リーディングビュー

Amazon is Ending Its Palm ID System for Retail, Amazon One, as It Closes Physical Stores

🤖 AI Summary

**要約(日本語)**

- **Amazon Oneのサービス終了**
- Amazonは、店舗向けの手掌認証システム「Amazon One」を2026年6月3日をもって終了することを発表。
- 終了の理由は「顧客利用が限定的だった」ためで、サービス停止後はすべての利用者データを安全に削除する。

- **実店舗事業の縮小と連動**
- 同時に、全米のAmazon Go・Amazon Fresh店舗(計72店)をすべて閉店する方針を示した。
- 今後はWhole Foods Marketへの注力と、Amazon.com経由の食料品配達にリソースをシフトする。

- **Amazon Oneの概要**
- 2020年に導入され、会員が手のひらをかざすだけで店内入店や支払いができる仕組み。
- 主に「Just Walk Out」技術と組み合わせ、レジ不要で買い物できる体験を提供していたが、利用者が伸びなかった。

**結論**
Amazonは実店舗実験の大幅な見直しの一環として、手掌認証サービスと多くの実店舗を閉鎖し、デジタル・物流中心の事業へと再集中する方針です。
Amazon is discontinuing its Amazon One palm recognition ID system for stores later this year, the company informed users. From a report: The company will discontinue Amazon One services at retail businesses on June 3, 2026, according to a support page for the service and email messages to customers. "In response to limited customer adoption, we're discontinuing Amazon One, our authentication service for facility access and payment," an Amazon spokesperson said. "All customer data associated with Amazon One will be securely deleted after the service ends." The move coincides with a sweeping pullback from Amazon's physical retail experiments. Amazon announced Tuesday that it's closing all of its Amazon Go and Amazon Fresh locations, a total of 72 stores nationwide, concentrating its efforts instead on its Whole Foods Market locations and grocery delivery from Amazon.com. Amazon One launched in 2020 as a way to help speed up in-store entry and payments, identifying customers who opted-in and eliminating the need for them to present a credit card to pay. It often worked in conjunction with the company's Just Walk Out technology, which uses cameras and sensors to let customers avoid using a checkout line.

Read more of this story at Slashdot.

  •  

SoundCloud Data Breach Impacts 29.8 Million Accounts

🤖 AI Summary

**サマリー(日本語)**

- **被害規模**:SoundCloudで約2,980万件(全ユーザーの約20%)のアカウント情報が流出。
- **流出データ**:メールアドレスと、公開プロフィールにすでに掲載されていた情報のみ。パスワードや金融情報は含まれなかった。
- **発覚と対応**:不正アクセスは12月15日に確認され、VPN経由で「403 Forbidden」エラーが多数報告されたことから、SoundCloudはインシデント対応手順を発動。調査の結果、機密データは取得されていないことを公表。
- **攻撃者**:ShinyHuntersという身代金要求を行うハッカー集団が関与。攻撃後、同集団はSoundCloud自体やユーザー、従業員、パートナーに対してメール大量送信による嫌がらせと身代金要求を実施。
- **公式声明**:1月15日のアップデートで、脅威アクターが「要求を行い、メールでの嫌がらせを行った」ことを認め、被害はメールアドレスと公開情報に限定されると再確認した。

**要点**:パスワードや金銭情報は漏えていないものの、膨大な数のメールアドレスが外部に流出し、ShinyHuntersによる extortion(身代金要求)とメール嫌がらせが問題となった。SoundCloudはインシデント対応を行い、被害内容を公表している。
A data breach at SoundCloud exposed information tied to 29.8 million user accounts, according to Have I Been Pwned. While SoundCloud says no passwords or financial data were accessed, attackers mapped email addresses to public profile data and later attempted extortion. BleepingComputer reports: The company confirmed the breach on December 15, following widespread reports from users who were unable to access SoundCloud and saw 403 "Forbidden" errors when connecting via VPN. SoundCloud told BleepingComputer at the time that it had activated its incident response procedures after detecting unauthorized activity involving an ancillary service dashboard. "We understand that a purported threat actor group accessed certain limited data that we hold," SoundCloud said. "We have completed an investigation into the data that was impacted, and no sensitive data (such as financial or password data) has been accessed. The data involved consisted only of email addresses and information already visible on public SoundCloud profiles." While SoundCloud didn't provide further details regarding the incident, BleepingComputer learned that the breach affected 20% of all SoundCloud users, roughly 28 million accounts based on publicly reported user figures (SoundCloud later published a security notice confirming the information provided by BleepingComputer's sources). After the breach, BleepingComputer also learned that the ShinyHunters extortion gang was responsible for the attack, with sources saying that the threat group was also attempting to extort SoundCloud. This was confirmed by SoundCloud in a January 15 update, which said the threat actors had "made demands and deployed email flooding tactics to harass users, employees, and partners."

Read more of this story at Slashdot.

  •  
❌