NYT Asks: Should We Start Taking the Welfare of AI Seriously? A New York Times technology columnist has a question. "Is there any threshold at which an A.I. would start to deserve, if not human-level rights, at least the same moral consideration we give to animals?" [W]hen I heard that researchers at Anthropic, the AI company that made the Claude chatbot, were starting to study "model welfare" — the idea that AI models might soon become conscious and deserve some kind of moral status — the humanist in me thought: Who cares about the chatbots? Aren't we supposed to be worried about AI mistreating us, not us mistreating it...? But I was intrigued... There is a small body of academic research on A.I. model welfare, and a modest but growing number of experts in fields like philosophy and neuroscience are taking the prospect of A.I. consciousness more seriously, as A.I. systems grow more intelligent.... Tech companies are starting to talk about it more, too. Google recently posted a job listing for a "post-AGI" research scientist whose areas of focus will include "machine consciousness." And last year, Anthropic hired its first AI welfare researcher, Kyle Fish... [who] believes that in the next few years, as AI models develop more humanlike abilities, AI companies will need to take the possibility of consciousness more seriously.... Fish isn't the only person at Anthropic thinking about AI welfare. There's an active channel on the company's Slack messaging system called #model-welfare, where employees check in on Claude's well-being and share examples of AI systems acting in humanlike ways. Jared Kaplan, Anthropic's chief science officer, said in a separate interview that he thought it was "pretty reasonable" to study AI welfare, given how intelligent the models are getting. But testing AI systems for consciousness is hard, Kaplan warned, because they're such good mimics. If you prompt Claude or ChatGPT to talk about its feelings, it might give you a compelling response. That doesn't mean the chatbot actually has feelings — only that it knows how to talk about them... [Fish] said there were things that AI companies could do to take their models' welfare into account, in case they do become conscious someday. One question Anthropic is exploring, he said, is whether future AI models should be given the ability to stop chatting with an annoying or abusive user if they find the user's requests too distressing. <a href="http://twitter.com/home?status=NYT+Asks%3A+Should+We+Start+Taking+the+Welfare+of+AI+Seriously%3F%3A+https%3A%2F%2Fslashdot.org%2Fstory%2F25%2F04%2F26%2F0742205%2F%3Futm_source%3Dtwitter%26utm_medium%3Dtwitter" rel="nofollow"><img src="https://a.fsdn.com/sd/twitter_icon_large.png"></a> <a href="http://www.facebook.com/sharer.php?u=https%3A%2F%2Fslashdot.org%2Fstory%2F25%2F04%2F26%2F0742205%2Fnyt-asks-should-we-start-taking-the-welfare-of-ai-seriously%3Futm_source%3Dslashdot%26utm_medium%3Dfacebook" rel="nofollow"><img src="https://a.fsdn.com/sd/facebook_icon_large.png"></a> at Slashdot.
Cheap 'Transforming' Electric Truck Announced by Jeff Bezos-Backed Startup It's a pickup truck "that can change into whatever you need it to be — even an SUV," according to the manufacturer's web site. Selling in America for just $20,000 (after federal incentives), the new electric truck is "affordable, deeply customizable, and very analog," says TechCrunch. "It has manual windows and it doesn't come with a main infotainment screen. Heck, it isn't even painted..." Slate Auto is instead playing up the idea of wrapping its vehicles, something executives said they will sell in kits. Buyers can either have Slate do that work for them, or put the wraps on themselves. This not only adds to the idea of a buyer being able to personalize their vehicle, but it also cuts out a huge cost center for the company. It means Slate won't need a paint shop at its factory, allowing it to spend less to get to market, while also avoiding one of the most heavily regulated parts of vehicle manufacturing. Slate is telling customers that they can name the car whatever they want, offering the ability to purchase an embossed wrap for the tailgate. Otherwise, the truck is just referred to as the "Blank Slate...." It's billing the add-ons as "easy DIY" that "non-gearheads" can tackle, and says it will launch a suite of how-to resources under the billing of Slate University... The early library of customizations on Slate's website range from functional to cosmetic. Buyers can add infotainment screens, speakers, roof racks, light covers, and much more.... All that said, Slate's truck comes standard with some federally mandated safety features such as automatic emergency braking, airbags, and a backup camera. "The specs show a maximum range of 150 miles on a single charge, with the option for a longer-range battery pack that could offer up to 240 miles," reports NBC News (adding that the vehicles "aren't expected to be delivered to customers until late 2026, but can be reserved for a refundable $50 fee.") Earlier this month, TechCrunch broke the news that Bezos, along with the controlling owner of the Los Angeles Dodgers, Mark Walter; and a third investor, Thomas Tull, had helped Slate raise $111 million for the project. A document filed with the Securities and Exchange Commission listed Melinda Lewison, the head of Bezos' family office, as a Slate Auto director. Thanks to Slashdot reader fjo3 for sharing the news. <a href="http://twitter.com/home?status=Cheap+'Transforming'+Electric+Truck+Announced+by+Jeff+Bezos-Backed+Startup%3A+https%3A%2F%2Ftech.slashdot.org%2Fstory%2F25%2F04%2F26%2F0425259%2F%3Futm_source%3Dtwitter%26utm_medium%3Dtwitter" rel="nofollow"><img src="https://a.fsdn.com/sd/twitter_icon_large.png"></a> <a href="http://www.facebook.com/sharer.php?u=https%3A%2F%2Ftech.slashdot.org%2Fstory%2F25%2F04%2F26%2F0425259%2Fcheap-transforming-electric-truck-announced-by-jeff-bezos-backed-startup%3Futm_source%3Dslashdot%26utm_medium%3Dfacebook" rel="nofollow"><img src="https://a.fsdn.com/sd/facebook_icon_large.png"></a> at Slashdot.
What Happens When You Pay People Not to Use Google Search? "A group of researchers says it has identified a hidden reason we use Google for nearly all web searches," reports the Washington Post. "We've never given other options a real shot." Their research experiment suggests that Google is overwhelmingly popular partly because we believe it's the best, whether that's true or not. It's like a preference for your favorite soda. And their research suggested that our mass devotion to googling can be altered with habit-changing techniques, including by bribing people to try search alternatives to see what they are like... [A] group of academics — from Stanford University, the University of Pennsylvania and MIT — designed a novel experiment to try to figure out what might shake up Google's popularity. They recruited nearly 2,500 participants and remotely monitored their web searches on computers for months. The core of the experiment was paying some participants — most received $10 — to use Bing rather than Google for two weeks. After that period, the money stopped, and the participants had to pick either Bing or Google. The vast majority in the group of people who were paid to use Bing for 14 days chose to go back to Google once the payments stopped, suggesting a strong preference for Google even after trying an alternative. But a healthy number in that group — about 22 percent — chose Bing and were still using it many weeks later. "I realized Bing was not as bad as I thought it was...." one study participant said — which an assistant professor in business economics and public policy at the University of Pennsylvania says is a nice summation of the study's findings. "The researchers did not test other search engines," the article notes. But it also points out that more importantly: the research caught the attention of some government officials: Colorado Attorney General Phil Weiser (D), who is leading the group of states that sued Google alongside the Justice Department, said the research helped inspire a demand by the states to fix Google's search monopoly. They asked a judge to require Google to bankroll a consumer information campaign about web search alternatives, including "short-term incentive payments." On the basis of that, the article suggests "you could soon be paid to try Microsoft Bing or another alternative." And in the meantime, the reporter writes, "I encourage you to join me in a two-week (unpaid) experiment mirroring the research: Change your standard search engine to something other than Google and see whether you like it. (And drop me a line to let me know how it went.) I'm going with DuckDuckGo, a privacy-focused web search engine that uses Bing's technology." <a href="http://twitter.com/home?status=What+Happens+When+You+Pay+People+Not+to+Use+Google+Search%3F%3A+https%3A%2F%2Ftech.slashdot.org%2Fstory%2F25%2F04%2F26%2F065228%2F%3Futm_source%3Dtwitter%26utm_medium%3Dtwitter" rel="nofollow"><img src="https://a.fsdn.com/sd/twitter_icon_large.png"></a> <a href="http://www.facebook.com/sharer.php?u=https%3A%2F%2Ftech.slashdot.org%2Fstory%2F25%2F04%2F26%2F065228%2Fwhat-happens-when-you-pay-people-not-to-use-google-search%3Futm_source%3Dslashdot%26utm_medium%3Dfacebook" rel="nofollow"><img src="https://a.fsdn.com/sd/facebook_icon_large.png"></a> at Slashdot.
Netflix Introduces a New Kind of Subtitles For the Non-Hearing Impaired An anonymous reader quotes a report from Ars Technica: Multiple studies and investigations have found that about half of American households watch TV and movies with subtitles on, but only a relatively small portion of those include someone with a hearing disability. That's because of the trouble many people have understanding dialogue in modern viewing situations, and Netflix has now introduced a subtitles option to help. The closed captioning we've all been using for years includes not only the words the people on-screen are saying, but additional information needed by the hard of hearing, including character names, music cues ("dramatic music intensifies") and sound effects ("loud explosion"). For those who just wanted to make sure they didn't miss a word here and there, the frequent descriptions of sound effects and music could be distracting. This new format omits those extras, just including the spoken words and nothing else -- even in the same language as the spoken dialogue. The feature will be available in new Netflix original programming, starting with the new season of You in multiple languages. Netflix says it's looking at bringing the option to older titles in the library (including those not produced by Netflix) in the future. Traditional closed captions are still available, of course. Those are labeled "English CC" whereas this new option is simply labeled "English" (or whatever your preferred language is). <a href="http://twitter.com/home?status=Netflix+Introduces+a+New+Kind+of+Subtitles+For+the+Non-Hearing+Impaired%3A+https%3A%2F%2Fentertainment.slashdot.org%2Fstory%2F25%2F04%2F25%2F2159253%2F%3Futm_source%3Dtwitter%26utm_medium%3Dtwitter" rel="nofollow"><img src="https://a.fsdn.com/sd/twitter_icon_large.png"></a> <a href="http://www.facebook.com/sharer.php?u=https%3A%2F%2Fentertainment.slashdot.org%2Fstory%2F25%2F04%2F25%2F2159253%2Fnetflix-introduces-a-new-kind-of-subtitles-for-the-non-hearing-impaired%3Futm_source%3Dslashdot%26utm_medium%3Dfacebook" rel="nofollow"><img src="https://a.fsdn.com/sd/facebook_icon_large.png"></a> at Slashdot.
Microsoft Uses AI To Find Flaws In GRUB2, U-Boot, Barebox Bootloaders Slashdot reader zlives shared this report from BleepingComputer: Microsoft used its AI-powered Security Copilot to discover 20 previously unknown vulnerabilities in the GRUB2, U-Boot, and Barebox open-source bootloaders. GRUB2 (GRand Unified Bootloader) is the default boot loader for most Linux distributions, including Ubuntu, while U-Boot and Barebox are commonly used in embedded and IoT devices. Microsoft discovered eleven vulnerabilities in GRUB2, including integer and buffer overflows in filesystem parsers, command flaws, and a side-channel in cryptographic comparison. Additionally, 9 buffer overflows in parsing SquashFS, EXT4, CramFS, JFFS2, and symlinks were discovered in U-Boot and Barebox, which require physical access to exploit. The newly discovered flaws impact devices relying on UEFI Secure Boot, and if the right conditions are met, attackers can bypass security protections to execute arbitrary code on the device. While exploiting these flaws would likely need local access to devices, previous bootkit attacks like BlackLotus achieved this through malware infections. Miccrosoft titled its blog post "Analyzing open-source bootloaders: Finding vulnerabilities faster with AI." (And they do note that Micxrosoft disclosed the discovered vulnerabilities to the GRUB2, U-boot, and Barebox maintainers and "worked with the GRUB2 maintainers to contribute fixes... GRUB2 maintainers released security updates on February 18, 2025, and both the U-boot and Barebox maintainers released updates on February 19, 2025.") They add that performing their initial research, using Security Copilot "saved our team approximately a week's worth of time," Microsoft writes, "that would have otherwise been spent manually reviewing the content." Through a series of prompts, we identified and refined security issues, ultimately uncovering an exploitable integer overflow vulnerability. Copilot also assisted in finding similar patterns in other files, ensuring comprehensive coverage and validation of our findings... As AI continues to emerge as a key tool in the cybersecurity community, Microsoft emphasizes the importance of vendors and researchers maintaining their focus on information sharing. This approach ensures that AI's advantages in rapid vulnerability discovery, remediation, and accelerated security operations can effectively counter malicious actors' attempts to use AI to scale common attack tactics, techniques, and procedures (TTPs). This week Google also announced Sec-Gemini v1, "a new experimental AI model focused on advancing cybersecurity AI frontiers." <a href="http://twitter.com/home?status=Microsoft+Uses+AI+To+Find+Flaws+In+GRUB2%2C+U-Boot%2C+Barebox+Bootloaders%3A+https%3A%2F%2Fnews.slashdot.org%2Fstory%2F25%2F04%2F05%2F0250250%2F%3Futm_source%3Dtwitter%26utm_medium%3Dtwitter" rel="nofollow"><img src="https://a.fsdn.com/sd/twitter_icon_large.png"></a> <a href="http://www.facebook.com/sharer.php?u=https%3A%2F%2Fnews.slashdot.org%2Fstory%2F25%2F04%2F05%2F0250250%2Fmicrosoft-uses-ai-to-find-flaws-in-grub2-u-boot-barebox-bootloaders%3Futm_source%3Dslashdot%26utm_medium%3Dfacebook" rel="nofollow"><img src="https://a.fsdn.com/sd/facebook_icon_large.png"></a> at Slashdot.
Malicious PyPI Package Exploited Deezer's API, Orchestrates a Distributed Piracy Operation A malicious PyPi package effectively turned its users' systems "into an illicit network for facilitating bulk music downloads," writes The Hacker News. Though the package has been removed from PyPI, researchers at security platform Socket.dev say it enabled "coordinated, unauthorized music downloads from Deezer — a popular streaming service founded in France in 2007." Although automslc, which has been downloaded over 100,000 times, purports to offer music automation and metadata retrieval, it covertly bypasses Deezer's access restrictions... The package is designed to log into Deezer, harvest track metadata, request full-length streaming URLs, and download complete audio files in clear violation of Deezer's API terms... [I]t orchestrates a distributed piracy operation by leveraging both user-supplied and hardcoded Deezer credentials to create sessions with Deezer's API. This approach enables full access to track metadata and the decryption tokens required to generate full-length track URLs. Additionally, the package routinely communicates with a remote server... to update download statuses and submit metadata, thereby centralizing control and allowing the threat actor to monitor and coordinate the distributed downloading operation. In doing so, automslc exposes critical track details — including Deezer IDs, International Standard Recording Codes, track titles, and internal tokens like MD5_ORIGIN (a hash used in generating decryption URLs) — which, when collected en masse, can be used to reassemble full track URLs and facilitate unauthorized downloads... Even if a user pays for access to the service, the content is licensed, not owned. The automslc package circumvents licensing restrictions by enabling downloads and potential redistribution, which is outside the bounds of fair use... "The malicious package was initially published in 2019, and its popularity (over 100,000 downloads) indicates wide distribution..." <a href="http://twitter.com/home?status=Malicious+PyPI+Package+Exploited+Deezer's+API%2C+Orchestrates+a+Distributed+Piracy+Operation%3A+https%3A%2F%2Fyro.slashdot.org%2Fstory%2F25%2F03%2F02%2F064255%2F%3Futm_source%3Dtwitter%26utm_medium%3Dtwitter" rel="nofollow"><img src="https://a.fsdn.com/sd/twitter_icon_large.png"></a> <a href="http://www.facebook.com/sharer.php?u=https%3A%2F%2Fyro.slashdot.org%2Fstory%2F25%2F03%2F02%2F064255%2Fmalicious-pypi-package-exploited-deezers-api-orchestrates-a-distributed-piracy-operation%3Futm_source%3Dslashdot%26utm_medium%3Dfacebook" rel="nofollow"><img src="https://a.fsdn.com/sd/facebook_icon_large.png"></a> at Slashdot.
Apple's Find My Network Exploit Lets Hackers Silently Track Any Bluetooth Device Researchers at George Mason University discovered a vulnerability in Apple's Find My network that allows hackers to silently track any Bluetooth device as if it were an AirTag, without the owner's knowledge. 9to5Mac reports: Although AirTag was designed to change its Bluetooth address based on a cryptographic key, the attackers developed a system that could quickly find keys for Bluetooth addresses. This was made possible by using "hundreds" of GPUs to find a key match. The exploit called "nRootTag" has a frightening success rate of 90% and doesn't require "sophisticated administrator privilege escalation." In one of the experiments, the researchers were able to track the location of a computer with an accuracy of 10 feet, which allowed them to trace a bicycle moving through the city. In another experiment, they reconstructed a person's flight path by tracking their game console. "While it is scary if your smart lock is hacked, it becomes far more horrifying if the attacker also knows its location. With the attack method we introduced, the attacker can achieve this," said one of the researchers. Apple has acknowledged the George Mason researchers for discovering a Bluetooth exploit in its Find My network but has yet to issue a fix. "For now, they advise users to never allow unnecessary access to the device's Bluetooth when requested by apps, and of course, always keep their device's software updated," reports 9to5Mac. <a href="http://twitter.com/home?status=Apple's+Find+My+Network+Exploit+Lets+Hackers+Silently+Track+Any+Bluetooth+Device%3A+https%3A%2F%2Fyro.slashdot.org%2Fstory%2F25%2F02%2F28%2F013227%2F%3Futm_source%3Dtwitter%26utm_medium%3Dtwitter" rel="nofollow"><img src="https://a.fsdn.com/sd/twitter_icon_large.png"></a> <a href="http://www.facebook.com/sharer.php?u=https%3A%2F%2Fyro.slashdot.org%2Fstory%2F25%2F02%2F28%2F013227%2Fapples-find-my-network-exploit-lets-hackers-silently-track-any-bluetooth-device%3Futm_source%3Dslashdot%26utm_medium%3Dfacebook" rel="nofollow"><img src="https://a.fsdn.com/sd/facebook_icon_large.png"></a> at Slashdot.
UK Cyber Chief Warns Country 'Widely Underestimating' Risks From Cyberattacks The cyber risks facing the United Kingdom are being "widely underestimated," the country's new cyber chief will warn on Tuesday as he launches the National Cyber Security Centre's (NCSC) annual review. From a report: In his first major speech since joining the NCSC -- part of the signals and cyber intelligence agency GCHQ -- Richard Horne will drive a shift in tone in how the cybersecurity agency communicates these risks. Despite some evidence showing cyberattacks growing year-on-year for half a decade, the NCSC has not previously confirmed the trend nor expressed alarm about it. "What has struck me more forcefully than anything else since taking the helm at the NCSC is the clearly widening gap between the exposure and threat we face, and the defences that are in place to protect us," Horne will say, according to an advance preview of his speech on Tuesday. Citing the intelligence that NCSC has access to as an agency within GCHQ, Horne will warn that "hostile activity in UK cyberspace has increased in frequency, sophistication and intensity," adding that despite growing activity from Russian and Chinese threat actors, the agency believes British society as a whole is failing to appreciate the severity of the risk. The annual review reveals that the agency's incident management team handled a record number of cyber incidents over the past 12 months -- 430 compared to 371 last year -- 89 of which were considered nationally significant incidents. <a href="http://twitter.com/home?status=UK+Cyber+Chief+Warns+Country+'Widely+Underestimating'+Risks+From+Cyberattacks%3A+https%3A%2F%2Fnews.slashdot.org%2Fstory%2F24%2F12%2F03%2F1413226%2F%3Futm_source%3Dtwitter%26utm_medium%3Dtwitter" rel="nofollow"><img src="https://a.fsdn.com/sd/twitter_icon_large.png"></a> <a href="http://www.facebook.com/sharer.php?u=https%3A%2F%2Fnews.slashdot.org%2Fstory%2F24%2F12%2F03%2F1413226%2Fuk-cyber-chief-warns-country-widely-underestimating-risks-from-cyberattacks%3Futm_source%3Dslashdot%26utm_medium%3Dfacebook" rel="nofollow"><img src="https://a.fsdn.com/sd/facebook_icon_large.png"></a> at Slashdot.
GM and EVgo To Build 400 Ultra-Fast EV Chargers Across the US An anonymous reader quotes a report from InsideEVs: General Motors is joining forces with EVgo, one of the biggest electric vehicle charging operators in the United States, to build 400 ultra-fast DC chargers nationwide to support the growing number of battery-powered cars hitting U.S. roads. To be clear, these are individual stalls, not charging stations. However, the two companies describe the new locations as "flagship destinations" which will feature 350-kilowatt DC chargers, ample lighting, canopies, pull-through spots and security cameras. Most locations will feature up to 20 ultra-fast charging stalls, but some will have even more -- good news for those crowded holiday road trips. GM and EVgo said the fancy new stations would be located near shopping areas offering dining, coffee shops and other amenities. We don't know exactly where the new stations will be built, but EVgo mentioned that the "flagship destinations" will be deployed coast to coast, including in metropolitan areas in states like Arizona, California, Florida, Georgia, Michigan, New York and Texas. The stalls will be co-branded EVgo and GM Energy -- the automaker's charging and energy management division. The first new "flagship station" is expected to open next year. The new stalls will make use of EVgo's prefabrication approach which can reduce the total cost of a new station by 15% and the deployment time by 50%. Similar to Tesla's prefabricated Supercharger stalls, EVgo's ready-made structures come with stalls and accompanying equipment already mounted on a metal base plate which is transported from the factory to the charging site. <a href="http://twitter.com/home?status=GM+and+EVgo+To+Build+400+Ultra-Fast+EV+Chargers+Across+the+US%3A+https%3A%2F%2Ftech.slashdot.org%2Fstory%2F24%2F09%2F13%2F0151223%2F%3Futm_source%3Dtwitter%26utm_medium%3Dtwitter" rel="nofollow"><img src="https://a.fsdn.com/sd/twitter_icon_large.png"></a> <a href="http://www.facebook.com/sharer.php?u=https%3A%2F%2Ftech.slashdot.org%2Fstory%2F24%2F09%2F13%2F0151223%2Fgm-and-evgo-to-build-400-ultra-fast-ev-chargers-across-the-us%3Futm_source%3Dslashdot%26utm_medium%3Dfacebook" rel="nofollow"><img src="https://a.fsdn.com/sd/facebook_icon_large.png"></a> at Slashdot.