A group of more than 45 video game developers have reportedly approached the central government seeking a clear distinction between real money gaming, fantasy sports, and themselves from a policy perspective. The letter requests the government to implement a clear distinct recognition of the games industry in India, and to end the ambiguity in the online gaming industry, where video games and e-sports are often clubbed with real money gaming and online fantasy sports. These developers include Outlier Games, Dot9 Games, Lucid Labs, Newgen Gaming and SuperGaming. These gaming companies have flagged that recent campaigns by the real money gaming industry “project a homogenous image and suggest that the entire games industry of India is adversely affected” by the proposed 28% goods and service tax (GST) on online gaming. The letter comes in the wake of 28% GST imposed by the GST Council on the full face value for online gaming earlier this month. The GST Council exempted games that are played without stakes, these will be taxed at 18%.What the letter says ET has reviewed the copy of the letter which has been sent to the Prime Minister’s Office, the ministry of electronics and information technology (MeitY), and the ministry of information and broadcasting (I&B). “Globally, irrespective of skill or chance, a clear distinction is drawn between games involving wagering (categorised as ‘iGaming’) and games without wagering (categorised as ‘video games’). Unfortunately, in India, these mutually exclusive categories have been consolidated under the common umbrella of ‘online games’,” said the letter.“…we wish to express our sincere appreciation to the GST Council, the Department of Revenue, and the Government of India for exempting Video Games from the recent 28% GST decision. Recognising that Video Games do not involve any form of wagering or staking, we are truly grateful for this thoughtful consideration, which acknowledges the diversity of business models within our industry,” the letter added.Incidentally, this is not the first time that video game developers have sought this demarcation. The need to make clear differentiation has been there since quite some time and was also raised following the notification of online gaming rules issued by MeitY in April.Real money gaming industry’s pleaThe real money gaming industry on its part claims that the GST Council’s decision of 28% tax could drive users away to illegitimate gambling and betting platforms. In addition, investors in these companies have also argued that the decision could lead to a potential write-off of the $2.5 billion capital invested in the sector. The letter requests the Indian government to implement a distinct recognition of the games industry in India, and to avoid video games and e-sports from being clubbed with real money gaming and online fantasy sports.
A Journey Beyond Geographical Bounds for Unrestricted Streaming Delight
Behold the epoch of streaming, an awe-inspiring tapestry of entertainment that stretches beyond horizons, beckoning with untold delights – movies, TV shows, and live sports dancing at our fingertips. But alas! Concealed within this paradisiacal bounty, a riddle emerges – the enigmatic realm of geographical restrictions. As streaming services wield their geolocation sorcery, content becomes bound within ethereal borders, tantalizingly out of reach for viewers yearning to traverse the bounds of their physical confines. Fear not, for within these arcane pages, we unveil the mystic powers of Virtual Private Networks (VPNs), a liberating elixir, empowering users to embark on a cosmic voyage through a cornucopia of global content. Embrace this mystic expedition, traversing ethereal boundaries, freeing streaming enthusiasts to bask in unparalleled entertainment experiences, no matter where in the world they may find themselves. Understanding Geographical Conundrums Venture forth into the labyrinthine domains of Netflix, Hulu, Disney+, and Amazon Prime Video, where celestial cartographers chart the stars of geolocation. Witness as they unravel the enigma of the user’s IP address, divulging their earthly abode. Alas, as astral gatekeepers descend, content restrictions cloak coveted movies, TV shows, and sports events beyond mortal reach. In this cosmic enigma, contractual spells, legal incantations, and esoteric forces weave a tapestry of content confinement, vexing viewers whose souls yearn to transcend these boundaries, thirsting for the sweet nectar of global entertainment. The Potent Alchemy of VPNs in Streaming Amidst this grand cosmic ballet emerges the arcane artistry of Virtual Private Networks (VPNs), spinning a spell of liberation. Embrace the convergence with VPN servers scattered across diverse lands, igniting a cosmic metamorphosis, transmuting earthly IP addresses into the essence of far-off realms. A mirage of the virtual kind unravels, streaming services unwittingly opening their astral gates, as users don the cloak of distant lands. Witness the epiphany! Content restrictions crumble into the digital ether, unveiling a celestial trove of global content. The Enigmatic Potency of VPNs Reveals Access to Exclusive Vistas Cast aside the shackles of geographical bounds! Embrace the freedom to frolic across servers in far-flung realms, a cosmic masquerade transcending terrestrial tethers. Unravel the veiled treasures of exclusive movies, TV shows, and sports events lurking within esoteric confines. Subverting Censorship’s Veil Amidst lands where the iron fist of censorship casts its shadow, VPNs part the astral veil. Behold the unyielding gaze of oppressive forces averted, as users sup upon the nectar of an unbridled internet, savoring unrestricted streaming, venturing into diverse realms of content. The Grandeur of Live Sports Sporting enthusiasts, hark! Bear witness to the triumphant prowess of VPNs! Amidst fervent devotees yearning to witness the splendor of live events, find solace within the mystical embrace of VPN servers. United with distant lands, cheer for chosen teams, exulting in the grand rhapsody of live sportsmanship. The Cloak of Privacy and Security Beyond the astral gateways, witness the shroud of protection cast by VPNs. Within their encrypted sanctum, online activities veil from the watchful gaze of prying eyes – be they mundane ISPs or insidious cyber marauders. Choosing the Right VPN – An Oracular Quest Embark upon an ethereal quest to find the ideal VPN, guided by the spirits of discernment. Seek the vital elixir of diverse server locations across cosmic realms. In this voyage, swiftness reigns supreme – streaming speeds must rival the cosmic winds, buffering naught but seamless delight. Praise the harmony of this enchantment, ensuring concord with beloved streaming platforms like Netflix, Disney+, and Hulu. Heed the whispers of customer support, for the arcane realm may proffer unforeseen enigmas – a responsive guide shields seekers from entanglements, charting their path with clarity. Conclusion Thus, the enigma of geographical restrictions shatters beneath the potency of Virtual Private Networks (VPNs). The streaming experience ascends to celestial heights, unbound by terrestrial fetters. Each viewer, now a cosmic voyager, traverses the digital universe, a mosaic of cultures and storytelling. Choose with sagacity, embrace a reliable VPN, blessed with swift speeds, far-reaching servers, and boundless support. Step into the enigmatic prowess of VPNs, elevate your entertainment journey, and behold! Unrestricted access to the glories of global content awaits, from the cradle of your home to the farthest reaches of the cosmos.
When CEO Tim Cook was once refused Apple Card
All is reportedly not well between Goldman Sachs and the iPhone maker. Apple and Goldman Sachs’ partnership, which created the Apple Card and other financial products, is said to have become strained over time. Goldman is reported to be considering ending its association with Apple and moving away from consumer cards altogether. A recent report by The Information delves into how the alliance deteriorated over four years, leading to Goldman’s desire to extract itself from the partnership, revealing other intricate details of the deal. If you thought you were the only one who was denied a credit card, then you will be surprised to know that the CEO of a trillion-dollar company was denied a credit card, that too, the card his company designed and conceptualised. According to the report, Apple CEO Tim Cook faced difficulty getting approved for an Apple Card during the application process. This happened a few months before the card’s launch, and the issue had both engineers from Apple and Goldman Sachs working to resolve the issue.Despite Cook’s strong financial credentials, his high-profile status made him a target for fraud. As a result, Goldman Sachs had to intervene and make a one-time exception to their underwriting system to issue the Apple Card to Cook, said people familiar with the issue.Apple Card did not come easy; it constantly faced challenges due to differences between customer-oriented Apple and regulation-focused Goldman, according to the report.Apple’s engineers were dissatisfied with a physical card, and complying with guidelines, including using the Mastercard logo, was a concern. Goldman’s proposal to use their Marcus brand was rejected. Apple’s ideas, such as aligning billing statements with the calendar month, were not feasible due to financial regulations. Cashback rewards were originally supposed to go directly into users’ accounts, but the Daily Cash feature was created as a workaround due to processing issues.The Apple Card has around 10 million US users as of early 2023, and despite wanting to leave the consumer credit sector, Goldman Sachs may have to keep these customers as it is bound under contract, which ends in 2026. American Express and JPMorgan Chase are unlikely to take over Goldman Sachs’ contract with Apple for the Apple Card. Instead, a less well-known bank may handle the $17 billion credit card portfolio while remaining invisible to customers, according to people familiar with the development. Further, Apple could also become more involved in underwriting, fraud prevention, and customer service.
How To Develop A Records Management Strategy That Works For Your Business
In today’s digital landscape, effective information management is the cornerstone of any successful business. Central to this is a well-crafted records management strategy. Documents- vital to daily operations, decision-making, and regulatory compliance, represent more than papers stored in a dusty archive room. Ignoring this fundamental aspect of business can lead to operational inefficiencies, legal breaches, and significant reputational damage. On the other hand, a well-executed records management strategy can streamline operations, fortify legal standing, and enhance customer trust. It’s a strategic lever, pulling businesses towards success and resilience. This article aims to shed light on the critical nature of document management and provide a roadmap for developing a strategy that truly works for your business. Get ready to discover valuable insights enabling your business to operate more efficiently, confidently, and more agile than ever. Defining Records Management And Its Significance Records management is about maintaining orderly control over an organization’s files, from their creation to their disposal. It encompasses activities such as classifying, storing, preserving, and retrieving various types of documents, internal (like employee files or financial statements) and external (such as customer data or regulatory filings). In an increasingly digital world, managing these physical or digital documents is more critical than ever. Records serve as a resource for decision-making and legal reporting and provide historical business insights. The exponential growth in digital data necessitates adopting technology like records management software. Such tools simplify the file’s life cycle and ensure regulatory abidance, all within the context of a comprehensive records management strategy. Understanding Legal Mandates And Industry Guidelines For Records Management Navigating the terrain of document management also involves understanding the legal requirements and industry standards that govern it. Laws and regulations dictate how organizations manage, preserve, and dispose of their records. However, the legalities governing file management can differ significantly across industries, countries, and types of records. These legal frameworks and industry-established best practices guide businesses on how to create, capture, and manage their information effectively. By strictly adhering to legal requirements and industry standards, companies can ensure compliance, boost operational efficiency, and reduce risks. Such commitment underscores the value of a well-informed approach to document management, emphasizing the importance of a thorough understanding of the established guidelines. Steps To Develop A Records Management Strategy Developing a robust strategy requires a systematic approach. Here are the key steps: 1. Identify Your Record Types Each organization manages a diverse array of file types, which form the bedrock of its operations. This broad spectrum can include internal documents like team member data, legal documents such as contracts and agreements, and external data like customer information. The format of these files can range from traditional physical forms to their digital counterparts. Identifying and understanding the types of documents your business manages, from HR paperwork to complex legal documentation, is the launching pad for devising an effective records management strategy. This comprehensive perspective forms the basis for subsequent strategic steps. 2. Define Your Objectives And Goals Defining the objectives and goals of your records management strategy is a crucial starting point. These goals can cover various areas, such as enhancing efficiency, ensuring regulatory compliance, improving data security, or facilitating easy document retrieval. Each plan must adhere to the Specific, Measurable, Achievable, Relevant, and Time-bound (SMART) criteria. For example, you might set a goal: “Reduce customer record retrieval time by 30% by the end of Q4 to improve client satisfaction.” This clearly defined goal will serve as the guiding light for your records management strategy, driving purposeful action and measurable outcomes. 3. Analyze Your Current Situation It’s crucial to evaluate your current records management practices. This step involves a comprehensive inventory of your records, identification of system gaps, and a Strengths, Weaknesses, Opportunities, Threats (SWOT) analysis. For example, your current system is robust in preserving records (strength) but short in quick retrieval (weakness), presenting an opportunity for improvement. The outcomes of this evaluation will guide your strategy’s direction. 4. Develop Procedures For Record Creation, Storage And Retention Creating robust file creation, storage, and retention procedures is crucial to a comprehensive records management strategy. These procedures address multiple aspects, from standardizing document creation to ensuring secure storage and setting retention periods in line with legal and business requirements. This systematic approach fosters consistency and security across the board, ensuring regulatory adherence and strengthening the file management process. 5. Implement Security Measures And Access Controls Implementing stringent security measures and access controls is essential in safeguarding sensitive data. These measures apply to both physical and digital realms. For instance, digital documents containing sensitive information could be encrypted and stored in a secure server with access granted only to specific individuals based on their roles and responsibilities. Granting access solely to authorized personnel maintains the integrity and confidentiality of the data. These security measures protect valuable information and emphasize your organization’s commitment to responsible data management. 6. Plan for Disaster Recovery And Business Continuity Integrating disaster recovery and business continuity planning into a records management strategy is crucial to proactive business administration. The process involves devising strategies to enable swift recovery and business continuity even during unforeseen disasters, such as a massive data breach or natural calamity. With such a plan in place, businesses can bounce back quickly, minimizing downtime and ensuring a smoother transition to normal operations. For instance, a robust plan may incorporate routine backups of digital documents to a secure, off-site location or cloud storage. This strategy ensures the data is retrievable, enabling the rapid resumption of operations post-disaster. 7. Training And Change Management Introducing a new records management strategy inevitably triggers change within an organization. Comprehensive training and adept change management are essential to navigate this transformation successfully. The process involves equipping employees with the necessary knowledge and skills to adapt to new procedures effectively. This robust training approach ensures a smooth transition, fostering seamless integration of the new strategy into daily operations. For example, organizing workshops or training sessions that illustrate the nuances of the new system can mitigate resistance and
OnePlus Open: OnePlus confirms the name of its first foldable smartphone
OnePlus is all set to launch its first foldable smartphone next month. Rumours suggest that the company may launch the smartphone on August 29 at a physical launch event in New York. Now, OnePlus has revealed the name of its first foldable smartphone. OnePlus took to Twitter to reveal the name of its foldable smartphone. The company tweeted, “We OPEN when other FOLD”. This confirms that the upcoming foldable smartphone from OnePlus will be called ‘OnePlus Open‘. Recently, an online leak revealed that the upcoming foldable smartphone will replicate the design of last year’s launched Oppo Find N2 smartphone. Furthermore, it was mentioned that the foldable smartphone could potentially feature a periscope camera equipped with 3x optical zoom. The leak also disclosed that OnePlus’s foldable phone might be available in two colour variants, namely black and green. OnePlus Open likely specsThe device is likely to house a triple rear camera setup, and there’s speculation that it might include a periscope lens to significantly enhance zoom capabilities. To further enhance user convenience, leaks suggest the presence of a side-mounted fingerprint sensor for quick unlocking. The smartphone’s display is rumoured to adopt a modern punch-hole camera design, promising an immersive viewing experience.Under the hood, the OnePlus Open is expected to be powered by an octa-core Qualcomm Snapdragon 8 Gen 2 chipset, ensuring robust performance. On the software front, it is anticipated to run on the Android 13 operating system with OnePlus’s customized OxygenOS Fold interface, offering a seamless and efficient user experience.
The Viruses That Could Cure Cancer (or Wipe Out Humanity)
Gideon Lichfield: OK, but let me play the synthetic biology devil’s advocate for a second. Lauren Goode: OK, OK. Gideon Lichfield: When you have kids, you are throwing the genetic dice, you are mixing your DNA and that of your partners, and— Lauren Goode: Oh, is that how you have kids? [laughter] Should we get into the birds and the bees here? You’re my boss. Would you like to explain the birds and the bees to me? How does this work exactly? [laughter] Gideon Lichfield: Are you being sassy? [Laughter] Lauren Goode: We should also probably let the audience know that we both happen to be child-free people. Gideon Lichfield: That is true. Lauren Goode: So please do not come for us with the pitchforks if we talk about what it must be like to have children. OK, so yes, so you are rolling the— Gideon Lichfield: But let’s get back to it. Lauren Goode: You’re rolling the genetic dice, correct. Like, a lot of things could go wrong, and particularly if you have children when you are at advanced age for reproducing. Gideon Lichfield: And if you know exactly what DNA is going into your offspring, you’re taking less of a gamble. Is it narcissistic? Sure, or certainly—let’s put it this way—a lot of very narcissistic people will probably want to have kids that way, and maybe a lot of those offspring will not be such boons to humanity. And frankly, for that matter, Andrew doesn’t know that the genetic copy of himself that’s born in 200 years will be a nice well-meaning scientifically minded person who’s trying to cure humanity’s ills. They might be a monster. Lauren Goode: Right, and I don’t wanna conflate having children with cloning. I think the cloning thing is really what’s stuck in my brain right now. Although he did say, you asked him about children and he said, well, they’re not mutually exclusive. He would like to have had 10 children but also he would like the idea of a clone in the future. Gideon Lichfield: Right. So, again, to play devil’s advocate, if you are willing to say that it’s OK to have kids, then what is wrong with having clones? It feels weird and icky and it’s narcissistic and all those things, and yet I think when you pull it apart, I find it hard to make an argument against it. Lauren Goode: OK, interesting. Would you clone yourself? Gideon Lichfield: That’s an interesting question. I’ve never had a strong desire to have kids, and I feel like, for the same reason, I should not have a strong desire to have a clone. In other words, the argument I’m making is that I think these are basically the same thing. You are causing another human being to be born, and you have a certain responsibility to that human being, I think, if you do that. If I were to set up a clone with a fund 200 years from now, maybe the biggest ethical argument against that is I have no idea what the world is gonna be like 200 years from now. And the present me transported 200 years into the future might look at that world and say, “Hell no. I don’t want any child born into this world, at least I don’t want to have the responsibility for bringing a child into this world.” Then there’s a whole other problem which is, the way we bring up children right now is they are born into a family, and so they have a structure around them, and they have relatives, and they have all of that. And if you simply seed a test tube baby to be born 200 years from now, they may have all the money in the world, but if they don’t have a family around them, what does that mean for their upbringing? Of course, maybe the world of 200 years from now will have solved that problem too.
Meta’s Open Source Llama Upsets the AI Horse Race
Meta’s license for Llama 2 also requires companies with more than 700 million monthly active users to establish a separate license agreement with Meta. It is not clear why, but the clause creates a barrier to other tech giants building on the system. The model also comes with an acceptable use policy, which prohibits generating malicious code, promoting violence, or enabling criminal activity, abuse, or harassment. Meta did not respond to a question about what actions it might take if Llama 2 was used in breach of that policy. Jon Turow, an investor at Madrona Ventures in Seattle, says Meta’s pivot from trying to restrict distribution of the first Llama model to open-sourcing the second could enable a new wave of creativity using large language models. “Developers and entrepreneurs are very resourceful, and they are going to find out what they can squeeze out of Llama 2,” he says. Turow likens Meta’s choice to release Llama 2 this month to Google introducing the Android mobile operating system in 2007 to rival Apple’s iOS. By giving away a cheap but powerful alternative, Meta can become a counterbalance to proprietary systems like the kind developed by OpenAI, sparking innovation that could feed back ideas that help improve Meta products and services. Llama 2 is the first openly released model on par with ChatGPT, says Nathan Lambert, an AI researcher at Hugging Face, a startup that releases open source machine-learning software, including generative models. He doesn’t consider the project truly open source, because of Meta’s limited disclosures about its development, but he is astonished by the number of Llama 2 variations he sees in his social media feed. One example is the latest version of WizardLM, an AI system, similar to ChatGPT, designed to follow complex instructions. Eight out of 10 models trending currently on Hugging Face, a number of which are made to generate conversational text, are variations of Llama 2. “I think there’s a case to be made that Llama 2 is the biggest event of the year in AI,” Lambert says. He says proprietary models have the advantage today, but he believes that later versions of Llama will catch up and, before long, will be able to perform most tasks that people turn to ChatGPT for today. Lambert also says the Llama 2 release leaves a number of questions unanswered, in part due to the lack of documentation of training data. And it will still remain the case that only major players like Meta, Google, Microsoft, and OpenAI will have the computing resources and staff needed to make leading large language models. But he is hopeful that, despite the the success of OpenAI’s proprietary approach, language models are shifting into an era of transparency. A voluntary agreement between the White House and seven major AI companies calls for tests of things like potential for discrimination or impact to society or national security before deployment. It’s a trend that could be challenged by growing questions about legal liability for AI systems and increasing regulatory pressure from politicians, who fear that malicious actors will start using open source models. Like Demis Hassabis, the AI researcher now leading Google’s AI development, Turow disagrees with the assertion made by the leaked Google memo that it and other major AI companies are threatened by open source AI. He thinks data, talent, and access to computing power will continue to protect the biggest tech companies—but not make them invincible. He’s now watching to see what startups and researchers do with Llama 2, expecting to see them rapidly improve it, as happened with the first iteration of Meta’s model. He says that should create new possibilities for both startups and the broader field of AI. “We’re seeing open source continually get better and better, so there may be surprises that upset the early leaders,” Turow says. “I don’t know what will happen.”
Best Material for Restaurant Patio Furniture
The finest commercial patio furniture for restaurants combines durability, reliability, and quality. Frequently, people make the mistake of buying outdoor furniture just for decorative purposes. While having stylish outdoor furniture sets for your home or place of business is excellent, the main priority should be making sure they are durable. Please continue reading for more information on the materials we suggest utilizing for outdoor restaurant furniture. How Come Material is so Important? When choosing outdoor furniture for your restaurant, material selection is crucial. Whether pouring rain outside or scorching hot inside, the furniture you pick must endure all conditions. Whether you need to supply a vast beer garden or just a foldaway bistro set for a small patio area, choosing a suitable material for the weather is essential. The type of material you use is less important if your furniture will be stored. However, only buy lightweight furniture if you know it will constantly be outside. Popular Outdoor Use Material Metal, stainless steel, wood, and aluminum are the finest options for outdoor furniture. If you know what you want, it’s easy to find the table you wish in various materials: aluminum dining furniture or wooden booth seats. Although it has been said that wood is often thought to be the most extraordinary material for outdoor use, this depends on the climate to which your furniture will be subjected. We’ve included an extensive examination of each material’s resistance to exposure to the elements and the critical information about it. Keep reading if you’ve decided about the furnishings for your outside space. Wood Due Wood is the most frequently utilized outdoors due to its inherent beauty, superior strength, and long lifetime. Beer gardens usually include wooden furniture because bar owners want to fill large spaces with affordable, stylish furnishings. Wooden furniture is an excellent choice if you need to live in wet conditions because it is typically covered in waterproof resin. Wooden furniture can survive intense hurricanes because of its weight and sturdy table base. Steel Stainless steel is frequently utilized outside of cafes and restaurants. Steel furniture may be improved by adding soft fabric accents and seat coverings. Thankfully, steel has a chromium oxide covering that shields it from rust and corrosion, keeping it from deteriorating after heavy rain. Tables and chairs may be stacked, and stainless steel furniture is functional, versatile, and easy to store. Another benefit is how easy it is to clean furniture made of stainless steel. Metal Metal was one of the earliest materials used for outdoor furniture. The strength of the metal is excellent for people who want to be sure that their furniture will stay in place. It is possible to customize and change things with metal furniture by coating or spraying it, and it will still look amazing. For instance, stainless steel cannot be used for this. Metal furniture’s major flaw is that it rusts more quickly than other materials, making it the least desirable choice for houses in humid areas. Aluminum If appropriately manufactured, aluminum furniture shouldn’t rust. Since they are lightweight and movable, aluminum chairs, tables, and bar stools are famous for business outdoor furniture. This makes them perfect if you frequently rearrange your outside area. We suggest utilizing aluminum in colder areas and avoiding lengthy exposure to sunlight because it is a recognized heat conductor compared to other materials.
Windows: This new crypto-based malware campaign targets macOS, Windows users
A new cryptocurrency-based malware campaign is reportedly targeting PC users. According to a report by Bleeping Computer, the malware was discovered by security researcher iamdeadlyz. Hackers are using this campaign to distribute malware to both Windows and macOS users in the form of fake blockchain games. These fake games have names like Brawl Earth, WildWorld, Dawnland, Destruction, Evolion, Pearl, Olymp of Reptiles, and SaintLegend.The report also mentions that the newMac malware named “Realst” is being used to target Apple computers. Some of the latest variants of the malware also include support for the upcoming macOS 14 Sonoma which is still in beta. As per the report, cybercriminals are promoting these games on social media. Hackers are using direct messages to share access codes which are needed to download these fake game clients from associated websites. Why hackers are using access codes for these gamesAccess codes are helping cyber attackers to check the users that they want to target and prevent security researchers from detecting their malicious intentions. These game installers then infect targeted devices with information-stealing malware. For Windows, hackers are using the RedLine Stealer malware while Realst is for macOS users. Another security researcher named SentinelOne analysed 59 Mach-O samples of the Realst malware that were already discovered. The analysis focused on the macOS versions of each sample and several ds How this malware campaign is affecting macOS usersWhenever users try to download a fake game from the cybercriminal’s site, they are being offered either Windows or macOS malware, depending on their OS. The Realst info-stealing malware targets Mac devices as PKG installers or DMG disk files. These files don’t include any real games or other decoy software, they just contain malicious Mach-O files. One of the files is a cross-platform Firefox-based data stealer while the other one is an open-source macOS keychain database password, keys, and certificates extractor. The researcher also found that some samples are codesigned using valid (now revoked) Apple Developer IDs or ad-hoc signatures, to bypass detection from security tools.What Mac users should do to protect themselves from this malware campaignThe report has also advised macOS users to be cautious with blockchain games. Hackers are distributing Realst using Discord channels and “verified” Twitter accounts to make them look legitimate. Moreover, it is important to note that these games specifically target cryptocurrency users. The main goal of these games is to steal crypto wallets and the funds within them, which can cost investors a lot.
The White House Already Knows How to Make AI Safer
Second, it could instruct any federal agency procuring an AI system that has the potential to “meaningfully impact [our] rights, opportunities, or access to critical resources or services” to require that the system comply with these practices and that vendors provide evidence of this compliance. This recognizes the federal government’s power as a customer to shape business practices. After all, it is the biggest employer in the country and could use its buying power to dictate best practices for the algorithms that are used to, for instance, screen and select candidates for jobs. Third, the executive order could demand that anyone taking federal dollars (including state and local entities) ensure that the AI systems they use comply with these practices. This recognizes the important role of federal investment in states and localities. For example, AI has been implicated in many components of the criminal justice system, including predictive policing, surveillance, pre-trial incarceration, sentencing, and parole. Although most law enforcement practices are local, the Department of Justice offers federal grants to state and local law enforcement and could attach conditions to these funds stipulating how to use the technology. Finally, this executive order could direct agencies with regulatory authority to update and expand their rulemaking to processes within their jurisdiction that include AI. Some initial efforts to regulate entities using AI with medical devices, hiring algorithms, and credit scoring are already underway, and these initiatives could be further expanded. Worker surveillance and property valuation systems are just two examples of areas that would benefit from this kind of regulatory action. Of course, the testing and monitoring regime for AI systems that I’ve outlined here is likely to provoke a range of concerns. Some may argue, for example, that other countries will overtake us if we slow down to implement such guardrails. But other countries are busy passing their own laws that place extensive restrictions on AI systems, and any American businesses seeking to operate in these countries will have to comply with their rules. The EU is about to pass an expansive AI Act that includes many of the provisions I described above, and even China is placing limits on commercially deployed AI systems that go far beyond what we are currently willing to consider. Others may express concern that this expansive set of requirements might be hard for a small business to comply with. This could be addressed by linking the requirements to the degree of impact: A piece of software that can affect the livelihoods of millions should be thoroughly vetted, regardless of how big or how small the developer is. An AI system that individuals use for recreational purposes shouldn’t be subject to the same strictures and restrictions. There are also likely to be concerns about whether these requirements are practical. Here again, it’s important not to underestimate the federal government’s power as a market maker. An executive order that calls for testing and validation frameworks will provide incentives for businesses that want to translate best practices into viable commercial testing regimes. The responsible AI sector is already filling with firms that provide algorithmic auditing and evaluation services, industry consortia that issue detailed guidelines vendors are expected to comply with, and large consulting firms that offer guidance to their clients. And nonprofit, independent entities like Data and Society (disclaimer: I sit on their board) have set up entire labs to develop tools that assess how AI systems will affect different populations. We’ve done the research, we’ve built the systems, and we’ve identified the harms. There are established ways to make sure that the technology we build and deploy can benefit all of us while reducing harms for those who are already buffeted by a deeply unequal society. The time for studying is over—now the White House needs to issue an executive order and take action. WIRED Opinion publishes articles by outside contributors representing a wide range of viewpoints. Read more opinions here. Submit an op-ed at ideas@wired.com.