Customs Officials Have Copied Americans’ Phone Data at Massive Scale

SpzToid writes: U.S. government officials are adding data from as many as 10,000 electronic devices each year to a massive database they’ve compiled from cellphones, iPads and computers seized from travelers at the country’s airports, seaports and border crossings, leaders of Customs and Border Protection told congressional staff in a briefing this summer. The rapid expansion of the database and the ability of 2,700 CBP officers to access it without a warrant — two details not previously known about the database — have raised alarms in Congress about what use the government has made of the information, much of which is captured from people not suspected of any crime. CBP officials told congressional staff the data is maintained for 15 years.

Details of the database were revealed Thursday in a letter to CBP Commissioner Chris Magnus from Sen. Ron Wyden (D-Ore.), who criticized the agency for “allowing indiscriminate rifling through Americans’ private records” and called for stronger privacy protections. The revelations add new detail to what’s known about the expanding ways that federal investigators use technology that many Americans may not understand or consent to. Agents from the FBI and Immigration and Customs Enforcement, another Department of Homeland Security agency, have run facial recognition searches on millions of Americans’ driver’s license photos. They have tapped private databases of people’s financial and utility records to learn where they live. And they have gleaned location data from license-plate reader databases that can be used to track where people drive.

Read more of this story at Slashdot.

China Accuses the NSA of Hacking a Top University To Steal Data

hackingbear shares a report from Gizmodo: China claims that America’s National Security Agency used sophisticated cyber tools to hack into an elite research university on Chinese soil. The attack allegedly targeted the Northwestern Polytechnical University in Xi’an (not to be confused with a California school of the same name), which is highly ranked in the global university index for its science and engineering programs. The U.S. Justice Department has referred to the school as a “Chinese military university that is heavily involved in military research and works closely with the People’s Liberation Army,” painting it as a reasonable target for digital infiltration from an American perspective.

China’s National Computer Virus Emergency Response Center (CVERC) recently published a report attributing the hack to the Tailored Access Operations group (TAO) — an elite team of NSA hackers which first became publicly known via the Snowden Leaks back in 2013, helps the U.S. government break into networks all over the world for the purposes of intelligence gathering and data collection. [CVERC identified 41 TAO tools involved in the case.] One such tool, dubbed ‘Suctionchar,’ is said to have helped infiltrate the school’s network by stealing account credentials from remote management and file transfer applications to hijack logins on targeted servers. The report also mentions the exploitation of Bvp47, a backdoor in Linux that has been used in previous hacking missions by the Equation Group — another elite NSA hacking team. According to CVERC, traces of Suctionchar have been found in many other Chinese networks besides Northwestern’s, and the agency has accused the NSA of launching more than 10,000 cyberattacks on China over the past several years.

On Sunday, the allegations against the NSA were escalated to a diplomatic complaint. Yang Tao, the director-general of American affairs at China’s Ministry of Foreign Affairs, published a statement affirming the CVERC report and claiming that the NSA had “seriously violated the technical secrets of relevant Chinese institutions and seriously endangered the security of China’s critical infrastructure, institutions and personal information, and must be stopped immediately.”

Read more of this story at Slashdot.

Adobe Thinks It Can Solve Netflix’s Password ‘Piracy’ Problem

Adobe thinks it has the answer to Netflix’s “password sharing” problem that involves up to 46 million people, according to a 2020 study. TorrentFreak reports: Adobe believes that since every user is different, any actions taken against an account should form part of a data-driven strategy designed to “measure, manage and monetize” password sharing. The company’s vision is for platforms like Netflix to deploy machine learning models to extract behavioral patterns associated with an account, to determine how the account is being used. These insights can determine which measures should be taken against an account, and how success or otherwise can be determined by monitoring an account in the following weeks or months. Ignoring the obviously creepy factors for a moment, Adobe’s approach does seem more sophisticated, even if the accompanying slide gives off a file-sharing-style “graduated response” vibe. That leads to the question of how much customer information Adobe would need to ensure that the right accounts are targeted, with the right actions, at the right time.

Adobe’s Account IQ is powered by Adobe Sensei, which in turn acts as the intelligence layer for Adobe Experience Platform. In theory, Adobe will know more about a streaming account than those using it, so the company should be able to predict the most effective course of action to reduce password sharing and/or monetize it, without annoying the account holder. But of course, if you’re monitoring customer accounts in such close detail, grabbing all available information is the obvious next step. Adobe envisions collecting data on how many devices are in use, how many individuals are active, and geographical locations — including distinct locations and span. This will then lead to a “sharing probability” conclusion, along with a usage pattern classification that should identify travelers, commuters, close family and friends, even the existence of a second home.

Given that excessive sharing is likely to concern platforms like Netflix, Adobe’s plan envisions a period of mass account monitoring followed by an on-screen “Excessive Sharing” warning in its dashboard. From there, legal streaming services can identify the accounts most responsible and begin preparing their “graduated response” towards changing behaviors. After monetizing those who can be monetized, those who refuse to pay can be identified and dumped. Or as Adobe puts it: “Return free-loaders to available market.” Finally, Adobe also suggests that its system can be used to identify customers who display good behavior. These users can be rewarded by eliminating authentication requirements, concurrent stream limits, and device registrations.

Read more of this story at Slashdot.

EA Announces Kernel-Level Anti-Cheat System For PC Games

Electronics Arts (EA) is launching a new kernel-level anti-cheat system that’s been developed in-house to protect its games from tampering and cheaters. It’ll debut first in FIFA 23 but not all of its games will implement the system. The Verge reports: Kernel-level anti-cheat systems have drawn criticism from privacy and security advocates, as the drivers these systems use are complex and run at such a high level that if there are security issues, then developers have to be very quick to address them. EA says kernel-level protection is “absolutely vital” for competitive games like FIFA 23, as existing cheats operate in the kernel space, so games running in regular user mode can’t detect that tampering or cheating is occurring. “Unfortunately, the last few years have seen a large increase in cheats and cheat techniques operating in kernel-mode, so the only reliable way to detect and block these is to have our anti-cheat operate there as well,” explains [Elise Murphy, senior director of game security and anti-cheat at EA].

EA’s anti-cheat system will run at the kernel level and only runs when a game with EAAC protection is running. EA says its anti-cheat processes shut down once a game does and that the anti-cheat will be limited to what data it collects on a system. “EAAC does not gather any information about your browsing history, applications that are not connected to EA games, or anything that is not directly related to anti-cheat protection,” says Murphy.

Read more of this story at Slashdot.

Coinbase Exec’s Brother Pleads Guilty In Crypto Insider Trading Case

Nikhil Wahi, brother of former Coinbase product manager Ishan Wahi, pleaded guilty in a Monday hearing to one count of conspiracy to commit wire fraud in connection with an alleged insider trading scheme. Decrypt reports: “Less than two months after he was charged, Nikhil Wahi admitted in court today that he traded in crypto assets based on Coinbase’s confidential business information to which he was not entitled,” said Damien Williams of the U.S. Attorney’s Office in New York in a statement. “For the first time ever, a defendant has admitted his guilt in an insider trading case involving the cryptocurrency markets,” Williams continued. “Today’s guilty plea should serve as a reminder to those who participate in the cryptocurrency markets that the Southern District of New York will continue to steadfastly police frauds of all stripes and will adapt as technology evolves.”

Nikhil now awaits sentencing in December, which could mean up to 20 years in prison. He has also been ordered to give back the money earned as a result of the illicit Coinbase trading, Williams said. Back in July, the Justice Department charged Ishan, Nikhil, and their friend Sameer Ramani with wire fraud conspiracy and wire fraud as it relates to cryptocurrency insider trading. The Securities and Exchange Commission also filed charges against the trio. While he was working at Coinbase, Ishan allegedly shared his insider knowledge of upcoming Coinbase listing announcements with Nikhil and Sameer to then profit from the listings by purchasing the tokens before they went live on Coinbase. In August, Ishan pled not guilty to the DOJ’s charges. Now that his brother has pleaded guilty, it’s unclear how Ishan’s case will proceed and whether he will continue to fight the insider trading case.

According to the DOJ’s statement released Monday, Nikhil implicated his brother Ishan and admitted to receiving tips from him. Nikhil then reportedly used numerous different crypto wallets in others’ names to anonymize his insider trading. Concerns of insider trading at cryptocurrency exchanges extend beyond just this case, which is considered the first of its kind and is likely to set a precedent. Three Australian finance academics have posited that up to 25% of Coinbase listings in the past four years may have involved some insider trading.

Read more of this story at Slashdot.

Uber Eats Will Begin Using Nuro Delivery Robots

Autonomous tech developer Nuro is teaming up with Uber Eats in a long-awaited partnership that will see the company’s latest robot take over the delivery of food to app users. Autoweek reports: The two companies signed a 10-year contract just a few days ago, paving the way for a wider rollout of Nuro’s driverless delivery robots, which have been operating on a limited scale in several cities. The partnership will kick off slowly, with Nuro deploying its robots to Houston and Mountain View, California, as a start, before the service makes a wider debut in the Bay Area.

Perhaps more importantly, Nuro’s delivery robots will allow Uber Eats to not have to pay a human driver, which is something that company has been working toward for years as part of its primary business as well. However, the lagging development of Level 4 and Level 5 autonomy, once widely expected to arrive around 2020, had stalled ambitions for Uber, which has struggled with profitability through normal operations with independent contractor drivers. Nuro delivery robots enjoyed renewed interest from business partners in the early months of the pandemic, but the company’s technology is now being viewed as a cost saver for operators rather than a method of more sanitary delivery.

Of course, a limited rollout in two cities plus plans to launch in the Bay Area won’t transform Uber Eats’ business model overnight. This could take years even with an unlimited supply of Nuro delivery robots — with regulatory approval still being the major impediment. That’s because commercial driverless permits are granted on a state-by-state basis, in addition to city and county approvals, which were hard enough for Nuro to obtain in the Bay Area, where Level 4 robotaxis are being tested. Nuro will need to focus its efforts in those areas where traffic is suitable for its robots.

Read more of this story at Slashdot.