×
Moon

Moon Landing's Payloads Include Archive of Human Knowledge, Lunar Data Center Test, NFTs (medium.com) 75

In 2019 a SpaceX Falcon 9 rocket launched an Israeli spacecraft carrying a 30-million page archive of human civilization to the moon. Unfortunately, that spacecraft crashed. But thanks to this week's moon landing by the Odysseus, there's now a 30-million page "Lunar Library" on the moon — according to a Medium post by the Arch Mission Foundation.

"This historic moment secures humanity's cultural heritage and knowledge in an indestructible archive built to last for up to billions of years." Etched onto thin sheets of nickel, called NanoFiche, the Lunar Library is practically indestructible and can withstand the harsh conditions of space... Some of the notable content includes:


The Wikipedia. The entire English Wikipedia containing over 6 million articles on every branch of knowledge.
Project Gutenberg. Portions of Project Gutenberg's library of over 70,000 free eBooks containing some of our most treasured literature.
The Long Now Foundation's Rosetta Project archive of over 7,000 human languages and The Panlex datasets.
Selections from the Internet Archive's collections of books and important documents and data sets.
The SETI Institute's Earthling Project, featuring a musical compilation of 10,000 vocal submissions representing humanity united
The Arch Lunar Art Archive containing a collection of works from global contemporary and digital artists in 2022, recorded as NFTs.
David Copperfield's Magic Secrets — the secrets to all his greatest illusions — including how he will make the Moon disappear in the near future.
The Arch Mission Primer — which teaches a million concepts with images and words in 5 languages.
The Arch Mission Private Library — containing millions of pages as well as books, documents and articles on every subject, including a broad range of fiction and non-fiction, textbooks, periodicals, audio recordings, videos, historical documents, software sourcecode, data sets, and more.
The Arch Mission Vaults — private collections, including collections from our advisors and partners, and a collection of important texts and images from all the world's religions including the great religions and indigenous religions from around the world, collections of books, photos, and a collection of music by leading recording artists, and much more content that may be revealed in the future...


We also want to recognize our esteemed advisors, and our many content partners and collections including the Wikimedia Foundation, the Long Now Foundation, The SETI Institute Earthling Project, the Arch Lunar Art Archive project, Project Gutenberg, the Internet Archive, and the many donors who helped make the Lunar Library possible through their generous contributions. This accomplishment would not have happened without the collaborative support of so many...

We will continue to send backups of our important knowledge and cultural heritage — placing them on the surface of the Earth, in caves and deep underground bunkers and mines, and around the solar system as well. This is a mission that continues as long as humanity endures, and perhaps even long after we are gone, as a gift for whoever comes next.

Space.com has a nice rundown of the other new payloads that just landed on the moon. Some highlights:
  • "Cloud computing startup Lonestar's Independence payload is a lunar data center test mission for data storage and transmission from the lunar surface."
  • LRA is a small hemisphere of light-reflectors built to servce as a precision landmark to "allow spacecraft to ping it with lasers to help them determine their precise distance..."
  • ROLSES is a radio spectrometer for measuring the electron density near the lunar surface, "and how it may affect radio observatories, as well as observing solar and planetary radio waves and other phenomena."
  • "Artist Jeff Koons is sending 125 miniature stainless steel Moon Phase sculptures, each honoring significant human achievements across cultures and history, to be displayed on the moon in a cube. "

United States

US Court Stalls Energy Dept Demand For Cryptocurrency Mining Data (semafor.com) 103

"Crypto mines will have to start reporting their energy use in the U.S.," wrote the Verge in January, saying America's Energy department would "begin collecting data on crypto mines' electricity use, following criticism from environmental advocates over how energy-hungry those operations are."

But then "constitutional freedoms" group New Civil Liberties Alliance (founded with seed money from the Charles Koch Foundation) objected. And "on behalf of its clients" — the Texas Blockchain Council and Colorado bitcoin mining company Riot Platforms — the group said it "looks forward to derailing the Department of Energy's unlawful data collection effort once and for all."

While America's Energy department said the survey would take 30 minutes to complete, the complaint argued it would take 40 hours. According to the judge, the complaint "alleged three main sources of irreparable injury..."

- Nonrecoverable costs of compliance with the Survey
- A credible threat of prosecution if they do not comply with the Survey
- The disclosure of proprietary information requested by the Survey, thus risking disclosure of sensitive business strategy

But more importantly, the survey was implemented under "emergency" provisions, which the judge said is only appropriate when "public harm is reasonably likely to result if normal clearance procedures are followed."

Or, as Semafor.com puts it, the complaint was "seeking to push off the reporting deadline, on the grounds that the survey was rushed through...without a public comment period." The judge, Alan Albright, granted the request late Friday night, blocking the [Department of Energy's Information Administration] from collecting survey data or requiring bitcoin companies to respond to it, at least until a more comprehensive injunction hearing scheduled for Feb. 28. The ruling also concludes that the plaintiffs are "likely to succeed in showing that the facts alleged by the U.S. Energy Information Administration to support an emergency request fall far short of justifying such an action."
The U.S. Department of Energy is now...
  • Restrained from requiring Plaintiffs or their members to respond to the Survey
  • Restrained from collecting data required by the Survey
  • "...and shall sequester and not share any such data that Defendants have already received from Survey respondents."

Thanks to long-time Slashdot reader schwit1 for sharing the news.


Books

Darwin Online Has Virtually Reassembled the Naturalist's Personal Library 24

Jennifer Ouellette reports via Ars Technica: Famed naturalist Charles Darwin amassed an impressive personal library over the course of his life, much of which was preserved and cataloged upon his death in 1882. But many other items were lost, including more ephemeral items like unbound volumes, pamphlets, journals, clippings, and so forth, often only vaguely referenced in Darwin's own records. For the last 18 years, the Darwin Online project has painstakingly scoured all manner of archival records to reassemble a complete catalog of Darwin's personal library virtually. The project released its complete 300-page online catalog -- consisting of 7,400 titles across 13,000 volumes, with links to electronic copies of the works -- to mark Darwin's 215th birthday on February 12.

"This unprecedentedly detailed view of Darwin's complete library allows one to appreciate more than ever that he was not an isolated figure working alone but an expert of his time building on the sophisticated science and studies and other knowledge of thousands of people," project leader John van Wyhe of the National University of Singapore said. "Indeed, the size and range of works in the library makes manifest the extraordinary extent of Darwin's research into the work of others."
Games

How One Developer Earned Over $300K From Games Made in 30 Minutes (theguardian.com) 70

An anonymous reader shares a report: "The first one, I'll be honest, probably took seven or eight hours," says TJ Gardner. "But the subsequent ones -- Stroke the Beaver, for example -- would have taken about half an hour." Gardner is the creator of the "Stroke" video games, available to download from the PlayStation Store for $4 a pop. Each one features a different animal -- cats, dogs and hamsters, along with less cuddly creatures such as snakes and fish -- and they all follow the same blueprint.

When you start the game, an image of the animal appears against a plain blue background. In the top left-hand corner of the screen are the words "Strokes 0." You press X to stroke the animal. The animal flashes briefly. The number in the corner goes up by 1. After 25 strokes, you are rewarded with a bronze trophy. Keep going until you hit 2,000 strokes, and you will receive a platinum award. That's it. There is no animation; there are no sound effects. Just a picture of an animal under a Creative Commons licence from Wikipedia, and some lo-fi acoustic beats looping endlessly in the background. No running, no jumping, no guns, no baddies, no special moves or power-ups or puzzles. Are the Stroke games even video games at all?
The Stroke games, launched in September 2022, have been downloaded more than 120,000 times, amassing nearly $350,000 in sales. Sony takes a 30% cut for hosting the game in the PlayStation Store, leaving Gardner with a pre-tax profit of about $240,000.
Open Source

VC Firm Sequoia Capital Begins Funding More Open Source Fellowships (techcrunch.com) 15

By 2022 the VC firm Sequoia Capital had about $85 billion in assets under management, according to Wikipedia. Its successful investments include Google, Apple, PayPal, Zoom, and Nvidia.

And now the VC firm "plans to fund up to three open source software developers annually," according to TechCrunch, which notes it "a continuation of a program it debuted last year." The Silicon Valley venture capital firm announced the Sequoia Open Source Fellowship last May, but it was initially offered on an invite-only basis with a single recipient to shout about so far. Moving forward, Sequoia is inviting developers to apply for a stipend that will cover their costs for up to a year so they can work full-time on the project — without giving up any equity or ownership.... "The open source world is to some extent divided between the projects that can be commercialized and the projects that are very important, very influential, but just simply can't become companies," said Sequoia partner Bogomil Balkansky. "For the ones that can become great companies, we at Sequoia have a long track record of partnering with them and we will continue partnering with those founders and creators."

And this is why Sequoia is making two distinct financial commitments to two different kinds of open source entities, using grants to support foundational projects that might be instrumental to one of the companies it's taking a direct equity stake in. "In order for Sequoia to succeed, and for our portfolio of companies that we partner with to succeed, there is this vital category of open source developer work that must be supported in order for the whole ecosystem to work well," Balkansky added. From today, Sequoia said it will accept applications from "any developer" working on an open source project, with considerations made on a "rolling basis" moving forward. Funding will include living expenses paid through monthly installments lasting up to a year, allowing the developer to focus entirely on the project without worrying about how to put food on the table.

Spotify, Salesforce and even Bloomberg have launched their own grant programs too, the article points out.

"But these various funding initiatives have little to do with pure altruism. The companies ponying up the capital typically identify the open source software they rely on most, and then allocate funds accordingly..."
AI

Thanks to Machine Learning, Scientist Finally Recover Text From The Charred Scrolls of Vesuvius (sciencealert.com) 45

The great libraries of the ancient classical world are "legendary... said to have contained stacks of texts," writes ScienceAlert. But from Rome to Constantinople, Athens to Alexandria, only one collection survived to the present day.

And here in 2024, "we can now start reading its contents." A worldwide competition to decipher the charred texts of the Villa of Papyri — an ancient Roman mansion destroyed by the eruption of Mount Vesuvius — has revealed a timeless infatuation with the pleasures of music, the color purple, and, of course, the zingy taste of capers. The so-called Vesuvius challenge was launched a few years ago by computer scientist Brent Seales at the University of Kentucky with support from Silicon Valley investors. The ongoing 'master plan' is to build on Seales' previous work and read all 1,800 or so charred papyri from the ancient Roman library, starting with scrolls labeled 1 to 4.

In 2023, the annual gold prize was awarded to a team of three students, who recovered four passages containing 140 characters — the longest extractions yet. The winners are Youssef Nader, Luke Farritor, and Julian Schilliger. "After 275 years, the ancient puzzle of the Herculaneum Papyri has been solved," reads the Vesuvius Challenge Scroll Prize website. "But the quest to uncover the secrets of the scrolls is just beginning...." Only now, with the advent of X-ray tomography and machine learning, can their inky words be pulled from the darkness of carbon.

A few months ago students deciphered a single word — "purple," according to the article. But "That winning code was then made available for all competitors to build upon." Within three months, passages in Latin and Greek were blooming from the blackness, almost as if by magic. The team with the most readable submission at the end of 2023 included both previous finders of the word 'purple'. Their unfurling of scroll 1 is truly impressive and includes more than 11 columns of text. Experts are now rushing to translate what has been found. So far, about 5 percent of the scroll has been unrolled and read to date. It is not a duplicate of past work, scholars of the Vesuvius Challenge say, but a "never-before-seen text from antiquity."

One line reads: "In the case of food, we do not right away believe things that are scarce to be absolutely more pleasant than those which are abundant."

Thanks to davidone (Slashdot reader #12,252) for sharing the article.
Crime

Zeus, IcedID Malware Kingpin Faces 40 Years In Prison (theregister.com) 39

Connor Jones reports via The Register: A Ukrainian cybercrime kingpin who ran some of the most pervasive malware operations faces 40 years in prison after spending nearly a decade on the FBI's Cyber Most Wanted List. Vyacheslav Igorevich Penchukov, 37, pleaded guilty this week in the US to two charges related to his leadership role in both the Zeus and IcedID malware operations that netted millions of dollars in the process. Penchukov's plea will be seen as the latest big win for US law enforcement in its continued fight against cybercrime and those that enable it. However, authorities took their time getting him in 'cuffs. [...]

"Malware like IcedID bleeds billions from the American economy and puts our critical infrastructure and national security at risk," said US attorney Michael Easley for the eastern district of North Carolina. "The Justice Department and FBI Cyber Squad won't stand by and watch it happen, and won't quit coming for the world's most wanted cybercriminals, no matter where they are in the world. This operation removed a key player from one of the world's most notorious cybercriminal rings. Extradition is real. Anyone who infects American computers had better be prepared to answer to an American judge."

This week, he admitted one count of conspiracy to commit a racketeer influenced and corrupt organizations (RICO) act offense relating to Zeus, and one count of conspiracy to commit wire fraud in relation to IcedID. Each count carries a maximum sentence of 20 years. His sentencing date is set for May 9, 2024.
Zeus malware, a banking trojan that formed a botnet for financial theft, caused over $100 million in losses before its 2014 dismantlement. Its successor, SpyEye, incorporated enhanced features for financial fraud. Despite the 2014 takedown of Zeus, Penchukov moved on to lead IcedID, a similar malware first found in 2017. IcedID evolved from banking fraud to ransomware, severely affecting the University of Vermont Medical Center in 2020 with over $30 million in damages.
EU

EU Expands Digital Crackdown on Toxic Content, Dodgy Goods To All Online Platforms (apnews.com) 53

The European Union is expanding its strict digital rulebook on Saturday to almost all online platforms in the bloc, in the next phase of its crackdown on toxic social media content and dodgy ecommerce products that began last year by targeting the most popular services. From a report: The EU's trailblazing Digital Services Act has already kicked in for nearly two dozen of the biggest online platforms, including Facebook, Instagram, YouTube, Amazon and Wikipedia. The DSA imposes a set of strict requirements designed to keep internet users safe online, including making it easier to report counterfeit or unsafe goods or flag harmful or illegal content like hate speech as well as a ban on ads targeted at children.

Now the rules will apply to nearly all online platforms, marketplaces and "intermediaries" with users in the 27-nation bloc. Only the smallest businesses, with fewer than 50 employees and annual revenue of less than 10 million euros ($11 million), are exempt. That means thousands more websites could potentially be covered by the regulations. It includes popular ones such as eBay and OnlyFans that escaped being classed as the biggest online platforms requiring extra scrutiny.

Open Source

AMD's CUDA Implementation Built On ROCm Is Now Open Source (phoronix.com) 29

Michael Larabel writes via Phoronix: While there have been efforts by AMD over the years to make it easier to port codebases targeting NVIDIA's CUDA API to run atop HIP/ROCm, it still requires work on the part of developers. The tooling has improved such as with HIPIFY to help in auto-generating but it isn't any simple, instant, and guaranteed solution -- especially if striving for optimal performance. Over the past two years AMD has quietly been funding an effort though to bring binary compatibility so that many NVIDIA CUDA applications could run atop the AMD ROCm stack at the library level -- a drop-in replacement without the need to adapt source code. In practice for many real-world workloads, it's a solution for end-users to run CUDA-enabled software without any developer intervention. Here is more information on this "skunkworks" project that is now available as open-source along with some of my own testing and performance benchmarks of this CUDA implementation built for Radeon GPUs. [...]

For those wondering about the open-source code, it's dual-licensed under either Apache 2.0 or MIT. Rust fans will be excited to know the Rust programming language is leveraged for this Radeon implementation. [...] Those wanting to check out the new ZLUDA open-source code for Radeon GPUs can do so via GitHub.

Nintendo

F-Zero Courses From a Dead Nintendo Satellite Service Restored Using VHS and AI (arstechnica.com) 15

An anonymous reader quotes a report from Ars Technica: Nintendo's Satellaview, a Japan-only satellite add-on for the Super Famicom, is a rich target for preservationists because it was the home to some of the most ephemeral games ever released. That includes a host of content for Nintendo's own games, including F-Zero. That influential Super Nintendo (Super Famicom in Japan) racing title was the subject of eight weekly broadcasts sent to subscribing Japanese homes in 1996 and 1997, some with live "Soundlink" CD-quality music and voiceovers. When live game broadcasts were finished, the memory cartridges used to store game data would report themselves as empty, even though they technically were not. Keeping that same 1MB memory cartridge in the system when another broadcast started would overwrite that data, and there were no rebroadcasts.

As reported by Matthew Green at Press the Buttons (along with Did You Know Gaming's informative video), data from some untouched memory cartridges was found and used to re-create some of the content. Some courses, part of a multi-week "Grand Prix 2" event, have never been found, despite a $5,000 bounty offering and extensive effort. And yet, remarkably, the 10 courses in those later broadcasts were reverse-engineered, using a VHS recording, machine learning tools, and some manual pixel-by-pixel re-creation. The results are "north of 99.9% accurate," according to those who crafted it and exist now as a mod you can patch onto an existing F-Zero ROM. [...] Their work means that, 25 years later, a moment in gaming that was nearly lost to time and various corporate currents has been, if not entirely restored, brought as close as is humanly (and machine-ably) possible to what it once was.

Linux

'Damn Small Linux' is Back - But Bigger (itsfoss.com) 100

Back in 2006 Slashdot reported on a 50-megabyte "micro" distro called Damn Small Linux. (And in 2012 we wrote that it "rose from the dead" with a new release candidate.)

Now Damn Small Linux has been reborn again, according to its developer's web site: Creating the original DSL, a versatile 50MB distribution, was a lot of fun and one of the things I am most proud of as a personal accomplishment. However, as a concept, it was in the right place at the right time, and the computer industry has changed a lot since then. While it would be possible to make a bootable Xwindows 50MB distribution today, it would be missing many drivers and have only a handful of very rudimentary applications. People would find such a distribution a fun toy or something to build upon, but it would not be usable for the average computer user out of the gate....

The new goal of DSL is to pack as much usable desktop distribution into an image small enough to fit on a single CD, or a hard limit of 700MB. This project is meant to service older computers and have them continue to be useful far into the future. Such a notion sits well with my values. I think of this project as my way of keeping otherwise usable hardware out of landfills.

As with most things in the GNU/Linux community, this project continues to stand on the shoulders of giants. I am just one guy without a CS degree, so for now, this project is based on antiX 23 i386... a fantastic distribution that I think shares much of the same spirit as the original DSL project. AntiX shares pedigree with MEPIS and also leans heavily on the geniuses at Debian.

The blog It's FOSS News describes it as "a unique experience in a sea of Debian-based and Fedora-based distros." It is offered with two window managers, Fluxbox and JWM, with apt being fully enabled by default for easy package installations... At the time of writing, only the Alpha ISOs were made available on the official downloads page. It is only a matter of time before we get a stable release.
Encryption

Cryptography Guru Martin Hellman Urges International Cooperation on AI, Security (infoworld.com) 18

Martin Hellman "achieved legendary status as co-inventor of the Diffie-Hellman public key exchange algorithm, a breakthrough in software and computer cryptography," notes a new interview in InfoWorld.

Nine years after winning the Turing award, the 78-year-old cryptologist shared his perspective on some other issues: What do you think about the state of digital spying today?

Hellman: There's a need for greater international cooperation. How can we have true cyber security when nations are planning — and implementing — cyber attacks on one another? How can we ensure that AI is used only for good when nations are building it into their weapons systems? Then, there's the grandaddy of all technological threats, nuclear weapons. If we keep fighting wars, it's only a matter of time before one blows up.

The highly unacceptable level of nuclear risk highlights the need to look at the choices we make around critical decisions, including cyber security. We have to take into consideration all participants' needs for our strategies to be effective....

Your battle with the government to make private communication available to the general public in the digital age has the status of folklore. But, in your recent book (co-authored with your wife Dorothie [and freely available as a PDF]), you describe a meeting of minds with Admiral Bobby Ray Inman, former head of the NSA. Until I read your book, I saw the National Security Agency as bad and Diffie-Hellman as good, plain and simple. You describe how you came to see the NSA and its people as sincere actors rather than as a cynical cabal bent on repression. What changed your perspective?

Hellman: This is a great, real-life example of how taking a holistic view in a conflict, instead of just a one-sided one, resolved an apparently intractable impasse. Those insights were part of a major change in my approach to life. As we say in our book, "Get curious, not furious." These ideas are effective not just in highly visible conflicts like ours with the NSA, but in every aspect of life.

Hellman also had an interesting answer when asked if math, game theory, and software development teach any lessons applicable to issues like nuclear non-proliferation or national defense.

"The main thing to learn is that the narrative we (and other nations) tell ourselves is overly simplified and tends to make us look good and our adversaries bad."
Data Storage

New Hutter Prize Awarded for Even Smaller Data Compression Milestone (google.com) 22

Since 2006 Baldrson (Slashdot reader #78,598) has been part of the team verifying "The Hutter Prize for Lossless Compression of Human Knowledge," an ongoing challenge to compress a 100-MB excerpt of Wikipedia (approximately the amount a human can read in a lifetime).

"The intention of this prize is to encourage development of intelligent compressors/programs as a path to Artificial General Intelligence," explains the project's web site. 15 years ago, Baldrson wrote a Slashdot post explaining the logic (titled "Compress Wikipedia and Win AI Prize"): The basic theory, for which Hutter provides a proof, is that after any set of observations the optimal move by an AI is find the smallest program that predicts those observations and then assume its environment is controlled by that program. Think of it as Ockham's Razor on steroids.
The amount of the prize also increases based on how much compression is achieved. (So if you compress the 1GB file x% better than the current record, you'll receive x% of the prize...) The first prize was awarded in 2006. And now Baldrson writes: Kaido Orav has just improved 1.38% on the Hutter Prize for Lossless Compression of Human Knowledge with his "fx-cmix" entry.

The competition seems to be heating up, with this winner coming a mere 6 months since the prior winner. This is all the more impressive since each improvement in the benchmark approaches the (unknown) minimum size called the Kolmogorov Complexity of the data.

Encryption

David Kahn, Leading Historian of Code and Code Breaking, Dies At 93 (nytimes.com) 5

Clay Risen reports via the New York Times: David Kahn, whose 1967 book, "The Codebreakers," established him as the world's pre-eminent authority on cryptology -- the science of making and breaking secret codes -- died on Jan. 24 in the Bronx. He was 93. His son Michael said the death, at a senior-living facility, was from the long-term effects of a stroke in 2015.

Before Mr. Kahn's book, cryptology itself was something of a secret. Despite an explosion in cryptological technology and techniques during the 20th century and the central role they played during World War II, the subject was typically overlooked by historians, if only because their possible sources were still highly classified. "Codebreaking is the most important form of secret intelligence in the world today," Mr. Kahn wrote in his book's preface. "Yet it has never had a chronicler."

Over the course of more than 1,000 pages, along with some 150 pages of notes, Mr. Kahn laid out cryptology's long history, starting with ancient Egypt 4,000 years ago and proceeding through the French and American revolutions, the innovations wrought by the advent of the telegraph and telephone to the mid-20th century and the dawn of computer-assisted code breaking.

Piracy

Reddit Doesn't Have To Share IP-Addresses of Piracy Commenters, Court Rules (torrentfreak.com) 22

An anonymous reader quotes a report from TorrentFreak: Reddit is not required to share the IP-address of six users who made piracy-related comments on the website. The company successfully protested the third attempt of a group of filmmakers, which planned to use the requested logs as evidence in their lawsuit against Internet provider Frontier. Instead of focusing on anonymous Redditors, filmmakers can go after the ISP's subscribers directly. [...] Early last year, the film companies subpoenaed Reddit for the first time, requesting the personal details of several users. Reddit refused to cooperate, defending their users' right to anonymous speech, and found a California federal court in agreement. In a second attempt a few weeks later, several film companies sent a similar subpoena to Reddit. This time, the request was more targeted, as all comments specifically referred to the ISP being sued; Grande Communications. Reddit still refused to comply, however, stressing that its users' First Amendment rights would still be at stake. After hearing both parties, Magistrate Judge Laurel Beeler sided with Reddit once again.

While the denial was another setback for the film companies and their attorney, they had no plans to abandon this route to evidence quite so easily. Last month, they were back in court with a similar but tweaked request, this time related to a lawsuit targeting Internet provider Frontier Communications. Broadly speaking, the third case was comparable to the others. The film companies, including Voltage Holdings and Screen Media Ventures, wanted to use comments made by six Redditors to show that the ISP didn't take proper action against repeat infringers, or that 'lax' enforcement acted as a draw to potential pirates. Contrary to the earlier requests, the film companies were no longer looking for any names or email addresses, only the applicable IP address logs. This would allow the commenters to remain anonymous because an 'IP-address is not a person', their attorney argued. Reddit, again, refused to hand over information, arguing it would violate users' right to anonymous speech. The fact that it would only have to reveal IP-addresses wouldn't change that, Reddit argued.

After both sides had the chance to present their arguments, the matter landed on the desk of U.S. Magistrate Judge Thomas Hixson of the California federal court. After reviewing the paperwork, Judge Hixson denied the motion to compel. [...] Of importance in this decision is the so-called '2TheMart.com' standard, which was also applied in the earlier two cases. From that perspective, the court sees no reason to reach a different conclusion. [...] "While the Court is unaware of any cases in the Ninth Circuit in which a court has declined to apply a First Amendment unmasking standard for IP addresses, other courts have recognized that IP addresses are essential to unmasking because an 'IP address cannot be made up in the same way that a poster may provide a false name and address.'" "For this reason, the Court finds no reason to believe provision of an IP address is not unmasking subject to First Amendment scrutiny," Judge Hixson writes. "In sum, the Court finds Movants cannot meet the 2TheMart standard because the evidence they seek can be obtained from other sources, including from Frontier in the normal course of discovery." If the rightsholders are unable to obtain the desired evidence from Frontier, they could always try again, of course. If anything, the film companies have shown that aren't prepared to give up easily.

The Courts

A Famous Climate Scientist Is In Court With Big Stakes For Attacks On Science (npr.org) 272

Julia Simon reports via NPR: In a D.C. courtroom, a trial is wrapping up this week with big stakes for climate science. One of the world's most prominent climate scientists is suing a right-wing author and a policy analyst for defamation. The case comes at a time when attacks on scientists are proliferating, says Peter Hotez, professor of Pediatrics and Molecular Virology at Baylor College of Medicine. Even as misinformation about scientists and their work keeps growing, Hotez says scientists haven't yet found a good way to respond. "The reason we're sort of fumbling at this is it's unprecedented. And there is no roadmap," he says. The climate scientist at the center of this trial is Michael Mann. The professor of earth and environmental science at the University of Pennsylvania gained prominence for helping make one of the most accessible, consequential graphs in the history of climate science. First published in the late 1990s, the graph shows thousands of years of relatively stable global temperatures. Then, when humans start burning lots of coal and oil, it shows a spike upward. Mann's graph looks like a hockey stick lying on its side, with the blade sticking straight up. The so-called "hockey stick graph" was successful in helping the public understand the urgency of global warming, and that made it a target, says Kert Davies, director of special investigations at the Center for Climate Integrity, a climate accountability nonprofit. "Because it became such a powerful image, it was under attack from the beginning," he says.

The attacks came from groups that reject climate science, some funded by the fossil fuel industry. In the midst of these types of attacks -- including the hacking of Mann's and other scientists' emails by unknown hackers -- Penn State, where Mann was then working, opened an investigation into his research. Penn State, as well as the National Science Foundation, found no evidence of scientific misconduct. But a policy analyst and an author wrote that they were not convinced. The trial in D.C. Superior Court involves posts from right-wing author Mark Steyn and policy analyst Rand Simberg. In an online post, Simberg compared Mann to former Penn State football coach Jerry Sandusky, a convicted child sex abuser. Simberg wrote that Mann was the "Sandusky of climate science," writing that Mann "molested and tortured data (PDF)." Steyn called Mann's research fraudulent. Mann sued the two men for defamation. Mann also sued the publishers of the posts, National Review and the Competitive Enterprise Institute, but in 2021, the court ruled they couldn't be held liable.

In court, Mann has argued that he lost funding and research opportunities. Steyn said in court that if Penn State's president, Graham Spanier, covered up child sexual assault, why wouldn't he cover up for Mann's science. The science in question used ice cores and tree rings to estimate Earth's past temperatures. "If Graham Spanier is prepared to cover up child rape, week in, week out, year in, year out, why would he be the least bit squeamish about covering up a bit of hanky panky with the tree rings and the ice cores?" Steyn asked the court. Mann and Steyn declined to speak to NPR during the ongoing trial. One of Simberg's lawyers, Victoria Weatherford, said "inflammatory does not equal defamatory" and that her client is allowed to express his opinion, even if it were wrong. "No matter how offensive or distasteful or heated it is," Weatherford tells NPR, "that speech is absolutely protected under the First Amendment when it's said against a public figure, if the person saying it believed that what they said was true."

Math

Mathematicians Finally Solved Feynman's 'Reverse Sprinkler' Problem (arstechnica.com) 58

Jennifer Ouellette reports via Ars Technica: A typical lawn sprinkler features various nozzles arranged at angles on a rotating wheel; when water is pumped in, they release jets that cause the wheel to rotate. But what would happen if the water were sucked into the sprinkler instead? In which direction would the wheel turn then, or would it even turn at all? That's the essence of the "reverse sprinkler" problem that physicists like Richard Feynman, among others, have grappled with since the 1940s. Now, applied mathematicians at New York University think they've cracked the conundrum, per a recent paper published in the journal Physical Review Letters -- and the answer challenges conventional wisdom on the matter. "Our study solves the problem by combining precision lab experiments with mathematical modeling that explains how a reverse sprinkler operates," said co-author Leif Ristroph of NYU's Courant Institute. "We found that the reverse sprinkler spins in the 'reverse' or opposite direction when taking in water as it does when ejecting it, and the cause is subtle and surprising." [...]

Enter Leif Ristroph and colleagues, who built their own custom sprinkler that incorporated ultra-low-friction rotary bearings so their device could spin freely. They immersed their sprinkler in water and used a special apparatus to either pump water in or pull it out at carefully controlled flow rates. Particularly key to the experiment was the fact that their custom sprinkler let the team observe and measure how water flowed inside, outside, and through the device. Adding dyes and microparticles to the water and illuminating them with lasers helped capture the flows on high-speed video. They ran their experiments for several hours at a time, the better to precisely map the fluid-flow patterns.

Ristroph et al. found that the reverse sprinkler rotates a good 50 times slower than a regular sprinkler, but it operates along similar mechanisms, which is surprising. "The regular or 'forward' sprinkler is similar to a rocket, since it propels itself by shooting out jets," said Ristroph. "But the reverse sprinkler is mysterious since the water being sucked in doesn't look at all like jets. We discovered that the secret is hidden inside the sprinkler, where there are indeed jets that explain the observed motions." A reverse sprinkler acts like an "inside-out rocket," per Ristroph, and although the internal jets collide, they don't do so head-on. "The jets aren't directed exactly at the center because of distortion of the flow as it passes through the curved arm," Ball wrote. "As the water flows around the bends in the arms, it is slung outward by centrifugal force, which gives rise to asymmetric flow profiles." It's admittedly a subtle effect, but their experimentally observed flow patterns are in excellent agreement with the group's mathematical models.

Science

Should You Flush With Toilet Lid Up Or Down? Study Says It Doesn't Matter (arstechnica.com) 132

doc1623 shares a report from Ars Technica: Scientists at the University of Arizona decided to investigate whether closing the toilet lid before flushing reduces cross-contamination of bathroom surfaces by airborne bacterial and viral particles via "toilet plumes." The bad news is that putting a lid on it doesn't result in any substantial reduction in contamination, according to their recent paper published in the American Journal of Infection Control. The good news: Adding a disinfectant to the toilet bowl before flushing and using disinfectant dispensers in the tank significantly reduce cross-contamination. [...]

The scientists conducted their experiment with E. coli (as a host bacteria) and coliphage MS2; the latter is not a human or animal pathogen but serves as a useful model. The public toilet used in the experiment was located in a stall in the restroom of an office building. That toilet was tankless, relying on water-line pressure for flushing, with no lid and a U-shaped seat with a gap in the front. The home toilet was a standard siphonic toilet with a tank and lid in a private residence; there was no gap on the center of the seat. Toilet bowls were seeded with MS2 and flushed. After one minute, samples were taken from various restroom surfaces: the top and bottom of toilet seats, the bowl rim, three locations on the floor, and the right and left walls. The team also conducted a similar experiment involving cleaning the bowls with toilet brushes, both with and without Lysol toilet bowl cleaner. All those samples were then tested for MS2 contamination.

The results: both the tops and bottoms of the lidless public toilet seats had more contamination compared to household seats, but otherwise, there was no statistical significance in the degree of contamination between lidless public toilets and household toilets with lids. And the surface contamination did indeed persist even after repeated flushes. The toilet seat was the worst offender with the greatest degree of contamination, which the authors suggest "reflects the airflow that occurs during toilet flushing, i.e., largely around the top and bottom of the toilet seat." That same airflow is likely a factor in spreading the contamination to restroom floors and walls. Perhaps the least surprising finding is that rigorous cleaning with a toilet bowl brush and Lysol reduced the contamination by 99.99 percent compared to cleaning with just a brush. Therefore, "The most effective strategy for reducing restroom cross-contamination associated with toilet flushing include the addition of a disinfectant to the toilet bowl before flushing and the use of disinfectant/detergent dispensers in the toilet tank," the authors concluded. They also recommend regularly disinfecting all restroom surfaces after flushing or cleaning with a toilet brush in health care facilities -- which often have a lot of immunocompromised people -- and if someone in your house has an active infection like norovirus.
The findings have been published in the journal American Journal of Infection Control.

Slashdot reader doc1623 writes: "This headline brought me joy today, so I thought I would share (I could honestly care less about reading the article but joy is joy, I take it where I can find it.)"
Bitcoin

German Police Secure $2 Billion In Bitcoin From Pirate Site Operators (torrentfreak.com) 42

An anonymous reader quotes a report from TorrentFreak: With help from the FBI, German police managed to secure nearly 50,000 bitcoin (USD $2 billion) from the operators of the defunct movie streaming portal, Movie2k. [...] Movie2K was another pirate site that showed an early interest in bitcoin. In its heyday, the site was the dominant pirate streaming portal in German-speaking countries. It generated a healthy revenue stream, part of it held in bitcoin. The operator of the site never got to spend most of it though. The site surprisingly shut down in the spring of 2013. Many suspected that legal troubles had plagued the site, something confirmed years later when Dresden police announced several arrests.

It was rare to see new activity in an already-dated dossier, but the biggest surprise followed later when the police announced that $29.7m in bitcoin had been secured from the site's operators. This 'seizure' was one of the largest of its kind but the authorities estimated that the operators had more bitcoin stashed away, much more. Today, new information released by Dresden police shows that the assumption was correct.

Following an investigation carried out by the Dresden General Prosecutor's Office, the Saxony State Criminal Police, and the local tax authority (INES), nearly 50,000 bitcoin were 'provisionally' secured earlier this month. The haul is worth more than $2 billion at today's exchange rate. Never before has this much bitcoin been secured by German authorities; it's also one of the largest crypto hauls worldwide. "The Bitcoins were seized after the accused voluntarily transferred them to official wallets provided by the [Federal Criminal Police Office]. This means that a final decision has not yet been made about the utilization of the Bitcoins," police write.

Software

After 32 Years, One of the Net's Oldest Software Archives Is Shutting Down (arstechnica.com) 42

Benj Edwards reports via Ars Technica: In a move that marks the end of an era, New Mexico State University (NMSU) recently announced the impending closure of its Hobbes OS/2 Archive on April 15, 2024. For over three decades, the archive has been a key resource for users of the IBM OS/2 operating system and its successors, which once competed fiercely with Microsoft Windows. In a statement made to The Register, a representative of NMSU wrote, "We have made the difficult decision to no longer host these files on hobbes.nmsu.edu. Although I am unable to go into specifics, we had to evaluate our priorities and had to make the difficult decision to discontinue the service."

Hobbes is hosted by the Department of Information & Communication Technologies at New Mexico State University in Las Cruces, New Mexico. In the official announcement, the site reads, "After many years of service, hobbes.nmsu.edu will be decommissioned and will no longer be available. As of April 15th, 2024, this site will no longer exist." The earliest record we've found of the Hobbes archive online is this 1992 Walnut Creek CD-ROM collection that gathered up the contents of the archive for offline distribution. At around 32 years old, minimum, that makes Hobbes one of the oldest software archives on the Internet, akin to the University of Michigan's archives and ibiblio at UNC.

Slashdot Top Deals