How can data centers use 100% renewable electricity?
The first step has been to offset. This is followed by matching usage with like-for-like energy purchases somewhere. The final stage is direct consumption of locally generated renewables, either in real time or stored from recent generation. So the next time you see a tech company announcing a huge renewables project, you should look to see exactly what that mean and where that energy will really go. New renewables are good, but whether that energy is actually powering the company operations directly is another question.
(tags: datacenters renewables energy power climate-change green offsetting)
Critical Bluetooth Vulnerability in Android (CVE-2020-0022) – BlueFrag
On Android 8.0 to 9.0, a remote attacker within proximity can silently execute arbitrary code with the privileges of the Bluetooth daemon as long as Bluetooth is enabled. No user interaction is required and only the Bluetooth MAC address of the target devices has to be known. For some devices, the Bluetooth MAC address can be deduced from the WiFi MAC address. This vulnerability can lead to theft of personal data and could potentially be used to spread malware (Short-Distance Worm). On Android 10, this vulnerability is not exploitable for technical reasons and only results in a crash of the Bluetooth daemon.