IndyWatch Science and Technology News Feed Archiver

Go Back:30 Days | 7 Days | 2 Days | 1 Day

IndyWatch Science and Technology News Feed Today.

Go Forward:1 Day | 2 Days | 7 Days | 30 Days

IndyWatch Science and Technology News Feed was generated at World News IndyWatch.

Thursday, 26 October


French Regulators Approve Human Trial of a Bionic Eye "IndyWatch Feed Tech"

Visual prosthesis to be implanted in five patients with retinal disease Image: Pixium Vision Pixium Vision's experimental vision chip implanted in a primate's eye.

Five people with severe vision loss will have an experimental chip implanted in their eyes to help them see. French regulators last week approved the trial of the bionic vision implant, which will be placed in people with an advanced type of retinal disease called dry age-related macular degeneration, or dry AMD.

Developed by Pixium Vision in Paris, the wireless chip acts as a conduit of communication between the eye and the brain using electrical stimulation. The trial represents the first time such a chip has been used to treat dry AMD, the leading cause of vision loss in people over age 50.  

Other visual prostheses have been brought to market, but aim to treat people with rare conditions such as  retinitis pigmentosa. Se cond Sight in Sylmar California commercialized the first such bionic eye after it received approval from US regulators in 2013. Retina Implant in Reutlingen, Germany also markets an implantable chip to treat retinitis pigmentosa, as does Pixium with its 150-electrode chip, called IRIS 2

So far, the resolution of restored vision from these devices has been rather low. Pixium aims to improve upon that with its wireless 378-electrode chip, called PRIMA. What people [with AMD] ideally want is to read again and to recognize faces, says Khalid Ishaque, CEO of Pixium.

Pixiums technology was born out of Daniel Palankers lab at Stanford University. Its designed to facilitate communication between the eye and the brain which, due to disease, has broken down. The PRIMA chip provides the missing link in that communication using electrical stimulation that codes for information in the visual scene.....


Microsoft releases the open-source scanning tool Sonar "IndyWatch Feed Tech"

Microsoft announced the availability of Sonar, an open source linting and website scanning tool that was developed by the Microsoft Edge team.

The open source tool was designed to allow developers to identify and solve performance and security issues, it is available on GitHub.

The Microsoft Edge team donated Sonar to the JS Foundation, the tech giant will continue to follow the project improving it along with contributions from external experts.

Today, we are excited to announce the next evolution of the static scan tool: sonar, a new linting tool and site scanner for the modern web. states a blog post published by Microsoft.

sonar brings many improvements compared to previous scanners: execution of website code instead of static analysis, a more flexible and modernized set of rules, parallel test execution, integration with other services, a completely open source code base from day one, and more.

Sonar is a linting tool that analyzes the code for a wide range of issues, including related to coding errors, performance, accessibility, security, Progressive Web Apps (PWA), and interoperability. Sonar can be used as a command line tool or via an online version.

From the cybersecurity perspective, the tool scans for the following weaknesses:

  • disallowed-headers
  • disown-opener
  • no-protocol-relative-urls
  • ssllabs
  • strict-transport-security
  • x-content-type-options
  • validate-set-cookie-header
  • no-vulnerable-javascript-libraries


One of the tests checks for the exposure to MitM attacks due to the use of HTTPS connections that dont use the Strict-Transport-Security header.

Sonar also checks if the set-cookie header defines the Secure and HttpOnly attributes to prevent session hijacking via cross-site scripting (XSS) attacks. Setting the attributes the cookies cannot be transmitted over...


This malware turns itself into ransomware if you try to remove it "IndyWatch Feed Tech"

By Waqas

IT security researchers at SfyLabs have discovered an Android banking malware

This is a post from Read the original post: This malware turns itself into ransomware if you try to remove it


University with close ties to DHS claims, ShotSpotter saves lives "IndyWatch Feed Tech"

The University of California San Francisco-East Bay (UCSF) in California, recently published a press release on the American College of Surgeons website. It's titled 'Automatic Acoustic Gunshot Sensor Technology May Benefit Shooting Victims.'

The press release, claims law enforcement can locate gunshot victims faster using ShotSpotter (SST).

Our key finding was that the use of these acoustic gunshot sensors showed promise as a system that may benefit gunshot victims, said lead study author Magdalene A. Brooke, MD, a general surgery resident at University of California San Francisco-East Bay."

Why would a bunch of surgeons and doctors publish a press release about SST's?

The answers, may surprise you.

Universities across the country are working with DHS

The UCSF has a close relationship with DHS.

Last year, the UCSF named Former DHS Secretary Janet Napolitano, 'Person Of The Year'.

And the UCSF police department has a close relationship with DHS.

"USCF's Homeland Security & Emergency Management Divison is responsible for implementing advanced emergency management protocols in support of UCSFs Emergency Plan, coordinating UCSFs Emergency Operations Centers, and providing all hazards emergency management and training, homeland security risk assessment, mitigation planning, business continuity planning and technology support for the UCSF Emergency Operations Center."



Reconstructing a Blurry QR Code "IndyWatch Feed Tech"

QR Codes are a two-dimensional type of matrix barcode that are used for a variety of uses. Theyre one way of turning a long piece of string data into an easily machine-readable format. For this reason, they can be used to store private keys for encryption and crypto-currency purposes. [Roger Ver] attempted to use a QR code containing a private key to give away some cryptocurrency on TV, but the code was blurred out by the broadcaster. Not ones to give up easily, [Michael] and [Clment] decided to see if they could reconstruct it anyway. 

The work begins, as so many cryptographic exploits do, with the collection of as much of the plaintext key as possible. By stepping through the footage frame by frame, small pieces of the unobscured QR code were found, as well as some of the private key itself. By combining this with enhanced images of the blurred code, the team were able to put together less than one third of the QR code. The team had other tricks up their sleeve though they knew the QR contained a private key of a particular format, and were able to figure out the QR code was 4141 pixels.

By using this data along with a careful study of the QR code format, the team were able to put together some code in Python to brute force the key. After 838849 trials, the key was found, and the team were able to claim the prize. Its a great example of cryptographic analysis and so is this story on hacking your own password.

[Thanks to Esko for the tip!]

Filed under: classic hacks


Apple v. Samsung Proceeds to Fourth Jury Trial "IndyWatch Feed Tech"

The Apple v. Samsung saga continues:

The Apple v. Samsung lawsuit is getting a big "reset," thanks to last year's Supreme Court ruling on design patents. The long-running litigation rollercoaster has included so many turns it's hard to keep track. The case was filed in 2011 and went to a 2012 jury trial, which resulted in a blockbuster verdict of more than $1 billion. Post-trial damage motions whittled that down, and then there was a 2013 damages re-trial in front of a separate jury. An appeals court kicked out trademark-related damages altogether.

Meanwhile, a whole separate case moved forward in which Apple sued over a new generation of Samsung products. That lawsuit went to a jury trial in 2014 and resulted in a $120 million verdict, far less than the $2 billion Apple was seeking. That verdict was thrown out on appeal, then reinstated on a subsequent appeal. So that one appears to stand.

But back to that first case. After a lot of back and forth, Samsung agreed to make a payment of $548 million, but the Korean giant didn't give up its right to appeal. In a landmark case over design patents, the US Supreme Court said that the damages had been done all wrongbut the justices gave little guidance as to how they should be done. The high court threw out $399 million of the damages Apple had won.

New trial order (PDF).

Also at CNET.

Original Submission

Read more of this story at SoylentNews.


Mexico Border Wall Wont Stop Cross-border Power Push "IndyWatch Feed Tech"

Mexico and its U.S. neighbors are planning expanded electrical trade even as President Trump continues pushing to build a border wall. New transmission links and greater use of existing connections could ease the integration of renewable energy by both countries. Photo: Guillermo Arias/AFP/Getty Images

Relations between the United States and Mexico are strained at the national level, with President Donald Trump pushing his promised border control wall and demanding a U.S.-favored rewrite of the North American Free Trade Agreement (NAFTA). But Mexico and the southwestern states have continued working towards an international agenda for electricity, and regional players are talking up a first set of projects due to be completed before Trumps term is up projects that put the region on a path to a far more electrically-porous border.

These projects include a trio of new crossborder links between California, Arizona and Mexico to be completed in the next three years. They also include grid studies, revised market rules, and new power lines within Mexico that could rapidly expand flows over all of the U.S.-Mexico interties. "The proposition right now is fairly small because the interconnections are small. But thats going to change, says Carl Zichella, director for Western transmission at the Natural Resources Defense Council.

Transmission experts such as Zichella trace today's momentum back to energy reforms enshrined in Mexicos constitution in 2014. Those reforms opened up Mexico's state-dominated energy sector, providing access to private and foreign investment for energy infrastructure and unleashing rapid development of some of North Americas best renewable energy resources.

In 2016 wind and solar capacity grew 33 percent and 114 percent, respectively, according to Mexicos power grid and market operator, the Centro Nacional de Control de nerga. CENACEs 2017-2031 grid development plan (reviewed here in English) foresees wind and solar meeting two-thirds of an estimated 55,840 megawatts of demand growth through 2031.

A more porous border will ease the challenge of backing up that variable renewable power, which is growing on both sides of the border.......


The rights of synthetic lifeforms is the next great civil rights controversy "IndyWatch Feed Tech"

With artificial intelligence technology advancing rapidly, the world must consider how the law should apply to synthetic beings. Experts from the fields of AI, ethics, and government weigh in on the best path forward as we enter the age of self-aware robots.

Artificially intelligent (AI) robots and automated systems are already transforming society in a host of ways. Cars are creeping closer to Level 5 autonomy, factories are cutting costs by replacing human workers with robots, and AIs are even outperforming people in a number of traditionally white-collar professions.


Critical flaws in maritime comms system could endanger entire ships "IndyWatch Feed Tech"

IOActive security consultant Mario Ballano has discovered two critical cybersecurity vulnerabilities affecting Stratos Globals AmosConnect communication shipboard platform. About AmosConnect Stratos Global is a leading provider of maritime communications services, and its solutions are used on thousands of ships around the world. The AmosConnect platform works in conjunction with the ships satellite equipment, and integrates vessel and shore-based office applications, as well as provides services like Internet access for the crew, email, IM, position reporting, More


Alan Turing: How His Universal Machine Became a Musical Instrument "IndyWatch Feed Tech"

The computing pioneer gave his computer the ability to play notes Photo: SSPL/Getty Images

f1 Photo: Archivio GBB/Contrasto/Redux Pictured here aged 35, Alan Turing was one of the most important figures in early computing.

Alan Turing is one of the great pioneers of the digital age, establishing the mathematical foundations of computing and using electromechanical digital machines to break German ciphers at Bletchley Park, in England, during World War II. But one of his contributions that has been largely overlooked is his pioneering work on transforming the computer into a musical instrument.

Its often said that computer-generated musical notes were first heard in 1957, at Bell Labs, in the United States. In fact, the computer in Turings Computing Machine Laboratory at the University of Manchester, in England, was playing musical notes many years before that.

f2 Photo: University of Manchester/Press Association/AP Tom Kilburn and Freddie Williams created Baby, the first general-purpose electronic computer designed to run programs stored in its internal memory.

It was in the Manchester lab, in June 1948, that the first electronic all-purpose, stored-program computer ran its first program. Nicknamed Baby, this prototype was rough and ready. Programs were entered into memory, bit by bit, via a panel of hand-operated switches. Bright dots and dashes on a tiny glass screen formed the output. Baby was created by two brilliant engineersFreddie Williams and...


Bomgar Remote Support - Local Privilege Escalation (CVE-2017-5996) "IndyWatch Feed Tech"

Posted by VSR Advisories on Oct 26

                   Virtual Security Research, LLC.
                          Security Advisory


Advisory Name: Bomgar Remote Support - Local Privilege Escalation
 Release Date: 2017-10-26
  Application: Bomgar Remote Support
     Versions: 15.2.x...


Professor Siegfried Bro Again Complains About the Situation at the EPO and Issues With the UPC "IndyWatch Feed Tech"

Failure of European media should alarm also those outside the EPO

About censorshipSummary: In spite of the suspicious absence of real coverage/journalism regarding the Unitary Patent (as opposed to puff pieces penned by Team UPC), voices come out in opposition of the Unitary Patent and comments continue to be deleted (usually by Team UPC, which orchestrates a media blackout on UPC matters)

Professor Siegfried Bro is no stranger to the EPO scandals. Being retired probably means that he has more time to study the situation and earlier this year he wrote a very long article about it (in German).

Being retired probably means that he has more time to study the situation and earlier this year he wrote a very long article about it (in German).Bro is loved by EPO employees and its easy to see why; he says the truth about Team Battistelli (comparing what Battistelli has made of the EPO to Guantnamo Bay). He, unlike many in his profession (in active service), speaks truth to power.

Earlier today a pro-UPC blog (Kluwer Patent Blog) published this new interview with Bro. It is already being discussed by Team UPC (see here for example) and the introduction is as follows: European states lack awareness of their obligations under the European Convention on Human Rights (ECHR) and the EU Charter of Fundamental Rights and have established associations such as the EPO and the UPC, without anyone accounting for guarantees with regard to democracy, the rule of law and human rights. Professor Siegfried Bro said this in an interview with Kluwer IP Law about the constitutional complaint that has been filed against German ratification of the Unified Patent Court Agreement. Bro is a former judge of the Xth Civil Panel of the Federal Court of Justice (1986-1998), responsible among others for patent cases, and of the German Federal Constitutional Court (FCC, 1998-2010).

He, unlike many in his profession (in active service), speaks truth to power.Bro...


FCC to Drop Main Studio Rule "IndyWatch Feed Tech"

Broadcasting and Cable reports that the FCC has voted to eliminate "the almost eight-decade old requirement that broadcasters, radio and TV, maintain a main studio in or near their community of license." The National Association of Broadcasters expressed support for the change, saying the rule "has outlived its usefulness in an era of mobile news gathering and multiple content delivery platforms."

FCC Commissioner Mignon Clyburn opposed the move, saying it signified "embracing a world in which automated national programming is the new normal." Other critics saw the vote as easing the way for a SinclairTribune merger.

Further reading: statement of Ajit Pai (PDF)

Original Submission

Read more of this story at SoylentNews.


Twitter didn't tell Senate Intel about RT pitch to buy election ads "IndyWatch Feed Tech"

Lawmakers on the Senate Intelligence Committee say Twitter never informed them that it pitched Russian state-owned media to buy ads during the 2016 presidential campaign. A spokesperson for top Senate Intelligence Committee Democrat Mark...


Hackaday Prize Entry: The Minimalist Z80 Computer "IndyWatch Feed Tech"

The best projects always seem to come from eBay. A few weeks ago, we found a few tiles meant for gigantic LED panel installations, and fifty bucks got you ten tiles. That eBay auction is now sold out. A while ago, [Just4Fun] realized he could build a Z80 microcomputer with $4 worth of parts from everyones favorite online auction house. The result is a $4 Z80 home computer, and a great Hackaday Prize entry to boot.

So, what do he need to build a retrocomputer loaded up with Forth, CP/M, and Basic? A CPU is a necessity, and [Just4Fun] found a Z80 (technically a Z84C00) for just a bit more than a dollar. A computer will need some RAM too, and a 128 kiB parallel SRAM was just the ticket for another dollar.

Heres where things get a bit more interesting. Where the retrocomputers of yore were loaded up with glue logic, PLAs, or other weird chips, modern technology has come a long way. Instead of a massive amount of glue, [Just4Fun] is using an ATmega32A for all the I/O, address decoding, and a serial terminal.

The ATmega thrown into this cornucopia of vintage chips is itself more than a decade old, but it does have 40 pins and 32 kiB of Flash. Thats enough to virtualize all the peripherals youd need on a Z80 bus and provide the clock signal for the rest of the computer.

This home computer was originally designed and laid out on a solderless breadboard, but [Bill Westfield] managed to stuff this all onto a small PCB. Thats a cheap computer that gets you all the retrocomputing goodies, and its something thats just random enough to be a perfect entry for the Anything Goes portion of the Hackaday Prize.

The HackadayPrize2017 is Sponsored by:


Artificial Intelligence Beats CAPTCHA "IndyWatch Feed Tech"

Neural net modeled after human brain's visual system could aid computer preception Image: Vicarious AI

Artificial intelligence software can beat the world's most widely used test of a machine's ability to act human, Google's reCAPTCHA, by copying how human vision works, a new study finds.

These new findings suggest the need for more robust automated human-checking techniques, and could help improve computer perception for robotics tasks, scientists add.

The most commonly used Turing test is the CAPTCHA, an acronym for "Completely Automated Public Turing test to tell Computers and Humans Apart." CAPTCHAs are designed to see whether users are human, often to prevent bots from accessing computing services. They usually challenge website visitors to recognize a string of distorted letters and digits, a problem designed to be difficult for computers and easy for humans.

A CAPTCHA is considered broken if an algorithm can successfully solve it at least 1 percent of the time. Now San Francisco Bay Area startup Vicarious reveals its AI software can solve reCAPTCHAs at an accuracy rate of 66.6 percent, BotDetect at 64.4 percent, Yahoo at 57.4 percent and PayPal at 57.1 percent.

The system that Vicarious developed, known as the Recursive Cortical Network (RCN), is an artificial neural network, a computing design that mimics how the brain works. In such a system, components known as artificial neurons are fed data, and work together to solve a problem such as identifying text or recognizing speech. The neural net can then alter the pattern of connections among those neurons to change the way...


The European Commission Has Essentially Invalided Many European Patents (EPs) for Being Out of Scope; Are Software Patents (CII) Next? "IndyWatch Feed Tech"

European Commission room

Summary: Now that the European Commission openly intervenes in matters pertaining to the EPC and granted patents, will it belatedly revoke all these software patents (granted over the years by the EPO)?

IT is no secret that the EPO grants software patents in Europe. We have been writing about this for many years and insiders now speak about this anonymously; theyre not happy about it, nor are they pleased with the systematic decline in quality of EPs.

Are software patents next on the agenda? Will European software patents finally be eradicated?Yesterday, AA Thornton & Cos Alex Hughes wrote about EPO changes, but not EPO scandals. They never mention the scandals. Theyre afraid to rock the boat. Instead, Hughes wrote about EPO Guidelines for Examination 2017 and concluded with the following portion about intervention by the European Commission (which makes EPO feel like more of an EU institution):

The Guidelines have also been updated to reflect amended Rules 27 and 28 which came into force on 1 July 2017. These rules are discussed here in detail and concern the exclusion of products exclusively obtained by essentially biological processes following the Notice of the European Commission from November 2016.

Are software patents next on the agenda? Will European software patents finally be eradicated?

Barbara Rigby from Dehns also wrote about the subject (earlier today under the title Changes to EPO Guidelines) and here is what she said:

Products of essentially biological processes Section G-II, 5.2-5.5

The Guidelines have been updated to reflect the amendments to Rules 27 and 28 EPC that came into effect as of 1 July 2017 (with retrospective effect). Thus, the Guidelines set out that plants and animals exclusively obtained by essentially biologic...


ARM Proposes Changing GCC's Default Optimization Level To -Og "IndyWatch Feed Tech"

The GNU Compiler Collection currently uses -O0 as the default optimization level when no other optimization level is passed. An ARM developer is proposing the default optimization level be changed to -Og...


JFK Files to be Released on the Deadline of the JFK Assassination Records Collection Act "IndyWatch Feed Tech"

John F. Kennedy, often better known as JFK, was the United States of America's 35th President. He was assassinated on November 22, 1963.

The deadline for the release of redacted and withheld records from the JFK Assassination Records Collection is today. Of the approximately 5 million pages in the collection, about 11% are redacted and 1% are withheld in full:

According to the [JFK Assassination Records Collection Act], all [JFK assassination-related] records previously withheld either in part or in full should be released on October 26, 2017, unless authorized for further withholding by the President of the United States. The 2017 date derives directly from the law that states:

Each assassination record shall be publicly disclosed in full, and available in the Collection no later than the date that is 25 years after the date of the enactment of this Act, unless the President certifies, as required by this Act, that

(i) continued postponement is made necessary by an identifiable harm to military defense, intelligence operations, law enforcement or conduct of foreign relations; and

(ii) the identifiable harm is of such gravity that it outweighs the public interest in disclosure.

The Act was signed by President Bush on October 26, 1992, thus the final release date is October 26, 2017.

Some records related to grand jury information and tax return information will remain withheld, as specified in Sections 10 and 11 of the Collection Act.

Read more of this story at SoylentNews.


Reading an IR Remote on a Raspberry Pi with LIRC "IndyWatch Feed Tech"

[IR remote with Raspberry Pi Zero W]

Our makerspace got some new Arduino kits that come with a bunch of fun parts I hadn't played with before, including an IR remote and receiver.

The kits are intended for Arduino and there are Arduino libraries to handle it, but I wanted to try it with a Raspberry Pi as well.

It turned out to be much trickier than I expected to read signals from the IR remote in Python on the Pi. There's plenty of discussion online, but most howtos are out of date and don't work, or else they assume you want to use your Pi as a media center and can't be adapted to more general purposes. So here's what I learned.

Install LIRC and enable the drivers on the Pi

The LIRC package reads and decodes IR signals, so start there:

$ sudo apt-get install lirc python-lirc python3-lirc

Then you have to enable the lirc daemon. Assuming the sensor's pin is on the Pi's GPIO 18, edit /boot/config.txt as root, look for this line and uncomment it:

# Uncomment this to enable the lirc-rpi module

Reboot. Then use a program called mode2 to make sure you can read from the remote at all, after first making sure the lirc daemon isn't running:

$ sudo service lirc stop
$ ps aux | grep lirc
$ mode2 -d /dev/lirc0

Press a few keys. If you see a lot of output, you're good. If not, check your wiring.

Set up a lircd.conf

You'll need to make an lircd.conf file mapping the codes the buttons send to symbols like KEY_PLAY. You can do that -- ina somewhat slow and painstaking process -- with irrecord.

First you'll need a list of valid key names. Get that with irrecord -l and you'll probably want to keep that window up so you can search or grep in it. Open another window and run:

$ irrecord -d /dev/lirc0 ~/lircd.conf

I had to repeat the command a couple of times; the first few times it couldn't read anything. But once it's running, then for each key on the remote, first, find the key name that most closely matches what you want the key to do (for instance, if the key is the power button, irrecord -l | grep -i power will suggest KEY_POWER and KEY_POWER2). Type or paste that key name into irrecord -d, then press the key. At the end of this, you should have a ~/lircd.conf.

Some guides say to copy that lircd.conf to /etc/lirc/ andI did, but I'm not sure it matters if you're going to be running your programs as you rather than root.

Then enable the lirc daemon that you st...


jQuery Official Blog Hacked Stay Calm, Library is Safe! "IndyWatch Feed Tech"

The official blog of jQuerymost popular JavaScript library used by millions of websiteshas been hacked by some unknown hackers, using the pseudonym "str0ng" and "n3tr1x." jQuery's blog website ( runs on WordPressthe world's most popular content management system (CMS) used by millions of websites. While there is no evidence yet if the server (


Maxine Waters demands info on Russia-linked Twitter accounts she says targeted her "IndyWatch Feed Tech"

Rep. Maxine Waters (D-Calif.) is demanding Twitter provide information on Russia-linked accounts she says targeted her and her congressional district.In a statement released Thursday, Waters said she has never publicly discussed this before now...


The Most Useless Tools You Cant Seem to Part With "IndyWatch Feed Tech"

Im a tool person. No matter how hard I try, I eventually end up with a bunch of tools that I just cant bear to banish from my workshop. Why? Im gonna keep it 100%: its the same emotion behind hoarding fearing that you might need a thing later and not be able to have it.

The stuff costs money, and if you have to script to buy a bunch of tools pertaining to Project X, you expect to still have and probably need those very same tools even if they have to sit in a box on my shelf for 20 years, taunting me every time I have to move it to one side.  Heat-bending element the boxs label describes at tool I havent used in at least 5 years. I have a bunch of these white elephants. Ill probably need to heat-bend acrylic real soon yeah.

Ive found that pretty much everyone in our crowd can relate. You buy a special tool for one project and it was expensive and tremendously helpful, and since then its been sitting around uselessly. You certainly couldnt part with it, what if you needed it again? So you store it in your house for 20 years, occasionally coming across it when looking for something else, but it never actually gets used.

Join me now in a walk down our memory lane of useless tools.

Tools That Are Too Nice



Planet Formation in Cometary Rings "IndyWatch Feed Tech"

Just how do you go about building a super-Earth? One possibility may be emerging in the study of young debris disk systems with thin, bright outer rings made up of comet-like bodies. Three examples are under scrutiny in work discussed at the recent American Astronomical Societys Division for Planetary Sciences meeting in Provo, Utah. Here, Carey Lisse (JHU/APL) described his teams results in studying the stars Fomalhaut, HD 32297 and HR 4796A.

What the scientists are finding is that dense rings of comets can become a construction zone for planets of super-Earth size. The makeup of the material in these ring systems varies, from two that are rich in ice (Fomalhaut and HD 32297) to one that is depleted in ice but rich in carbon (HR 4796A). Take a look at the image below, showing the ring surrounding HR 4796A, and youll see how strikingly tight the band of dust around this relatively young stellar system is.

Image: Gemini Planet Imager observations reveal a complex pattern of variations in brightness and polarization around the HR 4796A disk. Credit: Marshall Perrin (Space Telescope Science Institute), Gaspard Duchene (UC Berkeley), Max Millar-Blanchaer (University of Toronto), and the GPI Team.

What causes the dust ring here? Lisse believes its red color is the result of the burnt-out rocky remains of comets, with the ring system close enough to the central star that the original materials have largely boiled off. At Fomalhaut and HD 32297, cometary dust containing ices is found, the ring systems being far enough from the central star that their comets remain cold and stable.

But the tight structure of these three ring systems is still problematic, because in young systems we would expect to see a much less orderly situation as the early era of planet formation proceeds. We also see little circumstellar gas in these systems.

Here we might think of what Cassini showed us at Saturn in the form of small shepherding moons that preserve ring structure. Could something similar be happening around these stars, varying according to temperature, as emerging planets begin to take shape? Lisse believes this to be the case:

Comets crashing down onto these growing planet surfaces would kick up huge clouds of fast-moving, ejected construction dust, which would spread over the system in huge clouds. The only apparent solution to these issues is that multiple mini-planets are coalescing in these rings, and these small bodies, with low kick-up velocities, are shepherding the ri...


AMD Profits in Q3 2017 "IndyWatch Feed Tech"

AMD turned a profit last quarter:

2017 has been a great year for the tech enthusiast, with the return of meaningful competition in the PC space. Today, AMD announced their third quarter earnings, which beat expectations, and put the company's ledgers back in the black in their GAAP earnings. For the quarter, AMD had revenues of $1.64 billion, compared to $1.31 billion a year ago, which is a gain of just over 25%. Operating income was $126 million, compared to a $293 million loss a year ago, and net income was $71 million, compared to a net loss of $406 million a year ago. This resulted in earnings per share of $0.07, compared to a loss per share of $0.50 in Q3 2016.

[...] The Computing and Graphics segment has been a key to these numbers, with some impressive launches this year, especially on the CPU side. Revenue for this segment was up 74% to $819 million, and AMD attributes this to strong sales of both Radeon GPUs and Ryzen desktop processors. Average Selling Price (ASP) was also up significantly thanks to Ryzen sales. AMD is still undercutting Intel on price, but they don't have to almost give things away like they did the last couple of years. ASP of GPUs was also up significantly, and the proliferation of cryptocurrency likely played a large part in that. Operating income for the segment was an impressive $70 million, compared to an operating loss of $66 million last year.

When AMD turns a profit, it is news. Stocks still plunged on concerns over future growth. Citi Research has predicted big losses for AMD as Intel ships its Coffee Lake CPUs.

Previously: AMD Ryzen Launch News
AMD GPU Supply Exhausted By Cryptocurrency Mining, AIBs Now Directly Advertising To Miners
AMD Epyc 7000-Series Launched With Up to 32 Cores
Cryptocoin GPU Bubble?
Ethereum Mining Craze Leads to GPU Shortages
Used GPUs F...


[$] The state of the realtime union "IndyWatch Feed Tech"

The 2017 Realtime Summit was held October 21 at Czech Technical University in Prague to discuss all manner of topics related to realtime Linux. Nearly two years ago, a collaborative project was formed with the goal of mainlining the realtime patch set. At the summit, project lead Thomas Gleixner reported on the progress that has been made and the plans for the future.


AMD EPYC 7551 Linux Benchmarks "IndyWatch Feed Tech"

One step below AMD's current top-end EPYC 7601 server processor is the EPYC 7551. The EPYC 7551 costs around $800 USD less than the 7601 while still being a 32 core / 64 thread part but with slightly lower clock frequencies. In this article is a look at the EPYC 7251 / 7351P / 7401P / 7551 / 7601 Ubuntu Linux performance compared to various Intel Xeon CPUs in our lab.


Artists Highlight YouTube Piracy and Poor Payments in New Ad Campaign "IndyWatch Feed Tech"

YouTube is the worlds leading video and music service and has partnerships with thousands of artists and other publishers around the globe.

While many are happy with the revenue theyre generating from the Google-owned platform, there has been a lot of negative commentary as well.

Several major record labels are complaining about the so-called value gap and the low payouts per streaming view, for example. This view is shared by the Content Creators Coalition (c3), an artist-run advocacy organization for musicians.

The group has just released two new ads calling on the streaming service to give artists more options to prevent piracy while calling on Congress to update the DMCA.

Rehashing the old Apple vs. Microsoft ad theme, the first video depicts an artist who is trying to get pirated content removed from the site. In the ad, YouTube is not particularly helpful, suggesting that pirated content is quickly re-uploaded after its removed.

Interestingly, there is no mention of the Content-ID program which many creators successfully use to prevent pirated content from reappearing. The vast majority (98%) of all copyright complaints are currently handled automatically through the Content-ID system.

Takedown Whack-a-Mole?

The second ad complains about poor payments. In this video, the artist gets paid more from all smaller streaming services, even though these generated only a fraction of the views compared to YouTube.

This complaint is not new either. Over the past several years, YouTube has been called out repeatedly for not paying enough. Not only that, the streaming service has also been accused of running a DMCA protection racket, profiting from pirated streams while hiding behind the DMCAs safe harbor protections.


The Content Creators Coalition says that the advertisements will run on YouTube and other digital platforms as part of a significant new ad buy.

Googles YouTube has shortchanged a...


DeepMind wants to find the next miracle materialexperts just dont know how theyll pull it off "IndyWatch Feed Tech"

Artificial intelligence has historically over-promised and under-delivered. That routine leads to spurts of what those in the field call hypeoutsized excitement about the potential of a core technologyfollowed after a few years and several million (or billion) dollars by crashing disappointment. In the end, we still dont have the flying cars or realistic robot dogs we were promised.

But DeepMinds AlphaGo, a star pupil in a time well likely look back on as a golden age of AI research, has made a habit of blowing away experts notions of whats possible. When DeepMind announced that the AI system could play Go on a professional level, masters of the game said it was too complex for any machine. They were wrong.

Now AlphaGo Zero, the AIs latest iteration, is being set to tasks outside of the 1919 Go board, according to DeepMind co-founder Demis Hassabis.


This Weeks Hype "IndyWatch Feed Tech"

Yet another entry in the long line of nonsensical hype about fundamental physics driven by misleading university press releases is todays news that CERN Scientists Conclude that the Universe Should Not Exist. Tracking this back through various press stories (see here, here and here), one finds that the original source, as always, is a university press release designed to mislead journalists. In this case its Riddle of matter remains unsolved from Johannes Gutenberg University Mainz, a press release designed to promote this paper in Nature.

If this experiment had found CPT non-invariance, the implications for early universe baryon-antibaryon asymmetry would have been of minor interest compared to the revolutionary discovery that a fundamental theorem of quantum field theory was violated, shattering our understanding of fundamental physics in terms of quantum field theory.


Dip update 110/n "IndyWatch Feed Tech"

[Orig: Oct 26, 2017]
Hi everyone,
We have had a hard past few days getting data from the LCO sites.  On Monday a storm hit the mountain where OGG is located, and power has just been restored (although it is still raining).  Attached is the latest including points from TFN.  These are based on only a few points, so unfortunately this means the errors are a bit large. Even still, it looks like the star remains at a slightly above level brightness.     
~Tabby and team
PS: These observations are happening because of the wonderful backers of our 2016 Kickstarter project. The Kickstarter campaign has ended, but we are still accepting donations to purchase additional observing time on the LCO 0.4m network. Thanks in advance for your support!      


Last chance to nominate for 2017 Free Software Awards "IndyWatch Feed Tech"

Nominations for the 20th annual Free Software Awards opened at LibrePlanet 2017, right after the most recent Free Software Awards were presented -- and your opportunity to submit nominations ends on November 5th, 2017, at 23:59 UTC. For details, see instructions below.

If you admire a free software contributor or project and want the world to see how great they are, nominate them today. Your nominations will be reviewed by our awards committee and the winners will be announced at LibrePlanet 2018.

Award for the Advancement of Free Software

The Award for the Advancement of Free Software is presented annually by FSF president Richard Stallman to an individual who has made a great contribution to the progress and development of free software, through activities that accord with the spirit of free software.

Award for Projects of Social Benefit

The Award for Projects of Social Benefit is presented to a project or team responsible for applying free software, or the ideas of the free software movement, in a project that intentionally and significantly benefits society in other aspects of life.

We look to recognize projects or teams that encourage people to cooperate in freedom to accomplish tasks of great social benefit, and those that apply free software ideas and lessons outside the free software community. A long-term commitment to one's project (or the potential for a long-term commitment) is crucial to this end.

This award stresses the use of free software in the service of humanity. We have deliberately chosen this broad criterion so that many different areas of activity can be considered. However, one area that is not included is that of free software itself. Projects with a primary goal of promoting or advancing free software are not eligible for this award (we honor individuals working on those projects with our annual Award for the Advancement of Free Software).

We will consider any project or team that uses free software or its philosophy to address a goal important to society. To qualify, a project must use free software, produce free documentation, or use the idea of free software as defined in the Free Software Definit...


Friday Free Software Directory IRC meetup: October 27th starting at 12:00 p.m. EDT/16:00 UTC "IndyWatch Feed Tech"

Participate in supporting the Directory by adding new entries and updating existing ones. We will be on IRC in the #fsf channel on

While the Directory has been and continues to be a great resource to the world for over a decade now, it has the potential to be a resource of even greater value. But it needs your help!

This week we're back to work on adding new entries to the Directory. The backlog of unapproved packages continues to dwindle, but we want to get it all the way down to zero, and keep adding more. Each new package helps to make the Directory a better resource for finding any sort of software that you may need. The Directory is one of our most visited resources, so keeping it growing ensures there's lots for all those users to see.

If you are eager to help, and you can't wait or are simply unable to make it onto IRC on Friday, our participation guide will provide you with all the information you need to get started on helping the Directory today! There are also weekly Directory Meeting pages that everyone is welcome to contribute to before, during, and after each meeting.


Rejuvenation May Bring Challenges to Society but are they Worse than Age-related Diseases? "IndyWatch Feed Tech"

Defeating age-related diseases may create challenges for society, but is that worse than not doing anything?

In these six years, Ive spent as a rejuvenation advocate, Ive had to deal with the traditional objections raised against the idea of longer lifespans. These objections touch a variety of different topics, but they arent terribly many: were talking about maybe a dozen of them, and these days, I hardly ever hear an objection I havent discussed before.

However few or many, and deserving of specific answers, these objections may be, they can all be reduced down to a single, general form: Rejuvenation biotechnologies would cause [insert problem here], so its best not to go there. And just like there are specific answers for each specific objection, there are general answers for their general formAubrey de Greys famous two more general answers.

These two general answers question the validity of two implicit assumptions contained in all objections, general or specific.


Smashing Security podcast #049: Hacking funeral homes, crypto mining websites, and careful with that hairspray "IndyWatch Feed Tech"

Scammers show a lack of imagination after hacking a funeral home, more websites are secretly stealing visitors' resources to mine for cryptocurrency, and everyone is very confused about the USA's airline laptop ban.

All this and much much more is discussed in the latest edition of the "Smashing Security" podcast by computer security veterans Graham Cluley and Carole Theriault, joined this week by The Register's John Leyden.


Infosec expert viewpoint: DDoS attacks "IndyWatch Feed Tech"

DDoS attacks have become more extensive and are testing the limits of existing DDoS mitigation tools and practices, as well as affecting online businesses globally. Organizations are experiencing an increase in the magnitude of DDoS attacks, with the average size of attacks over 50 Gbps quadrupling in just two years. What presents a particular risk for organizations is the barrage of short, low volume attacks that mask more serious network intrusions. Frost & Sullivan found More


Offshore law firm Appleby confirms data breach "IndyWatch Feed Tech"

Appleby, a major offshore law firm based in Bermuda, has confirmed it has suffered a data security incident in 2016 that resulted in some of their data being compromised. Its doubtful that the wider public would have ever known about this were it not from the US-based International Consortium of Investigative Journalists (ICIJ) and partner media organisations, who got in touch with the company in order to confirm some of the things included in documents More


Raspberry Pi Media Streamer Is Combat Ready "IndyWatch Feed Tech"

We are truly living in the golden age of media streaming. From the Roku to the Chromecast, there is no shortage of cheap devices to fling your audio and video anywhere you please. Some services and devices may try to get you locked in a bit more than wed like (Amazon, were looking at you), but on the whole if youve got media files on your network that you want to enjoy throughout the whole house, theres a product out there to get it done.

But why buy an easy to use and polished commercial product when you can hack together your own for twice the price and labor over it for hours? While youre at it, why not build the whole thing into a surplus ammo can? This the line of logic that brought [Zwaffel] to his latest project, and it makes perfect sense to us.

It should come as no surprise that a military ammo can has quite a bit more space inside than is strictly required for the Raspberry Pi 3 [Zwaffel] based his project on. But it does make for a very comfortable wiring arrangement, and offers plenty of breathing room for the monstrous 60 watt power supply he has pumping into his HiFiBerry AMP+ and speakers.

On the software side the Pi is running Max2Play, a Linux distro designed specifically for streaming audio and video remotely. [Zwaffel] says that with this setup he is able to listen to music on his Squeezebox server as well as watch movies via Kodi.

While none are quite as battle-hardened as this, we have seen several other Raspberry Pi Squeezebox clients over the years if youre looking for more inspiration.

Filed under: digital audio hacks, Raspberry Pi


For the First Time Ever, a Robot Was Granted Citizenship "IndyWatch Feed Tech"

Clearly, the robot that previously made headlines because she said shell destroy humankind has since embraced being human to a certain extent.

Robot Citizenship

The decision to grant a robot citizenship adds to the growing debate of whether or not robots should be given rights similar to human beings. Earlier this year, the European Parliament proposed granting AI agents personhood status, giving them particular rights and responsibilities. While robot rights are in question, one expert suggests it should be possible for humans to torture robots.


EPA Cancels Talks by Three Agency Scientists at Rhode Island Event "IndyWatch Feed Tech"

The New York Times and HuffPost and many others report on EPA abruptly blocking three agency scientists from giving talks on climate change - specifically in the context of a Rhode Island event, with the subject of discussing a report on current conditions in Narragansett Bay and future threats that include climate change.

The New York Times (the origin)

WASHINGTON The Environmental Protection Agency has canceled the speaking appearance of three agency scientists who were scheduled to discuss climate change at a conference on Monday in Rhode Island, according to the agency and several people involved.

John Konkus, an E.P.A. spokesman and a former Trump campaign operative in Florida, confirmed that agency scientists would not speak at the State of the Narragansett Bay and Watershed program in Providence. He provided no further explanation.

Scientists involved in the program said that much of the discussion at the event centers on climate change. Many said they were surprised by the E.P.A.'s last-minute cancellation, particularly since the agency helps to fund the Narragansett Bay Estuary Program, which is hosting the conference. The scientists who have been barred from speaking contributed substantial material to a 400-page report to be issued on Monday.
Monday's conference is designed to draw attention to the health of Narragansett Bay, the largest estuary in New England and a key to the region's tourism and fishing industries. Rhode Island's entire congressional delegation, all Democrats, will attend a morning news conference. Sen. Sheldon Whitehouse, an outspoken critic of Mr. Pruitt, will be among the speakers.

Scientists there will unveil the report on the state of the bay, which E.P.A. scientists helped research and write. Among the findings will be that climate change is affecting air and water temperatures, precipitation, sea level and fish in and around the estuary.

The HuffPost article provides some context:

The researchers were booked to appear Monday in Providence at the State of the Narragansett Bay and Watershed workshop, an event highlighting the health of New England's largest estuary, where temperatures have risen 3 degrees Fahrenheit and water has risen up to seven inches over the past century.
The move comes days after the EPA...


Its Big and Long-Lived, and It Wont Catch Fire: The Vanadium Redox-Flow Battery "IndyWatch Feed Tech"

Move over, lithium ion: Vanadium flow batteries finally become competitive for grid-scale energy storage

Photo: Rongke Power Go Big: This factory produces vanadium redox-flow batteries destined for the worlds largest battery site: a 200-megawatt, 800-megawatt-hour storage station in Chinas Liaoning province.

The factory sprawls over an area larger than 20 soccer fields. Inside, its brightly lit and filled with humming machinery, a mammoth futuristic manufactory. Robot arms grab components from bins and place each part with precision, while conveyor belts move the assembled pieces smoothly down production lines. Finished products enter testing stations for quality checks before being packed for shipping.

It has been called a gigafactory, and it does indeed produce vast quantities of advanced batteries. But this gigafactory is in China, not Nevada. It doesnt make batteries for cars, and its not part of the Elon Musk empire.

Opened in early 2017, in the northern Chinese port city of Dalian, this plant is owned by Rongke Power and is turning out battery systems for some of the worlds largest energy storage installations. Its on target to produce 300 megawatts worth of batteries by the end of this year, eventually ramping up to 3 gigawatts per year.

The scale of this other gigafactory may be impressive, but the core technology it makes is even more compelling. The Dalian factory produces vanadium redox-flow batteries, a specialized type whose time has finally come. The VRFB was invented decades ago but has emerged only recently as one of the leading contenders for large-scale energy storage.

How large? VRFBs are being touted for grid-scale uses in which they would store up to hundreds of megawatt-hours of energy. In these applications, they may be charged by large baseload power plants, which generate electricity cheaply but are too sluggish to accommodate sharp increases in demand during peak hours. Or they may be charged by renewable sources like wind farms, whose generation doesnt always align well with demand. Like most batteries, VRFBs can deliver power nearly instantaneously, so they can stand in for the traditional means of meeting peak demand: fossil-fueled peaker plants that, in comparison with batteries, are costly to maintain and operate and not as fast.

Lithium-ion batteries, too, have been proposed for grid-scale uses. But here they are no match for VRFBs, which hav...


Twitter banning ads from Russia-funded media outlets "IndyWatch Feed Tech"

Twitter will no longer run ads from Russian-funded news outlets RT and Sputnik, the company announced Thursday.The move came hours after RTs editor-in-chief, Margarita Simonyan, said that Twitter had pitched her outlet on buying election ads, a...


Lightworks 14.1 In Beta For Linux Video Editing "IndyWatch Feed Tech"

For fans of the Lightworks commercial-grade non-linear video editing software, their first beta update of the 14.1 series is now available...


Wal-Mart launches shelf-scanning robots in about 40 stores "IndyWatch Feed Tech"

CHICAGO (Reuters) Wal-Mart Stores Inc will roll out shelf-scanning robots in approximately 40 stores to replenish inventory faster on its shelves and save store employees time when products run out.

FILE PHOTO: Shopping carts are seen outside a new Wal-Mart Express store in Chicago July 26, 2011. REUTERS/John Gress/File Photo.


Security updates for Thursday "IndyWatch Feed Tech"

Security updates have been issued by Fedora (cacti, glibc, kernel, libXfont, libXfont2, mingw-poppler, nodejs-forwarded, procmail, SDL2, thunderbird, and tnef), openSUSE (freeradius-server, kernel, and libraw), Oracle (kernel), Red Hat (ntp), Scientific Linux (ntp), Slackware (irssi), SUSE (kernel), and Ubuntu (python-werkzeug).


CEO email exposure underscores the importance of password management "IndyWatch Feed Tech"

Nearly one in three major CEOs has been pwned using their company email address, according to a new F-Secure study. In other words, a service they access using their company email has been hacked and the password they use for that service has leaked. Without proper password practices, this potentially increases their susceptibility to targeted attacks. F-Secure researched known company email addresses used by top executives from more than 200 of the biggest companies in More


Google to test self-driving cars in Michigan's winter conditions "IndyWatch Feed Tech"

Googles self-driving car company will test autonomous vehicles in Michigan this winter in order to see how they fare in snowy and icy conditions.Waymo, owned by Googles parent company Alphabet, announced Thursday that its autonomous...


NVIDIA Announces The GeForce GTX 1070 Ti, Shipping In Early November "IndyWatch Feed Tech"

Today's GeForce GTX 1070 Ti announcement is hardly a surprise given all the recent leaks about this new card, but NVIDIA announced it today and will be shipping in early November...


Tips for an Information Security Analyst/Pentester career - Ep. 29: XAMPP and SQL exploitation "IndyWatch Feed Tech"

I mentioned already in one my latest posts that it's possible to access MyPhpAdmin panel from Xampp without a password.

However, for time constraints, I didn't show you what you can actually do, by running SQL commands on it.

This time I'm gonna delve more into this topic.

So, let's access MyPhpAdmin panel like we did last time.

The first command I want to run is SHOW DATABASES;  to retrieve all databases created on Xampp.

It doesn't return us anything very juicy.

The most dangerous vulnerability we can exploit this way, though, is uploading a PHP shell by using SQL syntax.

I could have easily used a reverse shell, but it was easier to just upload a shell that can run system commands when invoked.

For this, I used the following syntax:
SELECT "" into outfile"C:\\xampp\\htdocs\\shell.php".

This allows to enter PHP commands and to store them to a PHP file, that will be created in the web server directory (which, in Windows, is C:\xampp\htdocs, while in /Unix/Linux is /opt/lampp/htdocs).

In other words, it allows to create a PHP shell on the server by using SQL commands (a SELECT statement).

When we recall the shell and enter a system command, it'll be displayed in our browser.

Below is the result returned by running the...


Apple accused of reducing the accuracy and quality of iPhone Xs Face ID "IndyWatch Feed Tech"

Apple claims Bloombergs report on iPhone X Face ID is false

Last month, Apple had to face an embarrassing glitch at the launch of its premium flagship, iPhone X while demonstrating Face ID, the companys new facial recognition software that unlocks the device. If this was not enough, a new report from Bloomberg citing anonymous sources claims that Apple has told its manufacturers to reduce the accuracy of Face ID components in iPhone X so that the parts can be tested faster.

For those unaware, Apple has replaced its Touch ID in iPhone X in favor of Face ID, which uses the TrueDepth camera system on the top of the display to unlock the device. Face ID can also be used for authentication, payments, accessing securing apps and be used with Apple Pay as well.

The Bloomberg report says that Apple told suppliers they could reduce the accuracy of the face-recognition technology to make it easier to manufacture. It also says that a less accurate Face ID will still be far better than the existing Touch ID. However, the report does not specify whether Apple relaxed its requirements before or after it announced its Face ID at a press conference on September 12.

On the other hand, Apple has disputed Bloombergs accusation of relaxing accuracy for Face ID. Bloombergs claim that Apple has reduced the accuracy spec for Face ID is completely false. The quality and accuracy of Face ID havent changed. It continues to be 1 in a million probability of a random person unlocking your iPhone with Face ID, the company said in a statement.

Apples iPhone X will be available for pre-order on Friday and go on sale on November 3. Rumors of iPhone X production challenges have been doing the rounds for months. Whether or not this rumor has any weight only time will tell. Keep watching this space for more updates!



The post Apple accused of reducing the accuracy and quality of iPhone Xs Face ID appeared first on TechWorm.


Interactive Visual Programming With vvvv "IndyWatch Feed Tech"

Did you ever feel the urge to turn the power of image processing and OCR into music? Maybe you wanted to use motion capture to illustrate the dynamic movement of a kung-fu master in stunning images like the one above?  Both projects were created with the same software.

vvvv -pronounced four vee, vee four and sometimes even veeveeveevee- calls itself a multi purpose framework, which is as vague and correct as calling a computer a device that performs calculations. What can it do, and what does the framework look like? Id like to show you.

Since its first release in 1998 the project has never officially left beta stage. This doesnt mean the recent beta releases are unstable, its just that the people behind vvvv refrain from declaring their software finished. It also provides an excuse for some quirks, such as requiring 7-zip to unpack the binaries and the UI that takes some getting used to. vvvv requires DirectX and as such is limited to Windows.

With the bad stuff out of the way, lets take a look what vvvv can do. First, as implied by the close relationship with DirectX, its really good at producing graphics. An example for interactive video is embedded below the break. With its data flow/ visual programming approach it also lends itself to rapid prototyping or live coding. Modifications to a patch, as programs are called in this context, immediately affect the output.

The name patch harkens back to the times of analog synthesizers and working with vvvv has indeed some similarities with signal processing that will make the DSP nerds among you feel right at home.

Whats in the box?

vvvv comes with a versatile standard library which can be expanded with a wide selection of packs that add more functionality. You get nodes to interface with Kinect or Leap Motion controllers, ones that are wrappers for OpenCV and others that let you connect to an I2C bus. XML parsing is available as well as database access and a rather complete audio toolbox.

For applications where the available nodes are insufficient or clumsy to use, vvvv offers several ways to add custom functionality. For once new nodes can be implemented in C#. Additionally shaders that run on the GPU can be written in HLSL and then added to the rendering pipeline....


Calculating IPv6 Subnets in Linux "IndyWatch Feed Tech"

Calculating IPv6 Subnets in Linux


CERN: The Universe Shouldn't Exist "IndyWatch Feed Tech"

The apparent symmetry between matter and antimatter is puzzling scientists at the European Organization for Nuclear Research (CERN):

One of the great mysteries of modern physics is why antimatter did not destroy the universe at the beginning of time.

To explain it, physicists suppose there must be some difference between matter and antimatter apart from electric charge. Whatever that difference is, it's not in their magnetism, it seems.

Physicists at CERN in Switzerland have made the most precise measurement ever of the magnetic moment of an anti-proton a number that measures how a particle reacts to magnetic force and found it to be exactly the same as that of the proton but with opposite sign. The work is described in Nature [open, DOI: 10.1038/nature24048] [DX].

"All of our observations find a complete symmetry between matter and antimatter, which is why the universe should not actually exist," says Christian Smorra, a physicist at CERN's BaryonAntibaryon Symmetry Experiment (BASE) collaboration. "An asymmetry must exist here somewhere but we simply do not understand where the difference is."

CP violation.

Previously: Evidence Mounts that Neutrinos are the Key to the Universe's Existence
Matter-Antimatter Asymmetry Confirmed in Baryons
LHCb Observes an Exceptionally Large Group of Particles
Possible Explanation for the Dominance of Matter Over Antimatter in the Universe

Original Submission

Read more of this story at SoylentNews.


Lending industry faces higher fraud costs than e-commerce, retail and financial services "IndyWatch Feed Tech"

Lenders face higher costs of fraud than other industries, including retail, e-commerce and financial services. For every dollar of fraud, lending companies incur $2.82 in costs, which includes fees, interest, etc., according to LexisNexis Risk Solutions. Large digital lenders, with over $50 million in annual revenue, are hit hardest by fraud in this space. Growing risks of fraud Based on a comprehensive survey of 168 risk and fraud executives at lending institutions, including auto lenders, More


RT editor says Twitter pitched outlet on buying election ads "IndyWatch Feed Tech"

The top editor of Russian government-owned cable channel RT said on social media Thursday that Twitter had pitched the Kremlin-funded outlet on buying election ads during the 2016 race.The remarks from RT editor-in-chief Margarita Simonyan...


5 Essential Hints to Improve Millimeter-wave Network Analysis "IndyWatch Feed Tech"

Improve your results for design and test network analysis at millimeter-wave frequencies.

Improve your results for design and test network analysis at millimeter-wave frequencies: get five hints to help you optimize device performance.



BadRabbit runs out of steam but be prepared for the next ransomware attack "IndyWatch Feed Tech"

The best response to the current wave of ransomware attacks is to ensure that you are prepared *before* you become a victim.

Read more in my article on the Tripwire State of Security blog.


Rule #1: If you want something to be private, don't broadcast it (even blurred out!) on TV "IndyWatch Feed Tech"

No problem that a private key is blurred out on screen. Two hackers still managed to descramble it.


The race to quantum supremacy and its cybersecurity impact "IndyWatch Feed Tech"

Quantum computing uses the power of atoms to perform memory and processing tasks and remains a theoretical concept. However, it is widely believed that its creation is possible. Most experts now agree that the creation of a quantum computer is simply a matter of engineering, and that the theoretical application will happen. Optimistic estimates for commercialization by the private sector vary between 5 and 15 years, while more conservative estimates by academics put it at More


Hackers broke into the celeb London Bridge Plastic Surgery clinic "IndyWatch Feed Tech"

The celeb London Bridge Plastic Surgery clinic confirmed in a statement that it has been the victim of a cyber attack.

The story Im going to tell you shows the risks of cyber attacks to users privacy, a plastic surgery clinic frequented by celebrities suffered a security data breach.

The clinic is the London Bridge Plastic Surgery, among its clients there are celebrities like Katie. The clinic confirmed in a statement that it has been the victim of a cyber attack, the alleged culprit is a well-known hacker that goes online with the moniker The Dark Overlord.

In April the hacker The Dark Overlord claimed to have stolen and leaked online episodes from the forthcoming season of the TV show Orange Is The New Black.

We can confirm that the Clinic has been the victim of a cyber attack. We took measures to block the attack immediately in order to protect patient information and we informed the Metropolitan Police who launched an investigation, states the statement issued by the London Bridge Plastic Surgery (LBPS).

Regrettably, following investigations by our IT experts and the police, we believe that our security was breached and that data has been stolen. We are still working to establish exactly what data has been compromised,

The Dark Overlord, a hacking group known for mocking and extorting victims, has now stolen highly personal photos from a plastic surgeon in London. reported Joseph Cox from The Daily Beast.

The Dark Overlord contacted Cox using an email account belonging to LBPS to prove they had compromised the systems at the clinic. The group sent The Daily Beast a cache of photos of LBPS operations.

The cache includes highly graphic and close-up images showing surgery on male and female genitalia, other pictures show apparent patients bodies post-operation, and in some cases they include faces.

None of a selection of tested photos returned any matches from Google reverse image searches, implying that they were indeed obtained from a private source. Several pictures include LBPS chief surgeon Chris Inglefield, wearing his distinctive, multi-colored head scarves. In one image, he is wearing an identical head scarf to that in an image on LBPS website. continues Cox.

The hacker crew also claims that stolen da...


This Living Touch Screen Is Made out of Bacteria and Gold "IndyWatch Feed Tech"

A demonstration of the pressure sensor built by bacteria in action as a researcher taps out some Morse code.

As wonderfully bizarre as it sounds, growing touch screens from a bacterial soup isnt the teams ultimate goal.

Materials scientists have long sought to blur the line between the inorganic and organic, explain Neydis Morales and Dr. Megan McClean at the University of Wisconsin-Madison, who were not involved in the work.


Writing a DAPP for the Ethereum block chain "IndyWatch Feed Tech"

The FiveMedium DAPP browsed from the Mist wallet


I've been dabbing in smart contract security (see my video here) and I found it natural to try and do a DAPP (decentralized application) myself. How hard can it be?

3.5 days later I've got back into Javascript after many years; I've learned Vue.js (kind of, my code is really ugly) and I've created my first DAPP!

First thing I'll have to say: it's hella fun.

Javascript has gone a long way and the Vue.js framework is just great! I've tried using React but I found it less developer-friendly, harder to learn and lacking in terms of template. It just didn't click. I guess coming from HTML first (and jQuery later) the Vue.js framework just makes more sense to me. It's all about having fun and I wasn't having any with React.

I still want to create, modify and query things the jQuery way, but I'm getting used to the javascript modernities (querySelector, arrow functions, ...) and the Vue.js way. I like it. It will take some time to get rid of my old habits and re-think the way I write front end code but I like it.

solidity code

Writing the dapp with Vue.js and the web3.js API (the javascript library to interact with the blockchain via an ethereum node) is pretty straight forward as well. The learning curve is not bad and there are tons of resources for beginners. That is, until you test your dapp with a real wallet like the Metamask wallet (integrated as a browser plugin) or the offic...


Intel Has Been Working On A New User-Space File-System For Persistent Memory "IndyWatch Feed Tech"

Intel developers have been working on a new user-space file-system designed for persistent memory. This user-space file-system is designed to be high-performance and does not make use of FUSE...


The history of property rights in space, while fairly limited, is also downright goofy "IndyWatch Feed Tech"

Have you heard of Dennis Hope? How about The Lunar Embassy of the Galactic Governmentno? As space enthusiasts and investors, you really should be familiar with the infamous man who has spent nearly thirty years becoming Earths most successful interplanetary real estate agent. As (legitimate) terrestrial governments consider a return to the Moon and the establishment of permanent lunar settlements, however, Hope and his customers may soon face legal challenges from national space agencies and commercial ventures alike.

Read full details here:


Delphi Automotive Acquires nuTonomy, Could Supply Self-Driving Systems to Automakers "IndyWatch Feed Tech"

Delphi Automotive has acquired the self-driving car startup nuTonomy for $450 million:

While other self-driving software startups like Cruise, Argo AI and others have opted to sell to an automaker, nuTonomy is one of the first software startups to tie up with an automotive supplier. That means nuTonomy will be a self-driving software supplier to the industry in a way Cruise and Argo, at least initially, are not. Cruise, acquired by General Motors in 2016, and Argo AI, in which Ford took a majority stake earlier this year, are exclusive providers of self-driving software to those automakers. (Ford has said it would be willing to license out Argo technology after the company got its own cars on the road.)

NuTonomy, on the other hand, is creating a turnkey self-driving platform with Delphi to be licensed to any number of automakers, or even tech companies looking to build out their own cars. "As an [automaker], I think it may be challenging to sell products to your competitors," Karl Iagnemma, nuTonomy co-founder, told Recode. With Delphi, nuTonomy will be able to work with the automakers, transportation service providers and ride-hail companies of the world, Iagnemma said.

Delphi Automotive bought Ottomatika, a Carnegie Mellon University spinoff company, in 2015.

Original Submission

Read more of this story at SoylentNews.


CVE-2016-6809: Java code execution for serialized objects embedded in MATLAB files parsed by Apache Solr using Tika "IndyWatch Feed Tech"

Posted by Shalin Shekhar Mangar on Oct 26

CVE-2016-6809: Java code execution for serialized objects embedded in
MATLAB files parsed by Apache Solr using Tika

Severity: Important

The Apache Software Foundation

Versions Affected:
Solr 5.0.0 to 5.5.4
Solr 6.0.0 to 6.6.1
Solr 7.0.0 to 7.0.1


Apache Solr uses Apache Tika for parsing binary file types such as
doc, xls, pdf etc. Apache Tika wraps the jmatio parser
( to handle MATLAB...


Running Linux on a Chromebook "IndyWatch Feed Tech"

Although Chrome OS is competent at handling web-based workloads, by design it's light on features compared to a full desktop operating system, which is presumably where many of its users are coming from. Fortunately, if you're on Googles operating system and wish it was a little more flexible, it's possible to install a fully functional copy of Linux on many Chrome devices.


But I Don't Know What a Container Is "IndyWatch Feed Tech"

What, then, is a container? Well, I come from a virtualizationhypervisor and virtual machine (VM)background, and, in my mind, containers are both very much like and very much unlike VMs. I realize that this may not sound very helpful, but let me explain.


Restoring a Tonka Truck With Science "IndyWatch Feed Tech"

The yellow Tonka Truck. Instantly recognizable by any child of decades past, that big metal beast would always make you popular around the sandbox. There were no blinking lights to dazzle, no noises to be heard (unless you count the hard plastic wheels rolling on concrete), even the dumping action is completely manual. But back then, it was a possession to be treasured indeed.

So its perhaps no surprise that there is a certain following for these classic trucks today, though like with most other collectibles, a specimen in good condition can be prohibitively expensive. The truck that [PoppaFixIt] found in the trash was certainly not one of those specimens, but with some patience and knowledge of basic chemistry, he was able to bring this vintage toy back to the present.

The first step was to disassemble the truck. Before they switched over to Chinese mass production, these trucks were built with actual rivets. After drilling them out and unfolding the little metal tabs that toy makers loved back in the day, he was able to separate the metal body of the truck from the plastic detail bits. The plastic parts just needed a fresh coat of paint, but the rusted metal body would need a bit more attention.

Remembering a tip he read online, [Poppa...


October 2017 - Bamboo - Critical Security Advisory "IndyWatch Feed Tech"

Posted by Atlassian on Oct 26

This email refers to the advisory found at .


* CVE-2017-9514.

Product: Bamboo.

Affected Bamboo product versions:

Fixed Bamboo product versions:

* for 6.0.x, Bamboo 6.0.5 has been released with a fix for this issue.
* for 6.1.x, Bamboo 6.1.4 has been released with a fix for this issue.
* for 6.2.x,...


Amazon Wants to Deliver Purchases into Your Home "IndyWatch Feed Tech"

Hot on the heels of Walmart's plans to deliver groceries directly into the fridges of homes with smart locks, Amazon has announced a similar arrangement for package deliveries, called Amazon Key:

Amazon on Wednesday announced Amazon Key, a new program for Prime members that lets delivery people drop off packages inside of customer homes.

To make Amazon Key possible, Amazon has introduced its own $120 internet-connected security camera called Amazon Cloud Cam. Customers who want to participate in the program need to purchase an accompanying "smart" lock to allow delivery people to enter their home. Combined camera-lock packages start at $250.

With the program Amazon is adding what it thinks is a more convenient option than traditional outside drop-off, while also coming up with one solution to package theft which is rampant in some markets.

The obvious questions are whether people will trust a delivery person to enter their home unattended. Amazon is trying to assuage these fears by alerting customers when a delivery is about to happen to allow them to watch it live via their phone.

This really isn't a big deal. They were delivering to the doorstep previously, and now they want to move the delivery by a couple of feet. There's almost no difference.

Also at The Verge.

Previously: Amazon Wants to Deliver Purchases to Your Car Trunk

Original Submission

Read more of this story at SoylentNews.


Krebs reported that Dell lost Control of dellbackupandrecoverycloudstorage Domain in June 2017 "IndyWatch Feed Tech"

The popular investigator Brian Krebs reported that the tech giant Dell lost the control of dellbackupandrecoverycloudstorage domain in June 2017.

It is really embarrassing, Dell forgot to renew the domain name that was used by the tech giant to install operating systems on the PC it has sold. The incident was discovered by a third-party entity that blamed the vendor for spreading malware through the domain.

According to the popular investigator Brian Krebs who first reported the news, the domain is administered by a third party, which didnt renew the domain in June 2017.

Its not yet clear how or why got away from   an Austin, Tex.-based software backup and imaging solutions provider that originally registered the domain back in mid-2013 and has controlled it for most of the time since. But someone at SoftThinks apparently forgot to renew the domain in mid-June 2017. states Brian Krebs.


The domain provides information about Dells data protection products and is used as a back-end for an app called the Dell Backup and Recovery Application that is a solution bundled with Dell PCs. Dell defines the app as a safe, simple, and reliable backup and recovery solution that can protect your system (OS, applications, drivers, settings) and data (music, photos, videos, documents, and other important files) from data loss.

The Dell Backup and Recovery Application are also used by Dell to allows PC owners to do a factory reset of their machines.

Krebs alleges the domain redirected to websites hosting malware, according to AlienVaults Open Threat Exchange the Internet address that was assigned to in late June is an Amazon server which is actively malicious.

Reached for comment about the domain snafu, Dell spokesperson Ellen Murphy shared the following statement:

A domain as part of the cloud backup feature for the Dell Backup and Recovery (DBAR) application,...


Etnaviv Gallium3D May Eventually Tackle OpenCL "IndyWatch Feed Tech"

Two developers from the Pengutronix embedded Linux company out of Germany presented at this week's Embedded Linux Conference in Europe. There they talked about zero-copy video streaming on embedded systems, and as part of that, the Etnaviv open-source graphics driver...


Looking Ahead To AMD Ryzen Mobile On Linux "IndyWatch Feed Tech"

Following AMD on Twitter teasing new Ryzen announcements the past few days, today is expected to be the launch day for the new Ryzen Mobile hardware up to now known as "Raven Ridge"...


How To Remove Unwanted/Unused Dependencies in FreeBSD pkg Command "IndyWatch Feed Tech"

I deleted a package using the 'pkg remove foo' command. However, it left over 30+ dependencies. Theses dependencies not needed by any other package on a FreeBSD Unix system and just taking space on my hard drive. How do I remove unwanted or unused dependencies in FreeBSD 11.x server?


Blade Runner and the World of Tomorrow "IndyWatch Feed Tech"

Science fiction is plagued by the slow march of time. What might have looked sleek and futuristic ten or more years ago might today look fantastic-but-unrealistic at best, or silly and outdated at worst. But whatever the case may be, the bottom line is this: no speculative sci-fi, not even cyberpunk, survives contact with the time period it portrays.

Of course, the point of science fiction isnt to make our best attempts at clairvoyance. In fact, one may argue that, since the genres birth, science fiction is more like a subgenre of fantasy; it draws upon concepts that are simply more plausible to modern sensibilities (and thereby more capable of suspending disbelief) than magic and sorcery. Early works within the genre depict grand feats of science unreachable by the technological constraints of the time period, (such as defeating death, traveling through time, or voyaging through space) and remain unfulfilled to this day. Even today, we make stories that stretch the truth of what humankind is capable of in our near future, enjoyable as they may be.



Intel Beignet 1.3.2 OpenCL Released With Some Improvements "IndyWatch Feed Tech"

A new release is now available of Beignet, Intel's open-source project providing Linux OpenCL compute support for their Iris/HD/UHD Graphics products...


This is the lightest robot that can fly, swim and take off from water "IndyWatch Feed Tech"

Lightweight, insect-inspired robot can swim, fly and leap from the surface of water.


Should You Open Source Your Product? Thats the Wrong Question "IndyWatch Feed Tech"

I often get called in to help companies make decisions about their open source strategy. They want to release key parts of their software as open source, but they need some help figuring out the best way to make it happen. I always ask them the same question:

Why? Why are you planning to open any of your code?


Microsoft Kills Kinect "IndyWatch Feed Tech"

Microsoft kills off Kinect, stops manufacturing it

Microsoft is finally admitting Kinect is truly dead. After years of debate over whether Kinect is truly dead or not, the software giant has now stopped manufacturing the accessory. Fast Co Design reports that the depth camera and microphone accessory has sold around 35 million units since its debut in November, 2010. Microsoft's Kinect for Xbox 360 even became the fastest-selling consumer device back in 2011, winning recognition from Guinness World Records at the time.

In the years since its debut on Xbox 360, a community built up around Microsoft's Kinect. It was popular among hackers looking to create experiences that tracked body movement and sensed depth. Microsoft even tried to bring Kinect even more mainstream with the Xbox One, but the pricing and features failed to live up to expectations. Microsoft was then forced to unbundle Kinect from Xbox One, and produced an unsightly accessory to attach the Kinect to the Xbox One S. After early promise, Kinect picked up a bad name for itself.

Kinect technology lives on in products such as HoloLens, Windows Hello cameras, and "Mixed Reality" headsets.

Original Submission

Read more of this story at SoylentNews.


Scientists Claims:Aliens May Already Live Inside Super-Massive Black Holes "IndyWatch Feed Tech"

Scientists claims: aliens may already live inside super-massive black holes.

A supermassive dark opening isnt the best place to live. Notwithstanding, there are physicists who think about existence existing in such outrageous spots and likely effectively occupied by some most progressive races super outsiders. Insides of super gigantic dark openings might be occupied by cutting edge human advancements living on planets with the third-kind circles, Russian cosmologist Vyacheslav I. Dokuchaev at Moscows Institute for Nuclear Research of the Russian Academy of Sciences writes in his paper distributed in Cornell Universitys online diary arXiv. We could live inside a super gigantic dark gap in the long run yet super-outsiders may have effectively outsmarted us, claims Dokuchaev. His dubious hypothesis did not depend on sci-fi yet on Einsteins speculations.

Scientist Claims: Aliens May Already Live Inside Super-Massive Black Holes


Kaspersky: Hackers used backdoored MS Office key-gen to steal NSA exploits "IndyWatch Feed Tech"

According to Kaspersky, the PC was hacked after the NSA employee installed a backdoored key generator for a pirated copy of Microsoft Office.

More details emerge from the story of the hack of the Kaspersky antivirus that allowed Russian intelligence to stole secret exploits from the personal PC of the NSA staffer.

The PC was hacked after the NSA employee installed a backdoored key generator for a pirated copy of Microsoft Office.

Kaspersky Lab, published a detailed report on the case that explains how cyber spies could have easily stolen the software exploits from the NSA employees Windows PC.

In October many media accused Kaspersky of helping the Russian intelligence for the detection of the US cyber-weapons on the PC via its security solutions, but according to the security firm the situation is quite different.

According to the telemetry logs collected by the Russian firm, the staffer temporary switched off the antivirus protection on the PC, and infected his personal computer with a spyware from a product key generator while trying to use a pirated copy of Office.

On September 11, 2014, Kaspersky antivirus detected the Win32.GrayFish.gen trojan on the NSA employees PC, some time later the employee disabled the Kaspersky software to execute the activation-key generator

Then the antivirus was reactivated on October 4, it removed the backdoored key-gen tool from the NSA employees PC and uploaded it to Kasperskys cloud for further analysis.

Our telemetry does not allow us to say when the antivirus was disabled, however, the fact that the keygen malware was later detected as running in the system suggests the antivirus had been disabled or was not running when the keygen was run. Executing the keygen would not have been possible with the antivirus enabled. continues Kaspersky.

Kaspersky pointed out that users can configure its software to not send suspicious samples back to its served for further analysis, however, in this case, the NSA staffer didnt enable this option.

When the Kaspersky malware researchers analyzed the software discovered they were in presence of an NSA exploit, they alerted the CEO Eugene Kaspersky and deleted a copy of the data.

The archive itself was detected as malicious and submitted to Kaspersky Lab for analysis, where it was processed by one of the analysts. Upon processing, the archive was found to contain multiple malware samples and source code for what appe...


Googles Android Studio 3.0 is now available for download "IndyWatch Feed Tech"

Google releases Android Studio 3.0, Android 8.1 Developer Preview

The highlight of Android Studio 3.0 is that it will support the new programming language, Kotlin, which is bundled inside the IDE.

This release of Android Studio is packed with many new updates, but there are three major feature areas you do not want to miss, including: a new suite of app profiling tools to quickly diagnose performance issues, support for the Kotlin programming language, and a new set of tools and wizards to accelerate your development on the latest Android Oreo APIs, said Android product manager, Jamal Eason. Besides these, there is also improved support for Java 8 language features and Android Things, which is the OS for IoT devices.

Other than Kotlin, Android Studio 3.0 also includes features such as creating Instant Apps, improving the development experience, new tools for creating adaptive icons, better managing fonts, writing for Android Things, the build process, testing and debugging, and more. You can check out the entire list of new features in Android Studio 3.0 here.





The post Googles Android Studio 3.0 is now available for download appeared first on TechWorm.


Kubernetes: A Pods Life "IndyWatch Feed Tech"

As you might have guessed, the title of this blog is a reference to the 1998 Pixar movie A Bugs Life and indeed, there are many parallels between a worker ant and a pod in Kubernetes. In the following, well have a closer look at the entire pod lifecycle here from a practitioners point-of-view, including ways how you can influence the start-up and shut-down behavior and good practices around application health-checking.


The EPO is Breaking the Law and Its Employees Cannot Speak About It (Updated) "IndyWatch Feed Tech"

Like popes who suppress information about abuse

Benot Battistelli at UIMPSummary: A truly extraordinary situation at the EPO, where laws are being violated in the name of so-called production and truth is treated as defamation and attacked vehemently

SUEPO has just, for the first time in fact, mentioned denial of holidays by the EPO. We have been writing about it since early September and now there is this text about it in German [PDF].

SUEPO refers to it in English as Abolishment of German National Public Holidays at the European Patent Office. Kurzgutachten zu den Rechtsfragen For more information, read here. (German) The Europea [sic] Patent Office above national law. It says this while referring to this page from the site of the EPO. (warning: links may be a privacy risk)

Surely the staff is extremely upset about this. Some people thought about actions they might take, such as not showing up or demanding double pay for that day. Since the EPO cannot be sued (immunity), Battistelli will quite likely get away with it. He intends to do this again and again (3 times at least) and not because its some critical situation like missed deadlines; his right-hand bulldog has already admitted that this is all about increasing so-called production (i.e. granting more low-quality patents, faster). But perhaps whats most horrible about this is that staff is unable to speak out against it. The media isnt listening and when comments are posted they get deleted. As someone (John) put it in our comments a few minutes ago:

The ipkat article reads (cite):
The overwhelming majority of comments were purely libellous ad hominem attacks on a man that has not even taken office.
The man who has not even taken office can o...


Platform-as-a-Service: The Key to Running a Continuous Deployment Pipeline "IndyWatch Feed Tech"

As developers, we want to be spending time creating and pushing features, we do not want to have to worry about platforms and talking to operations. [Its all about] getting feedback and getting those features in the hands of users, he said.

We want to deploy apps down a pipeline [and we] need PaaS to build a platform to deploy microservices, he said. The only way to effectively manage high-risk platforms is continuous deployment.


Pi-Controlled Billy From The Saw Horror Flicks "IndyWatch Feed Tech"

[David0429] has made a very scary Raspberry Pi controlled puppet. Scary that is if youve seen the Saw movies where a serial killer uses one like it, called Billy, to communicate with his victims. If you havent, then its a pretty neat remote-controlled puppet-on-a-tricycle hack.

A stepper motor hidden under the front fender moves the trike by rotating the front wheel. It does this using a small 3D printed wheel thats attached to the motors shaft and that presses against the trikes wheel. Steering is done using a 3D printed gear mounted above the fender and attached to the steering column. That gear is turned by a servo motor through another gear. And another servo motor in the puppets head moves its mouth up and down.

All these servos and motors are wired to an Adafruit stepper motor HAT stacked on a Raspberry Pi hidden under the seat. Remote control is done from a webpage in any browser. The Flask python web framework runs on the Pi to both serve up the webpage and communicate with it in order to receive commands.

[David0429] took great care to make the puppet and tricycle look like the one in the movie. Besides cutting away excess parts of the trike and painting it, he also ran all the wires inside the tubular frame, drilling and grinding out holes where needed.  The puppets skeleton is made of wood, zip ties and hinges but with the clothes on, its pretty convincing. Interestingly, the puppet in the first movie was constructed with less sophistication, having been made out of paper towel rolls and papier-mch. The only things [david0429] would like to do for next time are to quieten the motors for maximum creepiness, and to make it drive faster. However, the need for a drive system that could be hidden under the fender resulted one that could only work going slowly. Were thinking maybe driving it using the rear wheels may make it possible provide both speed and stealth. Ideas anyone?

In any case, as you can see in the video below, the result is suitably creepy.

This remote-controlled puppet from  Saw reminds us of Dirk,...


Video: Sophia becomes first robot to receive Saudi citizenship "IndyWatch Feed Tech"

Sophia is Hanson Robotics most advanced robot. After receiving her citizenship, she was interviewed by Andrew Ross Sorkin in Riyadh. During the course of her interview, she took a dig at Elon Musk and Hollywood movies for portraying the artificial intelligence in a questionable light.


Big Blow for the Unitary Patent (UPC) as Even Patent Professionals Say Its Dead "IndyWatch Feed Tech"

German and English UPC

Summary: Issues for the UPC have become too much for momentum to be gained anywhere across Europe, resulting in decay and perhaps abandonment

THE EPO NO longer speaks about the UPC. It has not said anything about 2 months of additional delays, knowing that it quite likely dooms the UPC as a whole (not just in the UK).

The UPC wont go anywhere from here. Its too late and Battistelli is leaving.Dont ask Team UPC about it. Its an echo chamber where everyone is lying to everybody else; they tell each other what they want to believe rather than what is true.

Earlier this week WIPR wrote about the latest development; the article is quoting only the microcosm, not UPC opponents or any businesses (i.e. echo chamber, as usual). Here is the background to it all:

The German Constitutional Court (Bundesverfassungsgericht) has extended the comment period on the credibility of a challenge to the Unified Patent Court (UPC).

In June, the court announced it was delaying the ratification of the UPC Agreement because of a constitutional complaint brought by an individual.

According to German news site Juve, Dsseldorf-based attorney Ingve Stjerna filed the complaint.

Dr. Alex Robinson wrote about it as well. He has a stake in it and he explained that a delay until 2019 or 2020 now looks likely, assuming that the BVerfG ultimately gives the UPC Agreement the OK (which is their best case scenario). To quotes Robinsons post:

After expiry of the deadline, the BV...


Fats Domino Dies, Aged 89 "IndyWatch Feed Tech"

Fats Domino, Architect Of Rock And Roll, Dead At 89

Fats Domino, one of the architects of rock 'n' roll, died yesterday at 89 years old at his daughter's suburban New Orleans home. Haydee Ellis, a family friend, confirmed the news to NPR. Mark Bone, chief investigator for the Jefferson Parish Coroner's office, tells NPR Domino died of natural causes.

In the 1940s, Antoine Domino, Jr. was working at a mattress factory in New Orleans and playing piano at night. Both his waistline and his fanbase were expanding. That's when a bandleader began calling him "Fats." From there, it was a cakewalk to his first million-selling record "The Fat Man." It was Domino's first release for Imperial Records, which signed him right off the bandstand.

[...] Between 1950 and 1963, Fats Domino hit the R&B charts a reported 59 times, and the pop charts a rollicking 63 times. He outsold Little Richard, Chuck Berry and Buddy Holly combined. Only Elvis Presley moved more records during that stretch, but Presley cited Domino as the early master.

Also at Billboard and BBC.

Original Submission

Read more of this story at SoylentNews.


High Court Passes Judgment in Illegal Sky Sports Streaming Case "IndyWatch Feed Tech"

Without doubt, streaming is the hot topic in piracy right now, with thousands of illicit channels, TV shows and movies just a few clicks away.

As widely reported, the legal Kodi software augmented with illicit third-party addons is the preferred way to watch for millions of users. However, if people dont mind sitting at a desktop machine, theres also a thriving underbelly of indexing sites and similar platforms offering unauthorized access to infringing content.

According to information released by the Federation Against Copyright Theft, an individual in the UK has just felt the wrath of the High Court for providing content to one such platform.

On Monday 23 October 2017 a judgment was obtained in the High Court against a Sky customer who had been streaming Sky Sports content illegally online, FACT reports.

Mr Yusuf Mohammed, of Bristol, has been ordered to pay legal costs of over 16,000, and to disclose details about the money he made and people he colluded with.

With FACT releasing no more information, TorrentFreak contacted the anti-piracy group for more details on the case.

Mohammed shared the Sky Sports stream via a piracy blog, FACT Director of Communications Alice Skeats told TF.

Although FACT didnt directly answer our question on the topic, their statement that Mohammed was a Sky customer seems to suggest that he mightve re-streamed content he previously paid for. When we can clarify this point, we will.

FACT didnt name the piracy blog either, nor did it respond to questions about how many people may have viewed Mohammeds illegal streams. However, FACT did confirm that he streamed Sky Sports channels so potentially a wide range of sports was made available.

The other interesting factor is the claim that Mohammed made money from his streams. Again, FACT didnt reveal how that revenue was generated (understandable since the case is ongoing) but it seems likely that advertising played a part, as it often does on pirate platforms.

Whether Mohammed will comply with the High Courts orders to reveal who he colluded with is something for the future but even if he does, Sky isnt finished with him yet. According to FACT, Mohammeds already sizeable costs bill will be augmented with a claim for damages from the satellite broadcaster.

While providing and profiting from illegal streams could easily be considered criminal in the UK, FACT confirmed that the case against Mohammed was brought by Sky and supported by FACT in a civil proceed...


Scientists working toward reversible kind of gene editing "IndyWatch Feed Tech"

Scientists are altering a powerful gene-editing technology in hopes of one day fighting diseases without making permanent changes to peoples DNA.

The trick: Edit RNA instead, the messenger that carries a genes instructions.

If you edit RNA, you can have a reversible therapy, important in case of side effects, said Feng Zhang of the Broad Institute of MIT and Harvard, a gene-editing pioneer whose team reported the new twist Wednesday in the journal Science.


Wife Of Indicted IT Staffer Imran Awan Turns: "My Husband Committed Fraud Along With Polygamy" "IndyWatch Feed Tech"


From bits and pieces such as this, it is abundantly clear that a wide range of serious investigations are presently underway whose focus is the activities of the Obama administration and the Washington pedophile conspiracy.  It is almost impossible to describe how serious this all is.

I do expect to see people executed for treason and the folks who abrogated their mandated responsibilities to be severely punished.  The recent upheaval throughout the Media industry is of the same cloth yet actually peripheral to the main event.  The fact that it is crumbling there tells us that folks are been talked to and they know that the secret is out.

The problem with a perfect pedophile based conspiracy which is what we have seen in action is that it must engage folks who are actually weak.  In fact it must engage a lot of folks and here we are describing thousands.  The investigation must be horrendous.  What this means though is that these folks are easily beaten into submission as witnesses.   This is not the marine corps..

That means when a target is confronted, the FBI already has a portfolio of testimony to disclose and an easy go and getting a detailed confession and a deal. 



Trump: Rhetoric vs. Reality "IndyWatch Feed Tech"


So far his actions have been minor and his bluster major.  That could in fact be exactly what he wants.  After all, he has plenty of other fish to fry right here at home.

While he provides cover fire, his lieutenants are very busy getting a lot done and we have there seen mostly the beginning so far..


Iran May Be SCARY Close To Having A Nuclear Weapon "IndyWatch Feed Tech"








The bottom line is that any rogue nation can undertake to produce nuclear weapons using a military civilian parallel development program.  We presently have two such nations in play with both Pakistan and India having used this route themselves.

Without question, the sole reason for Iran to have a nuclear reactor  at all is to indirectly support its military program and the same has to hold true for North Korea

Our real problem is that the Iranian clerics who control this program feel no obligation to actually honor any agr...

This Overlooked Theory Could Be The Missing Piece That Explains How The EM Drive Works "IndyWatch Feed Tech"

This just describes the second tier of matter according to my Cloud Cosmology. The em field finds the right frequency to actually react with Dark Matter and   Newton's Third Law kicks in.  This has never been obvious because out theoretical bias is to symmetric applications which usually balance things.  We are lucky to then get a vibration produced by manufacturing flaws.

we certainly have a valuable thruster here that is ideal for space applications which added to the Tesla modulators will allow heavy transport.

All Good.

This Overlooked Theory Could Be The Missing Piece That Explains How The EM Drive Works
What if it doesn't break the laws of physics?


7 OCT 2017



 The scale is huge of course and from the map we can see just how fully they have gone into going this. 

The base is now well set and adding passive atmospheric water collectors can hugely enrich the whole program.  Perhaps enough in time to allow further reduction of the desert.

All good.  something this large is needed in the Sahel at least.

A DESERT DOESNT sound like the most promising place to plant a tree. Yet, since 1978, China has planted at least 66 billion of them across its arid northern territories, hoping to transform its sandy steppes and yellow dunes into a Great Green Wall.

Ian Teh documented this epic undertaking while traveling through northern China last year. His expansive photographs show workers tending saplings, filling irrigation tanks, and blasting young trees with water. Planting trees sounds great on paper, but you can feel skeptical, Teh says. But in person, it was impressive.

The tree-planting strategy is a massive attempt to help fight desertification. Roughly a million square miles of Chinaa quarter of the countryis covered in sand. Drought, deforestation, overgrazing and other problems threaten an additional 115,000 square miles, fueling brutal sandstorms that regularly blast cities like Beijing and Dunhuang. Many scientists are skeptical planting trees will make a difference in the long run. But Chinas State Forestry Administration claims the measure has reduced sandstorms by 20 percent and desertification by nearly 5,000 miles in recent years.

Teh lives in Malaysia but works throughout Asia, documenting humans impact on the landscape. Over six days in May 2016, he photographed tree-planting sch...


Maths Beautiful Monsters - Issue 53: Monsters "IndyWatch Feed Tech"

Much like its creator, Karl Weierstrass monster came from nowhere. After four years at university spent drinking and fencing, Weierstrass had left empty handed. He eventually took a teaching course and spent most of the 1850s as a schoolteacher in Braunsberg. He hated life in the small Prussian town, finding it a lonely existence. His only respites were the mathematical problems he worked on between classes. But he had nobody to talk to about mathematics, and no technical library to study in. Even his results failed to escape the confines of Braunsberg. Instead of publishing them in academic journals as a university researcher would, Weierstrass added them to articles in the school prospectus, baffling potential students with arcane equations.

Eventually Weierstrass submitted one of his papers to the respected Crelles Journal. While his previous articles had made barely a ripple, this one created a flood of interest. Weierstrass had found a new way to deal with a fiendish class of equations known as Abelian functions. The paper only contained an outline of his methods, but it was enough to convince mathematicians they were dealing with a unique talent. Within a year, the University of Knigsberg had given Weierstrass an honorary
Read More

Is the Modern Mass Extinction Overrated? - Issue 53: Monsters "IndyWatch Feed Tech"

After decades of researching the impact that humans are having on animal and plant species around the world, Chris Thomas has a simple message: Cheer up. Yes, weve wiped out woolly mammoths and ground sloths, and are finishing off black rhinos and Siberian tigers, but the doom is not all gloom. Myriad species, thanks in large part to humans who inadvertently transport them around the world, have blossomed in new regions, mated with like species and formed new hybrids that have themselves gone forth and prospered. Were talking mammals, birds, trees, insects, microbesall your flora and fauna. Virtually all countries and islands in the world have experienced substantial increases in the numbers of species that can be found in and on them, writes Thomas in his new book, Inheritors of the Earth: How Nature Is Thriving in an Age of Extinction.

Thomas is a professor of conservation biology at the University of York in England. He is not easily pigeonholed. He has been a go-to scientist for the media and lawmakers on how climate change is scorching the life out of animals and plants. At the same time he can turn around and write, Wild geese, swans, storks, herons and
Read More

What Boredom Does to You - Issue 53: Monsters "IndyWatch Feed Tech"

Every emotion has a purposean evolutionary benefit, says Sandi Mann, a psychologist and the author of The Upside of Downtime: Why Boredom Is Good. I wanted to know why we have this emotion of boredom, which seems like such a negative, pointless emotion.

Thats how Mann got started in her specialty: boredom. While researching emotions in the workplace in the 1990s, she discovered the second most commonly suppressed emotion after anger wasyou guessed itboredom. It gets such bad press, she said. Almost everything seems to be blamed on boredom.

As Mann dived into the topic of boredom, she found that it was actually very interesting. Its certainly not pointless. Wijnand van Tilburg from the University of Southampton explained the important evolutionary function of that uneasy, awful feeling this way: Boredom makes people keen to engage in activities that they find more meaningful than those at hand.

RIchVintage / Getty Images

Imagine a world where we didnt get bored, Mann said. Wed be perpetually excited by everythingraindrops falling, the cornflakes at breakfast time. Once past boredoms evolutionary purpose, Mann became curious about whether there might be benefits beyond its contribution to survival. Instinctively, she said, I felt that we all need a little
Read More

How Evolution Designed Your Fear - Issue 53: Monsters "IndyWatch Feed Tech"

The most effective monsters of horror fiction mirror ancestral dangers to exploit evolved human fears. Some fears are universal, some are near-universal, and some are local. The local fearsthe idiosyncratic phobias such as the phobia of moths, saytend to be avoided by horror writers, directors, and programmers. Horror artists typically want to target the greatest possible audience and that means targeting the most common fears. As the writer Thomas F. Monteleone has observed, a horror writer has to have an unconscious sense or knowledge of whats going to be a universal trigger. 1 All common fears can be located within a few biologically constrained categories or domains.

Over evolutionary time, humans and their ancestors have faced potentially lethal danger in the domains of predation, intraspecific violence, contamination-contagion, status loss, and in the domain of dangerous nonliving environmental features.2-5 In other words, they faced danger from predatory animals (ranging from mammalian carnivores to venomous animals such as spiders and snakes); from hostile members of their own species; from invisible pathogens, bacteria and viruses; from loss of status, ostracization, and ultimately social exclusion, which in ancestral environments could mean death; and they faced the risk of lethal injury following dangerous weather events
Read More


Tesla Following Through On Puerto Rico Promise "IndyWatch Feed Tech"

Tesla is bringing life-saving solar power to Puerto Rico.


"Banshee" Technique Improves On-Package DRAM Performance "IndyWatch Feed Tech"

Researchers at MIT, Intel, and ETH Zurich have improved on-package DRAM performance by 33-50% using a new cache management scheme that they call Bandwidth-Efficient DRAM Caching via Software/Hardware Cooperation (Banshee):

The researchers developed a new data management scheme relying on a hash function they developed to reduce the metadata burden. Yu and his colleagues' new system, dubbed Banshee, adds three bits of data to each entry in the table. One bit indicates whether the data at that virtual address can be found in the DRAM cache, and the other two indicate its location relative to any other data items with the same hash index.

"In the entry, you need to have the physical address, you need to have the virtual address, and you have some other data," Yu says. "That's already almost 100 bits. So three extra bits is a pretty small overhead."

There's one problem with this approach that Banshee also has to address. If one of a chip's cores pulls a data item into the DRAM cache, the other cores won't know about it. Sending messages to all of a chip's cores every time any one of them updates the cache consumes a good deal of time and bandwidth. So Banshee introduces another small circuit, called a tag buffer, where any given core can record the new location of a data item it caches.

Also at MIT.

Banshee: Bandwidth-Efficient DRAM Caching via Software/Hardware Cooperation (arXiv)

Original Submission

Read more of this story at SoylentNews.


Billionaire CEO of SoftBank: Robots will have an IQ of 10,000 in 30 years "IndyWatch Feed Tech"

I guess it makes sense if they will hit about 100 level in 2029, and then goes up from there.

Masayoshi Son says singularity, the moment when artificial intelligence surpasses the human brain, will happen in in this century, for sure.


Teensy Script Plays Nintendo Switch, Strikes Out "IndyWatch Feed Tech"

The most recent of the Zelda franchise, Breath of the Wild, is known for its many, many puzzles.  One of the more frustrating ones involved bowling with a giant snowball at the top of a hillside.  [Bertrand] did not like this, so he cheated the system hacked the Nintendo Switch so that he genuinely earned a strike every time he played.  He achieved this by writing a script for a Teensy module that got him those sweet rupees.

The Teensy houses an Atmel 90USB1286 microcontroller.  When paired with LUFA software, it can emulate numerous controllers including keyboards, joysticks, etc.  It also handily has a Mini-B USB connector located on its rear, allowing it to communicate to the Switch with ease.  After confirming the hardware was compatible, [Bertrand] looked towards the software side noticing the similarity between what already existed and what he was attempting to accomplish.  He happened upon this in a Splatoon 2 fork that allows players to draw posts. 

typedef enum {
} Buttons_t;

It is notable that the THROW and TRIGGERS are composite commands, meaning that they act as multiple button pushes simultaneously.  This takes care of the issue of pressing the R button while nudging the analog stick forward to throw the snowball, as well as unlocking the screen by squeezing both L and R triggers concurrently.  The script was then painstakingly, manually input until the perfect conditions for a strike were found.  Once those measurements were captured, a script of the entire conversation leading up to the mini game was added to implement a loop that allowed the mini game to be played non-stop on repeat.  With a test period of a little under an hour, Link successfully rolled 22 strikes in a row, making bank.  [Bertrand] has...


Android to Add 'DNS Over TLS' to Keep ISPs From Spying on You "IndyWatch Feed Tech"

Submitted via IRC for SoyGuest31999

Android, the world's most popular mobile operating system, will soon enable a security protocol that helps keep internet service providers (ISPs) from spying on users. "DNS over TLS" adds a level of encryption to your DNS requests that are (mostly) inaccessible by your ISP.

[...] Using current methods, the requests happen through UDP or TCP protocols, not the more secure TLS. When Android makes the switch, you'll get the same results, only now with HTTPS-level security. That is to say, snoops now know when you've connected to a website, but not which one. Pornhub, for example, is the same as Gmail. Or, it is for the person spying on you. You'll still have to live with the fact you're watching Pokemon Go porn (safe-ish for work).


Original Submission

Read more of this story at SoylentNews.


Using Blockchain Technology to Solve Identity Management Problems "IndyWatch Feed Tech"

Blockchain Technology comes in rescue to solve identity management problems

The innovative reusable KYC integration system is expected to bring a lasting solution to the existing bottlenecks in the identity management industry.

Centralized identity management systems are beset with many challenges that make them prone to various security and administrative complications.

The deficiencies of centralized systems

For instance, storing sensitive data of individuals in a particular location or server makes storage platform a prime target for hackers and identity thieves. There is also the risk of loss of identity in the case of eventualities like a system crash, or identity mismanagement by insincere administrators who may employ client information for non-permitted uses.

Despite advancement and disruption in other domains, the identity systems we rely upon today are currently paper-based, nationally-driven, government identity systems and do not leverage the power of the blockchain. Therefore, transporting such information when needed, sometimes internationally could become cumbersome and time consuming.

Vulnerability and losses

Besides the inefficiencies encountered in central identity management systems, owners of these identities do not have control over their data and are vulnerable to issues of identity mismanagement and exposure to all forms of threats, losses and breach of privacy.

Current identity systems have largely failed to deliver any of the most basic requirements for a successful identity system: security, privacy, ownership, access, protection, interoperability, or linked data portability to identity owners.

The difficulty presented by centralized platforms in linking data makes the national and international implementation of KYC laws cumbersome to apply. Major services at both local and international levels rely on KYC implementation for execution. In todays fast-moving world that is driven by technology, transporting huge amounts of data as they are constantly required for these transactions usually lead to delays and other hitches that are responsible for inefficiencies and losses.

A Self-Sovereign Identity (SSID)

A distributed decentralized ledger such as...


Links 25/10/2017: New Linux Report, Qt 5.10 Beta 2, CAINE 9.0 "IndyWatch Feed Tech"

GNOME bluefish



  • Desktop

    • ASUS PRIME Z370-A Running Great On Linux

      For those looking at assembling a new system around Intels 8th Gen Core Coffee Lake CPUs, the motherboard Ive been conducting most of my Linux tests from has been the ASUS PRIME Z370-A. A few weeks of use with this motherboard, Im happy with this Intel Z370 motherboard.

    • Linux Laptops Get a Boost from Hacker Board Projects

      Recently, Linux desktop usage has grown from 2.14 percent to 3.23 percent according to NetMarketShare. Much of this increase appears to have come from Linux-based Chromebooks, which are likely undercounted due in part to their widespread use in schools.

      Yet, there are signs of Linux desktop life beyond Googles Chrome OS, which exists in a somewhat parallel universe to mainstream Linux. Ubuntu, for example, continues to expand into the mainstream, although at a grindingly slow pace. As with Chrome OS, most of the action is happening in lower end laptops, often emerging from hacker board projects. The newly shipping Olimex Teres-A64 and upcoming Reform laptop, for example, are based on open hardware and software. Two of the most popular new low-end Linux laptops the newly revised Pi-top and Kano products are hackab...


I No Longer Hate Microsoft "IndyWatch Feed Tech"

Why should you let Microsoft ruin an otherwise perfect day?

microsoft windows blue screen of death bsod

Roblimos Hideaway

When I was younger, I got together with friends now and then for an evening of drinking beer and discussing the perfidy of Microsoft and just how bad Windows was technically, especially considering the endless amount of R&D money poured into it.

Nowadays I am tired of hating, and if I decide to take it up again as a hobby I can think of many better targets for my bile than Microsoft. Really. Certain terrorist groups, American politicians we wont name here, and N. Korean dictators are all worse than Microsoft when it comes to pure ruin the world evil. Even worse, Bill Gates has gone from exploiter and astroturfer-in-chief to (possibly) the most generous philanthropist in history.

I mean, how can you hate someone who goes around wiping out deadly diseases?

That depends on how long a memory you have, and min...


NEW 'Off The Hook' ONLINE "IndyWatch Feed Tech"

NEW 'Off The Hook' ONLINE

Posted 26 Oct, 2017 3:47:04 UTC

The new edition of Off The Hook from 25/10/2017 has been archived and is now available online.


U.S. Widens Surveillance to Include Homegrown Violent Extremists "IndyWatch Feed Tech"

Mmm hmm. Via: Reuters: The U.S. government has broadened an interpretation of which citizens can be subject to physical or digital surveillance to include homegrown violent extremists, according to official documents seen by Reuters. The change last year to a Department of Defense manual on procedures governing its intelligence activities was made possible by a []


How to unlock your PC with Android's fingerprint scanner "IndyWatch Feed Tech"

Everyone once dream of a PC with a Fingerprint scanner in it but obviously, it's something which our pocket can't afford. Here a cool trick to use your smartphone fingerprint scanner to unlock your PC.

Things you need
1. PC or a laptop :emoji_smile:
2. Unified Remote Server application

How to unlock your PC with Android's fingerprint scanner


Backtracking EMAIL Messages "IndyWatch Feed Tech"

Tracking email back to its source: Twisted Evil

Cause i hate spammers... Evil or Very Mad

Ask most people how they determine who sent them an email message and the response is almost universally, "By the From line." Unfortunately this symptomatic of the current confusion among internet users as to where particular messages come from and who is spreading spam and viruses. The "From" header is little more than a courtesy to the person receiving the message. People spreading spam and...

Backtracking EMAIL Messages


Finally! You can Find Jobs Through Google "IndyWatch Feed Tech"


Finally! You Can Find A Job Through Google

If you remember, search giant Google made an important announcement at...

Finally! You can Find Jobs Through Google


This Free Tool will check If you're Vulnerable to Petya Attack "IndyWatch Feed Tech"


Recently, security researcher Elad Erez had created a tool which is known as Eternal Blues. Users can use the tool to test if their computers are vulnerable to Petya attack. If you find that your computer is vulnerable, then you need to install the Microsoft patch and keep your operating system up to date.

This Free Tool Will Check If Youre Vulnerable...

This Free Tool will check If you're Vulnerable to Petya Attack


Get a free edu account "IndyWatch Feed Tech"

We know .EDU account gives us too many free things but it's also tough getting a Edu account here's a trick how you can get EDU account

NOTE:- Reposting this thread on other website is allowed but do give us credit for this.


Go to and select Canada college from dropdown menu

Now apply online form with california address, california...

Get a free edu account


Former FDA Commissioner Charged in RICO Lawsuit "IndyWatch Feed Tech"

Via: AHRP: A Federal Lawsuit charges Dr. Margaret Hamburg, former Commissioner of the Food and Drug Administration (FDA) with conspiracy, racketeering & colluding to conceal deadly drug dangers under the federal Racketeer Influenced and Corrupt Organizations law (RICO) law. The amended RICO lawsuit was filed on April 11, 2016 in the U.S. District Court []


AI Can Potentially Delete Buffering From Your Life "IndyWatch Feed Tech"


Algorithms are helping us a lot to improve technological processes in the web and platforms as well as in devices. As recently, from MIT, a professor has created an artificial intelligence system that can potentially delete buffering from your life.

This AI...

AI Can Potentially Delete Buffering From Your Life


New Exciting Game in Town : PREY "IndyWatch Feed Tech"

Release date: 2017
Developer: Arkane
Link: Official site

New Prey has nothing to do with the old Prey, or Prey 2, which was cancelled back in 2014. Now in the hands of Arkanes Austin studio, Prey is only familiar in name. Set in an alternate history. where President Kennedy was never assassinated, the Soviets and...

New Exciting Game in Town : PREY


Desync by The Forgone Syndicate "IndyWatch Feed Tech"


Release date: Early 2017
Developer: The Foregone Syndicate
Link: Steam page
Coated in the neon color schemes of 1980's cyberpunk, Desync is among the most visually striking shooters youre likely to see in 2017. Developed by Melbourne studio...

Desync by The Forgone Syndicate


Razer To Launch Gaming Smartphones Soon "IndyWatch Feed Tech"

Razer wants to become a mobile manufacturer soon, but differentiating itself from all its competitors in a direct bet focused on the gamers. Hence, Razer will launch Gaming smartphones soon.

Razer To Launch Gaming Smartphones Soon

Razer carries a respectable history in the world of PC Gaming, after being the first to launch a mouse for gaming, high-end, in...

Razer To Launch Gaming Smartphones Soon


Need for Speed:Payback "IndyWatch Feed Tech"

NFS payback.

Electronic Arts and Ghost Games are stomping down on the accelerator once again with Need for Speed Payback, the latest entry in the hugely popular racing franchise. Taking players to the ominous underworld of Fortune Valley, youll have to battle against The House in a passionate quest for revenge thatll involve plenty of insane races and cop chases.

Once again developed by Ghost Games, Need...

Need for Speed:Payback


Amazon Wine is Shutting Down "IndyWatch Feed Tech"

Submitted via IRC for SoyGuest31999

Amazon Wine is shutting down at the end of this year, the retailer has just alerted sellers via email. The issue at hand has to do with the existing laws surrounding alcohol sales, which Amazon has unsuccessfully tried to change by working with regulators. The existing laws make it difficult for Amazon to sell alcohol as a retailer and operate a marketplace. That's something that's even more of a conflict now that Amazon owns Whole Foods, which also sells wine, not to mention Amazon's plans to expand its alcohol delivery business through Prime Now and Amazon Fresh.


Original Submission

Read more of this story at SoylentNews.


Toshiba lithium-ion battery could offer EVs 200-mile range after 6-minute recharge "IndyWatch Feed Tech"

Toshibas next-generation SCiB lithium-ion battery could give electric cars a 200-mile range after recharging for just six minutes.


FPGA Metastability Solutions "IndyWatch Feed Tech"

Gisselquist Technology recently posted a good blog article about metastability and common solutions. If you are trying to learn FPGAs, youll want to read it. If you know a lot about FPGAs already, you might still pick up some interesting tidbits in the post.

Dont let the word metastability scare you. It is just a fancy way of saying that a flip flop can go crazy if the inputs are not stable for a certain amount of time before the clock edge and remain stable for a certain amount of time after the clock edge. These times are the setup and hold times, respectively.

Normally, your design tool will warn you about possible problems if you are using a single clock. However, any time your design generates a signal with one clock and then uses it somewhere with another clock, metastability is a possible problem. Even if you only have one clock, any inputs from the outside world that dont reference your clock or, perhaps, any clock at all introduce the possibility of metastability.

Whats even worse is that a design can work most of the time and only hit a set up or hold violation occasionally. For example, an input connected to a push button might work nine times out of ten, but then on the tenth time, the button push just happens to sync with a clock edge. What will the flip flop do? It could adopt a level that is neither a zero or a one, or it could oscillate back and forth.

Well let you read about the solutions yourself. However, if you want our take on it, we talked about metastability as part of a series about flip flops. You can also see the video below about real life occurrences. If you want to learn more basics about flip flops, you might want to start with the first post in that series.

Filed under: FPGA


New York Advances Drone Industry With Testing Corridor "IndyWatch Feed Tech"

Envisioning a day when millions of drones will buzz around delivering packages, watching crops or inspecting pipelines, a coalition is creating an airspace corridor in upstate New York where traffic management systems will be developed and unmanned aircraft can undergo safety and performance testing.

The unmanned aircraft traffic management corridor, jump-started by a $30 million state investment, will extend 50 miles (80 kilometers) west over mostly rural farmland from Griffiss International Airport, a former Air Force base in Rome that is already home to NASA-affiliated drone testing.

It will be equipped with radar and ground-based sensors to enable what Democratic Gov. Andrew Cuomo boasted would be "the most advanced drone testing in the country."

The first segment of the corridor was launched last month by the Northeast UAS Airspace Integration Research Alliance, a coalition of private and public entities and academic institutions in New York and Massachusetts created to establish Griffiss as a drone industry incubator.

Rome, NY? That's no fun. Why not over Chappaqua, NY?

Original Submission

Read more of this story at SoylentNews.


[$] Weekly Edition for October 26, 2017 "IndyWatch Feed Tech"

The Weekly Edition for October 26, 2017 is available.


HPR2409: RPG Counternote "IndyWatch Feed Tech"

I started with tabletop role-playing games just about forty years ago. Klaatu recently did a two-part episode on the merits of RPG's, and it prompted some thoughts. KLAATU'S RPG EPISODES:


Overnight Tech: FCC to vote on easing media ownership rules | Trump lets states expand drone use | Reddit bans Nazi pages | Twitter account helps detect bots "IndyWatch Feed Tech"

FCC TO VOTE ON MEDIA OWNERSHIP RULES: The FCC will be voting to roll back prohibitions against common ownership of a newspaper and broadcast station in the same area, the chairman said Wednesday.FCC Chairman Ajit Pai made the revelation during...


Soylent Meal Replacement Sales Blocked in Canada "IndyWatch Feed Tech"

Submitted via IRC for TheMightyBuzzard

The meal-replacement maker said that the Canadian Food Inspection Agency [CFIA] is blocking sales of Soylent in the country.

"Our products do not meet a select few of the CFIA requirements for a 'meal replacement,'" Rob Rhinehart, Founder and CEO of Soylent-maker Rosa Foods, said in a letter to Canadian customers.

"Although we feel strongly that these requirements do not reflect the current understanding of human nutritional needs, we respect the CFIA's regulations and will fully comply with any regulatory action they deem appropriate," he said.

In a statement, Rosa Foods said it "is working hard to resolve the categorization issue with the CFIA as quickly as possible so we can continue to provide complete, quality nutrition to our community in Canada." Until then, the company cannot ship any product to Canadian warehouses or sell Soylent to Canadian customers.

PSA: SoylentNews is not an important part of your balanced breakfast.


Original Submission

Read more of this story at SoylentNews.


Some notes about the Kaspersky affair "IndyWatch Feed Tech"

I thought I'd write up some notes about Kaspersky, the Russian anti-virus vendor that many believe has ties to Russian intelligence.

There's two angles to this story. One is whether the accusations are true. The second is the poor way the press has handled the story, with mainstream outlets like the New York Times more intent on pushing government propaganda than informing us what's going on.

The press

Before we address Kaspersky, we need to talk about how the press covers this.

The mainstream media's stories have been pure government propaganda, like this one from the New York Times. It garbles the facts of what happened, and relies primarily on anonymous government sources that cannot be held accountable. It's so messed up that we can't easily challenge it because we aren't even sure exactly what it's claiming.

The Society of Professional Journalists have a name for this abuse of anonymous sources, the "Washington Game". Journalists can identify this as bad journalism, but the big newspapers like The New York Times continues to do it anyway, because how dare anybody criticize them?

For all that I hate the anti-American bias of The Intercept, at least they've had stories that de-garble what's going on, that explain things so that we can challenge them.

Our Government

Our government can't tell us everything, of course. But at the same time, they need to tell us something, to at least being clear what their accusations are. These vague insinuations through the media hurt their credibility, not help it. The obvious craptitude is making us in the cybersecurity community come to Kaspersky's defense, which is not the government's aim at all.

There are lots of issues involved here, but let's consider the major one insinuated by the NYTimes story, that Kaspersky was getting "data" files along with copies of suspected malware. This is troublesome if true.

But, as Kaspersky claims today, it's because they had detected malware within a zip file, and uploaded the entire zip -- including the data files within the zip.



Proposal to Restrict Technical Assistance Demands Before Secret Surveillance Court Raises More Questions About Section 702 "IndyWatch Feed Tech"

As we detailed yesterday, a bill introduced this week by Sens. Ron Wyden and Rand Paul would represent the most comprehensive reform so far of Section 702, the law that authorizes the government to engage in mass warrantless surveillance of the Internet. EFF supports the bill, known as the USA Rights Act, because it closes the backdoor search loophole and addresses other glaring problems with Section 702.

But the bill also makes changes to lesser-known provisions of Section 702. One of these amendments raises it own questions about how the government has been enlisting private companies to provide access to our communications, including whether it has required circumvention of encryption as in the recent fight between Apple and the FBI. It may well also call into question the response EFF received from the government in FOIA litigation seeking records to determine whether such a case exists.

Section 14 of the USA Rights Act restricts when the government can demand that a email or other electronic communications service provider render technical assistance to facilitate the governments mass spying. The bill would require the government to show that providing such assistance would not be burdensome and also obtain an order from the Foreign Intelligence Surveillance Court (FISC) first.

In a letter to EFF, the government wrote that it determined that there were no cases brought before the Foreign Intelligence Surveillance Court (FISC) that would have resulted in responsive orders or opinions of the FISC.

Under current law, government officials can require that providers give all information, facilities, or assistance necessary to the acquisition of targeted communications by simply telling them to do so. Under this regime, providers must comply or challenge the request before the FISC if the technical assistance the government wants is unreasonably burdensome or worse. 

EFF is not aware of an instance in which the FISC has compelled a company to provide technical help, such as decrypting communications, to assist the government in its spying efforts under Section 702.

But the FISC operates in almost total secrecy, so those of...


Imperial Rocker For Stopping Tiny Rebel Scum "IndyWatch Feed Tech"

Some of the luckiest kids in the world have to be the ones with hackers and makers as parents. While normal kids are stuck playing with cookie cutter mass produced toys, these kids get one-off gadgets and creations that will be the envy of the playground. Frankly, some of the stuff ends up being so cool that itll get the adults wishing they could go back in time and play with it.

One such parent, and one such project, is the Imperial Rocker by [Matthew Regonini]. Hoping to instill an obsession with a galaxy far, far, away on his offspring, [Matthew] designed this AT-AT rocking horse piece by piece in Illustrator, and then cut it all out of birch using his XCarve CNC router. Each piece was then meticulously glued together to produce a final 3D effect from the individual cutouts.

With a liberal application of spring clamps to hold it all together while it dried, all that was left to do was painstakingly sand all the parts so the edges of the laminated construction would be smooth. Dowels were then added for the handlebars and foot pegs, and a few coats of polyurethane seal up the plywood while bringing out a natural look.

[Matthew] notes some issues here and there, notably quite a bit of blowout in some of the detail cuts and a couple miscalculated dimensions. But he reasons that the rocker is going to live a pretty hard life anyway, so best not to sweat the small stuff.

While the Imperial Rocker has that quaint old-school charm, we wonder how long it will be before [Matthews] littl...


Steam VR Marketshare Already Larger Than Steam Linux Marketshare "IndyWatch Feed Tech"

Valve developer Pierre-Loup Griffais who is heavily involved in their Linux efforts as well as those around virtual reality has commented the VR market-share is already larger than the entire Steam Linux market-share...


WFIRST Space Observatory Could be Scaled Back Due to Costs "IndyWatch Feed Tech"

The Wide Field Infrared Survey Telescope (WFIRST) may have some of its capabilities scaled back due to overspending on the James Webb Space Telescope and the added cost of a coronagraph that was demanded by exoplanet researchers:

NASA will have to scale back its next big orbiting observatory to avoid busting its budget and affecting other missions, an independent panel says. The Wide Field Infrared Survey Telescope (WFIRST) is due for launch in the mid-2020s. But 1 year after NASA gave the greenlight its projected cost is $3.6 billion, roughly 12% overbudget. "I believe reductions in scope and complexity are needed," Thomas Zurbuchen, head of NASA's Science Mission Directorate in Washington, D.C., wrote in a memo that NASA released last Thursday.

Designed to investigate the nature of dark energy and study exoplanets, WFIRST was chosen by the astronomy community as its top space-based mission priority in the 2010 decadal survey entitled New Worlds, New Horizons in Astronomy and Astrophysics. But the start of the project was initially delayed by the huge overspend on its predecessor, the James Webb Space Telescope, which will be launched in 2019. Then last year, a midterm review of the 2010 decadal survey warned that WFIRST could go the same way and advised NASA to form a panel of independent experts to review the project.

[...] Zurbuchen's memo to Scolese directs the lab to retain the basic elements of the missionthe 2.4-meter mirror, widefield camera, and coronagraphbut to seek cost-saving "reductions." Hertz says this will require reducing the capabilities of instruments but ensuring they remain "above the science floor laid down by the decadal survey." The coronagraph will be recategorized as a "technology demonstration instrument," removing the burden of achieving a scientific target. The change will also save money, Hertz explains. Hertz says exoplanet researchers shouldn't worry about the proposed changes. "We know we'll get good science out of the coronagraph. We'll be able to see debris disks, zodiacal dust, and exoplanets in wide orbits," he says. Astronomers wanting to see Earth twins in the habitable zone may be disappointed, however.

Original Submission

Read more of this story at SoylentNews.


A sneak peak at radical future user interfaces for phones, computers, and VR "IndyWatch Feed Tech"


Grabity: a wearable haptic interface for simulating weight and grasping in VR (credit: UIST 2017)

Drawing in air, touchless control of virtual objects, and a modular mobile phone with snap-in sections (for lending to friends, family members, or even strangers) are among the innovative user-interface concepts to be introduced at the 30th ACM User Interface Software and Technology Symposium (UIST 2017) on October 2225 in Quebec City, Canada.

Here are three concepts to be presented, developed by researchers at Dartmouth Colleges human computer interface lab.

Go Back:30 Days | 7 Days | 2 Days | 1 Day

IndyWatch Science and Technology News Feed Today.

Go Forward:1 Day | 2 Days | 7 Days | 30 Days

Wednesday, 25 October


U.S. Navy Plans Test of Hyper Velocity Projectiles Fired From 5-Inch Guns "IndyWatch Feed Tech"

The Navy plans to fire 5-inch diameter non-explosive projectiles from deck-mounted railguns:

The Navy plans to fire a high-speed, long-range rail-gun Hypervelocity Projectile from its deck-mounted 5-inch guns to destroy enemy drones, ships, incoming missiles and even submarines, service officials said.

The effort is led by a special Future Naval Capability program.

Navy officials say the program is leveraging commercial electronics miniaturization and computational performance increases to develop a common guided projectile for use in current 5 inch guns and future high velocity gun systems. The HVP effort will seek to increase range and accuracy of the 5-Inch Gun Weapon System in support of multiple mission areas, service developers told Warrior.

Developed initially for an Electromagnetic Rail Gun next-generation weapon, The Hyper Velocity Projectile, or HVP, can travel at speeds up to 2,000 meters per second when fired from a Rail Gun, a speed which is about three times that of most existing weapons.

BAE Systems Hyper Velocity Projectile. 5-inch gun. Found at NBF.

Related: U.S. Military Increasing Development of Directed Energy Weapons
U.S. Navy's New Mach 6 Electro-Magnetic Railgun Almost Ready for Prime Time

Original Submission

Read more of this story at SoylentNews.


CSE Malware ZLab Preliminary analysis of Bad Rabbit attack "IndyWatch Feed Tech"

We at the CSE Cybsec ZLab have conducted a preliminary analysis of the Bad Rabbit ransomware discovering interesting aspects of the attack.

This is just the beginning of a complete report that we will release in the next days, but we believe our findings can be useful for the security community.

This malware remembers the notorious NotPetya basically for two characteristics:

  • The behavior after the reboot with a particular ransom note (Figure 1)
  • The spreading capability through lateral movements that rely on the SMB protocol.
bad rabbit ransomware

Figure 1 Ransom note after the reboot

Comparing NotPetya with Bad Rabbit we noticed that the latter has more sophisticated behavior. Vxers likely reused some pieces of NotPetya code increasing the complexity of the code itself and fixing coding error that transforms NotPetya from a ransomware to wiper. The Bad Rabbit leverages the open source library DiskCryptor in order to encrypt the user files.

The ransomware propagates through drive-by download attacks, attackers infected many sites in Russia, Bulgaria, and Turkey. Bad Rabbit hackers deployed on the compromised websites a javascript that redirects visitors to 1dnscontrol[.]com. At the time of the analysis, the site which was hosting the malicious file is no longer reachable. The script was used to download the ransomware using a POST request to the static IP address (185.149.120[.]3).

The ransomware appears as an Adobe Flash update, in reality, it is a dropper containing some payloads.

When the dropper executes itself, it first checks the existence of the file C:\Windows\cscc.dat. This is, actually, the library used by the malware to encrypt the user files. The presence of the file is interpreted b...


Right-leaning groups back international data privacy bill "IndyWatch Feed Tech"

A coalition of right-leaning groups is pressing Congress to act on legislation that would create a new legal framework that allows law enforcement to access U.S. electronic communications held on servers abroad.The bipartisan bill, called the...


Reddit bans Nazi pages "IndyWatch Feed Tech"

Reddit on Wednesday started banning pages for neo-Nazis and their sympathizers on the platform.Reddit announced the change on its own r/modnews subreddit.We found that the policy regarding inciting' violence was too vague, and so we have made...


FCC to vote on rolling back media ownership rules "IndyWatch Feed Tech"

The FCC will be voting to roll back prohibitions against common ownership of a newspaper and broadcast station in the same area, the chairman said Wednesday.FCC Chairman Ajit Pai made the revelation during an oversight hearing before a House...


Elena Milova I am the Lifespan "IndyWatch Feed Tech"

Elena Milova shares her #IAmTheLifespan story for Longevity Month. Tell us your story too!

Longevity Month 2017 Tell Us Your Story!


DUHK: Dont Use Hard-Coded Keys "IndyWatch Feed Tech"

The title reads like the name of a lecture in cryptography 101 or the first rule of Crypto Club. DUHK is in fact neither of those but the name of a recently disclosed vulnerability in a pseudorandom number generating algorithm (PNRG) that was until recently part of the federal standard X9.31.

Random numbers are essential to viable cryptography. They are also hard to obtain leading to solutions like using the physical properties of semiconductors or decaying matter, that are governed by quantum effects. The next best solution is to log events that are hard to predict like the timing of strokes on a keyboard. The weakest source of randomness is math, which makes sense, because one of maths most popular features is its predictability. Mathematical solutions have the one redeeming quality of being able to produce a lot of numbers that look random to a human in a short time.

PNRGs require a starting point from which they begin to produce their output. Once this seed is known the produced sequence becomes predictable.

Should I be Worried?

Probably, maybe not. The analysis (PDF) published by the team behind DUHK notes that the vulnerability is limited to legacy implementations and doesnt allow to takeover the device running them, only to eavesdrop on secure connections. The scope of this is much more limited than exploits like remote code execution via bluetooth. It is on the other hand providing a strong case for handling standards and technical certifications with extreme scrutiny. The teams conduct also gives insight into the best practises for white-hat hacking which are frequently discussed around here. And they have a great...


Distribution Release: CAINE 9.0 "IndyWatch Feed Tech"

Nanni Bassetti has announced the release of CAINE (Computer Aided INvestigative Environment) 9.0, an Ubuntu-based Linux distribution offering a forensic environment. The project's news page lists the following tools which have been added or upgraded in the distribution along with a screen shot of the distribution's default desktop....


Twitter account exposes likely political bots "IndyWatch Feed Tech"

Quartz has developed a new Twitter account that crawls the platform for political tweets and rates how likely they were to have been tweeted by bots. The account, @probabot_, uses a tool called botometer which takes advantage of machine...


RadeonSI/RADV Mesa 17.3 + AMDGPU DC vs. NVIDIA 387.12 Linux Gaming Performance "IndyWatch Feed Tech"

With Mesa 17.3 now having been branched for its stable release next month and that bringing much improved RADV Radeon Vulkan performance and more mature RX Vega support along with a ton of other improvements, here is a fresh comparison of the newest open-source Radeon Linux graphics driver code compared to the latest NVIDIA Linux driver on a range of graphics cards.


Honolulu's "Distracted Walking" Law Goes Into Effect "IndyWatch Feed Tech"

Honolulu, Hawaii police will begin to write tickets for people caught using their phones or other electronic devices while crossing at a crosswalk:

Police in Honolulu will begin writing tickets for people who get distracted by their cellphones while walking in a cross walk Wednesday. Honolulu is the first major city in the country to pass such a law, citing a high rate of pedestrians being hit in crosswalks.

"Starting today, texting while walking in a cross walk can get you a ticket," Hawaii Public Radio's Bill Dorman reports for our Newscast unit. "In fact, a downward glance at a screen of any kind will cost youa phone, a tablet, a video game."

Under the new law, the only legal reason for a pedestrian to use a cellphone while crossing a street or highway would be to call 911 to report an emergency.

Minimum fines for breaking the new law start at $15; for repeat offenders, the penalty ranges from $75 to $99. Higher rates up to $100 for a first offense, $200 for a second, and $500 for a third had been considered earlier this year.

Also at the City and County of Honolulu. Bill 6 (2017).

Original Submission

Read more of this story at SoylentNews.


Linux Laptops Get a Boost from Hacker Board Projects "IndyWatch Feed Tech"

Linux Laptops Get a Boost from Hacker Board Projects


India as No. 1 "IndyWatch Feed Tech"

China gets all the attention, but theres another big Asian country thats making gigantic strides Photo-illustration by Stuart Bradford

illustration Photo-illustration: Stuart Bradford

Its in the cards: India will soon supplant China as the worlds most populous country. The question is whether India will also rise to challenge China as an economic powerhouse.

At least since the unraveling of the Roman Empire, successive Chinese dynasties have ruled over more people than any other government. China had about 428 million people in 1912, when imperial rule ended; 542 million in 1949, when the Communists took power; 1.27 billion by the year 2000; and about 1.41 billion by mid-2017. The slowing growth rate is the direct result of the one-child policy, adopted in 1979 and ended in 2015. Meanwhile, Indias population expanded from 356 million in 1950 to 1.05 billion in 2000 and to 1.31 billion in 2016.

Chinas edge comes to just 7 percent, a mere 100 million peopleabout the population of the Philippines. And, given the reliability of short-term demographic forecasts, its clear that India will surpass Chinas total before 2025, perhaps as early as 2023.

Meanwhile, it is fascinating to compare the two giga-states. Both countries selectively abort many girls, creating abnormal sex ratios at birth. The normal ratio is 1.06 males per one female, but India stands at 1.12, China at 1.15.

Both countries are riddled with corruption: The latest Corruption Perceptions Index, from Transparency International, puts them both at 79th place among the 176 included countries (with Denmark at the top and Somalia at the bottom). In both countries the economic inequality, as measured by the Gini index, is over 35 and (given the poor data) it might have moved much higher still. And in both...


Hackaday Prize Entry: CNC Mill Lets Kids Engrave on the Fly "IndyWatch Feed Tech"

The manufacturing revolution has already begun, and there are 3D printers, CNC machines, and laser cutters popping up in garages and workspaces all around the world. The trouble with these machines is that theyre fiddly to use, and you dont want a kid playing around with them.

[moritz.messerschmidt]s Hackaday Prize entry is a desktop Badgemaker that engraves acrylic name badges for kids. Under the hood, an Arduino with a custom-built shield with 3 SilentStepStick stepper drivers on it operates the three NEMA-11 motors. Meanwhile, the kids interact with a 7 touchscreen powered by a Raspberry Pi.

Once the kid selects what to engrave, motors move the piece of acrylic against a rotary tools milling bit, carving the acrylic as instructed. These cards are then equipped with watch batteries and LEDs to light up.

The touch screen is key. Bummed out by basic CNC machines that were difficult to use like hobbyist 3D printers with a newbie-befuddling interface [moritz.messerschmidt] went out of his way to make the interface kid-friendly, with just a simple set of choices necessary for creating ones own name badge.

Is this a feature-packed CNC machine with all the bells and whistles? No, but thats not the point. The purpose of the Badgemaker is to introduce a new generation to personal fabrication technology. Its a toy, but thats the point: a CNC machine thats so easy to use, even a child can do it.

The HackadayPrize2017 is Sponsored by:
Texas Instruments


A Consistently Erroneous Technology "IndyWatch Feed Tech"

Ive often been asked to participate as an advisor in court cases or investigations where I might be useful due to my experience as a conjuror, but I have always refused when required to accept evidence obtained via the polygraph, or lie detector as its commonly known. However, if I were to be called upon to deny that this silly device is effective or dependable, Id have no hesitation in doing so. The evidence is just so much against this technology, its difficult to believe how long it has existed as a supposedly valid notion.

Look at the history of so-called lie detection. The device itself is a nightmare of tubes, wires, electrodes, and moving styluses, something right out of a Bugs Bunny production. By measuring and displaying changes in the subjects respiration, heart rate, blood pressure, skin conductivity, and other variables of the human body, a complex series of graph lines is generated, and a technician istheoreticallyable to decide whether the answers to a set of questions were honestly given or not. We need not get into more involved aspects of the procedure such as who comes up with the questions to be askedthough that is a matter of primary importance, of course. Lets examine opinions of the professionals who should know.

On November 5, 2002, on his Pentagon letterhead as Assistant Secretary of Defense for Command, Control, Communications, and Intelligence, this memorandum was sent by John P. Stenbit to the directors and administrators of all major military offices of the Department of Defense:

SUBJECT: Continued Use of Polygraph Techniques
I have recently reviewed the report of the National Research Council on the existing scientific evidence on the validity of the polygraph technique. While the report contained many findings that may ultimately lead to improved methods for the detection of deception, I think it is important to emphasize that the National Research Council found that none of the potential new technologies for the detection of deception showed any promise of supplanting the polygraph technique for screening purposes in the near term.

I believe this could have included Tarot cards and Ouija boards as well and made just as much sense. Note that it doesnt say that the polygraph works at all! The truth is that its a useless high-tech assemblage that has consistently failed double-blind tests of its efficacy, but the way the above paragraph was composed, there is a strong suggestion that the flummery actually has performed as claimed. This next paragraph is even worse, repeating the same inane claim and further implying that the polygraph really works:

As the Department continues to research alternative technolog...


Android Studio 3.0 Released With Kotlin Support, Java 8 Features "IndyWatch Feed Tech"

Google today has pushed out Android Studio 3.0 as the latest stable release of this integrated development environment for their mobile operating system...


New Algorithm Could Let Us Reprogram Any Cell Into Any Other Cell Type "IndyWatch Feed Tech"

One of the most defining scientific discoveries in recent decades is the development of induced pluripotent stem cells, which lets scientists revert adult cells back into an embryonic-like blank state and then manipulating them to become a particular kind of tissue.

But now a new model could do away with this time-consuming process, taking out the middle step and directly programming cells to become whatever we want them to be.

Cells in our body always self-specialise, explains bioinformatics researcher Indika Rajapakse from the University of Michigan.


New Graphene Sensor is Less Noisy, More Sensitive "IndyWatch Feed Tech"

The team that built it hopes it will lead to portable graphene-based biochemical sensors Illustration: ICS-8/Forschungszentrum Jlich and Leiden Institute of Chemistry/Leiden University

Graphenes ability to detect a variety of chemical and biological molecules would seem to make it a perfect match for sensors. But because graphene is a conductor and lacks an inherent band gap, its hard to fashion the material into a transistor that can be turned on and off.

In order to make a sensor out of graphene, you need to use multiple layers of the material, which leads to high levels of electronic noise and reduces its effectiveness.

Now, an international team of researchers has proposed a graphene-based semiconductor device that reduces electronic noise when its electric charge is neutral (referred to as its neutrality point). The group achieved this neutrality point without the need for bulky magnetic equipment that had previously prevented these approaches from being used in portable sensor applications.

In a proof-of-concept device, the researchers used their new sensing scheme to detect HIV-related DNA hybridization at picomolar concentrations.

In research described in the journalScience Advances , the scientists have fabricated a charge detector out of graphene that can detect very small amounts of charges close to its surface. The sensing principle of the device relies on charge species detection through the field-effect, which brings about a change in electrical conductance of graphene upon adsorption of a charged molecule on the sensor surface.

Graphene is perfect for such application, explained Wangyang Fu, author of the paper and a postdoc at the University of Leiden in the Netherlands, in an e-mail interview with IEEE Spectrum. Graphene is unique among other solid-state materials in that all carbon atoms are located on the surface, making the graphene surface highly sensitive for detection of changes in the environment.

However, Fu notes that our ability to create practical electrochemically gated graphene-based field-effect transistors to detect charged species also requires a small amount of electronic noise, the existence of which fundamentally limits a sensors resolution.

I believe we have discovered an elegant and simple approach to improve the sensitivity of next generation graphene electronic biochemical sensor devices, sa...


Coinhive breached due to old, reused password "IndyWatch Feed Tech"

Coinhive has suffered another setback: their DNS records have been surreptitiously changed by attackers, allowing them to steal cryptocurrency mined via the projects script. What is Coinhive? Coinhive is a project that provides Monero-mining JavaScript code to website owners who want to earn money but not bombard visitors with ads. The script uses the visitors computers CPU power to mine cryptocurrency, ideally with the visitors knowledge and consent. Coinhive keeps around 30% of the value More


EPA Says It Won't Cut Biofuel Quotas After Corn States Push Back "IndyWatch Feed Tech"

Submitted via IRC for SoyGuest31999

In an October 19 letter to corn-belt lawmakers, Environmental Protection Agency (EPA) Administrator Scott Pruitt said that he won't seek any rollback to biofuel blending rules, according to Reuters.

The agency had been considering some changes to rules set by the Obama administration that ratchet up the amount of renewable biofuel that refineries must blend into the gas and diesel they sell. According to Bloomberg, the EPA had specifically been considering "a possible reduction in biodiesel requirements" as well as "a proposal to allow exported renewable fuel to count toward domestic quotas." In early October, the EPA asked for public comment on cutting biodiesel quotas.

The Bloomberg story cited unnamed sources who said President Trump personally directed Pruitt to back off any proposals that would relax biofuel quotas after pressure from lawmakers from corn-producing states like Iowa, Nebraska, and Illinois. Trump, who courted both fossil fuel interests and corn-belt states in his campaign, has had pressure from each side on this debate. Uncertainty surrounding the future of biofuel use during Trump's administration has caused volatility in biofuels markets for months, Reuters notes.

(The Bloomberg story also cites one unnamed "top EPA official" who said that Trump's directive to Pruitt didn't matter because Pruitt wasn't going to alter renewable fuel standards anyway.)


Original Submission

Read more of this story at SoylentNews.


Epson is Using its eBay "Trusted Status" to Make Competing Ink Sellers Vanish "IndyWatch Feed Tech"

It's been just over a year since HP got caught using dirty tricks to force its customers to use its official, high-priced ink, and now it's Epson's turn to get in on the act.

Epson claims that ink-cartridges that are compatible with its printers violate a nonspecific patent or patents in nonspecific ways, and on the strength of those vague assertions, they have convinced eBay to remove many third-party ink sellers' products, without any scrutiny by eBay.

That's because Epson is part of eBay's VeRO program, through which trusted vendors can have listings removed without anyone checking to see whether they have a valid claim, contrary to eBay's normal procedure. As the company has said in another context, "eBay believes that removing listings based on allegations of infringement would be unfair to buyers and the accused sellers."

Because Epson only applies VeRO to patent claims in the EU, Americans are not affected by these claims, but Europeans are.

Our friends at the Open Rights Group have done outstanding work on this, and they make several excellent points in their analysis, showing that Epson is acting to hurt the resale market, not to assert patents against the manufacturers that are their competitors. If that was their goal, they'd target manufacturers, and shut down sales at the source.

Open Rights Group have asked the UK Intellectual Property Office to investigate Epson's business practices. They're also seeking contact with people who have "been affected by takedown claims relating to Epson compatible ink cartridges and patent claims" and welcome your email.


Distribution Release: antiX 17 "IndyWatch Feed Tech"

The antiX distribution is a lightweight operating system based on Debian. The project's latest release, antiX 17, is based on Debian 9.2 and removes the systemd init software in favour of SysV init. "antiX comes in four flavours for both 32- and 64-bit processors. antiX-full: 4 windows managers....


New DOJ Policy on Gag Orders Is Good, But the Courts Could Have Done Better "IndyWatch Feed Tech"

The Department of Justice is making significant changes to its policy for seeking gag orders under Section 2705 of the Stored Communications Act. These orders routinely accompany search warrants, subpoenas, and other requests to service providers and prevent the companies from notifying users that their information has been obtained by the government. Last year Microsoft filed a lawsuit arguing that Section 2705 violates the First Amendment, and it appears that the DOJ made the policy change rather than risking a broad ruling that the law is unconstitutional. (That lawsuit should not be confused with a different case involving DOJ access to Microsoft user data stored in Ireland that will soon be heard by the Supreme Court.)

Under the new policy, federal prosecutors must demonstrate an appropriate factual basis in order to apply for a gag order. Gags must also be limited to a duration of one year or less barring exceptional circumstances. By comparison, Microsofts complaint explained that it received over three thousand 2705 gag orders between 2014 and early 2016, two-thirds of which had no fixed end date.

So the policy is an improvement. Microsoft deserves serious praise for pursuing the lawsuit. The government had little incentive to fix the problem outside of litigation, and Microsofts strong First Amendment arguments forced its hand. But were not ready to declare the policy an unequivocal win, the way Microsoft did.

Above all, the government will still be able to obtain 2705 gag orders without satisfying the extremely high bar the First Amendment places on prior restraints. Under Supreme Court precedent, gag orders like these must be necessary to prevent imminent danger to a core government interest, and the requirement that the prosecutors merely demonstrate an appropriate factual basis doesnt cut it. And while its certainly encouraging that the DOJ promises not to seek indefinite gags, courts should require much narrower tailoring of time limits on these orders....


Hyperspectral Imaging Seeing the Unseeable "IndyWatch Feed Tech"

They say that a picture is worth a thousand words. But what is a picture exactly? One definition would be a perfect reflection of what we see, like one taken with a basic camera. Our view of the natural world is constrained to a bandwidth of 400 to 700 nanometers within the electromagnetic spectrum, so our cameras produce images within this same bandwidth.

Image via Cosmos Magazine.

For example, if I take a picture of a yellow flower with my phone, the image will look just about how I saw it with my own eyes. But what if we could see the flower from a different part of the electromagnetic spectrum? What if we could see less than 400 nm or greater than 700 nm? A bee, like many other insects, can see in the ultraviolet part of the spectrum which occupies the area below 400 nm. This yellow flower looks drastically different to us versus a bee.

In this article, were going to explore how images can be produced to show spectral information outside of our limited visual capacity, and take a look at the multi-spectral cameras used to make them.  Well find that while it may be true that an image is worth a thousand words, it is also true that an image taken with a hyperspectral camera can be...


Stem Cell Clincial Trials Show Remarkable Results Against Age-related Frailty "IndyWatch Feed Tech"

The first results of two human clinical trials using stem cell therapy for age-related frailty have been published, and the results are very impressive indeed. The studies show that the approach used is effective in tackling multiple key age-related factors.

Aging research has made significant progress in the last few years, with senescent cell clearing therapies entering human trials this year, DNA repair in human trials, and a number of other exciting therapies nearing human testing. We are reaching the point where therapies that target aging processes are no longer a matter of speculation; they are now an undeniable matter of fact.


Probing General Relativity with Neutron Stars "IndyWatch Feed Tech"

Another of those new eras I talked about in yesterdays post is involved in the latest news on gravitational waves. Lets not forget that it was 50 years ago on November 28, 1967 that Jocelyn Bell Burnell and Antony Hewish observed the first pulsar, now known to be a neutron star. It made the news at the time because the pulses, separated by 1.33 seconds, raised a SETI possibility, leading to the playful designation LGM-1 (little green men) for the discovery.

Weve learned a lot about pulsars emitting beams at various wavelengths since then and the SETI connection is gone, but before I leave the past, its also worth recognizing that our old friend Fritz Zwicky, working with Walter Baade, first proposed the existence of neutron stars in 1934. The scientists believed that a dense star made of neutrons could result from a supernova explosion, and here we might think of the Crab pulsar at the center of the Crab Nebula, an object whose description fits the pioneering work of Zwicky and Baade, and also tracks the work of Franco Pacini, who posited that a rotating neutron star in a magnetic field would emit radiation. Likewise a pioneer, Pacini suggested this before pulsars had been discovered.

Writing about all this takes me back to reading Larry Nivens story Neutron Star, available in the collection by the same name, when it first ran in a 1966 issue of IF. Those were interesting days for IF, but I better cut that further digression off at the source more about the magazine in a future post. Neutron Star is the story where Beowulf Shaeffer, a familiar character in Larrys Known Space stories, first appears. If you want to see a neutron star up close and learn what its tidal forces can do, you cant beat Nivens tale.

Typically, a neutron star will get up to two solar masses while showing a diameter of a mere 20 kilometers, telling us its made of a kind of dense matter about which we have much to learn. Scientists at the Max Planck Institutes for Gravitational Physics and for Radio Astronomy have been looking at two major tools for studying the intense gravity associated with neutron stars: Pulsar timing and gravitational wave observations like the recent GW170817 event.

Whats interesting here is that neutron stars can help us i...


Apple lowered iPhone's facial recognition accuracy to meet demand: report "IndyWatch Feed Tech"

Apple let its suppliers weaken the accuracy of the iPhone Xs facial recognition system in order to speed up the phones production, according to a Wednesday Bloomberg report.Sources with knowledge of the matter told Bloomberg that Apple...


Prototype Moon Base May Be Built in Hawaii "IndyWatch Feed Tech"

Human settlement of the moon may go through Hawaii.

Earlier this month, an International MoonBase Summit (IMS) brought together representatives from academia, government and the private sector to help lay the groundwork for a base on the lunar surface.

Because of its geography, geology and culture, Hawaii is the perfect place to build a MoonBase prototype, said Henk Rogers, an entrepreneur based in Hawaii and the organizer of the IMS. [Lunar Colony: How to Build a Moonbase in Images].


Google moon shot stands to give industrial 3D printing a boost "IndyWatch Feed Tech"

In what promises to be one small step for space travel, and one giant leap for the next generation of manufacturing, an Israeli startup is planning to land a vehicle on the moon that has crucial parts made using 3D printing technology.

SpaceIL is among five teams vying for Googles $30 million in prize money to get a spacecraft to the moon by the end of March. One of the startups suppliers, Zurich-based RUAG Space, advised turning to 3D printing to manufacture the legs of its unmanned lunar lander. With financial stakes high and a tight deadline, SpaceIL engineers were at first deeply skeptical, according to RUAG executive Franck Mouriaux. They finally acquiesced after a lot of convincing.


IP Kat Admits It Was Its Own Choice to Censor (Delete) Many Comments About the European Patent Office "IndyWatch Feed Tech"

USF to Campinos

Summary: The European Patent Office (EPO) can only be mentioned in a positive way/context in IP Kat, as Battistelli and his cronies may celebrate deletion of comments critical of them

THE subject many people speak of at the EPO this week is censorship. Freedom of expression is a pretty fundamental right.

The censorship was deliberate and not a technical error.SUEPO has just published the above letter from USF, which long ago started observing the abuses at the EPO. The corresponding page is in French and the image was published in PDF form by SUEPO. We are keeping a copy of it just in case.

This latest commentary from IP Kat merely helps show (or reinforce the perception) that EPO controls the media.As a reminder to our readers, the EPO has already threatened publishers, blogs, politicians and much more. Even SUEPOs Web site got censored (using threats). That was 2 years ago; it may have happened again since then. The EPO is a lunatic bully, a perfect embodiment of its king, so insecure with inferiority complex.

This was said in relation to censorship at IP Kat a subject we wrote a number of posts about earlier this week. It turns out that we were right. At around 10AM today Merpel (whoever uses that name right now) admitted that this was not an accident. The censorship was deliberate and not a technical error. Here is how this was justified: On all posts relating to the European Patent Office, however, the right to post pseudonymously has been abused in recent times. On Merpels post welcoming the new president of the EPO, the situation got out of hand. The over...


HiFormance New Exclusive Offer (KVM & OpenVZ) "IndyWatch Feed Tech"

Hello all! Due to the popularity of their last offer, HiFormance is back with some additional offers, and were pleased to be able to pass them along to you guys!

Heres a note from the company

My name is Kyle from and we are fast growing SSD VPS company. We would like to offer the LEB community with exciting deals. We currently offer 4 mainstream locations with both KVM and OpenVZ virtualization (NEW).

Our focus is to offer the highest performance at the most affordable pricing. We have highly experienced and dedicated staff members that will go above and beyond support. We are about customer experience and satisfaction guarantee!
Their WHOIS is public, theyre currently working on registering as an LLC, the accept PayPal, and you can find their legal docs at the following links:
The first 25 orders will receive a FREE 1GB of memory upgrade for the life of the account.

Heres the offers: 

KVM VPS Offer #1:
1 x CPU
1GB Memory
20GB SSD RAID Storage
2TB Premium BW
1Gbps Uplink
1 x IPv4
$60/Year (Free Double Memory, IP, CPU or SSD)
Order link:

KVM VPS Offer #2:

2 x CPU
2GB Memory
40GB SSD RAID Storage
4TB Premium BW
1Gbps Uplink
1 x IPv4
$120/Year (Free Double Memory, IP, CPU or SSD)
Order link: https://my.hifo...


Electrons Controlled in Graphene Using Scanning Tunnelling Microscope "IndyWatch Feed Tech"

Scientists have used the tip of a scanning tunnelling microscope to manipulate electrons in graphene, potentially making the material usable for more applications:

Graphene a one-atom-thick layer of the stuff in pencils is a better conductor than copper and is very promising for electronic devices, but with one catch: Electrons that move through it can't be stopped.

Until now, that is. Scientists at Rutgers University-New Brunswick have learned how to tame the unruly electrons in graphene, paving the way for the ultra-fast transport of electrons with low loss of energy in novel systems. Their study was published online in Nature Nanotechnology [DOI: 10.1038/nnano.2017.181] [DX].

[...] [Eva Y. Andrei's] team managed to tame these wild electrons by sending voltage through a high-tech microscope with an extremely sharp tip, also the size of one atom. They created what resembles an optical system by sending voltage through a scanning tunneling microscope, which offers 3-D views of surfaces at the atomic scale. The microscope's sharp tip creates a force field that traps electrons in graphene or modifies their trajectories, similar to the effect a lens has on light rays. Electrons can easily be trapped and released, providing an efficient on-off switching mechanism, according to Andrei.

Related: Electrons Controlled in Graphene on a Sub-Femtosecond Scale Using Lasers

Original Submission

Read more of this story at SoylentNews.


Toyota Wants Cars to Predict Heart Attacks "IndyWatch Feed Tech"

Toyota envisions smart cars and wearables saving lives in car crashes by working to predict heart attacks or diabetic blackouts among drivers.


The most ingenious gadgets of 2017 "IndyWatch Feed Tech"

Robots, smartphones, computational cameras, and a true pop culture phenomenon round out the list.


Graham urges tech companies to testify before Judiciary panel "IndyWatch Feed Tech"

Sen. Lindsey Graham (R-S.C.) is urging Google, Facebook and Twitter to testify next week before the Senate Judiciary subcommittee he chairs in a hearing on Russian online disinformation campaigns.Graham told Politico that "Google's all good to...


Octopuses Edit Their Genetic Code Like No Other Animal "IndyWatch Feed Tech"

Cephalopods can make sweeping changes to their RNA, favoring individual adaptations over species-level evolution.


Trump to allow states to expand drone use "IndyWatch Feed Tech"

The Trump administration is allowing state and local governments to significantly expand their drone operations, a step that is intended to accelerate the integration of unmanned aircraft into the national airspace.President Trump on...


Friday Hack Chat: DMX512 Gon Give It To Ya "IndyWatch Feed Tech"

DMX512 is the standard for theatrical lighting, and its best described as, MIDI for lights. Its been around since the 80s, and in the decades since its been used, abused, and shoved into just about everything imaginable.

For this weeks Hack Chat, were talking all about DMX512. What is DMX512? How does it work? What can you control with DMX512? What Open Source projects use it? Theres a wealth of information out there, and a lot of very cool tricks you can pull with this ubiquitous lighting protocol.

Our guest for this weeks Hack Chat is [Martin Searancke], owner of Dream Solutions Ltd. [Martin] was contacted early on in the development of Coca-Colas impressive 3D Times Square advertisement to see if Dream Solutions LightFactory software could be used to drive this 3D screen. This software has pixel mapping and media playback capabilities and was used for the prototypes for the project. A subset of this product made it into the final installation, and is now driving a gargantuan display above Times Square in New York City.

This is a community Hack Chat, and of course were taking questio...

SUSE Has Been Working On An In-Kernel Boot Splash Screen For Linux "IndyWatch Feed Tech"

While Plymouth has become widely-used as a bootsplash screen on most Linux systems these days and is much better off than the RHGB days, SUSE has sent out initial patches as part of their proposal for having a new in-kernel bootsplash system...


Google launches Chrome User Experience Report "IndyWatch Feed Tech"

Google announces Chrome User Experience Report to help developers make better websites

In this age of just a click away technology, majority of the companies are ensuring that their websites are more user friendly and interactive. To ensure that their websites stay abreast with their competitors, developers have a lots of tools that allows them to see how real-world users experience their websites.

However, there are no tools that allows developers to see how their website user experience compared to others. To help the developers with this, Google has launched the Chrome User Experience Report, a public dataset of key user experiences for top websites on the Internet. It is intended to give the developers a better insight into how users perceive and use their web pages on a day-to-day basis while using Google Chrome.

By querying the dataset, developers can better understand the browsing experience of Google Chrome users from the different hardware, software, and networks they use. Web analytics will help site developers and the web community understand what they are doing well, identify areas for improvement, and observe the progress of the user experience over time, Google said during the 2017 edition of the Chrome Web Summit conference in San Francisco.

The initial dataset is constructed from 10,000 samples, with emphasis on loading metrics such as First Paint, First Contentful Paint, Connection Type, Device Type, and others. The metrics provided by the Chrome User Experience Report are powered by real user measurement data.

The data reflects how real users experienced the visited origin and, unlike synthetic or local testing where the test is performed under fixed and simulated conditions, captures the full range of external factors that shape and contribute to the final user experience, added Google.

Since the data is not downloadable, one will need to have a Google account and a Google Cloud Project to access and query the dataset. You can proceed to the Chrome User Experience Report website for more details.

Google explains that the Chrome User Data Report provides an overview of comparisons to other sites [and] trends in the web experience of the macro users.In the future, the measures will be extended to other areas, so it will be more useful for developers looking to improve their sites.

Source: Engadget


The post...


Musicians group launches ad campaign against Google, YouTube "IndyWatch Feed Tech"

The Content Creators Coalition (c3), which advocates on behalf of musicians, is launching an ad campaign against YouTube and its parent company Google, accusing them of exploiting artists.The group unveiled a pair of video ads on Wednesday that call...


Pirate-Friendly Coinhives DNS Hacked, User Hashes Stolen "IndyWatch Feed Tech"

Just over a month ago, a Javascript cryptocurrency miner was silently added to The Pirate Bay. Noticed by users who observed their CPU usage going through the roof, it later transpired the site was trialing a miner operated by Coinhive.

Many users were disappointed that The Pirate Bay had added the Javascript-based Monero coin miner without their permission. However, it didnt take long for people to see the potential benefits, with a raft of other sites adding the miner in the hope of generating additional revenue.

Now, however, Coinhive has an unexpected and potentially serious problem to deal with. The company has just revealed that on Monday night its DNS records maintained at Cloudflare were accessed by a third-party, allowing an unnamed attacker to redirect user mining traffic to a server they controlled.

The company hasnt revealed how long the unauthorized redirect stayed in place for, but it appears that all coins mined on sites hosting Coinhives script were stolen during the period, instead of being credited to their accounts.

Coinhive stresses that no user account information was leaked and that its website and database servers were uncompromised. But while thats good news, the method that the hackers used to access the companys DNS provider lay in a basic security error.

Back in 2014, crowdfunding platform Kickstarter which Coinhive used fell victim to a security breach. After being advised of the fact by law enforcement officials, Kickstarter shut down unauthorized access, began strengthening its systems, while advising customers to do the same.

While Coinhive did respond to the warning to ensure that its data was safe, something slipped through the net. One piece of information its Cloudflare account password remained unchanged after the Kickstarter attack. It now seems the most likely culprit for this weeks DNS breach.

The root cause for this incident was an insecure password for our Cloudflare account that was probably leaked with the Kickstarter data breach back in 2014, Coinhive says.

We h...


Why Human-Controlled, Force-Multiplying Robots Are the Future of Work on Earth "IndyWatch Feed Tech"

Sarcos CEO Ben Wolff argues that highly mobile, dexterous robots will transform industry and disaster response Photo: Sarcos Robotics Sarcos CEO Ben Wolff argues that highly mobile, dexterous robotic systems that rely on human intelligence to operate will transform industry and disaster response.

This is a guest post. The views expressed here are solely those of the author and do not represent positions of IEEE Spectrum or the IEEE.

When most people think of robots, they picture an R2-D2-like droid, providing critical information to assist humans and courageously rescuing them from dangerous situations. While we are, in my view, decades away from having robots that can function like a Star Wars character due to the limitations of artificial intelligence, a new class of robots that are mobile, dexterous, and capable across multiple operational regimes will soon be available to augment human performance.

This will happen through a combination of human intelligence with machine strength and precision. In this symbiotic relationship, the multi-tasking robots rely on humans for direction while simultaneously safeguarding them from dangerous environments and tasks. These robotic guardians are the future of work on Earth and, yes, in space, too.  

The Sarcos GT Big-Arm Robot is a human-controlled, force-multiplying system. Image: Sarcos Robotics

The Sarcos GT Big-Arm Robot is a human-controlled, force-multiplying system.

We are at a point in history where decades of research and development coupled with ever-improving technological performance and lower component costs are combining to make yesterdays science fiction a reality. Imagine a machine that is your personal proxy, controlled by you, leveraging your intelligence, knowledge, instincts, intuition, and judgment while able to physically perform in the same manner as your own body, but safely, and with super-human strength, endurance, and precision. This vision is at the core of the Guardian robot systems concept developed at my company, Sarcos Robotics, based in Salt Lake City, Utah.

Sarcos began its quest to produce commercially viable robotic systems more than a decade and a half ago. Following years of experimentation, Sarcos concluded that successful robots required three key elements: 

  1. An intuitive system that allows the operators reflexes and instincts to control the robot.  
  2. Sensory fee...


NotPetya successor Bad Rabbit hits orgs in Russia, Ukraine "IndyWatch Feed Tech"

Bad Rabbit ransomware, apparently modeled on NotPetya, has hit a number of organizations across Russia, Ukraine, and Eastern Europe on Tuesday. Russian security outfit Group-IB was among the first ones who flagged the attack. Amongst victims, this affected computers and servers of the Kiev metro, the Ministry of Infrastructure and Odessa International Airport, as well as a number of state organisations in the Russian Federation. Victims in the Russian Federation included Federal news sites and More


2017 Linux Kernel Report Highlights Developers Roles and Accelerating Pace of Change "IndyWatch Feed Tech"

Roughly 15,600 developers from more than 1,400 companies have contributed to the Linux kernel since 2005, when the adoption of Git made detailed tracking possible, according to the 2017 Linux Kernel Development Report released at the Linux Kernel Summit in Prague.


Michael Greve joins our blog team "IndyWatch Feed Tech"

Michael Greve joins our blog team with the post "Dr. Eric Lagasse to speak at Undoing Aging 2018".


Interference Scanner with Clear Instructions "IndyWatch Feed Tech"

Meticulous. Thorough. Exacting. These are all words wed use to describe this video by [BrendaEM] about her Homemade 3D Optical Interference Scanner which can be seen after the break. The scanner uses 3D-printed parts and repurposed materials you might find lying around in your spare parts bin. An old optical drive tray acts to move the laser-wielding sled while a stripped-out webcam is an optical sensor. Links to relevant files such as 3D models and Arduino sketches will be found in the videos author section.

The principle of operation is demonstrated with a water analog in the video at 2:00 with waves in a plastic container. By creating two small apertures between a light source and a sensor, its possible to measure the light waves which make it through. [BrendaEM] uses some powerful visualization software to convert her samples into 3D models which look really cool and simultaneously demonstrate the wave nature of light.

On the left side of her device are the control electronics which dont need any special coatings since light wont pass over this area. For the right side, where coherent light is measured, to borrow a Rolling Stones lyric: no colors anymore, I want them to turn black. Even the brass strips with apertures are chemically darkened.

Most of the laser hacks here use lasers rather than measure them, like this Laser Clock and a Laser Projector.

Filed under: digital cameras hacks, laser hacks


ASUS PRIME Z370-A Running Great On Linux "IndyWatch Feed Tech"

For those looking at assembling a new system around Intel's 8th Gen Core "Coffee Lake" CPUs, the motherboard I've been conducting most of my Linux tests from has been the ASUS PRIME Z370-A. A few weeks of use with this motherboard, I'm happy with this Intel Z370 motherboard.


Australian-Made 3D-Printed Sternum and Rib Cage Implanted Into NY Patient "IndyWatch Feed Tech"

ZDNet reports:

An Australian-made 3D-printed sternum and rib cage has successfully been implanted into a 20-year-old New York patient who had been diagnosed with a rare bone cancer, the Commonwealth Scientific and Industrial Research Organisation (CSIRO) announced on Thursday.[that's a week ago]

The 3D-printed titanium and polymer sternum and rib cage was produced by the CSIRO in partnership with Melbourne-based medical device company Anatomics.

The patient, Penelope Heller, had to have her sternum removed after being diagnosed with chondrosarcoma in 2014. While the cancer was successfully removed, Heller's replacement sternum and rib cage that was developed using off-the-shelf solutions made post-operation life painful.

[...] The organisation claims it is the first time this technology has been used in the United States.

[...] The CSIRO and Anatomics had previously partnered to produce sternum and rib cage prosthetics for a 54-year-old sarcoma patient in Spain in 2015...Once the prosthetics were made, it was sent to Spain and implanted into the patient. 12 days after the surgery, the patient was discharged and recovered well, the CSIRO then said.

[...] That operation followed on from the production of a 3D-printed titanium heel bone that prevented an Australian cancer patient from having his leg amputated in 2014.

[...] A 61-year-old British man received 3D-printed titanium and polymer sternum in 2016 after his sternum was removed due to a rare infection. The CSIRO said it was the first time a titanium sternum combined with a synthetic polymer has been used to replace bone, cartilage, and tissue in a patient.

Original Submission

Read more of this story at SoylentNews.


Secure remote browsing: A different approach to thwart ever-changing threats "IndyWatch Feed Tech"

A defense-in-depth strategy is essential to modern enterprises, and organizations must deepen their defenses as quickly as possible to fully protect themselves. One promising technology proposes to achieve this by removing web browsing activity from endpoints altogether, while still enabling users to seamlessly and securely interact with the web-based content they need in order to do their jobs. The key to this approach? Secure remote browsing. Secure remote browsing on the rise Secure remote browsing, More


The Linux Foundation's annual kernel development report "IndyWatch Feed Tech"

The Linux Foundation has announced the availability of its roughly annual report on kernel development. "This is the eighth such report that is released on a roughly annual basis to help illustrate the Linux kernel development process and the work that defines the largest collaborative project in the history of computing. This years paper covers work completed through Linux kernel 4.13, with an emphasis on releases 4.8 to 4.13.". This report, written by LWN editor Jonathan Corbet and Greg Kroah-Hartman, will have little that's new to regular LWN readers, but there is a set of nice developer profiles.


A Passive Mixers Adventure Through Product Development "IndyWatch Feed Tech"

The year was 2014, and KORGs volca line of pint-sized synthesizers were the latest craze in the music world. Cheap synths and drum machines were suddenly a reality, all in a backpack-friendly form factor. Now practically anyone could become an electronic music sensation!

I attended a jam with friends from my record label, and as was the style at the time, we all showed up with our latest and greatest gear. There was the microKORG, a MiniNova, and a couple of guitars, but all attention was on the volcas, which were just so much fun to pick up and play with.

There was just one problem. Like any game-changing low-cost hardware, sacrifices had been made. The volcas used 3.5mm jacks for audio and sync pulses, and the initial lineup came with a bassline, lead, and drum synth. Syncing was easy, by daisy chaining cables between the boxes, but if you wanted to record or mix, youd generally need to stack adapters to get your signals in a more typical 6.5mm TS format used by other music hardware.

After mucking around, I did some research on what other people were doing. Most were suffering just like we were, trying to patch these little machines into full-sized mixing desks. It seemed like overkill when you just want to muck around, its a bit much to drag out a 24 channel powered mixer. I wanted a way to hook up 3 of these machines to a single set of headphones and just groove out.

To solve this problem, we needed a mixer to match the philosophy of the volcas; simple, accessible, and compact. It didnt need to be gold-plated or capable of amazing sonic feats, it just had to take a few 3.5mm audio sources, and mix them down for a pair of headphones.

Id heard of people using headphone splitters with mixed results, and it got me thinking about passive mixing. Suddenly it all seemed so clear I could probably get away with a bunch of potentiometers and some passives and call it a day! With a friend desperate to get their hands on a solution, I decided to mock up a prototype and took it round to the studio to try out.

The First gMIX



[$] From lab to libre software: how can academic software research become open source? "IndyWatch Feed Tech"

Academics generate enormous amounts of software, some of which inspires commercial innovations in networking and other areas. But little academic software gets released to the public and even less enters common use. Is some vast "dark matter" being overlooked in the academic community? Would the world benefit from academics turning more of their software into free and open projects?


Bad Rabbit ransomware spreading like wildfire but there is a way out "IndyWatch Feed Tech"

By Waqas

Ransomware attacks are on an all-time rise lately. This particular

This is a post from Read the original post: Bad Rabbit ransomware spreading like wildfire but there is a way out


Linux Mint Will Discontinue Its KDE Edition "IndyWatch Feed Tech"

The Linux Mint crew has confirmed today they will be discontinuing future releases of their KDE spin following next month's Linux Mint 18.3 release...


Elon Musk: If Humans Are to Survive, We Must Merge With Machines "IndyWatch Feed Tech"

I concur.

Elon Musk has gone public with the idea that he think that because of AI and increasing automation, humans will need to merge with technology.


Will This Battle For The Soul Of Bitcoin Destroy It? "IndyWatch Feed Tech"

As someone that follows the developments in Bitcoinland closely, it has been difficult to find an article that does a good job of summarizing the drama surrounding the community. This Forbes article (Google Cache) only scratches the surface, but does a good job doing so:

On or around November 16, Bitcoin, the original cryptocurrency created by a novel technology called blockchain a masterpiece of game theory, cryptography and, of all things, the age-old ledger will split into two chains, each with its own set of coins. Hodlers [Note: 'hodl' - is a meme that started here] should be happy about suddenly owning double the number of Bitcoins except for the fact that the question of which of these will be called the true Bitcoin is, for now, up in the air and that could create turmoil in the market. Anyone willing to bet their money by selling one set of coins for another stands to take a financial hit either because they've picked the wrong side, or, for technical reasons, because selling one set may actually cause a sale on both sides of the chain.

[...] How the first cryptocurrency reached this cliffhanger in its journey is a story that has been many years in the making and finally pits against each other what were strange bedfellows anyway: the cypherpunks who, years before Bitcoin even existed, developed the various technologies that finally resulted in the first true digital asset and the Silicon Valley types who popularized the cryptocurrency that now has at least tens of millions of users and a $100 billion market cap. Whether one side will prevail or their death match will destroy Bitcoin is anyone's guess.

Is this how Bitcoin finally dies? (This bitcoiner thinks bitcoin will be wounded, but will live on.)

Original Submission

Read more of this story at SoylentNews.


Security updates for Wednesday "IndyWatch Feed Tech"

Security updates have been issued by Debian (curl and mupdf), Fedora (glibc, SDL2, and sssd), Mageia (kernel, kernel-linus, and kernel-tmb), and Ubuntu (apache2 and subversion).


Feral Adding AMD_shader_info To RADV Vulkan Driver "IndyWatch Feed Tech"

As further sign of Feral Interactive continuing to pursue Vulkan for their Linux games, a Feral developer today posted a patch for implementing the brand new AMD_shader_info extension for the RADV Mesa driver...


Is the Windows 10 controlled folder access anti-ransomware feature any good? "IndyWatch Feed Tech"

With last weeks release of Windows 10 Fall Creators Update, users get a new feature aimed at stopping ransomware from encrypting their most important files. Its called controlled folder access, and is part of Windows Defender Exploit Guard, a new set of host intrusion prevention defenses that walks in the footsteps of Microsofts Enhanced Mitigation Experience Toolkit (EMET). How does controlled folder access work? Controlled folder access locks down folders, allowing only authorized (whitelisted) apps More


Qt 5.10 Reaches Its Second Beta Milestone "IndyWatch Feed Tech"

Qt 5.10 is up to its second beta milestone ahead of its expected stable debut by the end of November...


Data-driven analysis of vulnerabilities in real-world OT networks "IndyWatch Feed Tech"

Operational Technology (OT) networks are ripe targets for adversaries, whose motives range from criminal intent to operational disruption and even threats to human and environmental safety, according to CyberX. Many are exposed to the public internet and easy to traverse using simple vulnerabilities like plain-text passwords. Lack of even basic protections can enable attackers to quietly perform reconnaissance before sabotaging physical processes. As a result, once attackers get into an OT network either via More


Offshore Legal Firm Appleby Hacked, financial details of rich clients is set to be released "IndyWatch Feed Tech"

The Financial details of some of the worlds richest people are set to be published after the Offshore Legal Firm Appleby suffered a data security incident.

A new financial data leak made the headlines, financial details of clients of an offshore a legal firm is set to be published. The news was reported on Wednesday by a British newspaper, the Bermuda-based offshore firm Appleby was hacked and data could be available online very soon.

The Telegraph reported the news saying some of the worlds richest people were braced for their financial details to be exposed.

It is understood the leak involves some of Britains wealthiest people, who were instructing lawyers and public relations companies in an effort to protect their reputations, added the newspaper.

The Offshore law firm Appleby confirmed it has received inquiries from the International Consortium of Investigative Journalists in relation to the leaked documents.

The Telegraph added that global consortium of left-leaning media organisations is set to release the information in the coming days..

The ICIJ is a global network of investigative journalists that made the headlines in 2015 after the release of the Panama Papers, the huge trove of documents stolen from Panamanian law firm Mossack Fonseca.

The Appleby firm said the inquiries have arisen from documents that journalists claim to have seen and involve allegations made against our business and the business conducted by some of our clients. 

Appleby has thoroughly and vigorously investigated the allegations and we are satisfied that there is no evidence of any wrongdoing, either on the part of ourselves or our clients, said the law firm, which has multiple offices in locations including Bermuda and the Cayman Islands.

We refute any allegations which may suggest otherwise and we would be happy to cooperate fully with any legitimate and authorised investigation of the allegations by the appropriate and relevant authorities.

Appleby hacked

The firm confirmed that the expected publication of sensitive documents is the result of a security incident occurred last year.

We are committed to protecting our clients data and we have reviewed our cy...


Cloud security today: Complexity, compliance, and containerization "IndyWatch Feed Tech"

An new report by Threat Stack and ESG sheds light on the security and business challenges that accompany the growth of public cloud environments and containers. Overall, the findings show a gap in security and compliance readiness across fast-growing cloud and container environments. One in three cannot maintain cloud security 31% of those surveyed said that they are unable to maintain security as their cloud and container environments grow a startling figure in the More


Linux Foundation Creates a Framework for Sharing Open Data "IndyWatch Feed Tech"

The Linux Foundation wants to open up the use of data in much the same way it has helped make open-source software a technology force to be reckoned with.


Smart billboards target individual motorists and spy on license plates and cellphones "IndyWatch Feed Tech"

image credit: Groove Car

Imagine driving down a highway and seeing a personalized billboard ad directed at you. Now imagine advertisers using billboards to send messages to your smartphone.

That's the future of' 'advertised spying' in America. (Yes, I made that term up.)

An article in McClatchy warns, that a new generation of  "smart digital billboards will detect the make, model and year of oncoming vehicles and project ads tailored to the motorist."

The article ominously warns, that smart billboards can guess a motorist's home address, age, race and income level based on the vehicle they are driving. And also claims, advertisers will be able to send messages to a person's smartphone as they pass by a smart billboard.

Companies like SYNAPS want to create a network of spying billboards.

SYNAPS, boasts about 'designing intelligent sensors that recognize car models and help a billboard choose the best message for their drivers'.

SYNAPS, descr...


'Virtual Block Watch' wants every home to have four surveillance cameras to spy on the public "IndyWatch Feed Tech"

If you have never heard of Virtual Block Watch (VBW) don't worry, you soon will.

At first glance, you might think it's like law enforcement's Neighborhood Watch but you'd be wrong.

VBW's are law enforcement's latest national surveillance program that encourages the public to use surveillance cameras spy on one another.

Why do we need another national spying program? Don't we already have DHS's 'See Something Say Something' spying program?

As you will see, one surveillance program is never enough.

Police across the country are encouraging the public to 'voluntarily' let police have access to their CCTV cameras.

Currently only six states have begun adopting VBW's, they are ..


Last year, Linden New Jersey residents were asked to let law enforcement have access to their surveillance cameras.

"This virtual block watch will bring residents and business owners together in an attempt to prevent crime and improve the quality of life in our community. It is what one might call the 21st Century Neighborhood Block Watch," Mayor Derek Armstead said in a statement.



States use stop sign cameras to make millions "IndyWatch Feed Tech"

States across the country are installing Redflex stop sign cameras to increase revenue.

According to a 2012 article in LA Weekly, California's Mountains Recreation and Conservation Authority (MRCA) has installed stop sign cameras in seven of their parks.

States are using stop sign cameras to make make millions of dollars.

A recent NBC Los Angeles article, revealed the MRCA uses seven stop sign cameras to make millions.

"According to data obtained by the NBC4 I-Team, more than 97,000 drivers have received a stop sign ticket from the MRCA since 2013. The program has generated almost $7 million dollars for the agency since 2012. The agency says most of the money goes to maintaining the park system."

According to a 2012 MRCA ordinance, stop sign violators and bicyclists will be ticketed, fined and have a lien put on any property they own.

Bicyclists caught going faster than 15 MPH (Section 3.10) can be fined $100-$1000 dollars and could be jailed for six months.

The ordinance warns, that if a bicyclist or motorist fails to pay their speeding tickets their fines will be doubled and a lien could be placed on their property. (See Section 6.1.8)

A 2010 Road Show article warned, stop sign cameras are the new red light cameras.

From California to Alabama states have begun installing stop sign cameras to generate revenue.

"The cameras generated between $80,000 and $1...


KL-001-2017-020 : Sophos UTM 9 loginuser Privilege Escalation via Insecure Directory Permissions "IndyWatch Feed Tech"

Posted by KoreLogic Disclosures on Oct 25

KL-001-2017-020 : Sophos UTM 9 loginuser Privilege Escalation via Insecure Directory Permissions

Title: Sophos UTM 9 loginuser Privilege Escalation via Insecure Directory Permissions
Advisory ID: KL-001-2017-020
Publication Date: 2017.10.24
Publication URL:

1. Vulnerability Details

Affected Vendor: Sophos
Affected Product: UTM 9
Affected Version: 9.410...


India's Chandrayaan-2 Moon Mission Planned for 2018 "IndyWatch Feed Tech"

India plans to put another orbiter around the Moon and land a rover for just $93 million (including launch costs):

In a large shed near the headquarters of the Indian Space Research Organisation (ISRO) in Bangalore, a six-wheeled rover rumbles over dark grey rubble in a landscape designed to mimic the Moon's rocky surface. This test and others scheduled for the next few weeks are crucial steps in India's quest to launch a second mission to the Moon next March.

The country's much anticipated Chandrayaan-2 comes almost a decade after India began its first journey to the Moon, in 2008. "It is logically an extension of the Chandrayaan-1 mission," says Mylswamy Annadurai, director of the project at ISRO. The spacecraft comprises an orbiter that will travel around the Moon, a lander that will touch down in a as-yet undecided location near the Moon's south pole and a rover.

India's maiden Moon trip was a significant achievement for its space programme, but ended prematurely when ISRO lost contact with the orbiter ten months into the planned two-year mission. However, an instrument on a probe that reached the Moon's surface did gather enough data for scientists to confirm the presence of traces of water.

[...] ISRO plans to execute its mission on shoestring budget of just 6.03 billion rupees (US$93 million), including the cost of the rocket and launch. Chandrayaan-2 will be carried into space on one of the agency's three-stage rockets, a Geosynchronous Satellite Launch Vehicle Mark II, taking off from a spaceport on the island of Sriharikota in the Bay of Bengal. "A nice part of the Indian space programme is that they manage to do things so cheaply," says ANU astrobiologist Charles Lineweaver. "If it succeeds, maybe everyone else will see that their mission didn't really need that extra bell or whistle."

The launch is scheduled for the first quarter of 2018.

Chandrayaan program.

Previously: Moon Wetter Than Previously Thought

Original Submission

Read more of this story at SoylentNews.


Sonys New Autonomous Car Camera Sees Road Signs at 160 Meters "IndyWatch Feed Tech"

Driverless cars need superhuman senses. And for the most part they seem to have them, in the form of lidar, radar, ultrasound, near-infrared, and other sensors. But regular cameras, often forgotten about in favor of more exotic technologies, are incredibly important given theyre used to collect data thats used to, say, read the messages on road signs. So Sonys new image sensor is designed to give regular camera vision a boost, too.

The new $90 IMX324 has an effective resolution of only 7.42 megapixels, which sounds small compared to your smartphone camera. But with about three times the vertical resolution of most car camera sensors, it packs a punch. It can see road signs from 160 meters away, has low-light sensitivity that allows it to see pedestrians in dark situations, and offers a trick that captures dark sections at high sensitivity but bright sections at high resolution in order to max out image recognition. The image above shows how much sharper the new tech than its predecessor from the same distance.

Dont expect a beefed-up camera to eliminate the need for other sensors, though: even with strong low-light performance, cameras dont work well in the dark, and they cant offer the precise ranging abilities of other sensors. That means lidar and radar will remain crucial complements to humble optical cameras, however fancy they get.


4 Steps to Solving Any Software Problem "IndyWatch Feed Tech"

That's why, whenever I'm helping beginners learn to code, I try to walk them through the process of solving problems in the same way I would at my job. I'd like to articulate those steps here, both for software newbies who are overwhelmed by this whole "coding" thing, and to see how it compares to the process other experienced developers use.

In general, I believe the process of solving a software development problem can be divided into four steps:


NFC Enabled Business Card "IndyWatch Feed Tech"

[Sjaak] is back at it again with the cool PCB business cards, this time alleviating the burden to physically type his contact information into your phone. But NFC isnt the only cool thing on this PCB as always, his aesthetics dont disappoint.

When we see [Sjaaks] card, the future seems to be the now not only do we have business cards that can take our pulse, we have business cards that actively help facilitate the exchange of contact information. I know what youre thinking. Business cards made of paper do that already. Thats true if you read them. You have to physically remember you have the card (aka not put it through the wash), and, if youre like most folks, youll ultimately enter the information into your cell phones contact list. Why not skip the whole reading thing? You know, just zap your contact information into the contact list of people automatically?

Maybe this is exactly what [Sjaak] thought when he built his NFC enabled business card. Maybe not. Regardless, [Sjaaks] card is beautiful both in implementation and aesthetics. Powered by a nice little NFC EEPROM from NXP, (the NT3H1101) the business card even has an energy harvesting mode. Moreover, one can interact with the card via four buttons and an LED. The LED informs the user what mode the card is currently in, and the buttons choose which URL is sent to users via NFC. To add icing to the cake, the back of the PCB is decked out via [Sjaaks] custom full-color decal process we covered back in August.

As great as it looks, the card still needs some improvement. I still need to tackle the sharp and protruding components on the front, which will ruin your wallet. But, in our eyes, the card is surely on its way to greatness, and we look forward to seeing its final form. However, if youre anything like us, you might want to see some other rad PCB business cards while you wait. If thats the case, we recommend this logic based finite machine and this card made by a hackaday author.

Filed under: hardware ...


Re: CVE-2017-5123 Linux kernel v4.13 waitid() not calling access_ok() "IndyWatch Feed Tech"

Posted by up201407890 on Oct 25


I've written a quick exploit for that vulnerability.
Instead of using it for malicious purposes, I use it to actually
increase my systems security.

$ id
$ ./a.out
[+] Leak size=144 bytes
[+] Got kernel base: 0xffffffffb5200000
[+] Got selinux_enforcing: 0xffffffffb611cc90
[+] Got selinux_enabled: 0xffffffffb5eb1350
[+] Overwriting selinux_enforcing...
[+] Overwriting selinux_enabled...
[+] SELinux disabled!



Drone Footage of Europes First 3D-Printed House "IndyWatch Feed Tech"

Russia has become the first country in Europe to use a 3D printer to construct a real residential house.


Newly developed ransomware sprouts throughout Europe "IndyWatch Feed Tech"

A new ransomware attack called as the Bad Rabbit has become so viral throughout Europe as it has reportedly affected over 200 major organizations. These organizations include Russian, German, Ukrainian and Turkish based firms. This ransomware has the capability of locking down user systems and then demanding 0.05 worth of bitcoin to unlock the affected

The post Newly developed ransomware sprouts throughout Europe appeared first on Hacker News Bulletin | Find the Latest Hackers News.


Glibc 2.27 Will Premiere With Many Optimizations "IndyWatch Feed Tech"

When glibc 2.26 was released in August it was a noteworthy release with plenty of optimizations and introduced its own per-thread cache. With the next installment of the GNU C Library there will also be many more optimizations...


OPNFV Euphrates Release Addresses Open-Source NFV Testing, Interoperability "IndyWatch Feed Tech"

OPNFV has released OPNFV Euphrates, the projects fifth platform release, focused on enabling service providers to accelerate network functions virtualization (NFV) transformation via open-source NFV. 

A key element of the new release is that OPNFV Euphrates delivers Kubernetes integration as well as enhanced cross-community continuous integration (XCI) and new carrier-grade features such as increased virtualized networks visibility.


Freedreno Works On Context Priority Support, Plumbs Into Gallium3D "IndyWatch Feed Tech"

There's been a theme recently with the open-source graphics drivers of working on priority scheduling support from AMDGPU priority scheduling for VR use-cases and tied into RADV to Intel also allowing context priority support that in turn is exposed through EGL. The Freedreno driver has also been working on a context priority implementation...


Time for a quick nixie tube video "IndyWatch Feed Tech"

Here's a short video featuring two nixie tube based devices I've purchased recently. The first is a new hand built four digit nixie watch and the second is a vintage nixie stop-clock. 
As always I bought these on ebay - so here's a couple of searches that you can try to see if there is anything available. 1) Nixie Watches  2) Pragotron Stop-clock
You'll also find some Nixie devices for sale on Etsy. 
Finally it seems that this chap (Russian Website) is the person who made my watch. 
Oh and a couple of omissions or corrections: The battery life on the watch depends on how often you activate the display - but at the best it's two months between charges.  Also at one point in the video I refer to the earth pin on a plug being 'missing' - I should have worded this better as this is how the plug was designed - however I'll still need to replace it with a UK plug in order to earth it to a UK mains socket. 



Saudi Arabia Planning $500 Billion Megacity and Business Zone "IndyWatch Feed Tech"

Saudi Arabia is planning to build a new $500+ billion city on the coast of the Red Sea. The zone will be connected to Jordan by land and Egypt by a bridge across the Red Sea. SoftBank's Vision Fund will buy a stake in the state-owned Saudi Electricity Co., which will power the city using clean energy. The project is called NEOM:

Saudi Arabia has unveiled plans to build a new city and business zone - a project that will be backed up by more than $500bn (381bn) in investment.

Crown Prince Mohammed bin Salman says the 26,500 sq km (10,232 sq mile) NEOM zone will be developed in the north-west, extending to Egypt and Jordan.

It will focus on nine sectors including food technology and, energy and water.

The crown prince has been leading a drive to move Saudi Arabia away from its dependence on oil revenues.

In August, the Gulf kingdom launched a massive tourism development project to turn 50 islands and other sites on the Red Sea into luxury resorts.

However, the extremely ambitious nature of Mohammed bin Salman's vision is sure to raise questions about how realistic it is, the BBC's economics correspondent Andrew Walker says.

What is "NEOM"? "Neo" (Latin for "new") + "Mostaqbal" (Arabic for "future").

Also at Bloomberg (alternate editorial) and Reuters.

Related: SoftBank's $80-100 Billion "Vision Fund" Takes Shape
SoftBank May Sell 25% of ARM to Vision Fund; Chairman Meets With Saudi King

Original Submission

Read more of this story at Soylen...


[ oss-security ] CVE-2016-10517: CSRF in redis < 3.2.7 "IndyWatch Feed Tech"

Posted by Thomas Calderon on Oct 25

Hi all,

I have requested a CVE from MITRE for an issue that was present in Redis <<br /> 3.2.7.

They have assigned CVE-2016-10517 for the following:

[Suggested description]
Redis before 3.2.7 allows "Cross Protocol Scripting" because it lacks a
check for POST and Host: strings, which are not valid in the Redis protocol
(but commonly occur when an attack triggers an HTTP request to the Redis
TCP port)....


This Companys Robots Are Making Everythingand Reshaping the World "IndyWatch Feed Tech"

Amid the tumult, theres one clear winner: the $50 billion company that controls most of the worlds market for factory automation and industrial robotics. In fact, Fanuc might just be the single most important manufacturing company in the world right now, because everything Fanuc does is designed to make it part of what every other manufacturing company is doing.

Fanuc, a secretive Japanese factory-automation business, might be the planets most important manufacturer.


Lose Yourself: National Party Guilty of Eminem Copyright Infringement "IndyWatch Feed Tech"

In recent years, New Zealand has been the center stage of the largest copyright battle in Internet history; the criminal prosecution of Megaupload and several of its former employees.

In 2012, the countrys law enforcement officials helped to bring down the file-sharing site, including a military-style raid on its founder, Kim Dotcom.

While the Megaupload case is still ongoing, a separate copyright battle in New Zealand came to a conclusion this week. In this case, the countrys leading National Party was the accused.

In 2014 the party of former Prime Minister and Kim Dotcom nemesis John Key was sued for copyright infringement by Eminems publisher Eight Mile Style. In an advertising spot for the General Election campaign, the party used a song heavily inspired by the track Lose Yourself. A blatant copyright infringement, they argued.

This week the High Court agreed with the publisher ruling that the ad indeed infringed on their copyright. The National Party must now pay a total of $600,000 (415,000 USD) including damages and interest, NZ Herald reports.

Recognizing the irony, Kim Dotcom swiftly took the matter to Twitter. He launched a poll asking whos guilty of copyright infringement, him or the National Party? The results are, as expected, in his favor.

Lose Yourself?

Dotcom sees the matter as something the old government is responsible for and he has more faith in the current leadership.

All I can say is that the irony of this is hilarious and that Karma has finally caught up with the corrupt !former! National government. Honest people are now running New Zealand and the courts will be busy dealing with the crimes committed by the last government, Dotcom informs us.

The National Party didnt simply use the song without paying for it. They actually sought professional advice before starting the campaign and licensed a track called Eminem Esque, which is the one they used in the ad.

While the party hoped to avoid more expensive licensing fees by using the knock-off song, the High Court ruled that the similarities between Lose Yourself and Eminem Esque are so significant that it breached copyright.



DUHK Attack allows attackers recover encryption keys used to secure VPN connections and web browsing sessions "IndyWatch Feed Tech"

DUHK is a vulnerability that allows attackers to recover secret encryption keys used to secure VPN connections and web browsing sessions

After the disclosure of the KRACK and ROCA attacks, another attack scenario scares IT community. It is the DUHK vulnerability (Dont Use Hard-coded Keys), it is the last cryptographic implementation vulnerability that could be exploited by attackers to recover encryption keys used to secure VPN connections and web browsing sessions.

The DUHK vulnerability was reported by the cryptography researchers Shaanan Cohney, Nadia Heninger, and Matthew Green.

The group researchers have published technical details about the attack on a dedicated website.

DUHK (Dont Use Hard-coded Keys) is a vulnerability that affects devices using the ANSI X9.31 Random Number Generator (RNG) in conjunction with a hard-coded seed key. wrote the researchers.

The ANSI X9.31 RNG is an algorithm that until recently was commonly used to generate cryptographic keys that secure VPN connections and web browsing sessions, preventing third parties from reading intercepted communications. 

The DUHK vulnerability affects a wide range of products from dozens of vendors, including CISCO, Fortinet, and TechGuard. The vulnerability affects every device the relies on the outdated pseudorandom number generation algorithm ANSI X9.31 RNG in conjunction with a hard-coded seed key.

The bad news is that the ANSI X9.31 RNG was included into several cryptographic standards over the last three decades until January 2016 when it was removed from the list of FIPS-approved pseudorandom number generation algorithms.

The problem is related to the fact that Pseudorandom number generators are not able to generate random numbers and the knowledge of initial secret value (seed) could be used to determine the number generated by the algorithm.

Unfortunately, some vendors store the seed value hard-coded into the source code of their solutions. An attacker can obtain the seed by a reverse-engineering of the source code of the products.

The DUHK is described as state recovery attack, an attacker with the knowledge of the seed value can power a man-in-the-middle attack to recover the current state value after observing some outputs.

Attackers can then use the values to re-calculate the encryption keys and decrypt dat...


How to Manage Casual Contributors to Open Source Projects "IndyWatch Feed Tech"

Increasingly, people want to contribute to projects casuallywhen they want to, rather than adhering to a schedule. This is part of a broader trend of "episodic volunteering" noted by a wide range of volunteer organizations and governments. This has been attributed not only to changes in the workforce, which leave fewer people able to volunteer with less spare time to share, but also to changes in how people perceive the act of volunteering. It is no longer seen as a communal obligation, rather as a conditional activity in which the volunteer also receives benefits.


McDonald's Rolls Out New Dollar Menu from Position of Strength "IndyWatch Feed Tech"

McDonald's is changing up its dollar menus:

The world's largest restaurant chain, facing heavy competition in the U.S., will launch a new value-priced menu nationally next year. The lineup will offer items for $1, $2 and $3, the company said on Tuesday.

[...] But McDonald's is adding the new menu from a position of strength. It has seen U.S. restaurant traffic grow for two consecutive quarters, following years of declines. With the new value lineup, the company is trying to lock in those gains, said Michael Halen, an analyst at Bloomberg Intelligence.

All-day breakfast, "premium" burger options, McCafes, dollar soft drinks, 2-for-$5 deals, and UberEATS delivery seem to have kept McDonald's strong amid changing consumer attitudes about fast food:

Aggressive U.S. promotions included $1 any-size soft drinks, $2 McCafe smoothies and espresso drinks and McPick 2 offers of two items for $5. The changes, part of a turnaround plan under CEO Easterbrook, came as McDonald's catches up with Chipotle, Wendy's Co and other chains that raised the bar for what consumers can expect from quick-serve restaurants.

McDonald's shares have climbed 65 percent since Easterbrook was named CEO in March 2015, well ahead of Wendy's 37 percent gain and nearly triple the S&P 500's rise over the same period.

Also at NYT.

Previously: All-Day Breakfast Boosts McDonald's Profits
America Gets Even Fatter From 2015-2016

Original Submission

Read more of this story at SoylentNews.


Alas, Poor Yorick! He Hath Not Amazon Prime "IndyWatch Feed Tech"

If you are looking around for a Halloween project, you might consider The Yorick Project from [ViennaMike]. As you can see in the video below, it marries a Raspberry Pi acting as an Amazon Alexa with an animatronic skull.

This isnt the most technically demanding project, but it has a lot of potential for further hacking. The project includes a USB microphone, a servo controller, and an audio servo driver board. It looks like the audio servo board is controlling the jaw movement and based on the video, we wondered if you might do better running it completely in software.

It is a bit disconcerting to have to call the skull Alexa and hear the familiar voice coming out. It seems like some analog voice changing hardware might be in order on the output. As for the input, it would be entertaining to feed sound files into the audio input to respond to sensors instead of taking only voice commands. In other words, in addition to voice commands, you could tell it to say something specific or start a skill when someone breaks a light beam or whatever.

If Yorick is too much to bite off in the short time remaining, you could go for something with fewer parts. Or, if a skull is too intense, try a pumpkin or a bass.

Filed under: Raspberry Pi


[$] A block layer introduction part 1: the bio layer "IndyWatch Feed Tech"

One of the key values provided by an operating system like Linux is that it provides abstract interfaces to concrete devices. Though the original "character device" and "block device" abstractions have been supplemented with various others including "network device" and "bitmap display", the original two have not lost their importance. The block device interface, in particular, is still central to managing persistent storage and, even with the growth of persistent memory, this central role is likely to remain for some time. Unpacking and explaining some of that role is the goal of this pair of articles.


Hacker Hijacks CoinHive's DNS to Mine Cryptocurrency Using Thousands of Websites "IndyWatch Feed Tech"

When yesterday I was reporting about the sudden outbreak of another global ransomware attack 'Bad Rabbit,' I thought what could be worse than this? Then late last night I got my answer with a notification that Coinhive has been hacked a popular browser-based service that offers website owners to embed a JavaScript to utilise their site visitors' CPUs power to mine the Monero cryptocurrency


The Pirate Bays infamous .SE domain returns "IndyWatch Feed Tech"

Look whos back The Pirate Bays iconic .SE domain

One of the worlds most notorious domain name, that had expired last week and was deactivated is back in action. According to latest reports by TorrentFreak, the Pirate Bays .SE domain is active and running and is redirecting all its visitors to the original domain

As per the Whois information, the Pirate Bays .SE domain was reactivated on October 23, 2017 and has been updated until October 7, 2018. However, it is still unclear whether The Pirate Bay had listed the deactivation or was it done on behalf of the Swedish Court of Appeals due to pending Supreme Court ruling in the current domain name battle.

For those unaware, back in 2013, local anti-piracy groups in Sweden had filed a motion asking to seize control of Despite the legal issues, the .SE domain turned out to be a safer haven than most alternatives opted by The Pirate Bay that were either seized or closed without prior notice. After a lengthy legal battle, the Swedish Supreme Court ruled that the .SE domain should be confiscated by the state. As the Supreme Court appeal is still pending, the lock down on the .SE domain prohibited the owner from changing or transferring it, which in turn explains why it expired on October 7, 2017.

Also, since the domains forfeiture has yet to take place, it means that the domain would have to be made available to the public. The Pirate Bay has yet to comment on the expiration and re-registration of the Swedish domain. If the admins have not re-registered the site, then it can be picked by anyone else, points out TorrentFreak, which is likely happened this time.

In the meantime, the good news for The Pirate Bay lovers is that the .SE domain is active and running until any other development takes place. Keep watching this space for more updates.

Source: TorrentFreak





The post The Pirate Bays infamous .SE domain returns appeared first on TechWorm.


India's Demonetization Effort Has Demonstrably Failed "IndyWatch Feed Tech"

India's Demonetization Effort Has Demonstrably Failed

When India banned the 500 and 1000 rupie notes, defenders claimed it would have a significant benefit. It didn't. 

 Monday, October 09, 2017


The Greatest Discovery Never Made Ancient Civilizations Thrived With NO Ruling Elite "IndyWatch Feed Tech"

It is my contention that our future will be one of bottom up rule with hierarchical structure reserved for the military in particular and even that proposition is properly suspect. In fact the internet is quietly destroying such antique governance models.

After all, exactly what power does a paramount chief have when his entire audience can communicate through the internet, have a debate, reach a consensus and reject him on the spot.

What is happening is that we are now actively evolving mostly at the corporate level, the art of a communal enterprise.  Even the need for a visionary leader can be often dredged up internally.

Thus it is really no surprise that communal systems were possible before the advent of the horse made command and control at a distance necessary.  Recall Rome was ruled by a collective of first families until the military became permanent. That was likely the more normal course of things.

The Greatest Discovery Never Made Ancient Civilizations Thrived With NO Ruling Elite

11 July, 2017 - 19:07 Greg Sams

There is a remarkable discovery that has not yet emerged from our renewed interest in ancient civilization. Yet few remark upon this glaring omission from the relics and records we dig up and discover. I first recognized its absence at a visit to the British Museum, and made a point of going back a few years later for another check. Their Mesopotamian rooms begin at 6500 BC, and as you wander through the exhibits and look at the artifacts and depictions of their culture there are none depicting warriors or warfare, chariots or combat, clubs or swords for nearly four thousand years. As for kings and rulers, there was a single image thought to be a king because it looks like hes wearing a crown. And what is this king doing? He is feeding flowers to sheep.


It Stalked Me From The Woods "IndyWatch Feed Tech"

This is likely another 'Dogman' or Giant Sloth  interaction.  what is powerfully confirmed is that our so called Dogman is quite prepared to stalk a lone human who is not going to be able to get assistance.  Game on.

As I have already posted, a large number of disappearances of single men in the wilderness or near wilderness is best explained by this creature and its unique  methods which entail caching the victim, a long way away from the actual kill site.

In this case the intended victim sensed the risk and moved to protection.  He did observe the creature and its fearlessness and effective wariness.  These creatures likely understand the risk of rifles but also rely on either pure ambush or a rapid contact leap.

It Stalked Me From The Woods

Monday, October 09, 2017

I had a strange experience with a large canine back in 2008 in southern Missouri. I was hunting deer in a very wild area between the Eleven Point and Little Creek rivers. I was on a large tract of hunting land that is family-owned and is a wide ridge between the two rivers. It was late in the season and everyone had gone home except me and a cousin who was hunting the better part of a mile from me.

At about 3 pm I started to get a feeling that so...


What if I Told You Cannabis Protects Against and Even Reverses Brain Damage "IndyWatch Feed Tech"

And what if i told you that micro doses of THC are good enough to go along with your 80 mg of aspirin.  What all this means is that we have a powerful protocol for dealing with all forms of brain injury that is safe and needs to be the go to for all head injuries in order to speed recovery and actual return to active work.

Concussions are actually unavoidable in sport generally simply because we train to extremes which sets up accidents even when we are not actually pounding the head.  It is also true that a single event is quite survivable with natural healing.  That is not true if you compound on top of a partially healed lesion.

Even back to back whiplash is productive of serious issues.  A friend got unlucky and ended up manic depressive.  



How Absurd Do You Like Your Art? - Facts So Romantic "IndyWatch Feed Tech"

fStop Images - Caspar Benson / Getty Images

Some art makes a lot of sense. If we look at a painting or a photograph of a gorgeous view, its beauty feels natural. The reason for this is that the kinds of landscapes people tend to like correspond to places that would have been a good place for our ancestors to camp1: elevated, with a view of water, wildlife, and diverse flora, especially flowering and fruiting plants.

But there are many popular works of art that people enjoy that are less straightforward. Music, for example, can establish patterns, and then add something unusual, perhaps a blue note in jazz, that only later gets resolved. Much of what makes music satisfying involves building and resolving tension. In mystery stories, the confusion of what happened is finally resolved at the end, where the murderer is discovered, and all of the hanging plot threads are resolved. This is also how scientific papers are written: They start with a mystery, and by the end of the work offer a potential solution.

The kinds of things we like to experience are in a sweet spot between having recognizable patterns and incongruity.

Poetry is often deliberately written to
Read More


After the DoJ Changes its "Gag Order" Policy, Microsoft Drops Lawsuit "IndyWatch Feed Tech"

Microsoft has dropped its lawsuit against the Department of Justice now that the DoJ has ended its policy of sending "gag orders" to companies that receive legal demands for user data:

"This new policy limits the overused practice of requiring providers to stay silent when the government accesses personal data stored in the cloud," explains Brad Smith, Microsoft's chief legal officer. "It helps ensure that secrecy orders are used only when necessary and for defined periods of time. This is an important step for both privacy and free expression. It is an unequivocal win for our customers, and we're pleased the DOJ has taken these steps to protect the constitutional rights of all Americans."

The new policy will limit the use of secrecy orders, and set defined periods for them. Microsoft says the new policy will "make sure that every application for a secrecy order is carefully and specifically tailored to the facts in the case." While Microsoft has convinced the DOJ to change its policy, it's now putting the pressure on Congress to act. "Today's policy doesn't address all of the problems with the Electronic Communications Privacy Act (ECPA)," says Smith. "We renew our call on Congress to amend it."

Also at Ars Technica, Bloomberg, and TechCrunch.

Original Submission

Read more of this story at SoylentNews.


New pneumonia vaccine protects against over 70 strains of the disease "IndyWatch Feed Tech"

A new vaccine targeting dozens of new strains of pneumonia could potentially save hundreds of thousands of lives according to researchers. Early studies show the new vaccine effectively protects against a variety of bacteria that causes pneumococcal disease including pneumonia, meningitis and sepsis.

Since the introduction in the early 2000s of vaccines targeting the most deadly forms of pneumonia, the World Health Organization has estimated global deaths of children from the disease have been cut in half. Alongside better nutrition and access to antibiotics, a vaccine against the 23 most deadly pneumonia-causing bacteria has been held as responsible for the millions of lives saved.

Now a team of scientists from the University at Buffalo and New York Universitys Langone Medical Center has developed a new vaccine that targets another 50 strains of a bacterium called Streptococcus pneumoniae, the primary bacteria responsible for pneumococcal disease.


Portable gadget instantly chills any beverage "IndyWatch Feed Tech"

This thing can chill wine in less than 30 seconds (via In The Know).


Manipulating Maintainers -- How to Ask for Help "IndyWatch Feed Tech"

Snoyberg's The Do's and Don't's of Running an Open Source Project:

Real title should be: how to get members of any open source community to be interested in helping you. But the given title is catchier.

There's an old "ha ha, only serious" joke. If you go to a Linux forum and ask for help fixing your WiFi driver, everyone will ignore you. If, instead, you say "Linux sucks, you can't even get a f*&$ing WiFi driver working!" thousands of people will solve the problem for you.

This story is a great example of manipulating people, but it's obviously a negative take on it. I'd like to share some thoughts on this from a much more positive standpoint, which will help you get people to pay more attention, be more helpful, andperhaps most importantlycreate a healthier open source community over all.

These items will appear in no particular order, and will almost all fall into either the attractor or obstacle category. An attractor is something you can do to make people want to participate with you. An obstacle is something you should not do, which would prevent people from interacting with you.

Read more of this story at SoylentNews.


Mesa's OpenGL KHR_no_error Support Is Now "Done" "IndyWatch Feed Tech"

Mesa's support for the OpenGL KHR_no_error extension is now treated as "done" for all drivers...


LoRa Is the Network "IndyWatch Feed Tech"

Weve become used to seeing LoRa appearing in projects on these pages, doing its job as a low-bandwidth wireless data link with a significant range. Usually these LoRa projects take the form of a client that talks to a central Internet connected node, allowing a remote wireless-connected device to connect through that node to the Internet.

Its interesting then to see a modest application from [Mark C], a chat application designed to use a set of LoRa nodes as a peer-to-peer network. In effect LoRa becomes the network, instead of simply being a tool to access it. He optimistically describes peer-to-peer LoRa networks as the new FidoNet in his tip email to us, which might be a bold statement, but we can certainly see some parallel. Its important to note that the application is merely a demonstrable proof-of-concept as it stands, however wed agree that it has some potential.

The hardware used for the project is the Heltec ESP32-based LoRa board, which comes with a handy OLED screen on which the messages appear. As it stands a PC connection is required to provide text input via serial, however its not impossible to imagine other more stand-alone interfaces. If it interests you the code can be downloaded from the GitHub repository, so maybe this can become the seed for wider peer-to-peer LoRa networks.

There have been no shortage of LoRa projects featured here over the years. Recent ones include a handy local LoRa packet sniffer, and news of an extreme distance record from a LoRa node on a balloon.

Filed under: radio hacks


Amazon, Google Lobbyists Warn Regulators to Keep Their Hands Off AI "IndyWatch Feed Tech"

A lobbying group representing top artificial-intelligence companies including Inc., Facebook Inc. and Google issued a warning to lawmakers on Tuesday: hands off our algorithms.


Archaeologists Uncover Cuneiform Archive in Iraqs Kurdish Region "IndyWatch Feed Tech"

University of Tbingen archaeologists headed by Professor Peter Pflzner have made sensational finds in the Kurdistan region of northern Iraq. The researchers from the Institute for Ancient Near Eastern Studies found a cuneiform archive of 93 clay tablets dating from 1250 BCE -- the period of the Middle Assyrian Empire. What the tablets record remains a mystery for the time being. The researchers will have to decipher them -- a long and difficult task.

The tablets were found at the Bronze Age city site of Bassetki, which was only discovered in 2013 by archaeologists from the Tbingen collaborative research center 1070, ResourceCultures. The Tbingen archaeologists continued their work undisturbed even in September and October of this year -- despite the turbulence caused by the Kurdish independence referendum and the sharp responses of governments in the region. In recent months, the researchers excavated layers of settlement dating from the Early, Middle, and Late Bronze Age, as well as from the subsequent Assyrian period. "Our finds provide evidence that this early urban center in northern Mesopotamia was settled almost continuously from approximately 3000 to 600 BCE. That indicates that Bassetki was of key significance on important trade routes," Pflzner says.

Year 2350, archaeologists have uncovered a trove of information on an ancient format: zip disk. After many arduous months, they have managed to decipher the content...

Original Submission

Read more of this story at SoylentNews.


Dell Lost Control of Key Customer Support Domain for a Month in 2017 "IndyWatch Feed Tech"

A Web site set up by PC maker Dell Inc. to help customers recover from malicious software and other computer maladies may have been hijacked for a few weeks this summer by people who specialize in deploying said malware, KrebsOnSecurity has learned.

There is a program installed on virtually all Dell computers called Dell Backup and Recovery Application. Its designed to help customers restore their data and computers to their pristine, factory default state should a problem occur with the device. That backup and recovery program periodically checks a rather catchy domain name  which until recently was central to PC maker Dells customer data backup, recovery and cloud storage solutions.

Sometime this summer, was suddenly snatched away from a longtime Dell contractor for a month and exposed to some questionable content. More worryingly, there are signs the domain may have been pushing malware before Dells contractor regained control over it.

Image: Wikipedia

The purpose of is inscribed in the hearts of countless PCs that Dell shipped customers over the past few years. The domain periodically gets checked by the Dell Backup and Recovery application, which enables the user to backup and restore their data with just a few clicks.

This program comes in two versions: Basic and Premium, explains Jesse L, a Dell customer liaison and a blogger on the companys site.

Dell customer liaison Jesse L. talks about how the program in question is by default installed on all Dell PCs.

In other words: If DellBackupandRecovery...


GM will test fully autonomous cars in quarters not years, CEO Mary Barra says "IndyWatch Feed Tech"

General Motors says its most recent test vehicle meets some of the requirements for total autonomy.


Dense Rings of Comets are Forming Low-Gas Super-Earths in Other Solar Systems "IndyWatch Feed Tech"

Narrow dense rings of comets are coming together to form planets on the outskirts of at least three distant solar systems, astronomers have found in data from a pair of NASA telescopes.

Estimating the mass of these rings from the amount of light they reflect shows that each of these developing planets is at least the size of a few Earths, according to Carey Lisse, a planetary scientist at the Johns Hopkins University Applied Physics Laboratory (APL) in Laurel, Maryland.

Over the past few decades, using powerful NASA observatories such as the Infrared Telescope Facility in Hawaii and the Spitzer Space Telescope, scientists have found a number of young debris disk systems with thin but bright outer rings composed of comet-like bodies at 75 to 200 astronomical units from their parent stars about two to seven times the distance of Pluto from our own Sun. The composition of the material in these rings varies from ice-rich (seen in the Fomalhaut and HD 32297 systems) to ice-depleted but carbon rich (the HR 4796A system).

[...] In Fomalhaut and HD 32297, researchers expect that millions of comets are contributing to form the cores of ice giant planets like Uranus and Neptune although without the thick atmospheres enveloping the cores of Uranus and Neptune, since the primordial gas disks that would form such atmospheres are gone. In HR 4796A, with its warmer dust ring, even the ices normally found in the rings' comets evaporated over the last million years or so, leaving behind core building blocks that are rich only in leftover carbon and rocky materials. "These systems appear to be building planets we don't see in our solar system large multi-Earth mass ones with variable amounts of ice, rock and refractory organics," Lisse said. "This is very much like the predicted recipe for the super-Earths seen in abundance in the Kepler planet survey."

The supposed exoplanets could also be called "massive solid planets" or "mega-Earths".

Accretion of Uranus and Neptune from inward-migrating planetary embryos blocked by Jupiter and Saturn

Infrared Spectroscopy of HR 4796A's Bright Outer Cometary Ring + Tenuous Inner Hot Dust Cloud



FPGA Design From Top to Bottom "IndyWatch Feed Tech"

[Roland Lutz] gave a talk about FPGA design using the free tools for Lattice devices at the MetaRheinMainChaosDays conference this year. You can see the video below. Its a great introduction to FPGAs that covers both the lowest-level detail and some higher level insight. If youre getting started with these FPGAs, this video is a must-see.

[Roland] starts with the obligatory introductory material. He then jumps into an actual example before zooming back out to look at the internal details of the Lattice FPGA. For instance, this FPGA supports multiple bitstreams, so you can switch between different programs on the fly.

If you ever wondered how tiles and cells relate youll get a lot out of the low-level discussion. Theres also a very concise explanation of how tiles interconnect. If you are hazy on the difference between a span-4 and a span-12 wire, youll want to watch.

Theres plenty of complimentary details on the web and [Roland] includes some references at the end of the talk. We did our own introduction videos when the IceStorm tools first appeared. If you prefer a graphical tool, you might be interested in Icestudio.

Filed under: FPGA


Ubuntu 18.04 LTS Will Likely Ship With Linux 4.15 "IndyWatch Feed Tech"

Ubuntu 18.04 LTS, the recently named "Bionic Beaver", will most likely be shipping with a Linux 4.15-based kernel...


No Warrantless Searching of Our Emails, Chats, and Browser Data "IndyWatch Feed Tech"

Congress is poised to vote on extending or reforming NSA surveillance powers in the coming weeks, and one issue has risen to the forefront of the fight: backdoor searches. These are searches in which FBI, CIA, and NSA agents search through the communications of Americans collected by the NSA without a warrant. This practice violates the Fourth Amendment. But the government argues that since the NSA originally collected the communications under statutory surveillance powers, the government doesnt need a warrant to search through them later. This is a backdoor around the Constitutional rights that protect our digital communications.

But we have a chance to shut and lock that backdoor, so that government agents don't access the communications of Americans without proving probable cause to a judge.

The USA Liberty Act introduced this month is considered the most viable NSA reform package, and privacy champions on the Hill were able to insert some safeguards against warrantless search into the initial draft. FBI agents who know about a crime and are searching someones communications to obtain evidence and build up a case will have to go to a judge and get a warrant before accessing those communications. Thats a good step.

But it isnt the full reform we need. Thats because the USA Liberty Act wont extend the warrant protections to NSA or CIA agents, who we know routinely search this vast database of communications. If the FBI is merely poking around the database trying to look for criminal activity but isnt investigating a specific crime, they wont be required to get a warrant. And foreign intelligence gathering a notoriously broad and vague term in the governments parlance will also be exempt from this warrant requirement.

Accessing American communications should require a warrant from a judge. The reform in the USA Liberty Act is an effort to move in that direction, but it leaves a policy thats open to abuse. Under the current legislative draft, NSA agents can still read emails of Americans and pass tips to domestic law enforcement, all without judicial oversight.

EFF is asking members, friends, and concerned citizens to raise their voices over this issue. Please call your members of Congress and tell them that we wont tolerate exceptions to our Fourth Amendment rights

We have shown many...


The USA Rights Act Protects Us From NSA Spying "IndyWatch Feed Tech"

A new bill introduced today in the Senate provides necessary protections from NSA surveillance programs. The USA Rights Act, introduced by Senators Ron Wyden (D-Ore.), Rand Paul (R-Ky.), and eleven other Senators would provide meaningful reforms to one of the governments most powerful surveillance tools. It fixes the backdoor search loophole, which now allows warrantless searches of the NSA-collected contents of Americans communications. It extends broad oversight powers to an independent agency. It guarantees the end of a controversial type of data search (called about searches) that the NSA suspended earlier this year. It improves judicial oversight of the governments surveillance regime. It provides better transparency and requires stricter reporting.                                                                                                       

Representatives Zoe Lofgren (D-Cal.) and Ted Poe (R-Tex.) also introduced companion legislation today in the House of Representatives.          

EFF supports the USA Rights Act, and we urge Congress to enact it. Plainly, the introduced legislation is a lighthousea beacon that extends new light on the governments opaque surveillance regime, hopefully guiding future legislation on similar issues.

At the heart of the USA Rights Act is the reform of Section 702 of the FISA Amendments Act of 2008, a law set to expire at the end of this year.

Section 702 allows the NSA to collect the communications of foreign individuals not living in the United States. These collections are done ostensibly in the name of foreign intelligence and national security. But Section 702 also sweeps up a vast number of communications of countless Americans. Those communications are then stored in a database that can be searched by the NSA and other intelligence agencies, including the FBI, without obtaining a warrant. Those are called backdoor searches, because they evade ordinary Fourth Amendment protection of the privacy of Americans communications. EFF is fighting in court to prove that this entire system of NSA surveillance is unconstitutional.

The USA Rights Act closes the backdoor search loophole. Government agents searching Section 702-collected data for information on a U.S. person, or a person inside the U.S., would need to acquire a warrant first. The bills warrant exception for emergency situations would require subsequent judicial oversight. EFF welcomes this immediate and plain-language change to how government agents access Americans communications.

The USA Rights Act also...


Singapore Will Stop Increasing Car and Motorcycle Numbers Starting February 2018 "IndyWatch Feed Tech"

Singapore, among the world's most expensive places to own a vehicle, will stop increasing the total number of cars on its roads next year.

The government will cut the annual growth rate for cars and motorcycles to zero from 0.25 percent starting in February, the transport regulator said on Monday.

"In view of land constraints and competing needs, there is limited scope for further expansion of the road network," the Land Transport Authority said in a statement on its website. Roads already account for 12 percent of the city-state's total land area, it said.

Smaller than New York City, land in Singapore is a precious commodity and officials want to ensure the most productive use of the remaining space. Its infrastructure is among the world's most efficient and the government is investing S$28 billion ($21 billion) more on rail and bus transportation over the next five years, the regulator said.

Does Singapore's transportation future lie with Segways?

Original Submission

Read more of this story at SoylentNews.


Development Release: Qubes OS 4.0 RC2 "IndyWatch Feed Tech"

Marek Marczykowski-Grecki has announced the availability of the second release candidate for Qubes OS 4.0, a Fedora-based desktop Linux distribution with a strong focus on system security. This is achieved by isolating different tasks into separate virtual domains: "We're pleased to announce the second release candidate for Qubes....


ICQ:698019125>sell cvv,fullz ,track,dumps,rdp,leads,paypal account,bank login,walmart,shell,smtp,ups "IndyWatch Feed Tech"

Hi all customers!
- I have team group hacked the cvv and many tools,update everyday for sell.
- I do business professional and quality.
- I'm a seller good,honest and always sell cvv good and fresh with high balance.
- My tools has tested before sell.
- I hope to get many good customers and will be long time
- I have sell cvv,fullz ,track,dumps,rdp,leads,paypal account,bank login,walmart,shell,smtp,ups,aliexpress, discover
acct,cpanel,mailler,webmailler,acct dating...

ICQ:698019125>sell cvv,fullz ,track,dumps,rdp,leads,paypal account,bank login,walmart,shell,smtp,ups


NEW 'Off The Wall' ONLINE "IndyWatch Feed Tech"

NEW 'Off The Wall' ONLINE

Posted 25 Oct, 2017 0:03:26 UTC

The new edition of Off The Wall from 24/10/2017 has been archived and is now available online.


HPR2408: My Current Favourite Podcasts "IndyWatch Feed Tech"

3 Guys 3 Questions Humour. Three guys take turns asking a question, which they each answer in turn. A Klingon Word from the Word Christianity, Sci-Fi. A Bible verse is read in Klingon, then in English. Cool Tools Technology. Always a guest from the tech field or the maker community. Futility Closet History. Little-known stories from the past. Ken and Robin Talk about Stuff Gaming. Two RPG designers talk to each other about game design and how to use current events in games. The Goodstuff Morning Show Humour. Not every morning, and sometimes they even record at night! Two brothers having wacky fun.


Overnight Tech: GOP, industry skeptical of new online ad rules | Twitter to label political ads | Microsoft drops lawsuit over gag rule "IndyWatch Feed Tech"

GOP, INDUSTRY SKEPTICAL OF AD DISCLOSURE RULES: Republicans and the advertising industry at a hearing Tuesday criticized proposals to expand disclosure rules on online political ads amid revelations Russian actors used social media platforms to...


Open ZFS File-System Running On Windows "IndyWatch Feed Tech"

At the OpenZFS Developer Summit today besides an Oracle engineer talked of hope for upstreaming ZFS in Linux, another interesting session was showcasing Open ZFS running under Windows...


Possibly the Greatest Underground Comix Ever "IndyWatch Feed Tech"

Ive been somewhat disillusioned by underground comix lately, but when my ebay search alert for mark beyer dinged the other week, I bought this:

Lemme Outa Here! is published by Print Mint, and you dont get more underground than that.

I knew nothing else about this when I bought it (other than it having a Mark Beyer piece), but I finally read it tonight, and Im flabbergasted.

Its from 1978, and its edited by Diane Noomin. And she was able to get a pretty amazing line-up.



Netflix to Raise Another $1.6bn to Finance New Films and Shows "IndyWatch Feed Tech"

Netflix is raising another $1.6bn (1.2bn) from investors to finance new shows and possibly make acquisitions.

The video streaming service plans to spend up to $8bn on content next year to compete with fast-growing rivals.

Netflix will issue bonds to investors, although the interest rate it will pay has yet to be decided, the company said in a statement.

Netflix plans to release 80 films next year, but some analysts are wary about its cash burn and debt interest costs.

The company's latest debt fundraising is its largest so far, and the fourth time in three years it has raised more than $1bn by issuing bonds.

Earlier this month, Netflix said it would raise prices in countries including the UK and US for the first time in two years.

Has Netflix added enough original material to make up for the licensed content they've dropped and the price increase they mean to enact?

Original Submission

Read more of this story at SoylentNews.


Listen to the Netherworld with Artificial Intelligence "IndyWatch Feed Tech"

Its that time of year again, and with Halloween arguably being the hackers perfect holiday, were starting to see a tick up in projects with a spooky theme. Most seem to do with making some otherwise tame Halloween decorations scarily awesome, but this is different using artificial intelligence to search for ghosts.

It seems like [Matt Reed]s DeepWhisper project is meant to be taken as light-hearted fun for the spooky season, but there may be a touch of seriousness to his efforts to listen in on ghostly conversations. The principle behind this is electronic voice phenomena (EVP), whereby the metabolically and/or dimensionally challenged are purported to influence electronic systems, resulting in heavily processed audio clips that seem to have a whispered endearment from the departed or a threat from a malevolent spirit. DeepWhisper takes this a step further by using a Raspberry Pi to feed audio into the Google Cloud Speech API for analysis. If anything is whispered in one of the 110 or so languages Google knows, itll get displayed on a screen. [Matt] plans to set DeepWhisper up in the aptly-named Butchertown section of Nashville and live-stream the results next week.

Itll be interesting to see what Googles neural network makes out of the random noise it will probably only ever hear. And [Matt] is planning on releasing his code for all to see, so there may be some valuable cloud techniques to learn from DeepWhisper. But in the unlikely event that he does discover ghosts, its nice to know you can have the tools and the talent to bust em.

Filed under: Holiday Hacks, misc hacks


What if You Had to Worry About a Lawsuit Every Time You Linked to an Image Online? "IndyWatch Feed Tech"

A photographer and a photo agency are teaming up to restart a legal war against online linking in the United States.

When Internet users browse websites containing images, those images often are retrieved from third-parties, rather than the author of the website. Sometimes, unbeknownst to the website author, the linked image infringes someone elses copyright.

For more than a decade, courts have held that the linker isnt responsible for that infringement unless they do something else to encourage it, beyond linking. Liability rests with the entity that hosts it in the first placenot someone who simply links to it, probably has no idea that its infringing, and isnt ultimately in control of what content the server will provide when a browser contacts it.

Justin Goldman, backed by Getty Images, wants to change that. Theyve accused online publications, including Breitbart, Time, and the Boston Globe, of copyright infringement for publishing articles that link to a photo of NFL star Tom Brady. Goldman took the photo, someone else tweeted it, and the news organizations embedded a link to the tweet in their coverage. Goldman and Getty say those stories infringe Goldmans copyright.

This claim is dangerous to online expression, and we've filed an amicus brief asking a federal district court to grant the defendants request to end the case as a matter of law.

For more than a decade courts have recognized that claims like Goldmans and Gettys are at odds with how the Internet works. When users visit a website, their computers send a request to that websites address for a text file written in Hyper-Text Markup Language (HTML). That HTML text file includes, among other things, words to be displayed and web addresses of additional content such as images. HTML files are text only and dont contain imagesthey refer to images according to their web address via in-line linking. The server at the linked web address may transmit an image in response to such a request, but the original website does not. The leading case is Perfect 10 v. Google, in wh...


Dmitrii Chekh joins our blog team "IndyWatch Feed Tech"

Dmitrii Chekh joins our blog team with the post "Circadian Rhythm".

Tuesday, 24 October


SQLite 3.21 Picks Up F2FS Atomic Write Support "IndyWatch Feed Tech"

SQLite 3.21 is now out as the newest feature release for this widely-used embedded database library...


FIN7 Spear Phishing Attacks Now Aim At Avoiding Detection "IndyWatch Feed Tech"

By Uzair Amir

The FIN7 hacking group has been targeting organizations from the

This is a post from Read the original post: FIN7 Spear Phishing Attacks Now Aim At Avoiding Detection


Bad Rabbit ransomware rapidly spreads, Ukraine and Russia most targeted countries "IndyWatch Feed Tech"

A new strain of malware dubbed Bad Rabbit ransomware has been found rapidly spreading in Russia, Ukraine and elsewhere.

A new massive ransomware campaign is rapidly spreading around Europe, the malware dubbed Bad Rabbit has already affected over 200 major organizations mainly in Russia, Ukraine, Germany, Japan, and Turkey in a few hours.

The Bad Rabbit ransomware has infected several big Russian media outlets, the Interfax news agency and confirmed they were hit by the malware.

According to Kaspersky, the Odessa International Airport has reported on a cyberattack on its information system, but it is still unclear it is the same attack.

In some of the companies, the work has been completely paralysed servers and workstations are encrypted, head of Russian cyber-security firm Group-IB, Ilya Sachkov, told the TASS news agency.

According to the malware experts, Bad Rabbit ransomware is Petya-like malware that is targeting corporate networks.

The malicious code demands 0.05 bitcoin ransom (~ $280) from victims to unlock their systems.
Experts from Kaspersky that analyzed the malware, believe the Dab Rabbit ransomware is spread via drive-by download attacks, attackers are using fake Adobe Flash players installer to trick victims into installing the malware.

On October 24th we observed notifications of mass attacks with ransomware called Bad Rabbit. It has been targeting organizations and consumers, mostly in Russia but there have also been reports of victims in Ukraine. Heres what a ransom message looks like for the unlucky victims: reported Kaspersky Lab.

bad rabbit ransomware

No exploits were used, so the victim would have to manually execute the malware dropper, which pretends to be an Adobe Flash installer. Weve detected a number of compromised websites, all of which were news or media websites. continues the analysis published by Kaspersky Lab.

The experts from security f...


Scientists Create "Low-Fat" Pigs Using CRISPR "IndyWatch Feed Tech"

Scientists at the Chinese Academy of Sciences have used the CRISPR gene editing technique to create pigs with less body fat. The GMO pigs may be better from both a cost and animal welfare standpoint:

Here's something that may sound like a contradiction in terms: low-fat pigs. But that's exactly what Chinese scientists have created using new genetic engineering techniques.

In a paper [DOI: 10.1073/pnas.1707853114] [DX] published Monday in the Proceedings of the National Academy of Sciences, the scientists report that they have created 12 healthy pigs with about 24 percent less body fat than normal pigs.

The scientists created low-fat pigs in the hopes of providing pig farmers with animals that would be less expensive to raise and would suffer less in cold weather. "This is a big issue for the pig industry," says Jianguo Zhao of the Institute of Zoology at the Chinese Academy of Sciences in Beijing, who led the research. "It's pretty exciting."

[...] The animals have less body fat because they have a gene that allows them to regulate their body temperatures better by burning fat. That could save farmers millions of dollars in heating and feeding costs, as well as prevent millions of piglets from suffering and dying in cold weather. "They could maintain their body temperature much better, which means that they could survive better in the cold weather," Zhao said in an interview.

Previously: "Double-Muscled" Pigs Created Using Simple Gene Modification
eGenesis Bio Removes PERV From Pigs Using CRISPR
PETA Claims That Cambodian Farmers Are Breeding "Double-Muscled" Mutant Pigs

Original Submission

Read more of this story at SoylentNews.


PragerU sues Google, YouTube for 'censoring' conservative videos "IndyWatch Feed Tech"

PragerU, a conservative educational site, is suing Google and its subsidiary YouTube, accusing the video site of censoring its online videos because of their political leanings.The company filed the suit on Monday, saying that YouTube had been ...


GOP, industry skeptical of new rules for online political ads "IndyWatch Feed Tech"

Republicans and the advertising industry at a hearing Tuesday criticized proposals to expand disclosure rules on online political ads amid revelations Russian actors used social media platforms to influence the 2016 election.Randall Rothenberg,...


Circadian Rhythm "IndyWatch Feed Tech"

Throw out all your clocks and your body still has a rough idea of the time of day. Thats because it has its own clock the body clock. It tells the cells in your body what time of day it is and so controls a whole bunch of different processes that need to be carefully timed and coordinated in order for your body to work properly.

Keeping your cells in sync creates a certain rhythm to what they do all day and night a circadian rhythm. And it isnt just us that have it but plants and animals too.

Circadian rhythms roughly follow a 24-hour cycle, so we feel sleepy at night and awake in the morning. It also affects our eating habits, digestion, body temperature and alertness. How? By controlling hormone production.


Twitter to begin labeling political ads "IndyWatch Feed Tech"

Twitter announced Tuesday that it would begin labeling political advertisements as part of a new effort to increase transparency on its platform.The company said that in the coming weeks it will move to identify political electioneering ads,...


I Am The Lifespan "IndyWatch Feed Tech"

Over the past few years, there has been a tradition of longevity researchers and activists around the world to organize events on or around October 1 the UN International Day of Older Persons, or Longevity Day. In recent years this has been extended to include the entire month of November as a Longevity Month where activists organize various activities and events to raise awareness for aging research.

This year we have continued this tradition with the Longevity Month I am the Lifespan event, where people tell us their story and how they got interested in aging research and doing something about age-related diseases. and it has been a great success so far. Lots of people have sent in their stories and we have been publishing them on our Facebook page the last few weeks. We wanted to share some of these stories with you and a little about the people behind them.


Credentials (UN)Management in home banking. "IndyWatch Feed Tech"


Out of the five main information security pillars, namely confidentiality, integrity, availability, authenticity and irrefutability, common users give more attention to the first one. But in real life even though in general people agree with the importance of backup, not many actually implement this security mechanism. What one says and what one do is not the same.

Nowadays, the concern with espionage acts grew with Snowdens case, and that fact can be easily checked with media coverage of the case. From the mass coverage media such as The Huffington Post, The Washington Post, through information security expert Bruce Schneier, all bring insight about the impact of the information disclosed by the former NSA employee.

With that in mind, one can ask himself the question how secret is my secret?.

This paper is a brief of the full research The leakage of passwords from home banking sites: A threat to global cyber security? Jounal of Payments Strategy and Systems Vol 11 Number 2 By Rodrigo Ruiz; Rogrio Winter; Kil Jin Brandini Park; Fernando Amatte

We Got Something

Account information of various websites were recovered. AS A CLEAR TEXT!

Figure 1.

banking 1

Figure 1 Citibank USA account information (&username=userciti and &password=citipaswt) recovered from disk.

Web Forms

Web forms defines the way users can interact with a website. The user enters some data, text or numbers in specific fields, clicks the submit button and waits for a response. All forms share this basic behavior and HTML commands are standard. Each development framework have its own way to generate forms, b...


Evolution in the College Classroom: Facilitating Conversations about Science and Religion "IndyWatch Feed Tech"

For most American college students, their first serious encounter with the theory of evolution may come as part of an introductory biology course. As surprising as this might sound, the unfortunate reality is that in many high schools across the country evolution is often avoided or covered superficially as part of a crammed science curriculum, taught by teachers who are underqualified and poorly supported (Friedrichsen et al. 2016).

The lack of prior familiarity with evolution presents a particular challenge to religious students who are likely to have questions about how to reconcile what they are learning in the college classroom with their own faith. Surveys indicate that more than half of all students enrolled in introductory biology courses believe in God and consider themselves religious. If their questions about science and faith go unaddressed as part of their coursework, research suggests that learning is likely to be inhibited. Even though a religious student may successfully complete exams and assignments that test their knowledge of evolutionary science, their scores may not reflect a deeper acceptance of what they learned. These students may leave a course still doubting whether evolution is the best (and only) scientific explanation for the diversity of life on Earth (Barnes and Brownwell 2016).

Because of their experience in introductory biology courses, many religious students may also be turned off from pursuing a career in science. Studies indicate that students are more likely to choose a science career if they feel a sense of belonging as part of their coursework. Yet for many religious students, prevailing cultural cues tell them that science and religion are in conflict and that religious people lack competence or ability in science. Research shows that these false stereotypes, which are sometimes voiced by their instructors and peers, can harm the performance of religious students on science exams, further eroding their interest in science (Rios et al. 2015).

Much of student uncertainty about evolution may be caused by a lack of awareness of church teaching or doctrine on the matter. Most major religious traditions, including the Roman Catholic church, the Mormon church, and mainline Protestant churches, have either a neutral or explicitly affirmative stance on evolution, acknowledging the consistency with church doctrine (National Academy of Sciences 2008). In other religious traditions such as evangelicalism, high-profile scientists such as Francis Collins (2006) have broken ranks with church doctrine to discuss openly how they reconcile science with their evangelical faith. For conservative Christian students, research indicates that having such a role model is a key contributor to their acce...

IndyWatch Science and Technology News Feed Archiver

Go Back:30 Days | 7 Days | 2 Days | 1 Day

IndyWatch Science and Technology News Feed Today.

Go Forward:1 Day | 2 Days | 7 Days | 30 Days

IndyWatch Science and Technology News Feed was generated at World News IndyWatch.

Resource generated at IndyWatch using aliasfeed and rawdog