SpaceX Launched and Landed Another Used Falcon 9 Rocket, Marking Its Record-Tying 18th Launch of the Year

3 days 10 hours ago
SpaceX has successfully sent up a communications satellite for the country of Qatar, marking the aerospace company's 18th mission in 2018, which ties the company's record in 2017 for the most launches done in a year. Since the company has several more missions planned for this year, it's very likely that the company will set a new all-time high soon. The Verge reports: For this mission, SpaceX is employing another one of its used rockets, a Falcon 9 booster that launched the Telstar 19 VANTAGE satellite in July. After that mission, the rocket landed on one of SpaceX's autonomous drone ships in the Atlantic Ocean, and the company hopes to pull off the same feat following today's launch. If successful, this particular Falcon 9 booster could be capable of flying a third time in the near future. The payload is the Es'hail-2 satellite, which is meant to provide communications services to the Middle East and North Africa. It's primarily meant to be used for government and commercial purposes, however, amateur radio operators can also use this satellite. Es'hail-2 has two transponders on board that can connect to amateur radios from South America to Asia. It's not the only satellite with this capability, but Es'hail-2 is going to a particularly high orbit 22,000 miles up. That will make it the first satellite at this altitude to link amateur radios from Brazil to India. SpaceX managed to successfully deploy the Es'hail-2 satellite into orbit "32 minutes after takeoff," The Verge reports in an update. "The company also landed its Falcon 9 rocket on one of its drone ships following liftoff, bringing its total number of successful booster landings to 31." You can watch the full launch here.

Read more of this story at Slashdot.

BeauHD

Uber Joins Linux Foundation Cementing Commitment To Open Source Tools

3 days 10 hours ago
At the 2018 Uber Open Summit, Uber announced it was joining the Linux Foundation as a Gold Member, making a firm commitment to using and contributing to open source tools. TechCrunch reports: Uber CTO Thuan Pham sees the Linux Foundation as a place for companies like his to nurture and develop open source projects. "Open source technology is the backbone of many of Uber's core services and as we continue to mature, these solutions will become ever more important," he said in a blog post announcing the partnership. "Uber has made significant investments in shared software development and community collaboration through open source over the years, including contributing the popular open source project Jaeger, a distributed tracing system, to the Linux Foundation's Cloud Native Computing Foundation in 2017," an Uber spokesperson told TechCrunch. As the report mentions, it took the ride-hailing service a long time for them to join the Linux Foundation. "Uber has been long known for making use of open source in its core tools working on over 320 open source projects and repositories from 1500 contributors involving over 70,000 commits, according to data provided by the company," reports TechCrunch.

Read more of this story at Slashdot.

BeauHD

Senators Ask Four Major Carriers About Video Slowdowns

3 days 11 hours ago
An anonymous reader quotes a report from Ars Technica: Three U.S. Senate Democrats today asked the four major wireless carriers about allegations they've been throttling video services and -- in the case of Sprint -- the senators asked about alleged throttling of Skype video calls. Sens. Edward Markey (D-Mass.), Richard Blumenthal (D-Conn.), and Ron Wyden (D-Ore.) sent the letters to AT&T, Verizon, Sprint, and T-Mobile, noting that recent research using the Wehe testing platform found indications of throttling by all four carriers. "All online traffic should be treated equally, and Internet service providers should not discriminate against particular content or applications for competitive advantage purposes or otherwise," the senators wrote. Specifically, the Wehe tests "indicated throttling on AT&T for YouTube, Netflix, and NBC Sports... throttling on Verizon for Amazon Prime, YouTube, and Netflix... throttling on Sprint for YouTube, Netflix, Amazon Prime, and Skype Video calls... [and] delayed throttling, or boosting, on T-Mobile for Netflix, NBC Sports, and Amazon Prime by providing un-throttled streaming at the beginning of the connection, and then subsequently throttling the connection," the senators' letters said.

Read more of this story at Slashdot.

BeauHD

How Google Photos Became a Perfect Jukebox for Our Memories

3 days 12 hours ago
Google Photos, introduced in 2015, has become one of the most emotionally resonant pieces of technology today. It is also shaping our narratives along the way, writes The New York Times' Farhad Manjoo. From a story: Google's computers can recognize faces, even as they age over time. Photos also seems to understand the tone and emotional valence of human interaction, things like smiles, giggles, frowns, tantrums, dances of joy and even snippets of dialogue like "happy birthday!" or "good job!" The resulting montage, synced to a swelling Hollywood score, mixed obvious highlights -- birthdays, school plays -- with dozens of ordinary moments of childhood bliss. [...] This is what I mean about a sucker punch: Who expects software to make them cry? Images on Instagram and Snapchat may move you regularly, but Google Photos is not social media; it is personal media, a service begun three years ago primarily as a database to house our growing collections of private snaps -- and a service run mostly by machines, not by other humans posting and Liking stuff. And yet Google Photos has become one of the most emotionally resonant pieces of technology I regularly use. It is remarkable not just for how useful it is -- for how it has erased any headache in storing and searching through the tsunami of images we all produce. More than that, Photos is remarkable for what it portends about how we may one day understand ourselves through photography.

Read more of this story at Slashdot.

msmash

Fake Fingerprints Can Imitate Real Ones In Biometric Systems, Research Shows

3 days 12 hours ago
schwit1 shares a report: Researchers have used a neural network to generate artificial fingerprints that work as a "master key" for biometric identification systems and prove fake fingerprints can be created. According to a paper [PDF] presented at a security conference in Los Angeles, the artificially generated fingerprints, dubbed "DeepMasterPrints" by the researchers from New York University, were able to imitate more than one in five fingerprints in a biometric system that should only have an error rate of one in a thousand. The researchers, led by NYU's Philip Bontrager, say that "the underlying method is likely to have broad applications in fingerprint security as well as fingerprint synthesis." As with much security research, demonstrating flaws in existing authentication systems is considered to be an important part of developing more secure replacements in the future. In order to work, the DeepMasterPrints take advantage of two properties of fingerprint-based authentication systems. The first is that, for ergonomic reasons, most fingerprint readers do not read the entire finger at once, instead imaging whichever part of the finger touches the scanner.

Read more of this story at Slashdot.

msmash

FDA Seeks Ban On Menthol Cigarettes To Fight Teen Smoking

3 days 13 hours ago
The Food and Drug Administration announced Thursday that it will seek a ban on the sale of menthol-flavored cigarettes. From a report: The announcement came as the agency officially released a detailed plan to also restrict the sale of flavored electronic cigarettes. It also wants to ban flavored cigars. In a statement, FDA Commissioner Scott Gottlieb says the moves are aimed at fighting smoking among young people. Flavored e-cigarettes, menthol-flavored tobacco cigarettes and flavored cigars are all popular among teenagers. "Today, I'm pursuing actions aimed at addressing the disturbing trend of youth nicotine use and continuing to advance the historic declines we've achieved in recent years in the rates of combustible cigarette use among kids," Gottlieb says. While cigarette smoking has hit a record low in the United States, vaping has been skyrocketing. That trend has raised concerns that a new generation of young people will become addicted to nicotine. Gottlieb says the moves were prompted by new data showing a 78 percent increase in e-cigarette use among high school students and a 48 percent increase among middle school students, from 2017 to 2018. "These data shock my conscience," Gottlieb says.

Read more of this story at Slashdot.

msmash

The F-35's Greatest Vulnerability Isn't Enemy Weapons. It's Being Hacked.

3 days 14 hours ago
schwit1 shares a report: Every F-35 squadron, no matter the country, has a 13-server ALIS package that is connected to the worldwide ALIS network. Individual jets send logistical data back to their nation's Central Point of Entry, which then passes it on to Lockheed's central server hub in Fort Worth, Texas. In fact, ALIS sends back so much data that some countries are worried it could give away too much information about their F-35 operations. Another networking system is the Joint Reprogramming Enterprise, or JRE. The JRE maintains a shared library of potential adversary sensors and weapon systems that is distributed to the worldwide F-35 fleet. For example, the JRE will seek out and share information on enemy radar and electronic warfare signals so that individual air forces will not have to track down the information themselves. This allows countries with the F-35 to tailor the mission around anticipated threats -- and fly one step ahead of them. Although the networks have serious cybersecurity protections, they will undoubtedly be targets for hackers in times of peace, and war. Hackers might try to bring down the networks entirely, snarling the worldwide logistics system and even endangering the ability of individual aircraft to get much-needed spare parts. Alternately, it might be possible to compromise the integrity of the ALIS data -- by, say, reporting a worldwide shortage of F-35 engines. Hackers could conceivably introduce bad data in the JRE that could compromise the safety of a mission, shortening the range of a weapon system so that a pilot thinks she is safely outside the engagement zone when she is most certainly not. Even the F-35 simulators that train pilots could conceivably leak data to an adversary. Flight simulators are programmed to mirror flying a real aircraft as much as possible, so data retrieved from a simulator will closely follow the data from a real F-35.

Read more of this story at Slashdot.

msmash

A New Raspberry Pi 3 Model A+ Has Arrived With Bluetooth 4.2 and Dual-Band Wi-Fi For $25

3 days 14 hours ago
Raspberry Pi has introduced a new version of one of its most popular models just in time to stuff your stocking: the Model A+. And this time around, it's even more attractive. From a report: The Raspberry Pi 3 Model A+ costs $25, $5 more than the previous generation, but has a lot more going for it. Just like the top-of-the-line Model B+, the new Model A+ has a 1.4GHz 64-bit quad-core processor, and you'll also get dual-band Wi-Fi (2.4GHz + 5 GHz), a feature that was missing from the previous A+. And you'll have to use it, since the A+ doesn't have an Ethernet port. It does, however, have Bluetooth 4.2 on board. For $10 less than the $35 Model B+, you'll also only get a single USB port (versus four on the B+) as well as 512MB of RAM (versus 1GB on the B+). But otherwise, the devices are identical, with a full-size HDMI port, CSI camera port, DSI display port, stereo output and composite video port, and a micro SD port. The Raspberry Pi 3 Model A+ isn't the cheapest Pi model available -- the Zero costs $5 and the Zero W costs just $10 -- but it rounds out the options nicely. The new model is available now through Raspberry Pi retailers.

Read more of this story at Slashdot.

msmash

SpaceX Wins FCC Approval To Deploy 7,518 Satellites

3 days 15 hours ago
SpaceX won permission to deploy more than 7,000 satellites, far more than all operating spacecraft currently aloft, from U.S. regulators who also moved to reduce a growing risk from space debris as skies grow more crowded. From a report: Space Exploration Technologies has two test satellites aloft, and it earlier won permission for a separate set of 4,425 satellites -- which like the 7,518 satellites authorized Thursday are designed to provide broadband communications. It has said it plans to begin launches next year. Space companies riding innovations that include smaller and cheaper satellites -- with some just 4 inches long and weighing only 3 pounds -- are planning fleets that will fly fast and low, offering communications now commonly handled by larger, more expensive satellites. Right now there are fewer than 2,000 operating satellites, and the planned additional space traffic demands vigilance, Federal Communications Commission Chairman Ajit Pai said before the agency voted Thursday on a variety of space-related matters including SpaceX's application, debris rules, and other space matters.

Read more of this story at Slashdot.

msmash

The US Military is Making Balloons That Hover at the Edge of Space, Indefinitely

3 days 16 hours ago
A sensor that can spot the wind direction from miles away will let DARPA's surveillance balloons hover at the very edge of space in one spot indefinitely. An anonymous reader writes: DARPA, the US military's research arm, is currently testing a wind sensor that could allow devices in its Adaptable Lighter-Than-Air (ALTA) balloon program to spot wind speed and direction from a great distance and then make the necessary adjustments to stay in one spot. DARPA has been working on ALTA for some time, but its existence was only revealed in September. "By flying higher we hope to take advantage of a larger range of winds," says ALTA project manager Alex Walan. ALTA will operate even higher than Loon at 75,000 to 90,000 feet (22,900 to 27,400 meters or 14 to 17 miles), where the winds are less predictable. That shouldn't be a problem if the balloon can see exactly where the favorable winds are. The wind sensor, called Strat-OAWL (short for "stratospheric optical autocovariance wind lidar"), is a new version of one originally designed for NASA satellites. Made by Ball Aerospace, OAWL shines pulses of laser light into the air. A small fraction of the beam is reflected back, and the reflected laser light is gathered by a telescope. The wavelength of the reflected light is changed slightly depending on how fast the air it bounced back from is moving, a change known as doppler shift. By analyzing this shift, OAWL can determine the speed and direction of the wind. Unlike other wind sensors, OAWL looks in two directions at once, giving a better indication of wind speed and direction.

Read more of this story at Slashdot.

msmash

The Internet Has a Huge C/C++ Problem and Developers Don't Want to Deal With It

3 days 16 hours ago
What do Heartbleed, WannaCry, and million dollar iPhone bugs have in common? From a report: One bug affects iPhones, another affects Windows, and the third affects servers running Linux. At first glance these might seem unrelated, but in reality all three were made possible because the software that was being exploited was written in programming languages which allow a category of errors called "memory unsafety." By allowing these types of vulnerabilities, languages such as C and C++ have facilitated a nearly unending stream of critical computer security vulnerabilities for years. Imagine you had a program with a list of 10 numbers. What should happen if you asked the list for its 11th element? Most of us would say an error of some sort should occur, and in a memory safe programming language (for example, Python or Java) that's what would happen. In a memory unsafe programming language, it'll look at wherever in memory the 11th element would be (if it existed) and try to access it. Sometimes this will result in a crash, but in many cases you get whatever happens to be at that location in memory, even if that portion of memory has nothing to do with our list. This type of vulnerability is called a "buffer-overflow," and it's one of the most common types of memory unsafety vulnerabilities. HeartBleed, which impacted 17 percent of the secure web servers on the internet, was a buffer-overflow exploit, letting you read 60 kilobytes past the end of a list, including passwords and other users' data.

Read more of this story at Slashdot.

msmash

How Podcasts Became a Seductive -- and Sometimes Slippery -- Mode of Storytelling

3 days 17 hours ago
An anonymous reader shares a report: Podcasting has offered advertisers a new means of reaching demographically targeted consumers. Many podcasts feature extended endorsements, read by the host, that often include a discount code for a product or service. For listeners accustomed to a separation between advertising and editorial, the blurring of lines can be disconcerting (or embarrassing, such as when podcast hosts like Joe Rogan and Tim Ferriss expound on how much they enjoy wearing Me Undies). For advertisers that have spent heavily on podcasts, like the omnipresent Casper and Blue Apron, the effectiveness of such campaigns can be measured in increased sales. A representative for Blue Apron, which has launched its own branded podcast, "Why We Eat What We Eat," in addition to advertising on hundreds of shows, told me, "We view podcasts less as an advertising channel and more as a content channel to win new customers and engage existing customers." Podcast advertising remains a relatively new science. Producers and advertisers can instantly tabulate how many times a show has been downloaded, but it's harder to ascertain how many people have listened to the whole thing. A commercial marketplace puts pressure on podcasters to create content that can attract millions of listeners, which does not necessarily make for the strongest, or most subtle, content. Linsky, with some frustration, noted that it doesn't matter much to an advertiser if a podcast takes an hour to record or months to report; all that matters is whether it attracts a lot of listeners. New ways of monetizing podcasts are being explored, including a paid-subscription model; apps such as Stitcher Premium offer ad-free listening and bonus episodes.

Read more of this story at Slashdot.

msmash

YouTube King PewDiePie Surrenders Crown To Indian Record Label T-Series

3 days 18 hours ago
YouTube is about to crown a new king. T-Series, one of India's largest record labels, will become the most-subscribed channel on the world's most popular video site in the next couple weeks. At the beginning of the year, the company had 30 million fans, fewer than half of the following for No. 1 PewDiePie, the Swedish video-game geek and jokester whose real name is Felix Kjellberg. From a report: The company's ascent has shocked the tight-knit community of online personalities, prompting some to rally behind PewDiePie and delay T-Series' ascent. While claiming the most subscribers on YouTube is largely a symbolic achievement, and the company already has the most monthly views, the end of PewDiePie's five-year reign is a watershed moment that reflects important changes as internet use gets more global. More than half of the 10 most popular channels on YouTube in terms of monthly views are from outside the U.S., and many of them belong to professional media companies. YouTube's previous champions have been young, male amateurs like the video blogger Ray William Johnson and comedy duo Smosh. But after years as a mostly Western site for pranks and cat clips, the Google-owned company has lured most of the world's largest media giants to the site, blurring the line between professional and amateur. Further reading: Who Rules YouTube? Swift? Bieber? Nope. It's T-Series, a Record Label in India.

Read more of this story at Slashdot.

msmash

Chinese Telecoms Giant ZTE is Helping Venezuela Build a System That Monitors Citizen Behavior Through a New Identification Card

3 days 18 hours ago
The "fatherland card," already used by the government to track voting, worries many in Venezuela and beyond. From a report: In April 2008, former Venezuelan President Hugo Chavez dispatched Justice Ministry officials to visit counterparts in the Chinese technology hub of Shenzhen. Their mission, according to a member of the Venezuela delegation, was to learn the workings of China's national identity card program. Chavez, a decade into his self-styled socialist revolution, wanted help to provide ID credentials to the millions of Venezuelans who still lacked basic documentation needed for tasks like voting or opening a bank account. Once in Shenzhen, though, the Venezuelans realized a card could do far more than just identify the recipient. There, at the headquarters of Chinese telecom giant ZTE Corp, they learned how China, using smart cards, was developing a system that would help Beijing track social, political and economic behavior. Using vast databases to store information gathered with the card's use, a government could monitor everything from a citizen's personal finances to medical history and voting activity. "What we saw in China changed everything," said the member of the Venezuelan delegation, technical advisor Anthony Daquin. His initial amazement, he said, gradually turned to fear that such a system could lead to abuses of privacy by Venezuela's government. "They were looking to have citizen control." The following year, when he raised concerns with Venezuelan officials, Daquin told Reuters, he was detained, beaten and extorted by intelligence agents. They knocked several teeth out with a handgun and accused him of treasonous behavior, Daquin said, prompting him to flee the country. Government spokespeople had no comment on Daquin's account. The project languished. But 10 years after the Shenzhen trip, Venezuela is rolling out a new, smart-card ID known as the "carnet de la patria," or "fatherland card." The ID transmits data about cardholders to computer servers. The card is increasingly linked by the government to subsidized food, health and other social programs most Venezuelans rely on to survive.

Read more of this story at Slashdot.

msmash

Minister in Charge of Japan's Cybersecurity Says He Has Never Used a Computer

3 days 19 hours ago
Futurepower(R) shares a report: A lot of people don't use computers. Most of them aren't in charge of a nation's cybersecurity. But one is. Japanese lawmakers were aghast on Wednesday when Yoshitaka Sakurada, 68, the minister who heads the government's cybersecurity office, said during questioning in Parliament that he had no need for the devices, and appeared confused when asked basic technology questions. "I have been independently running my own business since I was 25 years old," he said. When computer use is necessary, he said, "I order my employees or secretaries" to do it. [Editor's note: the link may be paywalled; alternative source.] "I don't type on a computer," he added. Asked by a lawmaker if nuclear power plants allowed the use of USB drives, a common technology widely considered to be a security risk, Mr. Sakurada did not seem to understand what they were. "I don't know details well," he said. "So how about having an expert answer your question if necessary, how's that?" The comments were immediately criticized. "I can't believe that a person who never used a computer is in charge of cybersecurity measures," said Masato Imai, an opposition lawmaker.

Read more of this story at Slashdot.

msmash

Mark Zuckerberg Reportedly Ordered All Facebook Executives To Use Android Phones After Tim Cook Criticized Facebook

3 days 23 hours ago
A new report from the New York Times sheds some light on what happened inside Facebook last year as the company was fighting numerous scandals, including Russian interference and the Cambridge Analytica scandal in March. In addition to reportedly hiring a public relations firm to write dozens of articles critical of rivals Google and Apple, the social media company ordered Facebook executives to use Android phones, after Apple CEO Tim Cook criticized the company in an MSNBC interview for being a service that traffics "in your personal life." According to the report, the order came from Facebook CEO Mark Zuckerberg. The Verge reports: In those comments made back in March, Cook dismissed a question asking him what he would do if he were in Zuckerberg's shoes dealing with the fallout from the Cambridge Analytica scandal by saying, "I wouldn't be in this situation." Zuckerberg soon after retorted in an interview with Recode that he found Cook's comments to be "extremely glib," and that "I think it's important that we don't all get Stockholm syndrome and let the companies that work hard to charge you more convince you that they actually care more about you. Because that sounds ridiculous to me." While it's not clear how Cook's aggressive comments directly provoked Zuckerberg into issuing his Android-only order, it's still a rational decision to make Americans use Android. Android is the dominant operating system in many regions outside of the U.S., including South America, Europe, Russia, South Asia, and parts of the Middle East.

Read more of this story at Slashdot.

BeauHD

Mozilla's 'Privacy Not Included' Gift Report Highlights Security Concerns

4 days 2 hours ago
Mozilla has released its second annual "Privacy Not Included" guide that rates 70 products to help give you an idea as to how secure or insecure they are. "We want to provide people information about how to make informed decisions when shopping for gifts that are connected to the internet," says Ashley Boyd, vice president of advocacy at Mozilla. "These products are becoming really popular. And in some cases, it's easy to forget that they're even connected to the internet." Wired reports: Among the important signifiers of a trustworthy stocking stuffer, according to Mozilla's rubric: the use of encryption, pushing automatic software security updates, strong password hygiene, a way to deal with vulnerabilities should they arise, and a privacy policy that doesn't take a PhD to parse. The most surprising result of Mozilla's testing may be how many products actually earned its seal of approval. Thirty-three of the 70 items in the "Privacy Not Included" guide passed muster; fans of the Nintendo Switch, Google Home, and Harry Potter Kano Coding Kit can sleep a little easier. On the other end of the scale, Mozilla highlighted seven products that may not hit the mark -- yes, including the sous vide wand, the Anova Precision Cooker. Also scoring low marks in Mozilla's accounting: the DJI Spark Selfie Drone (no encryption, does not require users to change the default password), the Parrot Bebop 2 drone (no encryption, complex privacy policy), and unsurprisingly, at least one baby monitor. The remaining 30 items on the list all exist somewhere in the murky middle, usually because Mozilla was unable to confirm at least one attribute. Which may be the real takeaway from the report: Typically, you have no reasonable way to find out if a given internet-connected device is secure. "If you can't tell, that says that there's a problem of communication between manufacturers and consumers," says Boyd. "We would love for makers of these products to be more clear and more transparent about what they're doing and not doing. That's a big place we think change is needed."

Read more of this story at Slashdot.

BeauHD

A Massive Impact Crater Has Been Detected Beneath Greenland's Ice Sheet

4 days 6 hours ago
An anonymous reader quotes a report from Gizmodo: An unusually large asteroid crater measuring 19 miles wide has been discovered under a continental ice sheet in Greenland. Roughly the size of Paris, it's now among the 25 biggest asteroid craters on Earth. An iron-rich asteroid measuring nearly a kilometer wide (0.6 miles) struck Greenland's ice-covered surface at some point between 3 million and 12,000 years ago, according to a new study published today in Science Advances. The impact would've flung horrific amounts of water vapor and debris into the atmosphere, while sending torrents of meltwater into the North Atlantic -- events that likely triggered global cooling (a phenomenon sometimes referred to as a nuclear or volcanic winter). Over time, however, the gaping hole was obscured by a 1,000-meter-tall (3,200-foot) layer of ice, where it remained hidden for thousands of years. Remarkably, the crater was discovered quite by chance -- and it's now the first large crater to be discovered beneath a continental ice sheet.

Read more of this story at Slashdot.

BeauHD

China's Fusion Reactor Reaches 100 Million Degrees Celsius

4 days 7 hours ago
hackingbear shares a report from the Australian Broadcasting Corporation: The team of scientists from China's Institute of Plasma Physics announced this week that plasma in their Experimental Advanced Superconducting Tokamak (EAST) -- dubbed the 'artificial sun' -- reached a whopping 100 million degrees Celsius which is six times hotter than the core of the Sun. This temperature is the minimum required to maintain a fusion reaction that produces more power than it takes to run. The Chinese research team said they were able to achieve the record temperature through the use of various new techniques in heating and controlling the plasma, but could only maintain the state for around 10 seconds. The latest breakthrough provided experimental evidence that reaching the 100 million degrees Celsius mark is possible, according to China's Institute of Plasma Physics. "While the U.S. is putting new restrictions on nuclear technology exports to China, inventions and findings of EAST will be important contributions to the development of the International Thermonuclear Experimental Reactor (ITER)," writes Slashdot reader hackingbear. The reactor is currently being built in southern France with collaboration from 35 nations. According to the Australian Broadcasting Corporation, it is expected to be "the first device to consistently produce net energy, producing 500 megawatts of clean and sustainable power."

Read more of this story at Slashdot.

BeauHD

Facebook Reportedly Hired a PR Firm That Wrote Negative Articles About Rivals, Pushed George Soros Conspiracy Theory

4 days 8 hours ago
According to a recently-published report in the New York Times, Facebook hired a public relations firm last year that wrote dozens of articles critical of rivals Google and Apple and pushed the idea that liberal financier George Soros was behind a growing anti-Facebook movement. "Facebook expanded its relationship with Definers Public Affairs in October 2017 after enduring a year's worth of external criticism over its handling of Russian interference on its social network," CNBC summarizes. From the report: The firm reportedly wrote articles that blasted Google and Apple while downplaying the impact of Russian interference on Facebook. Those articles were published on NTK Network, an affiliate of the firm whose content is often followed by politically conservative outlets, including Breitbart, the report says. Definers Public Affairs also reportedly pressed reporters to explore Soros' financial connections with groups that protested Facebook at Congressional hearings in July. Facebook's relationship with Definers Public Affairs were outlined as part of a broader report that looked at the company's handling of numerous scandals over the past three years, including Russian interference and the Cambridge Analytica scandal in March. Other revelations in the report include Sheryl Sandberg's apparent fury when former security chief told the board of directors in fall 2017 about the full extent of Russian interference on the platform, and Mark Zuckerberg ordering managers to use Android phones after Apple CEO Tim Cook criticized the company's approach to privacy earlier this year.

Read more of this story at Slashdot.

BeauHD
Checked
34 minutes 1 second ago
News for nerds, stuff that matters
Subscribe to Slashdot_Main feed