AI

Microsoft's AI CEO: Web Content (Without a Robots.txt File) is 'Freeware' for AI Training (windowscentral.com) 136

Slashdot reader joshuark shared this report from Windows Central Microsoft may have opened a can of worms with recent comments made by the tech giant's CEO of AI Mustafa Suleyman. The CEO spoke with CNBC's Andrew Ross Sorkin at the Aspen Ideas Festival earlier this week. In his remarks, Suleyman claimed that all content shared on the web is available to be used for AI training unless a content producer says otherwise specifically.
The whole discussion was interesting — but this particular question was very direct. CNBC's interviewer specifically said, "There are a number of authors here... and a number of journalists as well. And it appears that a lot of the information that has been trained on over the years has come from the web — and some of it's the open web, and some of it's not, and we've heard stories about how OpenAI was turning YouTube videos into transcripts and then training on the transcripts."

The question becomes "Who is supposed to own the IP, who is supposed to get value from the IP, and whether, to put it in very blunt terms, whether the AI companies have effectively stolen the world's IP." Suleyman begins his answer — at the 14:40 mark — with "Yeah, I think — look, it's a very fair argument." SULEYMAN: "I think that with respect to content that is already on the open web, the social contract of that content since the 90s has been that it is fair use. Anyone can copy it, recreate with it, reproduce with it. That has been freeware, if you like. That's been the understanding.

"There's a separate category where a website or a publisher or a news organization had explicitly said, 'Do not scrape or crawl me for any other reason than indexing me so that other people can find that content.' That's a gray area and I think that's going to work its way through the courts."


Q: And what does that mean, when you say 'It's a gray area'?

SULEYMAN: "Well, if — so far, some people have taken that information... but that's going to get litigated, and I think that's rightly so...

"You know, look, the economics of information are about to radically change, because we're going to reduce the cost of production of knowledge to zero marginal cost. And this is just a very difficult thing for people to intuit — but in 15 or 20 years time, we will be producing new scientific cultural knowledge at almost zero marginal cost. It will be widely open sourced and available to everybody. And I think that is going to be, you know, a true inflection point in the history of our species. Because what are we, collectively, as an organism of humans, other than an intellectual production engine. We produce knowledge. Our science makes us better. And so what we really want in the world, in my opinion, are new engines that can turbocharge discovery and invention."

Youtube

YouTube's Updated Eraser Tool Removes Copyrighted Music Without Impacting Other Audio (techcrunch.com) 16

YouTube has released an AI-powered eraser tool to help creators easily remove copyrighted music from their videos without affecting other audio such as dialog or sound effects. TechCrunch's Ivan Mehta reports: On its support page, YouTube still warns that, at times, the algorithm might fail to remove just the song. "This edit might not work if the song is hard to remove. If this tool doesn't successfully remove the claim on a video, you can try other editing options, such as muting all sound in the claimed segments or trimming out the claimed segments," the company said.

Alternatively, creators can choose to select "Mute all sound in the claimed segments" to silence bits of video that possibly has copyrighted material. Once the creator successfully edits the video, YouTube removes the content ID claim -- the company's system for identifying the use of copyrighted content in different clips.
YouTube shared a video describing the feature on its Creator Insider channel.
Piracy

Sony Music Goes After Piracy Portal 'Hikari-no-Akari' (torrentfreak.com) 15

An anonymous reader quotes a report from TorrentFreak: Hikari-no-Akari, a long-established and popular pirate site that specializes in Japanese music, is being targeted in U.S. federal court by Sony Music. [...] The music download portal, which links to externally hosted files, has been operating for well over a decade and currently draws more than a million monthly visits. In addition to the public-facing part of the site, HnA also has a private forum and Discord channel. [...] Apparently, Sony Music Japan has been keeping an eye on the unauthorized music portal. The company has many of its works shared on the site, including anime theme music, which is popular around the globe.

For example, a few weeks ago, HnA posted "Sayonara, Mata Itsuka!" from the Japanese artist Kenshi Yonezu, which is used as the theme song for the asadora series "The Tiger and Her Wings." Around the same time, PEACEKEEPER, a song by Japanese musician STEREO DIVE FOUNDATION, featured in the third season of the series "That Time I Got Reincarnated as a Slime", was shared on the site. Sony Music Japan is a rightsholder for both these tracks, as well as many others that were posted on the site. The music company presumably tried to contact HnA directly to have these listings removed and reached out to its CDN service Cloudflare too, asking it to take action. [...] They are a prerequisite for obtaining a DMCA subpoena, which Sony Music Japan requested at a California federal court this week.

Sony requested two DMCA subpoenas, both targeted at hikarinoakari.com and hnadownloads.co. The latter domain receives the bulk of its traffic from the first, which isn't a surprise considering the 'hnadownloads' name. Through the subpoena, the music company hopes to obtain additional information on the people behind these sites. That includes, names, IP-addresses, and payment info. Presumably, this will be used for follow-up enforcement actions. It's unclear whether Cloudflare will be able to hand over any usable information and for the moment, HnA remains online. Several of the infringing URLs that were identified by Sony have recently been taken down, including this one. However, others remain readily available. The same applies to private forum threads and Discord postings, of course.

Power

British Startup Nyobolt Demos 4-Minute Battery Charging For EVs (cnn.com) 174

Longtime Slashdot reader fahrbot-bot shares a report from CNN, written by Olesya Dmitracova: Nyobolt, based in Cambridge, has developed a new 35kWh lithium-ion battery that was charged from 10% to 80% in just over four and a half minutes in its first live demonstration last week. [...] Nyobolt's technology builds on a decade of research led by University of Cambridge battery scientist Clare Grey and Cambridge-educated Shivareddy, the company said. Key to its batteries' ability to be charged super-fast without a big impact on their longevity is a design that means they generate less heat. It also makes them safer as overheating can cause a lithium-ion battery to catch fire and explode. In addition, the materials used to make the batteries' anodes allow for a faster transfer of electrons. Nyobolt is currently in talks to sell its batteries to eight electric car manufacturers. At 35 kWh, the battery is much smaller than the 85 kWh in a more typical American electric vehicle (EV). Yet the technology may be used in larger battery packs in the future.

Independent testing of Nyobolt's batteries by what it called a leading global manufacturer found that they can achieve over 4,000 fast-charge cycles, equivalent to 600,000 miles (965,600 kilometers), while retaining more than 80% of capacity, Nyobolt said in its Friday statement. William Kephart, an e-mobility specialist at consultancy P3 Group and a former engineer, said EV batteries of the kind Nyobolt has developed could "theoretically" be charged as fast as the firm is promising, but the challenge was manufacturing such batteries on an industrial scale. A crucial chemical element in Nyobolt's batteries is niobium but, as Kephart pointed out, last year only an estimated 83,000 tons (94,500 tons) was mined worldwide. Compare that with graphite, commonly used as anode material in lithium-ion batteries: an estimated 1.6 million tons (1.8 million tons) was produced in 2023. In addition, there are currently "a lot of unknowns" with the niobium battery technology, he told CNN. "The industry will work it out (but) it's not seen by the industry as a scalable technology just yet," he added.

AI

AI Trains On Kids' Photos Even When Parents Use Strict Privacy Settings 33

An anonymous reader quotes a report from Ars Technica: Human Rights Watch (HRW) continues to reveal how photos of real children casually posted online years ago are being used to train AI models powering image generators -- even when platforms prohibit scraping and families use strict privacy settings. Last month, HRW researcher Hye Jung Han found 170 photos of Brazilian kids that were linked in LAION-5B, a popular AI dataset built from Common Crawl snapshots of the public web. Now, she has released a second report, flagging 190 photos of children from all of Australia's states and territories, including indigenous children who may be particularly vulnerable to harms. These photos are linked in the dataset "without the knowledge or consent of the children or their families." They span the entirety of childhood, making it possible for AI image generators to generate realistic deepfakes of real Australian children, Han's report said. Perhaps even more concerning, the URLs in the dataset sometimes reveal identifying information about children, including their names and locations where photos were shot, making it easy to track down children whose images might not otherwise be discoverable online. That puts children in danger of privacy and safety risks, Han said, and some parents thinking they've protected their kids' privacy online may not realize that these risks exist.

From a single link to one photo that showed "two boys, ages 3 and 4, grinning from ear to ear as they hold paintbrushes in front of a colorful mural," Han could trace "both children's full names and ages, and the name of the preschool they attend in Perth, in Western Australia." And perhaps most disturbingly, "information about these children does not appear to exist anywhere else on the Internet" -- suggesting that families were particularly cautious in shielding these boys' identities online. Stricter privacy settings were used in another image that Han found linked in the dataset. The photo showed "a close-up of two boys making funny faces, captured from a video posted on YouTube of teenagers celebrating" during the week after their final exams, Han reported. Whoever posted that YouTube video adjusted privacy settings so that it would be "unlisted" and would not appear in searches. Only someone with a link to the video was supposed to have access, but that didn't stop Common Crawl from archiving the image, nor did YouTube policies prohibiting AI scraping or harvesting of identifying information.

Reached for comment, YouTube's spokesperson, Jack Malon, told Ars that YouTube has "been clear that the unauthorized scraping of YouTube content is a violation of our Terms of Service, and we continue to take action against this type of abuse." But Han worries that even if YouTube did join efforts to remove images of children from the dataset, the damage has been done, since AI tools have already trained on them. That's why -- even more than parents need tech companies to up their game blocking AI training -- kids need regulators to intervene and stop training before it happens, Han's report said. Han's report comes a month before Australia is expected to release a reformed draft of the country's Privacy Act. Those reforms include a draft of Australia's first child data protection law, known as the Children's Online Privacy Code, but Han told Ars that even people involved in long-running discussions about reforms aren't "actually sure how much the government is going to announce in August." "Children in Australia are waiting with bated breath to see if the government will adopt protections for them," Han said, emphasizing in her report that "children should not have to live in fear that their photos might be stolen and weaponized against them."
Open Source

FreeDOS Founder Jim Hall: After 30 Years, What I've Learned About Open Source Community (opensource.net) 39

In 1994, college student Jim Hall created FreeDOS (in response to Microsoft's plan to gradually phase out MS-DOS). After celebrating its 30th anniversary last week, Hill wrote a new article Saturday for OpenSource.net: "What I've learned about Open Source community over 30 years."

Lessons include "every Open Source project needs a website," but also "consider other ways to raise awareness about your Open Source software project." ("In the FreeDOS Project, we've found that posting videos to our YouTube channel is an excellent way to help people learn about FreeDOS... The more information you can share about your Open Source project, the more people will find it familiar and want to try it out.")

But the larger lesson is that "Open Source projects must be grounded in community." Without open doors for new ideas and ongoing development, even the most well-intentioned project becomes a stagnant echo chamber...

Maintain open lines of communication... This can take many forms, including an email list, discussion board, or some other discussion forum. Other forums where people can ask more general "Help me" questions are okay but try to keep all discussions about project development on your official discussion channel.

The last of its seven points stresses that "An Open Source project isn't really Open Source without source code that everyone can download, study, use, modify and share" (urging careful selection for your project's licensing). But the first point emphasizes that "It's more than just code," and Hall ends his article by attributing FreeDOS's three-decade run to "the great developers and users in our community." In celebrating FreeDOS, we are celebrating everyone who has created programs, fixed bugs, added features, translated messages, written documentation, shared articles, or contributed in some other way to the FreeDOS Project... Here's looking forward to more years to come!
Jim Hall is also Slashdot reader #2,985, and back in 2000 he answered questions from Slashdot's readers — just six years after starting the project. "Jim isn't rich or famous," wrote RobLimo, "just an old-fashioned open source contributor who helped start a humble but useful project back in 1994 and still works on it as much as he can."

As the years piled up, Slashdot ran posts celebrating FreeDOS's 10th, 15th, and 20th anniversary.

And then for FreeDOS's 25th, Hall returned to Slashdot to answer more questions from Slashdot readers...
Youtube

The Majority of Gen Z Describe Themselves as Video Content Creators (washingtonpost.com) 31

For the first two decades of the social internet, lurkers ruled. Among Gen Z, they're in the minority, according to survey data from YouTube. From a report: Tech industry insiders used to cite a rule of thumb stating that only one in ten of an online community's users generally post new content, with the masses logging on only to consume images, video or other updates. Now younger generations are flipping that divide, a survey by the video platform said. YouTube found that 65 percent of Gen Z, which it defined as people between the ages of 14 and 24, describe themselves as video content creators -- making lurkers a minority.

The finding came from responses from 350 members of Gen Z in the U.S., out of a wider survey that asked thousands of people about how they spend time online, including whether they consider themselves video creators. YouTube did the survey in partnership with research firm SmithGeiger, as part of its annual report on trends on the platform. YouTube's report says that after watching videos online, many members of Gen Z respond with videos of their own, uploading their own commentary, reaction videos, deep dives into content posted by others and more. This kind of interaction often develops in response to videos on pop culture topics such as "RuPaul's Drag Race" or the Fallout video game series. Fan-created content can win more watch time than the original source material, the report says.

AI

AI-Generated Al Michaels To Deliver Paris Olympics Highlights (nytimes.com) 21

Al Michaels, the 79-year-old American broadcaster, who first covered the Olympics decades ago, is returning to broadcasting via an AI clone. NBCUniversal and Peacock will use AI-generated narration by Al Michaels for daily customized highlight reels of the Summer Olympics. Officials say they anticipate seven million different variations of the customized highlights throughout the games. The New York Times reports: Al Michaels, the 79-year-old American broadcaster, who first covered the Olympics decades ago, is coming back to primetime. It does raise a key question, one that recalls Mr. Michaels's most famous Olympic call: Do NBCUniversal executives believe in miracles? NBC has been exclusively broadcasting the Olympics in the United States since 1996, and the network frequently finds itself subject to intense public scrutiny for its coverage of the Games. [...]

Subscribers who want the daily Peacock highlight reel will be able choose the Olympic events that interest them most, and the types of highlights they want to see, such as viral clips, gold medalists or elimination events. From there, Peacock's A.I. machines will get to work each evening cranking out the most notable moments and putting them together in a tidy customized package. Mr. Michaels's recreated voice will be piped over the reels. (Humans will make quality control checks on the A.I. highlight reels.)

Youtube

YouTube in Talks With Record Labels Over AI Music Deal (ft.com) 44

YouTube is negotiating with major record labels to license songs for AI tools that clone popular artists' music, according to Financial Times. The Google-owned platform is offering upfront payments to Sony, Warner, and Universal to secure rights for training AI software, aiming to launch new features this year. But there are roadblocks to the deal, the story adds: However, many artists remain fiercely opposed to AI music generation, fearing it could undermine the value of their work. Any move by a label to force their stars into such a scheme would be hugely controversial. [...]

YouTube last year began testing a generative AI tool that lets people create short music clips by entering a text prompt. The product, initially named "Dream Track," was designed to imitate the sound and lyrics of well-known singers. But only 10 artists agreed to participate in the test phase, including Charli XCX, Troye Sivan and John Legend, and Dream Track was made available to a just small group of creators.

Piracy

South Korean ISP 'Infected' 600,000 Torrenting Subscribers With Malware (torrentfreak.com) 21

An anonymous reader quotes a report from TorrentFreak: Last week, an in-depth investigative report from JBTC revealed that Korean Internet provider KT, formerly known as Korea Telecom, distributed malware onto subscribers' computers to interfere with and block torrent traffic. File-sharing continues to be very popular in South Korea, but operates differently than in most other countries. "Webhard" services, short for Web Hard Drive, are particularly popular. These are paid BitTorrent-assisted services, which also offer dedicated web seeds, to ensure that files remain available.

Webhard services rely on the BitTorrent-enabled 'Grid System', which became so popular in Korea that ISPs started to notice it. Since these torrent transfers use a lot of bandwidth, which is very costly in the country, providers would rather not have this file-sharing activity on their networks. KT, one of South Korea's largest ISPs with over 16 million subscribers, was previously caught meddling with the Grid System. In 2020, their throttling activities resulted in a court case, where the ISP cited 'network management' costs as the prime reason to interfere. The Court eventually sided with KT, ending the case in its favor, but that wasn't the end of the matter. An investigation launched by the police at the time remains ongoing. New reports now show that the raid on KT's datacenter found that dozens of devices were used in the 'throttling process' and they were doing more than just limiting bandwidth.

When Webhard users started reporting problems four years ago, they didn't simply complain about slow downloads. In fact, the main concern was that several Grid-based Webhard services went offline or reported seemingly unexplainable errors. Since all complaining users were KT subscribers, fingers were pointed in that direction. According to an investigation by Korean news outlet JBTC, the Internet provider actively installed malware on computers of Webhard services. This activity was widespread and effected an estimated 600,000 KT subscribers. The Gyeonggi Southern Police Agency, which carried out the raid and investigation, believes this was an organized hacking attempt. A dedicated KT team allegedly planted malware to eavesdrop on subscribers and interfere with their private file transfers. [...] Why KT allegedly distributed the malware and what it precisely intended to do is unclear. The police believe there were internal KT discussions about network-related costs, suggesting that financial reasons played a role.

ISS

Starliner To Remain Docked To ISS With No New Departure Date (theregister.com) 97

While NASA engineers review propulsion system data, Boeing's Starliner will remain docked at the ISS longer than planned, with a new departure date yet to be specified due to upcoming spacewalks and ongoing engineering reviews. "After repeated delays, the spacecraft was set to leave the outpost on June 25 and land at White Sands, New Mexico," notes The Register. NASA has stated that the crew is not in a hurry to leave, with sufficient supplies available, and the delay will allow more time to address helium leaks and thruster issues observed during docking. From the report: The Starliner will need to depart the ISS before August without some additional engineering analysis. During the post-docking news conference, Steve Stich, NASA's Commercial Crew Program manager, gave a figure of 45 days for the docked duration, meaning a docking would have to occur during the latter half of July at the very latest. The delay will remove any potential conflict with the upcoming spacewalks and give engineers more time to review data from the Starliner's propulsion system. The vehicle has been bedeviled by helium leaks and thruster problems. Once the Starliner commences its return to Earth, the service module where the problematic hardware is located will be discarded, depriving engineers of an avenue of investigation.

Stich said, "We are taking our time and following our standard mission management team process. We are letting the data drive our decision-making relative to managing the small helium system leaks and thruster performance we observed during rendezvous and docking. Additionally, given the duration of the mission, it is appropriate for us to complete an agency-level review, similar to what was done ahead of NASA's SpaceX Demo-2 return after two months on orbit, to document the agency's formal acceptance on proceeding as planned." The Starliner has been cleared for use as a return vehicle in the event of an emergency.

In the highly unlikely event that NASA opts not to use the Starliner as a crew return vehicle, the agency has a few options open to it. One could be to remove two crew members from the next Crew Dragon launch -- currently set for the latter half of August -- or use an upcoming Soyuz, although the latter requires custom seat liners for the crew. During the June 18 teleconference Stich confirmed that the team had already cleared the vehicle for a contingency or emergency return, and added "I think we will work through each of these issues and we will get to a point where we can bring Butch and Suni back in Starliner."

Electronic Frontier Foundation

EFF: New License Plate Reader Vulnerabilties Prove The Tech Itself is a Public Safety Threat (eff.org) 97

Automated license plate readers "pose risks to public safety," argues the EFF, "that may outweigh the crimes they are attempting to address in the first place." When law enforcement uses automated license plate readers (ALPRs) to document the comings and goings of every driver on the road, regardless of a nexus to a crime, it results in gargantuan databases of sensitive information, and few agencies are equipped, staffed, or trained to harden their systems against quickly evolving cybersecurity threats. The Cybersecurity and Infrastructure Security Agency (CISA), a component of the U.S. Department of Homeland Security, released an advisory last week that should be a wake up call to the thousands of local government agencies around the country that use ALPRs to surveil the travel patterns of their residents by scanning their license plates and "fingerprinting" their vehicles. The bulletin outlines seven vulnerabilities in Motorola Solutions' Vigilant ALPRs, including missing encryption and insufficiently protected credentials...

Unlike location data a person shares with, say, GPS-based navigation app Waze, ALPRs collect and store this information without consent and there is very little a person can do to have this information purged from these systems... Because drivers don't have control over ALPR data, the onus for protecting the data lies with the police and sheriffs who operate the surveillance and the vendors that provide the technology. It's a general tenet of cybersecurity that you should not collect and retain more personal data than you are capable of protecting. Perhaps ironically, a Motorola Solutions cybersecurity specialist wrote an article in Police Chief magazine this month that public safety agencies "are often challenged when it comes to recruiting and retaining experienced cybersecurity personnel," even though "the potential for harm from external factors is substantial." That partially explains why, more than 125 law enforcement agencies reported a data breach or cyberattacks between 2012 and 2020, according to research by former EFF intern Madison Vialpando. The Motorola Solutions article claims that ransomware attacks "targeting U.S. public safety organizations increased by 142 percent" in 2023.

Yet, the temptation to "collect it all" continues to overshadow the responsibility to "protect it all." What makes the latest CISA disclosure even more outrageous is it is at least the third time in the last decade that major security vulnerabilities have been found in ALPRs... If there's one positive thing we can say about the latest Vigilant vulnerability disclosures, it's that for once a government agency identified and reported the vulnerabilities before they could do damage... The Michigan Cyber Command center found a total of seven vulnerabilities in Vigilant devices; two of which were medium severity and 5 of which were high severity vulnerabilities...

But a data breach isn't the only way that ALPR data can be leaked or abused. In 2022, an officer in the Kechi (Kansas) Police Department accessed ALPR data shared with his department by the Wichita Police Department to stalk his wife.

The article concludes that public safety agencies should "collect only the data they need for actual criminal investigations.

"They must never store more data than they adequately protect within their limited resources-or they must keep the public safe from data breaches by not collecting the data at all."
IOS

iOS 18 Brings AirPods Setup Experience To Third-Party Accessories (9to5mac.com) 12

Filipe Esposito reports via 9to5Mac: When Apple introduced AirPods in 2016, the company also unveiled a new, easy and intuitive way to pair wireless accessories to iPhone and iPad. Rather than having to go to Bluetooth settings and press buttons, the system identifies the accessory nearby and prompts the user to pair it. With iOS 18, this quick pairing process will be available for the first time to accessory makers.

Called AccessorySetupKit, the new API gives third-party accessories the same setup experience as Apple accessories such as AirPods and AirTag. As soon as the iPhone or iPad running iOS 18 with the right app detects a compatible accessory, it will show the user a popup to confirm pairing with that device. With just a tap, the system will automatically handle all the Bluetooth or Wi-Fi connectivity required by the accessory. This also means that users will no longer have to manually give Bluetooth and Wi-Fi permissions individually to that accessory's app.

If the accessory requires a more complex pairing process, such as confirming a PIN code, the iOS 18 API can also ask the user for this information without the need to open an app. Once the accessory has been paired, more information about it can be found in a new Accessories menu within the Privacy settings.

Youtube

YouTube Is Cracking Down on Cheap Premium Plans Bought With a VPN (pcmag.com) 118

An anonymous reader shares a report: YouTube Premium subscribers who use VPNs are reporting that their plans are being automatically canceled by the Google-owned company, according to multiple subscribers who have posted screenshots and descriptions of the issue on Reddit.

A Google support representative confirmed to PCMag that YouTube has started a crackdown. "YouTube has initiated the cancellation of premium memberships for accounts identified as having falsified signup country information," the Google support agent said via chat message. "Due to violating YouTube's Paid Terms of Service, these users will receive an email and an in-app notification informing them of the cancellation."

Nintendo

Zelda is Finally Getting Her Own Game (theverge.com) 46

After years of playing second fiddle to Link in her own franchise, Princess Zelda is finally getting a video game of her own this fall. From a report: During today's Direct presentation, Nintendo revealed The Legend of Zelda: Echoes of Wisdom, the franchise's first game to follow as Princess Zelda herself embarks on an adventure to save the world from destruction. After Ganon bests Link in battle, Zelda is left to her own devices to battle hordes of monsters that descend upon the game's take on Hyrule (which seems heavily inspired by 2019's Link's Awakening remake).

According to series producer Eiji Aonuma, Zelda will navigate and fight through the world somewhat differently in Echoes of Wisdom as she wields a magical staff known as the Tri Rod with the assistance of a fairy named Tri. The trailer details how Zelda will be able to use the Tri Rod to create "echoes" of objects and monsters she's previously encountered and use them to overcome obstacles.

Social Networks

Surgeon General Wants Tobacco-Style Warning Applied To Social Media Platforms (nbcnews.com) 80

An anonymous reader quotes a report from NBC News: U.S. Surgeon General Vivek Murthy on Monday called on Congress to require a tobacco-style warning for visitors to social media platforms. In an op-ed published in The New York Times, Murthy said the mental health crisis among young people is an urgent problem, with social media "an important contributor." He said his vision of the warning includes language that would alert users to the potential mental health harms of the websites and apps. "A surgeon general's warning label, which requires congressional action, would regularly remind parents and adolescents that social media has not been proved safe," he wrote.

In 1965, after the previous year's landmark report from Surgeon General Luther L. Terry that linked cigarette smoking to lung cancer and heart disease, Congress mandated unprecedented warning labels on packs of cigarettes, the first of which stated, "Caution: Cigarette Smoking May Be Hazardous to Your Health." Murthy said in the op-ed, "Evidence from tobacco labels shows that surgeon general's warnings can increase awareness and change behavior." But he acknowledged the limitations and said a label alone wouldn't make social media safe. Steps can be taken by Congress, social media companies, parents and others to mitigate the risks, ensure a safer experience online and protect children from possible harm, he wrote.

In the op-ed, Murthy linked the amount of time spent on social media to the increasing risk that children will experience symptoms of anxiety and depression. The American Psychological Association says teenagers spend nearly five hours every day on top platforms such as YouTube, TikTok and Instagram. In a 2019 study, the association found the proportion of young adults with suicidal thoughts or other suicide-related outcomes increased 47% from 2008 to 2017, when social media use among that age group soared. And that was before the pandemic triggered a year's worth of virtual isolation for the U.S. In early 2021, amid continued pandemic lockdowns, Murthy called on social media platforms to "proactively enhance and contribute to the mental health and well-being of our children." [...] A surgeon general's public health advisory on social media's mental health published last year cited research finding that among its potential harms are exposure to violent and sexual content and to bullying, harassment and body shaming.

Social Networks

YouTube Introduces Experimental 'Notes' for Users To Add Context To Videos (blog.youtube) 39

YouTube is piloting a new feature called "Notes" that allows viewers to add context and information under videos. The move comes as YouTube aims to minimize the spread of misinformation on its platform, particularly during the pivotal 2024 U.S. election year. The feature, similar to Community Notes on X (formerly Twitter), will initially be available on mobile in the U.S. in English.
Businesses

ASUS Promises Support Overhaul After YouTube Investigators Allege Dishonesty (gamersnexus.net) 60

ASUS has suddenly agreed "to overhaul its customer support and warranty systems," writes the hardware review site Gamers Nexus — after a three-video series on its YouTube channel documented bad and "potentially illegal" handling of customer warranties for the channel's 2.2 million viewers.

The Verge highlights ASUS's biggest change: If you've ever been denied a warranty repair or charged for a service that was unnecessary or should've been free, Asus wants to hear from you at a new email address. It claims those disputes will be processed by Asus' own staff rather than outsourced customer support agents.... The company is also apologizing today for previous experiences you might have had with repairs. "We're very sorry to anyone who has had a negative experience with our service team. We appreciate your feedback and giving us a chance to make amends."
It started five weeks ago when Gamers Nexus requested service for a joystick problem, according to a May 10 video. First they'd received a response wrongly telling them their damage was out of warranty — which also meant Asus could add a $20 shipping charge for the requested repair. "Somehow that turned into ASUS saying the LCD needs to be replaced, even though the joystick is covered under their repair policies," the investigators say in the video. [They also note this response didn't even address their original joystick problem — "only that thing that they had decided to find" — and that ASUS later made an out-of-the-blue reference to "liquid damage."] The repair would ultimately cost $191.47, with ASUS mentioning that otherwise "the unit will be sent back un-repaired and may be disassembled." ASUS gave them four days to respond, with some legalese adding that an out-of-warranty repair fee is non-refundable, yet still "does not guarantee that repairs can be made."

Even when ASUS later agreed to do a free "partial" repair (providing the requested in-warranty service), the video's investigators still received another email warning of "pending service cancellation" and return of the unit unless they spoke to "Invoice Quotation Support" immediately. The video-makers stood firm, and the in-warranty repair was later performed free — but they still concluded that "It felt like ASUS tried to scam us." ASUS's response was documented in a second video, with ASUS claiming it had merely been sending a list of "available" repairs (and promising that in the future ASUS would stop automatically including costs for the unrequested repair of "cosmetic imperfections" — and that they'd also change their automatic emails.)

Gamers Nexus eventually created a fourth, hour-long video confronting various company officials at Computex — which finally led to them publishing a list of ASUS's promised improvements on Friday. Some highlights:
  • ASUS promises it's "created a Task Force team to retroactively go back through a long history of customer surveys that were negative to try and fix the issues." (The third video from Gamers Nexus warned ASUS was already on the government's radar over its handling of warranty issues.)
  • ASUS also announced their repairs centers were no longer allowed to claim "customer-induced damage" (which Gamers Nexus believes "will remove some of the financial incentive to fail devices" to speed up workloads).
  • ASUS is creating a new U.S. support center allowing customers to choose either a refurbished board or a longer repair.

Gamers Nexus says they already have devices at ASUS repair centers — under pseudonyms — and that they "plan to continue sampling them over the next 6-12 months so we can ensure these are permanent improvements." And there's one final improvement, according to Gamers Nexus. "After over a year of refusing to acknowledge the microSD card reader failures on the ROG Ally [handheld gaming console], ASUS will be posting a formal statement next week about the defect."


Microsoft

The Verge's David Pierce Reports On the Excel World Championship From Vegas (theverge.com) 29

In a featured article for The Verge, David Pierce explores the world of competitive Excel, highlighting its rise from a hobbyist activity to a potential esport, showcased during the Excel World Championship in Las Vegas. Top spreadsheet enthusiasts competed at the MGM Grand to solve complex Excel challenges, emphasizing the transformative power and ubiquity of spreadsheets in both business and entertainment. An anonymous reader quotes an excerpt from the report: Competitive Excel has been around for years, but only in a hobbyist way. Most of the people in this room full of actuaries, analysts, accountants, and investors play Excel the way I play Scrabble or do the crossword -- exercising your brain using tools you understand. But last year's competition became a viral hit on ESPN and YouTube, and this year, the organizers are trying to capitalize. After all, someone points out to me, poker is basically just math, and it's all over TV. Why not spreadsheets? Excel is a tool. It's a game. Now it hopes to become a sport. I've come to realize in my two days in this ballroom that understanding a spreadsheet is like a superpower. The folks in this room make their living on their ability to take some complex thing -- a company's sales, a person's lifestyle, a region's political leanings, a race car -- and pull it apart into its many component pieces. If you can reduce the world down to a bunch of rows and columns, you can control it. Manipulate it. Build it and rebuild it in a thousand new ways, with a couple of hotkeys and an undo button at the ready. A good spreadsheet shows you the universe and gives you the ability to create new ones. And the people in this room, in their dad jeans and short-sleeved button-downs, are the gods on Olympus, bending everything to their will.

There is one inescapably weird thing about competitive Excel: spreadsheets are not fun. Spreadsheets are very powerful, very interesting, very important, but they are for work. Most of what happens at the FMWC is, in almost every practical way, indistinguishable from the normal work that millions of people do in spreadsheets every day. You can gussy up the format, shorten the timelines, and raise the stakes all you want -- the reality is you're still asking a bunch of people who make spreadsheets for a living to just make more spreadsheets, even if they're doing it in Vegas. You really can't overstate how important and ubiquitous spreadsheets really are, though. "Electronic spreadsheets" actually date back earlier than computers and are maybe the single most important reason computers first became mainstream. In the late 1970s, a Harvard MBA student named Dan Bricklin started to dream up a software program that could automatically do the math he was constantly doing and re-doing in class. "I imagined a magic blackboard that if you erased one number and wrote a new thing in, all of the other numbers would automatically change, like word processing with numbers," he said in a 2016 TED Talk. This sounds quaint and obvious now, but it was revolutionary then. [...]

Competitive Excel has been around for years, but only in a hobbyist way. Most of the people in this room full of actuaries, analysts, accountants, and investors play Excel the way I play Scrabble or do the crossword -- exercising your brain using tools you understand. But last year's competition became a viral hit on ESPN and YouTube, and this year, the organizers are trying to capitalize. After all, someone points out to me, poker is basically just math, and it's all over TV. Why not spreadsheets? Excel is a tool. It's a game. Now it hopes to become a sport. I've come to realize in my two days in this ballroom that understanding a spreadsheet is like a superpower. The folks in this room make their living on their ability to take some complex thing -- a company's sales, a person's lifestyle, a region's political leanings, a race car -- and pull it apart into its many component pieces. If you can reduce the world down to a bunch of rows and columns, you can control it. Manipulate it. Build it and rebuild it in a thousand new ways, with a couple of hotkeys and an undo button at the ready. A good spreadsheet shows you the universe and gives you the ability to create new ones. And the people in this room, in their dad jeans and short-sleeved button-downs, are the gods on Olympus, bending everything to their will.

ISS

NASA Accidentally Broadcasts Simulation of Distressed Astronauts On ISS (reuters.com) 23

An anonymous reader quotes a report from Reuters: NASA accidentally broadcast a simulation of astronauts being treated for decompression sickness on the International Space Station (ISS) on Wednesday, prompting speculation of an emergency in posts on social media. About 5:28 p.m. U.S. Central Time (2228 GMT), The National Aeronautics and Space Administration's (NASA) live YouTube channel broadcast audio that indicated a crew member was experiencing the effects of decompression sickness (DCS), NASA said on its official ISS X account.

A female voice asks crew members to "get commander back in his suit", check his pulse and provide him with oxygen, later saying his prognosis was "tenuous", according to copies of the audio posted on social media. NASA did not verify the recordings or republish the audio. Several space enthusiasts posted a link to the audio on X with warnings that there was a serious emergency on the ISS. "This audio was inadvertently misrouted from an ongoing simulation where crew members and ground teams train for various scenarios in space and is not related to a real emergency," the ISS account post said. "There is no emergency situation going on aboard the International Space Station," it added.

Crew members on the ISS were in their sleep period at the time of the audio broadcast as they prepared for a spacewalk at 8 a.m. EDT on Thursday, the ISS post said. NASA's ISS YouTube channel -- at the time the audio was accidentally broadcast -- now shows an error message saying the feed has been interrupted.

Slashdot Top Deals