Linux fréttir

James Cameron Struggles With Real-World Horrors for 'Terminator 7' and New Hiroshima Movie

Slashdot - Sat, 2025-08-23 19:34
"James Cameron has a confession: he can't write Terminator 7..." according to the Guardian, "because reality keeps nicking his plotlines." "I'm at a point right now where I have a hard time writing science-fiction," Cameron told CNN this week. "I'm tasked with writing a new Terminator story [but] I don't know what to say that won't be overtaken by real events. We are living in a science-fiction age right now...." What Cameron should be looking for is a complete system reboot to reinvigorate the saga in the way Prey brought fans back to Predator and Alien: Romulus restored interest in slimy Xenomorphs. All evidence suggests that the 70-year-old film-maker is far more interested in the current challenges surrounding AI, superintelligences and humankind's constant efforts to destroy itself, which doesn't exactly lend itself to the sort of back-to-basics, relentless-monsters-hunt-a-few-unlucky-humans-for-two-hours approach that has worked elsewhere. The challenge here seems to be to fuse Terminator's core DNA — unstoppable cyborgs, explosive chase sequences, and Sarah Connor-level defiance — with the occasionally rather more prosaic yet equally scary existential anxieties of 21st-century AI doom-mongering. So we may get Terminator 7: Kill List, in which a single, battered freedom fighter is hunted across a decimated city by a T-800 running a predictive policing algorithm that knows her next move before she does. Or T7: Singularity's Mom, in which a lone Sarah Connor-type must protect a teenage coder whose chatbot will one day evolve into Skynet. Or Terminator 7: Terms and Conditions, in which humanity's downfall comes not from nuclear warfare but from everyone absent-mindedly agreeing to Skynet's new privacy policy, triggering an army of leather-clad enforcers to collect on the fine print. Or perhaps the future just looks terrifying enough without Cameron getting involved — which, rather worryingly for the future of the franchise, seems to be the director's essential point. "The only way out is through," Cameron said in the CNN interview, "by using our intelligence, by using our curiosity, by using our command of technology, but also, by really understanding the stark probabilities that we face." In the meantime, Cameron is working on a new film inspired by the book Ghosts of Hiroshima, a book written by Charles Pellegrino, one of the consultants on Titanic. "I know what a meticulous researcher he is," Cameron told CNN in a recent interview. (Transcript here.) CAMERON: He's talked about this book for ages and ages and sent me early versions of it. So, I've read it with interest, great interest a number of times now. What compels me out of all that and what I think the human hook for understanding this tragedy is, is to follow a handful, specifically two will be featured of survivors, that actually survived not only the Hiroshima blast, but then went to Nagasaki and three days later were hit again.... This film scares me. I fear making this film. I fear the images that I'm going to have to create, to be honest and to be truthful. CNN also spoke to former U.S. Energy secretary Ernest Moni, who is now a CEO at the nonprofit global security organization, the Nuclear Threat Initiative: MONI: There remains a false narrative that the possession of these nuclear weapons is actually making us safer when they're not. That's the narrative I think, ultimately, we need to change. Harry Truman said, quite correctly, these nuclear weapons, they are not military weapons. Dropped on a city, they indiscriminately kill combatants, non-combatants, women, children, etc. They should not be thought of as military weapons, but as weapons of mass destruction, indiscriminate mass destruction when certainly dropped in an urban center. Thanks to long-time Slashdot reader schwit1 for sharing the article.

Read more of this story at Slashdot.

Categories: Linux fréttir

Threads Has 400 Million Monthly Users. But Who Are They?

Slashdot - Sat, 2025-08-23 18:34
Threads now has more than 400 million monthly active users. But who are these people who are actually using Threads, asks Mashable? And what is their cultural footprint? Threads is the Big Bang Theory of social media. Bland, boring, largely unoffensive, and somehow, it was the most popular show on television for years... At any given time, "Twitter" and "X" are searched somewhere between 12 and 30 times more than "Threads" on Google, according to the search engine's Trends data. Threads is a popular platform without much of an identity... [Threads] is consistently good at one thing users really want from a social media platform: for their posts to be seen and engaged with. Threads might be boring in comparison to its competitors, but its users say it might be the only place on the internet right now where they don't feel they are screaming into the void.... Much like TikTok, you don't actually have to have thousands of followers to find decent engagement on the app. One user, commenting in a Reddit forum questioning who actually uses the app, said they "find it worthwhile" because "you can just say stuff on there under a tag and people will find it and respond...." According to consumer research company GWI, while users signed up for Threads because of its integration with Instagram, they're staying because Threads users are "community-focused," noting there's a strong overlap between Discord users and Threads users.... It just doesn't have the same flair as X or Twitter, which could be because Adam Mosseri, the head of Instagram, went out of his way to ensure politics was downplayed when Threads first launched. (Meta has since backtracked slightly by phasing "civic content" back into Threads "with a more personalized approach....") Threads is still in its adolescence. It lacks the media ecosystem that made Twitter indispensable for journalists, politicians, and celebrities. But it has something else: sheer scale and Meta's backing. With Instagram's 2 billion users as a feeder system, Meta can keep funneling people toward Threads whether they like it or not. The article also points out Threads is integrated with the fediverse, supporting ActivityPub's decentralized protocol...

Read more of this story at Slashdot.

Categories: Linux fréttir

FSF Announces Photo Contest Honoring 40 Years of Free Software

Slashdot - Sat, 2025-08-23 17:34
The Free Software Foundation announced a special photography contest honoring its 40th anniversary: The technology we use every day has changed dramatically since our founding nearly forty years ago, including the way we interact with it... We're incredibly grateful for the countless hours that developers and users have put into the free software programs that exist today. Without all the people who cared enough to make and use software that respects the four freedoms four decades or even a year ago, we wouldn't have much to celebrate. We want to honor the hard work that has gone into free software and its development with the FSF40 Photo Contest. Starting on August 14, 2025, we're inviting free software supporters worldwide to share how they use free software on a daily basis. While we can think of hundreds of ways that free software can be used, there's almost certainly many of you who have thought of much more creative ways to involve libre software every day! Shortly after the photo contest closes on August 31, 2025, we will invite you and other free software supporters to vote for your favorite of the #FSF40Photos... We will be displaying the winning photos at our fortieth [anniversary] celebration in Boston, MA on October 4, 2025 — we hope you get to see them on a big screen with us! Earlier this month the FSF also shared 40 links from around the FSF and GNU sites "that give a sense of what we've been doing all this time as we work for your freedom." (For example, 2007's announcement of the GNU General Public License, version 3.)

Read more of this story at Slashdot.

Categories: Linux fréttir

Arch Linux Faces 'Ongoing' DDoS Attack

Slashdot - Sat, 2025-08-23 16:34
"Some joyless ne'er-do-well has loosed a botnet on the community-driven Arch Linux distro," reports the Register, with a distributed denial of service (DDoS) attack that apparently started a week ago. Arch maintainer Cristian Heusel announced Thursday on the project's web site that the attack "primarily impacts our main webpage, the Arch User Repository (AUR), and the Forums." We are aware of the problems that this creates for our end users and will continue to actively work with our hosting provider to mitigate the attack. We are also evaluating DDoS protection providers while carefully considering factors including cost, security, and ethical standards... As a volunteer-driven project, we appreciate the community's patience as our DevOps team works to resolve these issues. A status update Friday acknowledged "we are suffering from partial outages." The Register reports: The attack comes as the project has been enjoying a boost in mainstream success. The distro was picked by Valve to underpin the SteamOS software running on its Steam Deck handheld gaming gadget, with the company providing the project with funding for further development. Late last year, a new version of the archinstall tool was released, with a view to making the system more friendly to newcomers... For now, the Arch team is working to mitigate the attack's impact, which highlights a bootstrapping issue. Tools designed to shift traffic to mirrors in the event the main infrastructure is unavailable rely on a mirror list obtained from that same main infrastructure, with Heusel advising that users should "default to the mirrors listed in the pacman-mirrorlist package" if tools like reflector fail. Installation media can be downloaded from a range of mirrors, too, but should be checked against the project's official signing key before being trusted.

Read more of this story at Slashdot.

Categories: Linux fréttir

Making Cash Off 'AI Slop': the Surreal Video Business Taking Over the Web

Slashdot - Sat, 2025-08-23 15:34
The Washington Post looks at the rise of low-effort, high-volume "AI slop" videos: The major social media platforms, scared of driving viewers away, have tried to crack down on slop accounts, using AI tools of their own to detect and flag videos they believe were synthetically made. YouTube last month said it would demonetize creators for "inauthentic" and "mass-produced" content. But the systems are imperfect, and the creators can easily spin up new accounts — or just push their AI tools to pump out videos similar to the banned ones, dodging attempts to snuff them out. One place where they're coming from... Jiaru Tang, a researcher at the Queensland University of Technology who recently interviewed creators in China, said AI video has become one of the hottest new income opportunities there for workers in the internet's underbelly, who previously made money writing fake news articles or running spam accounts. Many university students, stay-at-home moms and the recently unemployed now see AI video as a kind of gig work, like driving an Uber. The average small creator she interviewed did their day jobs and then, at night, "spent two to three hours making AI-slop money," she said. A few she spoke with made $2,000 to $3,000 a month at it. But the article provides other examples of the "wild cottage industry of AI-video makers, enticed by the possibility of infinite creation for minimal work" A 31-year-old loan officer in eastern Idaho first went viral in June "with an AI-generated video on TikTok in which a fake but lifelike old man talked about soiling himself. Within two weeks, he had used AI to pump out 91 more, mostly showing fake street interviews and jokes about fat people to an audience that has surged past 180,000 followers..." (He told the Post the videos earn him about $5,000 a month through TikTok's creator program.) "To stand out, some creators have built AI-generated influencers with lives a viewer can follow along. 'Why does everybody think I'm AI? ... I'm a human being, just like you guys,' says the AI woman in one since-removed TikTok video, which was watched more than 1 million times." One AI-generated video a dog biting a woman's face off (revealing a salad) received a quarter of a billion views.

Read more of this story at Slashdot.

Categories: Linux fréttir

Amid Service Disruption, Colt Confirms 'Criminal Group' Accessed Their Data, As Ransomware Gang Threatens to Sell It

Slashdot - Sat, 2025-08-23 14:34
British telecommunications service provider Colt Telecom "has offices in over 30 countries across North America, Europe, and Asia, reports CPO magazine. "It manages nearly 1,000 data centers and roughly 75,000 km of fiber infrastructure." But now "a cyber attack has caused widespread multi-day service disruption..." On August 14, 2025, the telecom giant said it had detected a cyber attack that began two days earlier, on August 12. Upon learning of the cyber intrusion, the telecommunications service provider responded by proactively taking some systems offline to contain the cyber attack. Although Colt Telecom's cyber incident response team was working around the clock to mitigate the impacts of the cyber attack, service disruption has persisted for days. However, the service disruption did not affect the company's core network infrastructure, suggesting that Colt customers could still access its network services... The company also did not provide a clear timeline for resolving the service disruption. A week after the apparent ransomware attack, Colt Online and the Voice API platform remained unavailable. And now Colt Technology Services "confirms that customer documentation was stolen," reports the tech news site BleepingComputer: "A criminal group has accessed certain files from our systems that may contain information related to our customers and posted the document titles on the dark web," reads an updated security incident advisory on Colt's site. "We understand that this is concerning for you." "Customers are able to request a list of filenames posted on the dark web from the dedicated call centre." As first spotted by cybersecurity expert Kevin Beaumont, Colt added the no-index HTML meta tag to the web page, making it so it won't be indexed by search engines. This statement comes after the Warlock Group began selling on the Ramp cybercrime forum what they claim is 1 million documents stolen from Colt. The documents are being sold for $200,000 and allegedly contain financial information, network architecture data, and customer information... The Warlock Group (aka Storm-2603) is a ransomware gang attributed to Chinese threat actors who utilize the leaked LockBit Windows and Babuk VMware ESXi encryptors in attacks... Last month, Microsoft reported that the threat actors were exploiting a SharePoint vulnerability to breach corporate networks and deploy ransomware. "Colt is not the only telecom firm that has been named by WarLock on its leak website in recent days," SecurityWeek points out. "The cybercriminals claim to have also stolen data from France-based Orange." Thanks to long-time Slashdot reader Z00L00K for sharing the news.

Read more of this story at Slashdot.

Categories: Linux fréttir

Amid Service Disruption, Colt Telecom Confirms 'Criminal Group' Accessed Their Data, As Ransomware Gang Threatens to Sell It

Slashdot - Sat, 2025-08-23 14:34
British telecommunications service provider Colt Telecom "has offices in over 30 countries across North America, Europe, and Asia, reports CPO magazine. "It manages nearly 1,000 data centers and roughly 75,000 km of fiber infrastructure." But now "a cyber attack has caused widespread multi-day service disruption..." On August 14, 2025, the telecom giant said it had detected a cyber attack that began two days earlier, on August 12. Upon learning of the cyber intrusion, the telecommunications service provider responded by proactively taking some systems offline to contain the cyber attack. Although Colt Telecom's cyber incident response team was working around the clock to mitigate the impacts of the cyber attack, service disruption has persisted for days. However, the service disruption did not affect the company's core network infrastructure, suggesting that Colt customers could still access its network services... The company also did not provide a clear timeline for resolving the service disruption. A week after the apparent ransomware attack, Colt Online and the Voice API platform remained unavailable. And now Colt Technology Services "confirms that customer documentation was stolen," reports the tech news site BleepingComputer: "A criminal group has accessed certain files from our systems that may contain information related to our customers and posted the document titles on the dark web," reads an updated security incident advisory on Colt's site. "We understand that this is concerning for you." "Customers are able to request a list of filenames posted on the dark web from the dedicated call centre." As first spotted by cybersecurity expert Kevin Beaumont, Colt added the no-index HTML meta tag to the web page, making it so it won't be indexed by search engines. This statement comes after the Warlock Group began selling on the Ramp cybercrime forum what they claim is 1 million documents stolen from Colt. The documents are being sold for $200,000 and allegedly contain financial information, network architecture data, and customer information... The Warlock Group (aka Storm-2603) is a ransomware gang attributed to Chinese threat actors who utilize the leaked LockBit Windows and Babuk VMware ESXi encryptors in attacks... Last month, Microsoft reported that the threat actors were exploiting a SharePoint vulnerability to breach corporate networks and deploy ransomware. "Colt is not the only telecom firm that has been named by WarLock on its leak website in recent days," SecurityWeek points out. "The cybercriminals claim to have also stolen data from France-based Orange." Thanks to long-time Slashdot reader Z00L00K for sharing the news.

Read more of this story at Slashdot.

Categories: Linux fréttir

Search-capable AI agents may cheat on benchmark tests

TheRegister - Sat, 2025-08-23 14:32
Data contamination can make models seem more capable than they really are

Researchers with Scale AI have found that search-based AI models may cheat on benchmark tests by fetching the answers directly from online sources rather than deriving those answers through a "reasoning" process.…

Categories: Linux fréttir

Pages

Subscribe to www.netserv.is aggregator - Linux fréttir