IndyWatch Science and Technology News Feed Archiver

Go Back:30 Days | 7 Days | 2 Days | 1 Day

IndyWatch Science and Technology News Feed Today.

Go Forward:1 Day | 2 Days | 7 Days | 30 Days

IndyWatch Science and Technology News Feed was generated at World News IndyWatch.

Monday, 11 June


Coverage of Netconf 2018 "IndyWatch Feed Tech"

Netconf, the Linux kernel networking development conference, has provided coverage of this year's event, which was held in Boston, MA, May 31-June 1.

Day 1 looks at the following sessions:

  • DPDK (Stephen Hemminger)
  • BPF, Cilium, and bpfilter (Daniel Borkmann)
  • Netflix and BPF; future work on BPF tracing (Brendan Gregg)
  • BPF offload; NIC switchdev mode; killing tc egdev (Jakub Kicinski)
  • Networking Traffic Control (Cong Wang)
  • TCP work (Eric Dumazet)
  • Layer 1 boring stuff (Florian Fainelli)

Day 2 covers:

  • Being Less Indirect (David S. Miller)
  • TC Flower Tunneling (Simon Horman)
  • Who Fears the Spectres? (Paolo Abeni)
  • TLS, Crypto, and ULP's (Dave Watson)
  • TC changes and "ethlink" (Jiri Pirko)
  • RX Batching, GRO, Megaflow merging, ARFS, BPF Verifier (Edward Cree)
  • SCTP offload and tunnel ICMP handling (Xin Long)
  • BPF and the Future of Kernel Extensibility (Alexei Starovoitov)


Wastewater treatment plants are key route into UK rivers for microplastics "IndyWatch Feed Tech"

Water samples from UK rivers contained significantly higher concentrations of microplastics downstream from wastewater treatment plants, according to one of the first studies to determine potential sources of microplastics pollution.

Scientists from the University of Leeds measured microplastics concentrations up and downstream of six wastewater treatment plants and found that all of the plants were linked to an increase in microplastics in the riverson average up to three times higher but in one instance by a factor of 69.

Lead author Dr. Paul Kay, from the School of Geography at Leeds, said: Microplastics are one of the least studied groups of contaminants in river systems. These tiny plastic fragments and flakes may prove to be one of the biggest challenges in repairing the widespread environmental harm plastics have caused. Finding key entry points of microplastics, such as wastewater treatment plants, can provide focus points to combating their distribution.


Tricking A Vintage Clock Chip Into Working On 50-Hz Power "IndyWatch Feed Tech"

Thanks to microcontrollers, RTC modules, and a plethora of cheap and interesting display options, digital clock projects have become pretty easy. Choose to base a clock build around a chip sporting a date code from the late 70s, though, and your build is bound to be more than run-of-the-mill.

This is the boat that [Fran Blanche] finds herself in with one of her ongoing projects. The chip in question is a Mostek MK50250 digital alarm clock chip, and her first hurdle was find a way to run the clock on 50 Hertz with North American 60-Hertz power. The reason for this is a lesson in the compromises engineers sometimes have to make during the design process, and how that sometimes leads to false assumptions. It seems that the Mostek designers assumed that a 24-hour display would only ever be needed in locales where the line frequency is 50 Hz. [Fran], however, wants military time at 60 Hz, so she came up with a circuit to fool the chip. It uses a 4017 decade counter to divide the 60-Hz signal by 10, and uses the 6-Hz output to turn on a transistor that pulls the 60-Hz output low for one pulse. The result is one dropped pulse out of every six, which gives the Mostek the 50-Hz signal it needs. Sure, the pulse chain is asymmetric, but the chip wont care, and [Fran] gets the clock she wants. Pretty clever.

[Fran] has been teasing this clock build for a while, and were keen to see what it looks like. We hope shell be using these outsized not-quite-a-light-pipe LED displays or something similar.


Buffer Overflow in pppd EAP-TLS implementation "IndyWatch Feed Tech"

Posted by Luciano Bello on Jun 11

- Software: pppd, in particular the EAP-TLS patch[1]

- Summary: Several buffer overflows can be trigger even when pppd is not
configured to take EAP-TLS (but the binary was patched with the

- CVE: CVE-2018-11574

- Credit:
Ivan Gotovchits , from Carnegie Mellon University Binary
Analysis Team

- Background:
We, the Debian security team, received the report and contacted the
package maintainer and upstream....


Ask Soylent: Suggestions for a Minimalist Journaling System? "IndyWatch Feed Tech"

Imagine being isolated off-grid for an unknown number of years. Maybe you're stuck somewhere like Davidge or Mark Watney; or perhaps you've chosen a life of isolation like Yoda or Obi-Wan Kenobi. Maybe you're a survivor of the $Apocalypse. Wouldn't keeping a journal be a great idea? You could pass on your knowledge, keep track of daily activities, maybe even keep yourself from going insane!

Forget all the wastefulness, extravagance, and complexity of most modern devices, you've got survival to think about! Obviously power usage would be a major concern, but ergonomics, searchability, repairability, and data robustness would be important too. Keeping in mind that this is a dedicated device for journaling and barring the old Russian pencil and paper, what would the best solution look like with off-the-shelf modern technology?

Original Submission

Read more of this story at SoylentNews.


Analyst research: ROI of Pen Testing as a Service "IndyWatch Feed Tech"

Dr. Chenxi Wang, industry thought leader and analyst, examined the Return on Investment that organizations may realize by using Cobalts Pen Testing as a Service (PTaaS) platform. This study took a detailed look at the benefits and costs of deploying Cobalts services in comparison with using traditional penetration testing consultancies. For this study, Dr. Wang conducted in-depth interviews with current Cobalt customers. The organizations interviewed represent a wide swath of different industry segments, including SaaS, More

The post Analyst research: ROI of Pen Testing as a Service appeared first on Help Net Security.


Introduction to the NI MIMO Prototyping System Hardware "IndyWatch Feed Tech"

As more devices are connected wirelessly, the need for wireless technologies that can handle increased data and capacity demands has grown exponentially.


As more devices are connected wirelessly, the need for wireless technologies that can handle increased data and capacity demands has grown exponentially. The coming onslaught of Internet of Things (IoT) devices threatens to overwhelm existing wireless networks while the proliferation of video streaming and virtual reality technology requires faster data rates than are currently available. Multiple input, multiple output (MIMO) is one technology that has the potential to solve these problems by enabling the next generation of wireless. By using more than one antenna, multiple data signals can be sent in the same time and frequency domain to offer huge gains in capacity, throughput, reliability, or a combination of the three. As leading researchers and wireless companies rush to explore new communications technologies, MIMO will be a crucial topic. 

Some of the theory behind MU-MIMO and Massive MIMO has been laid out, but researchers need to innovate faster by building real-world prototypes. The NI MIMO Prototyping System is a testbed that enables researchers to prototype these 5G MIMO systems and achieve rapid results.

MIMO Prototyping System Hardware

The MIMO Prototyping System includes USRP RIO radio heads, FlexRIO FPGA co-processors, clock distribution modules, PCIe routing hardware, and a PXIe chassis and controller. The system can be configured in a variety of sizes to meet the requirements of a wide range of MIMO applications including single user MIMO (SU-MIMO), multiple user MIMO (MU-MIMO), and Massive MIMO.  The various system components and configurations will be discussed in detail in this paper. Application software is discussed in MIMO Application Framework white paper.    

USRP Software Defined Radio

The USRP RIO software defined radio (SDR) features an integrated 2x2 MIMO transceiver and a high-performance Xilinx Kintex-...


Automotive Applications of Device-to-Device Communication in 5G Networks "IndyWatch Feed Tech"

Device-to-device (D2D) communication refers to the technology that allows user equipment (UE) devices to communicate with each other with or without the involvement of network infrastructures such as an access point or base stations.


Device-to-device (D2D) communication refers to the technology that allows user equipment (UE) devices to communicate with each other with or without the involvement of network infrastructures such as an access point or base stations. D2D is promising because it makes ultra-low latency communication possible. But who is using D2D and what are the real applications behind this technology? In this white paper, learn about D2D and how it enables fifth generation (5G) wireless network communication from short-range wireless to vehicle-to-vehicle communications

What Is D2D?

D2D enables the communication between devices such as cell phones or vehicles. This technique enables new device-centric communication that doesnt require direct communication with the network infrastructure. Thus, it is expected to solve part of the network capacity issue as 5G promises to connect more devices in faster, more reliable networks.

D2D Applications

Dedicated short-range communications (DSRC) technology is often tied to 802.11p, which is the Wi-Fi standard specific to the automotive industry that leads the next generation of connected cars. In a February 15 news release, Volkswagen announced that it will provide

WLANp as standard equipment on all its cars in Europe starting in 2019. This announcement could create ripple effects in the industry to promote accident-free driving and, ultimately, autonomous driving.

However, the challenge with 802.11p technology is that it works only with cars that can transceive its protocol. Though 802.11p technology communicates safety-related information for driving such as what the weather is like at the end of a tunnel, it works only with cars that can transceive its protocol. To support complete autonomous driving, communication via cellular networks is essential. This new area is called C-V2X, where X is everything such as another car (V2V), pedestrians (V2P), networks (V2N), and so on. In this white paper, C-V2X mainly refers to LTE-V2X.

C-V2X delivers the major benefit of using the existing LTE network infrastructure, according to the initial V2V standard completion announcement by 3GPP in September 2016. It promotes high data rates, high coverage, lower latency with 5G, and more. Based on these great expectations, virtually every automotive company is looking at C-V2X as the next it technology that will pave the path to completely autonomous drivi...


The asteroid trillionaires "IndyWatch Feed Tech"

With private companies turning their attention to the riches of asteroids, the first trillionaire could be made in space. Andrew Glester explores the challenges of mining space rocks.


Verity Studios Raises $18M for Safe Swarming Drone Displays "IndyWatch Feed Tech"

Safe and reliable swarming drone tech could be making its way into consumer drones Photo: Cirque du Soleil/Richard Termine In 2016 Verity Studios worked with Cirque du Soleil to bring flying lampshade drones to its show Paramour.

Verity Studios, which took precision drone swarm technology from ETH Zurich and turned it into a spectacular live event display system, has announced a round of Series A funding totaling US $18 million from Fontinalis Partners, Airbus Ventures, Sony Innovation Fund, and Kitty Hawk. This is a lot of money for a company that most people may not know exists even if they view a Verity-powered  drone show firsthand, but thats part of what makes Verity special: Everything they do is reliable, seamless, and safe, leading to experiences that have a truly mesmerizing effect.

The reason we follow companies like Verity so closely, and the reason why were happy when they get funded, is because theyve managed to transition some fairly amazing robotics research into a successful business, which is a very difficult thing to do.

The kinds of things that make Verity special come from over a decade of work at the Flying Machine Arena at ETH Zurich, led by Professor Raffaello DAndrea, a lot of which weve covered in the past. For example, Veritys drones are fully redundant, able to recover from a failed battery, a failed motor, a failed connector, a failed propeller, a failed sensor, or a failure of any other component ... through the duplication of critical components and the use of proprietary algorithms, which enable safe emergency responses to component failures. Heres what this looks like, based on research that we covered in 2014.

Verity says it has made a significant amount of progress with its drone swarm control and safety systems, although much of that will probably be wrapped up in custom and proprietary technologiesthe kind of stuff that makes Verity worth that $18M Series A.



PCBs As Linear Motors "IndyWatch Feed Tech"

PCBs are exceptionally cheap now, and that means everyone gets to experiment with the careful application of copper traces on a fiberglass substrate. For his Hackaday Prize entry, [Carl] is putting coils on a PCB. What can you do with that? Build a motor, obviously. This isnt any motor, though: its a linear motor. If youve ever wanted a maglev train on a PCB, this is the project for you.

This project is a slight extension of [Carl]s other PCB motor project, the aptly named PCB Motor. For this project, [Carl] whipped up a small, circular PCB with a few very small coils embedded inside. With the addition of a bearing, a few 3D printed parts, and a few magnets, [Carl] was able to create a brushless motor thats also a PCB. Is it powerful enough to use in a quadcopter? Probably not quite yet.

Like [Carl]s earlier PCB motor, this linear PCB motor follows the same basic idea. The track, if you will, is simply a rectangular PCB loaded up with twelve coils, each of them using 5 mil space and trace, adding up to 140 turns. This is bigger than the coils used for the (circular) PCB motor, but that only means it can handle a bit more power.

As for the moving part of this motor, [Carl] is using a 3D printed slider with an N52 neodymium magnet embedded inside. All in all, its a simple device, but thats not getting to the complexity of the drive circuit. Were looking forward to the updates that will make this motor move, turning this into a great entry for The Hackaday Prize.

The HackadayPrize2018 is Sponsored by:


Core i7 8700K vs. Ryzen 7 2700X For Vulkan Gaming With Thrones of Britannia "IndyWatch Feed Tech"

Published this weekend was a 25-way Linux graphics card comparison for the newest major Linux game release, A Total War Saga: Thrones of Britannia, that was released natively for Linux days ago by Feral Interactive and ported from Direct3D to Vulkan in the process. As a result of premium requests, here are some additional tests for this Linux game when comparing the performance on Intel Core i7 8700K and Ryzen 7 2700X processors.


Bees Understand the Concept of Zero "IndyWatch Feed Tech"

By demonstrating that even tiny brains can comprehend complex, abstract concepts, the surprise finding opens possibilities for new, simpler approaches to developing Artificial Intelligence. In research published in the journal Science, Australian and French researchers tested whether honey bees can rank numerical quantities and understand that zero belongs at the lower end of a sequence of numbers.

Associate Professor Adrian Dyer, from RMIT University in Melbourne, Australia, said the number zero was the backbone of modern maths and technological advancements.

"Zero is a difficult concept to understand and a mathematical skill that doesn't come easily -- it takes children a few years to learn," Dyer said. "We've long believed only humans had the intelligence to get the concept, but recent research has shown monkeys and birds have the brains for it as well. What we haven't known -- until now -- is whether insects can also understand zero."

As well as being a critical pollinator, the honeybee is an exceptional model species for investigating insect cognition, with previous research showing they can learn intricate skills from other bees and even understand abstract concepts like sameness and difference. But bee brains have fewer than 1 million neurons -- compared with the 86,000 million neurons of a human brain -- and little was known about how insect brains would cope with being tested on such an important numeric skill.

RMIT PhD researcher Scarlett Howard set out to test the honeybee on its understanding, marking individual honeybees for easy identification and luring them to a specially-designed testing apparatus. The bees were trained to choose an image with the lowest number of elements in order to receive a reward of sugar solution. For example, the bees learned to choose three elements when presented with three vs. four; or two elements when presented with two vs. three.

When Howard periodically tested the bees with an image that contained no elements versus an image that had one or more, the bees understood that the set of zero was the lower number -- despite never having been exposed to an "empty set."

Read more of this story at SoylentNews.


Wine 3.10 Features Updated Vulkan, D3D12 Swapchain Support "IndyWatch Feed Tech"

Wine's bi-weekly release cycle for new development releases is slightly off target with it surfacing today rather than last Friday, but the changes are worthwhile...


Technical Analysis: Can it predict future asset value? "IndyWatch Feed Tech"

I love clearing the air with a single dismissive answer to a seemingly complex question. Short, dismissive retorts are definitive, but arrogant. It reminds readers that I am sometimes a smart a*ss.

Is technical analysis a reasoned approach for
investors to predict future value of an asset?

In a word, the answer is Hell No!. (Actually, thats two words. Feel free to drop the adjective). Although many technical analysts earnestly believe their craft, the approach has no value and does not hold up to a fundamental approach.

One word arrogance comes with an obligation to substantiateand, so, lets begin with examples of each approach.

Investment advisors often classify their approach to studying an equity, instrument or market as either a fundamental or technical analysis. For example

  • Fundamental research of a corporate stock entails the analysis of the founders backgrounds, competitors, market analysis, regulatory environment, product potential and risks, patents (age and legal challenges), track record, and long term trends affecting supply and demand.A fundamental analysis may study the current share price, but only to ascertain the price-to-earnings ratio compared to long term prospects. That is, has the market bid the stock up to a price that lacks a basis for long term returns?
  • On the other hand, a technical approach tries to divine trends from recent performancetypically charting statistics and pointing to various graph traits such as resistance, double shoulders, and number of reversals. The approach is more concerned with assumptions and expectations of investor behavioror hypotheses and superstition related to numerologythan it is with customers, products, facts and market demand.

Do you see the difference? Fundamental analysis is rooted in SWOT: Study strengths, weaknesses, opportunities, and threats. Technical analysis dismisses all of that. If technical jargon and approach sound a bit like a Gypsy fortune teller, thats because it is exactly that! It is not rooted in revenue and market realities. Even if an analyst or advisor is earnest, the approach is complete hokum.

I have researched, invested, consulted and been an economic columnist for years. I have also ...


I was going blind "IndyWatch Feed Tech"

Blind Man

I was going blind which is not a good thing when you need to see to run a growing nonprofit. Luckily, it is 2018 and technology is advancing at an exponential rate so I had some options. Following is my story which is relevant for many reasons including that we virtually all develop eye problems over time and the state of the art available is constantly changing.


I finally couldnt read text at normal resolution on my 60 monitor which is about 4 feet from my face (and normally at 1600x900 resolution to make the text bigger) so it was time to go to the optician again. The optician considerably upgraded my prescription to 17.25 diopters on my left eye and 12.25 diopters on my right eye but warned me that this might not improve my vision much due to the beginning of cataracts in my eyes. So unlike in the past where I bought my glasses from outside the country due to restrictions on being able to purchase thin lenses in the U.S. that were implemented during the Nixon administration, I ordered glasses locally so I could speed up the process.

I was unable to see well with the new glasses so it was time to visit an ophthalmologist that my optician recommended. The ophthalmologist had the following assessment:

Dry Eye Syndrome of Bilateral Lacrimal Glands
Combined Forms of Age-related Cataract, Bilateral
Lattice Degeneration of Retina, Bilateral
Other Vitreous Opacities, Right Eye
Hemorrhage in Optic Nerve Sheath, Right Eye
Myopia, Bilateral

There were parts of both eyes that should have retina but didnt because the eyes were so stretched. (This isnt affecting my vision.)

The lattice degeneration of the retina concerned my ophthalmologist so he then sent me to a retinologist where he expected the retinologist to operate on me before the ophthalmologist could operate. Luckily, the retinologist said he didnt need to operate on me so I went from needing 4 surgeries to needing 2 surgeries.

For those who dont know, cataract surgery replaces the broken biological lens of your eye with an artificial lens called an intraocular lens (IOL). This surgery usually uses a femtosecond laser.

Before my first surgery, the ophthalmologists assistants ran multiple tests on my eyes so they could determine what size lens would fit in them. This was tricky because my eyes are extra long (31 mm left and 30 mm right) and machines have a problem with eyes that long. A few days after my tests were done, the ophthalmologists office called me to say the doctor was unsatisfied...


ASUS wanted to integrate 10 GB RAM on its gaming smartphone "IndyWatch Feed Tech"

ASUS apparently was looking to include 10GB of RAM on its flagship smartphone

Earlier this week, the Taiwanese manufacturer ASUS unveiled its first dedicated high-end gaming smartphone, the ROG (Republic of Gamers) smartphone, designed for gamers at the Computex 2018 in Taipei. With this smartphone, the company is looking to follow companies such as Razer and Xiaomi, both of whom have launched smartphones like Razer Phone and Black Shark respectively, especially for gamers.

Designed for mobile gaming, the ROG features a 6-inch full HD+ (1080 x 2160 pixels) and comes with an 18:9 aspect ratio. Its AMOLED display blends a 90Hz refresh rate and 1ms response time. The display on the ROG Phone is also certified for HDR and has the DCI-P3 color gamut. ASUS has added the worlds fastest 2.96GHz octa-core Qualcomm Snapdragon 845 SoC coupled with a Qualcomm Adreno 630 GPU to the device. Besides this, the ROG Phone comes with 8GB of RAM, and 512GB of onboard storage (with two other options of 128GB and 256GB of storage).

While the specifications do sound crazy, it has come to light that ASUS was apparently experimenting with a 10GB of RAM in an unnamed flagship smartphone about 10 months ago.

According to Twitter tipster Roland Quandt, ASUS had planned to include 10GB of RAM in an upcoming flagship, but it seems that the idea was dropped by the company due to size constraints in the phones body. RAM is usually placed on top of the processor but there was insufficient space to fit the necessary chips.

With ASUS already experimenting with the possibility of including 10GB of RAM in a smartphone, there are chances that the company may come up with such a device in the near future by finding a way through the obstacle.

We have already heard about smartphones having RAMs that are between 4GB 6GB, with one or two exceptions consisting 8GB of RAM. Do you think that we need smartphones with 1...


Neovim 0.3 Text Editor Released With Various Improvements "IndyWatch Feed Tech"

Neovim, the fork of Vim focused on offering better extensibility and usability, has issued their v0.3 release...


Bill Joy, Silicon Valley Visionary, on the Future of Batteries, Electric Airplanes, and the "Internet of Energy" "IndyWatch Feed Tech"

He says solid-state batteries will be cheaper than today's lithium-ion batteries and help move the grid to 100 percent renewables Photo: Ionic Materials

According to Silicon Valley visionary and Sun Microsystems co-founder Bill Joy, much about the future of energy and climate change hinges on a simple question: How soon can the worlds electric grid get its battery pack?

As a partner in the Menlo Park, Calif. venture capital company Kleiner Perkins Caufield and Byers from 2005 to 2014, Joy says he focused on what they called the big hard aggressive goals or BHAGs. And from climate to water desalination to electric grid stability, the real challenges of BHAGs often circled back to cheap, safe, scalable, and reliable grid-scale energy storage.

Last month, Joy was in Woburn, Mass. for the ribbon cutting of new facilities for a solid state battery company hes an advisor to and investor in, Ionic Materials. Ionic Materials has developed a plastic electrolytethe medium in a battery through which energy-storing ions flow between cathode and anode and back again. This specially designed plastic conducts ions like a metal conducts electrons. And switching from todays flammable liquid electrolytes to flame-retardant solid electrolytes, the company says, could bring about a new generation of lighter, more powerful, non-flammable rechargeable devices.

Joy sat down with IEEE Spectrum for a conversation about the promise of solid-state lithium (and rechargeable alkaline) batteries, the Internet of energy, and the coming electrification of airplanes.

IEEE Spectrum: As you have said, the English language doesnt have a single word for the kind of battery breakthrough thats neededa solid conductor of ions, a solid electrolyte.

Joy: Theres this evolution of language. Like we had telephone, and then we had the touch-tone phone. And then the phones that werent touch-tone suddenly were rotary phones. And then you called on cellphones. But now when you say phone you mean a mobile phone, and if you want to talk about the other phone you need to say landline.



Distribution Release: NethServer 7.5 "IndyWatch Feed Tech"

Alessio Fattorini has announced the release of NethServer 7.5. The NethServer distribution is based on CentOS and provides a friendly, web-based administration panel. The project's latest release includes the Fail2Ban security software, the ability to set up wi-fi hotspots and more flexible control over software updates. "We have....


F2FS File-System Gets Discard Improvements, Nobarrier Fsync Mode For Linux 4.18 "IndyWatch Feed Tech"

Flash-Friendly File-System (F2FS) maintainer Jaegeuk Kim has submitted the file-system updates intended for the Linux 4.18 kernel...


Ask Hackaday: What Color Are Your PCBs? "IndyWatch Feed Tech"

A decade ago, buying a custom-printed circuit board meant paying a fortune and possibly even using a board houses proprietary software to design the PCB. Now, we all have powerful, independent tools to design circuit boards, and there are a hundred factories in China that will take your Gerbers and send you ten copies of your board for pennies per square inch. We are living in a golden age of printed circuit boards, and they come in a rainbow of colors. This raises the question: which color soldermask is most popular, which is most desirable, and why? Seeed Studio, a Chinese PCB house, recently ran a poll on the most popular colors of soldermask. This was compared to their actual sales data. Which PCB color is the most popular? It depends on who you ask, and how you ask it.

But first, lets examine the rainbow of PCB options. Seeeds Fusion PCB service offers six different colors of soldermask for every PCB order: white, black, red, blue, green, or yellow. These are the colors youll find at most board houses, and remain constant with few exceptions; OSH Park only offers purple, but you can get purple from a few other manufacturers. There are rumors of orange soldermask. Matte black and matte green are generally the seventh and eighth colors available from any PCB manufacturer. Weve seen pink PCBs in the wild, as well.



Even Though Net Neutrality Protections Are Ending, Congress Can Still Bring Them Back "IndyWatch Feed Tech"

June 11, 2018 is the day that the FCCs so-called Restoring Internet Freedom Order goes into effect. This represents the FCCs abdication of authority in upholding the hard-won net neutrality protections of the 2015 Open Internet Order. But this does not mean the fight is over.

While the FCC ignored the will of the vast majority of Americans and voted not to enforce bans on blocking, throttling, and paid prioritization, it doesnt get the final say. Congress, states, and the courts can all work to restore these protections. As we have seen, net neutrality needs and deserves as many strong protections as possible, be they state or federal. ISPs who control your access to the Internet shouldnt get to decide how you use it once you get online.

Three states (Oregon, Washington, and Vermont) have passed state net neutrality laws. Six more (Hawaii, Montana, New Jersey, New York, Rhode Island, and Vermont) have executive orders doing the same. Overall, 35 states have some form of net neutrality protections in the works.

Congress can overturn the FCCs decision and reinstate the 2015 Open Internet Order with a simple majority vote under the Congressional Review Act (CRA). It passed the Senate on May 16 by a vote of 52-47. So now we have to ask the House of Representatives to follow suit. Even though House leadership has said they will not schedule a vote, one can still be called if a majority of representatives sign a discharge petition.

You can see where your representative stands and email them to support the CRA here. Now that the FCC repeal is in effect, we need to tell the House to restore protections and keep large ISPs from changing how we use the Internet.

Take Action



Lunar Warming - Yup - Did That, Then "Hid" the Data. "IndyWatch Feed Tech"

Science Alert has a story about a long running Lunar temperature measurement that apparently was lost and forgotten for decades.

Between 1971 and 1977, Apollo scientists conducting experiments on the Moon discovered that the surface of our li'l satellite buddy got mysteriously warmer. But the data from 1974 onwards went missing, and the strange warming phenomenon remained an enigma. The experiment was called the heat flow experiment, and it was designed to determine the rate at which the interior of the Moon loses heat.

Astronauts with Apollo 15 and 17 drilled holes into the lunar surface, up to depths of 2.3 metres, and probes measured the temperature at several depths in the holes.

These were long-term experiments, left in place after the astronauts departed, and transmitting data back to Earth.

The measurements revealed that the temperature of the moon at all measured depths got warmer from the date the experiment started in 1971 all the way till measurements ended in 1977.
That's a relatively short period of time on a planetary time frame. A rate of warming that rapid would have the moon surface incandescent well before we were began squabbling over who got to live in the best caves.

Various theories were put forth, but in the end people pretty much agreed it must be our fault.

Read more of this story at SoylentNews.


[$] Year-2038 work in 4.18 "IndyWatch Feed Tech"

We now have less than 20 years to wait until the time_t value used on 32-bit systems will overflow and create time-related mayhem across the planet. The grand plan for solving this problem was posted over three years ago now; progress since then has seemed slow. But quite a bit of work has happened deep inside the kernel and, in 4.18, some of the first work that will be visible to user space has been merged. The year-2038 problem is not yet solved, but things are moving in that direction.


Turn Your Raspberry Pi into a Tor Relay Node "IndyWatch Feed Tech"

Turn Your Raspberry Pi into a Tor Relay Node


Worldwide server revenue grew 33.4% in Q1 2018 "IndyWatch Feed Tech"

The growth at the end of 2017 continued for the worldwide server market in the first quarter of 2018 as worldwide server revenue increased 33.4 percent and shipments grew 17.3 percent year over year, according to Gartner. Worldwide: Server Vendor Revenue Estimates, 1Q18 The server market was driven by increases in spending by hyperscale as well as enterprise and midsize data centers. Enterprises and midsize businesses are in the process of investing in their on-premises More

The post Worldwide server revenue grew 33.4% in Q1 2018 appeared first on Help Net Security.


Bike-Driven Scarf Knitter is an Accessory to Warmth "IndyWatch Feed Tech"

Despite all our technological achievements, humans still spend a lot of time waiting around for trains. Add a stiff winter breeze to the injury of commuting, and youve got a classic recipe for misery. [George Barratt-Jones] decided to inject some warmth into this scene by inviting people to knit a free scarf for themselves by riding a bike.

All a person has to do is ride the Cyclo-Knitter for five minutes and marvel at their handiwork. By the time the scarf is finished, theyve cycled past being cold, and they have something to hold in the warmth. Cyclo-Knitter is essentially an Addi Express knitting machine being belt-driven by a stationary bike. Power is transferred from the bike through large, handmade wooden gears using old bike tire inner tubes as belts. [George] built a wooden tower to hold the machine and give the growing scarf a protected space to dangle.

We love the utility of this project as much as the joy it inspires in everyone who tries it. Check out their scarves and their reactions after the break. We havent seen people this happy to see something they werent expecting since that billboard that kills Zika mosquitoes.

Via [r/woodworking]


How traffic signals favour cars and discourage walking "IndyWatch Feed Tech"

We need more walkable cities and fewer cars! If aliens came to our planet they would conclude that cars are the dominant species!

Traffic signals give priority to motor vehicles over pedestrians. This inequality undermines many of the stated goals of transport, health and environment policy.

State and city governments say they want to encourage walking and biking for many reasons:


Researchers Reverse Cognitive Impairments in Mice with Alzheimers "IndyWatch Feed Tech"

FDA-approved asthma drug appears to be effective against dementia in mice.

For the first time in an animal model, researchers at the Lewis Katz School of Medicine at Temple University showed that the tau pathology that accompanies Alzheimers disease can be reversed using the asthma drug zileuton [1].



Pocket Projector Uses Raspberry Pi "IndyWatch Feed Tech"

[janrinok:] We covered a story a few months ago regarding a watch that also contained a projector which could be used to show an enlarged image on any nearby surface, including the hand that is wearing the watch. Well somebody decided to look a little more closely at making his own small projector - although not quite to the same degree of miniaturisation.

Who doesnt want a pocket projector? Nothing will impress a date more than being able to whip out a PowerPoint presentation of your latest trip to the comic book convention. The key to [MickMake] build is the $100 DLP2000EVM evaluation module from Texas Instruments. This is an inexpensive light engine, and perfect for rolling your own projector. You can see the result in the video below.

If you dont need compactness, you could drive the module with any Rasberry Pi or even a regular computer. But to get that pocket form factor, a Pi Zero W fits the bill. A custom PCB from [MickMake] lets the board fit in with the DLP module in a very small form factor. DLP chips use lots of microscopic mirrors that you can move roughly 20 degrees under computer control. So you can reflect light into the lens or bounce it away so it makes the image black. For color, an RGB LED cycles through the primary colors and you have to time your mirror movements to the color you want to project. Of course, the module takes care of all this for you behind the scenes.

The module can output up to 30 lumens (by default, though, it is 20 lumens) and has I2C and 8/16/24-bit parallel RGB video interfaces. If you dont want to go with a custom board, the device supports the BeagleBone Black right out of the box. The DLP resolution is nHD. That is the mirror array is 640360. While you might think the n stands for not, it actually stands for ninth, as in one-ninth. The current release of the adapter board lacks an audio amplifier, although that may change in a future release. For now, you can play audio from the Pi via Bluetooth.

Original Submission

Read more of this story at SoylentNews.


A new system optimises electric transmission from offshore wind farms "IndyWatch Feed Tech"

Scientists from Universidad Carlos III de Madrid (UC3M) have designed a new control system for wind turbines in offshore wind farms that allows power transmission to the coast in a more flexible and cheaper way than current solutions.

This innovation allows the use of a diode rectifier station in the offshore platform of a high voltage direct current (HVDC) link. In this way, the turbines alternating current (AC) can be easily converted into direct current (DC) for HVDC transmission.

The researchers have developed a distributed control system to synchronise and regulate the electrical voltage and frequency of the of the . This allows the transmission of energy to the general network through an HVDC link with a diode rectifier station. It is less complicated, cheaper and more flexible than other current solutions, explains co-author Santiago Arnaltes Gmez, head of the UC3M Power Control Group.


In desert trials, next-generation water harvester delivers fresh water from air "IndyWatch Feed Tech"

Last October, a University of California, Berkeley, team headed down to the Arizona desert, plopped their newest prototype water harvester into the backyard of a tract home and started sucking water out of the air without any power other than sunlight.

The successful field test of their larger, next-generation harvester proved what the team had predicted earlier in 2017: that the harvester can extract drinkable water every day/night cycle at very low humidity and at low cost, making it ideal for people living in arid, water-starved areas of the world.

There is nothing like this, said Omar Yaghi, who invented the technology underlying the harvester. It operates at ambient temperature with ambient sunlight, and with no additional energy input you can collect water in the desert. This laboratory-to-desert journey allowed us to really turn water harvesting from an interesting phenomenon into a science.


Security updates for Monday "IndyWatch Feed Tech"

Security updates have been issued by Arch Linux (chromium, firefox, flashplugin, krb5, and p7zip), Debian (firefox-esr, gnupg, gnupg1, gnupg2, libvncserver, and openjdk-7), Fedora (batik, qt3, remctl, and slurm), openSUSE (curl, glibc, ImageMagick, kernel-firmware, libvirt, libvorbis, MozillaFirefox, mozilla-nss, mupdf, prosody, qemu, slf4j, and xen), Red Hat (chromium-browser, flash-plugin, and Red Hat Virtualization), Slackware (gnupg2), and SUSE (libvirt, mailman, and xen).


Soccer League Turns App Users Into Piracy Spies "IndyWatch Feed Tech"

Even though sports streaming services are widely available in most countries, people are not always willing to pay for them.

This applies to individuals, who turn to pirate sites or other unauthorized channels, but also to businesses such as bars and restaurants.

The latter group is seen as a thorn in the side by many rightsholders. This includes the Spanish soccer league La Liga, which broadcasts some of the most viewed matches in the world.

In an effort to curb this type of piracy, La Liga has recently started to use modern technology, and its users, to its advantage. In an unprecedented move, the soccer league has turned its official Android app into a piracy spying machine.

The app in question, which has been installed by millions of users, will use the microphone and GPS readings of the devices its installed on to report possible instances of streaming piracy.

With consent from the user, the app will analyze the audio in its surroundings to check if one of La Ligas matches is being played. It then pairs that with GPS data to see if that location is an authorized broadcaster.

Protect your team, users read when they are prompted to enable this type of data collection.

Protect your team (photo: Jorge Morell Ramos)

The unusual functionality is detailed in the privacy policy which mentions tackling piracy as one of the main purposes.

The purposes for which this functionality will be used are: (i) to develop statistical patterns on soccer consumption and (ii) to detect fraudulent operations of the retransmissions of LaLiga football matches (piracy).

The microphone will only be activated when La Liga is broadcasting its football matches, the policy further clarifies.

The spying tool was spotted by, which reached out to La Liga for additional information.

The Spanish soccer league informed the publication that nobody accesses the audio fragments captured by the microphone as the audio automatically becomes a signal, a binary code. This happens only in Spain and without storing any recording or content.

The organiza...


FCC chair promises consumers will be protected after net neutrality repeal "IndyWatch Feed Tech"

Ajit Pai, the Republican chairman of the Federal Communications Commission (FCC), is promising that consumers will be protected as his repeal of the 2015 net neutrality rules goes into effect Monday.In an op-ed for CNET on Monday, Pai wrote that the...


Bad .Men at .Work. Please Dont .Click "IndyWatch Feed Tech"

Web site names ending in new top-level domains (TLDs) like .men, .work and .click are some of the riskiest and spammy-est on the Internet, according to experts who track such concentrations of badness online. Not that there still arent a whole mess of nasty .com, .net and .biz domains out there, but relative to their size (i.e. overall number of domains) these newer TLDs are far dicier to visit than most online destinations.

There are many sources for measuring domain reputation online, but one of the newest is The 10 Most Abused Top Level Domains list, run by Currently at the #1 spot on the list (the worst) is .men: Spamhaus says of the 65,570 domains it has seen registered in the .men TLD, more than half (55 percent) were bad.

According to Spamhaus, a TLD may be bad because it is tied to spam or malware dissemination (or both). More specifically, the badness of a given TLD may be assigned in two ways:

The ratio of bad to good domains may be higher than average, indicating that the registry could do a better job of enforcing policies and shunning abusers. Or, some TLDs with a high fraction of bad domains may be quite small, and their total number of bad domains could be relatively limited with respect to other, bigger TLDs. Their total badness to the Internet is limited by their small total size.

More than 1,500 TLDs exist today, but hundreds of them were introduced in just the past few years. The nonprofit organization that runs the domain name space the Internet Corporation for Assigned Names and Numbers (ICANN) enabled the new TLDs in response to requests from advertisers and domain speculators even though security experts warned that an onslaught of new, far cheaper TLDs would be a boon mainly to spammers and scammers.

And what a boon it has been. The newer TLDs are popular among spammers and scammers alike because domains in many of these TLDs can be had for pennies apiece. But not all of the TLDs on Spamhaus list are prized for being cheaper than generic TLDs (like .com, .net, etc.). The cheapest domains at half of Spamhaus top ten baddest TLDs go for prices between $6 and $14.50 per domain.

Still, domains in the remaining five Top Bad TLDs can be had for between 48 cents and a dollar each.

Security firm Symantec...


A New Paradigm For Cyber Threat Hunting "IndyWatch Feed Tech"

Its no secret that expecting security controls to block every infection vector is unrealistic. For most organizations, the chances are very high that threats have already penetrated their defenses and are lurking in their network. Pinpointing such threats quickly is essential, but traditional approaches to finding these needles in the haystack often fall short. Now there is a unique


U.S. Builds World's Fastest Supercomputer Summit "IndyWatch Feed Tech"

China no longer owns the fastest supercomputer in the world; It is the United States now. Though China still has more supercomputers on the Top 500 list, the USA takes the crown of "world's fastest supercomputer" from China after IBM and the U.S. Department of Energy's Oak Ridge National Laboratory (ORNL) unveiled "Summit." Summit is claimed to be more than twice as powerful as the current


The robot will see you now: how AI could revolutionise NHS "IndyWatch Feed Tech"

NHS hospital bosses are debating a reform involving widespread adoption of artificial intelligence and full automation.

From diagnosis to recovery, machines could take on a range of jobs, a new report suggests.

Health policy editor.


Hacking When It Counts: The Magnetron Goes to War "IndyWatch Feed Tech"

In 1940, England was in a dangerous predicament. The Nazi war machine had been sweeping across Europe for almost two years, claiming countries in a crescent from Norway to France and cutting off the island from the Continent. The Battle of Britain was raging in the skies above the English Channel and southern coast of the country, while the Blitz ravaged London with a nightly rain of bombs and terror. The entire country was mobilized, prepared for Hitlers inevitable invasion force to sweep across the Channel and claim another victim.

Weve seen before that no idea that could possibly help turn the tide was considered too risky or too wild to take a chance on. Indeed, many of the ideas that sprang from the fertile and desperate minds of British inventors went on to influence the course of the war in ways they could never have been predicted. But there was one invention that not only influenced the war but has a solid claim on being its key invention, one without which the outcome of the war almost certainly would have been far worse, and one that would become a critical technology of the post-war era that would lead directly to innovations in communications, material science, and beyond. And the risks taken to develop this idea, the cavity magnetron, and field usable systems based on it are breathtaking in their scope and audacity. Heres how the magnetron went to war.

Short But Powerful

For most of the early days of radio, most of the innovation was geared toward providing communication at a distance. Whether it be radiotelegraphy, radiotelephony, or even radio broadcasting, distance was the driver. The further a single transmitter could reach, the fewer links would be required to make a communicate between any two points, and the larger the audience that could be reached with a broadcast. Due to the physics of radio frequency propagation, this put all the action in the longer wavelengths, the space on the spectrum with wavelengths between about 10 meters and 100 meters or so.

Some researchers were looking further up the spectrum, where wavelengths better measured in centimeters are found. These frequencies wouldnt be of much use for long-haul communications or broadcasting, but they needed to be explored and exploited, and so the tools and technologies needed to produce them would have to be developed.



A Look At How The AMD EPYC Linux Performance Has Evolved Over The Past Year "IndyWatch Feed Tech"

This month marks one year since AMD returned to delivering high-performance server CPUs with the debut of their EPYC 7000 series processor line-up. It's been a triumphant period for AMD with the successes over the past year of their EPYC family. Over the past year, the Linux support has continued to improve with several EPYC/Zen CPU optimizations, ongoing Zen compiler tuning, CPU temperature monitoring support within the k10temp driver, and general improvements to the Linux kernel that have also helped out EPYC. In this article is a comparison of a "2017" Linux software stack as was common last year to the performance now possible if using the bleeding-edge software components. These Linux benchmarks were done with the EPYC 7351P, 7401P, and 7601 processors.


Automation Wont Take Your Job Until The Next Recession Threatens It "IndyWatch Feed Tech"

Good news! Automation capable of erasing white collar jobs is coming, but not for a decade or more. And thats also the bad news because interest in automation accelerates during economic downturns, so once tech that can take your job arrives youll already have lived through another period of economic turmoil that may already have cost you your job.

That lovely scenario was advanced yesterday by professor Mirko Draca of The London School of Economics, who yesterday told Huaweis 2018 Asia-Pacific Innovation Day 2018 that the world is currently in an era of investment and experimentation with technology. The effects of such eras, he said, generally emerge ten to fifteen years in the future.

Innovation in the 1980s therefore sparked the PC and internet booms of the mid-to-late 1990s, and were still surfing [SIC - suffering?] the changes they unleashed. Our current era of mobile tech doesnt measure up to the radical 1990s, he said, as shown by the fact that productivity gains appear to have stalled for a decade or more.

[...] We predict that AI and robotics will lead to some sort of productivity surge in ten to fifteen years, he said, adding that there is no clear evidence that a new wave of technologies that threaten jobs has started.

But he also said that it will once businesses see the need to control costs.

Original Submission

Read more of this story at SoylentNews.


NASA confirms its $1 billion Jupiter mission will cheat death for at least 3 more years "IndyWatch Feed Tech"

Hooray for Juno!

Though NASAs Juno spacecraft has probed Jupiters secrets for nearly two years, the $1 billion mission was set to crash into the planets clouds in July. Now, however, the agency has confirmed Business Insiders previous report that Juno will get three additional years of flight.


[SRP-2018-01] Reverse engineering tools for ST DVB chipsets (public release) "IndyWatch Feed Tech"

Posted by Security Explorations on Jun 11

Hello All,

We have decided to release to the public domain our SRP-2018-01 security
research project related to the security of STMicroelectronics chipsets.

The research material (70+ pages long technical paper accompanied by two
reverse engineering tools) can be downloaded from the SRP section of our
portal (Past SRP materials):

The release of SRP-2018-01 is a direct consequence of the...


Experts warn hackers have already stolen over $20 Million from Ethereum clients exposing interface on port 8545 "IndyWatch Feed Tech"

Cybercriminal group has managed to steal a total of 38,642 Ether, worth more than $20,500,000, from clients exposing the unsecured interface on port 8545.

Cybercriminals have raked over 20 million dollars in the past few months by hijacking poorly configured Ethereum nodes exposed online are continuing their operations.

In March, security experts from Qihoo 360 Netlab reported a hacking campaign aimed at Ethereum nodes exposed online, crooks were scanning for port 8545 to find wallets that exposed their JSON-RPC.

According to the researchers, the cybercrime gang stole 3.96234 Ether (between $2,000  and $3,000)., but currently, they have tracked another criminal gang that already stolen an amazing amount of funds that are available in their wallets.

Researchers claim the cybercriminal group has managed to steal a total of 38,642 Ether, worth more than $20,500,000.

If you have honeypot running on port 8545, you should be able to see the requests in the payload, which has the wallet addresses, states Qihoo 360 Netlab team. And there are quite a few IPs scanning heavily on this port now.

Geth is a popular client for running Ethereum node allowing users to manage them remotely through the JSON-RPC interface.

Developers can use this programmatic API to build applications that can retrieve private keys, transfer funds, or retrieve personal details of the owner of the wallet.

The hackers moved stolen funds to the Ethereum account having the address 0x957cD4Ff9b3894FC78b5134A8DC72b032fFbC464.


The Rejuvenation Roadmap "IndyWatch Feed Tech"

One of the most commonly asked questions we receive is How is progress going in aging research? It is something we are asked so often that we decided to provide the community with a resource that will help them to keep track of progress directly.

To that end, today we have launched our new curated database, The Rejuvenation Roadmap, which will be tracking the progress of the many therapies and projects in the rejuvenation biotechnology field. This database aims to give a quick visual summary of the status of each drug or therapy along with some additional information for people interested in learning more about them.

We believe that an informed community is an effective one, and this was one of our motivations for developing this new database. There are many resources for scientists, such as the superb databases of the Human Ageing Genomic Resources maintained by Dr. Joo Pedro de Magalhes, which are excellent for researchers. However, we noticed that there was no database that tracked the efforts of the many researchers and projects in the field, and while some people do maintain lists, they are often not public facing, easy to access, or user-friendly.


Crack Open ACRN A Device Hypervisor Designed for IoT "IndyWatch Feed Tech"

As the Internet of Things has grown in scale, IoT developers are increasingly expected to support a range of hardware resources, operating systems, and software tools/applications. This is a challenge given many connected devices are size-constrained. Virtualization can help meet these broad needs, but existing options dont offer the right mix of size, flexibility, and functionality for IoT development.


Moscow is Building New Civic Services on 5G "IndyWatch Feed Tech"

The Russian capital wants to use 5G to file traffic reports, remotely park cars, and stream soccer matches Photo: Dmitry Serebryakov/TASS/Getty Images

5G report logo, link to report landing page

When the national football teams of Morocco and Iran take the field at Krestovsky Stadium in Saint Petersburg during the 2018 FIFA World Cup on 15 June, more than 60,000 fans will be there to cheer them on. And, courtesy of more than a dozen specially installed high-definition cameras, residents of Moscow, about 600 kilometers away, will watch the game over a high-speed 5G connection.

The capital of Russia will have what Evgeniy Novikov, an advisor for the Deputy Minister of Communications of Moscow, calls a 5G zone, an area where viewers can don VR glasses and switch between camera views to watch the game in real time.

Like previous bombastic 5G demonstrations, including Verizons livestream of the Super Bowl in Minneapolis last February, and multiple virtual reality demonstrations by South Korean telecom companies during the Winter Olympics in Pyeongchang, Moscows stunt will showcase the unparalleled video streaming capabilities of the next wireless generation.

But for Moscow, the World Cup demonstrations are just the first in a series of ambitious 5G tests and rollouts. The citys government is confident in the capabilities offered by 5G, though carriers, standards groups, and federal agencies are still sorting out how exactly the technology will work.

Its not yet entirely clear which frequencies 5G will operate at within the country. We dont have any legal frequency for 5G, says Novikov. The government is currently researching which frequencies it should make available. Two likely candidates are 3.5 and 28 gigahertz, since companies are currently leasing those bands for temporary demonstrations. For example,...



Bitcoin price takes a dive after another cryptocurrency exchange hack "IndyWatch Feed Tech"

Theres bad news if youre a cryptocurrency investor. Billions of dollars worth of wealth were wiped out this weekend after a South Korean cryptocurrency exchange was hacked.


[SECURITY] [DSA 4225-1] openjdk-7 security update "IndyWatch Feed Tech"

Posted by Moritz Muehlenhoff on Jun 11

Debian Security Advisory DSA-4225-1 security () debian org Moritz Muehlenhoff
June 10, 2018

Package : openjdk-7
CVE ID : CVE-2018-2790 CVE-2018-2794...


Former GCHQ chief Hannigan warns of Russias aggressive approach to the cyberspace "IndyWatch Feed Tech"

According to former GCHQ chief, the recently discovered VPNFilter botnet is the demonstration that Russia appears to be live-testing cyberattacks.

Former GCHQ chief Robert Hannigan has warned that the availability of hacking tools in the main marketplaces is rapidly changing the threat landscape. Hannigan served as the director of the UK intelligence agency between November 2014 until January 2017.

Threat actors have an easy access to attack tools even without having specific knowledge.

Hannigan spoke had a keynote speech titled Weaponising the web: Nation-state hacking and what it means for enterprise cybersecurity at the Infosec conference in London last week.

Hannigan highlighted the risks associated with the operation conducted by nation-state actors that had dramatically increased over the last five years.

State-sponsored hackers pose a serious risk for enterprises as well as governments, the former GCHQ chief warned of Government APT group using crime gangs as a proxy machine hard the attribution.

Nation state attacks using criminal group as a proxy is a fairly new issue. Hacking tools are becoming a commodity for threat actors and represent problem companies.

Hannigan mentioned the activity conducted by North Korea-linked APT and Iranian state-sponsored hackers.

North Korean APT groups, like the infamous Lazarus APT crew, focused its activity on SWIFT network as well as crypto exchanges to steal funds.

This is a rational state pursuing rational objectives, explained Hannigan.

Hannigan warned of the intensification of the Iranian hackers that also targeted financial institutions.

Which is the greatest threat?

Russia, of course! Russia-linked APT groups are very sophistication and continuously target infrastructure worldwide. in some cases they demonstrated destructive abilities, like the attacks against the Ukrainian power grid.



[SECURITY] [DSA 4221-1] libvncserver security update "IndyWatch Feed Tech"

Posted by Moritz Muehlenhoff on Jun 11

Debian Security Advisory DSA-4221-1 security () debian org Moritz Muehlenhoff
June 08, 2018

Package : libvncserver
CVE ID : CVE-2018-7225



[slackware-security] gnupg2 (SSA:2018-159-01) "IndyWatch Feed Tech"

Posted by Slackware Security Team on Jun 11

[slackware-security] gnupg2 (SSA:2018-159-01)

New gnupg2 packages are available for Slackware 13.37, 14.0, 14.1, 14.2, and
-current to fix a security issue.

Here are the details from the Slackware 14.2 ChangeLog:
patches/packages/gnupg2-2.0.31-i586-1_slack14.2.txz: Upgraded.
Sanitize the diagnostic output of the original file name in verbose mode.
By using a made up file name in the message it was possible to...


[SECURITY] [DSA 4223-1] gnupg1 security update "IndyWatch Feed Tech"

Posted by Salvatore Bonaccorso on Jun 11

Debian Security Advisory DSA-4223-1 security () debian org Salvatore Bonaccorso
June 08, 2018

Package : gnupg1
CVE ID : CVE-2018-12020
Debian Bug :...


Qt 5.9.6 + Qt Creator 4.6.2 Released "IndyWatch Feed Tech"

For those making use of the Qt 5.9 long-term support series, Qt 5.9.6 was outed today by The Qt Company...


Facebook/Instagram vs. Twitch and YouTube "IndyWatch Feed Tech" New video game streaming service to rival Twitch

Facebook has launched its own video game streaming hub., which launched on Thursday, will compete directly with popular platforms like Twitch and Mixer.

It's part of the social media site's continued efforts to become a destination for video content. The new service suggests streams based on who individual users follow, and highlights content chosen by Facebook.

Instagram is targeting one of YouTube's weaknesses with plans for long-form video

Instagram is gunning for YouTube with a plan to allow longer-form video, according to the owner of an influencer network whose clients have talked with the Facebook-owned company, as well as numerous media reports.

Allowing long video could help Instagram court social media stars and their millions of fans to use its platform as their primary online home, instead of relying on YouTube, where many have fewer followers. And when the users move, so will the marketers, meaning Facebook stands to gain advertising revenue at Google-owned YouTube's expense.

[...] The news of the Facebook-owned platform embracing longer videos was first reported by The Wall Street Journal, which said Instagram would soon allow users to upload videos up to 60 minutes to their profiles. TechCrunch added on Thursday that Instagram was talking to social media influencers and publishers to create shows for an upcoming section for dedicated-to-video content, similar to Snapchat Discover.

Original Submission

Read more of this story at SoylentNews.


[SECURITY] [DSA 4220-1] firefox-esr security update "IndyWatch Feed Tech"

Posted by Moritz Muehlenhoff on Jun 11

Debian Security Advisory DSA-4220-1 security () debian org Moritz Muehlenhoff
June 08, 2018

Package : firefox-esr
CVE ID : CVE-2018-6126

Ivan Fratric...


[SECURITY] [DSA 4224-1] gnupg security update "IndyWatch Feed Tech"

Posted by Salvatore Bonaccorso on Jun 11

Debian Security Advisory DSA-4224-1 security () debian org Salvatore Bonaccorso
June 08, 2018

Package : gnupg
CVE ID : CVE-2018-12020

Marcus Brinkmann...


"IndyWatch Feed Tech"

Posted by ch . sangsakul on Jun 11

# Date: 08-06-2018
# Software Link:
# Exploit Author: HaMM0nz (Chakrit S.), a member of KPMG Cyber Security team in Thailand
# CVE: CVE-2018-12040
# Category: webapps

1. Description

Symfony is a set of PHP Components, a Web Application framework, a Philosophy, and a Community...


Linux Audio Conference videos available "IndyWatch Feed Tech"

The 2018 Linux Audio Conference has just concluded in Berlin. A substantial set of videos of talks from the event has already been published, with the rest slated to appear in the near future.


How third-party risk affects your GDPR compliance "IndyWatch Feed Tech"

In this podcast, Darron Gibbard, Chief Technical Security Officer EMEA at Qualys, discusses third-party risk and how it affects the GDPR compliance of your organization. Heres a transcript of the podcast for your convenience. Hello. My name is Darron Gibbard, and I am the Chief Technical Security Officer at Qualys. In this Help Net Security session today, I am going to be covering third-party risk how does this affect your GDPR compliance? One are More

The post How third-party risk affects your GDPR compliance appeared first on Help Net Security.


MIPS Finally Posts GCC Compiler Patch For P6600 Series, But Might Be Rejected "IndyWatch Feed Tech"

The MIPS P6600 processor was announced in 2015 as one of the Warrior Processors based upon MIPS64 Release 6. The P6600 is based on a 28nm process, clock speeds up to 2.0GHz, and is the fastest performing of the MIPS Warrior cores. Only now has MIPS posted an enablement patch for the MIPS P6600 with GCC...


[SECURITY] [DSA 4222-1] gnupg2 security update "IndyWatch Feed Tech"

Posted by Salvatore Bonaccorso on Jun 11

Debian Security Advisory DSA-4222-1 security () debian org Salvatore Bonaccorso
June 08, 2018

Package : gnupg2
CVE ID : CVE-2018-12020

Marcus Brinkmann...


Gridbox extension for Joomla! <= 2.4.0 Reflected Cross Site Scripting (XSS) "IndyWatch Feed Tech"

Posted by yavuz atlas on Jun 11

Gridbox extension for Joomla! <= 2.4.0 Reflected Cross Site Scripting (XSS)





Securing microservices and containers: A DevOps how-to guide "IndyWatch Feed Tech"

There is a simple reason for developers adopting the cloud and cloud-native application architectures. These tools and methods allow developers to accelerate innovation and feature delivery in the service of meeting business demands and keeping their enterprise competitive. While these tools and methods make noticeable improvements for DevOps teams, their new operational model creates security concerns and headaches for security practitioners. DevOps methods disaggregate the neatly packaged n-tier, VM-bound application into distributed architectures. The cloud More

The post Securing microservices and containers: A DevOps how-to guide appeared first on Help Net Security.


Bootloader vulnerability in OnePlus 6 lets an attacker take control of the device "IndyWatch Feed Tech"

By Waqas

An IT security researcher has discovered a critical vulnerability in OnePlus

This is a post from Read the original post: Bootloader vulnerability in OnePlus 6 lets an attacker take control of the device


Patch management is not just ITs responsibility, get your whole team on board "IndyWatch Feed Tech"

I have been on the road for a few weeks now and surprisingly the topic of discussion has predominantly been patch management. Why is patch such a prevalent topic? Patching responsibility As we near Patch Tuesday this month I wanted to share a few thoughts and observations with you all from my recent travels. Recently I attended RiskSec in New York, and last week I was at Infosecurity Europe. At RiskSec I had the pleasure More

The post Patch management is not just ITs responsibility, get your whole team on board appeared first on Help Net Security.


Monday marks ends of net neutrality rules "IndyWatch Feed Tech"

Monday marks the end of net neutrality rules in the U.S., following GOP members of the Federal Communications Commission (FCC) voting to end the protections last year.The FCC announced the June 11 end date in May after the...


[James Bruton] Is Making A Dog: OpenDog Project "IndyWatch Feed Tech"

There was a time when a two-legged walking robot was the thing to make. But after seeing years of Boston Dynamics amazing four-legged ones, more DIYers are switching to quadrupeds. Now we can add master DIY robot builder [James Bruton] to the list with his openDog project. Whats exciting here is that with [James] extensive robot-building background, this is more like starting the challenge from the middle rather than the beginning and we should see exciting results sooner rather than later.

James' motor and ball screwsJames motor and ball screws

Thus far [James] has gone through the planning stage, having iterated through a few versions using Fusion 360, and hes now purchased the parts. Its going to be about the same size as Boston Robotics SpotMini and uses three motors for each leg. He considered going with planetary gearboxes on the motors but experienced a certain amount of play, or backlash, with them in his BB-9E project so this time hes going with...


Zx Vega+: Indiegogo Calls "Game Over" on Sinclair Console "IndyWatch Feed Tech"

Crowdfunding site Indiegogo has called time on a high-profile British project to create a retro handheld console.

[...] "Indiegogo asked for proof that we are ready to ship the product and requested that we send them a unit to their San Francisco office," added Dr David Levy, RCL's chairman

"We responded yesterday saying that we would sooner give a demonstration of a unit to their UK representative, and asking Indiegogo to request that he contact us to fix an appointment. Their reaction was this latest statement."

[...] The Vega+ campaign raised a total of 512,790 from more than 4,700 people on Indiegogo before the US firm blocked it from accepting more funds in March 2017.

[...] RCL has missed multiple deadlines over the past two years and given a variety of reasons for doing so, ranging from problems with the buttons of the Vega+ to disputes with former company directors - the details of which are contested.

The company had originally pledged to deliver the console in the summer of 2016.

Original Submission

Read more of this story at SoylentNews.


This Week in Numbers: Managing JavaScript Packages with NPM and Yarn "IndyWatch Feed Tech"

This week we analyze more data from the Node.js Foundationuser survey. Almost three-quarters (73 percent) of survey respondents said they use a package manager. NPM was used by 60 percent and Yarn cited by 13 percent.


OpenBSD at BSDCan 2018 "IndyWatch Feed Tech"

BSDCan 2018 has concluded, and materials for (some of) the OpenBSD-related tutorials and talks can be found in the usual place.

Highlights include the unveiling of unveil(), hinted at by Bob Beck (beck@) in his p2k18 report, and "Speculating about Intel", by Theo de Raadt (deraadt@). [An unofficial video of the latter presentation is available.]

At the time of writing, official video recordings are not yet available.


Hackers Stole Over $20 Million in Ethereum from Insecurely Configured Clients "IndyWatch Feed Tech"

Security researchers have been warning about cybercriminals who have made over 20 million dollars in just past few months by hijacking insecurely configured Ethereum nodes exposed on the Internet. Qihoo 360 Netlab in March tweeted about a group of cybercriminals who were scanning the Internet for port 8545 to find insecure geth clients running Ethereum nodes and, at that time, stole 3.96234


Helm vs Kapitan vs Kustomize "IndyWatch Feed Tech"


  • Kapitan (and presumably Ksonnet) is the more flexible and customizable (json and jsonnet)
  • Kustomize if the more straightforward, just released so well need a bit more documentation on built-in functions (yaml only)
  • Helm combines a package approach and releases management that is powerful, with the caveats of Tiller for the release management part (additional source of truth)


What Is Digital Twin Technology? [And Why It Matters] "IndyWatch Feed Tech"

Digital twins are virtual replicas of physical devices that data scientists and IT pros can use to run simulations before actual devices are built and deployed. They are also changing how technologies such as IoT, AI and analytics are optimized.

Digital twin technology has moved beyond manufacturing and into the merging worlds of the Internet of Things, artificial intelligence and data analytics.


Vulkan 1.1.77 Released With Clarifications & Fixes "IndyWatch Feed Tech"

Kicking off a new week is the Vulkan 1.1.77 specification update...


Estonian Citizens (via Estonian Cybercrime Bureau) - 655,161 breached accounts "IndyWatch Feed Tech"

In June 2018, the Cybercrime Bureau of the Estonian Central Criminal Police contacted HIBP and asked for assistance in making a data set of 655k email addresses searchable. The Estonian police suspected the email addresses and passwords they obtained were being used to access mailboxes, cryptocurrency exchanges, cloud service accounts and other similar online assets. They've requested that individuals who find themselves in the data set and also identify that cryptocurrency has been stolen contact them at


VirGL Now Capable Of OpenGL 4.1 With Latest Mesa "IndyWatch Feed Tech"

The VirGL stack for offering OpenGL hardware acceleration to guest virtual machines with KVM is now capable of utilizing OpenGL 4.1...


Latest Docket Reports Show That the American Courts/Legal System Still Anything But Patents-Hostile "IndyWatch Feed Tech"

It just depends on what the patents cover, e.g. chemistry in this case

Damages from patents trebled

Summary: Damages (or so-called harm) from patent infringement, as demonstrated in the US earlier this month, still an overrated concept which leads to overinflated compensation for infringement; the patent microcosms claims that US courts have become anti-patent are laughable at best

THE EPO has its share of scandals that still severely affect EPO staff, but what about accused individuals and firms, especially cash-strapped ones?

Disproportionate sizes in litigation have long been an issue.Docket Navigators Docket Report about a BASF (German giant) case speaks of a discredited expert report. As Docket Navigator summarised it (along with some excerpts from the original): The court granted plaintiffs motion to strike report of defendants contract expert regarding whether defendant sold anticipating prior art before the critical date because the testimony was unhelpful.

Its so concise that its confusing (what actually happened there). But whats noteworthy here is that a relatively small defender (its workforce size is less than a tenth of BASFs) is being sort of denied the right to/of a defense. Disproportionate sizes in litigation have long been an issue.

Its almost as though law is being composed for the purpose of deterrence/retaliation rather than justice.Another new Docket Report (regarding Sabinsa Corporation v Olive Lifesciences Pvt. Ltd., a herbal products manufacturer in Bengaluru, India) shows what happens when patents not only cause major fines but also treble the &#8216...


Sweden distributes be prepared for war leaflet to all 4.8m homes "IndyWatch Feed Tech"

Society is vulnerable, so we need to prepare ourselves as individuals, said Dan Eliasson of the Swedish civil contingencies agency, which is in charge of the project. Theres also an information deficit in terms of concrete advice, which we aim to provide.

Defence pamphlet shows how population can prepare in event of attack and contribute to countrys total defence

European affairs correspondent.


Set TV Suddenly Goes Offline But is the ACE Lawsuit to Blame? "IndyWatch Feed Tech"

Unauthorized IPTV services that provide competition to traditional broadcasters and VOD providers are a huge thorn in the side of mainstream entertainment industry companies.

As a result, the Alliance for Creativity and Entertainment (ACE), an anti-piracy partnership forged between Hollywood studios, Netflix, Amazon, and more than two dozen other companies, is now fighting on the front line, attempting to bring these competitors down.

Two early targets were the Kodi-powered Tickbox and Dragonbox services, who are both been tackled in US courts.

Earlier this year, ACE members launched similar action against Florida-based Set Broadcast, LLC, the company behind the popular IPTV service SET TV. The complaint, filed at a California federal court in April, claimed that Set TV was nothing but a piracy tool which offered copyright-infringing streams to a large number of subscribers.

Despite the threats and a lawsuit, Set TV has continued to provide service to thousands of customers who access media via set-top boxes, laptops, tablets, phones and various other hardware devices. Just before the weekend, however, trouble appeared on the horizon.

A message published on Set TVs homepage indicated that the platform might be facing difficulties.

Set TV down

Given that Set TV is under intense pressure from ACE, many observers and some media reports put two and two together, concluding that Set TV had probably buckled under the pressure and thrown in the towel.

While that might still transpire at a later date, no official messages appeared on Set TVs social media accounts to confirm or deny. So, to learn more, TorrentFreak contacted Set TV who emailed back a short message Sunday.

We apologize for this inconvenience. We are working on getting our system back online, the company said in response.

A call to the companys support line was met with a similar message.

This morning Set TVs service still appears to be down and no updates are available detai...


Drug Combination Offers More Effective Care For Patients Suffering Miscarriage "IndyWatch Feed Tech"

A combination of the drugs mifepristone and misoprostol can help bring closure to some women and their families suffering from miscarriage, and reduces the need for surgical intervention to complete the painful miscarriage process. Results of a new clinical trial led by researchers at the Perelman School of Medicine at the University of Pennsylvania, show that while the standard drug regimen using misoprostol on its own frequently fails to complete the miscarriage, a combination of misoprostol and the drug mifepristone works much more reliably. The report is published today in the New England Journal of Medicine.

Each year in the United States alone approximately 1 million women have miscarriages. When the body does not expel the pregnancy tissue on its own -- the final part of a miscarriage -- women need to undergo a surgical procedure or take the drug misoprostol. Though often preferable for its convenience and privacy -- patients can take it in the comfort of their own homes -- misoprostol does not always work, and many women who use misoprostol are still left with no option but to undergo an invasive procedure they wished to avoid, prolonging an already physically and emotionally difficult situation.

"Though rarely discussed openly, miscarriage is the most common complication of pregnancy, and the public health burden is both physical and psychological. For too many women, misoprostol alone just leads to frustration. I have seen my patients suffer from the insult of the treatment failure added to the injury of the initial loss," said study lead author Courtney A. Schreiber, MD, MPH, chief of the division of Family Planning and an associate professor of Obstetrics and Gynecology at the Perelman School of Medicine at the University of Pennsylvania. "As physicians, we have to do better for these patients, and our new study shows that by combining mifepristone with misoprostol, we can."

Original Submission

Read more of this story at SoylentNews.


Saint Regis Mohawk Tribe Blind to Its Participation in a Scam Around Patents on Nature "IndyWatch Feed Tech"

Recent: Allergan/Mohawk Sovereign Immunity Patent Scam (Dodging PTAB) Backfires Spectacularly

Tired man
Without even shedding a tear over what theyve done (a betrayal to Native American values)

Summary: For over $20,000,000 (so far) the Saint Regis Mohawk Tribe has agreed to pretend that it has something to do with controversial patents of Allergan, in effect grossly abusing the concept of tribal immunity while at the same time enabling privatisation of nature

THIS SITE typically focuses on software patents and Alice. But a few other high-level decisions, notably Mayo, impact patent scope as well. There are many bogus USPTO patents which are well overdue for a review by the Patent Trial and Appeal Board (PTAB) and maybe the Federal Circuit as well. That includes patents of Allergan, which is visibly afraid of PTAB, knowing perhaps that its patents are questionable and would likely be voided upon closer scrutiny.

Allergan hired some dodgy law firm that bullies bloggers like myself; they are maximalists of patent law who are resorting to outright "scams" now (many people call it a scam).

Allergan hired some dodgy law firm that bullies bloggers like myselfPatently-Os Dennis Crouch has in fact just given the platform to these patent scammers who misuse tribal immunity to cushion/shield monopoly of Allergan (based on bogus patents). Michael Gulliford, an advisor to the Saint Regis Mohawk Tribe and the Founder of Soryn IP Group, uses terms like controversial and death squad to refer to PTAB. He compares judges and courts to assassins basically. What a lunatic.

He admits upfront that the tribe takes $13.75 million upfront, with continuing royalty payments of $3.75 million per quarter to participate in a scam of Allergan. This is pure greed...


OnePlus 6 Flaw Allows to Boot Any Image Even With Locked Bootloader "IndyWatch Feed Tech"

Have you recently bought a OnePlus 6? Don't leave your phone unattended. A serious vulnerability has been discovered in the OnePlus 6 bootloader that makes it possible for someone to boot arbitrary or modified images to take full admin control of your phoneeven if the bootloader is locked. A bootloader is part of the phone's built-in firmware and locking it down stops users from replacing


Top 10 Most Pirated Movies of The Week on BitTorrent 06/11/18 "IndyWatch Feed Tech"

This week we have two newcomers in our chart.

Tomb Raider is the most downloaded movie.

The data for our weekly download chart is estimated by TorrentFreak, and is for informational and educational reference only. All the movies in the list are Web-DL/Webrip/HDRip/BDrip/DVDrip unless stated otherwise.

RSS feed for the weekly movie download chart.

This weeks most downloaded movies are:
Movie Rank Rank last week Movie name IMDb Rating / Trailer
Most downloaded movies via torrents
1 (1) Tomb Raider 6.6 / trailer
2 (7) Pacific Rim: Uprising 5.8 / trailer
3 (2) Avengers: Infinity War (HDCam) 9.1 / trailer
4 (5) Love, Simon 8.0 /...


FPGA Persistently Rick Rolls You "IndyWatch Feed Tech"

When [Im-pro] wants a display, he wants it to spin.  So he built a persistence of vision (POV) display capable of showing a 12-bit color image of 131 x 131 pixels at 16 frames per second. You can see a video about the project below, but dont worry, you can view it on your normal monitor.

The project starts with a Java-based screen capture on a PC. Data goes to the display wirelessly to an ESP8266. However, the actual display drive is done by an FPGA that drives the motor, reads a hall effect index sensor, and lights the LEDs.

Perhaps the most interesting part of the project is the FPGA-based mapping of the rectangular coordinates of the incoming video to the polar coordinates required by the display. There are 4 arms of LEDs or wings and a 3D printed structure that is all included in the post.

The FPGA is a Cmod S6 which is a breakout board for a Xilinx Spartan 6 with more than enough horsepower to handle the workload. There are also custom PCBs involved, so when you think about it, it is a fairly wide-ranging project. Java software, ESP8266 software, FPGA configurations, a 3D-printed design, and PCB layouts. If you want something simple to tackle that has a bit of everything in it, this might be your next project.

Most of the POV displays we see dont have this kind of color-depth and resolution. Weve seen displays built around fans. Our favorite, though, is the dog speedometer.


NSF Supports Development of New Nationwide Data Storage Network "IndyWatch Feed Tech"

Submitted via IRC for Fnord666

The National Science Foundation (NSF) is announcing a $1.8 million grant for the initial development of a data storage network over the next two years. A collaborative team will combine their expertise, facilities and research challenges to develop the Open Storage Network (OSN). OSN will enable academic researchers across the nation to work with and share their data more efficiently than ever before.

[...] NSF's investment in OSN builds on a seed grant by Schmidt Futures a philanthropic initiative founded by former Google Chairman Eric Schmidt to enable the data transfer systems for the new network. These systems are designed to be low-cost, high-throughput, large-capacity, and capable of matching the speed of a 100-gigabit network connection with only a small number of nodes. This configuration will help to ensure that OSN can eventually be deployed in many universities across the U.S. to leverage prior investments and establish sustainable management for the overall storage network.

Source: NSF Supports Development of New Nationwide Data Storage Network

Original Submission

Read more of this story at SoylentNews.


Ultra-capacitor hybrid radically boosts power and efficiency of lithium batteries "IndyWatch Feed Tech"

Combining the unique strengths of lithium batteries with crazy-fast charging, carbon ultra-capacitors could save a ton of weight and add significant range and power to electric vehicles, according to Nawa Technologies. Based outside Marseilles, this fascinating French startup is working on a new type of battery it believes could offer some huge advantages in the EV space, among many others.


In-orbit services poised to become big business "IndyWatch Feed Tech"

A transition is happening in the satellite business. Fast-moving technology and evolving customer demands are driving operators to rethink major investments in new satellites and consider other options such as squeezing a few more years of service out of their current platforms.

Which makes this an opportune moment for the arrival of in-orbit servicing.

Sometime in early 2019, the first commercial servicing spacecraft is scheduled to launch. The Mission Extension Vehicle built by Orbital ATK on behalf of subsidiary SpaceLogistics, will the first of several such robotic craft that are poised to compete for a share of about $3 billion worth of in-orbit services that satellite operators and government agencies are projected to buy over the coming decade.


Seedballs "IndyWatch Feed Tech"

This has recently been  modified in Africa in order to sow woodlands using a carbon rich mix which is an excellent idea. This also confirms that knowledge of bio char has how penetrated the global agricultural base.  This is wonderful news.  The global agricultural movement marches on.

The quoted cost there is a penny per ball, cheap enough for broad application everywhere.  We even see folks tossing the balls out of helicopters.

These balls sit there until hit by a rain fall which naturally activated the seed. 

This idea was presented to me in the 1980's using cross linked polymers as a carrier and for reforestation.  It never got off the ground and this approach has the advantage that it is user friendly for all dirt farmers in particular who do need exactly this technology.


JUNE 18, 2014 


Dried and Finished Clay Dumplings

Whats a Seed ball?

Seeds balls are an ancient technique for propagating plants from seeds without opening up soil with cultivation tools such as a plow.

The rediscovery and popularization of seedballs (or Clay Dumplings as he called them) in modern times is typically ascribed to Japanese natural farmer and philosopher Masanobu Fukuoka.

As with many natural farmers, Fukuoka believed that tillage over large areas is laborious, destructive to soil health, and ultimately not needed and thus a waste of time and energy. Thus, seedballs have become an important aspect of many natural farming and conservation enterprises around the world.

Bill Mollison and Masanobu Fukuoka two great fo...


Breaking the Educational Cartel "IndyWatch Feed Tech"

It is all here, isn't it.  There is plenty wrong about the massive educational establishment as it stands.  The first and most important problem is poor individual guidance and spotty product delivery.  I personally experienced all that and it was to my detriment.  It is still a performance problem that exists always.
That technology allows it to be solved is wonderful.  That means we can re-frame the other problem with modern education.  The Cost.
Students need a personal tutor who is understanding of his line of endeavor and little else.  Even the lab sciences are properly given by advanced students because we are talking about skill development.
Because of distance learning it now happens that all course material is available presented by the best presenters available along with the best written material available.  It makes sense to assemble seminars of students with one of their tutors to attend such presentations.  This allows a friendly discussion with the tutor to resolve difficulties. Other techniques additionally enhance the value of this approach.
Truth is, most of our professors are not leaders in their field and are themselves reliant on their own past training..
Breaking the Educational Cartel

Gary North

Every society has rites of passage. If you want to begin to understand any society, study its rites of passage.

In the Christian West, there are three acknowledged rites of passage: baptism, marriage, and funeral. Obviously, a funeral is a rite of passage for the survivors. Nobody wears street clothes other than a mortician's street cloth...


Giuliani: Trump forced North Koreas Kim to beg for meeting and Muellar Attempt to Frame Trump. "IndyWatch Feed Tech"

Yes he did and the summit starts in a couple of days.  I also observe three NK generals were also summarily dismissed.  Perhaps they pushed bad advice?

Thus it may well be possible to settle all this.  Those were the last kicks from the old guard.  In the meantime, by now they have hundreds of pages of agreements printed out ready for signing and we will see a road map ten years long that will create an united Korea.

At the same time, Rudy has commented that Muellar and team are attempting to frame Trump.  I do not think that they are really trying to do this but i do think that this is a deliberate ploy to introduce the framing meme into the public conversation.

Evidence to date has established that the Obama Whitehouse did operate a criminal entrapment scheme against Trump during and after the election and this is about to become a big thing with the IG report.

Also we are now at 35,000 sealed indictments and we just lost Anthony Boudain and Kate Slade to suicide this week.  It does not make you feel good knowing all this.

Giuliani: Trump forced North Koreas Kim to beg for meeting

JERUSALEM (AP) Former New York Mayor Rudy Giuliani on Wednesday boasted that Donald Trumps tough line had forced the North Korean leader to beg to re-schedule a high-profile summit after the president abruptly called off the meeting.

After the cancellation, Kim Jong Un got back on his hands and knees and begged for it, which is exactly the position you want to put him in, Giuliani told a business conference in the Israeli city of Tel Aviv.

In an interview later with The Associated Press, Giuli...


The Yuge Picture - DEEP STATE faces Armagedon. "IndyWatch Feed Tech"

A lot more bits and pieces have trickled in to help complete the overall narrative which may well have an inflexion point today around the release of the IG report.  What has become clearer is what is meant by 'the plan' and the centrality of the Uranium One Treason.

What you do need to understand here though is that Russia had no need to ever buy USA Uranium, but Iran needed weapons grade Uranium and only the USA could successfully supply them without being in contravention of a host of international treaties with the USA or at least USA acquiescence was central. 

When this was proposed, Russia cooperated, knowing full well that it was all criminal as hell, but gave them huge leverage in the USA political sphere.  I also must say that anyone else would also have cooperated for the same reason and then look for a way to blow it all away after all had been entrapped to your advantage.  The alternative was worse inasmuch as you would lose control.

I suspect that the scheme was concocted between the CIA and the Iranians in order to establish Iran as a viable nuclear treat and for blackmail leverage accruing to the CIA as they had done with North Korea.  Thus the whole scheme is full of CIA assets and Deep State players and plenty of the unwitting.

Thus we have the Genesis of Uranium One. For it to proceed, a whole raft of regulatory constraints and agencies in the USA had to be rendered compliant.  The money itself would have to come from frozen Iranian cash, now locked since the Carter years.  What was set in motion was a huge bribery scheme that naturally captured most aspects of the DEEP STATE.

Understand that we are not talking about just the heads of those agencies, but also the types of professionals who actually needed to sign of within the respective departments.  Non compliant actors would also need to be transferred as well.  It is easy to env...


Scientists Can Design Better Babies. Should They? "IndyWatch Feed Tech"

Advances in reproductive technology have put genetic choices within reach of perspective parents. But critics warn of ethical peril.


Rutgers physicists create new class of 2D artificial materials "IndyWatch Feed Tech"

In 1965, a renowned Princeton University physicist theorized that ferroelectric metals could conduct electricity despite not existing in nature.

For decades, scientists thought it would be impossible to prove the theory by Philip W. Anderson, who shared the 1977 Nobel Prize in physics. It was like trying to blend fire and water, but a Rutgers-led international team of scientists has verified the theory and their findings are published online in Nature Communications.

Its exciting, said Jak Chakhalian, a team leader of the study and Professor Claud Lovelace Endowed Chair in Experimental Physics at Rutgers University-New Brunswick. We created a new class of two-dimensional artificial materials with ferroelectric-like properties at room temperature that dont exist in nature yet can conduct electricity. Its an important link between a theory and an experiment.


AI cancer detectors "IndyWatch Feed Tech"

Researchers suggest artificial intelligence is now better and faster at detecting cancer than clinicians.


South Korean Cryptocurrency Exchange Coinrail hacked, hackers stole over $40M worth of ICO tokens "IndyWatch Feed Tech"

Cryptocurrency Exchange continues to be a privileged target for hackers, news of the day is the hack of the South Korean exchange Coinrail.

The hack has happened during the weekend, on Sunday Coinrail announced the cyberheist. Attackers stole over $40M worth of ICO tokens that were maintained in the servers of the exchange.

The company published a data breach notification on its website that currently appears in maintenance mode.

The exchange explained that attackers stole tokens issued during the initial coin offerings (ICOs) of Pundi X (NPXS), NPER (NPER), and Aston (ATX).

Most notably, the hackers got away with $19.5 million-worth of NPXS tokens that were issued by payment project Pundi Xs ICO. Added to that they scored a further $13.8 million from Aston X, an ICO project building a platform to decentralize documents, $5.8 million in tokens for Dent, a mobile data ICO, and over $1.1 million Tron, a much-hyped project originating from China. reported TechCrunch.

Thats according to a wallet address that has been identified as belonging to the alleged attacker, who also got hold of smaller volumes of a further five tokens from Coinrail.

South Korea is one of the countries with the highest cryptocurrency trading activity, but Coinrail is one of its smaller exchanges operating over there.

According to, the South Korean exchange ranks in worlds top 90 based on trading volume.

After the discovery of the hack, Coinrail immediately put offline its wallets to secure its cryptocurrency assets, it is currently working with the affected ICO companies to freeze the stolen funds.



20 Years of Earth Data Now at Your Fingertips "IndyWatch Feed Tech"

Powerful Earth-observing instruments aboard NASAs Terra and Aqua satellites, launched in 1999 and 2002, respectively, have observed nearly two decades of planetary change. Now, for the first time, all that imagery from the first operational image to imagery acquired today is available for exploration in Worldview.


Isaac Launches New Era of Autonomous Machines "IndyWatch Feed Tech"

ComputexNVIDIA today announced the availability of NVIDIA Isaac, a new platform to power the next generation of autonomous machines, bringing artificial intelligence capabilities to robots for manufacturing, logistics, agriculture, construction and many other industries.

Launched at Computex 2018 by NVIDIA founder and CEO Jensen Huang, NVIDIA Isaac includes new hardware, software and a virtual-world robot simulator.

AI is the most powerful technology force of our time, said Huang. Its first phase will enable new levels of software automation that boost productivity in many industries. Next, AI, in combination with sensors and actuators, will be the brain of a new generation of autonomous machines. Someday, there will be billions of intelligent machines in manufacturing, home delivery, warehouse logistics and much more.


New York City Bans Use of Activated Charcoal in Food and Drink-Serving Establishments "IndyWatch Feed Tech"

And Just Like That, Goth-Friendly Charcoal Foods Were Canceled

It turns out those highly Instagrammable, pitch-black "goth" foods were far edgier than we could have ever imagined. According to a new report in Eater, the Department of Health says that activated charcoal is currently banned from all food- and drink-serving establishments in NYC. A spokesperson for DOH told Eater that the rule isn't new, but enforcement has increased.

Morgenstern's Finest Ice Cream, that NYC ice cream shop that caused a mini frenzy in 2016 over their popular jet-black ice cream, reportedly had to dump "$3,000 worth of product during a routine inspection," per owner Nick Morgenstern. The ice cream shop posted a cryptic Instagram in late May that hinted something was afoot. The ice cream, which they've been making since 2015, uses coconut asha form of activated charcoal. "I don't see any evidence that this is actually a question of public health safety," Morganstern told Eater. "I would challenge someone to identify the public health safety risk of that ingredient."

Original Submission

Read more of this story at SoylentNews.


Post-AIA, Post-Alice/ 101 USPTO Still Granting Software Patents in Defiance of the (Case)Law "IndyWatch Feed Tech"

Nationality or sovereignty defined by ones patent scope; the danger is, by granting patents in error they associate their patents with weak enforceability

Some questions

Summary: The patent microcosm, which looks for new ways to patent algorithms (in spite of Alice), actually dooms the US patent system by filling it up with invalid patents software patents that are just waiting to be thrown out by courts which can better assess subject matter (no financial incentive to grant aplenty)

THE LITIGATION climate the US became renowned/notorious for is no more; at least as far as patent litigation is concerned. As we said yesterday, a lot of the litigation drifts eastwards to Europe and China, owing to patent maximalism at the EPO and SIPO. Its estimated that this year by years end the USPTO will have marked a decline in patent filings.

We are sadly seeing a failure to reject software patent applications, which eventually perish somewhere like the Federal Circuit or Patent Trial and Appeal Board (PTAB) at a vastly higher cost!The improving patent quality is good news; its bad news to lawyers, but theyre just a tiny minority or a non-producing, unproductive niche. Based on yesterdays advertisement of an upcoming webinar of theirs, theyre trying to come up with new patenting tricks (getting patents on what otherwise would get rejected). The Practising Law Institute (PLI), a patent maximalists group, will cover 35 U.S.C. Sections 101/102/103 and 35 U.S.C. 101: The Complete Guideline Breakdown of Alice, Myriad and Mayo (basically what places restrictions on abstract patents). Theres also...


InvisiMole Spyware is a powerful malware that went undetected for at least five years "IndyWatch Feed Tech"

Malware researchers from ESET have spotted a new sophisticated piece of spyware, tracked as InvisiMole, used in targeted attacks in Russia and Ukraine in the last five years.

Experts still havent attributed the malware to any threat actor, InvisiMole could be a nation-state malware developed for cyber espionage purpose or the result of a development of a financially-motivated group.

The researchers have discovered only a few dozen samples in the wild, the malicious code implements a broad range of features thanks it modular architecture that make the threat very versatile.

Our telemetry indicates that the malicious actors behind this malware have been active at least since 2013, yet the cyber-espionage tool was never analyzed nor detected until discovered by ESET products on compromised computers in Ukraine and Russia. reads the report published by ESET.The campaign is highly targeted no wonder the malware has a low infection ratio, with only a few dozen computers being affected.

At the time the experts still havent discovered the attack vector and there is no info about the types of campaigns in which it was involved.

Experts dont exclude any infection vector, including installation facilitated by physical access to the machine.

The modular structure of the InvisiMole spyware is composed of a wrapper DLL that leverages two other backdoor modules that are embedded in its resources to conduct its activities.

InvisiMole spyware

According to the researchers, the authors of the InvisiMole spyware have removed any clue that could attribute the malware to a specific actor, the unique exception is represented by the compilation data of a single file (dating to October 13, 2013). Compilation dates for all the remaining files have been removed by the authors.

The main module is called RC2FM and supports 15 commands that allow the attacker to search and exfiltrate data from the infected system.

The RC2FM supports commands for gathering system information an...


Pennsylvania Corporate Tax Records Were Available to Public "IndyWatch Feed Tech"

I work for a company where we recently applied for a grant through the Pennsylvania Department of Community and Economic Development. At some point in the application process you need to upload tax records and other documents. However, I learned that these records can be downloaded by anybody -- actually anybody could download all the records. DCED administers over 100 different funding programs and so many tax records for businesses (mostly small businesses) in Pennsylvania were affected.

Here are the main topics of this story: how do you responsibly disclose a vulnerability to government if you, or somebody you know, may have broken federal laws to find it? How do you ensure that it gets fixed? And how do you get credit?

The exploit

First, let's show off the actual exploit. DCED includes a centralized application process for programs and grants that all applicants must follow. Here is the vulnerable step in the application process:

So here is the key part zoomed in:

And if you click it you can verify the file you uploaded. Here's the URL for the tax records I just uploaded:

So I read out the URL to my coworker sitting next to me, or maybe I typed it in on another computer, honestly I forget. And don't you know, somebody else's application or tax records or something came up. What?

Well it turns out the typed in URL had an 8 at the end. I immediately recognized what happened, closed the browser, did not save the file, and understood the implications:

* The files are numerically sequenced
* The files are accessible by anybody
* You do not have to be logged in to access the files

And the consequences of these three tenets are:

* Anybody could download all the tax records from the system by loading starting at SurveyU...


Another Victim of Corrupt Benot Battistelli "IndyWatch Feed Tech"

Thuggery at the EPO is taking its toll on the mental health of staff

Mafia Battistelli

Summary: The judge whom Battistelli attacked, Judge Corcoran, is rumoured to be in a psychiatric hospital after 3.5 years of legal battles and defamation against him

THE plague of suicides at the EPO is undeniable and it can directly be linked to Battistellis policies, (mis)behaviour, and sheer abuses.

Topi is known for causing that (in Croatia), just like Battistelli.Causing ones perceived opponents to commit suicide or sink into depression isnt a novel tactic. Topi is known for causing that (in Croatia), just like Battistelli. We know for a fact that both have been bullying in several courtrooms (and countries) Judge Corcoran and in a recent press dialogue/interview Corcorans lawyer said she thankful that Mr. Corcoran is still alive after all the abuse he was subjected to by Battistelli and his bulldog.

Prowling around the corridors of the Isar building, Mrpel learnt unfortunate news, Mrpel wrote last night. It appears that Mr. Corcoran is in hospital. Mrpel heard he was sent to be treated for psychiatric reasons. Mrpel has no access to the medical file and cats are not familiar of psychiatric hospitals, but there are few reasons to be sent to a psychiatric hospital in Germany. The most common one is when the patient is in danger of committing suicide.

Benot Battistelli, if he has any morsel of guilt left in him, might be able to medicate himself with some wine, having repeatedly abused people who dared (or had the courage) to mention his corruption.


Custom Buttons For Your Game Controller "IndyWatch Feed Tech"

Console gamers have relatively few options when it comes to hardware hacking, unless they wish to partake of some extreme modifications that threaten the very integrity of their machines. So without reaching for a Dremel, how can you insert a little individuality into the same standard components all your friends have?

It seems one answer is to customise your controller with some different buttons. There are commercial outfits that will supply your needs in this direction, but they arent always cheap, and plenty of older machines have no products available. This isnt  a problem for [RockerGaming] though, who shows us how to cast your own set of custom buttons using a silicone mold taken from the originals.

The video is a step-by-step walkthrough of the molding process that could just as easily be applied to any other small plastic parts and is not unique to console buttons. The subjects come from a Sega Saturn controller, in the video a beige model, which raises a passing interest among European Hackaday scribes who remember the Saturn as a black console.

We see the preparation of the original buttons and mold. An acrylic golf ball trophy display case is pressed into service. (Who knew those were even a thing!) A dye is added to the two-part silicone to provide a visual mixing aid, and once the cast mold is separated from the buttons the final resin is poured into it. The cloned buttons are tidied up underneath with a Dremel, and the controller is reassembled.

A set of custom buttons will not improve your gaming, but underlying this is the fact that resin casting is a useful skill. Its somewhere weve been before in depth, so its worth reading our guide from back in 2016.

Thanks [Andrea Campanella] for the tip.


Researchers Have Invented an Awesome And Scary Nuclear Battery Pack "IndyWatch Feed Tech"

Are we ready?

Batteries powered by radioactive materials have been around for more than a century, but what they promise in power they usually lose in bulk.

Not so with a new kind of power source, which combines a novel structure with a nickel isotope to pack ten times more power than an electrochemical cell of the same size. The only question is, are we ready to go nuclear?

A team of Russian researchers have put a new spin on technology that uses the beta decay of a radioactive element to create differences in voltage.


Another missing component could revolutionize electronics "IndyWatch Feed Tech"

Business Impact

Another missing component could revolutionize electronics.

A new theory predicts the existence of an electronic device that works like an inverse transistor. It could make circuits, smaller, faster, and less power hungry.


    Real Estate Booming in Chinese-NK Border Town "IndyWatch Feed Tech"

    Real Estate Jumps In Chinese City Bordering North Korea

    [...] Occasional trains are some of the only traffic left on the China-Korea Friendship Bridge. This is the crossing point for 70 percent of goods entering North Korea from China things like coal, fuel and household appliances which are typically transported from Dandong, a gleaming metropolis, to drab Sinuju, the North's second-largest city.

    But these are atypical times: United Nations sanctions on North Korea for its nuclear and weapons tests have reduced traffic on this bridge to a trickle. The effects are hitting the economy of this Chinese city hard as well. But in April, Dandong's hopes were suddenly lifted. A historic meeting between leaders of North and South Korea provided raised optimism here that the closed country across the river may soon open for business. The summit planned for next week between President Trump and North Korea's leader Kim Jong Un has added more fuel to the anticipation. And investors from across China have flooded in to this border city of 2.4 million. [...] "I've never seen anything like this in Dandong," says [Bob] Li, as workers scurry around him. "We'd have several buyers coming in from all over China buying up apartments. To them, the homes were very cheap, so they would buy as many as possible."

    [...] "The rumor around town is that if the North opens up, it'll finally build a road to the new bridge, and our city will be linked to Seoul by road," says Li. "Pyongyang would just be a stop on the way."

    Also at Reuters.

    Original Submission

    Read more of this story at SoylentNews.


    Instead of Smearing the Judges of the Patent Trial and Appeal Board (PTAB) Check Why Abstract Patents Are Being Granted in the First Place "IndyWatch Feed Tech"

    Hours ago: Do Know Evil? Then Stop Patenting Software, Google

    Judges as moral reasoners - Oxford Journals - Oxford University Press
    Full paper: Judges as moral reasoners Oxford Journals Oxford University Press [PDF]

    Summary: PTAB is taking a lot of heat (albeit always from patent maximalists) for simply applying the law, which ought to have been applied by the Office at the time of examination; confidence in US patents depends on the Offices ability to discern/distinguish patentable subject matter from clearly unpatentable subject matter

    The Patent Trial and Appeal Board (PTAB) has made a few headlines this past week. Michael Loney, who is based in New York, took note of some precedential decisions:

    The PTAB has de-designated Idle Free and Master Image in response to Aqua Products. Fiscal year 2018s first half set a motion to amend record for two consecutive quarters

    The Patent Trial and Appeal Board (PTAB) has de-designated as precedential MasterImage 3D v RealD, Case IPR2015-00040 (PTAB July 15, 2015) (Paper 42) and has de-designated as informative Idle Free Sys v Bergstrom, Case IPR2012-00027 (June 11, 2013) (Paper 26).

    Much of the coverage about PTAB, however, has been hostile. As expected, it came from longtime PTAB bashers and anti-PTAB sites. Those sites have a proven disdain for patent quality. Rather than ignore those sites wed like to quickly respond to these.

    Referring to a case from the first of June, Watchtroll now cherry-picks one of those rare cases where the Federal Circuit either overrules or...


    Playing piano with a mind-controlled robotic arm "IndyWatch Feed Tech"

    The arm/hand probably intended for the ATLAS robot. Id be curious if they are already playing with attaching it on to the robot.

    The first person to live with a mind-controlled robotic arm is teaching himself piano. Johnny Matheny has spent the last five months with an advanced prosthetic, designed to replace the human hand and arm.

    The robot arm is part of a research project run through the Johns Hopkins University Applied Physics Lab, and funded, in part, by the US Department of Defense. Data that researchers collect could revolutionize future mind-controlled robotics.

    This is the second video in a series following Johnny has he spends the year with the arm.

    Watch the arm being delivered:



    Check out the rest of our videos:


    The International Trade Commission (ITC/USITC) Will Possibly Get Abolished Unless It Can Reform Itself "IndyWatch Feed Tech"

    Example from last month, impacting a Japanese firm

    Nintendo faces Switch patent infringement investigation in the US

    Summary: The International Trade Commission (actually US, its not an international agency) continues to overzealously guard US interests, even if that means blocking the competition from abroad, based on some sketchy patents with burden of proof on the accused

    The ITC is the US embargo (e.g. imports ban) agency, at least for patent complaints; it often seems like its just serving exceptionally large US corporations that can afford access to it; its rare to see small companies or foreign companies utilising ITC. Microsoft used ITC for one of the earlier instances of patent aggression (against rival computer mice) and in recent years weve been covering several instances of ITC misuse of laws or failing to respect tribunals such as the Patent Trial and Appeal Board (PTAB), even if the Federal Circuit later affirmed its decisions. Something is clearly not working right at the ITC (law not being applied correctly, or sanctions applied prematurely without proper due process) and it could use a reboot if not just the boot. According to this short report (behind a paywall), ITC changes its rules. To quote Managing IP:

    The International Trade Commission (ITC) has implemented 11 rule changes in an attempt to modernise and clarify the existing system. Coming into effect today, some changes simply formalise existing practices; others may cause complainants to rethink their approach.

    If ITC fails to reform itself, which has thus far been the case, then it might simply perish. Agencies like ITC stigmatise themselves as uncaring for justice/legal process.


    Evidence Found for a New Fundamental Particle - Facts So Romantic "IndyWatch Feed Tech"

    Reprinted with permission from Quanta Magazines Abstractions blog.

    An experiment at the Fermi National Accelerator Laboratory near Chicago has detected far more electron neutrinos than predicteda possible harbinger of a revolutionary new elementary particle called the sterile neutrino.Photograph of nside the MiniBooNE tank, photodetectors capture the light created when a neutrino interacts with an atomic nucleus, by Reidar Hahn / Fermilab

    Physicists are both thrilled and baffled by a new report from a neutrino experiment at Fermi National Accelerator Laboratory near Chicago. The MiniBooNE experiment has detected far more neutrinos of a particular type than expected, a finding that is most easily explained by the existence of a new elementary particle: a sterile neutrino thats even stranger and more reclusive than the three known neutrino types. The result appears to confirm the anomalous results of a decades-old experiment that MiniBooNE was built specifically to double-check.

    The persistence of the neutrino anomaly is extremely exciting, said the physicist Scott Dodelson of Carnegie Mellon University. It would indicate that something is indeed going on, added Ane Slosar of Brookhaven National Laboratory.

    As for what, no one can say.

    Im very excited about this result, but I am not ready to say Eureka! said 
    Read More


    Do Know Evil? Then Stop Patenting Software, Google "IndyWatch Feed Tech"

    Google is patenting algorithms (sometimes not even its own)

    Google patent

    Summary: Complaints that Google is claiming credit for other peoples work and then patenting that, in effect pulling an Edison to stockpile questionable patents while occasionally resorting to patent aggression

    LAST year someone told us the story of how Google had used Alex Converse to patent someone else's work. This was particularly disturbing not just because of prior art but also because of patent scope.

    It would be bad if Google ever got granted any patent on anything related to asymmetric numeral systems (ANS) because its an algorithm.Well, the originator of the method speaks out again. Jarek Duda was making some headlines last year and now hes back. Rather than walk away and apologise Google seems to be doubling down on its bad practice, which involves patenting software:

    When Jarek Duda invented an important new compression technique called asymmetric numeral systems (ANS) a few years ago, he wanted to make sure it would be available for anyone to use. So instead of seeking patents on the technique, he dedicated it to the public domain. Since 2014, Facebook, Apple, and Google have all created software based on Dudas breakthrough.

    But now Google is seeking a patent that would give it broad rights over the use of ANS for video compression. And Duda, a computer scientist at Jagiellonian University in Poland, isnt happy about it.

    Google denies that its trying to patent Dudas work. A Google spokesperson...


    Medical Video of a Freshly-Removed Human Brain is Strangely Beautiful "IndyWatch Feed Tech"

    Even though you use your brain to do a lot of thinking, you probably don't think about your brain that often.

    It's an incredibly complex, incredibly precious organ. It's also incredibly squishy, as you can see in an amazing teaching video that demonstrates a freshly removed brain straight from autopsy.

    As the neuroanatomist handles the vulnerable blob with the utmost care, it's awe-inspiring to realise that each one of us has a squishy brain just like it - and it contains all our memories and thoughts.

    [...] And that's actually one of the purposes of the video - apart from being a teaching material, the university wanted "to stress the vulnerability of the brain to highlight the importance of wearing helmets, seat belts, and taking care of this very precious tissue."

    Original Submission

    Read more of this story at SoylentNews.


    Nucleus of the cell mapped in 3D "IndyWatch Feed Tech"

    For the first time, researchers have mapped the cell nucleus in 3D, revealing the packaging and organization of a cells DNA in unprecedented detail.

    June 8 (UPI) The nucleus of the cell is where the action happens, but its not easy to analyze the behavior of a massive genome inside an area 50 times smaller than the width of a human hair.

    Now, for the first time, researchers have mapped the cell nucleus in 3D, revealing the packaging and organization of a cells DNA in unprecedented detail.

    Inside each cell is the same massive chain of DNA. But most of the coding lies dormant. The combination of genetic sequences within in the chain that are turned off or on and expressed via RNA determines the role and functionality of each cell.


    Password strength meter "IndyWatch Feed Tech"

    This post is a reply to it shows two great user interfaces you can use on your website to show the visitor how strong their password is.

    ----------VERSION 1--------------------------

    Create a Password


    Password-strength meter:
    POOR: Anything you type in the that box is a poor password. Because we will make you change it periodically and we tell you not to use this password on other sites, but you will do it anyway.

    ----------VERSION 2--------------------------

    Choose a new Password

    Please select your new password from one of the choices below:


    EXCELLENT: We know nobody will ever randomly guess this password because we just randomly made it. If you intended to remember this password, don't, you need a password manager.


    WebSound 2GB KVM w/ 4 cores & 100GB HDD @ ~$6.68/mo and more! "IndyWatch Feed Tech"

    Callum from has sent over another awesome offer for us all to enjoy! Theyve been around since 2013 and have had nothing but great feedback around our community.

    Theyre a registered company in the UK (VAT Number: GB 203028955). They accept PayPal, Debit/Credit Card (Stripe) or BitCoin (Coinify). You can find their ToS/Legal Documents here.

    In their own words: 

    WebSound is an affordable, reliable hosting provider launched in 2013 We have previously featured on LEB before and frequent offers around the LET community, however, we feel its time to bring a new, exclusive offer for the LEB community themselves again. We specialize in offering a variety of affordable VPS and Web Hosting services to cater for the needs of a wide range of clients, and our previous VPS hosting offers have been very popular among the community in the past, we hope that this offer can be met with the same popularity and demand as previously as we try to deliver something new and some updated features within our control panel since our last offering.

    Exclusive Offer: LEB-KVMH50 gets 50% recurring off of all KVMH plans on any billing cycle, PLUS double disk space OR double bandwidth, open a support ticket on ordering to choose which double benefit you receive!

    • 256MB RAM (256MB SWAP)
    • 1 x CPU
    • 15GB HDD
    • 1TB Transfer
    • 1 x IPv4
    • /64 IPv6 Available
    • KVM (Virtualizor)
    • Promo Code: LEB-KVMH50
    • 11/yr($14.69)
    • [ORDER]
    • 512MB RAM (512MB SWAP)
    • 2 x CPU
    • 25GB HDD
    • 2TB Transfer
    • 1 x IPv4
    • /64 IPv6 Available
    • KVM (Virtualizor)...


    High Voltage Switching with MOSFETs "IndyWatch Feed Tech"

    Using a MOSFET as a switch is generally pretty simple. Make the gate voltage sufficient with respect to the source and current flows through the channel. However, if you are switching higher voltages, you may need some additional circuitry to protect the devices gate and possibly the microcontroller driving the whole thing, too. [Lewis] discusses high voltage switching in the latest in his series of videos dealing with MOSFETs. You can see the video below.

    Youll see in the video a breadboard setup driving a 50 V load and also a higher-voltage H-bridge. There are three major topics covered: Using an optoisolator, using a gate bleeder resistor, and using a zener diode to limit gate voltage.

    Of course, an optoisolator isnt necessary with or without the high voltage, as long as everything works well. It can, however, prevent high-frequency noise from conducting from the FET channel through the gate acting as a capacitor. It can also be useful for saving the controller if there is a failure that shorts the channel to the gate.

    The bleeder resistor isnt specific to high voltages, either. Because the gate is practically an open circuit at DC, it is a good idea to add a resistor like this so that when the gate drive is off, you dont have to wait for the charge on the gate to dissipate. In addition, the resistor offers some protection against electrostatic discharge (ESD) damage, since the ESD will tend to flow through the resistor instead of punching through the gate oxide on the device.

    The zener sees service in two ways. At first, the circuit uses it to derive 12 V from the 50 V supply. However, in a later incarnation, the design uses it as a clamp to keep a P-channels gate at 12 V. These are both important because the maximum rating of the gates is 20 V.

    Although the devices in the video are IRF630s and IRF9630s, the principles apply to lots of different kind of FETs. Just remember what you kind you have and understand the datasheet before you finalize your design.

    If you want something more basic, there are plenty of tutorials. Weve even looked at high-side switches in detail.


    Jurassic World: Can we really resurrect a dinosaur? "IndyWatch Feed Tech"

    This summer, the fifth instalment of the Jurassic Park franchise will be on the big screen, reinforcing a love of dinosaurs that has been with many of us since childhood. There is something awe inspiring about the biggest, fiercest, and deadest creatures that have ever walked the planet. But the films have had an additional benefit they have sparked an interest in dinosaur DNA.

    The Mr DNA sequence in the original movie is a great piece of science communication and the concept of extracting DNA from the bodies of dino blood-engorged mosquitoes is an outstanding piece of fiction. It is, however, just fiction.


    iPhone Always Tracks your Movements "IndyWatch Feed Tech"

    A feature called Significant Locations collects a detailed history of places you visit on a regular basis. The feature can be disabled via Settings > Privacy > Location Services > System Services > Significant Locations. The feature can be disabled, and history of data collected can be deleted. Apple claims that Significant Locations are encrypted and cannot be read by anyone except the phone owner. Yet, most iPhone users are unaware that their phone records their current location and calculates which locations are significant. Why hasn't Apple made people more aware of this potential violation of their privacy?

    Original Submission

    Read more of this story at SoylentNews.


    A Biotech Entrepreneur Aims To Help Us Stay Young While Growing Old "IndyWatch Feed Tech"

    Startup, Unity Biotechnology, prevents agingand its not as crazy as it seems.

    Now on his fifth startup, Ned David has the blueprint for creating a lucrative biotech. His latest project: a company that will take on the ravages of aging.


    DistroWatch Weekly, Issue 767 "IndyWatch Feed Tech"

    This week in DistroWatch Weekly: Review: Android-x86 7.1-r1News: Running Linux From Scratch with Debian package management, TrueOS changes course, OpenMediaVault and pfSense react to GDPR, ArchLabs leaves GitHub, Haiku ports LibreOfficeTips and tricks: OpenSSH, pipes and file transfersReleased last week: Devuan 2.0.0, GeckoLinux 150Torrent corner: Archman, AUSTRUMI, Berry,....


    America is unprepared for the jobs apocalypse automation will bring "IndyWatch Feed Tech"

    Millions of low-skilled workers who are already being pushed out will need to adapt to the new economy.


    HPR2571: Kill Dr. Lucky "IndyWatch Feed Tech"

    Details about Kill Doctor Lucky on


    India Increases Its Massive 2022 Renewable Energy Target "IndyWatch Feed Tech"

    For the last several years, CleanTechnica has covered renewable energy development in India quite closely. Several years ago, India set what seemed like a lofty target of 175 gigawatts of wind and solar energy by March 2022. Few believed that was a practical target, but then India plowed forward and happily impressed the world. This week that goal was increased to 227 gigawatts!

    Currently, India has added a little more than 70 gigawatts of that goal. Assessing the progress to date on a linear scale, the trend would seem to indicate the country is behind. However, renewable energy growth is not linear.


    Week in review: Zip Slip, GDPR and the US, why creativity is key to security "IndyWatch Feed Tech"

    Heres an overview of some of last weeks most interesting news and articles: VPNFilter malware targets new devices, can deliver exploits to endpoints Cisco Talos researchers have news about the VPNFilter malware, and it doesnt look good. Why creativity is key to security Security teams are often viewed as a hindrance to business growth. They are deemed the killjoys of business innovation by imposing restrictions on access, rules and controls, and responding with no. Given More

    The post Week in review: Zip Slip, GDPR and the US, why creativity is key to security appeared first on Help Net Security.


    Bitcoin falls after Korean exchange loses $40M following hack attack "IndyWatch Feed Tech"

    By Waqas

    Coinrail, a South Korea-based cryptocurrency exchange has suffered a massive

    This is a post from Read the original post: Bitcoin falls after Korean exchange loses $40M following hack attack


    Hackaday Links: Benchoff Rants On Flying Cars "IndyWatch Feed Tech"

    Need a reverse engineering challenge? Heres something from American Science and Surplus. Its a 48 x 12 LED matrix, loaded up with driver ICs and power regulators. $20 a piece, so stock up and save.

    Finally, the main event. The biggest story in aviation this week is that a media embargo has lifted on the Kitty Hawk Flyer. Kitty Hawk is a startup funded by Larry Page, CEOd by Sebastian Thrun, and has received $6.5 M in funding. The Flyer, a one-man decacopter, was announced to the world through CNN Money and Casey Neistat. It should be noted that in the entire media landscape, these are the two outlets most ignorant of aviation: CNN needs no explanation, and Neistat flies quadcopters through the Hudson River Corridor at 1000 feet AGL. Additionally, Kitty Hawk is not exhibiting at AirVenture next month, which leads me to believe Kitty Hawk is trying to stay out of the aviation industry or simply doesnt want knowledgeable people asking them questions. But I digress.

    The Kitty Hawk Flyer is being promoted by the company as a personal flying vehicle to make flying part of everyday life and a machine that will give you, a world free from traffic. It is being billed by CNN and Neistat as a flying car. Kitty Hawk is just fine with allowing the media to call it as such. Additionally, Sebastian Thrun is making claims about the Flyer that are disingenuous at best, outright illegal at worst, and should draw the ire of any investors.

    In the CNN Money piece, Thrun claims the Flyer is capable of traveling at 100 miles per hour, which would be illegal. The Flier is certified as a Part 103 Ultralight, and under that regulation the Flyer is not capable of more than 55 knots calibrated airspeed at full power...


    Fresh Water from Air "IndyWatch Feed Tech"

    Submitted via IRC for Fnord666

    In desert trials, next-generation water harvester delivers fresh water from air

    Scientists who last year built a prototype harvester to extract water from the air using only the power of the sun have scaled up the device to see how much water they can capture in arid conditions in Arizona. Using a kilogram of MOF[*], they were able to capture about 7 ounces of water from low-humidity air each 24-hour day/night cycle. A new and cheaper MOF could double that.

    [...] "There is nothing like this," said Omar Yaghi, who invented the technology underlying the harvester. "It operates at ambient temperature with ambient sunlight, and with no additional energy input you can collect water in the desert. This laboratory-to-desert journey allowed us to really turn water harvesting from an interesting phenomenon into a science."

    [*] Metal-organic frameworks (MOFs) are:

    compounds consisting of metal ions or clusters coordinated to organic ligands to form one-, two-, or three-dimensional structures. They are a subclass of coordination polymers, with the special feature that they are often porous. The organic ligands included are sometimes referred to as "struts", one example being 1,4-benzenedicarboxylic acid (BDC).

    Also at Berkeley News.

    Practical water production from desert air (open, DOI: 10.1126/sciadv.aat3198) (DX)

    Original Submission

    Read more of this story at SoylentNews.

    Go Back:30 Days | 7 Days | 2 Days | 1 Day

    IndyWatch Science and Technology News Feed Today.

    Go Forward:1 Day | 2 Days | 7 Days | 30 Days

    Sunday, 10 June


    Til Deletion Do Us Part: Discovering Love in a Virtual Future "IndyWatch Feed Tech"

    What does it mean to fall in love in the 21st century? Originally, the number of people you could fall in love with were limited to the amount that lived within relative close proximity of you (a few miles, at best). In todays world, however, it isnt that uncommon for people to fall in love online.

    As we move forward into a future of VR and AI, how might our abilities to fall in love change in a world where non-biological life is teeming just as much as biological life?


    Scientists Discovered a New Part of Your Sperm and It Could Explain Infertility "IndyWatch Feed Tech"

    Scientists have discovered that sperm contain two centrioles, as opposed to one and that additional centriole could explain infertility.


    Berkeleys desert water extractor is taking us one step closer to harvesting water out of thin air "IndyWatch Feed Tech"

    Right now, there are roughly 16 sextillion liters of water suspended in the atmosphere. The air around you is a river, you just cant see it.

    Harvesting water from air would be a game-changing solution to tackling freshwater scarcity, which is increasing as the world warms. It would be especially vital in places with very little humidity in the air, like the desert. But while its technically possibleyou just need to get the water content in the air to condense around somethingdoing so efficiently has been difficult, until now.

    The challenge with this technology is cooling. Water vapor will only condense into a liquid if the material it condenses on is cooler than the surrounding air. Thats why droplets of condensation will appear on a soda can the moment you take it out of the fridge. But how do you leave a piece of machinery in the desert sun all day and keep it cooler than the surrounding air? One way would be to install a cooling system. But it takes a a lot of energy to perpetually cool an object in a hot place, and isnt feasible in places where energy is expensive. We also dont want to increase the amount of energy demand in a world already struggling to reduce emissions.


    Early PHP 7.3 Performance Benchmarks Are Looking Good "IndyWatch Feed Tech"

    Released this week was the first alpha of PHP 7.3 and I decided to take it for a spin with some benchmarks. While not as dramatic as going from PHP5 to PHP 7.0, the performance of PHP7 continues getting better...


    Remarkable Skill of Ancient Peru's Cranial Surgeons "IndyWatch Feed Tech"

    Submitted via IRC for Fnord666

    [...] After all, who needs a hole in the head? Yet for thousands of years, trepanation -- the act of scraping, cutting, or drilling an opening into the cranium -- was practiced around the world, primarily to treat head trauma, but possibly to quell headaches, seizures and mental illnesses, or even to expel perceived demons.

    [...] "In Incan times, the mortality rate was between 17 and 25 percent, and during the Civil War, it was between 46 and 56 percent. That's a big difference. The question is how did the ancient Peruvian surgeons have outcomes that far surpassed those of surgeons during the American Civil War?"

    [...] Whatever their methods, ancient Peruvians had plenty of practice. More than 800 prehistoric skulls with evidence of trepanation -- at least one but as many as seven telltale holes -- have been found in the coastal regions and the Andean highlands of Peru, the earliest dating back to about 400 B.C. That's more than the combined total number of prehistoric trepanned skulls found in the rest of the world.

    Source: Remarkable skill of ancient Peru's cranial surgeons

    Original Submission

    Read more of this story at SoylentNews.


    Super Chromatic Peril Sensitive Sunglasses "IndyWatch Feed Tech"

    The Joo Janta 200 super-chromatic peril-sensitive sunglasses were developed to help people develop a relaxed attitude to danger. By following the principle of, what you dont know cant hurt you, these glasses turn completely opaque at the first sign of danger. In turn, this prevents you from seeing anything that might alarm you.

    Here we see the beginnings of the Joo Janta hardware empire. For his Hackaday Prize entry, [matt] has created Nope Glasses. Is that meeting running long? Is your parole officer in your face again? Just Nope right out of that with a wave of the hand.

    The Nope Glasses are two LCD shutters mounted in a pair of 3D printed glasses. On the bridge of the glasses is an APDS 9960 gesture sensor that tracks a hand waving in front of the glasses. Waving your hand down in front of the glasses darkens the shutters, and waving up makes them clear again. Waving left flashes between clear and dark, and waving right alternates each shutter.

    In all seriousness, there is one very interesting thing about this project: how [matt] is attaching these LCD shutters to his glasses. This was done simply by taking a picture of the front and top of his glasses, converting those to 1-bit BMPs, and importing that into OpenSCAD. This gave him a pretty good idea of the shape of his glasses, allowing him to create an attachment for his glasses. Its great work, and wed really like to see more of this technique.

    The HackadayPrize2018 is Sponsored by:


    Links 10/6/2018: Devuan ASCII 2.0.0 and Tails 3.7.1 "IndyWatch Feed Tech"

    GNOME bluefish



    • Desktop

      • Linux Apps (Crostini) Headed To A Lot More Chromebooks

        The Chromium developers have been very busy as of late bringing life to the Crostini Project that will give users the ability to run Linux apps natively on Chrome OS. While Linux on Chromebooks isnt a new trick, the Crostini UI presents a clean, hack-free method to launch Linux apps from the terminal app that will eventually live in Chrome OSs app drawer when enabled.

        Initially birthed in Googles own Pixelbook, Linux apps on Chrome OS has now spread to ARM in the form of the Samsung Chromebook Plus. Although its still in its infancy, its becoming clear that developers are pushing to make the Crostini project a stable part of the Chromebook ecosystem.

      • Battery on my new Librem 13

        Being lazy, I wanted a way to automate that when using my new Librem laptop. Again, I could look into a power/charging threshold for the Librem. But for less than $20, I picked up a power strip that had a timer (Century 8 Outlet Surge Protector with Mechanical Timer). Four outlets on the strip are always on, and four are connected to a built-in timer. That allows me to plug in my monitor and LED desk light to an always-on outlet, and my lap...


    Wire for Beginners "IndyWatch Feed Tech"

    In the crowded world of encrypted messaging apps, few tools stand out.

    Wire gives you encrypted voice calls, video calls, and messaging. It uses wireless data (through a mobile plan or wi-fi), which can help save money on phone calls and SMS charges. This is great for those of us who want to call or text our friends without eating up an expensive phone plan. It also supports most major operating systems.

    On Wire, conversations are end-to-end encrypted, meaning that no one except the conversational participants can read the messages. Its open source, meaning that its code is publicly viewable. This also means it can be examined for security holes. After responding to security audits, the team has developed a fairly hardened, yet simple messenger that continues to improve.

    Competitive messaging apps with similar encryption, such as Signal and WhatsApp, require users to register for the service with a phone number. And while there are workarounds, this move has serious privacy implications for those who prefer not to give away a personal number before you can chat. On Wire, you can simply register with an email.

    While Wire has strong encryption and robust features, the service collects and retains a lot of metadatainformation about your conversations, such as your contacts, and who spoke to whom. Compare this to the more conservative Signal app. And because it has a web interface, we should take extra precautions to make sure no one else can log in.

    Getting started with Wire

    First, find Wire for iPhone or Android here, or search for it in the App Store or Google Play store.

    When you first launch the app on your phone, it will ask you to register a...


    Ethical Artificial Intelligence is the need of the hour "IndyWatch Feed Tech"

    At a time when governments and organisations across the world are trying to harness the powerful technology, the need for an ethical AI has never been more important.

    Kul Bhushan


    Cancer hasnt got a chance with this new immunotherapy technique "IndyWatch Feed Tech"

    Researchers now have an antibody that specifically targets cancer cells, while leaving healthy ones alone.


    Real-Time Drone Surveillance System for Violent Individuals Identification "IndyWatch Feed Tech"

    A new algorithm has been used to detect violence in drone-captured video footage:

    A drone surveillance system capable of highlighting "violent individuals" in a crowd in real time has been built by [researchers].

    The artificially intelligent technology uses a video camera on a hovering quadcopter to study the body movements of everyone in view. It then raises an alert when it identifies aggressive actions, such as punching, stabbing, shooting, kicking, and strangling, with an accuracy of about 85 per cent. It doesn't perform any facial recognition it merely detects possible violence between folks. And its designers believe the system could be expanded to automatically spot people crossing borders illegally, detect kidnappings in public areas, and set off alarms when vandalism is observed.

    The inventors are based at the University of Cambridge, in England, India's National Institute of Technology, and the Indian Institute of Science. They hope their autonomous spy drones will help cops crush crime and soldiers expose enemies hiding in groups of innocents.

    Also at Science Magazine.

    Eye in the Sky: Real-time Drone Surveillance System (DSS) for Violent Individuals Identification using ScatterNet Hybrid Deep Learning Network (arXiv:1806.00746)

    Original Submission

    Read more of this story at SoylentNews.


    Project Daedalus, Qiao Chen "IndyWatch Feed Tech"

    A concept of a space ship. Made by 3dsmax.


    Search Engines in Russia cannot link to banned VPN services and Internet proxy services "IndyWatch Feed Tech"

    Russia strengthens online censorship by announcing fines for search engines that link to VPN serviced banned in the country.

    Russian Government has approved a new bill to punish search engines that are not aligned with Moscow and that allows its users to find VPN services, and anonymization tools that allow circumventing the censorship.

    According to the amendments to the Code of Administrative Offenses of the Russian Federation, Duma will also impose fines on search engines if they will continue to provide results about queries on an up-to-date database of blocked domains upon users request.

    Fines for individuals will range between 3,000 and 5,000 rubles (roughly $48 to $80), while officials will face fines up to 50,000 rubles (roughly $800), and legal entities will face fines between 500,000 to 700,000 (roughly $8,019 to $11,227).

    The failure of the operator to perform the search system to connect to this system entails the imposition of an administrative fine on citizens in the amount of three thousand to five thousand rubles; on officials from thirty thousand to fifty thousand rubles; on legal entities from five hundred thousand to seven hundred thousand rubles, - reads the press release published by the Duma.

    Russians ordinary use VPN services and other anonymizing services to access blocked content and bypass censorship, in the following graph we can see the continuous growth for the number of Tor users in Russia.

    Search Engines Tor User VPN Russia


    In 2017, Russias parliament voted to ban web tools that could be used by people to surf outlawed websites, and the Duma approved the proposed bill to oblige anyone usi...


    New game Star Wars Jedi: Fallen Order will let you play a Jedi "IndyWatch Feed Tech"

    It will be set between Revenge of the Sith and A New Hope.

    Titanfall developer Respawns Vince Zampella gave us a small teaser during todays EA conference at E3, and while there arent many details yet, what we know so far sounds juicy. Yes, theres a new Star Wars game dropping holiday 2019 called Jedi: Fallen Order, and its being made by the people behind one of the best shooters of this generation, Titanfall 2.

    According to the games website, Jedi: Fallen Order will take place during the period shortly after Revenge of the Sith, following a surviving Padawan during the dark times of the franchise when the Jedi are being hunted down. Zampella said on Twitter that itll be a single-player story game thats dark and gritty.

    Thats not much to got on, as Respawn didnt release a trailer, key art, or anything else, but Zampella did note that youll get to wield a lightsaber. Given that Respawn is behind the game, theres plenty of reason to be excited.


    Priests and scientists talk neuroscience, cosmology, and philosophy "IndyWatch Feed Tech"

    The typical contemporary view assumes that there is going to be some deep tension between faith and science. From our perspective thats an illusion.

    Washington D.C., Jun 10, 2018 / 05:00 am (CNA).- A Thomistic philosopher, an evolutionary biologist, and a Harvard astronomy professor walk into a bar. Well, not a bar.

    But they did walk into a Washington, D.C. symposium this week, at which graduate students, professors, religious sisters, and other curious Catholics discussed highly technical scientific questions over bourbon and pecan pie, late into the night.

    The three-day conference, co-sponsored by the Thomistic Institute and the Society of Catholic Scientists, brought together nearly 70 professors and graduate students from Princeton, Harvard, Yale, MIT, the University of Chicago, and other universities across the country to examine the intersection of faith and science.


    The asteroid rush sending 21st-century prospectors into space "IndyWatch Feed Tech"

    A race is on to mine billions of dollars in resources from the solar systems asteroids, fuelling our future among the stars.


    Joe Grand is Hiding Data in Plain Sight: LEDs that Look Solid but Send a Message "IndyWatch Feed Tech"

    Thursday night was a real treat. I got to see both Joe Grand and Kitty Yeung at the HDDG meetup, each speaking about their recent work.

    Joe walked us through the OpticSpy, his newest hardware product that had its genesis in some of the earliest days of data leakage. Remember those lights on old modems that would blink when data is being transmitted or received? The easiest way to design this circuit is to tie the status LEDs directly to the RX and TX lines of a serial port, but it turns out thats broadcasting your data out to anyone with a camera. You cant see the light blinking so fast with your eyes of course, but with the right gear you most certainly could read out the ones and zeros. Joe built an homage to that time using a BPW21R photodiode.

    Transmitting data over light is something that television manufacturers have been doing for decades, too. How do they work in a room full of light sources? They filter for the carrier signal (usually 38 kHz). But what if youre interested in finding an arbitrary signal? Joes bag of tricks does it without the carrier and across a large spectrum. It feels a bit like magic, but even if you know how it works, his explanation of the hardware is worth a watch!

    The demos of OpticSpy pulling data out of a seemingly solid red LED were a blast to see. Im glad that Joe also spend time walking through the circuit:



    Ankur Bargotra joins our blog team with the post What Is Cognitive Computing (How AI Will Think). "IndyWatch Feed Tech"

    Ankur Bargotra joins our blog team with the post "What Is Cognitive Computing (How AI Will Think)".


    Tips for an Information Security Analyst/Pentester career - Ep. 58: Blue vs red: does it still make sense? "IndyWatch Feed Tech"

    I recently participated in a very exciting PeerTalk on Pentesting and had a long and stimulating conversation with all members, featuring, among others, Georgia Weidman.

    I couldn't believe she really took the time to participate and she found some of my points valid.

    I had to pinch myself, I mean WOW!

    However, this post isn't for me to brag about this achievement, but to wrap up some concepts emerging from the panel that I found absolutely paramount.

    The most important of which is, in my opinion, that we need to move over the strict red team/blue team distinction and to rethink and redesign the role of pentesters in general, along with the purpose of penetration testing overall.

    In fact, there seems to be an over-emphasis on offensive security and on red teamers for the heck of it, without thinking of what a pentest can actually add in terms of value for a business nor of what lessons an organization can learn from it.

    Though a shift seems to have started developing, as the best and brightest hackers, such as my former boss Dave Kennedy and John Strand, are re-evaluating defensive security and developing solutions to help defenders and assist companies to defend better, a lot of work seems to be needed in order to improve things under this point of view.

    Don't get me wrong, offensive security is fun, I LOVE offensive security and I'd like for me to be a red teamer, too, but blue teamers (including myself) are the often unsung heroes here.

    Blue teamers need to be right all the time. Red teamers (and black hat hackers) only need to be right once and they're in.

    If you pwn the heck out of an organization this is sure fun but it's pointless and needless...


    Re: Re : Re: [oss-security] CVE-2018-12020 in GnuPG "IndyWatch Feed Tech"

    Posted by Yves-Alexis Perez on Jun 10

    Hi Stepian,

    Not entirely sure what you mean here, but if you're talking about the apt
    package managers (which relies on gpgv for signature verification), it's
    currently investigated.



    What Is Cognitive Computing (How AI Will Think) "IndyWatch Feed Tech"

    Recommended Books

    Life 3.0
    The Master Algorithm

    This video is the eleventh in a multi-part series discussing computing. In this video, well be discussing what cognitive computing is and the impact it will have on the field of computing.

    [0:285:09] Starting off well discuss, what cognitive computing is, more specifically the difference between current computing Von Neuman architecture and more biologically representative neuromorphic architecture and how these two paired together will yield massive performance and efficiency gains!

    [5:0910:46] Following that well discuss, the benefits of cognitive computing systems further as well as current cognitive computing initiatives, TrueNorth and Loihi.

    [10:4617:11] To conclude well extrapolate and discuss the future of cognitive computing in terms of brain simulation, artificial intelligence and brain-computer interfaces!


    JT4G detection algorithm for DSLWP-B "IndyWatch Feed Tech"

    Now that DSLWP-B has already been for 17 days in lunar orbit, there have been several tests of the 70cm Amateur Radio payload, using 250bps GMSK with an r=1/2 turbo code. Several stations have received and decoded these transmissions successfully, ranging from the 25m radiotelescope at PI9CAM in Dwingeloo, the Netherlands (see recordings here) and the old 12m Inmarsat C-band dish in Shahe, Beijing, to much more modest stations such as DK3WNs, with a 15.4dBic 20-element crossed yagi in RHCP. The notices for future tests are published in Wei Mingchuan BG2BHCs twitter account.

    As far as I know, there have been no tests using JT4G yet. According to the documentation of WSJT-X 1.9.0, JT4G can be decoded down to -17dB SNR measured in 2.5kHz bandwidth. However, if we dont insist on decoding the data, but only detecting the signal, much weaker signals can be detected. The algorithm presented here achieves reliable detections down to about -25dB SNR, or 9dB C/N0.

    This possibility is very interesting, because it enables very modest stations to detect signals from DSLWP-B. In comparison, the r=1/2 turbo code can achieve decodes down to 1dB Eb/N0, or 25dB C/N0. In theory, this makes detection of JT4G signals 16dB easier than decoding the GMSK telemetry. Thus, very small stations should be able to detect JT4G signals from DSLWP-B.

    As described in the WSJT-X documentation, the JT4 family uses 4FSK at 4.375baud. A total of 206 symbols are transmitted over the 47.09s that a complete message lasts. A pseudo-random 206 bit sync vector is used for time and frequency synchronization. The sync vector is the following (note that there is an error in the WSJT-X documentation):


    The autocorrelation function of this sequence is shown below, both in a linear scale and in dB units.



    Elon Musk has job openings for more than 500 people at SpaceX heres who the rocket company wants to hire "IndyWatch Feed Tech"

    SpaceXs careers page shows that the rocket company, which Elon Musk founded in 2002, is on a hiring spree. New hires seem to be working on the Starlink


    SpaceX Plans to Expand Presence at Kennedy Space Center "IndyWatch Feed Tech"

    SpaceX plans to build an Operations Area on 63-67 acres between the Kennedy Space Center's Vehicle Assembly Building and Industrial Center. The highlights include 300-foot tall tower housing a launch and landing control center, a booster and fairing processing and storage facility, and a rocket garden:

    It will be an operational monument to Elon Musk's vision: a towering SpaceX launch control center, a 133,000-square-foot hangar and a rocket garden rising in the heart of Kennedy Space Center.

    According to plans detailed in a draft environmental review published recently by KSC, SpaceX will undertake a major expansion of its facilities at the space center sometime in the not-too-distant future.

    The review says SpaceX is seeking more room and a bigger presence "in its pursuit of a complete local, efficient, and reusable launch vehicle program."

    The expansion would enable SpaceX to store and refurbish large numbers of Falcon rocket boosters and nose cones at the operations center down the road from NASA's Vehicle Assembly Building.

    Original Submission

    Read more of this story at SoylentNews.


    Rampant Kodi Malware? Its Time to Either Put Up or Shut Up "IndyWatch Feed Tech"

    Faced with a tsunami of pirated movies and TV shows being accessed at will through millions of piracy-enabled set-top boxes, entertainment industry groups have had to come up with a new anti-piracy strategy.

    The main goal seems to demonize these devices in the press, creating the impression that anyone using them puts themselves in danger, either due to fire risk or exposure to the perils of viruses and malware.

    These claims are perfect tabloid material. Newspapers, particularly in the UK, gobble up press releases and quickly spin them out, whether they have any substance to them or not. While theres little evidence that the scare stories are working as a deterrent among the pirating masses, they are a continuous source of irritation for those who know better.

    This week a new Kodi-related video appeared on YouTube. Filmed at the RSA conference and presented by CyberScoop editor Greg Otto, it consists of a short interview with Kurtis Minder, CEO of security company GroupSense. How malware is growing on the Kodi/XMBC platform was the topic.

    After a brief introduction on so-called Kodi boxes, Otto put it to Minder that his company had been looking into the malware that has been floating through these boxes and asked him to elaborate.

    Minder said his company started its research around two months ago, working with the Digital Citizens Alliance (DCA). Of course, DCA has been one of the main sources of Kodi-related malware stories, ostensibly for the protection of consumers.

    However, DCA is affiliated with the entertainment industries and there is little doubt theyre being used to promote an anti-piracy agenda. There is nothing inherently wrong with companies trying to protect their content, of course, but doing so in a way that has the potential to mislead the public is bound to raise questions.

    Back to the video, Minder told interviewer Otto that his company had been looking at what the attack footprint would be for malware on the media that would show up on any given Kodi box that would be in someones home.

    Its a curious statement to talk about the streaming media itself providing an attack vector but Minder doubled down, stating that theyd discovered several places on the dark web where people are selling malware-enabled media.

    Otto didnt ask Minder to elaborate on these claims and Mi...


    25-Way NVIDIA/AMD Linux Graphics Comparison For Vulkan-Powered Thrones Of Britannia "IndyWatch Feed Tech"

    This week Mac/Linux game porting company released the Linux port of A Total War Saga: THRONES OF BRITANNIA, just two months after this game was released for Windows. With the Linux port of this strategy game the Vulkan API is being used for graphics rendering, which makes it interesting for benchmarking. Here is our extensive look at the performance of this major Linux game port when testing twenty-five different AMD Radeon and NVIDIA GeForce graphics cards to see how this game is performing on Ubuntu Linux.


    Re : Re: [oss-security] CVE-2018-12020 in GnuPG "IndyWatch Feed Tech"

    Posted by Stiepan on Jun 10

    Hello to both,

    This responsibility discussion is all well and fine, but now that this is half-public, may we know for sure whether we
    are affected :
    1. as debian(-like) package consumers
    2. as users of GPG for other purposes, such as webmail (have CC-ed protonmail to that regard)
    and since when, so as to do proper rollbacks or other applicable mitigations (w.r.t packages) ?
    By the way, this is why I think disclosure of such issues and...


    Vote to End Fractional Reserve Banking in Switzerland "IndyWatch Feed Tech"

    Via: Reuters: A radical plan to transform Switzerlands financial landscape by barring commercial banks from creating money when they lend looked set to fail, according to initial projections on Sunday. The vote, called under Switzerlands system of direct democracy after gathering more than 100,000 signatures, wanted to make the Swiss National Bank (SNB) the []


    Rubber Duck Debugging the Digital Way "IndyWatch Feed Tech"

    Anyone who slings code for a living knows the feeling all too well: your code is running fine and dandy one minute, and the next minute is throwing exceptions. Youd swear on a stack of OReilly books that you didnt change anything, but your program stubbornly refuses to agree. Stumped, you turn to the only one who understands you and pour your heart out to a little yellow rubber duck.

    When it comes to debugging tools, this digital replacement for the duck on your desk might be even more helpful. Rubber duck decoding, where actually explaining aloud to an inanimate object how you think the code should run, really works. Its basically a way to get you to see the mistake you made by explaining it to yourself; the duck or whatever personally, I use a stuffed pig is just along for the ride. [platisd] took the idea a step further and made his debugging buddy, which he dubs the Dialectic Ball, in the form of a Magic 8-Ball fortune teller. A 3D-printed shell has an ATtiny84, an accelerometer, and an LCD screen. To use it, you state your problem, shake it, and read the random suggestion that pops up. The list has some obvious suggestions, like adding diagnostic print statements or refactoring. Some tips are more personal, like talking to your local guru or getting a cup of coffee to get things going again. The list can be customized for your way of thinking. If nothing else, itll be a conversation piece on your desk.

    If youre more interested in prognostication than debugging, we have no shortage of Magic 8-Ball builds to choose from. Heres one in a heart, one that fits in a business card, and even one that drops F-bombs.



    8 Google Maps hidden places You are not allowed to see "IndyWatch Feed Tech"

    By Waqas

    If you thought you have seen it all then you

    This is a post from Read the original post: 8 Google Maps hidden places You are not allowed to see


    What is Epigenetic Rejuvenation? "IndyWatch Feed Tech"

    A quick 4-minute overview of Epigenetic Rejuvenation a breakthrough approach to whole-body rejuvenation that can potentially add decades to our lives.


    The FCC Explicitly Bans Unauthorized Phone Bill Charges "IndyWatch Feed Tech"

    Submitted via IRC for Fnord666

    The FCC has approved new rules expressly banning unauthorized charges on phone bills, a practice that was already illegal under federal law but never formally codified within the agency. Its the first time the commission is adopting an explicit rule.

    The new rules ban unexpected phone bill charges, also known as cramming many services that a customer didnt ask for onto a bill. The rules also ban the practice of tricking a customer into switching phone carriers. From now on, if a company is found to have used deception to obtain your consent to switch carriers, your consent will be deemed invalid.

    Changes are also being made to how third-party verification services, which are supposed to validate a sale or carrier switch, confirm that a customer really intended to take action. The third-party verification process will no longer need user approval for every service purchased, in order to save customers time and streamline the process. Its a change thats supposed to be helpful, but it sounds like it could lead to unexpected charges when you arent paying attention. Finally, carriers that abuse third-party verification, such as by editing out parts of a customers phone call with a third party to make it sound like an approval to switch carriers, will be suspended from using them for several years.


    Original Submission

    Read more of this story at SoylentNews.


    AMDVLK Vulkan Driver Ships Latest Fixes, Optimizations "IndyWatch Feed Tech"

    The AMD Radeon driver developers maintaining the open-source AMDVLK Vulkan Linux driver have pushed out their latest week's worth of changes...


    Facebook provided user data to some third parties after promising to limit access: report "IndyWatch Feed Tech"

    Facebook reportedly made agreements to share certain user data with a handful of companies even after it had said it no longer allowed such practices, raising new questions about the companys privacy policies.The Wall Street Journal reported Sunday...


    PDF Importing Improvements Head Into LibreOffice "IndyWatch Feed Tech"

    It's too late for the upcoming LibreOffice 6.1, but LibreOffice 6.2 will feature PDF importing improvements...


    Linux 4.18 Gets AMD Patches For Speculative Store Bypass / Spectre V4 "IndyWatch Feed Tech"

    Linux 4.17 landed the initial Spectre V4 mitigation as "Speculative Store Bypass Disable" (SSBD) while primarily focused on Intel CPUs and for Linux 4.18 the SSBD code has been updated for AMD processors...


    Linux 4.18 Landing Restartable Sequences System Call, Yields Performance Benefits "IndyWatch Feed Tech"

    Adding to the list of new features for Linux 4.18 is the long-in-development work on the restartable sequences system call...


    Microsoft and Build 2018: Using AI-powered productivity to create the office of the future "IndyWatch Feed Tech"

    Imagine meetings that document themselves using AI tools to add real-time translation and accessibility support. How much of that is the future and how much can you do today?


    Marcus Hutchins, WannaCry-Killer, Hit With Four New Charges by the FBI "IndyWatch Feed Tech"

    Marcus Hutchins, the British malware analyst who helped stop global Wannacry menace, is now facing four new charges related to malware he allegedly created and promoted it online to steal financial information.

    Hutchins, the 24-year-old better known as MalwareTech, was arrested by the FBI last year as he was headed home to England from the DefCon conference in Las Vegas for his alleged role in creating and distributing Kronos between 2014 and 2015.

    Kronos is a Banking Trojan designed to steal banking credentials and personal information from victims' computers, which was sold for $7,000 on Russian online forums, and the FBI accused Hutchins of writing and promoting it online, including via YouTube.

    Hutchins pleaded not guilty at a court hearing in August 2017 in Milwaukee and release on $30,000 bail.

    However, earlier this week, a revised superseding indictment [PDF] was filed with the Wisconsin Eastern District Court, under which Hutchins faces four new charges along with the six prior counts filed against him by the FBI a month before his arrest.

    According to the new indictment, Hutchins created a second piece of malware, known as "UPAS Kit," and also lied to the Federal Bureau of Investigations (FBI) when he was arrested and questioned last year in Las Vegas.

    [...] As the news on the revised indictment broke, Hutchins, who has repeatedly denied any illegal activity, called the charges "bullshit" and appealed to his Twitter followers for donations to cover legal costs.

    Original Submission

    Read more of this story at SoylentNews.


    Life lessons from artificial intelligence: What Microsofts AI chief wants computer science grads to know about the future "IndyWatch Feed Tech"

    Artificial intelligence has exploded, and perhaps no one knows it more than Harry Shum, the executive vice president in charge of Microsofts AI and Research Group, which has been at the center of a major technological shift inside the company.

    Delivering the commencement address Friday at the University of Washingtons Paul G. Allen School of Computer Science and Engineering, Shum drew inspiration from three emerging technologies quantum computing, AI, and mixed reality to deliver life lessons and point out the future of technology for the class of 2018.


    Fail Of The Week: Never Trust A Regulator Module "IndyWatch Feed Tech"

    [Ryan Wamsley] has spent a lot of time over the past few months working on a new project, the Ultimate LoRa backplane. This is as its name suggests designed for LoRa wireless gateways, and packs in all the features hed like to see in a LoRa expansion for the Nano Pi Duo.

    His design features a three-terminal regulator, and in the quest for a bit more power efficiency he did what no doubt many of you will have done, and gave one of those little switching regulator modules in a three-terminal footprint a go. As part of his testing he inadvertently touched the regulator, and was instantly rewarded with a puff of smoke from his Nano Pi Duo. As it turned out, the regulator was susceptible to electrical noise, and had a fault condition in which its input voltage was routed directly to its output. As a result, a component in the single board computer received way more than its fair share, and burned out.

    If there is a moral to be extracted from this story, it is to never fully trust a cheap drop-in module to behave exactly as its manufacturer claims. [Ryan]s LoRa board lives to fight another day, but the smoke could so easily have come from more components.

    So thats the Fail of The Week part of this write-up complete, but it would be incomplete without the corresponding massive win that is [Ryan]s LoRa board itself. Make sure to take a look at it, its a design into which a lot of attention to detail has been put.

    Coming Back to Curving Bullets "IndyWatch Feed Tech"

    What do you do when you have time, thousands of dollars worth of magnets, and you love Mythbusters? Science. At least, science with a flair for the dramatics. The myth that a magnetic wristwatch with todays technology can stop, or even redirect, a bullet is firmly busted. The crew at [K&J Magnetics] wanted to take their own stab at the myth and they took liberties.

    Despite the results of the show, a single magnet was able to measurably alter the path of a projectile. This wont evolve into any life-saving technology because the gun is replaced with an underpowered BB gun shooting a steel BB. The original myth assumes a firearm shooting lead at full speed. This shouldnt come as any surprise but it does tell us how far the parameters have to be perverted to magnetically steer a bullet. The blog goes over all the necessary compromises they had to endure in order to curve a bullet magnetically and their results video can be seen below the break.

    Here we talk about shooting airplane guns so they dont get mis...


    Deception on 101/Alice Continues, Courtesy of Firms That Are Making Money From Worthless (Bunk) Software Patents "IndyWatch Feed Tech"

    Just projecting their personal agenda

    35 U.S.C. 101 mirror

    Summary: 35 U.S.C. 101 does not seem to matter to people whose living is made from litigation and patent pursuits on (or pertaining to) algorithms; we rebut a few examples from the past week, reminding readers that lawyers arent credible advisors on issues they stand to gain from (at clients and innocent companies expense)

    THE collapse of software patents is very much a reality in the US. Dont ask law firms; they just want to sell more services (e.g. lawsuits and patent applications) around that.

    The other day in there was an article with the term Open Source in the headline, which got our attention. Dont be misled though; is traditionally a Free/Open Source software-hostile site, typically helping lawyers sell services around licence compliance and other things which are marketed by FUD. Patents and open source are not mutually exclusive, someone (a self-appointed expert) is quoted as saying in this new piece.

    Theyre alluding to the corporate flavour of Open Source, not Free/Open Source software.Actually, they are. Theyre not compatible. Software patents and Free/Open Source software cannot co-exist. You can do both and do both correctly, continues the self-appointed expert, but it takes education, especially for people who are newer in the industry.

    Theyre alluding to the corporate flavour of Open Source, not Free/Open Source software. Moore said engineers often join Pure Storage from companies that were not engaged in open source projects, the author writes, and expect a similar policy. Others are pro-open source, but may not know the benefits of patents.

    So theyre trying to market software patents to companies which claim to be Open Source, such as Red Hat (its applying for software patents and really ought to stop doing that). Thats one reason why Gideon Myles, continues the author, lead IP counsel at San Francisco-based Dropbox Inc., said his company educates new employees on both processes.

    When it comes to patents in general (i.e. not software), patents may make sense, but as far as Free/Open Source software is concerned, there should be no patents in tha...


    What would solar system travel be like with scaled Mach effect propellantless propulsion? "IndyWatch Feed Tech"

    James Woodward and the Space Studies Institute has a Phase 2 NASA Innovative Advanced funded study. They are looking at the implementation of an innovative thrust producing technology for use in NASA missions involving in space main propulsion.

    Dr. Heidi Fearn explained in a video made in 2017 how just scaling the power and size of the Mach effect propulsion causes problems. (heat, arcing and other problems). They currently believe they can scale the device to one newton of propulsion and then create large arrays of the devices for more thrust. The constant thrust could last for years or decades by using a nuclear power source.

    For Mach effect propellantless propulsion it will be better to go to an array of smaller devices.


    Update on DSLWP-B orbit determination "IndyWatch Feed Tech"

    Last Sunday, I used Scott Tilley VE7TILs Doppler measurements of the DSLWP-B S-band beacon to perform orbit determination using GMAT. Yesterday Scott sent me the Doppler data he has been collecting during this week. I have re-run my orbit determination process to include this new data.

    Below I show the Keplerian state that was determined on 2018-06-03, in comparison with the new state determined on 2018-06-10 (both are referenced to the same epoch of 2018-05-26 00:00:00 UTC).

    % 20180603
    %DSLWP_B.SMA = 8761.0758581
    %DSLWP_B.ECC = 0.768016853537
    %DSLWP_B.INC = 16.9728174682
    %DSLWP_B.RAAN = 295.670653562
    %DSLWP_B.AOP = 130.427472407
    %DSLWP_B.TA = 178.126596496
    % 20180610
    DSLWP_B.SMA = 8762.40279943
    DSLWP_B.ECC = 0.764697135746
    DSLWP_B.INC = 18.6101083906
    DSLWP_B.RAAN = 297.248156986
    DSLWP_B.AOP = 130.40460851
    DSLWP_B.TA = 178.09494681

    It seems that there is still an indetermination of a few degrees in the inclination and right-ascension of the ascending node and a few kilometres in the semi-major axis.

    The graph below shows the Doppler fit.

    The Jupyter notebook where these calculations are performed can be found here.


    Amazon Sues Pirate Streaming Boxes, but Sells Piracy Tutorials? "IndyWatch Feed Tech"

    Last summer saw the birth of a new anti-piracy initiative, which has already made quite a few headlines.

    A coalition of the major Hollywood studios, Amazon, Netflix and several other media properties teamed up, launching the Alliance for Creativity and Entertainment (ACE).

    Their ultimate goal is to beat piracy, with pirate streaming boxes as the main target.

    In the months that followed, several third-party Kodi-addon developers received threatening letters in the mail and on top of that ACE filed lawsuits against three vendors of alleged pirate streaming boxes.

    Their show of force hasnt gone unnoticed. It triggered some developers and sellers to lay low or move out of the game entirely. At the same time, fully-loaded pirate boxes are now harder to find at ACE member Amazon, which has removed tens of thousands of listings.

    These boxes, which ship with a built-in media player as well as pirate addons, were not always hard to find though.

    In fact, Dragon Box, which is now being sued by Amazon and the others, was previously sold on Amazon. This is perhaps what prompted the company to argue as a defense that it had Amazons implied authorization to promote and sell the device.

    Clearly, these Dragon Boxes have now been stripped from Amazons inventory, but its still not hard to find several alleged piracy inducing items there today.

    For starters, there are still hundreds if not thousands of cheap media players for sale. While these may be perfectly legal, reviews of Amazon members show, sometimes with screenshots, how these can be easily set up to run pirate addons.

    Arguably, without 24/7 moderation this is hard to avoid. After all, people may also buy a PC on Amazon and recommend people to bookmark The Pirate Bay. Perhaps were nitpicking.

    What may be more problematic for Amazon is the widespread availability of Kodi tutorials. While Kodi is perfectly legal, some of these books go into detail on how to add pirate addons. The same tools Amazon is suing Tickbox, Set TV, and Dragon Box over.

    Do you want to install Area 51 IPTV or Set TV on your Kodi and Amazon Fire TV Stick or Fire TV? one guide mentions, referencing Set TV...


    US suicide rates increased more than 25% since 1999, CDC says "IndyWatch Feed Tech"

    These findings are disturbing. Suicide is one of the top 10 causes of death in the US right now, and its one of three causes that is actually increasing recently, so we do consider it a public health problem and something that is all around us, Schuchat said. The other two top 10 causes of death that are on the rise are Alzheimers disease and drug overdoses, she noted.

    Suicide rates increased by 25% across the United States over nearly two decades ending in 2016, according to research published Thursday by the US Centers for Disease Control and Prevention. Twenty-five states experienced a rise in suicides by more than 30%, the government report finds.

    More than half of those who died by suicide had not been diagnosed with a mental health condition, said Dr. Anne Schuchat, principal deputy director of the CDC.


    Still Pulling a Berkheimer Almost 4 Months Down the Line "IndyWatch Feed Tech"


    Summary: Refusing to let go or leave behind an opportunity to bash patent invalidations, the patent microcosm just keeps bringing up Berkheimer v HP ad infinitum

    When the Federal Circuit delivered a judgment on Berkheimer the Patent Trial and Appeal Board (PTAB) did not seem to mind as much as the patent extremists minded; Berkheimer just wasnt a very major case, so Iancu's comments revealed whose side he was on. Watchtroll says that the USPTO asks Federal Circuit to Vacate, Remand 101 Case to Board in Light of Berkheimer, but as we noted earlier today (and will show later today), this is the exception rather than the norm. Theyre cherry-picking. Berkheimer is very rarely brought up in todays patent cases (rulings/opinions/determinations/judgments/arguments).

    A week and a half ago (on May 31st) there was a case related to this. Dechert LLP was trying to pull a Berkheimer (we say 'pull', but they say things like Berkheimer effect) in order to shed uncertainty and doubt about many decisions to invalidate patents at the Patent Trial and Appeal Board as well as the Federal Circuit. From their summary:

    The United States Court of Appeals for the Federal Circuit refused rehearing en banc of two significant decisions regarding patent-eligibility under 101 (Aatrix and Berkheimer) on May 31, with a majority of active judges on the court affirming that the patent-eligibility inquiry, though a question of law, implicates subsidiary questions of fact. The effect of these cases will be to make it substantially more difficult to invalidate paten...


    Juliian CestMoi joins our blog team with the post Study proposes a new way to reverse the aging process. "IndyWatch Feed Tech"

    Juliian C'estMoi joins our blog team with the post "Study proposes a new way to reverse the aging process".


    Senator Makes Amtrak Hire Ticket Agents Because 30% of West Virginia Lacks Internet "IndyWatch Feed Tech"

    Joe Manchin, the senior Senator from West Virginia, has inserted language in the FY19 Transportation, Housing and Urban Development, and Related Agencies appropriations bill that will force Amtrak to employ at least one ticketing agent in every state that it serves.

    His reasoning? "Amtrak has told me that most of their sales are now online, but West Virginians buy far more tickets at the Charleston station than most places around the country. That's not surprising, as nearly 30% of West Virginia is without internet access, and mobile broadband access is also difficult in my state's rugged, mountainous terrain, making online ticket sales difficult."


    Original Submission

    Read more of this story at SoylentNews.


    Homeland Securitys Massive New Database Will Include Face Recognition, DNA, and Peoples Non-Obvious Relationships "IndyWatch Feed Tech"

    Via: EFF: The U.S. Department of Homeland Security (DHS) is quietly building what will likely become the largest database of biometric and biographic data on citizens and foreigners in the United States. The agencys new Homeland Advanced Recognition Technology (HART) database will include multiple forms of biometricsfrom face recognition to DNA, data from questionable sources, []


    Everyone Talks About Apples Notorious Design Patents But Not About Abstract European Patents Used Against Apple and Linux "IndyWatch Feed Tech"

    A Battistelli era patent


    Summary: What corporate media and the mainstream speak of in relation to Apple and what more niche bloggers pay attention to, serving to highlight a decline in patent quality at the European Patent Office (EPO)

    LAST weekend we wrote about Zeroclick, LLC v Apple, Inc. We took note of the relation to a very malicious patent troll, Erich Spangenberg. Days later Watchtrolll wrote about this case as well, adding virtually no new information.

    But Apple remains in headlines (about patents) mostly because of its own battles against Android (and by extension Linux). Professor Michael Rischs analysis of Apple v Samsung is only days old and it speaks of the massive damages of ~$533,000,000. Rischs views:

    Ive done a few interviews about the latest Apple v. Samsung design patent jury verdict, but journalistic space means I only get a couple sentences in. So, I thought I would lay out a couple points I see as important. Well see if they hold up as predictions.

    Theres been a lot written about the case, so I wont rehash the epic story. Heres the short version. The design patent law affords the winning plaintiff all of the profits on the infringing article of manufacture. The Supreme Court ruled (reversing about 100 years of opposite practice) that the article of manufacture could be less than the entire accused device for sale. Because the original jury instructions did not consider this, the Court remanded for a determination of what the infringing article of manufacture was in this case (the design patents covered the shape of the phone and the default screen). The Federal Circuit remanded, and the District Court decided that, yes, in fact, the original jury instructions were defective and ordered a retrial of damages.

    The District Court a...


    Study proposes a new way to reverse the aging process "IndyWatch Feed Tech"

    A new approach to fight the aging process: rejuvenating the nuclear membrane.

    A new discovery about the effects of aging in our cells could allow doctors to cure or prevent diabetes, fatty liver disease and other metabolic diseases and possibly even turn back the clock on aging itself.

    The new finding from the University of Virginia School of Medicine suggests that fatty liver disease and other unwanted effects of aging may be the result of our cells nuclei the compartment containing our DNA getting wrinkly. Those wrinkles appear to prevent our genes from functioning properly, the UVA researchers found.

    Theres no wrinkle cream for nuclear membranes, but there is a tantalizing possibility: We might use viruses to smooth the membranes surfaces and restore the cells to functioning as they did in the glow of youth.


    A Lesson in K40 Laser Repair "IndyWatch Feed Tech"

    The K40 laser cutter has become ubiquitous in hackerspaces and well-equipped home workshops over the past few years, as a relatively inexpensive introduction to laser cutting and a machine that is readily hackable. Tokyo Hackerspace have one, but sadly their laser tube failed after relatively little use. Replacing a laser tube might be a routine component change for some readers, but its still worth looking at in some detail.

    Their tube had failed at its output lens cooling cap, a component that is glued onto the end of the tube rather than bonded, and which had snapped off. There had been no mechanical stress upon it, but it was found  that the arrangement of their cooling system caused it to drain between uses and thus air bubbles could accumulate. The resulting cooling inefficiency caused enough thermal stress for the bond between the tube and the end piece to fail.

    The in-depth analysis of what caused the failure and step-by-step description of the procedure should be of interest to any K40 owner. Little things such as ensuring that the tube is rotated to the right angle for all air bubbles to make their way out of it, or making sure that when the pump is switched off the water isnt all pulled out of it by gravity seem obvious, but these are traps that will have caught more than one K40 owner.

    Weve covered many K40 stories over the years, but a good place to start for the novice might be this commissioning story, or even this tale of a hackerspaces modifications to their model.


    Breakthrough in search for Martian life as Curiosity finds organic matter and seasonal methane "IndyWatch Feed Tech"

    What did they find out?

    NASAs Curiosity rover has uncovered the best evidence yet that life may have once existed on Mars.

    In two separate studies on data collected by the Mars rover over the last few years, scientists identified an abundant source of organic matter in an ancient lakebed, and traced some of the planets atmospheric methane to its roots.

    The groundbreaking results will help to guide the search for microbial life and improve our understanding of seasonal processes on Mars.


    Matthew Scholz, founder and CTO of Immusoft, presenting at Undoing Aging 2018 "IndyWatch Feed Tech"

    New video from Undoing Aging 2018: Matthew Scholz, founder and CTO of Immusoft, on their work developing a breakthrough platform for treating a variety of genetic diseases.

    Accelerating rejuvenation therapies to repair the damage of aging. Berlin, March, 15 17.


    The Bubonic Plague Has Been Killing People Far Longer Than We Thought "IndyWatch Feed Tech"

    Hidden in the bones of ancient humans lies evidence of diseases that continue to distress people today. Recently, the examination of two 3,800-year old skeletons revealed the presence of a Yersinia pestis strain, famously the bacterium that causes plague. This strain is now the oldest of its kind sequenced to date, and suggests that the devastation that is the bubonic plague has a Bronze Age origin.

    The discovery, published Friday in Nature Communications, pushes back the proposed age of the bubonic plague by 1,000 years. It also adds to the understanding of a disease that is still reported between one and seven times per year in the United States, despite its more ancient reputation: In the U.S. 80 percent of plague cases have been in the bubonic form. Although its been present throughout much of recorded history it was the drive behind some of humanitys deadliest pandemics including the Justinian Plague and the Black Death the origin and age of the disease have remained largely a mystery.

    Contrary to previous studies suggesting that Y. pestis was unable to cause disease during that time, we provide evidence that bubonic plague has been affecting humans for at least the last 4,000 years, study co-author Maria Spyrou tells Inverse.


    Tim Berners-Lee and the World Wide Web "IndyWatch Feed Tech"

    Tim Berners-Lee should know what he is talking about, when he says Celebrity damages private life. The person who is considered to be the inventor of the World Wide Web was on June 8, 1955.


    Growth in Petitions Against Questionable Patents (PTAB IPRs) and Patent Trolls Migration to China "IndyWatch Feed Tech"

    In spite of fee hikes, inter partes reviews (IPRs) are still up

    Shanghai road

    Summary: The United States is saying goodbye to a lot of the nuisance which held back development of good products; theres meanwhile a reported surge in patent litigation in China (up as much as 85% in Guangdong)

    The Patent Trial and Appeal Board (PTAB) is seeing work being shifted to it from what otherwise might have been court battles. This is good because it keeps disputes within the realms of the USPTO, hence less expensive (favours the interests of relatively small firms which are easy target/prey to trolls). Attempts to use the Supreme Courts SAS Institute v Iancu to slow down PTAB (giving it more workload) arent succeeding. The patent maximalists have just said this:

    Chief Judge Ruschke reveals 44% of pending cases were not instituted on all grounds and that the Board has already granted more than a dozen extensions to trials in response to SAS

    CAFC [the Federal Circuit] Determines No Requirement To Reopen Non-Instituted Claims Post-SAS however, according to Josh Landau, who 3 days ago wrote this:

    PGS owns a patent on certain techniques for marine seismic surveying.

    In November 2014, WesternGeco challenged the validity of PGSs patent at the Patent Trial and Appeal Board (PTAB). The PTAB instituted IPR on some, but not all, of the PGS patents claims. WesternGeco settled out of the IPR, but the PTAB continued the IPR. In June 2016, the PTAB invalidated some of the claims on which it had instituted the IPR.

    PGS appealed the PTABs final decisio...


    Heart disease stem cell therapy can shrink deadly scar tissue "IndyWatch Feed Tech"

    A breakthrough stem cell treatment that promises the first effective cure for heart disease will be offered to British patients this year, The Sunday Telegraph can reveal.

    Hundreds of thousands stand to benefit after regulators approved a major trial of the regenerative drug capable of shrinking fatal scar tissue which follows a heart attack.

    The off-the-shelf therapy, which can be harvested for thousands of recipients from one healthy donor, will begin being administered to patients at Londons Royal Brompton Hospital in November.


    IBM and the Department of Energy show off the worlds fastest supercomputer, Summit "IndyWatch Feed Tech"

    IBM and the Department of Energys Oak Ridge National Laboratory have revealed the worlds most powerful and smartest scientific supercomputer. Known as Summit, IBM says that its new computer will be capable of processing 200,000 quadrillion calculations per second. To put that into perspective, if every person on Earth did a single calculation per second, it would take 305 days to do what Summit does in a single second. Assuming those numbers are accurate, that would make Summit the worlds fastest supercomputer. It would also mark the first time since 2012 that a U.S. computer held that title.

    Summit has been in the works for several years now and features some truly impressive specs. According to Tech Crunch, the computer will feature 4,608 compute servers, 22 IBM Power9 chips and six Nvidia Tesla V100 GPUs each. In addition, the machine will feature more than 10 petabytes of memory. As the Nvidia GPUs attest, this machine will be primarily used for the development of artificial intelligence and machine learning. In addition to the work on A.I., Summit will also be used for research into energy and other scientific endeavors at Oak Ridge.

    IBM was the Department of Energys general contractor for the Summit project, but it also had the help of several other partners within the tech industry. The GPUs were provided by Nvidia, which remains one of the leaders in cutting-edge GPU development. Mellanox and Redhat were also brought on to work on the development of Summit.


    Using microbes to track down criminals "IndyWatch Feed Tech"

    Using mock burglaries, researchers investigate a way to catch criminals using the microbes they leave behind. Could your microbiome give you away?


    Gervase Markham Outlines the Case Against Software Patents "IndyWatch Feed Tech"

    Gervase Markham
    By Didyktile, licensed under the Creative Commons Attribution-Share Alike 4.0 International license.

    Summary: Innovation in software proceeds at a rapid pace, and does not need the encouragement of patents, explains Markham

    The former Governator at the Mozilla Corporation, Gervase Markham (the programmer, not the poet), has something to say about software patents. In 2006, according to Wikipedia, he won a Google-OReilly Open Source Award as Best Community Activist [...] and has been undergoing treatment for metastatic adenoid cystic carcinoma.

    As we have stressed so many times before, almost every software developer is against software patents.We were very saddened to learn some months ago that his time alive might be very limited. His words about software patents are therefore more critical/important to preserve.

    Spotted via the blog (in Planet Mozilla) of the developer, Gervase Markham, was this piece titled A Case for the Total Abolition of Software Patents (later mentioned in Soylent News as well). A little while back, it says, I wrote a piece outlining the case for the total abolition (or non-introduction) of software patents, as seen through the lens of promoting innovation. Few of the arguments are new, but the Narrow Road to Patent Goodness presentation of the information is quite novel as far as I know, and may form a good basis for anyone trying to explain all the possible problems with software (or other) patents.

    From the introduction:

    Very few software patents make it down the road to patent goodness. The vast majority cost the company money to file and then lie gathering dust, acting only to provide a vague chilling effect on innovation in that area for those brave enough to do a patent search. A few become famous and tie up an enormous amount of industry and lawyer time and m...


    Singapore Could Become the Second Country to Legalize Mitochondrial Replacement Therapy "IndyWatch Feed Tech"

    Singapore could become the second country to legalize mitochondrial replacement therapy

    This small city state could become the second countryafter the United Kingdomto explicitly legalize mitochondrial replacement therapy (MRT), a controversial assisted reproduction technique that allows women who are carriers of some rare genetic disorders to give birth to healthy babies.

    Members of the Singaporean public and religious groups have until 15 June to provide their feedback about MRT to the Bioethics Advisory Committee (BAC). Based on its findings, a 13-member BAC review committee will make formal recommendations to the government later this year about whether to legalize the technology.

    "Our position is to keep a close watch on what happens in the U.K., to track the U.K. experience, and to learn from what they have done," says Oi Lian Kon, who studies human genetics at the National Cancer Centre Singapore and is leading the BAC review group.

    MRT is used to address devastating genetic diseases that arise from abnormalities in the DNA in mitochondria, the cell's power sources, and that commonly affect energy-intensive organs such as the brain and heart, as well as muscles. Children inherit mitochondria only from their mothers; replacing faulty mitochondria in an egg or embryo with normal ones from a donor can result in healthy babies. But it also means that offspring will bear DNA from three "parents," which makes MRT a controversial procedure.

    Previously: UK Parliament Gives Three-"Source" IVF the Go-Ahead.
    Approval for Three-Parent Embryo Trials
    UK's Fertility Regulator Approves Creation of First "Three-Parent" Babies

    Related: U.S. Panel Gives Tentative Endorsement to Three-Person IVF
    Newcastle University Study Verifies Safety of Three-Person IVF
    First Three-Person Baby Born Using Spindle Nuclear Transfer
    Baby Girl Born in Ukraine Using Three-Parent Pronuclear Transfer Technique



    "IndyWatch Feed Tech"

    The intent of the attackers was to sabotage hundreds of computers at the Banco de Chile while they were attempting to breach the real target, the banks SWIFT money transferring system.

    Causing a broad outage, the attackers aimed at distracting the internal IT staff while carrying our the cyberheist.

    The attempted attack took place on May 24, as result, many systems at several of its branches were inoperable.

    May 24, 2018, Banco de Chile reports that today it detected the presence of a fault that affected our normal attention in branches, telephone banking and some specific services. reads the security advisory published by the company,

    This generated the activation of our contingency protocol designed to maintain the continuity of the services, and in no case was the security of the products and transactions of our clients affected. 

    Initial investigation conducted by the bank revealed that the bank systems were infected by a malware.

    After an exhaustive investigation, it was determined that the origin of the detected fault was a virus, presumably from international networks, which directly affected Banco de Chiles work stations, such as an inn in the offices and terminals of our executives and cashier personnel, among others, causing difficulties in branch service and telephone banking. reads the announcement published by the bank on May 28.

    Analyzing the images posted online by bank employees, it is possible to verify that the infected machine where hit by a malware that wiped their hard drives Master Boot Records (MBRs).

    Bleeping Computer reported a screenshot of private IM conversations posted on a Chilean forum. According to a member of the forum, the wiper destroyed over 9,000 computers and over 500 servers.

    According to experts from Arkavia Networks, the malware that infected the systems at the Banco de Chile was a KillDisk sample tracked as KillMBR by...


    Marvel at Soviet-era Smart Displays Tiny Size "IndyWatch Feed Tech"

    The Soviet-era 490IP1 LED. The digit is a mere 2.5 mm in height. Pictured with the Texas Instruments TIL306. [image:]Its easy to assume that older components will be less integrated and bulkier than we might otherwise expect. Then something seems ahead of its time, like the teeny-tiny 490IP1 LED which was produced in the former Soviet Union. [AnubisTTP] obtained and shared images of this tiny integrated single digit LED display in which the number measures a scant 2.5 mm tall; in production it was made easier to read with an external bubble lens magnifier clipped to the outside. The red brick the 490IP1 is pictured with is the Texas Instruments TIL306, a relatively normal sized DIP component with similar functionality.

    The 490IP1 is called an intelligent LED display because the package contains a decade counter and driver circuitry for the integrated seven-segment LED digit, complete with a carry signal that meant multip...


    How Much Is Wildlife Tourism Affecting The Animals It Targets? "IndyWatch Feed Tech"

    A new study in Conservation Physiology, published by Oxford University Press, reveals that white shark activity increases dramatically when the animals are interacting with cage-diving operators.

    In recent decades, wildlife tourism has rapidly expanded and is one of the fastest growing sectors of the tourism industry. Ecotourism opportunities to cage-dive with white sharks, large marine predators, are available in Australia, South Africa, the United States of America, Mexico, and New Zealand, with up to seven companies operating simultaneously in one site.

    Previous studies have shown that wildlife tourism can change behavior of animal species by altering their habitats or eating patterns. How these changes affect the health of individual animals or animal populations is unclear.

    The study shows that white sharks are more active and likely use more energy when interacting with tourism operators compared to other situations (e.g. when operators are absent), raising questions about the behavioral changes such tourism may be causing.

    The researchers tracked ten white sharks at South Australia's Neptune Islands with devices for nine days, finding that the increased movement when sharks are interacting with cage-diving operators results in overall dynamic body acceleration, a proxy for activity, 61% higher compared to other times when sharks are present in the area.

    [...] "Spending time interacting with cage-diving operators might distract sharks from normal behaviors such as foraging on natural, energy-rich prey like pinnipeds," Huveneers added.

    [...] This study indicates that wildlife tourism may change the activity levels of white sharks and calls for an understanding of the frequency of shark-tourism interactions to appreciate the impact of ecotourism on this species fitness.

    Original Submission

    Read more of this story at SoylentNews.


    Takayuki Sugano joins our blog team with the post MIT fed an AI data from Reddit, and now it thinks of nothing but murder. "IndyWatch Feed Tech"

    Takayuki Sugano joins our blog team with the post "MIT fed an AI data from Reddit, and now it thinks of nothing but murder".


    Those People Who Dug the Big Hole Under Switzerland Looking for the Higgs Boson Particle Bought New Zealand Dairy Farm "IndyWatch Feed Tech"

    Everyone knows about the billionaires buying up rural land in New Zealand. Theyre not the only ones. CERN (The European Organization for Nuclear Research) is getting in on the act too. Obviously, I expect to receive many nothing-to-see-here emails, but CERN is very strange. Also, I wish Bruce Cathie was still alive. Via: Stuff: The []


    MIT fed an AI data from Reddit, and now it thinks of nothing but murder "IndyWatch Feed Tech"

    The point of the experiment was to show how easy it is to bias any artificial intelligence if you train it on biased data. The team wisely didnt speculate about whether exposure to graphic content changes the way a human thinks. Theyve done other experiments in the same vein, too, using AI to write horror stories, create terrifying images, judge moral decisions, and even induce empathy. This kind of research is important. We should be asking the same questions of artificial intelligence as we do of any other technology because it is far too easy for unintended consequences to hurt the people the system wasnt designed to see. Naturally, this is the basis of sci-fi: imagining possible futures and showing what could lead us there. Issac Asimov gave wrote the Three Laws of Robotics because he wanted to imagine what might happen if they were contravened.

    Even though artificial intelligence isnt a new field, were a long, long way from producing something that, as Gideon Lewis-Kraus wrote in The New York Times Magazine, can demonstrate a facility with the implicit, the interpretive. But it still hasnt undergone the kind of reckoning that causes a discipline to grow up. Physics, you recall, gave us the atom bomb, and every person who becomes a physicist knows they might be called on to help create something that could fundamentally alter the world. Computer scientists are beginning to realize this, too. At Google this year, 5,000 employees protested and a host of employees resigned from the company because of its involvement with Project Maven, a Pentagon initiative that uses machine learning to improve the accuracy of drone strikes.

    Norman is just a thought experiment, but the questions it raises about machine learning algorithms making judgments and decisions based on biased data are urgent and necessary. Those systems, for example, are already used in credit underwriting, deciding whether or not loans are worth guaranteeing. What if an algorithm decides you shouldnt buy a house or a car? To whom do you appeal? What if youre not white and a...


    Project Fusion: Tor Integration With Firefox May Finally be Happening "IndyWatch Feed Tech"

    After years of talk, Tor may finally be integrated with the main Firefox browser soon:

    The Tor Project announced that it's working with Mozilla to integrate Tor into Firefox. Eventually, this should completely eliminate the need for the Tor Browser, as most of its features would be merged into Firefox's new "super-private mode."

    Despite this, the Tor Project developers said that it takes a lot of time to rebase Tor Browser patches to new versions of Firefox. This is why Mozilla has started integrating Tor's patches into Firefox on its own through the "Tor Uplift Project."

    Firefox has also adopted new security features from the Tor Browser such as first party isolation (which prevents cookies from tracking you across domains) and fingerprint resistance (which blocks user tracking through canvas elements). However, first party isolation is off by default in Firefox and fingerprint resistance can break some websites. You can enable first party isolation in about:config or by installing this add-on for it.

    [...] The developers said all these features would enable a "real" private mode in Firefox, which could completely replace the need for the Tor Browser to exist. This "super-private mode" could be used by hundreds of millions of users eventually, which is why Mozilla first needs to ensure that the Tor network can scale with such usage. That means more people will need to run Tor relays. Mozilla may be able to help here by donating money to nonprofits that can run Tor relays.

    Could this be the way to get Firefox above 10% market share (except that if it's done correctly, nobody will be able to measure it)?

    Fusion Project overview



    Japanese Fire-Fighting Dragon Rides Water Jets "IndyWatch Feed Tech"

    If you are building a robot to fight fires, why not use the water that you are fighting fires with to propel your robot? That seems to be the idea behind the Dragon Fire Fighting robot built by [Professor Satoshi Tadokoro], and his team at Tadohoku University. Their dragon robot is raised by the same directed jets of water that are used to stop the fire.

    The three-meter robot also uses these jets of water to steer, moving the dragons head by firing water jets at angles. Im not sure how practical it really is, though: the jets that the robot uses to steer could do as much damage as the fire itself if it wasnt used carefully. The idea is to attach it to the end of a ladder or crane used by firefighters, so it can explore a building on fire without anyone having to step inside.

    The robot was built as part of the Tough Robotics Challenge, a program that is looking to build robots that can help in disasters. Japan is one of the most disaster-prone places on the planet, thanks to earthquakes, nuclear meltdowns, and Godzilla attacks, so the program is looking to build robots that can help out. Some of the concepts they are looking at include cyborg animals, a listening drone that can help find survivors after a disaster using a sensitive microphone array and a serpentine robot that can map pipes and underground structures.

    [Via TechXplore and Qes]



    Fifth Largest Cryptocurrency EOS Blockchain Set to Launch "IndyWatch Feed Tech"

    The EOS blockchain is set to launch after a live-streamed vote among Block Producers yesterday unanimously voted GO.


    Human Skeletal Muscle Aging and Mutagenesis "IndyWatch Feed Tech"

    Study based upon human skeletal muscle aging, mutagenesis, and the role of #satellite cells.

    A more comprehensive understanding of the interplay of stem cellintrinsic and extrinsic factors will set the stage for improving cell therapies capable of restoring tissue homeostasis and enhancing muscle repair in the aged.

    Human aging has multiple effects on the human body.  One of the effects of human aging is the reduction in skeletal muscle (SkM) function and a reduction in the number and activity of satellite cells (SCs), the resident stem cells.  The whole genome of single SC clones of the leg muscle vastus lateralis from healthy individuals of different ages (2178 years) was analyzed, to study the specific connection between SC aging and muscle impairment.  In healthy adult muscle rapid increase of SCs is consistent with the accumulation rate of 13 somatic mutations per genome per year.  Mutations typically do not happen in SkM-expressed genes because they are protected.  However, as mutations in exons and promoters increase, genes involved in SC activity and muscle function are targeted which results in aging.  Exons are coding sections of an RNA transcript, or the DNA encoding it, that are translated into protein.  Proteins are the synthesis of molecules.   A change in of a single base pair that caused the substitution of a different amino acid in the resulting protein (missense mutation) that was propagated to the muscle and detected in association with SC mutations affecting the whole tissue.  #Somatic mutagenesis in SCs as a result is the driving force in the age related decline of SkM function.

    Satellite Cells

    Satellite cells (SCs) are a heterogeneous population of stem and progenitor cells.  These cells play an important role in the growth and development of myofiber.  The enlargement, regeneration, and remodeling in skeletal muscle (SkM) is the pivotal role of satellite cells.  Satellite cells are dormant until they become activated through exer...


    FreeBSD 11.2-RC2 Ships This Weekend With Various Fixes "IndyWatch Feed Tech"

    The second release candidate of FreeBSD 11.2 is now available for testing...


    Cause of Adrian Lamo's Death Remains a Mystery "IndyWatch Feed Tech"

    What killed the computer hacker who turned in Chelsea Manning still a mystery

    Forensic pathologists who performed Adrian Lamo's autopsy were unable to determine how the 37-year-old died in March in Wichita. His autopsy report, released Wednesday afternoon, lists Lamo's cause and manner of death as "undetermined." That means that after a thorough examination of his body, results of toxicology testing and information about Lamo's life and last hours, there is nothing that points to a specific reason he died.

    "Despite a complete autopsy and supplemental testing, no definitive cause of death was identified," Scott Kipper, deputy coroner and medical examiner at the Sedgwick County Regional Forensic Science Center, wrote in the report.

    Adrian Lamo.

    Previously: Adrian Lamo Dies at Age 37

    Original Submission

    Read more of this story at SoylentNews.



    NASA Publishes SpaceXs Proposal for a Futuristic Kennedy Space Center "IndyWatch Feed Tech"

    The Kennedy Space Center might be getting a major upgrade and expansion soon if Elon Musk gets his way. NASA published a plan submitted by SpaceX that dramatically reimagines the companys presence at KSC in Cape Canaveral, Florida. The plans include everything from a control tower that resembles a flying saucer to a rocket garden, showcasing futuristic designs that will expand the space companys footprint and potential influence within the US agency.

    NASA published a draft environmental review for the proposed SpaceX Operations Area, as first reported by Florida Today on Friday. According to the document, SpaceX is seeking permission to build on a 67-acre patch of land about one mile north of KSCs visitor center complex.

    SpaceX wants to build a 133,000-square-foot Falcon hangar to process the used boosters and other rocket materials that it recovers. The hangar would facilitate more efficient recycling of the materials which could potentially save the company billions of dollars per launch.


    Framed Raspberry Pi Keeps Tabs on Spotify "IndyWatch Feed Tech"

    Perhaps youve noticed, but we here at Hackaday have a slight obsession with the over-engineered. One could fairly say theres a linear relationship between how likely we are to feature a project and how needlessly complex it is. That said, it isnt as if we are unable to appreciate a minimalist approach. Taking the scenic route can be a lot of fun, but sometimes its nice to just get where youre going before you run out of gas.

    This very slick Spotify Now Playing display created by [Jon Ashcroft] is a perfect example of that principle. The hardware is so straightforward that its barely worth mentioning: a Raspberry Pi with a small HDMI display, tucked neatly into a photo frame. Nothing to get too excited about there. The real hook with this particular project is the software.

    Using Spotifys excellent API, his software pulls down the current track information and stores it locally. It does this every ~4 seconds, checking to see if the track has chan...


    Building Firefox for ALSA (non PulseAudio) Sound "IndyWatch Feed Tech"

    I did the work to built my own Firefox primarily to fix a couple of serious regressions that couldn't be fixed any other way. I'll start with the one that's probably more common (at least, there are many people complaining about it in many different web forums): the fact that Firefox won't play sound on Linux machines that don't use PulseAudio.

    In theory, ALSA sound is easy to enable. Build pptions in Firefox are controlled through a file called mozconfig. Create that file at the top level of your build directory, then add to it:

    ac_add_options --enable-alsa
    ac_add_options --disable-pulseaudio

    You can see other options with ./configure --help

    Of course, like everything else in the computer world, there were complications. When I typed mach build, I got:

    Assertion failed in _parse_loader_output:
    Traceback (most recent call last):
      File "/home/akkana/outsrc/gecko-dev/python/mozbuild/mozbuild/", line 260, in read_mozconfig
        parsed = self._parse_loader_output(output)
      File "/home/akkana/outsrc/gecko-dev/python/mozbuild/mozbuild/", line 375, in _parse_loader_output
        assert not in_variable
    Error loading mozconfig: /home/akkana/outsrc/gecko-dev/mozconfig
    Evaluation of your mozconfig produced unexpected output.  This could be
    triggered by a command inside your mozconfig failing or producing some warnings
    or error messages. Please change your mozconfig to not error and/or to catch
    errors in executed commands.
    mozconfig output:
    ... followed by a many-page dump of all my environment variables, twice.

    It turned out that was coming from line 449 of python/mozbuild/mozbuild/

       # Lines with a quote not ending in a quote are multi-line.
        if has_quote and not value.endswith("'"):
            in_variable = name
            value = value[:-1] if has_quote else value



    A Critic Uses the DMCA to Avoid Criticism "IndyWatch Feed Tech"

    So a professional critic is the last person youd expect to use copyright to try to squelch someone elses fair use rights. But thats exactly what happened last month, when James Grubb, a journalist from VentureBeat, used the Digital Millennium Copyright Act (DMCA) to censor a critic just for highlighting a few paragraphs of his work on Twitter.

    On May 2, VentureBeats gaming section published Grubbs review of a forthcoming video game, Red Dead Redemption II. His opinions on the game werent shared by everyone, which is no surprise. Another video game critic, Jake Magee, took a shot at Grubb on Twitter, suggesting he only liked games that contained progressive political posturing. Alongside that criticism, Magee posted screenshots from Grubbs reviewhis goal was to show his followers the text that, as he saw it, supported his point.

    That was apparently too much for Grubb, who promptly sent a DMCA notice to Twitter over the matter. Twitter soon slapped black boxes over the images that Magee had posted. It wasn't until several days later that the boxes were removed and the post was restored.

    What justified this copyright takedown, in Grubbs view? First, Grubb said that Magee posted his entire article in a screenshot, a post which, in his view, crosses the line of acceptable fair use. Grubb also suggested that he wouldnt have taken legal action if Magee had simply included a link to his article.

    [...] Journalists and critics should know the basics of fair use. Its a right that their work relies on. At the very least, before a professional critic uses the DMCA to have another critics material removed, a double-take is needed on fair use.

    Original Submission

    Read more of this story at SoylentNews.

    Saturday, 09 June


    Linux 4.18 Drops The Lustre File-System "IndyWatch Feed Tech"

    There are a lot of staging changes for the busy Linux 4.18 kernel merge window...


    Does the Government Really Need this Much Power to Deal with an Attack of the Drones? "IndyWatch Feed Tech"

    Earlier this week, the Senate Homeland Security and Governmental Affairs Committee held a hearing on the Preventing Emerging Threats Act of 2018 (S. 2836), which would give the Department of Justice and the Department of Homeland Security sweeping new authority to counter malicious drones. Officials from both those agencies as well as the Federal Aviation Administration were present to discuss the governments current response to drones, and how it would like to be able to respond. Interestingly, both the Senators and the witnesses seem to agree that there are some large, unresolved constitutional questions in this bill. In light of those questions, EFF strongly opposes this bill. 

    Among other things, the bill would authorize DOJ and DHS to track, disrupt, control, seize or otherwise confiscate, or even destroy unmanned aircraft that pose a threat to certain facilities or areas in the U.S. The bill also authorizes the government to intercept or acquire communications around the drone for these purposes, which could be read to include capturing video footage sent from the drone. Most concerning, many of the bills key terms are undefined, but it is clear that it provides extremely broad authority, exempting officials from following procedures that ordinarily govern electronic surveillance and hacking, such as the Wiretap Act, Electronic Communications Privacy Act, and the Computer Fraud and Abuse Act.

    Given the breadth of these proposed new powers, you would expect officials to have a strong case for passing the bill. But even after the hearing, its not clear why DHS and DOJ need any expanded authority to go after malicious drones. For example, the FAA already has the ability to impose public flight restrictions for non-military aircraft, including drones. S. 2836 would expand those restrictions to any covered facility or asset, but does not narrowly define what is covered. Instead, the Secretary of Homeland Security or the Attorney General can make that determination, on their own, without public input and without public notice. While Committeeairman Ron Johnson claimed that the new authority would not give DHS the authority to knock down drones flying around your backyard, thats not exactly true.

    The authorities in S. 2836 are explicitly written to support DHS missions, including those from U.S. Immigration and Customs Enforcement and U.S. Customs and Border Protection. If your backyard is on the border in San Die...

    IndyWatch Science and Technology News Feed Archiver

    Go Back:30 Days | 7 Days | 2 Days | 1 Day

    IndyWatch Science and Technology News Feed Today.

    Go Forward:1 Day | 2 Days | 7 Days | 30 Days

    IndyWatch Science and Technology News Feed was generated at World News IndyWatch.

    Resource generated at IndyWatch using aliasfeed and rawdog