Saudi Arabia Jails Two Wikipedia Staff In ‘Bid To Control Content’

Saudi Arabia has infiltrated Wikipedia and jailed two administrators in a bid to control content on the website, weeks after a former Twitter worker was jailed in the US for spying for the Saudis. The Guardian reports: One administrator was jailed for 32 years, and another was sentenced to eight years, the activists said. An investigation by parent body Wikimedia found the Saudi government had penetrated Wikipedia’s senior ranks in the region, with Saudi citizens acting or forced to act as agents, two rights groups said. “Wikimedia’s investigation revealed that the Saudi government had infiltrated the highest ranks in Wikipedia’s team in the region,” Democracy for the Arab World Now (Dawn) and Beirut-based Smex said in a joint statement.

Dawn, which is based in Washington DC and was founded by slain Saudi journalist Jamal Khashoggi, and Smex, which promotes digital rights in the Arab world, cited “whistleblowers and trusted sources” for the information. There was no immediate comment from the Saudi government or from Wikimedia, which puts free educational content online through initiatives like Wikipedia, the online encyclopedia, and Wiktionary. Dawn and Smex’s statement comes after Wikimedia last month announced global bans for 16 users “who were engaging in conflict of interest editing on Wikipedia projects in the Mena [Middle East and North Africa] region.”

Two high-ranking “admins” — volunteer administrators with privileged access to Wikipedia, including the ability to edit fully protected pages — have been imprisoned since they were arrested on the same day in September 2020, the two bodies added. The arrests appeared to be part of a “crackdown on Wikipedia admins in the country,” Dawn and Smex said, naming the two people imprisoned as Osama Khalid and Ziyad al-Sofiani. Abdullah Alaoudh, Dawn’s director of research for the Gulf, said Khalid was jailed for 32 years and Sofiani received an eight-year sentence. “The arrests of Osama Khalid and Ziyad al-Sofiani on one hand, and the infiltration of Wikipedia on the other hand, show a horrifying aspect of how the Saudi government wants to control the narrative and Wikipedia,” Alaoudh told AFP.

Read more of this story at Slashdot.

Salesforce Guts Tableau After Spending $15.7 Billion in 2019 Deal

Salesforce division Tableau was hit harder than other units in the company’s largest-ever round of jobs cuts this week, adding to a major reorganization that signals the $15.7 billion acquisition hasn’t lived up to expectations. Bloomberg reports: Chief Executive Officer Mark Nelson was ousted from the data analytics division in late December and more senior staff were axed Wednesday as part of Salesforce’s announcement that it would eliminate 10% of its workforce. Job reductions at Tableau were greater, proportionally, than the company at large thus far. After a half-decade of fast hiring and large acquisitions, Salesforce is trying to cut costs and better integrate the companies it has purchased. The software maker, which lost almost half of its value in 2022, has been pressured by investors to improve profit. The job cuts made public Wednesday — about 8,000 workers — are less than half of the number of employees hired in the pandemic and followed the announced exit in December of co-CEO Bret Taylor and the elimination of hundreds of sales positions in November.

Acquisitions fueled the company’s headcount growth. Tableau, then Salesforce’s most expensive deal when it was bought in 2019, came with 4,200 employees while Slack, purchased in 2021, and Mulesoft, acquired in 2018, together brought another 3,700, according to company filings. The three deals combined cost almost $50 billion with the estimated $27.7 billion for Slack leading the way. Workers across these acquired divisions were pummeled by the job reductions, particularly in recruiting and customer success roles, according to company employees. Tableau is increasingly being treated as a visualization tool for data contained in Salesforce’s other services rather than a standalone program — co-founder and CEO Marc Benioff highlighted the new integrations in a December keynote speech. The division has trailed the rest of the company in sales growth since the acquisition.

Salesforce also plans to pare back its office footprint. The company currently has four offices in the Seattle area, more than any other city, according to the company website. Three were inherited in the Tableau deal. Salesforce declined to comment on whether it would be reducing space in the Seattle area. Asked about the effect of Wednesday’s job cuts on Tableau, a Salesforce spokesperson said the unit “is a vital part of our product strategy.” Tableau contributes to a product that “processes over 100 billion customer records, and helps our customers understand and act on their data,” the spokesperson said.

Read more of this story at Slashdot.

Qualcomm’s Going Toe-To-Toe With Apple’s Satellite Messaging Feature

Qualcomm has announced that its new processors and modems will allow phones to communicate with the Iridium satellite network, letting users send and receive messages even in areas without cell coverage. The Verge reports: The feature, called Snapdragon Satellite, will be available in phones that have both Qualcomm’s Snapdragon 8 Gen 2 processor and its X70 Modem system, along with some additional radios. Phones that support it should be “launched in select regions starting in the second half of 2023,” according to the company’s press release, and there are several manufacturers working on designs, according to Francesco Grilli, a Qualcomm spokesperson who helped conduct a briefing for journalists. For now, the feature will likely only be available in flagship Android phones, as Qualcomm’s only including the tech in its premium chips. Companies that want to add it to their phones will work directly with Qualcomm to figure out the software and hardware, but they shouldn’t have to build new relationships with Iridium, according to Grilli. To the satellites, phones with the tech will look like any other Iridium-enabled devices. As for who will pay for the messages, “the cost of the satellite-based messaging service and dependent services will depend on OEMs and service providers and how they choose to offer the service,” according to Grilli.

At first, Snapdragon Satellite will be limited to use in emergency situations, letting you contact someone for help even if you’re in a remote area without cell service. According to Grilli, “Snapdragon Satellite leverages Garmin Response.” When you send an SOS, “response coordinators immediately see the customer’s Latitude/Longitude in their proprietary mapping and response coordination software to determine the appropriate agency to coordinate the rescue.” Qualcomm says that, eventually, it’ll support “premium messaging,” which will likely cost extra and will have to be implemented by OEMs, cell carriers, or other over-the-top service providers. So far, this isn’t something Apple offers; you can only send texts via satellite using its SOS feature.

While Qualcomm says the emergency service will be free or very cheap, it hasn’t provided details yet on how much it’ll cost you if you just want to be able to text your friends from remote areas, like a hiking trail, ski lift, or even a boat in the middle of the ocean. Once that service becomes available, however, Qualcomm says you’ll be able to use it with your regular phone number. (That likely won’t be the case for emergency use, but it matters less there.) […] While details are sparse on what it’ll be like to actually send and receive satellite messages, it sounds like the experience will be similar to Apple’s in that you’ll have to follow instructions on your phone to point it toward a satellite. According to Grilli, your phone will be able to predict where Iridium’s satellites are months in advance thanks to the way its constellation orbits the Earth. When you go to connect to one, it’ll use GPS and other measurements to determine where you need to be facing…

Read more of this story at Slashdot.

Asus Brings Glasses-Free 3D To OLED Laptops

During the CES 2023 in Las Vegas today, Asus announced an upcoming feature that allows users to view and work with content in 3D without wearing 3D glasses. Ars Technica reports: Similar technology has been used in a small number of laptops and displays before, but Asus is incorporating the feature for the first time in OLED laptop screens. Combined with high refresh rates, unique input methods like an integrated dial, and the latest CPUs and laptop GPUs, the company is touting the laptops with the Asus Spatial Vision feature as powerful, niche options for creative professionals looking for new ways to work.

Asus’ Spatial Vision 3D tech is debuting on two laptops in Q2 this year: the ProArt Studiobook 16 3D OLED (H7604) and Vivobook Pro 16 3D OLED (K6604). The laptops each feature a 16-inch, 3200×2000 OLED panel with a 120 Hz refresh rate. The OLED panel is topped with a layer of optical resin, a glass panel, and a lenticular lens layer. The lenticular lens works with a pair of eye-tracking cameras to render real-time images for each eye that adjust with your physical movements. In a press briefing, an Asus spokesperson said that because the OLED screens claim a low gray-to-gray response time of 0.2 ms, as well as the extremely high contrast that comes with OLED, there’s no crosstalk between the left and right eye’s image, ensuring more realistic looking content. However, Asus’ product pages for the laptops acknowledge that experiences may vary, and some may still suffer from “dizziness or crosstalk due to other reasons, and this varies according to the individual.” Asus said it’s looking to offer demos to users, which would be worth trying out before committing to this unique feature.

On top of the lenticular lens is a 2D/3D liquid crystal switching layer, which is topped with a glass front panel with an anti-reflective coating. According to Asus, it’ll be easy to switch from 2D mode to 3D and back again. When the laptops aren’t in 3D mode, their display will appear as a highly specced OLED screen, Asus claimed. The laptops can apply a 3D effect to any game, movie, or content that supports 3D. However, content not designed for 3D display may appear more “stuttery,” per a demo The Verge saw. The laptops are primarily for workers working with and creating 3D models and content, such as designers and architects. The two laptops will ship with Spatial Vision Hub software. It includes a Model Viewer, Player for movies and videos, Photo Viewer for transforming side-by-side photos shot with a 180-degree camera into one stereoscopic 3D image, and Connector, a plug-in that Asus’ product page says is compatible with “various apps and tools, so you can easily view any project in 3D.”

Read more of this story at Slashdot.

Patients Wrongly Told They’ve Got Cancer In SMS Snafu

An anonymous reader quotes a report from The Register: Askern Medical Practice, a general practitioner surgery based in Doncaster, UK, managed to muddle its Christmas holiday message to patients by texting them they’d been diagnosed with “aggressive lung cancer with metastases.” The message went out to patients of the medical facility — there are reportedly about 8,000 of them — on December 23, 2022. It asked patients to fill out a DS1500 form, which is used to help terminal patients expedite access to benefits because they may not have time for the usual bureaucratic delay.

About an hour after thoroughly alarming recipients of the not-so-glad tidings, the medical facility reportedly apologized in a follow-up text message. “Please accept our sincere apologies for the previous text message sent,” the message reads, as reported by the BBC. “This has been sent in error. Our message to you should have read, ‘We wish you a very merry Christmas and a Happy New Year.’ In case of emergency please contact NHS 111.” On Tuesday, the surgery took its apology public via its Facebook page. The surgery characterized the errant text message as both an administrative error and a computer-related error, without clarifying just how the mistake occurred. “While no data was breached, we can confirm an admin staff error was made, for which we apologized immediately upon becoming aware,” Askern Medical Practice said in its post. “We would like to once again apologize sincerely to all patients for the distress caused. We take patient communication, confidentiality and data protection very seriously.”

“We also pride in looking after our patients,” the medical facility’s apology continued. “We would like to reassure all our patients that the text message was a mistake (it was an internal patient supportive task amongst admin staff to act upon) and not related to you as a patient in any way. This was an isolated computer-related error for which we are extremely regretful, and steps are being taken to prevent a reoccurrence.”

Read more of this story at Slashdot.

Major Private Torrent Sites Have a Security Disaster to Fix Right Now

At least three major torrent sites are currently exposing intimate details of their operations to anyone with a web browser. TorrentFreak understands that the sites use a piece of software that grabs brand-new content from other sites before automatically uploading it to their own. A security researcher tried to raise the alarm but nobody will listen. From the report: To get their hands on the latest releases as quickly as possible, [private torrent sites, or private trackers as they’re commonly known] often rely on outside sources that have access to so-called 0-Day content, i.e, content released today. The three affected sites seem to have little difficulty obtaining some of their content within minutes. At least in part, that’s achieved via automation. When outside suppliers of content are other torrent sites, a piece of software called Torrent Auto Uploader steps in. It can automatically download torrents, descriptions, and associated NFO files from one site and upload them to another, complete with a new .torrent file containing the tracker’s announce URL. The management page [here] has been heavily redacted because the content has the potential to identify at least one of the sites. It’s a web interface, one that has no password protection and is readily accessible by anyone with a web browser. The same problem affects at least three different servers operated by the three sites in question.

Torrent Auto Uploader relies on torrent clients to transfer content. The three sites in question all use rTorrent clients with a ruTorrent Web UI. We know this because the researcher sent over a whole bunch of screenshots and supporting information which confirms access to the torrent clients as well as the Torrent Auto Uploader software. The image [here] shows redactions on the tracker tab for good reason. In a regular setup, torrent users can see the names of the trackers coordinating their downloads. This setup is no different except that these URLs reference three different trackers supplying the content to one of the three compromised sites.

Rather than publish a sequence of completely redacted screenshots, we’ll try to explain what they contain. One begins with a GET request to another tracker, which responds with a torrent file. It’s then uploaded to the requesting site which updates its SQL database accordingly. From there the script starts checking for any new entries on a specific RSS feed which is hidden away on another site that has nothing to do with torrents. The feed is protected with a passkey but that’s only useful when nobody knows what it is. The same security hole also grants direct access to one of the sites tracker ‘bots’ through the panel that controls it. Then there’s access to ‘Staff Tools’ on the same page which connect to other pages allowing username changes, uploader application reviews, and a list of misbehaving users that need to be monitored. That’s on top of user profiles, the number of torrents they have active, and everything else one could imagine. Another screenshot featuring a torrent related to a 2022 movie reveals the URL of yet another third-party supplier tracker. Some basic queries on that URL lead to even more torrent sites. And from there, more, and more, and more — revealing torrent passkeys for every single one on the way.

Read more of this story at Slashdot.

X11 Server Development Pace Hits a Two Decade Low

Michael Larabel writes via Phoronix: While Mesa’s development has been very vibrant this year, the X.Org Server development pace has continued pulling back greatly from its late 00’s and early 10’s highs. This year saw just 156 commits to the xserver Git master branch, down from 331 last year and well off the highs of 2,114 as the most ever back in 2008. This jives with the downward pace over the past decade of the number of new commits continuing to slide. But it’s not just on a commit basis but in overall code churn, 2022 was another low for the X.Org Server. With the 156 commits this year, there were just 3,618 lines of new code added and 888 lines removed…. Compared to last year with its 331 commits seeing 31.4k new lines and 179k lines removed.

The X.Org Server development this year on a commit basis hasn’t been as low since 2003 when there were just 125 commits under their old development model and even back then meant there was +865k lines /680k lines removed across that span of commits. There hasn’t been so little code churn to the X Server since 2002. […] This year saw commits from just 32 different email addresses, down from 48 in prior years and that number of different authors hasn’t been so low since 2003 when there were just 10 recorded. Olivier Fourdan of Red Hat was the most prolific committer to the X.Org Server this year with nearly a quarter of the commits. Following Olivier was Jeremy Huddleston Sequoia, Peter Hutterer, Michel DÃnzer, Alan Coopersmith, and Sultan Alsawaf. This year’s X.Org Server development metrics can be found here.

Read more of this story at Slashdot.