
The ENIAC system was such a power guzzler in 1953 that it caused power blackouts in Philadelphia. CC-licensed photo by terren in Virginia on Flickr.
You can sign up to receive each day’s Start Up post by email. You’ll need to click a confirmation link, so no spam.
A selection of 9 links for you. Full of energy. I’m @charlesarthur on Twitter. On Threads: charles_arthur. On Mastodon: https://newsie.social/@charlesarthur. On Bluesky: @charlesarthur.bsky.social. Observations and links welcome.
Journalist discovers Google vulnerability that allowed people to disappear specific pages from search • 404 Media
Matthew Gault:
»
By accident, journalist Jack Poulson discovered Google had completely de-listed two of his articles from its search results. “We only found it by complete coincidence,” Poulson told 404 Media. “I happened to be Googling for one of the articles, and even when I typed in the exact title in quotes it wouldn’t show up in search results anymore.”
Poulson had stumbled on a vulnerability in Google’s search engine that allowed people to maliciously delete links off of Google, which is a reputation management company’s dream and which could easily be used to suppress information. The SEO trick had allowed someone to de-list specific web pages from the search engine using Google’s Refresh Outdated Content tool, a site that lets users submit pages to URLs to be recrawled and re-listed after an update. The vulnerability had to do with capitalizing different letters in the URL in this tool, which ultimately caused the delisting.
In 2023, Poulson published an article about tech CEO Delwin Maurice Blackman’s 2021 arrest on a felony domestic violence charge.
After Poulson published Blackman’s arrest records in 2023, the CEO has attempted to suppress the story in various ways, including lawsuits and DMCA takedown requests. Eventually, the stories disappeared from Google, using this vulnerability. As far as Poulson could tell, the only two articles on his newsletter that had been de-listed by Google using the trick were related to the CEO.
Google confirmed the problem in an email to 404 Media. “This tool helps ensure our search results are up to date. We’re vigilant in monitoring abuse, and we worked quickly to roll out a fix for this specific issue, which was only impacting a tiny fraction of web pages.”
«
“Vigilant in monitoring abuse” as long as they’re told about it by journalists. Perhaps they need a team who are trying to remove all their details from the search results.
unique link to this extract
Mark Zuckerberg promises you can trust him with superintelligent AI • The Verge
Hayden Field:
»
Hours before Meta’s earnings call, CEO Mark Zuckerberg shared his vision for the future of AI: personalized super-smart AI for everyone — especially in the form of wearable glasses.
He said his vision is for everyone to have an AI tool that “helps you achieve your goals, create what you want to see in the world, experience any adventure, be a better friend to those you care about, and grow to become the person you aspire to be.”
The announcement came in the form of a plain-text webpage and letter to the public espousing the importance of bringing “personal superintelligence” to everyone, even if it takes a while. Superintelligence is another term for artificial general intelligence, or AGI, a type of AI that equals or surpasses human intelligence on a wide range of tasks — a goal that most leading AI companies, including OpenAI, Anthropic, and Google, are chasing right now.
“The improvement is slow for now, but undeniable,” Zuckerberg wrote of AI’s advances. “Developing superintelligence is now in sight.”
…Zuckerberg also subtly cast doubt on the goals of his competitors in AI, writing that Meta’s goal “is distinct from others in the industry who believe superintelligence should be directed centrally towards automating all valuable work, and then humanity will live on a dole of its output.” For instance, Sam Altman, CEO of OpenAI, has publicly stated he believes that AI could replace many jobs in society and eventually lead to a form of universal basic income.
Zuckerberg continued his bullish stance on smart glasses, writing that above all, humanity’s “primary computing devices” will be personal devices like glasses.
«
I can believe that smart glasses will be a thing – potentially a huge thing – but the question is how soon. That’s really the only question. There had been smartphones for years before the iPhone turned up in 2007 and showed the world how to do it, and it needed Android to copy it and make it widespread for the form to take over from the BlackBerry and Nokia and Windows Mobile forms.
unique link to this extract
Physicists disagree wildly on what quantum mechanics says about reality, Nature survey shows • Nature
Elizabeth Gibney:
»
Quantum mechanics is one of the most successful theories in science — and makes much of modern life possible. Technologies ranging from computer chips to medical-imaging machines rely on the application of equations, first sketched out a century ago, that describe the behaviour of objects at the microscopic scale.
But researchers still disagree widely on how best to describe the physical reality that lies behind the mathematics, as a Nature survey reveals.
At an event to mark the 100th anniversary of quantum mechanics last month, lauded specialists in quantum physics argued politely — but firmly — about the issue. “There is no quantum world,” said physicist Anton Zeilinger, at the University of Vienna, outlining his view that quantum states exist only in his head and that they describe information, rather than reality. “I disagree,” replied Alain Aspect, a physicist at the University of Paris-Saclay, who shared the 2022 Nobel prize with Zeilinger for work on quantum phenomena.
To gain a snapshot of how the wider community interprets quantum physics in its centenary year, Nature carried out the largest ever survey on the subject. We e-mailed more than 15,000 researchers whose recent papers involved quantum mechanics, and also invited attendees of the centenary meeting, held on the German island of Heligoland, to take the survey.
The responses — numbering more than 1,100, mainly from physicists — showed how widely researchers vary in their understanding of the most fundamental features of quantum experiments.
«
You might think: who cares, quantum theory is a century old. But being able to think of new ways to explore the theory depend on how you interpret the theory. And there’s surprisingly low confidence even in the most popular reading of quantum theory.
unique link to this extract
Apple loses fourth AI researcher in a month to Meta’s superintelligence team • Bloomberg via South China Morning Post
Mark Gurman:
»
Apple has lost its fourth AI researcher in a month to Meta Platforms, marking the latest setback to the iPhone maker’s artificial intelligence efforts.
Bowen Zhang, a key multimodal AI researcher at Apple, left the company on Friday and is set to join Meta’s recently formed superintelligence team, according to people familiar with the matter. Zhang was part of the Apple foundation models group, or AFM, which built the core technology behind the company’s AI platform.
Meta previously lured away the leader of the team, Ruoming Pang, with a compensation package valued at more than US$200m, Bloomberg News has reported. Two other researchers from that group – Tom Gunter and Mark Lee – also recently joined Meta. AFM is made up of several dozen engineers and researchers across Cupertino, California, and New York.
In response to the job offers from Meta and others, Apple has been marginally increasing the pay of its AFM staffers, whether or not they have threatened to leave, said the people, who asked not to be identified because the moves are private. Still, the pay levels pale in comparison with those of rivals.
Spokespeople for Apple and Meta declined to comment.
The departures have thrown Apple’s models team into flux. Pang played a central role in defining the department’s road map and research direction, and multiple people within AFM now say its future is unclear. Additional engineers are actively interviewing for jobs jobs elsewhere, according to the people. Another team member – Floris Weers – left for a start-up in recent weeks.
«
These are crazy offers in terms of money. It’s become exactly the same as sports teams, but without the audience participation. Or maybe the audience participation takes a different form.
Meanwhile Apple’s miss on generative AI, distracted by cars and augmented reality goggles, is still something it can recover from by hiring in something else (as it did for search and, initially, maps). But people misread it as a disaster.
unique link to this extract
ENIAC at 75: A computing pioneer • Data Center Dynamics
Dan Swinhoe:
»
A 100-word magnetic-core memory built by the Burroughs Corporation was added to ENIAC in 1953.
Capable of around 5,000 calculations a second, ENIAC was a thousand times faster than any other machine of the time and had modules to multiply, divide, and square root.
“This was a machine that straddled the point in history where we went from mechanical calculators and adding machines to electronic computers,” says Thompson.
While a massive step-change in terms of capability compared to any other computer in the world at the time, it also had various challenges in operation. With minimal cooling technology – two 20-horsepower blowers – ENIAC raised the room temperature to 50ºC when in operation and its 160kW energy consumption caused blackouts in the city of Philadelphia.
Reliability was also a constant challenge. Before speciality tubes became available in 1948, the machine used standard radio tubes, which burnt out on a near-daily basis. At first it took hours to work out which tube had actually blown, but the team eventually developed a system to reduce this down to around 15 minutes thanks to some ‘predictive maintenance’ and careful monitoring of equipment.
«
Just to show that concerns about power consumption by computers is absolutely not a new thing. (Thanks Seth F for the link.)
unique link to this extract
Of course we should stop kids from watching porn • The Critic Magazine
Jo Bartosch:
»
Some things shouldn’t need saying — like don’t let kids watch porn. You’d think this was a moral baseline broad enough to unite everyone from Germaine Greer to the Pope. But BBC articles have framed the new requirement for age verification on porn sites as a profound ethical dilemma. The state broadcaster strained to find nuance — and ended up platforming pornographers and privacy bores with predictable objections.
Like most legislation, the Online Safety Act is far from perfect. It’s clunky, overreaching, and the way platforms like X/Twitter have implemented its requirement for age verification has already led to unjustifiable censorship — including reports that footage of protests in the UK has been blocked. Meanwhile, some pornography sites are offering risible age checks that a monkey could bypass. But one thing is clear: this law will mean that kids are less likely to simply stumble across porn on social media. And that is unequivocally a Good Thing.
There are no upsides to children viewing scenes of (real or simulated) rape, incest or sexual torture — yet this is the bulk of mainstream porn. The average age of first exposure is just 13. And studies from the British Board of Film Classification and the Children’s Commissioner show that typically minors don’t seek porn out; it finds them. In fact, 41% first encountered porn on X/Twitter, more than on dedicated porn sites.
The real question isn’t why age checks have been introduced — it’s why they weren’t there in the first place.
The BBC itself inadvertently highlighted the issue in its reporting. When twentysomething Newsbeat presenter Jordan Kenny asked technology minister Peter Kyle, “How old were you when you first saw porn?” the 54-year-old wisely refused to answer. But the question itself was revealing. Not if, but when. Porn is now so normalised, it’s a given we’ve all seen it. But normal doesn’t mean harmless.
…There are legitimate concerns about how the Online Safety Act might be used to enforce censorship. And more widely, whether its moves to criminalise speech or abolish trial by jury, the government seems suspiciously eager to rob citizens of our rights. But pornography is not just another liberty issue — it’s a public health and child protection crisis. We’re heading towards a hellscape where boys grow up to be rapists and girls grow up to be targets. Faced with this dystopia, fretting over blocked protest clips or being asked for your date of birth is ludicrous.
«
The debate over the Online Safety Act is fascinating. The mild inconvenience for lots of adults (who prefer to just install a VPN) v the benefit for lots of children (who will just install a VPN).
unique link to this extract
VPN nation • The Critic Magazine
Christopher Snowdon:
»
Preventing children from seeing hardcore pornography is a noble aim, but parents can already protect them from adult content of all varieties by using features such as Family Link which have the added benefits of location sharing and screen time controls. The government insists that age verification is designed to stop online “predators”, with one minister even suggesting that those who criticise it are Jimmy Savile enablers but, as the Institute of Economic Affairs predicted from the outset, the threat of heavy fines has led internet platforms to extend the censorship far beyond porn.
People are right to be concerned about this slippery slope and yet it cannot be denied that it is pornography enthusiasts who have been hardest hit by the Online Safety Act in the short term. They must now verify themselves in one of three ways, each less appealing than the last. They can submit their credit card details, they can scan in proof of ID, such as a passport, or they can take a photo of their face and allow AI to judge how old they are. If they want to maximise their chances of being the victim of blackmail and identity theft, they could do all three.
While we might not think twice about submitting our credit card details to Amazon or posting our photos on Instagram, there is an understandable reluctance to hand over private data in order to access dubious websites for the purposes of sordid acts of self-pollution. The government assures us that the data will be kept confidential but it is only two weeks since we learned about a data breach that led to the names of 19,000 Afghans who wanted to flee the Taliban being given to the Taliban and it is less than two months since the names and addresses of 6.5 million Co-op customers were stolen in a cyber-attack. Rightly or wrongly, millions of British plank-spankers and rug-tuggers do not wish to identify themselves to anybody.
…Downloading random VPNs comes with risks of its own and opens up a whole new world of illicit online activity from free Premier League football to the Dark Web. But there is a deeper reason to feel uneasy about this unintended, albeit predictable, consequence of paternalistic regulation. By driving another wedge between the state and the individual, it further normalises rule-breaking in a country where casual lawlessness is becoming part of daily life. A law-abiding society cannot long endure if the median citizen thinks that the law is an ass.
«
Fascinating debate, part 2.
unique link to this extract
Meta unveils wristband for controlling computers with hand gestures • The New York Times
Cade Metz:
»
The prototype looks like a giant rectangular wristwatch. But it doesn’t tell the time; it lets you control a computer from across the room simply by moving your hand.
With a gentle turn of the wrist, you can push a cursor across your laptop screen. If you tap your thumb against your forefinger, you can open an app on your desktop computer. And when you write your name in the air, as if you were holding a pencil, the letters will appear on your smartphone.
Designed by researchers at Meta, the tech giant that owns Facebook, Instagram and WhatsApp, this experimental technology reads the electrical signals that pulse through your muscles when you move your fingers. These signals, generated by commands sent from your brain, can reveal what you are about to do even before you do it, as the company detailed in a research paper published on Wednesday in the journal Nature.
With a little practice, you can even move your laptop cursor simply by producing the right thought. “You don’t have to actually move,” Thomas Reardon, the Meta vice president of research who leads the project, said in an interview. “You just have to intend the move.”
Meta’s wristband is part of a sweeping effort to develop technologies that let wearers control their personal devices without touching them. The aim is to provide simpler, quicker and less awkward ways of interacting with everything from laptops to smartphones — and maybe even to develop new digital devices that replace what we all use today.
Most of these technologies are years away from widespread use. They typically involve tiny devices surgically implanted in the body, which is a complicated and risky endeavor. These implants are tested solely with disabled people who cannot move their arms and hands, and need new ways of using computers or smartphones.
«
Good grief, Meta, don’t you read this newsletter thing? “When you write your name in the air”. Give me strength. Why is that better than “when you say a trigger word aloud”? The answer is that it isn’t. Gestures keep being reinvented, and keep being rejected.
unique link to this extract
After $380m hack, Clorox sues its “service desk” vendor for simply giving out passwords • Ars Technica
Nate Anderson:
»
Hacking is hard. Well, sometimes.
Other times, you just call up a company’s IT service desk and pretend to be an employee who needs a password reset, an Okta multifactor authentication reset, and a Microsoft multifactor authentication reset… and it’s done. Without even verifying your identity.
So you use that information to log in to the target network and discover a more trusted user who works in IT security. You call the IT service desk back, acting like you are now this second person, and you request the same thing: a password reset, an Okta multifactor authentication reset, and a Microsoft multifactor authentication reset. Again, the desk provides it, no identity verification needed.
So you log in to the network with these new credentials and set about planting ransomware or exfiltrating data in the target network, eventually doing an estimated $380m in damage. Easy, right?
According to The Clorox Company, which makes everything from lip balm to cat litter to charcoal to bleach, this is exactly what happened to it in 2023. But Clorox says that the “debilitating” breach was not its fault. It had outsourced the “service desk” part of its IT security operations to the massive services company Cognizant—and Clorox says that Cognizant failed to follow even the most basic agreed-upon procedures for running the service desk.
In the words of a new Clorox lawsuit, Cognizant’s behavior was “all a devastating lie,” it “failed to show even scant care,” and it was “aware that its employees were not adequately trained.”
“Cognizant was not duped by any elaborate ploy or sophisticated hacking techniques,” says the lawsuit, using italics to indicate outrage emphasis. “The cybercriminal just called the Cognizant Service Desk, asked for credentials to access Clorox’s network, and Cognizant handed the credentials right over. Cognizant is on tape handing over the keys to Clorox’s corporate network to the cybercriminal—no authentication questions asked.”
«
That’s the joy of outsourcing! (Thanks Ian C for the link.)
unique link to this extract
| • Why do social networks drive us a little mad? • Why does angry content seem to dominate what we see? • How much of a role do algorithms play in affecting what we see and do online? • What can we do about it? • Did Facebook have any inkling of what was coming in Myanmar in 2016? Read Social Warming, my latest book, and find answers – and more. |
Errata, corrigenda and ai no corrida: none notified








