Shared posts

24 Oct 23:31

New Version of Windows 95 JavaScript App Runs On Basically Any Platform

by BeauHD
An anonymous reader quotes a report from BetaNews: Slack developer Felix Rieseberg released Windows 95 as an Electron app four years ago, updating it shortly afterwards to allow it to run gaming classics like Doom. Now he rolls out a new version which can run on any Windows, Mac or Linux system. Based on the Electron framework, Rieseberg's Windows 95 is written entirely in JavaScript, so it doesn't run as smoothly as it would if it was a native app, but you shouldn't let that put you off. This is the second update of the year, which brings it up to version 3.1.1 and includes two important changes: - Upgraded from Electron v18 to Electron v21 (and with it, Chrome and Node.js) - Upgraded v86 (sound is back!) The earlier update (in June) brought the software up to 3.0.0 and introduced the following changes: - Upgraded from Electron v11 Electron v18 (and with it, Chrome and Node.js) - Upgraded v86 (now using WASM) - Upgraded various smaller dependencies - Much better scaling on all platforms - On Windows, the link to OSFMount was broken and is now fixed. - On Windows, you can now see a prettier installation animation. - On Windows, windows95 will have a proper icon in the Programs & Features menu. You can download the latest version of the Windows 95 app for Windows, macOS, and Linux at their respective links.

Read more of this story at Slashdot.

15 Jun 14:31

MIT Researchers Uncover 'Unpatchable' Flaw in Apple M1 Chips

by msmash
Apple's M1 chips have an "unpatchable" hardware vulnerability that could allow attackers to break through its last line of security defenses, MIT researchers have discovered. TechCrunch reports: The vulnerability lies in a hardware-level security mechanism utilized in Apple M1 chips called pointer authentication codes, or PAC. This feature makes it much harder for an attacker to inject malicious code into a device's memory and provides a level of defense against buffer overflow exploits, a type of attack that forces memory to spill out to other locations on the chip. Researchers from MIT's Computer Science and Artificial Intelligence Laboratory, however, have created a novel hardware attack, which combines memory corruption and speculative execution attacks to sidestep the security feature. The attack shows that pointer authentication can be defeated without leaving a trace, and as it utilizes a hardware mechanism, no software patch can fix it. The attack, appropriately called "Pacman," works by "guessing" a pointer authentication code (PAC), a cryptographic signature that confirms that an app hasn't been maliciously altered. This is done using speculative execution -- a technique used by modern computer processors to speed up performance by speculatively guessing various lines of computation -- to leak PAC verification results, while a hardware side-channel reveals whether or not the guess was correct. What's more, since there are only so many possible values for the PAC, the researchers found that it's possible to try them all to find the right one.

Read more of this story at Slashdot.

22 Feb 06:49

Attempt To Put Every Musical Melody Into The Public Domain Demonstrates Craziness Of Modern Copyright

by Timothy Geigner

The fact is that many of the copyright lawsuits we see coming out of the music industry mostly revolve around copyright claims on musical melodies. In many of these cases, artists find themselves on the losing end of judges and juries all while claiming that there was no intention to infringe, with the supposedly offending material instead being developed as essentially an independent creation that happened to be similar to previous works. The Blurred Lines case went that way, as has the Dark Horse case. The problem with this is that music is somewhat akin to mathematics, in that within a given octave or set of octaves, there are a finite number of musical combinations between notes that can be made. Sure, that number of combinations is large -- tens of billions, actually -- but the finite number of resources exists nonetheless.

Given that fact, affording copyright protection to melodies like this is absurd. The entire point of copyright law is to promote the creation of new and original works. If copyright law itself is to be applied such that on a long enough timeline no further works can be created, assuming artists can create music fast enough for all musical combinations to be copyrighted, that is the literal antithesis of the point of the law.

Damien Riehl has thought likewise. Riehl is a unique combination of musician, programmer and lawyer. And he thinks these copyright lawsuits in the music industry are stupid. So, he is attempting to do something rather unique about them.

One of the reasons why it’s so tough to defend a copyright lawsuit is because the court now considers a melody just a sequence of pitches, so Damien Riehl and Noah Rubin developed a program that recorded every possible melody (all 68.7 billion of them) via MIDI to a hard drive, but not for the reasons that you might think.

His idea was to commit this vast library of melodies to a hard drive (along with programmer friend and musician Noah Rubin), which automatically bestows copyright on all of them when as soon as they’ve on a medium.

If ever there were a story of how antiquated copyright law is made to look silly in the face of new and emerging technologies, this certainly must be it. To be able to mathematically output all potential melodies to a medium and thereby technically gain copyrights over those that weren't already copyrighted elsewhere, is actually quite funny. But if you were worried that the goal was to lock up all of these melodies and make zillions by licensing them out, that's not what Riehl is after.

This might initially seem sinister but the two then put the melodies into the public domain. In fact, anyone can download the works and the program the two used in order to take the process further at allthemusic.info.

Is this an end to copyright lawsuits over musical melodies? No, almost certainly not. What will eventually likely happen will be for plaintiffs to argue in court, when presented with this as a defense, that Riehl's creation wasn't "creative" or "artistic" or some other such qualifier. Now, that won't really fit in with the law and will require courts to interpret copyright law to allow cases to move forward. But that's probably what will happen if Riehl's work is raised as a defense. Courts will try to interpret their way out of what is actually a fairly straightforward disqualifier for all melody copyright suits for at least Riehl's life plus seventy years.

But, that this probably won't achieve what Riehl wants doesn't change the fact that this very much shows how antiquated modern copyright law has become.



Permalink | Comments | Email This Story
13 Jan 18:09

Virginia “Broadband Deployment Act” would kill municipal broadband deployment

by Jon Brodkin

Enlarge / Virginia State Capitol in Richmond. (credit: Getty Images | Joe Daniel Price)

Virginia lawmakers are considering a bill called the "Virginia Broadband Deployment Act," but instead of resulting in more broadband deployment, the legislation would make it more difficult for municipalities to offer Internet service.

The Virginia House of Delegates legislation proposed this week by Republican lawmaker Kathy Byron (full text) would prohibit municipal broadband deployments except in very limited circumstances. Among other things, a locality wouldn't be allowed to offer Internet service if an existing network already provides 10Mbps download and 1Mbps upload speeds to 90 percent of potential customers. That speed threshold is low enough that it can be met by old DSL lines in areas that haven't received more modern cable and fiber networks.

Even if that condition is met, a city or town would have to jump through a few hoops before offering service. The municipality would have to pay for a "comprehensive broadband assessment," and then issue a request for proposals giving for-profit ISPs six months to submit a plan for broadband deployment. After receiving proposals from private ISPs, the local government would have to determine whether providing grants or subsidies to a private ISP would be more cost-effective than building a municipal broadband network.

Read 10 remaining paragraphs | Comments