IndyWatch Science and Technology News Feed Archiver

Go Back:30 Days | 7 Days | 2 Days | 1 Day

IndyWatch Science and Technology News Feed Today.

Go Forward:1 Day | 2 Days | 7 Days | 30 Days

IndyWatch Science and Technology News Feed was generated at World News IndyWatch.

Sunday, 25 February


This 3D-Printed Robotic Vacuum Sucks "IndyWatch Feed Tech"

After youve taken a moment to ponder the turn of phrase used in the title, take a look at this scratch-built robotic vacuum created by [theking3737]. The entire body of the vacuum was 3D printed, and all of the internal electronics are off-the-shelf modular components. We cant say how well it stacks up against the commercial equivalents from iRobot and the like, but it doesnt look like it would be too hard to build one yourself to find out.

The body of this rather concerned-looking robot was printed on a DMS DP5 printer, which is a neat trick as it only has a build platform of 200 mm x 200 mm. Once all the pieces were printed, a 3D pen was used to weld the sections together. The final result looks a bit rough, but should give a bond thats just as strong as the printed parts themselves.

The robot has four sets of ultrasonic range finders to detect walls and obstacles, though probably not in the positions you would expect. The right side of the robot has two sets of sensors, while the left side only gets one. We arent sure the reasoning behind the asymmetrical layout, but presumably the machine prefers making right turns.

Control is provided...


Trumps Back to the Moon Directive Leaves Some Scientists with Mixed Feelings "IndyWatch Feed Tech"

While some planetary scientists are enthusiastic about Trumps proposal to send astronauts to the moon before Mars, others are leery about what it could cost or if it will happen.


Elon Musk Reveals Personal Crypto Holdings "IndyWatch Feed Tech"

Elon Musk has revealed his personal cryptocurrency holdings.

The billionaire CEO of SpaceX and Tesla told Twitter followers that he in fact has never purchased cryptocurrency, and only holds a small amount of Bitcoin gifted by a friend.

Not sure. I let @jack know, but its still going. I literally own zero cryptocurrency, apart from .25 BTC that a friend sent me many years ago.


Apple Moves to Store iCloud Keys in China, Raising Human Rights Fears "IndyWatch Feed Tech"

Via: Reuters: When Apple Inc begins hosting Chinese users iCloud accounts in a new Chinese data center at the end of this month to comply with new laws there, Chinese authorities will have far easier access to text messages, email and other data stored in the cloud. Thats because of a change to how the []


U.S. has 62nd Ranking in LTE Speeds in the World, about 1/3 the Speed of Singapore "IndyWatch Feed Tech"

According to OpenSignal's latest State of LTE report, the average 4G download speed in the United States was 16.31 Mbps in Q4 2017. That's little more than a third of the speed that mobile device users in Singapore enjoy and ranks the U.S. at a disappointing 62nd place in the global ranking.
Where Smartphone Users Surf the Fastest

The Full Open Signal Report, The State of LTE (February 2018):

Original Submission

Read more of this story at SoylentNews.


Top The Pirate Bay Alternatives Best Torrent Download Sites (2018) "IndyWatch Feed Tech"

By Waqas

The Pirate Bay (TPB) is one of the most visited

This is a post from Read the original post: Top The Pirate Bay Alternatives Best Torrent Download Sites (2018)


Physicists Have Confirmed a Pear-Shaped Nucleus, And It Could Ruin Time Travel Forever "IndyWatch Feed Tech"

Physicists have confirmed the existence of a new form of atomic nuclei, and the fact that its not symmetrical challenges the fundamental theories of physics that explain our Universe.

But thats not as bad as it sounds, because the 2016 discovery could help scientists solve one of the biggest mysteries in theoretical physics where is all the dark matter? and could also explain why travelling backwards in time might actually be impossible.

Weve found these nuclei literally point towards a direction in space. This relates to a direction in time, proving theres a well-defined direction in time and we will always travel from past to present, Marcus Scheck from the University of the West of Scotland told Kenneth MacDonald at BBC News at the time.


Delightful Electromechanical Build Of A Jet Engine Model "IndyWatch Feed Tech"

[InterlinkKnight]s jet engine model is a delight to behold and to puzzle out. Many of us have been there before. We know how to build something, we know its not the most up-to-date approach, but we just cant help ourselves and so we go for it anyway. The result is often a fun and ingenious mix of the mechanical and the electrical. His electric jet engine model is just that.

Being a model, this one isnt required to produce any useful thrust. But hes made plenty of effort to make it behave as it should, right down to adding a piece of plastic to rub against a flywheel gear in order to produce the perfect high-pitched sound, not to forget the inclusion of the flywheel itself to make the turbine blades gradually slow down once the motors been turned off. For the N1 gauge (fan speed gauge) he built up his own generator around the motor shaft, sending the output through rectifying diodes to a voltmeter.

But the most delightful of all has to be the mechanical linkages for the controls. The controls consist of an Engine Start switch, Fuel Control switch and a throttle lever and are all built around a rheostat which controls the motor speed. The linkages are not pretty, but you have to admire his cleverness and just-go-for-it attitude. He must have done a lot of head scratching while getting it to all work together. We especially like how flipping the Fuel Control switch from cutoff to run levers the rheostat with respect to its dial just a little, to give a bit of extra power to the engine. See if you can puzzle it out in his Part 3 video below where he removes the cover and walks through it all.

Now if youre looking for a working jet engine then check out this bike mounted one.

This ones been around for a few months and we cant b...


Report On Device Encryption Suggests A Few Ways Forward For Law Enforcement "IndyWatch Feed Tech"

Techdirt covers a new paper published by the US National Academies of Science, Engineering, and Medicine regarding the general access that the FBI and DOJ want to encrypted communications.

Another paper has been released, adding to the current encryption discussion. The FBI and DOJ want access to the contents of locked devices. They call encryption that can be bypassed by law enforcement "responsible encryption." It isn't. A recent paper by cryptograpghy expert Riana Pfefferkorn explained in detail how irresponsible these suggestions for broken or weakened encryption are.

This new paper [PDF] was put together by the National Academies of Science, Engineering, and Medicine. (h/t Lawfare) It covers a lot of ground others have and rehashes the history of encryption, along with many of the pro/con arguments. That said, it's still worth reading. It raises some good questions and spends a great deal of time discussing the multitude of options law enforcement has available, but which are ignored by FBI officials when discussing the backdoors/key escrow/weakened encryption they'd rather have.

The paper's suggestions have not been rigorously investigated by those with domain expertise, yet.

Source : Report On Device Encryption Suggests A Few Ways Forward For Law Enforcement

Original Submission

Read more of this story at SoylentNews.

Go Back:30 Days | 7 Days | 2 Days | 1 Day

IndyWatch Science and Technology News Feed Today.

Go Forward:1 Day | 2 Days | 7 Days | 30 Days

Saturday, 24 February


These Small PCBs are Made for Model Rocketry "IndyWatch Feed Tech"

Model rocketry hobbyists are familiar with the need to roll their own solutions when putting high-tech features into rockets, and a desire to include a microcontroller in a rocket while still keeping things flexible and modular is what led [concretedog] to design a system using 22 mm diameter stackable PCBs designed to easily fit inside rocket bodies. The system uses a couple of 2 mm threaded rods for robust mounting and provides an ATTiny85 microcontroller, power control, and an optional small prototyping area. Making self-contained modular sleds that fit easily into rocket bodies (or any tube with a roughly one-inch inner diameter) is much easier as a result.

The original goal was to ease the prototyping of microcontroller-driven functions like delayed ignition or altimeter triggers in small Estes rockets, but [concretedog] felt there were probably other uses for the boards as well and made the design files available on GitHub. (Thanks!)

We have seen stackable PCBs for rocketry before with the amazingly polished M3 Avionics project, but [concretedog]s design is much more accessible to some hobbyist-level tinkering; especially since the ATTiny85 can be programmed using the Arduino IDE and the boards themselves are just an order from OSH Park away.

[via Dangerous Prototypes Blog]



Algorithm Creates "Movies" From Text Descriptions "IndyWatch Feed Tech"

A machine learning algorithm has created tiny (6464 pixels) 32-frame videos based on text descriptions:

The researchers trained the algorithm on 10 types of scenes, including "playing golf on grass," and "kitesurfing on the sea," which it then roughly reproduced. Picture grainy VHS footage. Nevertheless, a simple classification algorithm correctly guessed the intended action among six choices about half the time. (Sailing and kitesurfing were often mistaken for each other.) What's more, the network could also generate videos for nonsensical actions, such as "sailing on snow," and "playing golf at swimming pool," the team reported this month at a meeting of the Association for the Advancement of Artificial Intelligence in New Orleans, Louisiana.

[...] Currently, the videos are only 32 frames longlasting about 1 secondand the size of a U.S. postage stamp, 64 by 64 pixels. Anything larger reduces accuracy, says Yitong Li, a computer scientist at Duke University in Durham, North Carolina, and the paper's first author. Because people often appear as distorted figures, a next step, he says, is using human skeletal models to improve movement.

Tuytelaars also sees applications beyond Hollywood. Video generation could lead to better compression if a movie can be stored as nothing but a brief description. It could also generate training data for other machine learning algorithms. For example, realistic video clips might help autonomous cars prepare for dangerous situations they would not frequently encounter. And programs that deeply understand the visual world could spin off useful applications in everything from refereeing to surveillance. They could help a self-driving car predict where a motorbike will go, for example, or train a household robot to open a fridge, Pirsiavash says.

An AI-generated Hollywood blockbuster may still be beyond the horizon, but in the meantime, we finally know what "kitesurfing on grass" looks like.

Original Submission

Read more of this story at SoylentNews.


UVD-Based HEVC Video Encoding Main Now Supported In Mesa 18.1 "IndyWatch Feed Tech"

Earlier this month AMD developers landed VCN-powered video encode support for the HEVC main format while now this has come to the UVD engine so it will work with pre-Raven GPUs...


Tiny Light-Activated Gold-Covered Nanowires Can Make Neurons Fire "IndyWatch Feed Tech"

Researchers at the University of Chicago have developed light-activated nanowires that can stimulate neurons to fire when they are exposed to light. The researchers hope that the nanowires could help in understanding complex brain circuitry, and they may also be useful in treating brain disorders.

Optogenetics, which involves genetically modifying neurons so that they are sensitive to a light stimulus, has attracted a lot of attention as a research tool and potential therapeutic approach. However, some researchers have misgivings about optogenetics, as it involves inserting a gene into cells, potentially opening the door to unforeseen effects and possibly permanently altering treated cells.

In an effort to develop an alternative, a research team at the University of Chicago has devised a new modality that can enable light activation of neurons without the need for genetic modification. Their technique involves nanowires that are so small that if they were laid side-by-side, hundreds of them would fit on the edge of a sheet of paper. Although initially designed for use in solar cells, their small size also makes them well suited to interacting with cells.


Copyright Holders Call Out Costa Rica Over "IndyWatch Feed Tech"

The International Intellectual Property Alliance (IIPA) has submitted its latest submission for the U.S. Governments 2018 Special 301 Review, pinpointing countries it believes should better protect the interests of the copyright industry.

The IIPA, which includes a wide range of copyright groups including the MPAA, RIAA, BSA, and ESA, has listed its complaints against a whole host of countries.

Canada is prominently discussed, of course, as are Argentina, China, India, Mexico, Switzerland and many others. The allegations are broad, ranging from border protection problems to pirate site hosting and everything in between.

What caught our eye, however, was a mention of This domain name which, unlike the name suggests, sports a KickassTorrents logo, uses the Costa Rican Top Level Domain .cr.

While its a relatively small player in the torrent site ecosystem, it appears to be of great concern in diplomatic circles.

Previously, the U.S. Embassy in Costa Rica threatened to have the countrys domain registry shut down unless it suspended This hasnt happened, yet, but it was a clear signal.

In the IIPAs recent submission to the USTR, the domain is also brought into play. The copyright holders argue that Costa Rica is not living up to its obligations under the CAFTA-DR trade agreement.

One of the key DR-CAFTA obligations that has not been implemented is introducing clear rules on copyright, liability, as well as providing meaningful legal incentives for inter-industry cooperation to deal with online infringements, the IIPA writes.

Instead, Costa Ricas law offers largely unconditional liability exceptions to Internet Service Providers (ISPs) and others, even allowing identified infringing activity to remain on their systems for as long as 45 days.

Next, it puts a spotlight on the local domain registry, which it described as a safe haven for sites including

There are still many instances where the Costa Rican Top Level Domain (ccTLD) registry has provided a safe haven to notorious online enterprises dedicated to copyright infringement, IIPA writes.

For example, doma...


Links 24/2/2018: Npm Bug, Mycroft AI on Plasma "IndyWatch Feed Tech"

GNOME bluefish



  • Purism

    • February 2018 coreboot update now available

      Hey everyone, Im happy to announce the release of an update to our coreboot images for Librem 13 v2 and Librem 15 v3 machines.

      All new laptops will come pre-loaded with this new update, and everyone else can update their machines using our existing build script which was updated to build the newest image. Some important remarks:

    • Purism Releases Updated Coreboot Images For Their Laptops

      Purism has released updated Coreboot images for their Librem 13 v2 and Librem 15 v3 laptops.

      The updated Coreboot images are now re-based to Coreboot 4.7, Intel FSP 2.0, IOMMU (VT-d) support is now available, TPM support is also enabled, and there are fixed ATA errors for 6Gbps speeds.

    • New Inventory with TPM by Default, Free International Shipping

      In November, we announced the availability of our Trusted Platform Module...


San Francisco's Community Broadband Could Solve Net Neutrality and Privacy Issues "IndyWatch Feed Tech"

San Francisco: Building Community Broadband to Protect Net Neutrality and Online Privacy

Like many cities around the country, San Francisco is considering an investment in community broadband infrastructure: high-speed fiber that would make Internet access cheaper and better for city residents. Community broadband can help alleviate a number of issues with Internet access that we see all over America today. Many Americans have no choice of provider for high-speed Internet, Congress eliminated user privacy protections in 2017, and the FCC decided to roll back net neutrality protections in December.

This week, San Francisco published the recommendations of a group of experts, including EFF's Kit Walsh, regarding how to protect the privacy and speech of those using community broadband.

This week, the Blue Ribbon Panel on Municipal Fiber released its third report, which tackles competition, security, privacy, net neutrality, and more. It recommends San Francisco's community broadband require net neutrality and privacy protections. Any ISP looking to use the city's infrastructure would have to adhere to certain standards. The model of community broadband that EFF favors is sometimes called "dark fiber" or "open access." In this model, the government invests in fiber infrastructure, then opens it up for private companies to compete as your ISP. This means the big incumbent ISPs can no longer block new competitors from offering you Internet service. San Francisco is pursuing the "open access" option, and is quite far along in its process.

Original Submission

Read more of this story at SoylentNews.


Gnter Blobel Solved a Mystery of Cell Biology: How Proteins Navigate the Body "IndyWatch Feed Tech"

The Germany-born scientist, who arrived in the U.S. in 1962 and never left, was an opera-loving bon vivant who would have stood out in any field. His discovery of how proteins navigate the body provided a foundation for todays research into treatments for cancer and myriad other diseases.


Chicago-Cleveland hyperloop transit proposed "IndyWatch Feed Tech"

Visit Crains Chicago Business for complete business news and analysis including healthcare, real estate, manufacturing, government, sports and more.


Fully 3D Printed Nerf Thirst Zapper "IndyWatch Feed Tech"

In case you werent aware, there is a whole community out there that revolves around customizing NERF guns. In that community is a subculture that builds their own NERF guns, and within that group is a sub-subculture that 3D prints NERF guns. So next time you are contemplating how esoteric your little corner of the hacking world is, keep that in mind.

Anyway, [Wesker] is currently making his way in the world of 3D printed one-off NERF guns, and has unveiled his latest creation: a fully 3D printed Thirst Zapper from Fallout 4. Except for the springs, each and every piece of this gun was printed on his CR-10 printer. You could even wind your own springs if you really wanted to, and keep the whole thing in-house. Because if youre going to do something this niche, you might as well go all in.

Even if you arent a member of the NERF-elite, the video [Wesker] has put together for this project is a fantastic look at what it takes to design, print, and finish a custom build. From creating the model to mixing the paint to match the in-game model, this video has a little something for everyone.

This isnt the first time weve cove...


RADV Vulkan Driver Improvements Coming For Wolfenstein 2 On Wine "IndyWatch Feed Tech"

Wolfenstein II: The New Colossus makes use of the Vulkan graphics API on the id Tech 6 engine but sadly remains Windows-only aside from the consoles. While it runs with Wine, there are some bugs when using the RADV Radeon Vulkan driver but fortunately one of Valve's Linux developers is working on some improvements...


AU Optronics to Ship 8K Panels to TV Manufacturers in H1 2018 "IndyWatch Feed Tech"

More 8K (4320p) TVs will be coming soon. AU Optronics has announced plans to ship 8K panels to TV manufacturers starting in the first half of 2018:

The lineup of panels featuring a 76804320 resolution will be aimed at ultra-high-end TVs and sizes will range from 65 to 85 inches, said Liao Wei-Lun, president of AUO's video products business group, at a press conference. The high-ranking executive did not disclose other specifications of the panels, such as luminance and contrast ratio, but given their positioning, it is logical to expect their characteristics to be comparable to 8K UHDTVs to be offered by LG and Samsung.

Multiple TV makers demonstrated various 8K UHDTVs at various trade shows in the recent years, but so far no one has started to sell them. Given the lack of content, it is hard to expect high demand for 8K televisions in the next couple of years, aside from the halo factor - nonetheless, AUO expects 8K panels to account for 10% of its '65-inch and above' panel shipments in 2020. The presumably high-cost of the panels would indicate that in terms of unit shipments this might still be a low-ish number. However, as with 4K displays, someone has to release 8K TVs to stimulate content providers to offer appropriate material. At this year's CES, Samsung demonstrated its Q9S, its first commercial 8K TV-set, but it did not announce its pricing or availability timeframe. LG and Sony also demonstrated their 8K TVs at CES 2018, but nothing is clear about their plans regarding these products.

[...] As for 8K displays for PCs, Dell is currently the only company to offer an 8K monitor (this one is based on a panel from LG, so the latter might introduce its own 8K display at some point). Philips last year promised to start shipments 328P8K monitor in 2018, so expect the product to hit the market in the coming months too.

Need something to watch on your 8K TV? How about the 2020 Olympics?

Also at DigiTimes.

Related: LG to Demo an 8K Resolution TV at the Consumer Electronics Show
Dell Announces First "Mass-Market" 8K Display
Philips Demos an 8K Monitor...


Use 1Password pwned password to verify if your password was leaked "IndyWatch Feed Tech"

By Waqas

1Passwords pwned password will check your password on the list

This is a post from Read the original post: Use 1Password pwned password to verify if your password was leaked


Chinas AI startups scored more funding than Americas last year "IndyWatch Feed Tech"

Of $15.2 billion invested in AI startups globally in 2017, 48 percent went to China and just 38 percent to America. So says a new report from CB Insights about the state of AI.

So long, America: Its the first time Chinas AI startups surpassed those in the US in terms of funding. While America still has more AI startups than China, theyre starting to lose out in striking equity deals: the US accounted for 77 percent of them in 2013, but that fell to 50 percent last year.

Fierce competition: AI startup investment rose 141 percent in 2017 compared with 2016but with 1,100 new startups appearing last year, AI appearing in business models everywhere, and Big Techs enterprise AI offerings gaining traction, its harder than ever to snag funds.


Microchip Introduces Tiny Cheap Linux Modules "IndyWatch Feed Tech"

Linux is in everything these days, and that means designers and engineers are crying out for a simple, easy-to-use module that simplifies the design of building a product to do something with Linux. The best example of this product category would probably be the Raspberry Pi Compute Module, followed by the C.H.I.P. Pro and its GR8 module. There are dozens of boards with Allwinner and Mali chips stuffed inside that can be used to build a Linux product, and the BeagleBone on a Chip is a fantastic product if you need Linux and want to poke pins really, really fast.

Now Microchip is rolling out with their answer to the Linux System on Module. The SAMA5D2 is a single chip in a BGA package with a small footprint that runs Linux. Its capable, its cheap, and if you want to put Linux in a project, this is your newest option.

The core product in this new Microchip lineup is the SAMA5D2 SIP, a system in package that puts an ARM Cortex-A5 CPU and DDR2 memory in a single BGA package that, with a cursory examination, looks easy enough to design a PCB around and reflow. There are four chips in this lineup, with 128 Mbit, 512 Mbit, and 1 Gbit of DDR2 memory. The 128 Mbit chip is meant for bare metal and RTOS applications, with the higher memory chips capable of running Linux at least as well as a repurposed router.

This chip is at the core of Microchips ATSAMA5D2 SOM, a system on module that adds power management (that only requires a single 3.3V supply), an Ethernet PHY, and boot memory into a single package thats effectively as hand-solderable as a QFN package. Its Linux on a Chip, or at least as close as weve gotten to such a concept.

Adding Linux to a project is hard, and while there are modules and systems that can do it, were always welcoming more options given to designers. While these modules and systems arent exactly cheap compared to a beefy ARM microcontroller the SIP starts at around $9, the SOM is available for $39 in 100-unit quantities this price is quite low compared to other Linux-on-Modules available.


Paypal issue allows disclosure of account balance and recent transactions "IndyWatch Feed Tech"

Paypal issue allows for enumeration of the last four digits of payment method and for the disclosure of account balance and recent transactions of any given PayPal account.


This post details an issue which allows for enumeration of the last four digits of payment method (such as a credit or debit card) and for the disclosure of account balance and recent transactions of any given PayPal account.

This attack was submitted to PayPals bug bounty program where it was classified as being out of scope, which is something that would admittedly be unavailing to refute since their program scope does not mention anything about attacks on their interactive voice response system.

PayPal ticket

Prerequisites and Reconnaissance

In order to get started, the attacker would require knowledge of two pieces of information pertaining to an account, which would be the e-mail address and phone number linked to it.

Armed with knowledge of the e-mail address and phone number linked to an account, the attacker would visit the Forgot Password page on PayPals website, and enter the e-mail address associated with the targeted account.

The attacker would then be presented with the type of card linked to the account, as well as the last two digits of the same.

PayPal - Forgot Password

Attacking the Interactive Voice Response System

On first glance, the interactive v...


Best Processors for Gaming 2018 "IndyWatch Feed Tech"

Every beginner gamer has this question in mind. What is the best processor for gaming? In this post, I am going to cover best cpu for gaming. These are best budget gaming processors. Intro to CPU in Computer Gaming The central processing unit, or CPU, is the very core of a computer. If a chip has []

The post Best Processors for Gaming 2018 appeared first on


Thanks to Consent Buried Deep in Sales Agreements, Car Manufacturers Are Tracking Tens of Millions of U.S. Cars "IndyWatch Feed Tech"

Via: BoingBoing: Millions of new cars sold in the US and Europe are connected, having some mechanism for exchanging data with their manufacturers after the cars are sold; these cars stream or batch-upload location data and other telemetry to their manufacturers, who argue that they are allowed to do virtually anything they want with this []


SpaceX Begins Starlink Satellite Broadband Trial "IndyWatch Feed Tech"

Via: cnet: A pair of small satellites named for an adventurous Belgian cartoon character could serve as proof of concept for an ambitious global broadband service envisioned by Elon Musk. After days of delays, a SpaceX Falcon 9 rocket carrying the two small satellites, newly dubbed Tintin A and B by Musk (but known more []


A Larger Role for Midwives Could Improve Deficient U.S. Care for Mothers and Babies "IndyWatch Feed Tech"

Via: ProPublica: In Great Britain, midwives deliver half of all babies, including Kate Middletons first two children, Prince George and Princess Charlotte. In Sweden, Norway and France, midwives oversee most expectant and new mothers, enabling obstetricians to concentrate on high-risk births. In Canada and New Zealand, midwives are so highly valued that theyre brought in []


36-Way Comparison Of Amazon EC2 / Google Compute Engine / Microsoft Azure Cloud Instances vs. Intel/AMD CPUs "IndyWatch Feed Tech"

Earlier this week I delivered a number of benchmarks comparing Amazon EC2 instances to bare metal Intel/AMD systems. Due to interest from that, here is a larger selection of cloud instance types from the leading public clouds of Amazon Elastic Compute Cloud, Microsoft Azure, and Google Compute Engine.


World Leaders Abandoning Human Rights: Amnesty International "IndyWatch Feed Tech"

Original URL: World leaders abandoning human rights: Amnesty

World leaders are undermining human rights for millions of people with regressive policies and hate-filled rhetoric, but their actions have ignited global protest movements in response, a rights group said.

US President Donald Trump, Russian leader Vladimir Putin, and China's President Xi Jinping were among a number of politicians who rolled out regressive policies in 2017, according to Amnesty International's annual human rights report published on Thursday.

The human rights body also mentioned the leaders of Egypt, the Philippines and Venezuela.

"The spectres of hatred and fear now loom large in world affairs, and we have few governments standing up for human rights in these disturbing times," Salil Shetty, Amnesty's secretary-general, said.

"Instead, leaders such as el-Sisi, Duterte, Maduro, Putin, Trump and Xi are callously undermining the rights of millions."

[...] The regressive approach to human rights adopted by a number of world leaders has, however, inspired new waves of social activism and protest, Amnesty said, highlighting the example of the Women's March in January last year, which began in the US before becoming a global protest.

Original Submission

Read more of this story at SoylentNews.


Construction Begins on Jeff Bezos $42 Million 10,000-Year Clock "IndyWatch Feed Tech"

Via: The Verge: Installation has finally begun on Jeff Bezos 10,000-year clock, a project that the Amazon CEO has invested $42 million in (along with a hollowed-out mountain in Texas that Bezos intends for a Blue Origin spaceport), with the goal of building a mechanical clock that will run for 10 millennia.


Unified Patents, With Help From PTAB, Succeeds at Disarming Patent Trolls; InterDigital and RPX See a Massive Decline in Income "IndyWatch Feed Tech"

Freezing the assets of patent trolls and patent sharks

Polar bears

Summary: Positive news about the rapid demise of small patent trolls, large (even publicly-traded) trolls, and entities like RPX which profit from troll activity

THE EPOs recklessness has caused an insurgence of patent trolls in Europe, whereas USPTO reforms have pushed back this ugly phenomenon, whose net effect is predation at the expense of productive industries.

Today and tomorrow well write about Section 101, Alice and PTAB. The latest developments continue to be positive.

Over the past few days, on Thursday and on Friday, Unified Patents wrote about its battles against patent trolls such as Uniloc. Unified Patents relies on PTAB and yesterday it said:

On February 23, 2018, the Patent Trial and Appeal Board (PTAB) instituted trial on all challenged claims in an IPR filed by Unified against U.S. Patent 8,838,976 owned and asserted by Uniloc Luxembourg S.A., a well-known NPE. The 976 patent, directed to an online service user authentication system, belongs to the Etchegoyen portfolio that Uniloc has asserted against Apple. The 976 was removed from the litigation following Unifieds IPR petition, although the litigation continues.

A day beforehand Unified Patents wrote about Leigh Rothschilds troll, which we wrote about several times before. This too was announced on the same date it had happened:

On February 22, 2018, the Patent Trial and Appeal Board (PTAB) instituted trial on all ch...


2,000 Computers at Colorado DOT were infected with the SamSam Ransomware "IndyWatch Feed Tech"

SamSam Ransomware hit the Colorado DOT, The Department of Transportation Agency Shuts Down 2,000 Computers after the infection.

SamSam ransomware made the headlines again, this time it infected over 2,000 computers at the Colorado Department of Transportation (DOT).

The DOT has shut down the infected workstations and is currently working with security firm McAfee to restore the ordinary operations. Officials confirmed the ransomware requested a bitcoin payment.

The Colorado Department of Transportation has ordered an estimated 2,000 employees to shut down their computers following a ransomware attack Wednesday morning. wrote the CBS Denver.

The CDOT spokesperson Amy Ford said employees were instructed to turn off their computers at the start of business Wednesday after ransomware infiltrated the CDOT network.

Were working on it right now, added Ford.

The good news is that crucial systems at the Colorado DOT such as surveillance cameras, traffic alerts were not affected by the ransomware.

David McCurdy, OITs Chief Technology Officer, issued the following statement:

Early this morning state security tools detected that a ransomware virus had infected systems at the Colorado Department of Transportation. The state moved quickly to quarantine the systems to prevent further spread of the virus. OIT, FBI and other security agencies are working together to determine a root cause analysis. This ransomware virus was a variant and the state worked with its antivirus software provider to implement a fix today. The state has robust backup and security tools and has no intention of paying ransomware. Teams will continue to monitor the situation closely and will be working into the night.

The Colorado DOT officials confirmed that the agency will not pay the ransom and it will restore data from backups.

The SamSam ransomware is an old threat, attacks were observed in 2015 and the list of victims is long, many of them belong to the healthcare industry. The attackers spread the malware by gaining access to a companys internal networks by brute-forcing RDP connections.

Among the victims of the Samsam Ransomware there is the MedStar non-profit group that manages 10 hospitals in the Baltimore and Washington area. Crooks behind the attack on...


Youve Never Seen A Flipping Eyeball Like This One! "IndyWatch Feed Tech"

Inspired by some impressive work on textile flip-bit displays, and with creative steampunk outfits to create for Christmas, [Richard Sewell] had the idea for a flippable magnetic eye in the manner of a flip-dot display. These devices are bistable mechanical displays in which a magnet is suspended above a coil of wire, and flipped in orientation under the influence of a magnetic field from the coil.

In [Richard]s case the eyeball was provided by a magnetic bead with a suitable paint job, and the coil was a hand-wound affair with some extremely neat lacing to keep it all in place. The coil requires about 200 mA to ensure the eye flips, and the job of driving it is performed by a Digispark ATTiny85 board with an LM293 dual H-bridge driver upon which the two bridges are wired in parallel. The whole is mounted in the centre of a charity shop brooch that has been heat-treated to give a suitable aesthetic.

You can see the eyeball in all its glory in the two videos below the break, and should you be curious you can also read our write-up of the original pieces from [Irene Posch] that inspired it.

And here they eye is in close-up.


Generic FBDEV Emulation Continues To Be Worked On For DRM Drivers "IndyWatch Feed Tech"

Noralf Trnnes has spent the past few months working on generic FBDEV emulation for Direct Rendering Manager (DRM) drivers and this week he volleyed his third revision of these patches, which now includes a new in-kernel API along with some clients like a bootsplash system, VT console, and fbdev implementation...


Chinese Firms Dominate the Chinese Mobile Market Where Patents Are Used for Nationalist Protectionism "IndyWatch Feed Tech"

China now uses patents like it uses speech restrictions/censorship (as a trade barrier)

An ancient door

Summary: Chinas patent offensive, which is far from a charm offensive, may mean that foreign companies wont survive in the Chinese market, which is itself dominated by companies that are closely connected to the Chinese Communist Party, also known as the Communist Party of China (CPC)

THE patent bubble in China is a fascinating thing. As we noted in our previous post, patent numbers are on the decline in the West (unless one counts only Chinese applications at USPTO, EPO etc.), whereas in Chinas SIPO patent filings now go through the roof while patent litigation continues to soar. Theres not so much press coverage about it, at least not in English. As Chinese patents are written in Mandarin theres also little chance of finding any Western press coverage about these. The consensus is that these are low-quality patents and its likely that only the good ones reach the USPTO, EPO etc. In other words, those which Westerners can actually read are the better ones.

The consensus is that these are low-quality patents and its likely that only the good ones reach the USPTO, EPO etc.China appears to have found a hack. It just floods the market with patents as means of trade war/sanctions strategy. The US appears to have been slow to react, citing mostly security not patents as a pretext (they used to just call Chinese products knockoff and/or piracy). Both the US and China can now happily pretend to themselves that they dont engage in a trade war and instead hide behind the mask of back doors, patents, and human rights. The US government discourages carriers from stocking ZTE and Huawei phones while publicly asking people not to buy these (outside contracts with carriers). This is all public information the type of stuff we habitually cover in our daily links.

To people who are accustomed to thinking of Asia (or east Asia) as one big country it may be confusing to learn about tensions (military, trade etc.) between Japan, Korea and China. Sure, a lot of the production is outsourced to mainland China (the US isnt the only country doing so, even Taiwan does). China itself has a very conservative government and its actively trying to promote homegrown Chinese brands, not Korean and Japanese ones. So its hardly...


Homeopathy Explained "IndyWatch Feed Tech"

What are the principles behind Homeopathy and does it work?

Kurzgesagt Newsletter:

Support us on Patreon so we can make more videos (and get cool stuff in return):

Kurzgesagt merch:

The MUSIC of the video:



Should We Loosen Bacterial Limits on Robotic Mars Exploration Before It's Too Late? "IndyWatch Feed Tech"

NASA's Planetary Protection Officer has suggested that it's time to contaminate Mars slightly aggressively before humans arrive with their microbiomes in tow:

Is there life on the surface of Mars? The clock is ticking on scientists' window to solve that long-standing question before astronautsand the microbes that live on themcontaminate the planet. Today, at a meeting in Washington, D.C., of NASA's planetary science advisory committee, the agency's new planetary protection officer raised the possibility of opening up a few of the planet's most promising regions to more aggressive exploration.

Just a few weeks into the job, Lisa Pratt, formerly a geomicrobiologist at Indiana University in Bloomington, has signaled that she wants the office to be open to the notion that a degree of contamination might be necessary to explore several of the planet's most habitable spots. Previously, the office has served as a watchdog to prevent the contamination of Mars and other planets with microbes from Earth, and vice versa. But now, time is pressing, given NASA's long-term goals, Pratt says. "No matter what we do, the minute we've got humans in the area we've got a less pristine, less clean state," Pratt said at the meeting. "Let's hope we know before the humans get there, one way or the other, if there is an ecosystem at or near the surface."

Although no region of Mars is banned for exploration, international treaties set the allowable levels of microbial contamination on robotic spacecraft destined for other planetary environments. Some scientists say it is too costly to meet the sterilization requirements to explore the potentially warm and wet "special regions" on Mars that are most likely to harbor microbes. Only the 1970s Viking landers achieved the cleanliness necessary to explore a special region. A growing number of scientists have argued that the agency needs to rethink its plans, as Science reported last year.

Related 2013 paper: The overprotection of Mars (DOI: 10.1038/ngeo1866) (DX)

Previously: NASA Posts Planetary Protection Officer Job Position



Not Just EPO: USPTO Too Will See Patent Filings Declining "IndyWatch Feed Tech"

EPO already lowered the fees (we assume in order to artificially inflate the numbers again)

Going down the drain
Up the quality, down the drain bad patents

Summary: The retreat from patent maximalism, as well as the lowered perceived value of patents, may mean that fewer people/companies now pursue patents or bother with litigation (they work on technology instead)

THE EPO saw a decline in the number of patent applications in spite of or because of dilution of patents and harm to the reputation of European Patents (EPs). The USPTO too is said to be expecting this in spite of or because of decline in the perceived value of US patents. Far too many had been granted over the past decade or two, including a lot of software patents which now turn out to be worthless.

As William New put it 4 days ago:

The United States Patent and Trademark Office (USPTO) is predicting a slight decline in some patent filings for 2018 and 2019, including through the international Patent Cooperation Treaty (PCT) managed by the World Intellectual Property Organization. Trademarks, meanwhile, will likely see slowing growth.

WIPO still claims some sort of all-time record, hailing China with its low-quality, government-supported patent gold rush.

Does that mean that the US is losing it? Not at all. It just means that the litigation industry is losing it. Its less capable of harassing productive companies with frivolous litigation (at both ends).

4 days ago and again yesterday the CCIA wrote about the patent industry claims that tougher patent regulations/rules ruin the economy; facts are not on their side.

To quote Patent Progress (CCIA):



Automated Tracking Solutions, Aatrix and Berkheimer Dont Change Anything; Theyre Exploited by Patent Extremists to Pressure/Mislead/Insult Judges "IndyWatch Feed Tech"

Berkheimer and Aatrix are old and the US patent microcosm has become a lot like the Trump administration, habitually insulting judges (even racially, however subtle that may seem)

Judge Reyna
Loss of civility (the Internet never forgets). The patent microcosm also insults judges (the above has been removed since), perpetuating the long-running insult/innuendo that judges who invalidate patents dont care about facts or are "impotent" (in the case above, theres also a racial slant). At the same time, judges that are actually caught engaging in serious misconduct (and call other judges death squads) are defended by them because of their pro-trolls, pro-software patents stance. At the patent microcosms spheres, bias is revealing. They want more and more patents and they vehemently hate quality control for patents. They even call rejections and invalidations kills and call judges that they dont like a cabal that rubberstamps these rejections (are examiners a "cabal that rubberstamps low-quality applications"?); Only yesterday one of them called judges the death squad CRAWFORD, MOHANTY, BAYAT, in effect comparing patent judges to executioners, which is not fair and far from respectful.

Summary: The intentional lies, in addition to insults directed at judges who push back against patent maximalism, represent a new low for the US patent industry; like a pack of wild hyenas they just gang up against those who do the rational thing and what makes economic sense for their country

THE US patent system is no longer open to software patents. No matter how many of them the USPTO will allow to slip through, PTAB and district/federal courts will almost always say no. In our next post well talk about the consequences of this.

We are very disturbed to see patent law firms succumbing to the tactics of Team UPC. Truth no longer matters to them, so they just lie whenever that suits their financial agenda. They hope that by...


FBI warns of spike in phishing campaigns to gather W-2 information "IndyWatch Feed Tech"

The FBI is warning of a spike in phishing campaigns aimed to steal W-2 information from payroll personnel during the IRSs tax filing season.

The FBI has observed a significant increase since January of complaints of compromised or spoofed emails involving W-2 information.

Beginning in January 2017, IRSs Online Fraud Detection & Prevention (OFDP), which monitors for suspected IRS-related phishing emails, observed an increase in reports of compromised or spoofed emails requesting W-2 information. states the alert published by the FBI.

W-2 information is a precious commodity for crooks that are showing an increasing interest in tax data.

Law enforcement and security experts observed many variations of IRS and tax-related phishing campaigns, but most effective are mass data thefts, for example, campaigns targeting Human Resource (HR) professionals.

The most popular method remains impersonating an executive, either through a compromised or spoofed email in order to obtain W-2 information from a Human Resource (HR) professional within the same organization. continues the alert.

Individual taxpayers may also be the targeted, but criminals have evolved their tactics to focus on mass data thefts.

w-2 information

A separate warning od W-2 -related phishing campaigns was issued by the Internal Revenue Service.

The Form W-2 scam has emerged as one of the most dangerous phishing emails in the tax community. During the last two tax seasons, cybercriminals tricked payroll personnel or people with access to payroll information into disclosing sensitive information for entire workforces. reads the IRSs advisory issued in January. The scam affected all types of employers, from small and large businesses to public schools and universities, hospitals, tribal governments and charities.

Once cybe...


What Makes GLIBC 2.27 Exciting To The Clear Linux Folks "IndyWatch Feed Tech"

Released at the beginning of February was Glibc 2.27 and it's comprised of a lot of new features and performance improvements. But what's the best of Glibc 2.27?..


Testing LDPC code erasure decoding performance "IndyWatch Feed Tech"

In my previous post I talked about the RFC5170 LDPC codes used in Outernet. There I explained in some detail the pseudorandom construction of the LDPC codes and the simple erasure decoding algorithm used both in free-outernet and in the official closed-source receiver.

The Outernet LDPC codes follow what I call the "identity scheme". This is different from the staircase and triangle schemes introduced in the RFC. The identity scheme already appeared in the literature, but it did not make it into the RFC. See, for instance, the report by Roca and Neumann Design, Evaluation and Comparison of Four Large Block FEC Codecs, LDPC, LDGM, LDGM Staircase and LDGM Triangle, plus a Reed-Solomon Small Block FEC Codec, especially Section 2, where it is called "LDGM".

I also commented that erasure decoding for an LDPC code (or any other linear code) amounts to solving a linear system. This can be done using any algebraic method, such as Gaussian elimination. However, the simple decoding algorithm used in Outernet is as follows: try to find an equation with only one unknown, solve for that unknown, and repeat until the system is solved. Clearly this algorithm can fail even if the system can be solved (see my previous post for some examples and formal results). I will refer to this algorithm as iterative decoding, as it is done in the RFC.

With these two things in mind, I wondered about the performance of the LDPC codes used in Outernet and the iterative decoding algorithm. I've done some simulations and here I present my results.

The notation I use in this post is the same that I used in the previous post. I won't introduce it again, so I refer the reader to the previous post to consult the notation.

I have done my simulations using Sage, since it provides a simple way of doing linear algebra over the field GF(2). I have used the Python code from free-outernet to generate the parity check matrices according to the RFC. To generate random numbers, I am using the most significant bits of the output of the Lehmer PRNG, as the RFC indicates, not the least significant bits (which are less random), as Outernet does. I guess that this difference doesn't impact the results much.

To perform the simulations, I fix a value of ...


Iran-linked group OilRig used a new Trojan called OopsIE in recent attacks "IndyWatch Feed Tech"

According to malware researchers at Palo alto Networks, the Iran-linked OilRig APT group is now using a new Trojan called OopsIE.

The Iran-linked OilRig APT group is now using a new Trojan called OopsIE, experts at Palo Alto Networks observed the new malware being used in recent attacks against an insurance agency and a financial institution in the Middle East.

One of the attacks relied on a variant of the ThreeDollars delivery document, the same malicious document was sent by the threat actor to the UAE government to deliver the ISMInjector Trojan.

In the second attack detected by PaloAlto, the OilRig hackers attempted to deliver the malicious code via a link in a spear phishing message.

On January 8, 2018, Unit 42 observed the OilRig threat group carry out an attack on an insurance agency based in the Middle East. Just over a week later, on January 16, 2018, we observed an attack on a Middle Eastern financial institution. In both attacks, the OilRig group attempted to deliver a new Trojan that we are tracking as OopsIE. reads the analysis from Palo Alto Networks.

The first attack occurred on January 8, 2018, the hackers sent two emails to two different email addresses at the target organization within a six minutes time span. Attackers spoofed the email address associated with the Lebanese domain of a major global financial institution.

OilRig launched another attack on January 16, in this case, the attackers downloaded the OopsIE Trojan from the command and control (C&C) server directly. The same organization was hit by OilRig for the second time, the first attacks occurred in 2017.

The researchers explained that the malware is packed with SmartAssembly and obfuscated with ConfuserEx.

The hackers gain persistence by creating a VBScript file and a scheduled task to run itself every three minutes. The OopsIE Trojan communicates with the C&C over HTTP by using the InternetExplorer application object.

By using the InternetExplorer application object, all C2 related requests will look as if they came from the legitimate browser and therefore will not contain any anomalous fields within the request, such as custom User-Agents. The OopsIE Trojan is configured to use a C2 server hosted at:

www.msoffice365cdn[.]com states the analysis.

The Trojan will construct specific URLs to communicate w...


Russia VPN Blocking Law Failing? No Provider Told To Block Any Site "IndyWatch Feed Tech"

Continuing Russias continued pressure on the restriction of banned websites for copyright infringement and other offenses, President Vladimir Putin signed a brand new bill into law July 2017.

The legislation aimed to prevent citizens from circumventing ISP blockades with the use of services such as VPNs, proxies, Tor, and other anonymizing services. The theory was that if VPNs were found to be facilitating access to banned sites, they too would find themselves on Russias national Internet blacklist.

The list is maintained by local telecoms watchdog Rozcomnadzor and currently contains many tens of thousands of restricted domains. In respect of VPNs, the Federal Security Service (FSB) and the Ministry of Internal Affairs is tasked with monitoring unblocking offenses, which they are then expected to refer to the telecoms watchdog for action.

The legislation caused significant uproar both locally and overseas and was widely predicted to signal a whole new level of censorship in Russia. However, things havent played out that way since, far from it. Since being introduced November 1, 2017, not a single VPN has been cautioned over its activities, much less advised to block or cease and desist.

The revelation comes via Russian news outlet RBC, which received an official confirmation from Rozcomnadzor itself that no VPN or anonymization service had been asked to take action to prevent access to blocked sites. Given the attention to detail when passing the law, the reasons seem extraordinary.

While Rozcomnadzor is empowered to put VPN providers on the blacklist, it must first be instructed to do so by the FSB, after that organization has carried out an investigation. Once the FSB gives the go-ahead, Rozcomnadzor can then order the provider to connect itself to the federal state information system, known locally as FGIS.

FGIS is the system that contains the details of nationally blocked sites and if a VPN provider does not interface with it within 30 days of being ordered to do so, it too will be added to the blocklist by Rozcomnadzor. Trouble is, Rozcomnadzor hasnt received any requests to contact VPNs from higher up the chain, so they cant do anything.

As of today, there have been no requests from the members of the RDD [operational and investigative activities] and state security regarding anonymizers and VPN services, a Roskomnadzor spokesperson said.

However, the problems dont end there. RBC quotes Karen Ghazaryan, an analyst at the Russian Electronic Communications...


Scientists warn of unusually cold Sun: Will we face another ice age? "IndyWatch Feed Tech"

 Solar flare

 The figure of seven percent is been bandied about in terms of the apparent variation in solar output.  The Earth moderates this variation which surely follows the sunspot cycle and also underpins the hurricane cycle and the El Nino cycle as well as all other decadal systems identified.

If we discover that the typical variation is seven percent over an eleven year cycle, we have plenty of energy variation for the Earth's climate to accommodate.

Now imagine if there is a super cycle with sunspots that allowed the  two ore three lows to be stacked in line not allowing a proper recovery.  Thus a little ice age.

All our climate variation can be laid directly to this phenomena that we are slowly mapping and understanding.  What we do lack is two thousand years of good temerature data.

Scientists warn of unusually cold Sun: Will we face another ice age?

A study by the University of California San Diego has said the Sun will experience a cold period where all solar activities will be reduced drastically. 

February 8, 2018 



Tachometer Uses Light, Arduinos "IndyWatch Feed Tech"

To measure how fast something spins, most of us will reach for a tachometer without thinking much about how it works. Tachometers are often found in cars to measure engine RPM, but handheld units can be used for measuring the speed of rotation for other things as well. While some have mechanical shafts that must make physical contact with whatever youre trying to measure, [electronoobs] has created a contactless tachometer that uses infrared light to take RPM measurements instead.

The tool uses an infrared emitter/detector pair along with an op amp to sense revolution speed. The signal from the IR detector is passed through an op amp in order to improve the quality of the signal and then that is fed into an Arduino. The device also features an OLED screen and a fine-tuning potentiometer all within its own self-contained, 3D-printed case and is powered by a 9 V battery, and can measure up to 10,000 RPM.

The only downside to this design is that a piece of white tape needs to be applied to the subject in order to get the IR detector to work properly, but this is an acceptable tradeoff for not having to make physical contact with a high-speed rotating shaft. All of the schematics and G code are available on the project site too if you want to build your own, and if youre curious as to what other tools Arduinos have been used in be sure to check out the Arduino-based precision jig.


Puerto Rico's Arecibo Observatory Saved From Uncertain Fate "IndyWatch Feed Tech"

Arecibo Observatory, which is the second-largest radio telescope in the world, is under new management. A group led by the University of Central Florida will take over the operations of the telescope from the National Science Foundation, which was considering shutting down the observatory.

The telescope's fate had previously been uncertain. Back in 2016, the National Science Foundation announced that it was exploring different options in regard to Arecibo. There wasn't enough funding to continue supporting the telescope, so the NSF was looking at partnering with other organizations, scaling back or shutting down Arecibo entirely. That same year, the observatory was the first to capture repeating cosmic radio bursts, which have helped us understand the nature of our galaxy and the universe around it.

[...] But now, this new agreement ensures that Arecibo Observatory will remain open. It is scheduled to take effect on April 1st. UCF and its partners, Universidad Metropolitana in San Juan and Yang Enterprises, Inc. in Oviedo, also plan to expand the operations of the telescope. It's good news for the scientific community, and also for Puerto Rico.


Original Submission

Read more of this story at SoylentNews.


Vulkan Turns Two Years Old, What Do You Hope For Next? "IndyWatch Feed Tech"

This last week marked two years since the debut of Vulkan 1.0, you can see our our original launch article. My overworked memory missed realizing it by a few days, but it's been a pretty miraculous two years for this high-performance graphics and compute API...


News Corp CEO Admits He Wants Internet Censored So News Corp Can Make More Money "IndyWatch Feed Tech"

Right now, and most of you are unaware of this, Main stream media or MSM is struggling to both censor independent voices and to suppress alternative news sources.  Problem is that the primary reason that the MSM is losing market share is simply because they have at the same time abandoned all traditions for fair reporting as so clearly evidenced during the past three election cycles.
It was not particularly subtle and readers fled into the internet to do their own homework.  Thus the market responded with alt media and fresh voices sharing their readers and listeners curiosity.  They need to remember that this happened in the USSR as well.
Now they are trying to control what can be found in the internet.  It is all nonsense.
What it is promoting, not voiced yet, is the formal breakup up of all forms of media ownership concentration as abusive monopoly manipulation.   The laws do exist but that battle has yet to be joined.  It is coming as sure as day follows night..
News Corp CEO Admits He Wants Internet Censored So News Corp Can Make More Money

The potential returns for our journalism would be far higher

Paul Joseph Watson

February 9, 2018

The CEO of News Corp. has admitted that big corporations are pushing for the likes of Google and Facebook to censor alternative media outlets so that News Corp-owned publications can make more money.

The admission is contained in an AFP article about Robert Thompson, CEO of the publishing arm of Rupert Murdochs media empire.

Thompson accuses Google and Facebook of creating a dysfunctional and debased online environment by failing to cr...


Our Road to Immortality "IndyWatch Feed Tech"

One of the questions that has forever haunted humanity is whether or not immortality is possible at all in our third tier matter form.  Our driving spiritual form is also physical in terms of second tier matter and surely provides immortality in that way.  Yet we have a serious investment in our third tier form and perhaps forgetting the spirit life we yearn for a much longer life than we have available.

In fact for most, return to the spirit form is likely the preferred option.  Usually the investment is simply insufficient to justify lingering at all, or worse, a misstep is hindering meaningful improvement.  It is completely reasonable that a spirit would need to process a full cycle of lives before deemed ready to live a long sustained life in the Third Tier.  Such a cycle would apparently consist eight separate live usually over eighty years or so but don in multiple aspects.  This is important.  It is reasonable to be on earth in thirty two separate individuals following naturally tracking paths allowing a variety of decisions to be made and investigated.  At the end of each life you would subsume all thirty two lives into your personality.

The consequence is that a matured spirit will have experienced eight times thirty two lives instead of a mere eight and the dominant thread emerges out of this.  I do not ask you to buy this but to consider the plausibility.   

Rather obviously we will want matured spirits to emerge in the last life and that with only the principal aspect at that.  Thus the class of potential immortals will always be perhaps at most around one out of 256 at most and actually much less as these eight century cycles of spiritual evolution will often need to be repeated several times.

This is obviously a complete theological departure.  please do not forget that our spirit bodies are physical and underst...


SpaceX engine production and rocket capacity "IndyWatch Feed Tech"

What we have here is production capacity to launch monthly at least and haul serious tonnage at the same time.  This is essentially continuous operation allowing a steady lowering of the cost profile.
The actual launch capacity now matches the Saturn standard with the heavys.  Thus it becomes plausible to support a true space station.  Such a station should be a balloon through which we have an axle consisting of a large cross section tube to handle docking g and construction storage and hanger decks.  We can then suspend cable stayed decks around the rotational axis and sustain centripetal acceleration on the decks allowing artificial gravity for work to be done.
I like to call these dyson spheres though initially need to be small..
SpaceX engine production and rocket capacity
brian wang | February 8, 2018

SpaceX is producing about 5 engin...


Robot keeps elderly loved ones connected "IndyWatch Feed Tech"

A friendly robot is helping the elderly stay connected to family and friends.


A.I. will be billions of times smarter than humans and man needs to merge with it, expert says "IndyWatch Feed Tech"

Ian Pearson, a futurist at Futurizon, said there will need to be a link between AI and a human brain.


PAL-V will soon debut its flying car vehicle "IndyWatch Feed Tech"

PAL-V could deliver what many have promised but few provided.


This robot can lay up to 400 bricks per hour "IndyWatch Feed Tech"

Bricklaying robots could build your next home 5 times faster than a human. .


Heres why people are working on languages for computers that barely exist "IndyWatch Feed Tech"

There may soon be more quantum programming languages than there are quantum computers.


For The First Time Ever, Astronomers Have Observed a Black Hole Ejecting Matter Twice "IndyWatch Feed Tech"

Black holes dont just sit there munching away constantly on the space around them. Eventually they run out of nearby matter and go quiet, lying in wait until a stray bit of gas passes by.

Then a black hole devours again, belching out a giant jet of particles. And now scientists have captured one doing so not once, but twice the first time this has been observed.

The two burps, occurring within the span of 100,000 years, confirm that supermassive black holes go through cycles of hibernation and activity.


Dyson bets on electric cars to shake up industry "IndyWatch Feed Tech"

Engineering pioneer will produce 3 vehicles from scratch in bold 2 billion venture, Financial Times reports.


Quantum computers offer next level processing "IndyWatch Feed Tech"

Quantum computing will transform our computing capabilities.


Researchers Invent Tiny, Light-Powered Wires To Modulate Brain's Electrical Signals "IndyWatch Feed Tech"

The human brain largely remains a black box: How the network of fast-moving electrical signals turns into thought, movement and disease remains poorly understood. But it is electrical, so it can be hacked--the question is finding a precise, easy way to manipulate electrical signaling between neurons.

A new University of Chicago study shows how tiny, light-powered wires could be fashioned out of silicon to provide these electrical signals. Published Feb. 19 in Nature Nanotechnology, the study offers a new avenue to shed light on--and perhaps someday treat--brain disorders.

[...] A team led by Asst. Prof. Bozhi Tian built minuscule wires previously designed for solar cells. These nanowires are so small that hundreds of them could sit side by side on the edge of a sheet of paper--putting them on the same scale as the parts of cells they're trying to communicate with.

These nanowires combine two types of silicon to create a small electrical current when struck by light. Gold, diffused by a special process onto the surface of the wire, acts as a catalyst to promote electrochemical reactions.

"When the wire is in place and illuminated, the voltage difference between the inside and outside of the cell is slightly reduced. This lowers the barrier for the neuron to fire an electrical signal to its neighboring cells," Tian said.

The team tested the approach with rat neurons grown in a lab, and saw they could indeed trigger neurons to fire these electrical signals.

"The nice thing about it is that both gold and silicon are biologically compatible materials," said graduate student Ramya Parameswaran, the first author on the study. "Also, after they're injected into the body, structures of this size would degrade naturally within a couple of months."

Original Submission

Read more of this story at SoylentNews.


Robotic Laser Keeps Cat Entertained While You Hack "IndyWatch Feed Tech"

Whether its our own cat or a neighbors, many of us have experienced the friendly feline keeping us company while we work, often contributing on the keyboard, sticking its head where our hands are for a closer look, or sitting on needed parts. So how to keep the crafty kitty busy elsewhere? This roboticized laser on a pan-tilt mechanism from the [ team] should do the trick.

The laser is a 650 nm laser diode mounted on a 3D printed pan-tilt system which they found on Thingiverse and modified for attaching the diodes housing. Its all pretty lightweight so two 9G Micro Servos do the grunt work just fine. The brain is an Arduino UNO running an open-source VarSpeedServo library for smooth movements. Also included are an HC-05 Bluetooth receiver and an Android app for controlling the laser from your phone. Set it to Autoplay or take a break and use the buttons to direct the laser yourself. See the video below for build instructions and of course their cat, [Pepper], looking like a Flamenco dancer chasing the light.

Think your cat might get bored chasing a light around by itself? Mount the laser on a mobile robot with added IR proximity sensor which can roll around and play with the cat.


A Unifying Blockchain to Enhance Interoperability, Scalability and Usability Within the Ecosystem "IndyWatch Feed Tech"

There internet as a fundamental tool in the development of humankind has experienced constant growth since its creation. This growth has been in phases and currently, the world is in the phase of the Internet of Value (IoV), which is significantly powered by the blockchain.

A community of independent entities

The ease of value transfer is very crucial if the emerging blockchain technology must find a prominent place within the mainstream. In its current state, the blockchain industry is littered with several independent blockchains and their respective tokens. These as individual solutions are contributing positively to in their respective ways towards the development of the digital world. However, as a unit, having so much independent units in one environment portends a semblance of chaos and disharmony.

To solve this problem, the blockchain ecosystem needs to find a solution to certain problems that are fundamental and cut across all the individual entities. These include the problems of  interoperability, scalability and usability. These problems make it impossible for the various independent entities to interact effectively, hence they offer limited solutions.

Bringing everyone together

In other to find a solution to the above mentioned problems and improve the adaptability of blockchain technology to mainstream processes, FUSION is creating an inclusive cryptofinance platform that is based on blockchain. This platform will enhance a seamless interaction between blockchain platforms and their tokens.

Fusion is building a value transfer infrastructure that is based on various tokens. This infrastructure can convert values across various blockchains and can fulfill almost all the functionality of traditional finance, but in a distributed and more efficient manner, with substantial cost savings.

To this point, the interactive gateway for tokens and cryptocurrencies remain the crypto exchanges. This is not a closed system and at the same time could involve some cumbersome and non-seamless procedures. With Fusions  establishment of a public blockchain as an inclusive cryptofinance platform, the existing bottlenecks of of interoperability and scalability can be overcome.

Shaping up the ecosystem

In order to achieve this, FUSION utilizes distributed network nodes to control various types of tokens private keys and, in this way, it connects various values by establishing a control and management layer on top of all types of bl...


New Challenges May Lie Ahead for Use of CRISPR in Humans "IndyWatch Feed Tech"

In our weekly news roundup: researching immunity to CRISPR, this years flu season, the legal battle over frozen embryos, and more.


Aerospace Company to Launch Private, Inflatable Space Stations "IndyWatch Feed Tech"

Bigelow Aerospace announced plans for sending soft-bodied modules that are compressed during launch but expand once they reach space.


6 Cloud Computing Tips for Small Businesses "IndyWatch Feed Tech"

Cloud computing has seen incredible steps forward in the last 10 years and unsurprisingly, that means the adoption rates within small to medium sized industries has soared.

However, like all aspects of IT, cloud computing doesnt stand-still and understanding how to leverage the technology for maximum effect is often outside the knowledge based of company owners and decision makers whose expertise lays predominantly in other fields.

Well take you through 6 of the most important tips that small businesses should consider when implementing and working with cloud-based IT tech, from security and backups to collaboration and recruitment

Encourage collaboration

Cloud networking has had a fascinating impact on peoples ability to truly collaborate with one another.

Heres an interesting fact:

Large companies report that the effectiveness and productivity that comes as a result of collaborating over the cloud far surpasses anything that was seen when workers sat at desks close to one another and shared documents in a more rudimentary fashion. If youve been in a workplace that duplicates spreadsheets before adding to them, renaming them then recirculating them, youll know exactly how frustrating this can be!

So, the teamwork is strong when youre not sitting with your team it would appear.

With this in mind, you should be encouraging your team to fully buy-in to these new collaboration tools. Whether youre simply file-sharing using an service like DropBox, Googles G-Suite or Microsofts 365 range of products or working hand-in-hand on complex projects in specialist software, it turns out that we get more done when were digitally together.

Always be thinking about security

The cloud offers a huge array of benefits but security isnt touted as being one of those things. Thats not to say that the cloud is a big risk the companies who are providing the services are huge and highly reputable in most cases, but be careful not to be lulled into a false sense of security.

In many instances, technology isnt to blame when things go wrong with the cloud for every genuine hack theres likely to be 1,000 instances of human error whether thats lost files, poor passwords or other risky online behaviour.

As such, you should start by implementing strong policies and procedures around your employees access to cloud based resources.

Of course, data security isnt just limited to protecting against those with malicious intent there are countless more instances of file loss or file corruption that dont get the same...


Unexpected Ways That Artificial Intelligence Will Change Your Life In The Next 10 Years "IndyWatch Feed Tech"

We wanted to delve a little deeper into the future of AI, so we spoke to some experts working in the industry about how its expected to affect your dating, work and personal life very soon


GCC 8 Will Let You -march=native Correctly On ARM/AArch64 "IndyWatch Feed Tech"

Linux developers and enthusiasts on x86_64 have long enjoyed the ability to use the -march=native option for having the GCC compiler attempt to auto-detect the CPU and set the appropriate microarchitecture flags. That support is finally being offered up for ARM with GCC 8...


The Unified Patent Court (UPC) is Dead, But Spin From Team UPC is Now Abundant "IndyWatch Feed Tech"

Bristows seems to be promoting the EPOs management again (even at IP Kat, which makes one wonder who controls this blog after the silence on EPO scandals)

The end
Team UPC is as bad as Big Tobacco lobbyists

Summary: As we predicted, Team UPC is now denying the very facts about a German court agreeing to hear a major UPC complaint, exploiting blogs with a larger audience to spread falsehoods

THE UPC has been a zombie for quite a while and a few days ago it was the final nail on its coffin. EPO management has said not even a single word about it; silence in this case is deafening. As for Team UPC? Thats another story

UP & UPC Conference, a relatively obscure account with almost no followers, carries on as though nothing happened. The UPC is effectively dead, but people/accounts whose whole/sole purpose is UPC promotion do not let facts get in the way. Liz Coleman, Divisional Director of @The_IPO, [UK-IPO] it says, will speak at the upcoming UP&UPC conference on 3 July, @EPOorg in Munich.

Thats 3 days after Campinos takes over and by that stage, more or less for sure, it will have been too late for the UK (of UK-IPO) to do anything about UP&UPC. Brexit timeline suggests so. So what is even the point of this event? They might as well just call it off to save people the trouble.

We are rather worried to see what goes on at IP Kat, which until recently had among its writers a Battistelli friend from CIPA. Bristows wrote no less than 4 articles in IP Kat yesterday (thats just one day). Makes one wonder who controls the blog nowadays the most prolific writer is from Bristows, which lies a lot for the UPC. Bristows is like a leech that uses other peoples blogs (Kluwer Patent Blog and IP Kat for the most part) to disseminate its lies because almost nobody reads Bristows own blog. Its almost defunct. Yesterday, like 3 days ago, Bristows published a test page (long UPC ramble/marketing) and forgot to remove it. Why does that keep happening?

Anyway, going back to IP Kat, yesterday it published an EPO...


Tor Director Shari Steele Will Step Down at the End of the Year "IndyWatch Feed Tech"

Shari Steele is resigning her position as the director of the Tor Project, according to a report by Cyberscoop. Steele will remain director through December 31st, and the search for her replacement is still underway.

[...] For many, Steele's directorship, which started in December 2015, signaled a sea change within the organization and shifted Tor towards being more inclusive and community focused.

[...] "I had intended to retire after my time with EFF, but I believed strongly in the Tor Project's mission, and I felt I could help," Steele wrote in a blog post after the news broke. "I look at the Tor Project organization today and feel quite confident that we've got the talent and the structure to continue to support the organization's great work."

Source: The Verge

Original Submission

Read more of this story at SoylentNews.


EPO Roundup: Low Profile, Employment Changes, Patent Trolls, Refusal to Obey Courts, and Animal Breeding Patents "IndyWatch Feed Tech"

Breeding patents back on the agenda


Summary: A few recent developments and observations regarding the European Patent Office (EPO), which is in a volatile state and is making no public statement about the future of staff (canteen talk now revolves around alleged deep cuts to staffing)

THE EPO has made no announcements for quite a while. Low profile seem to have generally been kept so far this year. Weve hypothesised about the reasons for this, but these are merely hypotheses. We can recall days (or months) when the EPO made plenty of controversial statements, but nowadays both the site and the accounts (of the EPO) say nothing of great importance. Yesterday the EPO spoke about intellectual property & patents, which is an odd way to frame things. Its misleading to say that, I told them, because the former is a propaganda term, the latter a law which is typically put under this umbrella thats a propaganda term. Its not a property.

Unlike the USPTO, the EPO does not deal with anything but patents (the T in USPTO stands for trademarks). Its important to separate all these things and not refer to them collectively using terms like IP, which perpetuates old falsehoods. Speaking of which, theres that old canard about innovation in yesterdays news from the US. Real invention isnt to be measured in terms of patents, but the article Washington state stakes its claim as a bastion for invention would have us believe otherwise. To quote:

Washington was home to 2,220 inventors in 2017 (29.98 per capita), behind New Yorks 2,290, Texas 3,007 and Californias 10,009, according to U.S. Patent and Trademark Office data.

This has a lot to do with where large corporations are based, not with inherent spark for inventorship. Well revisit this topic later in the weekend. We intend to write a lot about the US.

It has meanwhile been...


Andreessen Horowitz invests in in digital custody startup Anchor Labs "IndyWatch Feed Tech"

Andreessen Horowitz has invested in Anchor Labs, a stealthy startup planning to provide digital asset custody, according to multiple sources. The startup is raising up to $17 million in Series A funding, according to a Delaware filing from December that Axios obtained from Lagniappe Labs, though its not clear whether the round has closed yet and who else participated.

Hot commodity: Anchor Labs opted to raise funds after acquisition talks with Coinbase didnt end in a deal. In November, Coinbase unveiled its own plans to provide custody services to institutional investors.

Read more toggle.


Stretched PC Case Turned GPU Cryptominer "IndyWatch Feed Tech"

We dont do financial planning here at Hackaday, so we wont weigh in on the viability of making money mining cryptocurrency in such a volatile market. But we will say that if youre going to build a machine to hammer away at generating Magical Internet Monies, you might as well make it cool. Even if you dont turn a profit, at least youll have something interesting to look at while you weep over your electricity bill.

Sick of seeing the desktop machine he built a decade ago gathering dust, [plaggle24w5] decided to use it as the base for a cryptocurrency mining rig. Of course, none of the original internals would do him any good, but the case itself ended up being a useful base to expand on. With the addition of some 3D printed components, he stretched out the case and installed an array of video cards.

To start with, all the original plastic was ripped off, leaving just the bare steel case. He then jammed a second power supply into the original optical drive bays to provide the extra power those thirsty GPUs would soon be sucking down. He then designed some 3D printed arms which would push out the side panel of the case far enough that he could mount the video cards vertically alongside the case. Three case fans were then added to the bottom to blow...


Car Companies Are Preparing to Sell Driver Data to the Highest Bidder "IndyWatch Feed Tech"

OEMs aren't just connecting cars for the fun of it; the idea is to actually improve their customers' experience with the cars. But right now, we're still missing an actual killer appand to be honest, data on how many customers renew those cell contracts for their vehicles. A survey out this week from Solace that polled 1,500 connected car owners found that they still don't really trust the technology.

[...] But the bit of Solace's survey I found most interesting was the widespread ignorance regarding data collection. Only 38 percent of connected car drivers knew that their cars could store personally identifiable information [PII] about them, with 48 percent unaware this was the case. And that's important because that PII is being viewed as a goldmine.

[...] "[The fuel companies] want to offer you more than fuel," [Ben] Volkow said. "Many times, the fuel stations are also interested in anonymized datawhy do some people always stop, do they take whatever's available or a specific brand, places to build new stations, and so on."

What's more, unlike selling cars, selling data is a high-margin businessbetween 80- and 90-percent profit. "A big part of the investment is already done," he said. "The databases are built, SIMs and modems are in the cars; they've crossed the Rubicon."

[...] Volkow thinks that drivers will be happy to share this data, as long as they get some value out of it, like free servicing or micropayments per mile traveled. But he also thinks consumer education is vital. "People tend to be more demanding when it comes to cars; they don't think of them as the same as mobile devices. You have to convince them there's a benefit," he told me.

Source: ArsTechnica

Original Submission

Read more of this story at SoylentNews.


8,000-Year-Old Heads on Spikes Found in Swedish Lake "IndyWatch Feed Tech"

In east-central Sweden, workers demolishing a railway that crossed the Motala Strm River discovered something bizarre. For roughly 7,500 years, a shallow, swampy lake in the area had hidden a pile of stones that contained the skeletal remains of at least 10 people and weapons made of stone and antler. They also found the bones of bears, deer, boar, and a badger. Two of the human skulls were mounted on pointed stakes.

Thousands of years ago, this semi-submerged burial ground must have been an imposing sight for the small settlements located nearby. A pile of rocks rose above the water, covered in weapons, wooden structures, and the grisly remains of fearsome animalsas well as the skulls of some carefully chosen people. Now dubbed "Kanaljorden," the archaeological site has finally begun to yield some secrets about the people who created it. In a recent article for Antiquity, Stockholm University archaeologist Sara Gummesson and her colleagues explain what the evidence reveals about how this ritual site was used.

Though we've seen lots of heads on stakes in Game of Thrones and various movies, Kanaljorden is the first time anyone has found evidence in real life that Stone Age people in this area were mounting heads on stakes. And their reasons are not quite what you might imagine.

Antiquity, 2018. DOI: 10.15184/aqy.2017.210

Source: ArsTechnica

Original Submission

Read more of this story at SoylentNews.


Intel didn't give government advance notice on chip flaws "IndyWatch Feed Tech"

Intel did not inform U.S. officials of major computer chip flaws until they were leaked to the public six months after the firm first became aware of the vulnerabilities, according to letters the company sent lawmakers. In a letter to...


MIT predicts 10 breakthrough technologies of 2018 "IndyWatch Feed Tech"

The MIT Technology Review has released a list of technologies it believes will make the most impact over the next 12 months, including smarter cities, genetic fortune telling and babel fish earphones.

The Massachusetts Institute of Technologys magazine has published the annual list online in its March/April 2018 issue, and based its contents on the innovations that will shape the coming year.

What Tech Review looks for when selecting the list is to identify what will have a profound effect on our lives, said a statement from the institution, based in Cambridge, Massachusetts.


Tiny Quad Core Module Available Soon "IndyWatch Feed Tech"

We get a lot of new product announcements here at Hackaday, and we run across even more. As excited as a manufacturer might be about their latest Raspberry Pi killer or cheaper Arduino clone, we usually dont have much to say about new products unless there is something really interesting about them. Our attention was piqued though when we saw the Neutis N5. Shipping in April, the device packs a quad-core ARM processor running at 1.3 GHz with 8 GB of flash memory and 512 MB of RAM, has an extended temperature range, WiFi (802.11N), and Bluetooth (including BLE). Theres also a crypto chip, and all this is packed into a tiny package. Really tiny. Less than 4130 mm square and less than 4.5 mm thick. Theres a Debian-based distribution and a development board. Oh and the really interesting thing is the price, which is $49 in single quantities.

Some of the I/O ports are multiplexed, but there are plenty of options including audio, Ethernet, HDMI, USB, and more. They clearly mean for these to be put into products. The module claims UL and CE certification, each unit has a unique serial number, and there is a gang programming capability.

For comparison purposes, an SD card is 32 mm x 24 mm and not quite as thick (2.1 mm). So the N5 is a little larger, but not by much. A Raspberry Pi is huge by comparison at just under 86 mm x 57 mm. Even a Pi Zero is 65 mm x 30 mm.

Admittedly we havent seen one of these yet, and everything always looks good on paper. Still, if it lives up to its promise it could give a run for the money to the Raspberry Pi and Beaglebone markets. Especially if you are trying to build it into something.

We have seen lots of cheaper or smaller Pi killers, like the Orange Pi. If you want to go the opposite direction on the price and performance scale, there is always try the HiKey 290.


Facebook apologizes for virtual shooting game demo at CPAC "IndyWatch Feed Tech"

Facebook removed a virtual reality shooting game demonstration after facing backlash over the timing of showcasing the game one week after the Parkland, Fla., shooting.The company let visitors at the Conservative Political Action...


LA Times website hacked to mine Monero cryptocurrency "IndyWatch Feed Tech"

By Waqas

Another day, another Monero cryptocurrency miner This time, the target

This is a post from Read the original post: LA Times website hacked to mine Monero cryptocurrency


San Francisco: Building Community Broadband to Protect Net Neutrality and Online Privacy "IndyWatch Feed Tech"

Like many cities around the country, San Francisco is considering an investment in community broadband infrastructure: high-speed fiber that would make Internet access cheaper and better for city residents. Community broadband can help alleviate a number of issues with Internet access that we see all over America today. Many Americans have no choice of provider for high-speed Internet, Congress eliminated user privacy protections in 2017, and the FCC decided to roll back net neutrality protections in December.

This week, San Francisco published the recommendations of a group of experts, including EFFs Kit Walsh, regarding how to protect the privacy and speech of those using community broadband.

This week, the Blue Ribbon Panel on Municipal Fiber released its third report, which tackles competition, security, privacy, net neutrality, and more. It recommends San Franciscos community broadband require net neutrality and privacy protections. Any ISP looking to use the citys infrastructure would have to adhere to certain standards. The model of community broadband that EFF favors is sometimes called dark fiber or open access. In this model, the government invests in fiber infrastructure, then opens it up for private companies to compete as your ISP. This means the big incumbent ISPs can no longer block new competitors from offering you Internet service. San Francisco is pursuing the open access option, and is quite far along in its process.

The open access model is preferable to one in which the government itself acts as the ISP, because of the civil liberties risks posed by a government acting as your conduit to information.

Of course, private ISPs can also abuse your privacy and restrict your opportunities to speak and learn online.

To prevent such harms, the expert panel explained how the city could best operate its network so that competition, as well as legal requirements, would prevent ISPs from violating net neutrality or the priv...


Ancient Britons Replaced By Newcomers "IndyWatch Feed Tech"

Arthur T Knackerbracket has found the following story:

The ancient population of Britain was almost completely replaced by newcomers about 4,500 years ago, a study shows.

The findings mean modern Britons trace just a small fraction of their ancestry to the people who built Stonehenge.

The astonishing result comes from analysis of DNA extracted from 400 ancient remains across Europe.

The mammoth study, published in Nature, suggests the newcomers, known as Beaker people, replaced 90% of the British gene pool in a few hundred years.

Lead author Prof David Reich, from Harvard Medical School in Cambridge, US, said: "The magnitude and suddenness of the population replacement is highly unexpected."

The reasons remain unclear, but climate change, disease and ecological disaster could all have played a role.

Read more of this story at SoylentNews.


Enzyme Designed Entirely From Scratch Opens a World of Biological Possibility "IndyWatch Feed Tech"

Ann Donnelly was utterly confused the first time she examined her protein. On all counts, it behaved like an enzymea protein catalyst that speeds up biological reactions in cells. One could argue that enzymes, sculpted by eons of evolution, make life possible.

There was just one problem: her protein wasnt evolved. It wasnt even natural. It was, in fact, a completely artificial construct made with random sequences of DNAsomething thats never existed in nature before.

Donnelly was looking at the first artificial enzyme. An artificial protein that, by all accounts, should not be able to play nice with the intricate web of biochemical components and reactions that support life.

Go Back:30 Days | 7 Days | 2 Days | 1 Day

IndyWatch Science and Technology News Feed Today.

Go Forward:1 Day | 2 Days | 7 Days | 30 Days

Friday, 23 February


Wine "PBA" Shows Potential For Improving Direct3D-Over-OpenGL Performance "IndyWatch Feed Tech"

University student Andrew Comminos wasn't too familiar with Direct3D or Wine development, but out of a desire for better World of Warcraft performance on Linux, he figured out the code-base and a means of enhancing the WineD3D code...


[SECURITY] CVE-2017-15693 Apache Geode unsafe deserialization of application objects "IndyWatch Feed Tech"

Posted by Anthony Baker on Feb 23

CVE-2017-15693 Apache Geode unsafe deserialization of application objects

Severity: Important

Vendor: The Apache Software Foundation

Versions Affected: Apache Geode 1.0.0 through 1.3.0

The Geode server stores application objects in serialized form.
Certain cluster operations and API invocations cause these objects to
be deserialized. An user with DATA:WRITE access to the cluster may be
able to cause remote code execution if...


[SECURITY] CVE-2017-15692 Apache Geode unsafe deserialization in TcpServer "IndyWatch Feed Tech"

Posted by Anthony Baker on Feb 23

CVE-2017-15692 Apache Geode unsafe deserialization in TcpServer

Severity: Important

Vendor: The Apache Software Foundation

Versions Affected: Apache Geode 1.0.0 through 1.3.0

The TcpServer within the Geode locator opens a network port that
deserializes data. If an unprivileged user gains access to the Geode
locator, they may be able to cause remote code execution if certain
classes are present on the classpath.

A malicious...


SUNY math professor makes the case for free and open educational resources ( "IndyWatch Feed Tech" looks at the availability of open educational resources (OERs), where to find them, and what the advantages of OERs are. Math and computer science professor David Usinski is a strong advocate for OERs and was interviewed for the article. "The ability to customize the curriculum is one of David's favorite benefits of OER. 'The intangible aspect is that OER has allowed me to reinvent my curriculum and take ownership of the content. With a textbook, I am locked into the chapter-by-chapter approach by one or two authors,' he says. Because of OER 'I am no longer hindered or confined by published materials and now have the flexibility to create the curriculum that truly addresses the course outcomes.' By freely sharing the content he creates, other instructors can also benefit."


Uiterwijk: Fedora package delivery security "IndyWatch Feed Tech"

On his blog, Patrick Uiterwijk writes about about Fedora packaging and how the distribution works to ensure its users get valid updates. Packages are signed, but repository metadata is not (yet), but there are other mechanisms in place to keep users from getting outdated updates (or to not get important security updates). "However, when a significant security issue is announced and we have repositories that include fixes for this issue, we have an 'Emergency' button. When we press that button, we tell our servers to immediately regard every older repomd.xml checksum as outdated. This means that when we press this button, every mirror that does not have the very latest repository data will be regarded as outdated, so that our users get the security patches as soon as possible. This does mean that for a period of time only the master mirrors are trusted until other mirrors sync their data, but we prefer this solution over delaying getting important fixes out to our users and making them vulnerable to attackers in the meantime."


See Jupiters South Pole Change Over Time in Incredible Time-Lapse View "IndyWatch Feed Tech"

New photos by NASAs Juno spacecraft show Jupiters south pole as seen from above during a recent close encounter on Feb. 7, 2018.


A Little Robotic Submarine Could Ply Alien Seas "IndyWatch Feed Tech"

NASA is designing a robot submarine to explore the ultrachilly, hydrocarbon-filled seas on Saturns moon Titan the only body in the solar system, apart from Earth, with liquid on its surface. Researchers have been testing the probe with a bucket-sized mock alien ocean in a lab.

The seas of Titan are very different from their counterparts on Earth: instead of seawater, Titans seas consist mainly of a frigid mixture of methane and ethane, at a temperature of around minus 300 degrees Fahrenheit (minus 184 degrees Celsius). Thats what NASAs Cassini spacecraft and its Huygens probe, which landed on Titan in 2005, found.

The plan is to send the autonomous submarine into the largest sea on Titan. called Kraken Mare, from the name of a Scandinavian sea-monster and the Latin word for sea, the extraterrestrial sea covers 155,000 square miles (400,000 square kilometers) of the moons surface. (The second-largest sea on Titan, about a quarter the size of Kraken, is Ligeia Mare, named after one of the monstrous sirens of Greek mythology.) [See Photos of Titans Oceans].


Bigelow Aerospace Reveals Plans For Space Hotels "IndyWatch Feed Tech"

The rise of commercial spaceflight companies such as SpaceX and Bigelow Aerospace sparked the age of space tourism as the ultra-wealthy became able to buy a ticket for a rocket ride into space. Of course, there is a huge limit on tourism if there isnt a place to stay in ones intended destination, but thats about to change in space. Bigelow has announced plans to build two space stations that will float in low-Earth orbit. The company has big plans for these space stations and ideas about who might pay to use them. Essentially, the stations will be like orbiting space hotels where astronauts and possibly even tourists might stay one day.

In a press release this week, Bigelow Aerospace announced that it has created a spin-off venture called Bigelow Space Operations, which will operate and manage two space stations that will serve as hotels. The company expects to launch both hotels in 2021, and its beginning to work toward building them this year. Bigelow describes the two space stations as the largest, most complex structures ever known as stations for human use in space.

The two stations are currently being referred to as B330-1 and B330-2, and they arent the only two that Bigelow Space Operations plans to build. The two space stations are inflatable and will provide shelter for up to six people in low-Earth orbit with about 12,000 cubic feet of living space.


Disney's Lawsuit Against Redbox May Have Backfired "IndyWatch Feed Tech"

Disney's attempt to prevent Redbox from buying its discs for rental and resale may have blown up in the House of Mouse's face. The Hollywood Reporter describes how District Court Judge Dean Pregerson sided with Redbox to shoot down a Disney-mandated injunction. In addition, Pregerson contended that Disney may itself be misusing copyright law to protect its interests and its own forthcoming streaming service.

If you're unfamiliar with the backstory, Redbox didn't have a deal in place to procure Disney DVDs and Blu-rays for its disc rental kiosks. So, the company simply bought the discs at retail, often snagging combo packs that include a DVD, Blu-ray and a download code for the movie as well. Redbox would then offer up the discs for rental, and sell on the codes at its kiosks for between $8 and $15.

Such a move enraged Disney, which includes language in its packaging and on the website demanding that users must own the disc if they download a copy. But this is where Pregerson began to disagree, saying that Disney cannot dictate what people do with copyrighted media after they have bought it. Specifically, that there's no law, or explicit contract term, that prevents folks from doing what Redbox did with Disney discs.


Original Submission

Read more of this story at SoylentNews.


The Federal Circuit Should Not Allow Patents on Inventions that Should Belong to the Public "IndyWatch Feed Tech"

One of the most fundamental aspects of patent law is that patents should only be awarded for new inventions. That is, not only does someone have to invent something new to them in order to receive a patent, is must also be a new to the world. If someone independently comes up with an idea, it doesnt mean that person should get a patent if someone else already came up with the same idea and told the public.

Theres good reason for this: patents are an artificial restraint on trade. They work to increase costs (the patent owner is rewarded with higher prices) and can impede follow-on innovation. Policy makers generally try to justify what would otherwise be considered a monopoly through the argument that without patents, inventors may never have invested in research or might not want to make their inventions public. Thus, the story goes, we should give people limited monopolies in the hopes that overall, we end up with more innovation (whether this is actually true, particularly for software, is debatable).

A U.S. Court of Appeals for the Federal Circuit rule, however, upends the patent bargain and allows a second-comersomeone who wasnt the first inventorto get a patent under a particular, albeit fairly limited, circumstance. A new petition challenges this rule, and EFF has filed an amicus brief  in support of undoing the Federal Circuits misguided rule.

The rule is based on highly technical details of the Patent Act, which you can read about in our brief along with those of Ariosa (the patent challenger) and a group of law professors (not yet available). Our brief argues that the Federal Circuit rule is an incorrect understanding of the law. We ask the Federal Circuit to rehear the issue with the full court, and reverse its current rule.

While the Federal Circuit rule is fairly limited and doesnt arise in many situations, we have significant concerns about the policy it seems to espouse. Contrary to decades of Supreme Court precedent, the rule allows, under certain circumstances, someone to get a patent on something had a...


3D Printing Brings a Childs Imagination to Life "IndyWatch Feed Tech"

Telling somebody that youre going to make their dreams come true is a bold, and potentially kind of creepy, claim. But its one of those things that isnt supposed to be taken literally; it doesnt mean that youre actually going to peer into their memories, extract an idea, and then manifest it into reality. Thats just crazy talk, its a figure of speech.

Original sketch of the CURV II

As it turns out, theres at least one person out there who didnt get the memo. Remembering how his father always told him about the elaborate drawings of submarines and rockets he did as a young boy, [Ronald] decided to 3D print a model of one of them as a gift. Securing his fathers old sketchpad, he paged through until he found a particularly well-developed idea of a personal sub called the CURV II.

The final result looks so incredible that we hear rumors manly tears may have been shed at the unveiling. As a general rule you should avoid making your parents cry, but if youre going to do it, you might as well do it in style.

Considering that his father was coming up with detailed schematics for submarines in his pre-teen days, it...


AMDGPU In Linux 4.17 Exposes WattMan Features, GPU Voltage/Power Via Hwmon "IndyWatch Feed Tech"

AMD's Alex Deucher today sent in the first pull request to DRM-Next of AMDGPU (and Radeon) DRM driver feature material that will in turn be merged with the Linux 4.17 kernel down the road. There's some fun features for AMDGPU users coming with this next kernel!..


Camera Technology In Vehicles: Low-Latency Image Data Compression "IndyWatch Feed Tech"

Arthur T Knackerbracket has found the following story:

The number of cameras in cars is increasing. However, through the flood of data the internal networks are being pushed to their limits. Special compression methods reduce the amount of video data, but exhibit a high degree of latency for coding. Fraunhofer researchers have adapted video compression in such a way that a latency is almost no longer perceivable. It is therefore of interest for use in road traffic or for autonomous driving. This technology will be on display at the Embedded World from 27 February until 1 March 2018 in Nuremberg in hall 4 (booth 4-470).

[...] The Fraunhofer HHI, for example, has made a decisive contribution to the development of the two video coding standards H.264/Advanced Video Coding (AVC) and H.265/MPEG High Efficiency Video Coding (HEVC). "With these methods, the data quantities can be sharply reduced. In this way, more than ten times the quantity of data can be transmitted," emphasizes the group leader of the "Video Coding and Machine Learning" department at the Fraunhofer HHI.

Read more of this story at SoylentNews.


Mesa 18.1 Receives OpenGL 3.1 With ARB_compatibility For Gallium3D Drivers "IndyWatch Feed Tech"

Going back to last October, Marek of AMD's open-source driver team has been working on ARB_compatibility support for Mesa with a focus on RadeonSI/Gallium3D. Today that work was finally merged...


ISO 27001 & cybersecurity training and qualifications: Now in New York "IndyWatch Feed Tech"

Achieve globally recognized ISO 27001 qualifications by learning from experienced practitioners. Get practical and interactive instruction with classroom and live and online training from Foundation level through to Lead Implementer or Lead Auditor qualifications.


Build Your Own Altair 8800 Personal Computer "IndyWatch Feed Tech"

Go back to 1974 and the dawn of home computing with this Arduino-based kit Photo: Randi Klett

Altair 8800 Computer Gif: Randi Klett

The MITS Altair 8800 was the first commercially successful personal computer. Created by Ed Roberts in 1974, it was purchased by the thousands via mail order, proving there was a huge demand for computers outside universities and large corporations. Its influence was immense: For example, after seeing the Altair featured on the cover of the January 1975 issue of Popular Electronics , Bill Gates and Paul Allen founded Microsoft (then Micro-Soft) in order to write a Basic interpreter for the new machine.

The Altair sold for US $439 in kit form. Original machines are now collectors items that trade for thousands of dollars. Fortunately, there are some cheaper alternatives for people who want to get a direct understanding of the Altair computing experience. Modern kits that replicate the Altair hardware as faithfully as possible are available, as are purely virtual online simulators. Falling somewhere between a replica and a simulation is the $149 Altairduino kit from Chris Davis. The Altairduino duplicates the front panel of the Altair in all its LED- and switch-festooned glory while emulating the internal hardware (including some once fantastically expensive peripherals), using an Arduino Due.

The Altairduino is derived from David Hansels work on cloning the Altair with the Arduino Due and Arduino Mega 2560. If you want to build one of Hansels designs from scratch, you can do so by following his free instructions on The advantage of Daviss kit is that it provides all the components, including a nice bamboo case and plastic front panel, along with a custom printed circ...


Which phishing messages have a near 100% click rate? "IndyWatch Feed Tech"

Training employees to spot phishing emails, messages and phone calls cant be done just once or once a year if the organization wants to see click rates decrease. For one thing, employees come and go (and change roles) with regularity. Secondly, threats change over time. Thirdly, knowledge and practices that arent regularly reinforced will be lost. And, finally, awareness isnt the same as knowledge. Just knowing a threat exists isnt the same as knowing how More


Xen Security Advisory 254 (CVE-2017-5753,CVE-2017-5715,CVE-2017-5754) - Information leak via side effects of speculative execution "IndyWatch Feed Tech"

Posted by Xen . org security team on Feb 23

Xen Security Advisory CVE-2017-5753,CVE-2017-5715,CVE-2017-5754 / XSA-254

Information leak via side effects of speculative execution


Corrections to ARM SP2 information:

* ARM 32-bit requires new firmware on some CPUs.
* Provide link to the ARM firmware page, accordingly.
* ARM 32-bit mitigations are complete for Cortex-A CPUs.
We do not have...


Arduino Watchdog Has Bite And Doesnt Need Treats "IndyWatch Feed Tech"

My dog Jasper isnt much of a watchdog: hes too interested in sleeping and chasing my cats to keep an eye on things. Fortunately, [Vadim] has come up with a more reliable alternative with this simple Arduino watchdog. Its designed to work with crypto coin mining rigs, but it could be easily adapted for other high-uptime uses, such as file servers or doomsday weapons.

The way it works is simple: a small program on the watched computer sends a command over the serial port: a polite hello. The Arduino watchdog picks this up and responds with an equally polite HELLO. That starts the watchdog running. A simple Java program on the watched computer then sends a ping every five seconds over the serial port to let the watchdog know it is still running okay.

If the watchdog doesnt receive this ping, it uses reed relay wired into the reset pins of the computer to trigger a reset. It then waits for the watched computer to say hello, starting the process again.

[Vadim] includes a demo video where the system resets an unreliable crypto mining rig. It does have limitations, of course: if the mining program crashes without taking down the e...


Xen Security Advisory 254 (CVE-2017-5753,CVE-2017-5715,CVE-2017-5754) - Information leak via side effects of speculative execution "IndyWatch Feed Tech"

Posted by Xen . org security team on Feb 23

Xen Security Advisory CVE-2017-5753,CVE-2017-5715,CVE-2017-5754 / XSA-254

Information leak via side effects of speculative execution


Information provided about migitation for Spectre variant 2.

Mention whether CPU hardware virtualisation extensions are required
in the SP3 mitigations summary table.

An additional patch "x86: fix...


SDL Now Disables Mir By Default In Favor Of Wayland Compatibility "IndyWatch Feed Tech"

With Mir focusing on Wayland compatibility now, toolkits and other software making direct use of Mir's APIs can begin making use of any existing Wayland back-end instead. GTK4 drops the Mir back-end since the same can be achieved with the Wayland compatibility and now SDL is now making a similar move...


FCC chair Pai receives NRA gun award for courage "IndyWatch Feed Tech"

Federal Communications Commission (FCC) Chairman Ajit Pai received the National Rifle Association's (NRA) Charlton Heston Courage Under Fire Award at the Conservative Political Action Conference on Friday.The NRA-sponsored award was...


Torrentz2 blocked on Google Chrome and Firefox over harmful programs "IndyWatch Feed Tech"

Chrome and Firefox prevent users from accessing Torrentz2 Over harmful programs

Torrent users have suffered a setback, as leading browsers Google Chrome and Firefox have blocked direct access to the popular torrent meta-search engine, for reported harmful programs. The past few hours, Chrome and Firefox users have been unable to access, TorrentFreak reported on Thursday.

When the users to access, they are greeted with the dreaded red window in Google Chrome with a warning that states, The site ahead contains harmful programs. The warning further adds, Attackers on might attempt to trick you into installing programs that harm your browsing experience (for example, by changing your homepage or showing extra ads on sites you visit).

While those using Mozilla Firefox received a similar warning. It said: Firefox blocked this page because it might try to trick you into installing programs that harm your browsing experience (for example, by changing your homepage or showing extra ads on sites you visit).

Advisory provided by Google Safe Browsing.

These warning messages are generated by Googles Safe Browsing algorithm which highlights websites that could cause potential danger to visitors. Chrome, Firefox, and others use this service to stop users from opening an unwanted software.

These warnings are normally the result of malicious ads, which does not appear to be in this case. The Torrentz2 operator told TorrentFreak that he currently only promotes a VPN service, which is by no means malicious.

However, Torrentz2 has been flagged for installing unwanted or malicious software on visitors computers, as per Googles Safe Browsing report.

Apparently, Google also flags social engineering attempts wherein false claims fool users to take a certain action, TorrentFreak had discovered from another site admin in the past.

Torrentz2s ad warned: Your Internet Provider is tracking your torrent activity! which theoretically could fit this category, as ISPs basically dont keep a record of users torrenting habits.

Currently, the website is down due to hosting issues, which the operator plans to fix soon.

For those torrent users, who are unaffected by the warning messages by Chrome and Firefox, and wish to visit the affected sites by bypassing the blocks can do so at their risk by taking proper measures (Chrome,...


Man Sues Feds For Installing Surveillance Camera on his Property "IndyWatch Feed Tech"

By Carolina

A 74-year old rancher in Texas discovered a small portal

This is a post from Read the original post: Man Sues Feds For Installing Surveillance Camera on his Property


Disney Holds $1000 Bonuses Hostage As Leverage In Contract Negotiations "IndyWatch Feed Tech"

AlterNet reports

Disney Inadvertently Exposes Trump's Tax Cut for the Scam It's Been from the Start

When Donald Trump signed the Tax Cuts and Jobs Act into law, he touted the legislation as a financial boon for American labor. As recently as January, Trump pointed to $1,000 bonuses for employees that American Airlines, AT&T, and Disney have announced as proof corporations would reinvest the billions of dollars they stand to save in their respective workforces. But if the president has offered a vision of how tax cuts for multinational corporations might operate in theory, an unfair labor practice complaint filed Tuesday reveals how they work in practice.

According to the Orange County Register, Unite Here Local 11, a union representing 2,700 housekeepers and other low-wage workers, has accused the Walt Disney Co. of effectively holding its bonuses hostage to secure a more favorable bargaining agreement. Disney is refusing to release the one-time payments "notwithstanding the union's lack of objection", the statement reads. "[The company] has violated its duty to bargain in good faith, and has engaged in conduct that is inherently destructive to rights guaranteed employees under the [National Labor Relations] Act." (For Disney's part, a spokeswoman maintains the company has a "strong offer on the table".)

[...] Regulatory findings released last month indicate [CEO Bob] Iger earned $36.3 million in compensation for 2017, which is $7.6 million less than he made the year before. The average union member at Disney World is paid $10.71 an hour, while just 3,000 employees earn in excess of $15. Disneyland staffers make a fraction more, the beneficiaries of California's decision last month to raise its minimum wage from $10.50 to $11 an hour. Unite Here's latest filing follows a separate complaint by a coalition of unions representing 38,000 Disney World workers in Florida.

Original Submission



Stephen Geary, CEO at Sothic Bioscience, joins our Biotech/Medical Board. "IndyWatch Feed Tech"

Stephen Geary, CEO at Sothic Bioscience, joins our Biotech/Medical Board.


InfoWars one step closer to YouTube ban after Florida conspiracy theory video "IndyWatch Feed Tech"

InfoWars is reportedly one step closer to being banned from YouTube after posting a video promoting a conspiracy theory about the Florida high school shooting.The channel, run by famed conspiracy theorist Alex Jones, received one strike from YouTube...


New uTorrent Web Streams and Downloads Torrents in Your Browser "IndyWatch Feed Tech"

While dozens of millions of people use uTorrent as their default BitTorrent client, the software has seen few feature updates in recent years.

That doesnt mean that the development team has been sitting still. Instead of drastically expanding the current software, they have started a new ambitious project: uTorrent Web.

This new piece of software, which launched rather quietly, allows users to download and stream torrents directly in their default web browsers, such as Chrome or Firefox.

The way it works is pretty straightforward. After installing the client, which is Windows-only at the moment, torrent and magnet links are automatically opened by uTorrent Web in a browser window.

People can use their regular torrent sites to find torrents or use the apps search box, which redirects them to Google.

Lets start

TorrentFreak took the application for a spin and it works quite well. Videos may take a short while to load, depending on the download speed, but then they play just fine. As in most modern video players, subtitles are also supported, if theyre included.

The streaming functionality supports both audio and video, with the option to choose a specific file, if a torrent contains more than one.

Applications and other files can also be downloaded, but these are obviously not streamed.

uTorrent Web in action

The current Beta release comes with several basic preferences settings and users can change things such as the download location and upload speed. Its likely that more options will follow as development matures, however.

Were very, very sensitive. We know people have been using uTorrent for a very long time and love it. So were very, very sensitive to that and gonna be sure to make sure that people feel that its an upgrade thats happening. Not that weve just destroyed the expe...


Pengutronix Gets Open-Source 3D Working On MX8M/GC7000 Hardware "IndyWatch Feed Tech"

We've known that Pengutronix developers had been working on i.MX8M / GC7000 graphics support within their Etnaviv open-source driver stack from initial patches posted in January. Those patches back at the start of the year were for the DRM kernel driver, but it turns out they have already got basic 3D acceleration working...


Rapidly Prototyping Prosthetics, Braille, and Wheelchairs "IndyWatch Feed Tech"

We live in an amazing time where the availability of rapid prototyping tools and expertise to use them has expanded faster than at any other time in human history. We now have an amazing ability to quickly bring together creative solutions perfect examples of this are the designs for specialized arm prosthetics, Braille printing, and custom wheelchair builds that came together last week.

Earlier this month we published details about the S.T.E.A.M. Fabrikarium program taking place at Makers Asylum in Mumbai. The five-day event was designed to match up groups of makers with mentors to build assistive devices which help improve the condition of differently-abled people.

The participants were split into eight teams and they came up with some amazing results at the end of the five-day program.

Hands-On: Prosthetic Designs That Go Beyond

Three teams worked on projects based on Bionico a myoelectric prosthesis

DIY Prosthetic Socket a Human Machine Interface : [Mahendra Pitav aka Mahen] lost his left arm during the series of train bomb blasts in Mumbai in 2006, which killed 200 and injured over 700 commuters. He uses a prosthetic arm which is essentially a three-pronged claw that is cable activated using his other good arm. While it is useful, the limited functionality restricted him from doing many simple things. The DIY Prosthetic socket team worked with [Mahen] and [Nico Huchet] from MyHumanKit (who lost his right arm in an accident 16 years back), and fabricated a prosthetic forearm for [Mahen] with a modular, 3D printed accessory socket. Embedded within the arm is a rechargeable power source that provides 5V USB output at the socket end to power the devices that are plugged in. It also provides a second port to help recharge mobile phones. Also embedded in the arm was an IR reflective sensor that can be used to sense muscle movements and help trigger specific functions of add-on circuits, for example servos.



'Memtransistor' Forms Foundational Circuit Element to Neuromorphic Computing "IndyWatch Feed Tech"

Combining characteristics of a memristor with a transistor mimics the multiple synapses of neurons Illustration: Northwestern University

Computers that operate more like the human brain than computersa field sometimes referred to as neuromorphic computinghave promised a new era of powerful computing.

While this all seems promising, one of the big shortcomings in neuromorphic computing has been that it doesnt mimic the brain in a very important way. In the brain, for every neuron there are a thousand synapsesthe electrical signal sent between the neurons of the brain. This poses a problem because a transistor only has a single terminal, hardly an accommodating architecture for multiplying signals.

Now researchers at Northwestern University, led by Mark Hersam, have developed a new device that combines memristorstwo-terminal non-volatile memory devices based on resistance switchingwith transistors to create what Hersam and his colleagues have dubbed a memtransistor that performs both memory storage and information processing.

This most recent research builds on work that Hersam and his team conducted back in 2015 in which the researchers developed a three-terminal, gate-tunable memristor that operated like a kind of synapse.

While this work was recognized as mimicking the low-power computing of the human brain, critics didnt really believe that it was acting like a neuron since it could only transmit a signal from one artificial neuron to another. This was far short of a human brain that is capable of making tens of thousands of such connections.

Traditional memristors are two-terminal devices, whereas our memtransistors combine the non-volatility of a two-terminal memristor with the gate-tunability of a three-terminal transistor, said Hersam to IEEE Spectrum. Our device design accommodates additional terminals, which mimic the multiple synapses in neurons.

Hersam believes that these unique attributes of these multi-terminal memtransistors are likely to present a range of new opportunities for non-volatile memory and neuromorphic computing.

In research described in the journal Nature , Hersam and his colleagues developed a d...


Tech and telecom lobbying groups announce joint cybersecurity initiative "IndyWatch Feed Tech"

Lobbying groups representing major technology and telecommunications firms are teaming up to jointly tackle cybersecurity issues.The Information Technology Industry Council (ITI) and USTelecom on Friday announced the creation of the Council to...


Khaki Rodway, Cofounder of NewSpace NYC, joins our Space Settlement Board. "IndyWatch Feed Tech"

Khaki Rodway, Cofounder of NewSpace NYC, joins our Space Settlement Board.


PEEC Planetarium Show: "The Analemma Dilemma" "IndyWatch Feed Tech"

[Analemma by Giuseppe Donatiello via Wikimedia Commons] Dave and I are giving a planetarium show at PEEC tonight on the analemma.

I've been interested in the analemma for years and have written about it before, here on the blog and in the SJAA Ephemeris. But there were a lot of things I still didn't understand as well as I liked. When we signed up three months ago to give this talk, I had plenty of lead time to do more investigating, uncovering lots of interesting details regarding the analemmas of other planets, the contributions of the two factors that go into the Equation of Time, why some analemmas are figure-8s while some aren't, and the supposed "moon analemmas" that have appeared on the Astronomy Picture of the Day. I added some new features to the analemma script I'd written years ago as well as corresponding with an expert who'd written some great Equation of Time code for all the planets. It's been fun.

I'll write about some of what I learned when I get a chance, but meanwhile, people in the Los Alamos area can hear all about it tonight, at our PEEC show: The Analemma Dilemma, 7 pm tonight, Friday Feb 23, at the Nature Center, admission $6/adult, $4/child.


2,000 Colorado DOT computers infected with SamSam Ransomware "IndyWatch Feed Tech"

By Uzair Amir

Another day, another ransomware scam This time, it is

This is a post from Read the original post: 2,000 Colorado DOT computers infected with SamSam Ransomware


23 Attorneys General Refile Challenge to FCC Net Neutrality Repeal "IndyWatch Feed Tech"

The FCC's order to overturn net neutrality protections was officially published in the Federal Register today and soon thereafter, the attorneys general of 22 states and Washington DC filed a lawsuit challenging the FCC's order. The coalition filed a suit earlier this year, but agreed last week to withdraw it until the FCC published the order, Reuters reports. "Today, the FCC made official its illegal rollback of net neutrality -- and, as promised, our coalition of attorneys general is filing suit," New York Attorney General Eric Schneiderman said in a statement. "Consumers and businesses in New York and across the country have the right to a free and open internet, and our coalition of attorneys general won't stop fighting to protect that right."

[...] The attorneys general say in their complaint that the FCC's order was "arbitrary, capricious and an abuse of discretion within the meaning of the Administrative Procedure Act." They also say it violates federal law and conflicts with the notice-and-comment rulemaking requirements. They're asking the court to vacate the order.


Original Submission

Read more of this story at SoylentNews.


Two-way communication is possible with a single quantum particle "IndyWatch Feed Tech"

One photon can transmit information in two directions at once.


Mini lab-created organs successfully check cancer treatments "IndyWatch Feed Tech"

Lab-grown tumor tissue matched response of the patients tumor to cancer treatment.


Laptops with 5G connectivity coming next year "IndyWatch Feed Tech"

Intel partners with Microsoft, Dell, HP, and Lenovo.

Intel has partnered with four major PC makers to bring 5G technology to laptops by the end of next year.

The chip giant is working with Microsoft, HP, Dell, and Lenovo to bring 5G connectivity to PCs with Intels XMM 8000 series modems.


The Commodore Story Documentary Premieres Today "IndyWatch Feed Tech"

What is it about a computer that was introduced 36 years ago by a company that would be defunct 12 years later that engenders such passion that people still collect it to this day? Were talking about the Commodore 64, of course, the iconic 8-bit wonder that along with the other offerings from Commodore International served as the first real computer to millions of us.

Theres more to the passion that Commodore aficionados exhibit than just plain nostalgia, though, and a new documentary film, The Commodore Story, seeks to explore both the meteoric rise and fall of Commodore International. Judging from the official trailer below, this is a film anyone with the slightest interest in Commodore is not going to want to miss.

It will of course dive into the story of how the C64 came to be the best selling computer in history. But Commodore was far from a one-trick pony. The film traces the history of all the Commodore machines, from the PET computers right through to the Amiga. There are interviews with the key players, too, including our own Bil Herd. Bil was a hardware engineer at Commodore, designing several machines while there. He has shared some of these stories here on Hackaday, including the development of the C128  (successor to the C64) and making th...


Video Friday: More Boston Dynamics, OpenCat Robot, and Uncanny Valley "IndyWatch Feed Tech"

Your weekly selection of awesome robot videos Photo: Engineered Arts U.K. company Engineered Arts has a new line of entertainment robots called Mesmer.

Video Friday is your weekly selection of awesome robotics videos, collected by your Automaton bloggers. Well also be posting a weekly calendar of upcoming robotics events for the next few months; heres what we have so far (send us your events!):

International Symposium on Medical Robotics  March 1-3, 2018  Atlanta, Ga., USA
HRI 2018  March 5-8, 2018  Chicago, Ill., USA
US National Robotics Week  April 7-17, 2018  United States
Xconomy Robo Madness  April 12, 2018  Bedford, Mass., USA
NASA Swarmathon  April 17-19, 2018  Kennedy Space Center, Fla., USA
RoboSoft 2018  April 24-28, 2018  Livorno, Italy
ICARSC 2018  April 25-27, 2018  Torres Vedras, Portugal
NASA Robotic Mining Competition  May 14-18, 2018  Kennedy Space Center, Fla., USA
ICRA 2018  May 21-25, 2018  Brisbane, Australia

Let us know if you have suggestions for next week, and enjoy todays videos.

An extra special thank-you to Boston Dynamics this week for posting another video of SpotMini that includes a nice, detailed explanation of whats actually going on:

A test of SpotMinis ability to adjust to disturbances as it opens and walks through a door. A person (not shown) drives the robot up to the door, points the hand at the door handle, then gives the GO command, both at the beginning of the video and again at 42 seconds. The robo...


DIY Cryogel Sustains Live Cells "IndyWatch Feed Tech"

We like to think our readers are on the cutting edge. With the advent of CRISPR kits at home and DIY bio blooming in workshops across the world, we wanted to share a video which may be ahead of its time. [The Thought Emporium] has just shown us a way to store eukaryotic cells at room temperature. His technique is based on a paper published in Nature which he links to from the YouTube page, but you can see his video after the break.

Eukaryotic cells, the kind we are made of, have been transported at low temperatures with techniques like active refrigeration, liquid nitrogen, and dry ice but those come with a host of problems like cost, convenience, and portability. Storing the cells with cryogel has been shown to reliably keep the cells stable for up to a week at a time and [The Thought Emporium] made some in his homemade freeze-dryer which hes shown us before. The result looks like a potato chip, but is probably less nutrious than astronaut ice cream.

If cell transport doesnt tickle your fancy, cryogel is fascinating by itself as a durable, lightweight insulator similar to Aerogel. You can make Aerogel at home too.


CNN Town Hall: Stick to the Script "IndyWatch Feed Tech"

Via: Real Clear Politics: Marjory Stoneman Douglas High School shooting survivor Colton Haab appeared on FOX News Tucker Carlson Tonight to talk about his saga with CNN and how they scripted a question for him to use at Wednesday nights town hall event hosted by the network and moderated by CNNs Jake Tapper. Haab, a []


This Week in Open Source News: Documentary Series on Women in Tech to Premiere Next Month, Fake Linux News & More "IndyWatch Feed Tech"

This Week in Open Source News: Documentary Series on Women in Tech to Premiere Next Month, Fake Linux News & More


Ancient Sculptures Return to Mosul as Digitally Reconstructed Replicas "IndyWatch Feed Tech"

Submillimeter 3D scanning produces precise copies of Assyrian statues Photo: Factum Foundation for Digital Technology in Conservation

Photo: Factum Foundation for Digital Technology in Conservation Hold Still: Artists scan a lamassu at night in the British Museum.

The Iraqi city of Mosul is still recovering from its brutal occupation by the Islamic State. The city suffered devastating bloodshed during that time, and many archaic statues and artifacts were destroyed by militants and vandals. Raising the city from the rubble will be rough work. In at least a couple of instances, though, resurrecting a piece of the ancient past will come courtesy of a 3D scanner.

Later this month, two ultradetailed facsimiles of the massive stone statues known as lamassu, protective spirits that date back nearly 3,000 years to the Assyrian empire, will begin a journey from the Netherlands to take up permanent residence in Mosul. As products of the digital age, their journey poses questions about authenticity and where objects belong.

These new spirits are copies of two lamassu originally excavated by a British archaeological expedition in the mid-19th century. While charting Mesopotamia, the group uncovered a field of artifacts that had been buried for 2,700 years.

The lamassu they found thereimposing winged statuesonce stood guard along the walls surrounding the ancient city of Nineveh, near what is now Mosul. The excavators brought two of the statues back to London.

In 2004, the art historian Adam Lowe set out to record these statues at 300-micrometer resolution in order to produce copies of them for a traveling exhibition. Lowe heads Factum Arte, an art studio that has made a stir by casting precise facsimiles of antiquities.

For five weeks, Lowe and his team spent every evening at the British Museum scanning the lamassu and relief panels and shards. For the lamassu, they used a white-light scanner built by the c...


Stable kernels 4.4.117, 4.9.83, 4.14.21, and 4.15.5 released "IndyWatch Feed Tech"

The 4.4.117, 4.9.83, 4.14.21, and 4.15.5 stable kernels have been released. They contain a large number of updates throughout the tree; users should upgrade.


Windows licenses for under 13 USD!(10% promote code) "IndyWatch Feed Tech"

We offer 10% coupon code:SKtechworm10%

Microsoft Windows 10 Pro OEM CD-KEY GLOBAL origin price: $57.04 -use the code: 12.60 usd

Office2016 Professional Plus CD Key Global origin price:$244.14 use the code: 31.50 usd

Visio Professional 2016 Key Global origin price: $245.49 use the code: 25.39 usd

Windows10 PRO OEM + Office2016 Professional Plus CD Keys Pack  origin price: $301.18 -use the code: 39.14 usd

Windows licenses are usually expensive. For example, for an original license of Microsofts Windows 10 Pro in the official Microsoft store 305 USD payable. A cheaper alternative is the key marketplace SCDKey. Here you can save on licenses for software or games properly!

What makes it all interesting is that the site works really and we had the opportunity to test it with our pocket money . So, in this specific case, we use the Office2016 Professional Plus CD Key Global link.

Windows licenses for under 13 USD!(promote code)

Then we click on  Buy Now  or  Buy Now if changing the website language at the top of the screen if you need, and we are presented with the registration window in this case the values that are initially presented US Dollars Euros to spend. We can register on the site or, alternatively, we can use one of our Facebook, G + or WindowsLive accounts.

Windows licenses for under 13 USD!(promote code)

After you have logged in, you can proceed to the product confirmation page and click on Send Order and go to the payment method...


Fake News is Part of a Bigger Problem: Automated Propaganda "IndyWatch Feed Tech"

The Columbia Journalism Review has some analysis of the problem of disinformation and propaganda being actively spread over social control media. As the situation is studied more, albeit belatedly, the nature of social control's business model gets more daylight.

"That fundamental goal is to get the user to stay as long as possible," Ghosh said in an interview. "Their motivations are differentfor platforms, it is to maximize ad space, to collect more information about the individual, and to rake in more dollars; and for the disinformation operator, the motive is the political persuasion of the individual to make a certain decision. But until we change that alignment, we are not going to solve the problem of disinformation on these platforms."

After Mueller released his indictments, sociologist Zeynep Tufekci noted on Twitter that the indictment "shows [Russia] used social media just like any other advertiser/influencer. They used the platforms as they were designed to be used."

The phrase surveillance capitalism gets more traction as it becomes acknowledged that while social control media do not actively spread disinformation and propaganda it is a side effect of collecting as much personal information as legally (and somtimes illegally) allowed. That information is aggregated from multiple sources both internal and external to social control media itself. As a result it is getting increasingly difficult to distinguish between disinformation and authentic political speech.

Automated attacks make that differentiation that much harder. Faecebook gets the most attention, but the others, including YouTube work the same way and can thus be manipulated just as easily. (Ed: Speaking of YouTube, to single out one topic as an example, as seen recently with FCC comments on Net Neutrality, only 17%of the comments the FCC received were legitimate with the rest filled in by clumsy bots.)

Source : Fake news is part of a bigger problem: automated propaganda

Original Submission

Read more of this story at SoylentNews.


Security updates for Friday "IndyWatch Feed Tech"

Security updates have been issued by Debian (cups, gcc-6, irssi, kernel, and squid3), Fedora (mupdf), Mageia (irssi, mpv, qpdf, and quagga), openSUSE (libmad and postgresql95), SUSE (kernel and php5), and Ubuntu (kernel, linux-lts-trusty, linux-raspi2, and wavpack).


Hacking these IoT baby monitors is childs play, researchers reveal "IndyWatch Feed Tech"

Austrian security researchers have this week warned about the latest baby monitor affected by critical security vulnerabilities which raise very real privacy concerns.

Read more in my article on the Bitdefender Box blog.


Chaos backdoor, a malicious code that returns from the past targets Linux servers "IndyWatch Feed Tech"

Security experts from GoSecure, hackers are launching SSH brute-force attacks on poorly secured Linux servers to deploy a backdoor dubbed Chaos backdoor.

This post describes a backdoor that spawns a fully encrypted and integrity checked reverse shell that was found in our SSH honeypot, states the report published by GoSecure.

We named the backdoor Chaos, following the name the attacker gave it on the system. After more research, we found out this backdoor was originally part of the sebd rootkit that was active around 2013.

The Chaos backdoor was one of the components of the sebd Linux rootkit that appeared in the threat landscape back in 2013, researchers discovered a post on, where a user claims to know how the backdoor was made publicly available.

It seems that the source code of the backdoor was caught by a researcher that released it on the forum by changing the name of the backdoor in Chaos to trick members into believing that is was a new threat.

The malicious code is now being used by attackers in the wild to target Linux servers worldwide.

Researchers performed an Internet-wide scan using the handshake extracted from the client in order to determine the number of infected Linux servers and they discovered that this number is quite low, below the 150 marks.

chaos infection worldmap

The installation of the Chaos backdoor starts with the attacker downloading a file that pretended to be a jpg from

The file was currently a .tar archive containing the Chaos (ELF executable), the client (ELF executable), initrunlevels Shell script, the install Shell script.

Chaos, in the tar archive, is the actual backdoor that is installed on the victims system and the Client file is the client to connect to the installed backdoor.



Plasma Mobile Could Give Life to a Mobile Linux Experience "IndyWatch Feed Tech"

Plasma Mobile Could Give Life to a Mobile Linux Experience


Radeon Linux OpenGL Driver Continues Giving Its Best Against Windows 10 "IndyWatch Feed Tech"

With having around a Windows 10 installation this week for the latest Windows 10 WSL vs. Linux benchmarking, I also carried out some fresh benchmarks of the Radeon gaming performance between Windows 10 and Ubuntu Linux using the very latest drivers on each platform. This time around a Radeon RX 580 and RX Vega 64 were used for this benchmarking.


Animal Study Shows How To Retrain The Immune System To Ease Food Allergies "IndyWatch Feed Tech"

Treating food allergies might be a simple matter of teaching the immune system a new trick, researchers at Duke Health have found.

In a study using mice bred to have peanut allergies, the Duke researchers were able to reprogram the animals' immune systems using a nanoparticle delivery of molecules to the lymph nodes that switched off the life-threatening reactions to peanut exposures.


They focused on the Th2-type cytokine immune response, which is increasingly understood as a driver of the overactive immune responses in allergy attacks. In an appropriate immune response, Th2 works in tandem with Th1, but during allergic reactions, Th2 is overproduced and Th1 is diminished.

The solution appears simple enough: deliver more Th1-type cytokines ahead of an allergen exposure to restore balance. But it has proven difficult. A test of this type was attempted as an asthma therapy, but it required a massive dose to the lungs and was ineffective.

In their experiment with the peanut-allergy mice, St. John and colleagues instead delivered antigen- and cytokine-loaded nanoparticles into the skin. The nanoparticles traveled to the lymph nodes, where they dissolved and dispensed their payload at the source of the immune response.

Animals that received this therapy no longer went into an acute allergic response called anaphylaxis when they were subsequently exposed to peanuts. The new-found tolerance was long-lasting, so did not need to be repeated ahead of each exposure to the allergen.

"The Th1 and Th2 sides of immunity balance each other," St. John said. "We reasoned that since we know Th2 immunity is over-produced during allergic responses, why not try to skew the immune response back the other direction? By delivering cytokines to the lymph nodes where immune responses are established, we were able to re-educate the immune system that an allergic response is not an appropriate one."

The approach could theoretically be applied to other allergens, including environmental triggers such as dust and pollen. Additional experiments are underway to move the findings into human trials.

Original Submission

Read more of this story at SoylentNews.


Next Week: Bring-A-Hack In NYC "IndyWatch Feed Tech"

Hackaday, along with Ultimaker and New Lab, are hosting an extravaganza of super hacks and more in New York next week. Grab a project youre working on and join us on Wednesday, February 28 in Brooklyn.

This is all about showcasing the coolest, newest stuff being worked on by makers, hackers, artists, and engineers. Get ready to talk hardware, stare into far too many LEDs, and enjoy drinks and camaraderie. The event is being hosted by New Lab, and were teaming up with Ultimaker to bring you a night of fun and solder fumes. We have great speakers lined up, and weve blocked out some time for lightning talks too so fill out this form if youre interested.

Support for the KiCad Project

RSVPs for this meetup are $5, with all proceeds being donated to the KiCad project via CERN.

Sending some funding to support this Open Source EDA project is a great thing. If this fee is a no-go for you, we&#8217...


2017 Was a Record Year for ID Theft in the U.S. "IndyWatch Feed Tech"

At least 16.7 million Americans had their identities compromised Photo: iStock Photo

This will not come as a big shock: an estimated 16.7 million Americans were victims of identity theft last year, according to a survey published by the research and advisory firm Javelin Strategy & Research. And the company says this tops the previous record of 15.4 million compromised identities which occurred, not surprisingly, in 2016.

Javelin notes in its report that cyber thieves have changed tactics over the past year, which has made them more efficient and effective. They are now focusing on targeting cellphones and email accounts to obtain a persons complete details, such as their name, address, and social security number, instead of trying to access individual pieces of personal information in order to piece together a profile.

This strategy is making it easier for cyber criminals to open fraudulent accounts and to exploit them for a longer period of time before they are discovered. The company estimates that fraud losses last year amounted to some US $16.8 billion.

In addition, nearly 1 in 3 Americans were notified of a data breach in 2017, a significant jump from 1 in 8 in 2016, Javelin reports. A major reason was the consumer credit bureau Equifax breach that was discovered on 29 July 2017, in which the personal information of 145.5 million people (130 million Americans, 15.2 million British citizens, and 8,000 Canadians) was compromised. It's unclear how many of those affected also became victims of identity theft as a result.

As if the loss of names, addresses, social security numbers, and/or birthdates wasnt enough, Equifax quietly informed the Senate Banking Committee earlier this month that even more information had been accessed in their data breach than it first reported.

Equifax told the committee that for an unknown number of persons, email addresses, driver license numbers (including issue...


OMG botnet, the first Mirai variant that sets up proxy servers on vulnerable devices "IndyWatch Feed Tech"

Researchers at Fortinet have discovered the OMG botnet, the first Mirai variant that sets up proxy servers on the compromised IoT devices.

A new variant of the infamous Mirai botnet appeared in the threat landscape, it was discovered by researchers at Fortinet that referred it as OMG because of strings containing OOMGA in the configuration table.

For this reason, we decided to name this variant OMG.The table, originally encrypted, was decrypted using 0xdeadbeef as the cipher key seed, using the same procedure adopted for the original Mirai. The first thing we noticed are the strings /bin/busybox OOMGA and OOMGA: applet not found. wrote Fortinet.

The name Mirai was given to the Mirai bot because of the strings /bin/busybox MIRAI and MIRAI: applet not found, which are commands to determine if it has successfully brute-forced its way into the targeted IoT device. These strings are similar with other variations such as Satori/Okiru, Masuta, etc. 

The Mirai botnet was first spotted in August 2016 by the security researcher MalwareMustDie, it was specifically designed to compromise vulnerable or poorly protected IoT. Once Mirai malware compromises an IoT device it recruits it into a botnet primarily used for launching DDoS attacks, such as the one that hit Dyn DNS service.

In October 2016, the Mirai source code was leaked and threat actors in the wild started customizing their Mirai botnet.

The OMG botnet includes most of Mirais features and modules, including the attack, killer, and scanner modules, but also adds new ones.

According to Fortinet its configuration includes two strings used to add a firewall rule to ensure traffic on two random ports is allowed.

This variant also adds and removes some configurations that can be found in the original Mirai code. Two notable additions are the two strings that are used to add a firewall rule to allow traffic on two random ports, which we will discuss in the latter part...


3,000 Databases with 200 Million Unique accounts found on Dark Web "IndyWatch Feed Tech"

By Waqas

Dark Web is a strange place where one can conduct

This is a post from Read the original post: 3,000 Databases with 200 Million Unique accounts found on Dark Web


The economic impact of cybercrime? Almost $600 billion "IndyWatch Feed Tech"

Cybercrime costs businesses close to $600 billion, or 0.8 percent of global GDP, which is up from a 2014 study that put global losses at about $445 billion, according to a report by McAfee, in partnership with the Center for Strategic and International Studies (CSIS). Adopting new technologies The report attributes the growth over three years to cybercriminals quickly adopting new technologies, the ease of engaging in cybercrime including an expanding number of cybercrime More


Counterfeit digital certificates for sale on underground forums "IndyWatch Feed Tech"

Signing malicious code with valid digital certificates is a helpful trick used by attackers to maximize the odds that malware wont be flagged by antivirus solutions and often even by network security appliances. Digitally signed malware can also bypass OS protection mechanisms that install or launch only programs with valid signatures. As it happens, it has recently been pointed out that the practice of signing malicious code is more widespread than previously thought. But, while More


Glxinfo Gets Updated With OpenGL 4.6 Support, More vRAM Reporting "IndyWatch Feed Tech"

The glxinfo utility is handy for Linux users in checking on their OpenGL driver in use by their system and related information. But it's not often that glxinfo itself gets updated, except that changed today with the release of mesa-demos-8.4.0 as the package providing this information utility...


New infosec products of the week: February 23, 2018 "IndyWatch Feed Tech"

Cisco offers cloud-based endpoint security solutions for MSSPs Cisco is offering MSSPs security, visibility, and control of customer endpoints. Their endpoint security portfolio includes: Cisco AMP for Endpoints, Cisco Umbrella, and Meraki Systems Manager to offer protection against advanced malware and threats. AMP for Endpoints prevents breaches and blocks malware at the point of entry, then continues to watch, analyze, and record file activity, regardless of the files disposition. Cisco Umbrella blocks requests to malicious More


3 Warning Flags of DevOps Metrics "IndyWatch Feed Tech"

"Human beings adjust behavior based on the metrics they're held against." Choose your metrics carefully.

Metrics. Measurements. Data. Monitoring. Alerting. These are all big topics for DevOps and for cloud-native infrastructure and application development more broadly. In fact, acm Queue, a magazine published by the Association of Computing Machinery, recently devoted an entire issue to the topic.


Biohacker Regrets Injecting Himself With Gene Therapy in Front of a Live Audience "IndyWatch Feed Tech"

A Biohacker Regrets Publicly Injecting Himself With CRISPR

When Josiah Zayner watched a biotech CEO drop his pants at a biohacking conference and inject himself with an untested herpes treatment, he realized things had gone off the rails.

Zayner is no stranger to stunts in biohackingloosely defined as experiments, often on the self, that take place outside of traditional lab spaces. You might say he invented their latest incarnation: He's sterilized his body to "transplant" his entire microbiome in front of a reporter. He's squabbled with the FDA about selling a kit to make glow-in-the-dark beer. He's extensively documented attempts to genetically engineer the color of his skin. And most notoriously, he injected his arm with DNA encoding for CRISPR that could theoretically enhance his musclesin between taking swigs of Scotch at a live-streamed event during an October conference. (Experts sayand even Zayner himself in the live-stream concededit's unlikely to work.)

So when Zayner saw Ascendance Biomedical's CEO injecting himself on a live-stream earlier this month, you might say there was an uneasy flicker of recognition.

Read more of this story at SoylentNews.


Email inboxes still the weakest link in security perimeters "IndyWatch Feed Tech"

Over one-third of all security incidents start with phishing emails or malicious attachments sent to company employees, according to F-Secure. Types of attacks The single most common source of breaches analyzed in the report was attackers exploiting vulnerabilities in an organizations Internet facing services, which accounted for about 21 percent of security incidents investigated by F-Secures incident responders. Phishing and emails with malicious attachments together accounted for about 34 percent of breaches, which F-Secure Principal More


A Robot For Everything: Now Even Zippers "IndyWatch Feed Tech"

Sometimes we see projects that are so clever while being remarkably simple, that we cant help thinking: Why didnt I think of that! Take [Haresh Karnan]s zipper robot, for example. Its a well-designed 3D-printed shell with two geared motors for traction, that can both undo and do up zippers. Behind that seemingly simple design probably lies a huge iterative design process to arrive at a shape perfect for the job, but the end result is so elegant that even [Haresh]s write-up and page for the project are short and to the point. Download the STL file, snap in the motors, apply to a zipper, and away you go. He suggests rubber bands as a traction aid, but thats pretty much it.

The results can be seen in the video below the break. While we might be tempted to make jokes about the terminally lazy using this device to save unnecessary labour after a toilet break, we can see that it might have a real application. If you have any friends with restricted dexterity you will understand how having an automated helper with such a fiddly task as a zipper could be an extremely useful accessibility aid.

While were on the subject of zippers, if you missed it a few weeks ago heres our in-depth look at their story.

Linux 4.15 Kernel Is Now The Default In Ubuntu 18.04 LTS "IndyWatch Feed Tech"

After sitting in Bionic-Proposed the past week, Ubuntu 18.04 LTS has officially moved from the Artful Aardvark's Linux 4.13 kernel to now running on Linux 4.15...


How Cultural Evolution Can Give Us the Tools to Build Global-Scale Resilience "IndyWatch Feed Tech"

Theres an unsettling premise at the heart of Joe Brewers lifes work.

Brewer is a change strategist dedicated to ensuring a thriving global civilization exists 100 years from nowand he believes this is becoming less likely every year. Theres rising instability in our fragile and rapidly changing biosphere, he says, and society is unlikely to escape harm.

We are going through a period of planetary change, and there is a collapse dynamic thats already happening. The global scale social complexity we have today is at risk, and we may lose it, he told me in a conversation for Singularity Hub.


Re: review of LibVNCServer/vncterm proxmox/vncterm proxmox/spiceterm xenserver/vncterm qemu/ui/console.c "IndyWatch Feed Tech"

Posted by Solar Designer on Feb 23

Hi Dominik,

In these GitHub repos, which I thought were official:

Shortly after I sent the message, I realized I should have included
these links in it. Ditto for other projects, so here they are:

XenServer vncterm:

Might be also out of date, since last commit is 2 years ago? But could
also be latest. These things don't have...


Mir's Wayland Support Will Now Let You Drag Around Windows "IndyWatch Feed Tech"

I was surprised to learn that up until this week, Mir's initial Wayland support didn't allow for windows of Wayland clients to be moved around the screen...


Re: Fwd: [SECURITY] CVE-2018-1304 Security constraints mapped to context root are ignored "IndyWatch Feed Tech"

Posted by Mark Thomas on Feb 23

The problem typically occurs with security annotations on servlets. In
this case the security annotations pick up the mappings from the servlet
they are annotating. If you changed the servlet mapping from "" to "/"
that would almost certainly significantly change the behaviour of the
web application since you are changing the mapping from "exact match to
context root" to "default servlet".



CERN scientists get antimatter ready for its first road trip "IndyWatch Feed Tech"

Antimatter is notoriously tricky to store and study, thanks to the fact that it will vanish in a burst of energy if it so much as touches regular matter. The CERN lab is one of the only places in the world that can readily produce the stuff, but getting it into the hands of the scientists who want to study it is another matter (pun not intended). After all, how can you transport something that will annihilate any physical container you place it in? Now, CERN researchers are planning to trap and truck antimatter from one facility to another.

Antimatter is basically the evil twin of normal matter. Each antimatter particle is identical to its ordinary counterpart in almost every way, except it carries the opposite charge, leading the two to destroy each other if they come into contact. Neutron stars and jets of plasma from black holes may be natural sources, and it even seems to be formed in the Earths atmosphere with every bolt of lightning.


Re: review of LibVNCServer/vncterm proxmox/vncterm proxmox/spiceterm xenserver/vncterm qemu/ui/console.c "IndyWatch Feed Tech"

Posted by Dominik Csapak on Feb 23


Thanks for the review.

I do not know where you looked at our code, but in our official git
repositories for vncterm[1] and spiceterm[2]

those issues are already fixed (since 2017-05-05)

i changed those variables all to unsigned int, which makes those
increments defined behavior, and the range checks are ok, because
they cannot be negative anymore.
(it may behave strange, but you cannot trigger an out-of-bounds
read/write anymore)


Hachette CEO: "The eBook is a stupid product." "IndyWatch Feed Tech"

Arnaud Nourry, the CEO of Lagardre Publishing (the parent company of Hachette Book Group), gave an interview to in which he claims, "the eBook is a stupid product."

In the US and UK, the ebook market is about 20% of the total book market, everywhere else it is 5%-7% because in these places the prices never went down to such a level that the ebook market would get significant traction. I think the plateau, or rather slight decline, that we're seeing in the US and UK is not going to reverse. It's the limit of the ebook format. The ebook is a stupid product. It is exactly the same as print, except it's electronic. There is no creativity, no enhancement, no real digital experience. We, as publishers, have not done a great job going digital. We've tried. We've tried enhanced or enriched ebooks didn't work. We've tried apps, websites with our content we have one or two successes among a hundred failures. I'm talking about the entire industry. We've not done very well.

For an in-depth explanation of Arnaud Nourry's comments, we go to The Digital Reader:

Hachette's sales are low because Hachette keeps their ebook prices high. If you check the Author Earnings report, you will see that ebooks make up a significant part of the market. And it's not just a tiny group of readers who like ebooks; almost all of romance has gone digital, as well as around half of the SF market.

This guy understands so little about ebooks that it is almost frightening.

Read more of this story at SoylentNews.


Intel ANV Getting VK_KHR_16bit_storage Support Wrapped Up "IndyWatch Feed Tech"

Igalia's Jose Maria Casanova Crespo sent out a set of patches today for fixes that allow for the enabling of the VK_KHR_16bit_storage extension within Intel's ANV Vulkan driver...


With rules repealed, what's next for net neutrality? "IndyWatch Feed Tech"

The battle over the Federal Communications Commissions (FCC) repeal of net neutrality rules is entering a new phase, with opponents of the move launching efforts to preserve the Obama-era consumer protections.The net neutrality rules had required...


Let's Encrypt Hits 50 Million Active Certificates and Counting "IndyWatch Feed Tech"

In yet another milestone on the path to encrypting the web, Lets Encrypt has now issued over 50 million active certificates. Depending on your definition of website, this suggests that Lets Encrypt is protecting between about 23 million and 66 million websites with HTTPS (more on that below).


Mentor Embedded Linux Gains Cloud-Based IoT Platform "IndyWatch Feed Tech"

Mentor announced a Mentor Embedded IoT Framework platform that builds on top of Mentor Embedded Linux with cloud-based IoT cloud services ranging from device authentication and provisioning to monitoring and diagnostics.


Cybersecurity Tips to Protect Small Business from Cyber Attacks "IndyWatch Feed Tech"

Small Business is a privileged target of attackers, in fact, there is a high risk of having problems with hackers if you are a large company or even a media player.

Do you have a small company? If the answer is yes, and you think that no cyber attack will ever affect you, think again. Small Business is a privileged target of attackers, in fact, there is a high risk of having problems with hackers, if you are a large company or even a media player.

According to recent reports, more than 40% of cyber attacks are targeting companies with fewer than 500 employees. More disturbing studies show that hackers attack every fifth small company. In most cases, these companies shut down because their security plans do not exist or there is a huge gap in providing total protection.

Cybersecurity is the most important way to ensure that your business does not run the risk of malicious attacks, especially if the people behind them do not show up.

Therefore, it is essential to take strong security measures if you do not want to lose your job for life and trust of your valuable customers. Moreover, prominent organizations expect their confidential information to hide under any circumstances. If you find that this is not the case, your customers will turn to other companies.

To avoid this, we would like to share with you how you can protect your small business from cyber attacks or more simply, tips to protect small business from cyber attacks.

Make as Many Backups as Possible

The reserve is significant if you want to protect all confidential data from cyber attacks and hackers who create malicious software and send it to devices that are explicitly used by small employees are inexorable. If you create multiple backups, you can sleep well at night, knowing that these files, presentations, etc. are present safe and sound. It is important not to get stained forever when it comes to malware.

Application of the Most Powerful Antivirus Program

When using a reliable security solution, it is essential to keep your business altogether.

Do not forget to choose the one antivirus software that protects your computer against all types of malware; antivirus program that eventually needs to detect and eliminate spam, spyware, Trojans, phishing attacks, etc. after selecting the best option for your business, but dont forget to update it regularly.

Training of Employees

The people who work for you need to know that by clicking on the random links that you received through your professional...


US Border Patrol Hasnt Validated E-Passport Data for Years "IndyWatch Feed Tech"

Passports, like any physical ID, can be altered and forged. That's partly why for the last 11 years the United States has put RFID chips in the back panel of its passports, creating so-called e-Passports. The chip stores your passport informationlike name, date of birth, passport number, your photo, and even a biometric identifierfor quick, machine-readable border checks. And while e-Passports also store a cryptographic signature to prevent tampering or forgeries, it turns out that despite having over a decade to do so, US Customs and Border Patrol hasn't deployed the software needed to actually verify it.

Original Submission

Read more of this story at SoylentNews.


Evidence the corrupt EPA colluded with Monsanto "IndyWatch Feed Tech"

Image: Evidence the corrupt EPA colluded with Monsanto to delay toxicology review of their controversial herbicide glyphosate


What will happen when Trump cleans house here?  The science has been suppressed for decades. 

That science will continue to be suppressed by whatever means possible..
We need to legislate a clear tiered regulatory regime.  A trial tier can be allowed limited to special applications by licensed users.  This state should continue for twenty years or so long as necessary to produce properly collected meta data by independent researchers that show no issues.
It really does take twenty years.  In the case of roundup we now have a situation in which the product has been massively dumped into the environment for the past twenty years while the rising death toll among users has not been addressed at all.
Far too many farmers are retiring to a cancer ward.

Evidence the corrupt EPA colluded with Monsanto to delay toxicology review of their controversial herbicide glyphosate

Thursday, February 08, 2018 


Meet the scientists running to transform Congress in 2018 "IndyWatch Feed Tech"

But first, science candidates must win their races. Most face long odds. For starters, voters may be impressed by a candidates scientific credentials, but such background is rarely a decisive factor when they go to the polls. In addition, most of this years STEM candidates are political novices who are starting out far behind their opponents when it comes to knowing how to run a professional campaign.

House races feature unusual upsurge in entrants with technical backgrounds.


A Two Tapes Turing Machine "IndyWatch Feed Tech"

Though as with so many independent inventors the origins of computing can be said to have been arrived at through the work of many people, Alan Turing is certainly one of the foundational figures in computer science. His Turing machine was a thought-experiment computing device in which a program performs operations upon symbols printed on an infinite strip of tape, and can in theory calculate anything that any computer can.

In practice, we do not use Turing machines as our everyday computing platforms. A machine designed as an academic abstract exercise is not designed for efficiency. But that wont stop Hackaday, and to prove that point [Olivier Bailleux] has done just that using readily available electronic components. His twin-tape Turing machine is presented on a large PCB, and is shown in the video below the break computing the first few numbers of the Fibonacci sequence.

The schematic is available as a PDF, and mostly comprises of 74-series logic chips with the tape contents being displayed as two rows of LEDs. The program is expressed as a pluggable diode matrix, but in a particularly neat manner he has used LEDs instead of traditional diodes, allowing us to see each instruction as it is accessed. The whole is a fascinating item for anyone wishing to learn about Turing machines, though we wish [Olivier] had given  us a little more information in his write-up.

That fascination with Turing machines has manifested itself in numerous builds here over the years. Just a small selection are one using 3D printing, another using Lego, and a third using ball bearings. And of course, if youd like instant gratification, take a look at the one Google put in one of their doodles for Turings 100th anniversary.



Meltdown patch for OpenBSD is available lets wait for feedbacks "IndyWatch Feed Tech"

OpenBSD releases Version 11 code update that addresses the Meltdown vulnerability by implementing the separation between the kernel and the user memory pages.

OpenBSD addresses the Meltdown vulnerability with the release of a Version 11 code. The update implements the separation between the kernel and the user memory pages.

OpenBSDs Phillip Guenther provided further details on the implementation.

When a syscall, trap, or interrupt takes a CPU from userspace to kernel the trampoline code switches page tables, switches stacks to the threads real kernel stack, then copies over the necessary bits from the trampoline stack. On return to userspace the opposite occurs: recreate the iretq frame on the trampoline stack, switch stack, switch page tables, and return to userspace. wrote Guenther.

Per-CPU page layout mostly inspired by DragonFlyBSD.

Guenther explained that Per-CPU page layout mostly implemented the approach used in DragonFly BSD.

According to Gunther the impact on performance would be reduced because the approach minimizes the overhead for the management of kernel code and data in the transitions to/from the kernel.

On Intel CPUs which speculate past user/supervisor page permission checks, use a separate page table for userspace with only the minimum of kernel code and data required for the transitions to/from the kernel. he added.

When a syscall, trap, or interrupt takes a CPU from userspace to kernel the trampoline code switches page tables, switches stacks to the threads real kernel stack, then copies over the necessary bits from the trampoline stack. On return to userspace the opposite occurs: recreate the iretq frame on the trampoline stack, switch stack, switch page tables, and return to userspace.Meltdown OpenBSD

A couple of weeks ago, DTrace expert Brendan Gregg developed a microbenchmark to...


Another Potential Performance Optimization For KPTI Meltdown Mitigation "IndyWatch Feed Tech"

Now that the dust is beginning to settle around the Meltdown and Spectre mitigation techniques on the major operating systems, in the weeks and months ahead we are likely to see more performance optimizations come to help offset the performance penalties incurred by mitigations like kernel page table isolation (KPTI) and Retpolines. This week a new patch series was published that may help with KPTI performance...


SpinLaunch "IndyWatch Feed Tech"

I just hope theres plenty of 4K footage of the launch centrifuge facility when it experiences catastrophic failure. Via: TechCrunch: What if instead of blasting cargo into space on a rocket, we could fling it into space using a catapult? Thats the big, possibly crazy, possibly genius idea behind SpinLaunch. It was secretly founded in []


Spanish Authorities Launch New Campaign to Block Pirate Websites "IndyWatch Feed Tech"

Following complaints from Disney, 20th Century Fox, Paramount, Sony, Universal and Warner, a court in Spain recently ordered local ISPs to block and, a pair of popular pirate sites.

Citing changes in local law which helped facilitate the action, the MPA welcomed the blockades as necessary to prevent further damage to the creative industries. Now, just a week later, it seems that Spain really has the bit between its teeth.

An announcement from the Guardia Civil (Civil Guard), the oldest law enforcement agency in the country, reveals that almost two dozen websites have just been blocked for infringing intellectual property rights.

The Civil Guard, within the framework of the Operation CASCADA, has initiated a campaign to block websites that allow people to download content protected by copyright and disseminate them through links in P2P networks, that is, networks of computers that work without fixed servers, the Civil Guard said in a statement.

In this first phase, a total of 23 web domains have been blocked from which direct download links of all kinds of protected audiovisual material such as movies, series, music and video games were accessed, many of them of recent creation and without being released yet in our country.

High-quality versions of films available on the cinema billboards of our country were offered, although they had not yet been sold in physical or digital format and dubbed with audio in several languages.

A full list of websites and domains hasnt yet been provided by the authorities but familiar names including and are confirmed to be included in the first wave.

The Civil Guard, which is organized as a military force under the authority of the Ministry of the Interior and Ministry of Defense, said that the administrators of the sites operate their platforms from abroad, generating advertising revenue from Spanish visitors who are said to make up 80% of the sites traffic.

In common with similar sites, the authorities accuse their owners of taking evasive action to avoid being shut down, including hiding the true location of their servers while moving them from country to country and masking domain registration data.

Cases have been detected in which previously judicially blocked domains were reactivated in a matter of hours, with practically identical domain names or even changing only the extension thereof. In this way, and even if several successive bl...


Farts Away! Plane Makes Unscheduled Stop After Man Won't Stop Guffing "IndyWatch Feed Tech"

Arthur T Knackerbracket has found the following story:

An elderly man's flatulence forced his flight to make an emergency stop after a fight broke out over his barrage of bottom burps.

Passengers flying with budget Dutch airline Transavia from Dubai to Amsterdam were reportedly put out by the man's continued farting, and asked him to stop.

But the man failed to hold it in, and when even a direct order from the pilot didn't take the wind out of his sails, two particularly incensed passengers took matters into their own hands.

Local media reported that two Dutchmen sat next to the trumper started a fight with the man, which escalated to the point where the pilot was forced to make an unscheduled stop.

On landing in Vienna, armed police boarded the plane to remove the men who caused the ruckus, along with two sisters who were seated next to them.

Also covered at The Straits Times.

Original Submission

Read more of this story at SoylentNews.


How a backwards shirt led to a lesson in kindness for P.E.I. kindergarten class "IndyWatch Feed Tech"

This is a great story about how we all have the worst impulses however driven that can then be replaced by an act of kindness through an individual's unexpected initiative to ensure emotional solidarity.

It isnoteworthy that we do rationally move toward emotional solidarity. It is not immediate either.  It is rationally arrived at.  The instinctual impulse was to join in the hazing itself.

Was right or wrong rediscovered anew here?   These are all core to the human personality and noteworthy when found absent.  What causes failure to think this way? That seriously happens as well.   But a group overcomes this by sheer weight of majority thinking and not majority instinct.

How a backwards shirt led to a lesson in kindness for P.E.I. kindergarten class 

February 9, 2018

How a backwards shirt led to a...


Large city just days away from running out of wate "IndyWatch Feed Tech"

Image: COLLAPSE: Large city just days away from running out of water, turning off all water taps to residential households massive PANIC and UNREST to follow

This piece is clearly alarmist but also a reminder.  a water system is designed to have an ample reserve.  However that can be wiped out by urban expansion and it often is.  Then it becomes necessary to engineer a solution.  However that always takes a year or five.  No magic overcomes increasing risk and a rare drought.
The first response is rationing and that is usually done early because it is easy. That is also more than enough in most situations.
We will be transitioning to a vastly distributed system of natural communities in which local water will be simply ample.  In the meantime we must struggle to support our super cities.

COLLAPSE: Large city just days away from running out of water, turning off all water taps to residential households massive PANIC and UNREST to follow

Thursday, February 08, 2018 by: Jayson Veley


OUTED: DuPont covered up the health risks of Teflon "IndyWatch Feed Tech"

This is 2018 and we are now understanding this.  Folks can now get to sue. Sixty years of exposure to C8 is the central problem but was no surprise to Du Pont. Huh!.
I never liked the product and whatever pans  we had i usually avoided as the surface only held up briefly anyway.  The i did have a cast iron pan that i bought the day i came to Vancouver in 1972 and have to this day.  It happens to be the perfect non stick pan.

We need to produce cast iron foam to form a working core and surface in order to eliminate the majority of the cast iron pan's weight.  No from of plastic is suitable for surfacing a hot metal.  They all disintegrate far too soon and every pan will produce hot spots.  So plastic is not a real option..
OUTED: DuPont covered up the health risks of Teflon

Wednesday, February 07, 2018 by: Vicki Batts

Tags: badfood, badhealth, badmedicine, badscience, chemicals, cookware, corporate greed, DuPont, food supply, lies, Nonstick Cookware, Teflon, toxic chemicals, toxins

(Natural News) Few things are as ubiquitous in modern kitchens as nonstick cookware; from frying pans to baking dishes and a host of other accouterments, youd be h...


Why Is There So Much Hate for the Word Moist? - Facts So Romantic "IndyWatch Feed Tech"

A lot of people dont like the word moist. Several Facebook groups are dedicated to it, one with over 3,000 likes, New Yorker readers overwhelmingly selected it as the word to eliminate from the dictionary, and Jimmy Fallon sarcastically thanked it for being the worst word in the English language. When you ask people why this might be, there is no shortage of armchair theory: that theres something about the sounds involved, that it puts your face in a position similar to the facial expression of disgust, or that it reminds people of mold or sex.

Psychologist Paul Thibodeau and his colleagues ran a study to sort it out. They gave participants a set of words and asked them to rate how, whether, and to what degree, each word made them uncomfortable.

Are you tempted to
Read More


Drupal addressed several vulnerabilities in Drupal 8 and 7 "IndyWatch Feed Tech"

The Drupal development team addressed many vulnerabilities in both Drupal 8 and 7, including some flaws rated as critical.

Drupal maintainers have fixed many vulnerabilities in Drupal 7 and 8, including some flaws rated as critical.

One of the critical security vulnerabilities is related to partial cross-site scripting (XSS) prevention mechanisms that was addressed with Drupal 8.4.5 and 7.57 versions. The popular CMS uses a JavaScript function that doesnt completely sanitize the input

Drupal has a Drupal.checkPlain() JavaScript function which is used to escape potentially dangerous text before outputting it to HTML. reads the advisory. This function does not correctly handle all methods of injecting malicious HTML, leading to a cross-site scripting vulnerability under certain circumstances. 

The second vulnerability rated as critical affects Drupal 8, it could be exploited by users who have permission to post comments to view content and comments they should not be able to access. The flaw could also allow users to add comments to the content that should not be able to access.

The Drupal team also fixed two moderately critical vulnerabilities in Drupal 7 and other two in Drupal 8. The flaws in Drupal 7:

  • A Private file access bypass Drupal fails to check if a user has access to a file before allowing the user to view or download it when the CMS is using a private file system.
  • A jQuery cross site scripting vulnerability that is present when making Ajax requests to untrusted domains.

while the vulnerabilities in Drupal 8 are:

  • A Settings Tray access bypass that could be exploited by users to update certain data that they do not have the permissions for.



Air Italy Expands As UAE-Backed Alitalia Goes Bankrupt "IndyWatch Feed Tech"

Arthur T Knackerbracket has found the following story:

Italian airline Meridiana changed its name to Air Italy with the backing of Qatar Airways, its new shareholder, aiming to become Italy's flagship carrier as UAE-backed Alitalia undergoes bankruptcy proceedings. Re-branded as Air Italy, Meridian unveiled a new restructuring plan to make of Air Italy "a sustainable airline alternative for the people of Italy", as Qatar Airways' CEO Akbar al-Baker said on Monday at a press conference in Milan. "Air Italy will achieve global scale in both fleet and network expansion ... We will show that we are the star," added al-Baker. Over the next three years, 20 Boeing 737 MAX aircraft will be added to Air Italy's fleet, the first of which arrives in April 2018.

Original Submission

Read more of this story at SoylentNews.


Forth System-On-Chip Takes Us Back to the 80s "IndyWatch Feed Tech"

For anyone who has dealt with the programming language Forth, odds are good that you picked it up back in the 80s. Since the language is still in use for many applications, though, you might not have this sort of nostalgic feeling for the language that some might have. For that, though, you might want to try out [Richard]s implementation which simulates the microcomputers of the 80s using this unique language.

The system has an FPGA-based CPU written in Verilog. It runs on a Nexys-3 board and features PS/2 Keyboard input, a VGA output with a VHDL VT100 terminal emulation module, access to the Flash and onboard SRAM, and a UART. With all of that put together its virtually a Forth-based time machine. Its also extremely well documented even if youre just curious how it works and arent planning on building your own.

The project also includes a CPU simulator written in C which can model the entire computer if you dont have the hardware for building the actual computer. [Richard] also released everything that youd need to roll out your own Forth computer on the GitHub page. There are other ways of heading way back to the 1980s, though, like using the quirky Parralax Propeller.


[SECURITY] [DSA 4122-1] squid3 security update "IndyWatch Feed Tech"

Posted by Salvatore Bonaccorso on Feb 22

Debian Security Advisory DSA-4122-1 security () debian org Salvatore Bonaccorso
February 23, 2018

Package : squid3
CVE ID : CVE-2018-1000024 CVE-2018-1000027...


Re: [CVE-2018-1000088] Stored XSS vulnerability in Doorkeeper gem v2.1.0 - v4.2.5 "IndyWatch Feed Tech"

Posted by Justin Bull on Feb 22

Apologies. This fails to account for a non-trivial scenario.

Any software using Doorkeeper that has generated its own custom
views[0] requires manual work to verify there's no explicit HTML in
the `client_name` and `native_redirect_uri` field values.

This has been updated in the bulletin's Fix section[1].



[security bulletin] MFSBGN03798 rev.1 - Micro Focus Universal CMDB, Apache Struts Instance "IndyWatch Feed Tech"

Posted by cyber-psrt on Feb 22


Document ID: KM03086019
Version: 1

MFSBGN03798 rev.1 - Micro Focus Universal CMDB, Apache Struts Instance

NOTICE: The information in this Security Bulletin should be acted upon as
soon as possible.

Release Date: 2018-02-22
Last Updated: 2018-02-22...


[SECURITY] [DSA 4120-1] linux security update "IndyWatch Feed Tech"

Posted by Yves-Alexis Perez on Feb 22

Debian Security Advisory DSA-4120-1 security () debian org Yves-Alexis Perez
February 22, 2018

Package : linux
CVE ID : CVE-2017-5715 CVE-2017-5754...


AI-Powered / Machine Learning Linux Performance Tuning Is Now A Thing "IndyWatch Feed Tech"

A year and a half ago I wrote about a start-up working on dynamically-tuned, self-optimizing Linux servers. That company is now known as Concertio and they just launched their "AI powered" toolkit for IT administrators and performance engineers to optimize their server performance...


Intel Releases Spectre Firmware Patches; Intel and AMD Face Numerous Lawsuits "IndyWatch Feed Tech"

Intel Issues Updated Spectre Firmware Fixes For Newer Processors

Intel has issued updated microcode to help protect its newer processors from Spectre security exploits. The Santa Clara, Calif.-based company's new microcode updates which impact its newer chip platforms, such as Kaby Lake, Coffee Lake, and Skylake have been released to OEM customers and partners.

[...] The company initially released patches addressing the Spectre and Meltdown vulnerabilities in January, but later yanked its patches for the Variant 2 flaw both for client compute and data center chips after acknowledging that they caused "higher than expected reboots and other unpredictable system behavior." And while Intel last week announced it was re-issuing fixes for several Skylake-based platforms, the company had not given further details for its other newer processors including Kaby Lake and Coffee Lake until Tuesday.

First Intel, now AMD also faces multiple class-action suits over Spectre attacks

Intel rival AMD is also facing a number of class-action lawsuits over how it's responded to the Meltdown and Spectre CPU flaws. As The Register reports, four class-action complaints have been filed against the chip maker seeking damages on behalf of customers and investors. The suits follow a warning from AMD in late January that warned investors that it is "also subject to claims related to the recently disclosed side-channel exploits, such as Spectre and Meltdown, and may face claims or litigation for future vulnerabilities".

Intel revealed last week that it now faced 32 class-action lawsuits over its handling of the Meltdown and Spectre issues and three additional lawsuits over alleged insider trading.

Also at BetaNews.

Original Submission



Re: Fwd: [SECURITY] CVE-2018-1304 Security constraints mapped to context root are ignored "IndyWatch Feed Tech"

Posted by Doran Moppert on Feb 22

Will a URL pattern of "/" correctly protect the context root of
vulnerable versions? If so, this seems worth mentioning.


Nissan to Begin Easy Ride Trial in Japan "IndyWatch Feed Tech"

Via: Reuters: Facing a future in which self-driving cars may curb vehicle ownership, Nissan Motor Co is taking its first steps to becoming an operator of autonomous transportation services, hoping to break into a segment set to be dominated by Uber Technologies and other technology firms. In partnership with Japanese mobile gaming platform operator DeNA []


Do you see what I see? Researchers harness brain waves to reconstruct images of what we perceive "IndyWatch Feed Tech"

A new technique developed by neuroscientists at the University of Toronto Scarborough can, for the first time, reconstruct images of what people perceive based on their brain activity gathered by EEG.

The technique developed by Dan Nemrodov, a postdoctoral fellow in Assistant Professor Adrian Nestors lab at U of T Scarborough, is able to digitally reconstruct images seen by test subjects based on electroencephalography (EEG) data.

When we see something, our creates a mental percept, which is essentially a mental impression of that thing. We were able to capture this percept using EEG to get a direct illustration of whats happening in the brain during this process, says Nemrodov.


SpaceX Deploys Broadband Test Satellites, Fails to Catch Entire Fairing "IndyWatch Feed Tech"

SpaceX has launched the Paz satellite for a Spanish company using a Falcon 9 rocket, which also carried two secondary payloads: Microsat-2a and Microsat-2b. These are intended to test technologies needed to provide broadband Internet access from orbit:

SpaceX launched again on Thursday - this time to put a Spanish radar satellite above the Earth.

But there was a lot of interest also in the mission's secondary payloads - a couple of spacecraft the Californian rocket company will use to trial the delivery of broadband from orbit. SpaceX has big plans in this area. By sometime in the mid-2020s, it hopes to be operating more than 4,000 such satellites, linking every corner of Earth to the internet.

SpaceX projections show that the company expects its "Starlink" Internet service to have 40 million subscribers and $30 billion in revenue by 2025.

SpaceX also attempted to recover the $6 million payload fairing (nose cone) of the rocket using a specially-built "catcher's mitt" net boat called "Mr. Steven":

After launching its Falcon 9 rocket from California this morning, SpaceX used a giant net to try to recover the rocket's nose cone as it fell down in the Pacific Ocean. The first-time experiment failed, however: one of the pieces of the nose cone missed the net, which was attached to a ship, and landed intact on the sea surface instead.

[...] A typical rocket fairing doesn't have any onboard engines, however. So SpaceX has equipped its latest nose cone with a guidance system and thrusters, tiny engines that help guide the pieces through the atmosphere when they break away from the rocket. Then, as the pieces descend, they deploy thin parachute-like structures known as parafoils to slow their fall. Down at the surface, a SpaceX boat named Mr. Steven (a random name, Musk said) attempts to catch one of the fairing pieces with a giant net attached to large claw-like appendages.

SpaceX has been able to land its fairings in the ocean before, but this was the first time the company deployed Mr. Steven to catch one of the pieces. Musk noted that a fairing half missed the boat by a few hundred meters. However, the company should be able to fix the problem by making the parafoils bigger, he said....


Fwd: [SECURITY] CVE-2018-1304 Security constraints mapped to context root are ignored "IndyWatch Feed Tech"

Posted by Mark Thomas on Feb 22

-------- Forwarded Message --------
Subject: [SECURITY] CVE-2018-1304 Security constraints mapped to context
root are ignored
Date: Fri, 23 Feb 2018 00:27:30 +0000
From: Mark Thomas
Reply-To: announce () tomcat apache org, announce () tomcat apache org
To: Tomcat Users List
CC: Tomcat Developers List , announce () apache org,
announce () tomcat apache...


Fwd: [SECURITY] CVE-2018-1305 Security constraint annotations applied too late "IndyWatch Feed Tech"

Posted by Mark Thomas on Feb 22

-------- Forwarded Message --------
Subject: [SECURITY] CVE-2018-1305 Security constraint annotations
applied too late
Date: Fri, 23 Feb 2018 00:27:36 +0000
From: Mark Thomas
Reply-To: announce () tomcat apache org, announce () tomcat apache org
To: Tomcat Users List
CC: Tomcat Developers List , announce () apache org,
announce () tomcat apache org...


This Radio Gets Pour Reception "IndyWatch Feed Tech"

When was the last time you poured water onto your radio to turn it on?

Designed collaboratively by [Tore Knudsen], [Simone Okholm Hansen] and [Victor Permild], Pour Reception seeks to challenge what constitutes an interface, and how elements of play can create a new experience for a relatively everyday object.

Lacking buttons or knobs of any kind, Pour Reception appears an inert acrylic box with two glasses resting on top. A detachable instruction card cues the need for water, and pouring some into the glasses wakes the radio.

Inside, two aluminium plates   acting as capacitive touch sensors are connected to an Arduino using the Tact library from NANDSudio. Wekinator a machine learning tool enabled [Knudsen] to program various actions to control the radio. Pouring water between the glasses changes stations, rotating and tweaking the glass positions adjusts audio quality, and placing a finger in the glass mutes it temporarily.

Its a great concept for a more engaging piece of tech, if perhaps a little unnerving to be pouring water around household electronics. Best take preventative measures before applying this idea elsewhere.


Meta-Analysis of 522 Trials Finds that Anti-Depressants are More Effective than Placebos "IndyWatch Feed Tech"

Anti-depressants: Major study finds they work

Scientists say they have settled one of medicine's biggest debates after a huge study found that anti-depressants work. The study, which analysed data from 522 trials involving 116,477 people, found 21 common anti-depressants were all more effective at reducing symptoms of acute depression than dummy pills. But it also showed big differences in how effective each drug is.

The authors of the report, published in the Lancet [open, DOI: 10.1016/S0140-6736(17)32802-7] [DX], said it showed many more people could benefit from the drugs. There were 64.7 million prescriptions for the drugs in England in 2016 - more than double the 31 million in 2006 - but there has been a debate about how effective they are, with some trial[s] suggesting they are no better than placebos. The Royal College of Psychiatrists said the study "finally puts to bed the controversy on anti-depressants".

The so-called meta-analysis, which involved unpublished data in addition to the information from the 522 clinical trials involving the short-term treatment of acute depression in adults, found the medications were all more effective than placebos. However, the study found they ranged from being a third more effective than a placebo to more than twice as effective.

Original Submission

Read more of this story at SoylentNews.


Nix 2.0 Package Manager Released With A Ton Of Changes "IndyWatch Feed Tech"

Nix 2.0 is now available as the latest major update to this functional package manager most commonly associated with the NixOS Linux distribution...


FOSTA Would Be a Disaster for Online Communities "IndyWatch Feed Tech"

Frankenstein Bill Combines the Worst of SESTA and FOSTA. Tell Your Representative to Reject New Version of H.R. 1865.

The House of Representatives is about to vote on a bill that would force online platforms to censor their users. The Allow States and Victims to Fight Online Sex Trafficking Act (FOSTA, H.R. 1865) might sound noble, but it would do nothing to stop sex traffickers. What it would do is force online platforms to police their users speech more forcefully than ever before, silencing legitimate voices in the process.

Back in December, we said that while FOSTA was a very dangerous bill, its impact on online spaces would not be as broad as the Senate bill, the Stop Enabling Sex Traffickers Act (SESTA, S. 1693). Thats about to change.

If you dont want Congress to undermine the online communities we all rely on, please take a moment to call your representative and urge them to oppose FOSTA.

Take Action


Gutting Section 230 Is Not a Solution

The problem with FOSTA and SESTA isnt a single provision or two; its the whole approach.

FOSTA would undermine Section 230, the law protecting online platforms from some types of liability for their users speech. As weve explained before, the modern Internet is only possible thanks to a strong Section 230. Without Section 230, most of the online platforms we use would never have b...


Chase Glitch Exposed Customer Accounts "IndyWatch Feed Tech"

Multiple customers have reported logging in to their bank accounts, only to be presented with another customers bank account details. Chase has acknowledged the incident, saying it was caused by an internal glitch Wednesday evening that did not involve any kind of hacking attempt or cyber attack.

Trish Wexler, director of communications for the retail side of JP Morgan Chase, said the incident happened Wednesday evening, for a pretty limited number of customers between 6:30 pm  and 9 pm ET who sporadically during that time while logged in to could see someone elses account details.

We know for sure the glitch was on our end, not from a malicious actor, Wexler said, noting that Chase is still trying to determine how many customers may have been affected. Were going through Tweets from customers and making sure that if anyone is calling us with issues were working one on one with customers. If you see suspicious activity you should give us a call.

Wexler urged customers to practice good security hygiene by regularly reviewing their account statements, and promptly reporting any discrepancies. She said Chase is still working to determine the precise cause of the mix-up, and that there have been no reports of JPMC commercial customers seeing the account information of other customers.

This was all on our side, Wexler said. I dont know what did happen yet but I know what didnt happen. What happened last night was 100 percent not the result of anything malicious.

The account mix-up was documented on Wednesday by Fly & Dine, an online publication that chronicles the airline food industry. Fly & Dine included screenshots of one of their writers spouses logged into the account of a fellow Chase customer with an Amazon and Chase card and a balance of more than $16,000.

Kenneth White, a security researcher and director of the...


FCC Officially Publishes Net Neutrality Repeal "IndyWatch Feed Tech"

The Federal Communications Commission's net neutrality rules will be no more in two months: The agency has taken the final step in removing the regulations from its rule book.

But that may not be the end of the story. Dozens of groups are expected to file lawsuits challenging the repeal, and Democrats in Congress will push to reverse the FCC's action.

On Thursday, the FCC published the final notice of the repeal in the Federal Register, which starts a 60-day clock until the rules are removed. The effective date for the repeal is April 23. The FCC voted to repeal the rules on Dec. 14.

Final Notice of Repeal:

Original Submission

Read more of this story at SoylentNews.


Overnight Tech: FCC publishes net neutrality repeal | Dem state AGs sue to save rules | Comcast employees allege culture of harassment "IndyWatch Feed Tech"

FCC'S NET NEUTRALITY REPEAL PUBLISHED: The Federal Communications Commission's (FCC) order repealing net neutrality was published in the Federal Register Thursday morning, opening the door for supporters of the Obama-era rules to launch...


NY Fed finds fintech mortgages quicker, less risky than bank loans "IndyWatch Feed Tech"

Mortgage lenders that exclusively use online applications approve loans quicker, experience fewer defaults, encourage more refinancing and respond to demand shifts better than brick-and-mortar rivals, according to a New York Federal Reserve report...

Thursday, 22 February


Democratic state attorneys general sue to preserve net neutrality rules "IndyWatch Feed Tech"

Twenty-two Democratic state attorneys general on Tuesday launched a lawsuit aimed at preserving net neutrality on Tuesday, the same day the Federal Communications Commission (FCC) published its rule striking the regulations in the...


The FCCs Net Neutrality Order Was Just Published, Now the Fight Really Begins "IndyWatch Feed Tech"

Today, the FCCs so-called Restoring Internet Freedom Order, which repealed the net neutrality protections the FCC had previously created with the 2015 Open Internet Order, has been officially published. That means the clock has started ticking on all the ways we can fight back.

First, under the Congressional Review Act (CRA), Congress can reverse a change in regulation with a simple majority vote. That would bring the 2015 Open Internet Order back into effect. Congress has 60 working daysstarting from when the rule is published in the official recordto do this. So those 60 days start now.

The Senate bill has 50 supporters, only one away from the majority it needs to pass. The House of Representatives is a bit further away. By our count, 114 representatives have made public commitments in support of voting for a CRA action. Now that time is ticking down for the vote, tell Congress to save the existing net neutrality rules.

Second, it is now unambiguous that the lawsuits of 22 states, public interest groups, Mozilla, and the Internet Association can begin. While the FCC decision said lawsuits ha...


Embracing the Chaos of Chaos Engineering "IndyWatch Feed Tech"

Modern applications are increasingly growing in complexity. Adding a dizzying amount of moving parts, layers of abstraction, reliance on external systems and distribution that all result in a stack that few truly fully understand.

IndyWatch Science and Technology News Feed Archiver

Go Back:30 Days | 7 Days | 2 Days | 1 Day

IndyWatch Science and Technology News Feed Today.

Go Forward:1 Day | 2 Days | 7 Days | 30 Days

IndyWatch Science and Technology News Feed was generated at World News IndyWatch.

Resource generated at IndyWatch using aliasfeed and rawdog