IndyWatch Science and Technology News Feed Archiver

Go Back:30 Days | 7 Days | 2 Days | 1 Day

IndyWatch Science and Technology News Feed Today.

Go Forward:1 Day | 2 Days | 7 Days | 30 Days

IndyWatch Science and Technology News Feed was generated at World News IndyWatch.

Thursday, 16 November


Links 16/11/2017: WordPress 4.9 and GhostBSD 11.1 Released "IndyWatch Feed Tech"

GNOME bluefish



  • Desktop

    • Open Source Pioneer Munich Votes To Move All Remaining Linux PCs To Windows 10 In 2020 [Ed: These articles fail to mention Microsoft bribery, Microsoft propaganda (studies), moles and astroturfing]

      As per the local reports, these moves are a result of the political scenario in Munich. In the past, citys IT chief has also said that there isnt any compelling technical reason to ditch Linux. In the wake of attacks like WannaCry, Green Party had already warned that a move to Windows 10 is too risky.

  • Server

    • Scalable clusters make HPC R&D easy as Raspberry Pi

      The BitScope system consists of five rack-mounted Pi Cluster Modules, each with 150 four-core nodes of Raspberry Pi ARM processor boards. They are fully integrated with network switching infrastructure. With a total of 750 CPUs or 3,000 cores working together, the system gives developers exclusive time on an inexpensive but highly parallelized platform for test and validation of scalable systems software technologies.

    • ...


High-Tech Bridge unveils free application discovery and inventory service "IndyWatch Feed Tech"

High-Tech Bridge announce the public launch of ImmuniWeb Discovery. The free service is a part of the ImmuniWeb Application Security Testing (AST) Platform. ImmuniWeb Discovery enables companies and organizations to maintain a comprehensive inventory and classification of their external web and mobile applications, as well as their APIs. The free service provides continuous and non-intrusive application discovery, leveraging reconnaissance and OSINT information gathering techniques. ImmuniWeb Discovery has a user-friendly web interface to monitor, map and More


Princes William and Harry Play Stormtroopers in 'Last Jedi' "IndyWatch Feed Tech"

A princely escort:

The princes' highly recognizable faces (and Harry's iconic red hair) are hidden by their costumes, but in-the-know fans can be on the lookout for one specific scene. Boyega, who plays the former stormtrooper now known as Finn, says they appear guarding him in an elevator along with two other famous stormtroopers -- actor Tom Hardy and Gary Barlow from British pop group Take That.

  "It was a great experience," Boyega said of the scene with the princes, who are second- and fifth-in-line for the British throne. The London-born actor also called the elevator moment "the best of both worlds for me."

Original Submission

Read more of this story at SoylentNews.


The FDA Just Approved Another Promising Immunotherapy For Cancer "IndyWatch Feed Tech"

On Wednesdayfor only the second timethe Food and Drug Administration approved a cutting-edge therapy that genetically modifies a patients blood cells in order to attack cancer. This time the therapy, known as CAR T-cell therapy, is designed to treat aggressive non-Hodgkin lymphoma.

In August, the FDA approved the first CAR T-cell therapy, for a drug called Kymriah designed for children and young adults whose leukemia doesnt respond to standard treatments. The FDAs approval of Yescarta, manufactured by Kite Pharma, comes just a few months after its first approvalan indication of just how quickly the field of immunotherapy is moving. Several other companies also have CAR-T therapies in the works.


GNOME's Calendar & TODO Applications Are Looking Better For v3.28 "IndyWatch Feed Tech"

Adding to the growing list of changes for GNOME 3.28 are improvements to the Calendar and To Do applications by Georges Stavracas...


Coconut Crab Filmed Hunting a Seabird "IndyWatch Feed Tech"

Coconut Crab Filmed Hunting a Seabird

Giant coconut crab sneaks up on a sleeping bird and kills it

A giant coconut crab has been filmed stalking, killing and devouring a seabird. It is the first time these whopping crustaceans have been seen actively hunting large, back-boned animals, and suggests they might dominate their island ecosystems.

Coconut crabs (Birgus latro), also known as robber crabs, are an imposing sight. They can weigh up to 4 kilograms, as much as a house cat, and sport legs that span almost a metre. This makes them the largest invertebrates animals without backbones on land. The crabs live on coral atolls in the tropical Indian and Pacific oceans.

They are renowned for their tree-climbing abilities and taste for coconuts, which they crack open with their powerful claws. They do sometimes eat meat, but until now it was thought that they only obtained it by opportunistic scavenging.

[...] Breaking a bird's wing would be easy for a coconut crab, says Shin-ichiro Oka at the Okinawa Churashima Foundation Research Center in Japan. In 2016, he showed that the crabs' claws pinch with a force of up to 3300 newtons [open, DOI: 10.1371/journal.pone.0166108] [DX], stronger than any other crustacean and comparable to the bite force of a big predator like a lion. "The claws of coconut crabs can generate a force 80 to 100 times the mass of their body," says Oka. "The crab in the video seems to be about 2 kilograms, so it would be able to easily break the bird's bones."

Video (34s) featuring the killer coconut crab. Also at Newsweek.

Read more of this story at SoylentNews.


Killer pitches "IndyWatch Feed Tech"

(Client to vendor) Youve clearly worked hard on this pitch. But the cold embrace of the grave awaits us all, and I dont see anything here that changes that.

Some pitches end with a handshake and a contract signing; some end with a condolence call and a better luck next time.

And then some end with a long, penetrating look deep into the bowels of the abyss.

I hope your next one ends the first way.

See more cartoons about social media, business and the way we live and work online at...


Get You an E-Textiles Sensor That Can Do Both "IndyWatch Feed Tech"

[Admar] is a software developer who was introduced to e-textiles in 2011. The bug firmly took hold, and these days he gives e-textile workshops at Eindhoven University of Technology. Here, students learn to build a single e-textile sensor that detects both presence and pressure. The workshop presentations are available on his site, which is itself a window into his e-textile journey.

Over the years, [Admar] has discovered that any e-textile project requiring more than a few connections is ripe for some kind of textile-friendly multi-point connector. Through trial and error, he designed a robust solution for use with an embroidery machine. The wires are made from conductive thread and soldered to a row of male header pins to make the transition out of fiber space. This transition requires solder, which quickly gets interesting when coupled with a fabric substrate and no solder mask. We wonder if spraying on mask beforehand would help, or if it would just soak in and stain and get in the way.

You can see the connector in practice in [Admar]s capacitive multi-touch demo vide...


TechShop Goes Bankrupt "IndyWatch Feed Tech"

The for-profit makerspace company closes its doors for good Photo: Robert Galbraith/Getty Images

A little over a decade ago, Jim Newton, who once served as an advisor to the TV show Mythbusters, and his partner Ridge McGhee launched a company called TechShop, opening the first of its for-profit makerspaces in Menlo Park, Calif., the beating heart of Silicon Valley.

Their enterprise was seemingly successful, and the number of TechShops soon grew, with 10 of them operating all around the United States by 2017.

But yesterday TechShop suddenly announced bankruptcythe Chapter 7 kind. So no re-organization; no second chance to get back in the black. TechShop is kaput.

I was very enthusiastic when a TechShop opened in my neighborhood, the Raleigh-Durham area of North Carolina. I never purchased an annual membership there, but I would sign up for a month at a time when I needed access to machine tools.

TechShop provided the only way (short of having a buddy with an old Bridgeport mill or a South Bend lathe in his garage) that a Sunday machinist like me could get access to such equipment. And I once took a welding class TechShop just for kicks. So I lamented when the companys Raleigh-Durham location closed its doors in 2013, and Im sorry for the many others who are no doubt feeling similar sentiments now that none are to be found anywhere in the United States.

So why did TechShop fail? Isnt the maker movement exploding? Some hints come from a message from TechShops CEO, Dan Woods, which was published online by Make magazine. In it, Woods explains that the maker movement is very much a not-for-profit affair, often bankrolled by government or philanthropic organizations. And as a for-profit company, TechShop was normally not eligible to compete for such grant money or continuing subsidies.

Woods describes his companys effort to pivot, to turn into TechShop into some sort of makerspace midwife, which would help non-profits, schools, or community governments set up makerspaces of their own. That wouldnt seem any more promising of a business plan, at least to me, and I suppose yesterdays bankruptcy announcement confirms that I would be right to be leery about it. Im not savvy enough, though, to speculate about whether Woods and his colleagues could have done anything else to keep TechShop afloat. 

You might ask, What does it matter? After all, if not-for-profit...


Free security tool protects Internet users through DNS "IndyWatch Feed Tech"

IBM Security, Packet Clearing House (PCH) and The Global Cyber Alliance (GCA) launched a free service designed to give consumers and businesses added privacy and security protection as they access the Internet. The new Quad9 Domain Name System (DNS) service helps protect users from accessing millions of malicious internet sites known to steal personal information, infect users with ransomware and malware, or conduct fraudulent activity. Businesses and consumers can safeguard their online privacy as the More


Fundamentals of a RF Design "IndyWatch Feed Tech"

This paper discusses the RF design fundamentals of an RF communication system, including the transmission medium, wave propagation, free space path loss, the transmit and receive portion, link design and key components with the intent to provide practical knowledge on the process for designing an RF system.

This paper discusses the RF design fundamentals of an RF communication system, including the transmission medium, wave propagation, free space path loss, the transmit and receive portion, link design and key components with the intent to provide practical knowledge on the process for designing an RF system. In addition to the RF communication system and RF fundamentals, an overview of the test equipment and what to consider during the design, development, and verification process is provided.


Breakthrough Prize 2018 "IndyWatch Feed Tech"

The Breakthrough Prizes for 2018 will be awarded at a ceremony on December 3, I believe at the usual NASA Hangar 1 in Mountain View. The next day Stanford will host the 2018 Breakthrough Prize symposium, which one will be able to watch live from the Breakthrough Prize Facebook page.

The symposium schedule is available here, and while it does not list the Prize awardees, it does appear to list the titles of the talks. From this it looks like the math \$3 million will go to a geometer, who will talk about Geometry at Higher Dimensions. There may be several \$100,000 New Horizons Prizes for younger mathematicians, but at least one will be to an analytic number theorist, who will talk about Analytic Number Theory in Everyday Life.

For the \$3 million physics prize, it looks like it is going to be split five ways and go to cosmologists/astrophysicists. The talks by laureates are The Next Decade in Cosmology, Gravitational Waves and Cosmology, Search for Extraterrestrial Intelligence, A New Instrument for Listening to the Universe and The Beginning and End of the Universe.


The Language We Invented as We Invented the Future "IndyWatch Feed Tech"

After 15 years, IEEE Spectrums language columnist bows out Illustration: Dan Page

opening illustration for Technically Speaking Illustration: Dan Page What is that feeling when youre driving away from people and they recede on the plain till you see their specks dispersing?its the too-huge world vaulting us, and its good-bye. But we lean forward to the next crazy venture beneath the skies. Jack Kerouac, On the Road

I wrote my first Technically Speaking column way back in June 2002. How long ago was that? Long ago enough that some companies that seem now to have been around forever werent even gleams in their founders eyes: Facebook, LinkedIn, Skype, Twitter, YouTube. Friendster was trying to persuade people to do social networking; Internet Explorer 6 was the dominant Web browser; and people were getting excited about Swiss army phones thatO brave new world!could do more than just make and receive phone calls.

In 2002, we were so innocent. We thought the PDA was here to stay and that Wikipedia wouldnt last. We didnt foresee Web 2.0 or filter bubbles . We knew nothing about the wisdom of the crowd or the convenience of the cloud . There was no...

25 More AMDGPU DC Patches, Mostly Focused On Raven DCN "IndyWatch Feed Tech"

While waiting on David Airlie to send in the AMDGPU DC pull request for Linux 4.15, additional AMDGPU DC material continues building up for what should in turn target Linux 4.16...


Dash Robotics Acquires Bots Alive for Clever, Affordable Robot Toys "IndyWatch Feed Tech"

Two of our favorite robot companies are teaming up to make intelligent little robots that you can actually buy Photo: Dash Robotics

It is with much rejoicing that today we can share that one of our favorite robotics startups, Dash Robotics, is acquiring another of our favorite robotics startups, Bots Alive. Usually, we dont cover acquisitions, or when we do, its with resigned skepticismall too often, one company gets completely swallowed by another, and the things that made them unique and exciting simply vanish.

The sense that we get from talking with Dash Robotics CEO Nick Kohut and Bots Alive founder Brad Knox is that the amazing things that Bots Alive does fit right in with the equally amazing but totally different things that Dash Robotics does, and that together, theyll be able to come up with some totally cool (and totally affordable) robotic toys with sophisticated personalities built right in.

Part of the reason that were fans of Dash Robotics and Bots Alive is that theyre both successful examples of taking robotics research and turning it directly into a compelling product. Dash Robotics turned UC Berkeleys DASH pop-up hexapod robot into a skittery and blisteringly fast toy called Kamigami thats now being sold in partnership with Mattel for US $50, while Bots Alives software runs on your phone and gives a $20 Hexbug more brains and personality than an enthusiastic and mildly well trained puppy. From Dash Robotics press release announcing the acquisition:

The Bots Alive computer vision system employs the camera of a smartphone or tablet to track over 15 objects at once, rapidly and accurately, whether the objects are moving or stationary. Using Bluetooth Low Energy, up to 8 robots can be commanded at one time. A 3D representation of the play area is built in the software by tracking the position and orientation of every tracked object. This means that robots are aware of their position and orientation relative to other robo...


Terdot Banking Trojan is back and it now implements espionage capabilities "IndyWatch Feed Tech"

The Terdot banking Trojan isnt a novelty in the threat landscape, it has been around since mid-2016, and now it is reappearing on the scenes.

According to Bitdefender experts, vxers have improved the threat across the years, implementing credential harvesting features as well as social media account monitoring functionality.

The Terdot banking Trojan is based on the Zeus code that was leaked back in 2011, the authors have added a number of improvements, such as leveraging open-source tools for spoofing SSL certificates and using a proxy to filter web traffic in search of sensitive information.

Terdot is a complex malware. Its modular structure, complex injections, and careful use of threads make it resilient, while its spyware and remote execution abilities make it extremely intrusive. states the report published by BitDefender.

The ability of the Trojan in powering man-in-the-middle attacks could be exploited also to manipulate traffic on most social media and email platforms.

The Terdot banking Trojan implements sophisticated hooking and interception techniques, experts highlighted its evasion capabilities.

The banking Trojan is distributed mainly through compromised websites hosting the SunDown Exploit Kit. The Bitdefender researchers observed crooks spreading it through spam emails with a bogus PDF icon button which, if selected, executes JavaScript code that drop the malware on the victims machine.

Terdot banking Trojan

Once installed on the victims machine, the Terdot banking Trojan downloads updates and commands from the C&C server, the URL it the same it sends system information to. The Trojan also used a Domain Generation Algorithm (DGA).



Center For Justice Wants Court to Unveil Copyright Trolling Secrets "IndyWatch Feed Tech"

Mass-piracy lawsuits have been plaguing the U.S. for years, targeting hundreds of thousands of alleged downloaders.

While the numbers are massive, there are only a few so-called copyright trolling operations running the show.

These are copyright holders, working together with lawyers and piracy tracking firms, trying to extract cash settlements from alleged subscribers.

Getting a settlement is also what the makers of the Elf-Man movie tried when they targeted Ryan Lamberson of Spokane Valley, Washington. Unlike most defendants, however, Lamberson put up a fight, questioning the validity of the evidence. After the filmmaker pulled out, the accused pirate ended up winning $100,000 in attorney fees.

All this happened three years ago but it appears that there might be more trouble in store for Elf-Man and related companies.

The Washington non-profit organization Center for Justice (CFJ) recently filed a motion to intervene in the case. The group, which aims to protect the wider community from abuse by the moneyed few, has asked the court to unseal several documents that could reveal more about how these copyright trolls operate.

The non-profit asks the court to open up several filings to the public that may reveal how film companies, investigators, and lawyers coordinated an illegal settlement factory.

The CFJs position is simple: if foreign data collectors and local lawyers are feeding on the subpoena power of federal courts to extract settlements from innocent people, then the public deserves to know.

What makes this case so important is that, based on the unsealed exhibits and declarations, it appears that a German operation is providing the investigators and experts that claim to identify infringing activities, but its investigators apparently have a direct financial interest and the software is questionable at best, CFJ adds.

Another problem mentioned by the non-profit organization is that not all defense lawyers are familiar with these trolling cases. They sometimes need dozens of hours to research them, which costs the defendant more than the cash settlement deal offered by the copyright holder.

As a result, paying off the trolls may seem like the most logical and safe option to the accused, even when they are innocent.

CFJ hopes that the sealed documents will help to expose the copyright trolls...


FCC Plans December Vote to Kill Net Neutrality Rules "IndyWatch Feed Tech"

The U.S. Federal Communications Commission next month is planning a vote to kill Obama-era rules demanding fair treatment of web traffic and may decide to vacate the regulations altogether, according to people familiar with the plans.

The move would reignite a years-long debate that has seen Republicans and broadband providers seeking to eliminate the rules, while Democrats and technology companies support them. The regulations passed in 2015 bar broadband providers such as AT&T Inc. and Comcast Corp. from interfering with web traffic sent by Google, Facebook Inc. and others.

[...] Pai plans to seek a vote in December, said two people who asked not to be identified because the matter hasn't been made public. As the head of a Republican majority, he is likely to win a vote on whatever he proposes.

[...] The agency declined to comment on the timing of a vote. "We don't have anything to report at this point," said Tina Pelkey, a spokeswoman for the commission.


Original Submission

Read more of this story at SoylentNews.


More Homemade PCB Tinning "IndyWatch Feed Tech"

[Marko] styles himself as a crazy chemist. His video showing a fast tin plating solution for PCBs (YouTube, see below) doesnt seem so crazy. We will admit, though, it uses some things that you might have to search for.

The formula calls for stannous chloride you could probably make this by dissolving tin in hydrochloric acid. Theres also thiourea the main chemical in silver-cleaning dips like Tarn-X. Sulphuric acid and deionized water round out the recipe.

It probably goes without saying, that you shouldnt be handling these nasty chemicals without the right set up and a good idea about safety. You should know the right way to mix water and acid and have appropriate lab gear and safety equipment. [Marko] mentions getting acid from a battery, but these days it can be hard to get to the insides of a car battery. Luckily, it is pretty easy to buy chemicals online and locally some stuff you dont want to ship.

This is similar to, but not the same as, [nurdrages] formula that we examined earlier. It is possible to make really professional-looking boards yourself if you have the time and know-how.

Filed under: chemistry hacks


Sneaky malware downloader found in apps on Google Play "IndyWatch Feed Tech"

Google has removed from Google Play eight apps that have served as downloaders for Android banking malware. The malware The packages a mixture of Android cleaners and news app looked pretty legitimate: they did not ask for any suspicious permissions, and mimicked the activity the user expected them to exhibit. What the users could not see is that, in the background, they decrypted and executed a first stage payload, which then decrypted and More


Cilk Plus Is Being Dropped From GCC "IndyWatch Feed Tech"

Intel deprecated Cilk Plus multi-threading support with GCC 7 and now for GCC 8 they are looking to abandon this support entirely...


Air Force Launching Space Force in Next 3 Years "IndyWatch Feed Tech"

With China taking a strong lead in the militarization of the Final Frontier, the Air Force has announced its time for the US to catch up. Air Force Lieutenant General and President of Air University Steve Kwast says we need to change the way we look at space operations.

Failure is not an option is probably the most famous slogan to come out of NASA (apart from the closely related Houston, we have a problem). Those were the 1970s, thoughthis is a new age, with new rules. And according to Kwast, one of those rules should be fail-first, fail-forward. Even with rockets.

Its all part of a new proposal Kwast is pushing called Fast Space: Leveraging Ultra Low-Cost Space Access for 21st Century Challenges.


Time Will Tell if the New Vulnerabilities Equities Process Is a Step Forward for Transparency "IndyWatch Feed Tech"

The White House has released a new and apparently improved Vulnerabilities Equities Process (VEP), showing signs that there will be more transparency into the governments knowledge and use of zero day vulnerabilities. In recent years, the U.S. intelligence community has faced questions about whether it stockpiles vulnerabilities rather than disclosing them to affected companies or organizations, and this scrutiny has only ramped up after groups like the Shadow Brokers have leaked powerful government exploits. According to White House Cybersecurity Coordinator Rob Joyce, the form of yesterdays release and the revised policy itself are intended to highlight the governments commitment to transparency because its the right thing to do.

EFF agrees that more transparency is a prerequisite to any debate about government use of vulnerabilities, so its gratifying to see the government take these affirmative steps. We also appreciate that the new VEP explicitly prioritizes the governments mission of protecting core Internet infrastructure, information systems, critical infrastructure systems, and the U.S. economy and recognizes that exploiting vulnerabilities can have significant implications for privacy and security. Nevertheless, we still have concerns over potential loopholes in the policy, especially how they may play into disputes about vulnerabilities used in criminal cases.

The Vulnerabilities Equities Process has a checkered history. It originated in 2010 as an attempt to balance conflicting government priorities. On one hand, disclosing vulnerabilities to vendors and others outside the government makes patching and other mitigation possible. On the other, these vulnerabilities may be secretly exploited for intelligence and law enforcement purposes. The original VEP document described an internal process for weighing these priorities and reaching a decision on whether to disclose, but it was classified, and few outside of the government knew much about it. That changed in 2014, when the NSA was accused of long-term exploitation of the Heartbleed vulnerability. In denying those accusations and seeking to reassure the public, the government...


What Causes Cascading Power Grid Failures "IndyWatch Feed Tech"

A tiny fraction of power lines cause most of cascading power failures Gif images: Takashi Nishikawa and Adilson E. Motter

Just a few vulnerable patches in North American power grids are responsible for most of the continents largest blackouts, a new study finds. These insights could lead to ways to make power grids more robust, researchers say.

Power failures sometimes only have mild and fairly local effects, but other times similar initial failures cascade to cause major failures across power grids. Understanding the causes of these cascades is challenging because the conditions of power grids can vary greatly by peak usage times, level of power demand, seasons and other factors.

To shed light on how failure cascades are triggered, scientists from Northwestern University in Evanston, Illinois. analyzed U.S. Federal Energy Regulatory Commission data regarding the U.S.-South Canada power grid, which has more than 100,000 transmission lines. Using information spanning the years 2008 to 2013, they developed a model of the behavior of these lines within electrical networks across North America.

The research team's simulations revealed that over the entire network, only 10.8 percent of all transmission lines were vulnerable to the kind of "primary failure" that could trigger a cascade. They also found that 85 percent of all primary failures occurred roughly 20 percent of these links, which altogether made up about 2.16 percent of all links. These more-vulnerable components were typically geographically clustered near each other and were often located near densely populated areas.

"In the North American power grid, the set of power lines that are susceptible to failures were found to represent a surprisingly small fraction of the whole network," says study co-author Takashi Nishikawa, an applied mathematician at Northwestern.

Their findings also suggest that power failures cannot spread essentially without bound. Their simulations found that while the physics underlying the spread of power failures do not put constraints on how far a failure can hop in a single step, they generally tend to stay close to where they originated. "The power grid is quite robust against the propagation of failures perhaps surprisingly robust, when we consider all the complexities involved," Nishikawa says.

These findings "suggest that the vulnerability of individual network components should be considered in prioritizing power line upgrades," Nishikawa say...


Exercise May Help to Protect Your Eyesight "IndyWatch Feed Tech"

There are many benefits to exercise and how it can reduce the impact of the aging process. We have previously talked about how even a moderate amount of gentle exercise, such as walking, dancing, and strength training, can improve health and reduce mortality.

New research suggests that even moderate levels of physical activity can reduce glaucoma, one of the leading causes of blindness in the United States, and which is most prevalent among the elderly.

The data presented by UCLA researchers at the 121st Annual Meeting of the American Academy of Ophthalmology showed that the most physically active people involved in a recent study have a 73 percent reduced risk of developing glaucoma compared to the least active.


Court Rules Platforms Can Defend Users Free Speech Rights, But Fails to Follow Through on Protections for Anonymous Speech "IndyWatch Feed Tech"

A decision by a California appeals court on Monday recognized that online platforms can fight for their users First Amendment rights, though the decision also potentially makes it easier to unmask anonymous online speakers.

Yelp v. Superior Court grew out of a defamation case brought in 2016 by an accountant who claims that an anonymous Yelp reviewer defamed him and his business. When the accountant subpoenaed Yelp for the identity of the reviewer, Yelp refused and asked the trial court to toss the subpoena on grounds that the First Amendment protected the reviewers anonymity.

The trial court ruled that Yelp did not have the right to object on behalf of its users and assert their First Amendment rights. It next ruled that even if Yelp could assert its users rights, it would have to comply with the subpoena because the reviewers statements were defamatory. It then imposed almost $5,000 in sanctions on Yelp for opposing the subpoena.

The trial courts decision was wrong and dangerous, as it would have prevented online platforms from standing up for their users rights in court. Worse, the sanctions sent a signal that platforms could be punished for doing so. When Yelp appealed the decision earlier this year, EFF filed a brief in support [.pdf].

The good news is that the Fourth Appellate District of the California Court of Appeal heard those concerns and reversed the trial courts ruling regarding Yelps ability known in legal jargon as standing to assert its users First Amendment rights.

In upholding Yelp and other online platforms legal standing to defend their users anonymous speech, the court correctly recognized that the trial courts ruling would have a chilling effect on anonymous speech and the platforms that allow it. The court also threw out the sanctions the trial court issued against Yelp.

We applaud Yelp for fighting a bad court decision and standing up for its users in the face of court sanctions.  Although were glad that the court affirmed Yelps ability to fight for its users rights, another part of Mondays ruling may ultimately make it easier for parties to unmask anonymous speakers.

After finding that Yelp could argue on behalf of its anonym...


University Could Lose Millions From Unethical Research Backed by Peter Thiel "IndyWatch Feed Tech"

Questionable herpes vaccine research backed by tech heavyweight Peter Thiel may have jeopardized $15 million in federal research funding to Southern Illinois University School of Medicine. That's according to documents obtained by a Freedom of Information Act request by The State Journal Register.

In August, Kaiser Health News reported that Thiel and other conservative investors had contributed $7 million for the live-but-weakened herpes virus vaccine, developed by the late SIU researcher William Halford. The investments came after Halford and his private company, Rational Vaccines, had begun conducting small clinical trials in the Caribbean nation of St. Kitts and Nevis. With the off-shore location, Rational Vaccines' trial skirted federal regulations and standard safety protocols for human trials, including having approval and oversight from an institutional review board (IRB).

Experts were quick to call the unapproved trial "patently unethical," and researchers rejected the data from publication, calling the handling of safety issues "reckless." The government of St. Kitts opened an investigation into the trial and reported that health authorities there had been kept in the dark.


Original Submission

Read more of this story at SoylentNews.


Radio Apocalypse: The Emergency Broadcast System "IndyWatch Feed Tech"

Some sounds are capable of evoking instant terror. It might be the shriek of a mountain lion, or a sudden clap of thunder. Whatever your trigger sound, it instantly stimulates something deep in the lizard brain that says: get ready, danger is at hand.

For my part, you cant get much scarier than the instantly recognizable two-tone alert signal (audio link warning) from the Emergency Broadcast System (EBS). For anyone who grew up watching TV in the 60s and 70s in the US, it was something you heard on at least a weekly basis, with that awful tone followed by a grave announcement that the broadcasters of your area, in voluntary cooperation with the FCC and other authorities, have developed this system to keep you informed in the event of an emergency. It was a constant reminder that white-hot death could rain from the sky at any moment, and the idea that the last thing you may ever hear was that tone was sickening.

While I no longer have a five-year-olds response to that sound, its still a powerful reminder of a scary time. And the fact that its still in use today, at least partially, seems like a good reason to look at the EBS in a little more depth, and find out the story behind the soundtrack of the end of the world.

Replacing the CONELRAD System

The EBS system was developed as a response to shortcomings in the CONELRAD system for civil preparedness announcements. As Al Williams noted in his recent article on CONELRAD, the system was troubled by nuisance alarms and a complicated operating procedure that required every TV and radio transmitter to go dark and have designated AM stations retune their transmitters to one of the two CONELRAD frequencies. Expecting broadcast engineers to perform these tasks under the threat of sudden annihilation was probably something that should have been subjected to a little human-factors testing.

As a response to this, EBS was first fielded in 1963. It was designed to deal with the changing nature of the threat; CONELRAD imposed radio silence to deny bomber pilots of electronic landmarks, while EBS recognized that ballistic missiles needed no such aids. EBS was more inclusive, too, requiring TV stations and FM broadcasters to participate, in a tacit acknowledgment that AM radio was no longer the big kid on the block.

The EBS system did take cues from CONELRAD, though. The basic architecture was the same to create one nationwide network that the government could use to transmit consistent messages and instructions quickly and efficiently. Linking the national carriers into a...


GitHubs Atom text editor now lets developers collaborate on code in real-time "IndyWatch Feed Tech"

GitHubs Atom text editor allows you to collaborate on code in real-time

GitHub, a popular online versioning repository hosting system, had launched Atom text editor three years ago as a free and open-source text and source code editor for coders working on macOS, Linux, and Microsoft Windows platforms. Atom helps you write code faster with a smart, flexible autocomplete. Also recently, Atom added Git and GitHub integration directly in Atom via the GitHub package.

The online hub yesterday announced a new feature for its Atom text editor known as Teletype for Atom that makes it easier for fellow developers on a project to work with one another on shared code. Teletype allows developers to share their workspace with team members, write or edit code together simultaneously, and collaborate on code in real time, thereby sharing valuable knowledge and producing quality software.

Developers can create a Teletype session from Atom and share this with online collaborators. Once a team member joins the same session on Atom, it will be able to stream the content of user with collaborators.

Teletype introduces the concept of real-time portals for sharing workspaces. When a host opens a portal, their active tab becomes a shared workspace. There, invited collaborators can join in and make edits in real time. As the host moves between files, collaborators follow along with the active tab automatically, reads the blog on teletype.

Teletype wires the keystrokes of remote collaborators directly into your programming environment, enabling conflict-free, low-latency collaborative editing, on any file you can open in Atom. It also lets each user keep their preferred themes, key bindings, and plugins. Since, Teletype uses WebRTC to encrypt all communication between collaborators, the chances of anyone spying over your code does not exist. This maximizes your privacy and minimizes latency between you and your collaborators.

The Teletype feature is still in beta stage and there are chances of few more functionality being added in the coming days. For those interested in trying out, can install Teletype for Atom from here, and the Teletype package by clicking here.

Source: TNW

The post GitHubs Atom text editor now lets developers collaborate on code in real-time appeared first on TechWorm.


[$] SPDX identifiers in the kernel "IndyWatch Feed Tech"

Observers of the kernel's commit stream or mailing lists will have seen a certain amount of traffic referring to the addition of SPDX license identifiers to kernel source files. For many, this may be their first encounter with SPDX. But the SPDX effort has been going on for some years; this article describes SPDX, along with why and how the kernel community intends to use it.


Are There More Urgent Issues Than Aging? "IndyWatch Feed Tech"

Every so often when talking about aging and eradicating age-related diseases someone will say there are other more important things that must be solved before we earn the right to live healthy and longer lives.

When you discuss any major issue, sooner or later someone will say it: there are more urgent issues than whatever it is youre advocating for. Sometimes it may be true; other times, and probably most of the time, its a logical fallacy known as appeal to worse problems (or not as bad as, or even fallacy of relative privation).

For example, say youve got two issues, A and B, that cannot possibly be both dealt with at the same time; if A is life-threatening and B isnt, well, then I think itd make sense to reply there are more urgent issues to whoever suggests B should be taken care of first. However, all too often, this answer is abused to play down the importance of a problem that doesnt happen to be ones personal favouriteand yes, Ive seen this happen with rejuvenation therapies.


mindBEAGLE Brain-Computer Interface Gives Non-Speaking, Immobilized People a Voice "IndyWatch Feed Tech"

mindBEAGLE EEG helps people trapped in paralyzed bodies tell their families they understand Photo: Florian Voggeneder

An Austrian organization is using brain-computer interface technology to help people in one of lifes most horrifying plights: being cognitively aware, but trapped in a body that cant move, speak, blink or communicate in any way. The developer of the system, g.tec medical engineering , is commercializing the system, and this week held an explanatory workshop at Society for Neurosciences meeting in Washington D.C. 

The tool gives people in this dreaded condition, called locked-in syndrome, the ability to answer yes-or-no questions using only their thoughts. The technique can also aid communication with people in unresponsive wakefulness states, but not people in comas where there in no cognitive function.

The system, called mindBEAGLE, relies on electroencephalography (EEG) to detect brain activity, and machine-learning algorithms to interpret the meaning of that activitya type of communication called brain-computer interface, or BCI. In the mindBEAGLE system, users wear on their scalps an EEG cap with 16 electrodes. They also wear on their hands vibration motors that deliver tactile sensations much like the vibration of a ringing mobile phone.

Then the user is asked a yes-or-no question. To respond, users focus on the vibrations on one of their handsleft hand for yes and right hand for no. The EEG cap detects the brain activity generated by the task. The most important signals are p300s brain waves that occur when someone is responding to an uncommon event that requires attention, says Christoph Guger, CEO and founder of g.tec. 

Algorithms trained by Guger and his team then identify the users p300 waves and their association with the right or left hand. The computer, accordingly, flashes the word yes or the word no to anxiously awaiting loved ones. Each question takes about 38 seconds. 

In a study of patients with locked-in syndrome, 9 out of 12 people were able to communicate using the BCI system, answering on average eight out of ten questions correctly, according a study led by g.tec and the University of Palermo, in Italy. Additionally, two out of three patients with the most severe form of locked-in syn...


Photos: Diving Beneath Antarcticas Ross Ice Shelf "IndyWatch Feed Tech"

Oldest tree found.

Fossilized trees from a much warmer era of Antarctic history could provide a basis for predictions about the planets warming future.


GhostBSD 11.1 Released: FreeBSD With MATE & Xfce Desktop Experience "IndyWatch Feed Tech"

GhostBSD 11.1 is now available as the BSD operating system derived from FreeBSD 11.1 while catering to Xfce and MATE desktop experiences...


New projects on Hosted Weblate "IndyWatch Feed Tech"

Hosted Weblate provides also free hosting for free software projects. The hosting requests queue has grown too long, so it's time to process it and include new project.

This time, the newly hosted projects include:

If you want to support this effort, please donate to Weblate, especially recurring donations are welcome to make this service alive. You can do that easily on Liberapay or Bountysource.

Filed under: Debian English SUSE Weblate


Pluto's Hydrocarbon Haze Makes it Even Colder "IndyWatch Feed Tech"

Pluto is much colder than what would normally be expected due to a haze of hydrocarbon particles suspended in Pluto's tenuous atmosphere:

One of the more bizarre things [New Horizons] found was that the haze in Pluto's atmosphere was much thicker than our previous peeks indicated. The icy hunk of rock also had an atmosphere much cooler than earlier estimates, topping out at -333.4 F (more than 50 degrees colder than expected, even for something about 40 times further from the Sun than Earth is).

Now, a study [DOI: 10.1038/nature24465] [DX] published in Nature links those two atmospheric observations. A computer model developed by University of California Santa Cruz planetary scientist Xi Zhang and colleagues shows the haze of tiny droplets in the upper atmosphere is likely scattering light from the Sun, preventing heat from reaching the planet below.

"It's been a mystery since we first got the temperature data from New Horizons," Zhang, said in a statement. "Pluto is the first planetary body we know of where the atmospheric energy budget is dominated by solid-phase haze particles instead of by gases."

[...] This haze appears to be made up of large hydrocarbon droplets, created high in the atmosphere when ultraviolet light from the Sun strips electrons from particles of methane and nitrogen gas. The reaction helps form solid bits of hydrocarbon. But what gets created up there must still come down. Pulled back to the surface by gravity, the hydrocarbons start to bond together, eventually creating a thick haze. It doesn't completely block sunlight, but rather absorbs and re-scatters it, theoretically warming up part of the atmosphere while keeping most of Pluto frigid below.

Original Submission

Read more of this story at SoylentNews.


Super Low Tech Mario "IndyWatch Feed Tech"

Super Mario has had its shares of hacks, like this interface hack using a Kinect to control Mario or this super tricky jailbreak hack that allows players to run their own game mods, but this one is just on another level: a low tech approach. It seems like it could be a fun weekend project, especially if you have kids. If youre not into Super Mario, its possible to just print a different game, the supporting platform is pretty generic and could support several simplified platform games.

Check out the video:

If you make one, wed be happy to know about it.

Filed under: misc hacks


Intel's Mesa GLSL Shader Cache Is Speeding Up Game Load Times "IndyWatch Feed Tech"

At the start of the month the Intel i965 Mesa driver finally landed its on-disk shader cache, months after the GLSL on-disk shader cache originally landed in core Mesa and wired up for the RadeonSI Gallium3D driver. While you can't play too many shader-heavy games with current Intel integrated graphics, this GLSL shader cache within Mesa 17.4-dev Git is working well for speeding up load times and does provide some frame-rate benefits in games dynamically loading shaders.


A Boeing 757 was hacked remotely while it sat on the runway "IndyWatch Feed Tech"

A Boeing 757 was hacked remotely while it sat on the runway

Don't panic too much - the hack of the legacy commercial airliner was an exercise conducted by a team of security professionals.

Read more in my article on the Tripwire State of Security blog.


Tech experts blast Trumps extreme vetting plan "IndyWatch Feed Tech"

A chorus of technology experts on Thursday heavily criticized President Trumps plan to use artificial intelligence to screen individuals seeking entry to the United States, calling it neither appropriate nor feasible. More than 50...


EFF Urges DHS to Abandon Social Media Surveillance and Automated Extreme Vetting of Immigrants "IndyWatch Feed Tech"

EFF is urging the Department of Homeland Security (DHS) to end its programs of social media surveillance and automated extreme vetting of immigrants. Together, these programs have created a privacy-invading integrated system to harvest, preserve, and data-mine immigrants' social media information, including use of algorithms that sift through posts using vague criteria to help determine who to admit or deport.

EFF today joined a letter from the Brennan Center for Justice, Georgetown Laws Center on Privacy and Technology, and more than 50 other groups urging DHS to immediately abandon its self-described "Extreme Vetting Initiative."Also, EFF's Peter Eckersley joined a letter from more than 50 technology experts opposing this program. This follows EFF's participation last month in comments from the Center for Democracy & Technology and dozens of other advocacy groups urging DHS to stop retaining immigrants' social media information in a government record-keeping system called "Alien Files" (A-files).

DHS for some time has collected social media information about immigrants and foreign visitors. DHS recently published a notice announcing its policy of storing that social media information in its A-Files. Also, DHS announced earlier this year that it is developing its Extreme Vetting Initiative, which will apply algorithms to the social media of immigrants to automate decision-making in deportation and other procedures.

These far-reaching programs invade the privacy and chill the freedoms of speech and association of visa holders, lawful permanent residents, and naturalized U.S. citizens alike. The...


What motivates bug hunters? "IndyWatch Feed Tech"

Crowdsourced security penetration testing outfit Bugcrowd has released its second annual Mind of a Hacker report, to provide insight into bug hunters motivations and preferences, and help companies tailor their bug bounty initiatives so they can lead to better results for everyone. The most interesting insights gleaned from the answers of the 500 or so bug hunters who participated in the survey are as follows: They come from all over the world (216 countries), but More


Bosch Has Been Developing A 3D Window Manager Using Wayland "IndyWatch Feed Tech"

In what appears to be research for potential use within in-vehicle infotainment (IVI) systems, Bosch in conjunction with other organizations has been developing a 3D window manager that's built atop Wayland/Weston...


Forever 21 clothing stores hit by credit card data breach after encryption failure "IndyWatch Feed Tech"

Clothing retailer Forever 21 is telling customers to keep a close eye on their credit card statements, after the American fashion outlet warned that it had suffered a data breach at some of its stores.

Read more in my article on the Hot for Security blog.


Reflected Cross-Site Scripting Vulnerability in Jenkins Delivery Pipeline Plugin "IndyWatch Feed Tech"

Posted by Daniel Beck on Nov 16

Jenkins is an open source automation server which enables developers around
the world to reliably build, test, and deploy their software. The following
plugin releases contain fixes for security vulnerabilities:

* Delivery Pipeline Plugin 1.0.8

Summaries of the vulnerabilities are below. More details, severity, and
attribution can be found here:

We provide advance notification for security...


Samsung Galaxy S9 rumored to launch with Face recognition technology like iPhone X "IndyWatch Feed Tech"

Samsung likely to launch Galaxy S9 early with face recognition like iPhone X

Samsung is expected to announce the Galaxy S9 even earlier than the announcement of Galaxy S8 this year, which was in March, according to a tipster. This means that the Galaxy S9 could possibly be launched at the Consumers Electronics Show (CES) 2018 or maybe a few weeks before the start of Mobile World Congress (MWC) in February 2018.

The same tipster has also mentioned that Samsung has borrowed some of the iPhone X feature, like the facial recognition technology also known as Face ID in iPhone X. We had recently reported how Samsung was finding it difficult to implement the in-display fingerprint scanner under the screen of Galaxy S9 and S9+ smartphones due to technical complications. As a result, the Korean tech giant decided not to include fingerprint sensors under the screen of the S9 line of smartphones.

However, unlike its biggest competitor, Apple who has given up on fingerprint scanner entirely in the new iPhone X in favor of its new Face ID, Samsung has decided not to follow suit. It is reportedly working on a development project known as crown that is looking into installing of the fingerprint sensor under the screen of the Galaxy Note 9.

Further, it is also rumoured that Galaxy S9 will feature a dual camera system, that was previously introduced by Samsung in Galaxy Note 8 this year and top-of-the-line specifications, including the Snapdragon 845 SoC.

Since there is no official announcement or news from the tech giant on Galaxy S9, it is advisable to take these rumors with a pinch of salt. We are likely to come across more rumors and leaks about the device in the near future until the official launch is announced.

Source: Slashgear

The post Samsung Galaxy S9 rumored to launch with Face recognition technology like iPhone X appeared first on TechWorm.


Distribution Release: Slax 9.2.1 "IndyWatch Feed Tech"

Following a long absence, the Slax project has returned and the new version, Slax 9.2.1, features several significant changes. Slax no longer uses Slackware as its base, the project is now built using Debian packages. With this migration to Debian, Slax will also adopt the APT package management....


The Hacker Village of Supercon "IndyWatch Feed Tech"

Im utterly exhausted and still in a state of awe. The Hackaday Superconference has grown in so many ways, but one thing remains the same: the spirit of the Hacker Village an intangible feeling that grows up around all who attend is bliss to take part in.

Theres really no substitute for having been there in person. Ill go into detail below and try to share the experience as best I can. But the gist of the atmosphere is this: everyone at Supercon is the type of person youd want to be stuck in a rowboat with, or partnered with on an engineering project, or to have next to you while trying to save the world. There are no looky-loos at Supercon. It turns out we are all stuck in a rowboat together, we are all working on engineering projects, and we are all trying to save the world. And when we all get together it feels like a drug our pragmatic minds never knew existed. This is the recharge for that sense of urgency that keeps you going all year long.

So yes, you really missed it. But start now. Become friends with all of these people over the next year. Begin building your Supercon community now and itll feel like a reunion when it rolls around again next November.

Fridays Packed Hackathon (and a Huge Party)

Last weekend marked the third time for the Hackaday Superconference. We hosted it in Pasadena again this year, and added a day! The festivities were supposed to begin at noon on Friday but by 10:30 AM we already had people on site wanting to pick up a badge and get the hacking started. By the time noon rolled around all the tables were full and we were spilling over to all other parts of Supplyframe headquarters which played host.



5 Coolest Linux Terminal Emulators "IndyWatch Feed Tech"

5 Coolest Linux Terminal Emulators


Tegra CEC Support & Other Media Updates For Linux 4.15 "IndyWatch Feed Tech"

The media subsystem updates have been submitted for Linux 4.15 and continues the recent theme of HDMI CEC "Consumer Electronics Control" upbringing within the mainline kernel...


Meteors Seen Over Arizona, Ohio, Germany, and France "IndyWatch Feed Tech"

Fireball that streaked across Phoenix sky was a meteor, astronomers say

Astronomers say the bright light that streaked across the night sky Tuesday was "almost certainly" a meteor. The city of Phoenix captured the illumination on one of its observation cameras and posted it to Twitter. In the video, a large, glowing bulb appears in the top-right frame and then fades out in three seconds. A smaller light can be seen in the lower portion of the frame, off in the horizon. It happened around 8:30 p.m.

[...] "Given the speed and everything, this was almost certainly a meteor rather than a piece of space junk," said Laurence Garvie, curator of Arizona State University's Center for Meteorite Studies. Specifically, the meteor was a "bolide" a type of fireball that explodes in a bright terminal flash, according to the American Meteor Society. "This thing wasn't huge. I'm going to guess about 5 feet across. It broke up quite quickly," Garvie said.

Four fireball meteors flashed across the sky over the U.S. and Europe on Tuesday night (archive)

Three other meteors kept the American Meteor Society and the International Meteor Organization very busy on Tuesday night. At 8:40 p.m., a fireball lit up the sky over southern Ohio. Later in the night, two meteors zoomed over Europe one over Germany and the other over France. More than 1,300 people sent reports to the organizations, making last night the busiest night they've ever had since the online reporting forms were launched.

It looks like the fireballs were at least somewhat related the Taurid meteor shower peaked on Saturday, and Taurid meteors are still shooting across the sky. "Associated with the comet Encke, the Taurids are actually two separate showers, with a Southern and a Northern component," the American Meteor Society wrote on Wednesday morning. "Both branches of the Taurids are most notable for colorful fireballs and are often responsible for an increased number of fireball reports from September through November."

Original Submission



Security updates for Thursday "IndyWatch Feed Tech"

Security updates have been issued by Arch Linux (firefox, flashplugin, lib32-flashplugin, and mediawiki), CentOS (kernel and php), Debian (firefox-esr, jackson-databind, and mediawiki), Fedora (apr, apr-util, chromium, compat-openssl10, firefox, ghostscript, hostapd, icu, ImageMagick, jackson-databind, krb5, lame, liblouis, nagios, nodejs, perl-Catalyst-Plugin-Static-Simple, php, php-PHPMailer, poppler, poppler-data, rubygem-ox, systemd, webkitgtk4, wget, wordpress, and xen), Mageia (flash-player-plugin, icu, jackson-databind, php, and roundcubemail), Oracle (kernel and php), Red Hat (openstack-aodh), SUSE (wget and xen), and Ubuntu (apport and webkit2gtk).


Dip update 116/n "IndyWatch Feed Tech"

[Orig: Nov 16, 2017]
Hi everyone,
Brief post to share the graph of the latest data.  Enjoy! 
~Tabby and team
PS: These observations are happening because of the wonderful backers of our 2016 Kickstarter project. The Kickstarter campaign has ended, but we are still accepting donations to purchase additional observing time on the LCO 0.4m network. Thanks in advance for your support!      


Woman scammed for $60,000 through fake Police website "IndyWatch Feed Tech"

By Waqas

With every passing day, cybercriminals are getting sophisticated in their

This is a post from Read the original post: Woman scammed for $60,000 through fake Police website


A Useful Intel Power Management Feature Has Landed For Linux 4.15 "IndyWatch Feed Tech"

The libata subsystem changes these days tend to not be too interesting, but for Linux 4.15 there is a noteworthy power management change...


For strong unified communications security, behavioral analytics is critical "IndyWatch Feed Tech"

If theres one thing security professionals should understand and acknowledge whether theyre part of an organizations multi-person IT security team or the CISO guiding that team its that the widespread, varying and rapidly changing threat landscape is impossible to keep up with. For every step an organization takes in protecting its infrastructure, attackers are two steps ahead working to figure out how to break in. Why? Hackers are agile, can launch hundreds if More


The long tail of phishing attacks "IndyWatch Feed Tech"

Targeted phishing has become the single most effective attack type in the world today. Phishing attacks have been the root cause of the majority of the large-scale data breaches that compromised the sensitive information of millions of individuals and extracted financial gains from some of the worlds largest companies. In March, a spear-phishing scam that used the cover of the tax season and W-2 filings tricked more than 120,000 people into sharing their personal data. More


Cisco issued a security advisory warning of a flaw in Cisco Voice Operating System software "IndyWatch Feed Tech"

Cisco issued a security advisory warning of a vulnerability in Cisco Voice Operating System software platform that affects at least 12 products.

The tech giant Cisco issued a security advisory warning of a vulnerability in Cisco Voice Operating System software platform that could be triggered by an unauthenticated, remote hacker to gain unauthorized and elevated access to vulnerable devices.

The flaw in Cisco Voice Operating System software platform, tracked as CVE-2017-12337, was rated as Critical

A vulnerability in the upgrade mechanism of Cisco collaboration products based on the Cisco Voice Operating System software platform could allow an unauthenticated, remote attacker to gain unauthorized, elevated access to an affected device. reads the Cisco Security Bulletin.

The vulnerability occurs when a refresh upgrade or Prime Collaboration Deployment (PCD) migration is performed on an affected device. When a refresh upgrade or PCD migration is completed successfully, an engineering flag remains enabled and could allow root access to the device with a known password.

The US-CERT issued an alert related to the flaw encouraging users and administrators to review apply the necessary update.

Cisco issued a security advisory warning of a flaw in Cisco Voice Operating System software

A remote attacker that manages to access the vulnerable devices over SSH File Transfer Protocol (SFTP) could gain root access. 12 products are affected by the vulnerability, including Cisco Prime License Manager, Cisco SocialMiner, Cisco Emergency Responder and Cisco MediaSense.

An attacker who can access an affected device over SFTP while it is in a vulnerable state could gain root access to the device. This access could allow the attacker to compromise the affected system completely. continues the security bulletin.

The vulnerability could be fixed by upgrading the device using the standard upgrade method to an Engineerin...


Think you deleted that embarrassing WhatsApp message you sent? Think again "IndyWatch Feed Tech"

if there's one thing we should all have learnt from our years on the internet it's this - once you say something somewhere, it's very hard to take it back and pretend it never happened.

Read more in my article on the We Live Security blog.


Mozilla Still Isn't Ready To Enable OpenGL By Default In Firefox For Linux "IndyWatch Feed Tech"

There's been a seven year old bug report about enabling OpenGL accelerated layers by default on Firefox for Linux on at least some supported hardware, but Mozilla still doesn't have any plans to do so...


Measuring fraud trends across various industries "IndyWatch Feed Tech"

Businesses across industries are experiencing more sophisticated fraud attempts across multiple customer-not-present channels, according to IDology. Shifting fraud tactics and synthetic identity fraud Sixty-seven percent of organizations reported an increase in fraud attempts, compared to just 42 percent in 2016, an increase of 58 percent. Major breaches have provided criminals with more identity data to utilize as they constantly shift strategies to evade detection. Criminals also are using more sophisticated schemes that are harder to More


With GMOs, There is No Ubuntu "IndyWatch Feed Tech"

Retired judge Justice Patrick Tabaro writes of a proposed law in Uganda that looks to adversely affect its independence and, specifically, what is starting to be called these days "food security".

[...] science is not a magic wand for solving man's food security concerns, but must be applied in accordance with Ubuntu (humaneness).

[...] Since the advent of civilization, peasants have had capacity to plant their own seeds. With the advent of GMO farming, the peasants who constitute 70 per cent of the population have their fate sealed; they may fall into the debt trap, fail to service bank loans and will be in danger of losing their cherished land holdings to financial institutions and this may entail food insecurity for everyone.

[...] God forbid that anyone should be targeting our scientists to make us vulnerable for easy domination.

He concludes that [w]ith GMOs, there is no Ubuntu, (human nature, humanness, humanity, virtue, goodness, and kindness).

Original Submission

Read more of this story at SoylentNews.


Sharp rise in fileless attacks evading endpoint security "IndyWatch Feed Tech"

A new Ponemon Institute survey of 665 IT and security leaders finds that over-reliance on traditional endpoint security is leaving organizations exposed to significant risk. 54 percent of respondents said their company experienced a successful attack. Of those respondents, 77 percent were victim to fileless attack or exploit. This survey reveals that ignoring the growing threat of fileless attacks could be costly for organizations. said Dr. Larry Ponemon, Chairman and Founder of Ponemon Institute. The More


Are your enterprise leaders digitally literate? "IndyWatch Feed Tech"

Only 53 percent of surveyed business technology professionals believe their organizations leadership is digitally literate, according to ISACA. The other 47 percent either dont think their business leaders have a solid understanding of technology and its impacts, or are unsure. Digital literacy and receptiveness to emerging technologies among leadership A concerning 47 percent arent confident that their leaders are digitally literate, the data indicates. With nearly a quarter of these same leaders noted as needing More


How to use a here documents to write data to a file in bash script "IndyWatch Feed Tech"

How do I use a heredoc redirection feature (here documents) to write data to a file in my bash shell scripts?


Your Drone Is Cool, But Its No Jet Fighter "IndyWatch Feed Tech"

There are some communities with whom our happy band of hardware hackers share a lot in common, but with whom we dont often associate. The more workshop-orientated end of the car modification or railway modeler scenes, for instance, or the model aircraft fraternity. Many of these communities exist more for the activity than for the making, some of them dabble with building kits, but among them are a hard core of people who create amazing projects from scratch.

Take [Igor Negoda], for example. Not content with building just any model aircraft, hes built his own from scratch, to his own design. And if designing for yourself what amounts to a scaled-down jet fighter wasnt enough, hes also built his own jet engine to power it. His videos are all in Russian so use YouTubes subtitle feature if youre not a Russian speaker, but theyre so good that if you couldnt access the English translation youd want to learn the language just to hear his commentary.

The video below the break shows us first a fast-taxi test using a ducted fan, then a full test flight with the jet engine. There is an explanation of the fuel system and the flight control systems, before an impressive flight from what appears to be a former Cold War-era runway. There are a few funny moments such as transporting a large model jet aircraft in a small hatchback car, but the quality of the work in a garage workshop shines through. Suddenly a multirotor doesnt cut it any more, we want a jet aircraft like [Igor]s!



Filed under: transportation hacks


Cloud Native Storage: A Primer "IndyWatch Feed Tech"

We recently debated at a technical forum what cloud native storage is, which led me to believe that this topic deserves a deeper discussion and more clarity.

First though, I first want to define what cloud native applications are, as some may think that containerizing an application is enough to make it cloud-native. This is misleading and falls short of enabling the true benefits of cloud native applications, which have to do with elastic services and agile development. The following three attributes are the main benefits, without which were all missing the point:


Koogeek LB1 Wi-Fi Smart LED Light Bulb Review "IndyWatch Feed Tech"

Review: Koogeek LB1 Wi-Fi Smart LED Bulb

One of the biggest advantages of automation technology is that it can turn an otherwise lifeless home into a piece of modern technology. Also, smart technology puts the owner in control of their electronic devices such as lighting, entertainment and temperature at the push of a button by just sitting on the couch. You too can enjoy smart life through smart connected homes.

Koogeek has introduced its new HomeKit enabled Wi-Fi Smart LED Light Bulb that can be easily connected to a 2.4 GHz Wi-Fi network without a hub or bridge. It works with Apple HomeKit technology and provides an easy, secure way to turn your connected light on or off, set light colors, or adjust light brightness and saturation through Siri voice control on your iPhone, iPad, iPod touch, or Apple Watch.

It supports dimming, shades of white, and color settings and offers 16 million colors to choose from. Every color is dimmable in the Koogeek Home app. You can match different colors to create special atmospheres for every moment and personalize your home. You can easily turn off lights with a single tap, without getting out of the comfort of your bed. It uses only 8 watts and delivers up to 500 lumens of light with a color temperature from 2700k (warm white) to 6000k (daylight white). It has an energy saving with a lifetime of up to 25,000 hours, which is 22.8 years based on 3 hours use per day. It is compatible with E26/E27 light fittings (medium screw base) and is for indoor use only.

You need to no longer worry about forgetting to turn off lights while leaving home, as you can set different timers to turn lights on or off on Koogeek smart light bulbs. You can also wake up in the morning with your favorite light turned on automatically. You can create scenes to control multiple connected bulbs simultaneously with a single Siri voice command or just a tap and customize lighting effects and create brilliant lights for parties or festivals.

You can set up your Apple TV with tvOS 10.1 or later or iPad with iOS 10.1 or later as a home hub to control your HomeKit accessories remotely, grant access, and automate your accessories.

To set up the light bulb, you need to simply configure it from the Koogeek Home app over a 2.4 GHz Wi-Fi network. It is available in grey color. You can purchase Koogeek Wi-Fi Smart LED Light Bulb from Amazon at a price of $39.99.

To know more about Koogeek LB1 Smart LED Bulb, go over to their...


Ethereum's Foot-In-Mouth Disease "IndyWatch Feed Tech"

Vinay Gupta, one of the main figures behind Ethereum, is having a meltdown. Someone he doesn't like ( was apparently considering using Ethereum for something. Gupta has posted some...interesting tweets. Key quotes:

"[Don't use] Ethereum. We are all communists"

"We will collude against you"

"We do infrastruture. You depend on us. We will find ways. Count on it".

Are these the kinds of things one wants to hear from the people behind a digital currency (and platform) that one is supposed to trust? They will "find ways" to "collude" against anyone they dislike?

Seriously, the more I learn about Ethereum, the less I like it. Full disclosure: I sold what few ETH I owned several months ago, for reasons related to "The DAO" mess.

Original Submission

Read more of this story at SoylentNews.


IT Disaster Recovery: Sysadmins vs. Natural Disasters "IndyWatch Feed Tech"

Businesses need to keep going even when faced with torrential flooding or earthquakes. Sysadmins who lived through Katrina, Sandy, and other disasters share real-world advice for anyone responsible for IT during an emergency.

When the lights flicker and the wind howls like a locomotive, it's time to put your business continuity and disaster recovery plans into operation.


ASPM Fixes, SR-IOV Improvements & Other PCI Improvements For Linux 4.15 "IndyWatch Feed Tech"

There are a lot of PCI changes that have built up for the Linux 4.15 kernel cycle...


China and the CIA Are Competing to Fund Silicon Valleys AI Startups "IndyWatch Feed Tech"

The U.S. intelligence community is upping its early-stage investments in machine-learning companies but Beijing is pouring in far more.

A trio of new investments in Silicon Valley machine-learning startups shows that the U.S. intelligence community is deeply interested in artificial intelligence. But China is investing even more in these kinds of U.S. companies, and that has experts and intelligence officials worried.

Founded to foster new technology for spies, the 17-year-old In-Q-Tel has also helped boost commercial products. (Its investment in a little company called Keyhole helped produce Google Maps.) Compared to a venture capitalist firm whose early-stage investments are intended to make some money and get out, the nonprofits angle is longer term, less venture, more strategic, according to Charlie Greenbacker, In-Q-Tels technical product leader in artificial intelligence, machine learning, natural language processing, analytics, and data science.


Another Shady App Found Pre-Installed on OnePlus Phones that Collects System Logs "IndyWatch Feed Tech"

The OnePlus Saga Continues Just a day after the revelation of the hidden Android rooting backdoor pre-installed on most OnePlus smartphones, a security researcher just found another secret app that records tons of information about your phone. Dubbed OnePlusLogKit, the second pre-installed has been discovered by the same Twitter user who goes by the pseudonym "Elliot Alderson" and


MESA_program_binary_formats Added To The OpenGL Registry "IndyWatch Feed Tech"

Intel developers have seen their MESA_program_binary_formats extension added to the official OpenGL registry...


The Staff Union of the EPO (SUEPO) is Rightly Upset If Not Shocked at What Battistelli and Bergot Are Doing to the Office "IndyWatch Feed Tech"

The shock is probably years behind as this was foreseen/expected by many insiders

A militant EPO

Summary: The EPOs dictatorial management is destroying everything thats left (of value) at the Office while corrupting academia and censoring discussion by threatening those who publish comments (gagging its own staff even when that staff posts anonymously)

THE EPO is racing to the bottom. Its rushing to the very bottom of patent quality, just like in China a recipe for plenty of litigation and trolls (threat of litigation alone can help extract protection money).

SUEPOs response to the EPOs latest changes (effective weeks from now) was covered yesterday based on internal communications. These are changes which would definitely breed corruption, as we explained yesterday (as far as we are aware, we were the first to cover this).

WIPR wrote a puff piece with only quotes/comments from the patent microcosm, but the following is at least airing the response of SUEPO. To quote some portions:

In an internal memo, the Staff Union of the European Patent Office (SUEPO) described the move as Kafkaesque.

The outgoing EPO president Benot Battistelli entered the proposal alongside the EPOs director of human resources Elodie Bergot at the Budget and Finance Committees meeting on 24 October.

SUEPO revealed that the proposal was met with criticism from the budget and finance committee, particularly from representatives for Italy, the UK, Poland, and Germany.

According to SUEPO, Battistelli took issue with the criticism, intimating that it was his prerogative to govern until the last day of his mandate.

Battistelli is understood to have argued that the proposal had no financial implications and therefore he was free to push it through to the administrative council in December without the consent of the budget and finance committee.

SUEPO said that there is a serious risk that this plan will blow up.



Top 10 Linux Tools "IndyWatch Feed Tech"

One of the benefits to using Linux on the desktop is that theres no shortage of tools available for it. To further illustrate this point, Im going to share what I consider to be the top 10 Linux tools.


F2FS For Linux 4.15 Brings Some Enhancements, Changes For Android "IndyWatch Feed Tech"

The F2FS file-system changes have been submitted for the Linux 4.15 kernel merge window...


How to generate random JSON data structures "IndyWatch Feed Tech"

Yesterday I wrote a random JSON data structure generator for my next site Online Random Tools. Here's a quick article about what my thought process was when I was writing it.

1. What's a good name for this function? generateRandomJson sounds good. Let's put it in code:

function generateRandomJson () {

2. So what is a JSON data structure? It's one of number, string, boolean, array or object. So let's put it in code:

var choices = ["number", "string", "boolean", "array", "object"];
var choice = chooseOne(choices);

function chooseOne(choices) {
  return choices[parseInt(Math.random()*choices.length)];

3. What is a number? It's an integer or a floating point. Negative or positive. Let's put that in code:

if (choice == "number") {
  return generateRandomNumber();

function generateRandomNumber () {
  var maxNum = 2**32;
  var number = Math.random()...


DRM Updates Land For Linux 4.15; Torvalds: "There's Something Odd About DRM People" "IndyWatch Feed Tech"

Overnight the Direct Rendering Manager (DRM) display/graphics driver updates were sent out and ultimately pulled into the mainline kernel for Linux 4.15. This doesn't yet include though the separate AMDGPU DC pull request...


Moving API Security Testing into Dev/QA "IndyWatch Feed Tech"

Moving API Security Testing into Dev/QA


10-year-old unlock his moms iPhone X using his face "IndyWatch Feed Tech"

10-year-old son tricks Face ID to unlock his moms iPhone X

When Apple unveiled its premium flagship smartphone, iPhone X during the September launch event, the USP was the Face ID technology used in the device that will provide full proof security and cannot be tricked.

However, several tests show that Apples Face ID technology can be easily tricked if one has an identical twin or if one uses a specially constructed 3D mask. This has only raised questions over Apples claim of the Face ID being an effective security feature of the iPhone X.

Now, a video of a mom and her 10-year-old kid uploaded on YouTube shows how the kid unlocks his moms iPhone X despite the handset being secured by Face ID. In a video shared by the family on YouTube, they said, We are seeing a flood of videos on YouTube from iPhone users who have gotten their hands on the new iPhone X and are trying to trick the Face ID. When my wife and I received our iPhone X, we had no such intention. However, things changed right after we were done setting up our new iPhones on November 3rd. We were sitting down in our bedroom and were just done setting up the Face IDs, our 10-year-old son walked in anxious to get his hands on the new iPhone X. Right away my wife declared that he was not going to access her phone. Acting exactly as a kid would do when asked to not do something, he picked up her phone and with just a glance got right in.

Although, Apple in its support page has said that the chances of a person unlocking somebody elses iPhone with Face ID is 1 in a million, however, things could be different if you have an identical twin, siblings and for children below the age of 13. For those who are concerned about security, Apple recommended to use a passcode to authenticate.

But, in this particular case, the fifth-grader Ammar Malik could unlock his moms, Sana Sherwanis iPhone X, although there is no striking resemblance between the mom and son. Not only this, when he tried his hands on his dads, Attaullah Malik, iPhone X, he was able to successfully unlock that too.

So, how did the Face ID feature fail in such a scenario?

It is likely that during the repeated testing while making the video would have trained the Face ID on the iPhone to the son accidentally. Heres how Apple describes this process:

Conversely, if Face ID fails to recognize you, but the match quality is higher than a certain threshold and you immediately follow the failure by entering your passcode, Face ID takes another capture and augments its enrolled Face ID data with the newly calculated mathematical representation.

In an interview with WIRED, Malik expressed concern that his son was able to access Sherwanis iPhone X. On the...


EPO Continues to Disobey the Law on Software Patents in Europe "IndyWatch Feed Tech"

Eponia Star Wars

Summary: Using the same old euphemisms, e.g. computer-implemented inventions (or CII), the EPO continues to grant patents which are clearly and strictly out of scope

TO say that the EPO operates as though its above the law would be an understatement. We have covered many dozens of examples to that effect.

Our original gripe/complaint about the EPO was solely about software patents in Europe. This actually started under Battistellis predecessor, more so after her as such debacle, but here we are almost a decade later and the EPO continues to disregard the rules. It just refers to software patents as CII in order to give the impression that algorithms are inventions.

Yesterday, the EPOs buddies at IAM published this article which was immediately thereafter copied across from IAM to its new partner site. Jacobacci & Partners Andrea Perronance repeated the term CII (they dont even want to say software, so they say computer instead) and here is the core of it. It came into effect a fortnight ago:

The European Patent Office Guidelines 2017 were recently published on the European Patent Office (EPO) website. They entered into force on November 1 2017.

Like the previous edition, this years guidelines include substantial, extensive and comprehensive improvements with regard to guidance on the eligibility of computer-implemented inventions (CII) parts. These parts have been discussed with the European Patent Institute (epi), in particular with the CII sub-committee of the European Patent Practice Committee.

The changes appear mainly in Parts F-IV and G-VII of the European Patent Convention Guidelines (the Patent Cooperation Treaty Guidelines are also available) and deal with the presentation of information eligibility and patentability. There is also a sub...


Thousands of scientists issue bleak second notice to humanity "IndyWatch Feed Tech"

To mark the letters 25th anniversary, researchers have issued a bracing follow-up. In a communique published Monday in the journal BioScience, more than 15,000 scientists from 184 countries assess the worlds latest responses to various environmental threats. Once again, they find us sorely wanting.

In 1992, scientists warned humanity about a host of impending ecological disasters. A quarter-century later, most of them have gotten worse.


Firefox "Quantum" Halves Loading Times, Reduces RAM Use by 30% "IndyWatch Feed Tech"

From Firefox's faster, slicker, slimmer Quantum edition now out

This work is being motivated by a few things. First, the Web has changed since many parts of Firefox were initially designed and developed; pages are more dynamic in structure and applications are richer and more graphically intensive. JavaScript is also more complex and difficult to debug. Second, computers now have many cores and simultaneous threads, giving them much greater scope to work in parallel. And security remains a pressing concern, prompting the use of new techniques to protect against exploitation. Some of the rebuilt portions are even using Mozilla's new Rust programming language, which is designed to offer improved security compared to C++.

Also at: Firefox aims to win back Chrome users with its souped up Quantum browser

Original Submission

Read more of this story at SoylentNews.


3 spiritual concepts to endure "IndyWatch Feed Tech"

 A few thoughts.  Have gratitude to your higher self for its advice and also listen carefully for spurious advice.

all good

 Do work on your communion.

October 30, 2017

Dylan Charles, Editor

Due to our technological connectedness, now more than ever before people are feeling the heavy weight of severe cataclysmic and tragic events, affecting millions of people around the world, with only the promise of greater turmoil to come.

Its easy in this environment to slip into overwhelm, despair, anxiety and depression, which only makes things worse. Its imperative to focus on self-care and personal spiritual cultivation in order to endure and protect ourselves from the negativity which confronts us.



Hacking An Industrial 42 Multitouch PC "IndyWatch Feed Tech"

Were slowly moving in the direction where everyone will have a touch screen desk like in the 1982 TRON movie or in the 1987 Star Trek: The Next Generation series with its ubiquitous touchscreen starship controls. [FFcossag] lucked into that future when a local company offered him an industrial 42 multitouch PC that they were throwing out. A few hacks later and he has us all suitably envious.

Before hacking away though, he had to take care of some magic smoke. The source of this turned out to be yellow goop on the PCs power supply that had turned conductive across a resistor. Cleaning it fixed the problem.

Moving on to the hacks, he added brightness control by using a potentiometer to control the power to the backlight. Be sure to watch carefully in the video below where hes attaching a magnet and cord to the potentiometer, and encasing it all in epoxy. At that point, were pretty sure we see him spin up a hard drive platter with a sandpaper disk attached to it, forming a bench top disc sander and making us like this hack even more.

He also replaced a small speaker with a larger speaker and amplifier, giving a volume and sound quality difference thats like night and day. He also added a breakout board with relays for power management, eliminating a seven watt continuous draw when in standby mode.

Be sure to watch the video to the end where he leaves us with a tour of the hacked interior hardware. We like how hes labeled all his handiwork for any future hacker who might open it up

Looking for more multitouch screens? Have a look at this bare-bones multitouch table that uses a sheet of acrylic, a projector, and an infrared webcam. Or one that again uses a projector but with a Kinect.

Thanks to [yeats] for the tip.

Filed under: multitouch hacks


Smashing Security podcast #052: Facebook tackles vengeful scumbags, and a sex toy privacy boob "IndyWatch Feed Tech"

Is your sex toy listening to you? Do you trust Facebook with your most intimate photos? And just how did a vengeful DDoSer come up with that nickname?

All this and much much more is discussed in the latest edition of the "Smashing Security" podcast by computer security veterans Graham Cluley and Carole Theriault, who are joined this week by special guest John Hawes.


Bluetooth Hack Affects 20 Million Amazon Echo and Google Home Devices "IndyWatch Feed Tech"

Remember BlueBorne? A series of recently disclosed critical Bluetooth flaws that affect billions of Android, iOS, Windows and Linux devices have now been discovered in millions of AI-based voice-activated personal assistants, including Google Home and Amazon Echo. As estimated during the discovery of this devastating threat, several IoT and smart devices whose operating systems are often


George Church Will Make Virus-Proof Organisms, Transplant Pig Organs to Humans, and Reverse Aging "IndyWatch Feed Tech"

How far off is age reversal?

The simple answer is, I dont know. Probably well see the first dog trials in the next year or two. If that works, human trials are another two years away, and eight years before theyre done. Once you get a few going and succeeding its a positive feedback loop.

George Church Will Make Virus-Resistant Organisms, Transplant Pig Organs to Humans, and Reverse Aging An interview with one of the most prolific scientists on earth in his lab at Harvard Medical School Photography by Maciek Jasik.


From Consumers to Contributors: The Evolution of Open Source in the Enterprise "IndyWatch Feed Tech"

Open source technologies are now an increasingly common sight in enterprise software stacks, with organisations using them to stand up their customer-facing and line-of-business applications, and power their infrastructure. Despite the best efforts of commercial software suppliers to position open source software as insecure, unreliable and ill-suited for enterprise use, large companies are using it avoid lock-in, drive down costs and speed up their software


Formidable Forms plugin vulnerabilities expose WordPress sites attacks "IndyWatch Feed Tech"

A researcher from Finland-based company Klikki Oy has discovered several vulnerabilities in the Formidable Forms plugin that expose websites to attacks.

The researcher Jouko Pynnnen from Finland-based company Klikki Oy has discovered several vulnerabilities in the Formidable Forms plugin the expose websites to attacks.

The Formidable Forms plugin allows users to easily create contact pages, polls and surveys, and many other kinds of forms, it has more than 200,000 active installs.

Pynnnen discovered that the dangerous flaws affect both the free and as a paid version.

The most severe issue discovered by the expert is a blind SQL injection that can be exploited by attackers to enumerate a websites databases and access their content, including user credentials and data submitted to a website via Formidable forms.

Unfortunately, this isnt the unique flaw of this type, the researcher also found another flaw that exposes data submitted via forms created with the Formidable Forms plugin. Both vulnerabilities are related to the way the plugin implements shortcodes.

The plugin implemented a form preview AJAX function accessible to anyone without authentication. The function accepted some parameters affecting the way it generates the form preview HTML. Parameters after_html and before_html could be used to add custom HTML after and before the form. Most of the vulnerabilities relied on this feature. wrote Pynnonen.

Formidable Forms plugin vulnerabilities expose WordPress sites attacks

The Formidable Forms plugin is also affected by reflected and stored cross-site scripting (XSS) vulnerabilities. The stored XSS could be exploited by an attacker to execute arbitrary JavaScript code in the context of an administrators browsing session. An attacker can inject a malicious code via forms, the code is executed when the site admin view it on the dashboard.

Administrators can view data entered by users in Formidable forms in the WordPress Dashboard. Any HTML entered in forms is filtered with the wp_kses() function. This isnt enough to...


Are puppies the latest allergy treatment? Recent studies show protective effects against eczema, asthma "IndyWatch Feed Tech"

Image: Are puppies the latest allergy treatment? Recent studies show protective effects against eczema, asthma
I really think that close exposure to nature obviates allergies generally.  thus a positive experience with dogs is no surprise.

What we really need is a working protocol that assists all this. The ultimate solution will be the natural community built around a sustainable agro garden.

In the meantime it is important to build dogs into our apartments somehow.. 

Are puppies the latest allergy treatment? Recent studies show protective effects against eczema, asthma


Alien Encounter Near Nageezi, NM "IndyWatch Feed Tech"

This one is important.  I had conjectured that the large black eyes of the greys were artificial.  Here we receive an excellent report and they are certainly artificial.  On the other hand we also get confirmation of the biological nature of these beings.  One is younger while the other is clearly older.

No sense of a ship here but he himself reports that his focus was on the seated individuals.  The craft was likely stealthed and he just got lucky with the angle since they were themselves distracted by the oncoming vehicle.

It is plausible that these are space modified humanity, but that is only because the body has been super slimmed down.  Yet we also have reports of a variety of other aliens for which there is no evident reshaping.  So maybe not so fast.  However the greys are obviously using vision augmentation which can be understood..

Alien Encounter Near Nageezi, NM


Flu vaccine found to be completely ineffective because of how it is made "IndyWatch Feed Tech"

Image: SCIENTIFIC PROOF: Flu vaccine found to be completely ineffective because of how it is made, new study finds

It is essentially impossible to prove flu vaccine helps at all.  After all we have an annual flu season and it is impossible to prove any variance when the entire population has been vaccinated.
You can claim success just as cheaply.
The vaccine protocol has some historical success, but even that remains controversial in many cases.  A better explanation is universal public hygiene.  It has after all become impossible to eat each others waste.  What has become absurd is the application for dozens of rare ailments never to be encountered while accepting serious risks from the delivery system.
This increase in application of the delivery system has triggered an apparent epidemic in autism, although that has been unsurprisingly denied by the industry... 

It may well be time to end all general vaccinations, just to discover real risks.
SCIENTIFIC PROOF: Flu vaccine found to be completely ineffective because of how it is made, new study finds

Thursday, November 02, 2017 by: Ethan Huff


When Mollusks Fall in Love - Issue 54: The Unspoken "IndyWatch Feed Tech"

Outside of gothic works of fiction set in Transylvania, we rarely read of enduring friendships that have been initiated by a bite. But that is exactly how nature writers Sy Montgomery and Elizabeth Marshall Thomasthe two extraordinary, quirky, and iconoclastic women whose essays are collected in the newly released book Tamed and Untamedformed their attachment to one another.

Liz and Sy met more than 30 years ago, within months if not weeks of Sy moving to New Hampshire, just minutes away from Liz. Sy was a journalist, writing often about wildlife and soon to embark on her first book, on great apes and the women who studied them. Liz had written classic accounts of life among the San (or Bushmen) hunter-gatherers in the Kalahari Desert as well as novels set in Paleolithic times. As a keen observer of animals, she had also been helping researcher Katy Payne study elephant bioacoustics. So when Sys husband, author Howard Mansfield, saw an article about Liz in a local newspaper, he urged Sy to get in touch and, before long, Sy was interviewing Liz about the emerging knowledge of how elephants communicate.

Fast friends: Liz Marshall Thomas (left) and Sy Montgomery (right).

As soon as Sy
Read More

Andy Weir Visits the Moon - Issue 54: The Unspoken "IndyWatch Feed Tech"

World building is the best part of writing, Andy Weir tells me. The software engineer turned writer is getting his practice in. In his 2011 novel The Martian, he built a Mars base, complete with carefully calculated Earth-Mars rocket schedules and chemistry-hacked potato farming. It was made into a 2015 hit movie grossing over $600 million (I live in a bigger house now, he tells me).

We get to see Weirs newest creation this month with the release of his new novel, Artemis. The action is set on a lunar city in the not-too-distant future, which Weir calculated as much as imagined. He estimated the cost of reaching the moon from Earth by assuming a future commercial launch industry that will reach the efficiencies of todays airlines, then combining those numbers with an obscure and complex Earth-moon orbit called the Uphoff-Crouch Cycler. He wrote a 10-page economic analysis constructing the future lunar economy, whose currency, the slug, is based on the cost of transporting one gram from the Earth. He referenced modern-day nuclear power plant designs in determining the bases energy production and consumption budget.

The total time that passed by while I was working on Artemis, just the city,
Read More

The Rise and Fall of the English Sentence - Issue 54: The Unspoken "IndyWatch Feed Tech"

[[[When in the course of human events it becomes necessary for one people [to dissolve the political bands [which have connected them with another]] and [to assume among the powers of the earth, the separate and equal station [to which the laws of Nature and of Natures God entitle them]]], a decent respect to the opinions of mankind requires [that they should declare the causes [which impel them to the separation]]].Declaration of Independence, opening sentence

An iconic sentence, this. But how did it ever make its way into the world? At 71 words, it is composed of eight separate clauses, each anchored by its own verb, nested within one another in various arrangements. The main clause (a decent respect to the opinions of mankind requires ) hangs suspended above a 50-word subordinate clause that must first be unfurled. Like an intricate equation, the sentence exudes a mathematical sophistication, turning its face toward infinitude.

To some linguists, Noam Chomsky among them, sentences like these illustrate an essential property of human language. These scientists have argued that recursion, a technique that allows chunks of language such as sentences to be embedded inside each other (with no hard limit on the number
Read More

How to Tell If Youre a Jerk - Issue 54: The Unspoken "IndyWatch Feed Tech"

Heres something you probably didnt do this morning: Look in the mirror and ask, am I a jerk?

It seems like a reasonable question. There are, presumably, genuine jerks in the world. And many of those jerks, presumably, have a pretty high moral opinion of themselves, or at least a moderate opinion of themselves. They dont think of themselves as jerks, because jerk self-knowledge is hard to come by.

Psychologist Simine Vazire at the University of California, Davis argues that we tend to have good self-knowledge of our own traits when those traits are both evaluatively neutral (in the sense that its not especially good or bad to have those traits), and straightforwardly observable.


For example, people tend to know whether they are talkative. Its more or less okay to be talkative and more or less okay to be quiet, and in any case your degree of talkativeness is pretty much out there for everyone to see. Self-ratings of talkativeness tend to correlate fairly well with peer ratings and objective measures. Creativity, on the other hand, is a much more evaluatively loaded traitwho doesnt want to think of themselves as creative?and much less straightforward to assess. In keeping with Vazires
Read More


Kodi Addon Developers Quit Following Threats From MPA, Netflix, Amazon "IndyWatch Feed Tech"

While Kodi is undoubtedly the most popular media player software in the world right now, its also the most hated by entertainment industry groups. On its own its an extremely decent and legal piece of software but with third-party add-ons it becomes a piracy powerhouse.

Earlier this year, following the legal attack on the TVAddons repository, several addon developers decided to call it quits. Facing a multi-million dollar lawsuit was something none of them fancied so shutting down became the preferred option for some. But while others kept going, there are now clear signs that the fallout isnt over yet.

Last evening news began to emerge of fresh upheaval in the Kodi addon scene. In a posting on Twitter, Kodi addon developer jsergio123 delivered the first blow, effectively announcing his retirement.

Sorry to say but I am stopping all development of the urlresolver, metahandler, and my other addons, he said.

Early reports indicate that the retirement was the result of Hollywood threats but as the dust settled there, another clearer case emerged in Europe.

UK-based Kodi addon developer The_Alpha was believed to be involved in the popular Colossus repository, having previously been part of an addon called Bennu, which many view as the successor to the resurrected Phoenix addon.

Yesterday The_Alpha also threw in the towel after receiving a letter at his home in the UK, hand-delivered by the worlds most powerful anti-piracy coalition the Alliance for Creativity and Entertainment (1,2).

This letter is addressed to you by companies of the six-major United States film studios represented by the Motion Picture Association (MPA), namely Columbia Pictures Industries, Inc., Disney Enterprises, Inc., Paramount Pictures Corporation, Twentieth Century Fox Film Corporation, Universal City Studios LLLP and Warner Bros. Entertainment Inc., Netflix, Inc. and Amazon Studios LLC (represented by MPA via the Alliance for Creativity and Entertainment (ACE)), Sky UK Limited, and The Football Association Premier League Limited, the breathless opening paragraph reads.

We are writin...


Ross 128b: A Newly Discovered "Earth-Like" Exoplanet Orbiting a Less Active Red Dwarf "IndyWatch Feed Tech"

Astronomers using the High Accuracy Radial velocity Planet Searcher (HARPS) at the La Silla Observatory in Chile have discovered an Earth-sized exoplanet orbiting a red dwarf in its "habitable zone". The star, Ross 128, is about 10.89 light years away and is less active than Proxima Centauri, possibly boosting the chances of its exoplanet being habitable. Ross 128b has a minimum mass of about 1.35 Earth masses, and is considered by its discoverers to be "the best temperate [exo]planet known to date". The next step will be to determine the atmospheric composition of Ross 128b:

There's still uncertainty about whether Ross 128 b is within its star's habitable zone, but scientists say that with temperatures of between -60 and +20C, it can be considered temperate.

Next, astronomers want to study the atmospheric composition and chemistry of suitable, nearby worlds like Ross 128 b. The detection of gases such as oxygen could potentially point to biological processes on planets orbiting other stars.

Several gases have already been detected in the atmospheres of exoplanets, but this line of enquiry is expected to be boosted immeasurably when observatories such as the European Southern Observatory's Extremely Large Telescope (E-ELT) and Nasa's James Webb Space Telescope (JWST) come online in the next few years.

Although currently 11 light-years from Earth, the new planet's parent star Ross 128 is moving towards us and is expected to overtake Proxima Centauri as our nearest stellar neighbour in just 79,000 years - a heartbeat on cosmic timescales.

A temperate exo-Earth around a quiet M dwarf at 3.4 parsecs (open, DOI: 10.1051/0004-6361/201731973) (DX)

Original Submission

Read more of this story at SoylentNews.


Links 16/11/2017: Tails 3.3, Deepin 15.5 Beta "IndyWatch Feed Tech"

GNOME bluefish




Multi-Stage Android/TrojanDropper.Agent.BKY Malware bypasses Google Play detection once again "IndyWatch Feed Tech"

Researchers from security firm ESET, discovered a multi-stage Malware dubbed Android/TrojanDropper.Agent.BKY that evaded Google Play detection.

Security experts at ESET have discovered a multi-stage Android malware, tracked as Android/TrojanDropper.Agent.BKY, that was available for download in the official Google Play store.

The researchers have found eight malicious applications in the official application store (MEX Tools, Clear Android, Cleaner for Android, World News, WORLD NEWS, World News PRO, , and ), they appear as legitimate applications and use advanced anti-detection features.

Detected by ESET security systems as Android/TrojanDropper.Agent.BKY, these apps form a new family of multi-stage Android malware, legitimate-looking and with delayed onset of malicious activity. states the analysis published by ESET.

The experts highlighted the use of advanced anti-detection features implemented by these apps that were downloaded only by several hundred users.

The Android/TrojanDropper.Agent.BKY samples analyzed by ESET employ a multi-stage architecture along with encryption.

Once downloaded and installed, the malicious apps do not request any suspicious permissions and even mimic the activity they were supposed to.

In background, the apps decrypt and execute a first-stage payload designed to decrypt and execute the second-stage payload from the assets of the app downloaded from Google Play.Android TrojanDropper Agent.BKY

The malware implements obfuscatory measures to remain under the radar.

The second-stage payload downloads a malicious application from a hardcoded URL it waits around 5 minutes before asking users to install the third-stage payload that masquerades as Adobe Flash Player or another popular app.

The app downloaded by the second-stage payload is disguised as well-known software like Adobe Flash Player or as something legitimate-sounding yet completely fictional for example Android Update or Adobe Upd...


IBM makes 20 qubit quantum computing machine available as a cloud service "IndyWatch Feed Tech"

The company also announced that IBM researchers had successfully built a 50 qubit prototype, which is the next milestone for quantum computing, but its unclear when we will see this commercially available.

While the earliest versions of IBMs quantum computers were offered for free to build a community of users, and help educate people on programming and using these machines, todays announcement is the first commercial offering. It will be available by the end of the year.


Study Claims Quark Fusion May Be the Energy Source of the Future "IndyWatch Feed Tech"

Scientists propose that quark fusion may be an energy source eight times more powerful than nuclear fusion.



The Quantum Computer Factory Thats Taking on Google and IBM "IndyWatch Feed Tech"

Who says Silicon Valley doesnt fund real technology any more?


Eating chocolate and drinking red wine could help prevent ageing, according to a study "IndyWatch Feed Tech"

A compound in dark chocolate and red wine could help rejuvenate cells, according to a scientific breakthrough.

Researchers from the Universities of Exeter and Brighton have made the sizeable breakthrough on ageing and discovered a way to rejuvenate inactive senescent cells.

They found that they could make the cells both look and behave like younger cells.


Skin wounds heal faster if they occurred during the day "IndyWatch Feed Tech"

Click on photo to start video.

A groundbreaking discovery reveals that wounds heal 60% faster if they occurred during the day instead of at night.


Heres How to Get to Conscious Machines, Neuroscientists Say "IndyWatch Feed Tech"

Like most cerebral movies, Ex Machina leaves the conclusion up to the viewer: was Ava actually conscious? In doing so, it also cleverly avoids a thorny question that has challenged most AI-centric movies to date: what is consciousness, and can machines have it?

Hollywood producers arent the only people stumped. As machine intelligence barrels forward at breakneck speednot only exceeding human performance on games such as DOTA and Go, but doing so without the need for human expertisethe question has once more entered the scientific mainstream.

Are machines on the verge of consciousness?


Integrated circuits printed directly onto fabric for the first time "IndyWatch Feed Tech"

A sample integrated circuit printed on fabric. (credit: Felice Torrisi)

Researchers at the University of Cambridge, working with colleagues in Italy and China, have incorporated washable, stretchable, and breathable integrated electronic circuits into fabric for the first time opening up new possibilities for smart textiles and wearable textile electronic devices.

The circuits were made with cheap, safe, and environmentally friendly inks, and printed using conventional inkjet-printing techniques.


Artificial Intelligence Is Putting Ultrasound on Your Phone "IndyWatch Feed Tech"

Two-thirds of the worlds population doesnt have access to medical imaging. A company called Butterfly Network is trying to change that.


A New Futuristic Robot Lets Your Arms Lift Half a Ton "IndyWatch Feed Tech"

Have you ever lifted half a ton? With the Guardian GT, a set of robotic arms, you could do so with as little as two kilogram (five pounds) of force, allowing you to have superhuman strength.

Elon Musk recently made headlines asserting that, in order for us to both progress and survive as a species, we must merge with machines and become cyborgs. And, as climate change rages onwards and the biological difficulties of completing a human mission to Mars become ever more apparent, many are beginning to agree.


South Korea is building a $35 billion city designed to eliminate the need for cars "IndyWatch Feed Tech"

By 2020, Songdos International Business District will span 100 million square feet. The South Korean city aims to prioritize pedestrians over cars.


Regeneration of the entire human epidermis using transgenic stem cells "IndyWatch Feed Tech"

[p]Patients with junctional epidermolysis bullosa (JEB) carry mutations in genes that encode components of the basement membrane, which ensures the integrity between the epidermis and the dermis, such as laminin-332. These mutations cause blistering of the skin and chronic wounds. Following initial treatment of an adult patient with a limited affected region, Michele De Luca and colleagues reconstruct the full epidermis of a 7-year-old patient with autologous transgenic cells transduced with a virus vector carrying the non-mutated form of laminin-322.


Surprise Your Loved One with a Heart Keychain "IndyWatch Feed Tech"

Sometimes the simplest projects can be the most impressive. Most of the time our simple projects are not as neat and elegant as our more time consuming ones. Sometimes they dont even leave the breadboard! When [Sasa Karanovic] first envisioned his key-chain idea, he knew it would be simple. But he made up for the lack of sophistication with style.

The heart-shaped key-chain has one goal to flash a pair of red LEDs when a capacitive button is touched. He was able to accomplish this with a PIC12LF1822 and a handful of supporting components. Were quite impressed with the soldering skills and layout of the PCB. The resistors, LEDs and single capacitor are 0603 surface mount devices, which push the limits of hand soldering. [Sasa] gives a great explanation of how capacitive touch buttons work and how they can be easily incorporated directly into a PCB.

Whats the smallest SMD youve soldered? Let us know in the comments, along with what you think about this nifty key-chain.


Filed under: Microcontrollers


Opioid Commission Drops the Ball, Demonizes Cannabis "IndyWatch Feed Tech"

Opioid commission's anti-marijuana argument stirs anger

New Jersey Gov. Chris Christie, head of the presidential commission on opioids, warned of the dangers of marijuana in a letter to President Donald Trump earlier this month about the panel's findings, saying the current push for marijuana legalization could further fuel the opioid epidemic.

"There is a lack of sophisticated outcome data on dose, potency, and abuse potential for marijuana. This mirrors the lack of data in the 1990s and early 2000s when opioid prescribing multiplied across health care settings and led to the current epidemic of abuse, misuse and addiction," Christie wrote in the letter, which was released with the commission's final report.

"The Commission urges that the same mistake is not made with the uninformed rush to put another drug legally on the market in the midst of an overdose epidemic."

[...] But some experts say the commission's fixation on marijuana was bizarre and troubling, lending credence to outdated views of marijuana as a gateway drug. And these experts want to nip such thinking in the bud.

They emphasized that they support efforts to curb the nation's opioid epidemic, but not the demonization of marijuana in the process.

"I was surprised to see negative language about marijuana in the opioid report," said Dr. Chinazo Cunningham, a professor of medicine at the Albert Einstein College of Medicine. "Research that examines pain and marijuana shows that marijuana use significantly reduces pain. In addition, the majority of studies examining marijuana and opioids show that marijuana use is associated with less opioid use and less opioid-related deaths."

You had one job.


Study Finds That Legalized Medical Cannabis Led to a Decline in Medicare Prescriptions
New Attorney General Claims Legal Weed Drives Violent Crime; Statistics be Damned
4/20: The Third Time's Not the Charm
Jeff Sessions Reboots the Drug War


The First Human-Pig Hybrid Has Been Successfully Created In A Lab "IndyWatch Feed Tech"

Not sure what to think of this, opinions thoughts??

Written By Amanda Froelich Truth Theory

In a move that can only be considered controversial, the first pig-human hybrid has been successfully created in a lab. Researchers managed to grow human cells inside early-stage pig embryos, which led to the creation of the first pig-human hybrids ever made. The result is described as interspecies chimeras.

Though the experiment is still in its early days, scientists think the breakthrough would possibly one day lead to lab-grown human organs that would be transplanted into people who need them. If the experiment is successful, hundreds of thousands of lives could be saved.


Invisible Connections will Unveil our 5G Future "IndyWatch Feed Tech"

At Signal Microwave, simulation is being used to design specialized connectors for high-speed RF applications.

The following is an excerpt from Multiphysics Simulation 2017 .

By: Sarah Fields

As the number of mobile users and the demand for high speed communication grows, companies and industry groups are working around the clock to rise to the challenge. The 5G network aims to be 100 times faster than 4G LTE and increase broadband connection speeds by 10 times. There are a lot of moving pieces that need to arrive at the same place in order for 5G to move from concept to reality, says Bill Rosas, cofounder of Signal Microwave. Those on the front line not only have to implement the 5G, they need to figure out everything from testing the networks to updating the interconnects in their systems.

The small details of connectors are worthy of significant R&D focus. These indispensable electromechanical parts used to join electrical terminations, which can transfer electromagnetic energy from one transmission line to another component for transmission or interpretation. Connectors are omnipresent across all electronic devices and systems, and their precision is critical in circuits that transmit information, especially as data transfer rates increase.

Eric Gebhard and Bill Rosas cofounded Signal Microwave in order to provide specialized connectors for the signal integrity market on demand. By anticipating the need for optimized RF, microwave, and millimeter-wave connectors for circuits transmitting higher and higher data transfer rates, Signal Microwave will support the development of our 5G future.


Those working on RF (radio frequency) connectors face a multifaceted set of design hurdles, as geometry, size, and transmission constraints must be met while matching the impedance of the connector to the rest of the transmission line. The component manufacturers have been very quick in offering products for 5G applications, says Rosas. But providing components that are highly optimized is where the opportunities lie.

As the frequency increases, maintaining the impedance becomes more complex, as small quirks arising from the geometry or selected materials can be magnified. Figure 1 shows a photo of an RF connector designed for a 5G communications application under development.



Austrian Supreme Court Orders Local ISPs To Block The Pirate Bay & 1337x "IndyWatch Feed Tech"

Austrian Supreme Court Instructs That The Pirate Bay & 1337x Must Be Blocked

In a ruling, the Commercial Court of Vienna, Austria has ordered the local Internet Services Providers (ISPs) to block subscribers from accessing The Pirate Bay (TPB) and other structurally-infringing sites including,, and, based on a lawsuit filed by the copyright holders, according to TorrentFreak.

For those unaware, The Pirate Bay, is a BitTorrent peer-to-peer (P2P) file sharing site, that allows visitors to search, download and contribute magnet links and torrent files, which facilitate peer-to-peer file sharing among users of the BitTorrent protocol. The popular torrent website has been embroiled in a legal dispute with the anti-piracy outfits and rights holders from several years due to violations of copyright laws. As a result, the website has faced shutdowns and blockades in several countries and imprisonment of its founders. However, The Pirate Bay continues to operate by switching to numerous new web addresses to continue their operation to avoid seizures or other legal threats.

Meanwhile, the IFPI (International Federation of the Phonographic Industry) in Austria has welcomed the Commercial Courts decision and also said that it would be happy to help in implementing the order and have more sites blocked in the near future.

For the further development of the online music market it is a very gratifying decision. We call on the Internet providers to work together towards a legally compliant and straightforward implementation of site-blocking, managing director of the IFPI Franz Medwenitsch said, reports TorrentFreak.

Besides the above order, the Court also ruled that only if copyright holders have finished all their options to take action against those responsible for infringement, only then ISP blocks would be necessary, a decision that was welcomed by the Internet Service Providers Austria (ISPA).

The ISPs claimed that only torrent files and not the content were available on the portals. They also expressed discontent on the limitation of access to legitimate content.

A problem in this context is that the offending pages also have legal content and it is no longer possible to access that if barriers are put in place, said ISPA Secretary General Maximilian Schubert.

With regards to prospective for blocking legitimate content as well as that of infringing copyright, the Court twisted the ISPs own arguments against them to some extent.

In the past, the ISPs had previously argued that blocking The Pirate Bay and other sites was meaningless, as the torrents they host would still be available on a different location. Taking this point into consideration, the Court found that it was easy for people to...


Dutch Gas Company Adds Hydrogen Power to a Tesla "IndyWatch Feed Tech"

"A gas supplier company in the Netherlands has effectively doubled the range of the Tesla Model S by adding hydrogen power to the electric luxury sedan. Dubbed the "Hesla," the modification adds a second charging supply to the existing electrical system, using a tank of hydrogen as an alternative fuel source.

Last week, the Holthausen Group announced that it had begun testing the prototype vehicle. With a fully charged battery and a tank of hydrogen, the Helsa can travel close to 620 miles nearly twice the range of the stock Model S P100D."

Original Submission

Read more of this story at SoylentNews.


Military Coup in Zimbabwe "IndyWatch Feed Tech"

Via: Reuters: Zimbabwe was on a knifes edge on Thursday after the military seized power in what it dubbed a targeted operation against criminals in the entourage of President Robert Mugabe, who has ruled the southern African nation for almost four decades. It was not clear whether the apparent military coup would bring a formal []


Warning: N. Korea mapping specific plan for devastating EMP "IndyWatch Feed Tech"

Only a few weeks after a team of experts warned Congress that the nation faces an existential threat from North Korea from a possible electromagnetic pulse attack, a new report says the rogue nation is mapping a specific plan.

Paul Bedard at the Washington Examiner wrote in his Washington Secrets column that the White House is being warned that North Korea is mapping plans for a devastating attack on the United States with an atmospheric nuclear explosion that would disable the nations electric grid, potentially leading to the deaths of virtually all impacted.

He said President Trump is being urged to create a special commission to tackle the potential for an electromagnetic pulse attack, one similar to the iconic Manhattan Project.


NASA nuclear engines could provide power to the first humans on Mars "IndyWatch Feed Tech"

NASA is set to begin testing a radical nuclear engine that could provide power for astronauts on the Martian surface.

Dubbed the Kilopower it would use a uranium rector the size of a toilet roll to create heat.

A high efficiency Stirling engine would then convert this to electricity, in a system that works in a similar way to a car engine.

NASAs Kilopower engines will use a uranium rector the size of a toilet roll to create heat, then a high efficiency Stirling engine would convert this to electricity.


Artificially Cooling Earth With Volcano Eruptions Is Dangerousthe Lack of Regulation Is Deeply Disconcerting "IndyWatch Feed Tech"

A controversial plan to cool down the planet by artificially simulating volcanic eruptions could have disastrous consequences for Earthyet there are no laws or regulations to stop any country or private company from deploying such technology.

Solar geoengineering is one of the proposed ways to artificially reduce global temperatures. It is often seen as one of the most extreme optionsbut also potentially one of the most effective. It involves injecting aerosols into the atmosphere. When the gas combines with oxygen, droplets of sulfuric acid form. These droplets reflect sunlight away, cooling the planet in the process. All good in theory, but the consequences of solar geoengineering are largely unknown.

In a study published in Nature Communications, scientists led by Anthony Jones, from the University of Exeter, U.K., have now examined what would happen if solar geoengineering was used in the Northern Hemisphere to try to prevent global warming and the extreme weather that goes with itin this case tropical cyclones.


CA20171114-01: Security Notice for CA Identity Governance "IndyWatch Feed Tech"

Posted by Kotas, Kevin J on Nov 15

CA20171114-01: Security Notice for CA Identity Governance

Issued: November 14, 2017
Last Updated: November 14, 2017

CA Technologies support is alerting customers to a potential risk
with CA Identity Governance. A vulnerability exists that can
potentially allow a malicious actor to conduct cross-site scripting
attacks. CA published a solution to resolve the issue.

The vulnerability, CVE-2017-9394, occurs due to insufficient input


The ISIS Tailspin of Terrorism "IndyWatch Feed Tech"

Watching YouTube wont produce a skilled terrorist

NOTE: incomplete post from 20170815. ISIS collapsed faster than my interest in finishing this post.

ISIS capability as a transnational terrorist organisation continues to collapse. They are unable to bring recruits to controlled territory for training, but rather have to rely entirely on remotely managed raw amateurs who are ineffective and error prone. This shows that counterterrorism efforts are working effectively to limit the damage that ISIS, the organisation, can do. Unfortunately, their trained and battle hardened members who survive and escape will be extremely dangerous. Good newsright now they suck; bad newsthe post ISIS world is scarier.

This post will examine why having an entirely remote external operations arm is not a winning strategy for a terrorist group. The positives:

  • cheap to implement,
  • hard for security forces to stop (in theory)
  • scales well,
  • creates the illusion of global reach

These apparent benefits are actually outweighed by the negatives of using only trained professional operatives. The negatives:

  • ineffective attacks (inept, low impact) are bad for the brand
  • essentially no strategic control (timing, region, targeting, messaging)
  • low success rate (interdiction is very high, so is the drop out rate)
  • inherent limitations of purely remote terrorist operation make addressing these problems decidedly non trivial

An effective terrorist organisation makes strategic use of violence to attempt to achieve the result they want. At its most generic this is some sort of utopian ideal (global communism, the caliphate, freedom, the independence and/or union of greater population group). Since achieving this vision is a matter of developing and executing a strategy (class warfare, removal of colonial ruling elites, agitating for political autonomy, etc.) the leaders of the group, the centre, must be able to use their military resources with strategic precision (in theory anyway.)

A purely remote control agent is basically the least strategically effective mechanism availablethe centre has no control over their targeting, timing, effectiveness, success rate; and there is basically no way to increase the amount of control over the remote agent. A group that is unable to execute operations that further their strategic goal is severely handicapped. Even worse, the application of violence to further strategic goal is extremely tricky as violence needs to be calibrated and targeted very specifically. Too much violence can reduce support, as can too little, and embarrassing or incompetent acts of violence can also reduce p...


IoT Garage Door Opener from Scrap "IndyWatch Feed Tech"

[Hans Nielsen] has a couple roommates, and his garage has become a catch-all for various items. And like any good hackers garage, it boasts an IoT controlled garage door opener. It had a problem though, it used a Particle Photon a popular IoT board that required internet access and a web server to operate. So [Hans] raided his roommates spare parts bin and set-forth to rebuild it!

One of his main goals was to make something that did not require internet access to operate. Anyone connected to the local WiFi should be able to open and close the door via a web interface, and he would give our good friend [Linus Torvalds] a call to make it happen. The key component in the build is the C.H.I.P SBC that made the news a while back for being ridiculously cheap.

Be sure to check out [Hans] blog if youre at all interested in working with the C.H.I.P. He does a fantastic job of documenting the ins and outs of getting a project like this working.

Filed under: ARM, linux hacks


"Drug Bazooka" Seized Near the U.S.-Mexican Border "IndyWatch Feed Tech"

Drug-Shooting 'Bazooka' Seized In Mexico As Smugglers Aim Skyward

As Mexican authorities continue to crack down on drug smugglers, criminals continue to aim high in a bid to evade them. Last week, Mexican authorities seized a jury-rigged bazooka and nearly one ton of marijuana in the border town of Agua Prieta in Sonora state, the Mexican Attorney General said in a statement.

The bazooka had been "adapted" to use a compressor for launching drugs into the United States. The Mexican daily El Universal reports the device was inside a van with a sliding roof, allowing the bazooka to shoot the drugs from the cover of the vehicle.

Agua Prieta lies directly across the border from Douglas, Ariz. Last year, Mexican federal authorities found yet another "homemade bazooka" in the town, this one measuring nearly 10 feet long, alongside an air compressor inside a modified panel van with no license plate. Officials say it was apparently used for launching projectiles, possibly drugs, across the border.

If "legal" retail prices for cannabis drop, maybe these will be packed with heroin or cocaine instead.

Original Submission

Read more of this story at SoylentNews.


Brokerage Chief: Bitcoin Futures Must Be Quarantined "IndyWatch Feed Tech"

Via: CoinDesk: A well-known electronic brokerage firm is issuing dire warnings against the CME Groups plan to launch a bitcoin futures contract next month. But Interactive Brokers, in a comment letter dated Nov. 14, suggested a way to mitigate the risk it sees from such activity: The Commodity Futures Trading Commission (CFTC), under the auspices []


CVE-2017-16834: pnp4nagios root privilege escalation via insecure permissions "IndyWatch Feed Tech"

Posted by Michael Orlitzky on Nov 15

Product: pnp4nagios <<a href="" rel="nofollow">>
Versions-affected: 0.6.26 and earlier (all modern versions)
Author: Michael Orlitzky

== Summary ==

The pnp4nagios build system installs two sets of files with insecure
permissions. After installation, the executables and the configuration
files are all owned by the same unprivileged user and group


[$] Weekly Edition for November 16, 2017 "IndyWatch Feed Tech"

The Weekly Edition for November 16, 2017 is available.


Linux totally dominates supercomputers "IndyWatch Feed Tech"


It finally happened. Today, all 500 of the world's top 500 supercomputers are running Linux.
Linux totally dominates supercomputers


Qualcomm Announces 48-Core Centriq ARM Server Chip "IndyWatch Feed Tech"

Qualcomm Launches 48-core Centriq for $1995: Arm Servers for Cloud Native Applications

Following on from the SoC disclosure at Hot Chips, Qualcomm has this week announced the formal launch of its new Centriq 2400 family of Arm-based SoCs for cloud applications. The top processor is a 48-core, Arm v8-compliant design made using Samsung's 10LPE FinFET process, with 18 billion transistors in a 398mm2 design. The cores are 64-bit only, and are grouped into duplexes pairs of cores with a shared 512KB of L2 cache, and the top end design will also have 60 MB of L3 cache. The full design has 6 channels of DDR4 (Supporting up to 768 GB) with 32 PCIe Gen 3.0 lanes, support for Arm Trustzone, and all within a TDP of 120W and for $1995.

We covered the design of Centriq extensively in our Hot Chips overview, including the microarchitecture, security and new power features. What we didn't know were the exact configurations, L3 cache sizes, and a few other minor details. One key metric that semiconductor professionals are interested in is the confirmation of using Samsung's 10LPE process, which Qualcomm states gave them 18 billion transistors in a 398mm2 die (45.2MTr/mm2). This was compared to Intel's Skylake XCC chip on 14nm (37.5MTr/mm2, from an Intel talk), but we should also add in Huawei's Kirin 970 on TSMC 10nm (55MTr/mm2).

Previously: Qualcomm's Centriq 2400 Demoed: A 48-Core ARM SoC for Servers

Original Submission

Read more of this story at SoylentNews.


NodeConf EU Hackable Badge "IndyWatch Feed Tech"

During conferences, a name-tag is one of the first things people look at when bumping in to others mentally trying to keep track of faces and names. But gone are the days when your name tag was a post-it stuck on your arm. Over the years, conference badges have become increasingly interesting and complex. Hackable electronic badges are becoming the norm, and not just at hardware cons. For the recently concluded NodeConfEU conference in Ireland, [Gordon Williams], of Espruino fame, designed a JavaScript centric hackable badge.

NodeConf EU is the key Node.js event in Europe, providing a forum for the Node.js community. So when they brain-stormed ideas for a conference badge, they obviously gravitated towards a design that could run JS. [Gordon]s Puck.js fit the requirements perfectly, and he was tasked with creating a new design based on the Puck.js. The feature list included BlueTooth Low Energy, low power consumption so it could run off a CR2032 battery, a high contrast LCD, some buttons, NFC, and a prototyping area all packaged in a beautiful hexagonal shaped PCB (obviously) to resemble the Node.js logo. The badges were programmed with attendee names, but the fun, juicy part could be accessed by pressing buttons in the Konami code sequence.

Easy to follow, detailed documentation helped hackers quickly get started with code examples. They were also presented several challenges to work through allowing them to get familiar with the badge. Hacked badges were entered for a Grand Challenge with a chance to win a free ticket to next years conference. The badge hardware and firmware are open source and source files are hosted in a Github repository. Check out a short overview of the badge in the video after the break.

Thanks to [Conor] from nearForm for letting us know about this awesome badge.

Filed under: hardware, Tech Hacks ...


HPR2424: Interface Zero RPG Play "IndyWatch Feed Tech"

Klaatu, Lobath, and Thaj play a session of Interface Zero, a role playing game using the Pathfinder rules. If you're new to RPG and want to hear how it's done, or you're just bored and want to hear some nerds play through a cyberpunk adventure, this is for you! Also - for one lucky listener - we have an RPG starter kit. Listen for details.


FDA Blocks More Imports of Kratom, Warns Against Use as a Treatment for Opioid Withdrawal "IndyWatch Feed Tech"

The FDA has issued a public health advisory warning of deaths related to kratom (Mitragyna speciosa) and warning against using it to treat opioid withdrawal symptoms. The DEA attempted to temporarily regulate kratom as a schedule I drug in 2016, but stopped short of doing so after a public backlash. From FDA Commissioner Scott Gottlieb's statement on the advisory:

It's very troubling to the FDA that patients believe they can use kratom to treat opioid withdrawal symptoms. The FDA is devoted to expanding the development and use of medical therapy to assist in the treatment of opioid use disorder. However, an important part of our commitment to this effort means making sure patients have access to treatments that are proven to be safe and effective. There is no reliable evidence to support the use of kratom as a treatment for opioid use disorder. Patients addicted to opioids are using kratom without dependable instructions for use and more importantly, without consultation with a licensed health care provider about the product's dangers, potential side effects or interactions with other drugs.

There's clear data on the increasing harms associated with kratom. Calls to U.S. poison control centers regarding kratom have increased 10-fold from 2010 to 2015, with hundreds of calls made each year. The FDA is aware of reports of 36 deaths associated with the use of kratom-containing products. There have been reports of kratom being laced with other opioids like hydrocodone. The use of kratom is also associated with serious side effects like seizures, liver damage and withdrawal symptoms.

Given all these considerations, we must ask ourselves whether the use of kratom for recreation, pain or other reasons could expand the opioid epidemic. Alternatively, if proponents are right and kratom can be used to help treat opioid addiction, patients deserve to have clear, reliable evidence of these benefits.

Read more of this story at SoylentNews.


Overnight Tech: Senate Dems want FCC chief recused from Sinclair merger | Tech rallies on Capitol Hill for DACA | Facebook beefs up lobbying ranks "IndyWatch Feed Tech"

DEMS SEEK RECUSAL OVER SINCLAIR: A group of Senate Democrats is calling on Federal Communications Commission (FCC) Chairman Ajit Pai to recuse himself from matters related to the Sinclair Broadcast Group and its proposed takeover of Tribune...


Twitter explains how users can lose their verified status "IndyWatch Feed Tech"

Twitter warned users Wednesday that they can lose "verified" status on its platform, releasing a set of rules for keeping the "blue checkmark" that verifies their identity.The social media giant, in an update on the help center portion of its...

Go Back:30 Days | 7 Days | 2 Days | 1 Day

IndyWatch Science and Technology News Feed Today.

Go Forward:1 Day | 2 Days | 7 Days | 30 Days

Wednesday, 15 November


Google Docs momentarily goes down "IndyWatch Feed Tech"

Google Docs momentarily went down Wednesday afternoon, locking users out of their files. Other Google products like Gmail and Google Drive did not appear to be affected by the outage.Docs is back up for most users, and we expect a full resolution...


AP Exclusive: US scientists try 1st gene editing in the body "IndyWatch Feed Tech"

For the first time ever, scientists have attempted to cure a persons disease by editing a gene inside the body.

Scientists used an IV to inject a patient with billions of copies of a corrective gene and a genetic tool to cut his DNA in a specific spot. We cut your DNA, open it up, insert a gene, stitch it back up.

Scientists have edited peoples genes in the past, but that work involved altering cells inside a lab and then returning them to the body, whereas the latest experiment was performed inside a persons body.


Physicists Mix Waves On Superconducting Qubits "IndyWatch Feed Tech"

Physicists from the Moscow Institute of Physics and Technology (MIPT) and Royal Holloway, University of London, have demonstrated an effect known as quantum wave mixing on an artificial atom. Their results, published in the journal Nature Communications, could help develop quantum electronics of an entirely new kind.

Researchers from MIPT's Laboratory of Artificial Quantum Systems led by Professor Oleg Astafiev teamed up with their British colleagues to examine a superconducting quantum system, which is physically equivalent to a single atom. Cooled to ultra-low temperatures, this device emitted and absorbed a single quanta of microwave radiationthe same way that an atom interacts with photons of light.

Artificial atoms, which are at the heart of this study, are a staple of quantum optics experiments. Physicists use these systems to investigate the processes that are otherwise hard to study, such as the emission and absorption of several photons. Whereas a real atom in a mirror cavity emits light in an arbitrary direction, a superconducting system radiates in a controlled way. This enabled the authors to detect the scattering of several light quanta on an artificial atom, or wave mixing.

In the output of the system described above, the researchers observed both source radiation and electromagnetic waves resulting from its interaction with the artificial atom. The frequencies of these waves were determined by the nature of the excitation involved. This pointed to the effect of quantum wave mixing, which had not been observed in systems of this kind before.

Original Submission

Read more of this story at SoylentNews.


Doctors are gene editing inside the body of a living human for the first time "IndyWatch Feed Tech"

He is the first patient to receive an experimental gene therapy as part of a clinical trial. Earlier this week, Sangamo Therapeutics injected Madeux with viruses containing a package of gene-editing material, according to the AP. The hope is that these viruses will enter Madeuxs cells, specifically liver cells, inject the missing gene at the right place in his DNA. Only about 1% of the livers cells need to be fixed, and give his liver the ability to produce the enzyme he has been missing all his life.

Brian Madeuxs life hasnt been easy. So far, hes had 26 operations to fix problems in everything from hernias to eyes. He has a rare disease called Hunter syndrome, which is caused by the lack of a gene thats used to produce an enzyme that breaks down certain carbohydrates. As a result, the carbohydrates build up in his bodys cells causing all sorts of problems.

There is no cure. One way to deal with some of the symptoms is to receive regular doses of the missing enzyme, which may cost him in the US between $100,000 and $400,000 per year. Even then, the enzyme wont reverse the damage made already and it wont stop further deterioration that happens in the brain.

But Madeuxs life might be about to change. He is the first patient to receive an experimental gene therapy as part of a clinical trial. Earlier this week, Sangamo Therapeutics injected Madeux with viruses containing a package of gene-editing material, according to the AP. The hope is that these viruses will enter Madeuxs cells, specifically liver cells, inject the missing gene at the right place in his DNA. Only about 1% of the livers cells need to be fixed, and give his liver the ability to produce the enzyme he has been missing all his life.


Valve + LunarG Open Up Their Mesa Testing Results "IndyWatch Feed Tech"

As covered back during XDC2017, Valve and LunarG have been working on more extensive testing of Mesa to catch regressions and meticulously spot any performance changes as they occur. That framework is now publicly available to see the results and for developers allows tracking their own Mesa development branches...


Thunderbolt Networking Driver Lands In Linux 4.15 "IndyWatch Feed Tech"

The networking feature updates have landed for the Linux 4.15 merge window...


Tech companies, groups push for DACA legislation on Capitol Hill "IndyWatch Feed Tech"

IBM, Microsoft, LinkedIn and the Mark Zuckerberg-backed immigration advocacy group came to Capitol Hill on Wednesday to urge lawmakers to prioritize legislation that would protect Deferred Action for Childhood Arrivals (DACA) beneficiaries....


Breaking the System Rejuvenation and Social Change "IndyWatch Feed Tech"

There is no doubt that the arrival of rejuvenation biotechnology will not only change how we age but also how society works. Eradicating age-related diseases will lead to challenges for our society but we should be positive about change and a healthier future.

A very useful skill you get from the study of mathematics is the ability to skim details off a special case of a concept and get to the general case, which is the essence common to all special cases. This skill, far from being useful only in maths and science, can be applied to a variety of situations, includingperhaps surprisinglyrejuvenation advocacy.

Think about common objections to rejuvenation: wont it cause overpopulation? Wont it make it impossible to pay the pensions? Wont it make it harder for the young to find a job? Wont it change our perception of older people and our idea of family?

The answers to these questions are more complicated than just yes or no, but this is not what were concerned with here. All of these questions above are special cases of a more general case.


Senate Dems want FCC chair's recusal from Sinclair matters "IndyWatch Feed Tech"

A group of Senate Democrats is calling on Federal Communications Commission (FCC) Chairman Ajit Pai to recuse himself from matters related to the Sinclair Broadcast Group and its proposed takeover of Tribune Media.Democratic Sens. Maria Cantwell (...


Bluetooth Photo Booth Gets Vetting at Wedding "IndyWatch Feed Tech"

With just two weeks to go before his friends wedding, [gistnoesis] built a well-featured robotic photo booth. Using a Bluetooth PS3 controller, guests could move the camera around, take a picture, style it in one of several ways (or not), and print it out with a single button press.

The camera is mounted on a DIY 2-axis gimbal made from extruded aluminium and 3D-printed parts. It can be moved left/right with one joystick, and up/down with the other. [gistnoesis] set up a four-panel split-screen display that shows the live feed from the camera and a diagram for the controls. The third panel shows the styled picture. Guests could explore the camera roll on the fourth panel.

LINN uses two PCs running Lubuntu, one of which is dedicated to running an open-source neural style transfer program. After someone takes a picture, they can change the style to make it look like a Van Gogh or Picasso before printing it out. A handful of wedding attendees knew about some of the extra features, like manual exposure control and the five-second timer option, and the information spread gradually. Not only was LINN a great conversation piece, it inspired multi-generational collaboration.

Despite the assembled size, LINN packs up nicely into a couple of reusable shopping bags for transport (minus the TV, of course).  This vintage photo booth we saw a few years ago is more of a one-piece solution, although it isnt as feature-rich.

Filed under: playstation hacks, robots hacks


Companies Using War Games to Filter Cybersecurity Talent "IndyWatch Feed Tech"

Cyber Security Challenge UK runs a series of online games that allow amateur cybersleuths and white-hat hackers to test their skills. Those who score well online are invited to a series of regional, in-person competitions. The top performers at these events are then invited to the annual three-day masterclass and team-based competition where they face a realistic scenario created by experts from the sponsoring companies.

Would you like to play a game?


Original Submission

Read more of this story at SoylentNews.


The Most Dangerous Man in the World "IndyWatch Feed Tech"

It is dawning on Congress that no one can stop President Trump from ordering a nuclear attack.

There is an emerging bipartisan consensus that the president has the sole authority to launch U.S. nuclear weapons at the time of his choosing, with no real checks or balances from anyone. Now the question is what to do about it.

Today, the U.Senate held its first hearing in 41 years on the presidents authority to launch nuclear weapons. Why now? As Sen. Chris Murphy, D-Conn., put it, Americans are concerned that President Trump is so unstable, is so volatile that he might order a nuclear strike that is wildly out of step with our national security interests. Lets just recognize the exceptional nature of this moment in the discussion that were having today, he said.


Re: collectd: CVE-2017-16820: snmp-plugin: double free of request PDU "IndyWatch Feed Tech"

Posted by Salvatore Bonaccorso on Nov 15

Should have read csnmp_read_table, not snmp_sess_synch_response.



collectd: CVE-2017-16820: snmp-plugin: double free of request PDU "IndyWatch Feed Tech"

Posted by Salvatore Bonaccorso on Nov 15


Collectd's snmp-plugin is prone to a double free vulneability. This
issue was made aware to the Debian security team, but turned out to be
public already in. MITRE has assigned CVE-2017-16820 for it. The snmp
plugin contains a double-free vulnerability in the
snmp_sess_synch_response() function. Commit message:

Upstream issue:



AMDGPU DC Gets More Fixes Ahead Of The 4.15 Pull Request "IndyWatch Feed Tech"

Alex Deucher of AMD has submitted a set of last minute fixes for the AMDGPU DC code that's expected to be sent this week as a pull request for the Linux 4.15 kernel...


IBM Edges Closer to Quantum Supremacy with 50-Qubit Processor "IndyWatch Feed Tech"

IBM moved the goal posts and then got a bit closer to them, and an inflection point is coming "soon" expert tells IEEE Rebooting Computing Conference Illustration: IBM

We have successfully built a 20-qubit and a 50-qubit quantum processor that works, Dario Gil, IBMs vice president of science and solutions, told engineers and computer scientists at IEEE Rebooting Computings Industry Forum last Friday. The development both ups the size of commercially available quantum computing resources and brings computer science closer to the point where it might prove definitively whether quantum computers can do something classical computers cant.

Its been fundamentally decades in the making, and were really proud of this achievement, said Gil.

More interconnected qubits translate to exponentially more computing power, so industry has been racing to increase the number of qubits in their experimental processors. The 20-qubit machine, made from improved superconducting qubits that operate at a frigid 15-millikelvin, will be made available to IBM clients through the companys IBM Q program by the end of 2017. The company first made a 5-qubit machine available in 2016, and then a 16-qubit machine earlier this year.

The 50-qubit device is still a prototype, and Gil did not provide any details regarding when it might become available.

Photograph of the quantum processor package for the first IBM Q systems. Photo: IBM

The qubits in the new processors are more stable than those in previous generations. Stability is measured in coherence time, the average length a qubit will stay in a quantum state of superposition before environmental influences cause it collapse to either a 1 or 0. The longer the coherence time, the longer the processor has to complete its calculations. The quantum bits in IBMs 5- and 16-qubit machines averaged 50 and 47 microseconds respectively, Gil said. The new 20- and 50-qubit machines hit 90 microseconds.

Apart from wanting to achieve practical quantum computing, industry giants, Google in particular, have been hoping to hit a number of qubits that will allow scientists to prove definitively that quantum computers are capable of solving problems that are intractable for any classical machine. Earlier this year, Google revealed plans to field a 49-qubit processor by the end of 2017 that would do the job. But recently, IBM c...


Amazon Echo and Google Home Devices Vulnerable to BlueBorne Attack "IndyWatch Feed Tech"

By Waqas

In September 2017, the IT security researchers at Armis found eight

This is a post from Read the original post: Amazon Echo and Google Home Devices Vulnerable to BlueBorne Attack


How to stop Emotet malware from infecting your computer "IndyWatch Feed Tech"

The Emotet banking Trojan has been around since 2014. It continues to evolve, and has even been spotted acting like a distribution method for other banking malware. Latest Emotet surge In September, Emotet staged another big comeback fuelled, in part, by new propagation methods implemented in the newest variants. It can now also spread through networks by brute forcing Active Directory domain accounts with a dictionary attack and by using the EternalBlue exploit / DoublePulsar More


The Xerox Alto Struts Its Stuff on Its 40th Birthday "IndyWatch Feed Tech"

A live demonstration of a restored Xerox Alto shows how much it still influences computers todayand the lessons it has left to share Photo: Douglas Fairbairn/CHM Doug Brotz does a live demonstration on the restored Xerox Alto.

The Xerox Alto, widely recognized as the first modern personal computer, pioneered just about every basic concept we are familiar with in computers today. These include windows, bit-mapped computer displays, the whole idea of WYSIWIG interfaces, the cut/paste/copy tools in word processing programs, and pop-up menus. Most of this vision of the office of the future was first unveiled at a meeting of Xerox executives held on 10 Nov 1977, which was 40 years ago last week.

To celebrate that birthday, the Computer History Museum in Mountain View, Calif., brought together some of Parc researchers who worked on the Alto on Friday. They put it through its paces in a series of live demos. These demos used an Alto that had been restored to working order over the past eight months. (Though Doug Brotz, now a fellow at Adobe systems, noted that todays Alto emulator for Mac computers runs some five times as fast as an actual Alto.) The demo event is now available for streaming on Facebook.

The biggest takeaway? Very little has changed in the everyday softwarethe email clients, word processing programs, and circuit design and graphics editing toolsthat we use on our personal computers; the Alto team bestowed upon the machine a host of good ideas that have yet to be bested.

Xerox Alto panel participants Photo: Douglas Fairbairn/CHM From left: John Shoch, Dan Ingalls, Doug Brotz, Bob Sproull, Tom Malloy, Charles Simonyi and David C. Brock.

My kids wouldnt find anything impressive about that evenings demos, said John Shoch, now a general partner at Alloy Ventures. Every feature, he pointed out, would be familiar to them from software today. Shoch was a member of the Xerox Parc research staff, and later served as president of Xeroxs Office Systems Division.

But, it turns out, the Alto had feature or two that got left behind when Steve Jobs and others were grabbing at all of its bits and pieces and turning them into mass market computers. The one that got probably the biggest gaspa wait, I want that reaction from the crowd attending the demos livewas a feature called Replay that was part of the Altos word processing system.


LEDs Give HP 3457A DDMs LCD Display the Boot "IndyWatch Feed Tech"

Have you ever been so frustrated with a digital display that you wanted to rip the whole thing out and create a better one? That is exactly what [xi] did. Replacing their constantly used HP 3457A multimeters LCD display with a brighter LED one was a necessary project and a stress reducing one at that.

While this digital multimeter is well-known for its reliability, its standard display is rather lacking. In fact, there are several mods already out there that simply add a backlight. However, as [xi] notes, LCD screens always have a certain angle where they still dont quite show properly. So this hack reverses the LCDs protocol and details the process of creating new LED display.

The issue of dim displays that comes with traditional digital multimeters is not a new one. One solution to this that we have seen before is a hack where someone decided to add a backlight onto their cheap multimeter. [Ken Kaarvik] got around the dimness altogether by giving his multimeter a wireless remote display of his choosing. It is interesting to see the different solutions that are made to the same nuisan...


Stupid Patent Data of the Month: the Devil in the Details "IndyWatch Feed Tech"

A Misunderstanding of Data Leads to a Misunderstanding of Patent Law and Policy

Bad patents shouldnt be used to stifle competition. A process to challenge bad patents when they improperly issue is important to keeping consumer costs down and encouraging new innovation. But according to a recent post on a patent blog, post-grant procedures at the Patent Office regularly get it wrong, and improperly invalidate patents. We took a deep dive into the data being relied upon by patent lobbyists to show that contrary to their arguments, the data they rely on undermines their arguments and conflicts with the claims theyre making.

The Patent Office has several procedures to determine whether an issued patent was improperly granted to a party that does not meet the legal standard for patentability of an invention. The most significant of these processes is called inter partes review, and is essential to reining in overly broad and bogus patents. The process helps prevent patent trolling by providing a target with a low-cost avenue for defense, so it is harder for trolls to extract a nuisance-value settlement simply because litigating is expensive. The process is, for many reasons, disliked by some patent owners. Congress is taking a new look at this process right now as a result of patent owners latest attempts to insulate their patents from review.

An incorrect claim about the inter partes review (IPR) and other procedures like IPR at the Patent Trial and Appeal Board (PTAB) has been circulating, and was recently repeated in written comments at a congressional hearing by Philip Johnson, former head of intellectual property at Johnson & Johnson. Josh Malone and Steve Brachmann, writing for a patent blog called IPWatchdog, are the source of this error. In their article, cited in the comments to Congress, they claim that the PTAB is issuing decisions contrary to district courts at a very high rate.

We took a closer look at the data they use, and found that the rate is disagreement is actually quite small: about 7%, not the 76% claimed by Malone and Brachmann....


DOJ asking states to help block AT&T-Time Warner merger: report "IndyWatch Feed Tech"

The Justice Department has made overtures to state attorneys general to build support for blocking AT&T's $85.4 billion deal to purchase Time Warner Inc., according to a Wednesday report. A source "briefed on the matter" told...


Tesla Sued Over Alleged Racism; Deliveries Pushed Back; Semi Truck to be Unveiled "IndyWatch Feed Tech"

Tesla has been sued by an employee for alleged racist harassment and termination for complaining:

Tesla Inc.'s production floor is a "hotbed for racist behavior," an African-American employee claimed in a lawsuit in which he alleged black workers at the electric carmaker suffer severe and pervasive harassment. The employee says he's one of more than 100 African-American Tesla workers affected and is seeking permission from a judge to sue on behalf of the group. He's seeking unspecified general and punitive monetary damages as well as an order for Tesla to implement policies to prevent and correct harassment.

[...] The lawsuit was filed on behalf of Marcus Vaughn, who worked in the Fremont factory from April 23 to Oct. 31. Vaughn alleged that employees and supervisors regularly used the "N word" around him and other black colleagues. Vaughn said he complained in writing to human resources and Musk and was terminated in late October for "not having a positive attitude."

Although customers who have reserved a Tesla Model 3 (at a cost of $1000) have seen their delivery dates pushed back, they apparently remain loyal to the company:

Even as the company led by Elon Musk struggles with manufacturing bottlenecks and pushes back production targets by at least a quarter, many reservation holders aren't budging. Bloomberg News contacted 20 consumers who paid deposits for the Model 3 and none had canceled their orders. Regardless of the concerns raised by slower output and an uncertain future for U.S. electric-car tax credits, Nomura analyst Romit Shah predicts the affinity for Tesla Inc. products will prevail. "We believe there is a real passion for the brand," Shah wrote in a report to clients that reiterated a $500 price target for Tesla shares, the highest on Wall Street. "It is bigger than loyalty because much of the enthusiasm comes from people who have never owned a Tesla. The only comparable we see is the iPhone."

Finally, Elon Musk says that the Tesla Semi Truck will be unveiled during a live webcast at 8 PM...



Here's the deal. We have a few cases of Club-Mate that have a "best buy" date of November 23rd. We can say from experience that the quality does not magically decline after that date (we've had bottles well over a year past the "best buy" date and haven't noticed a difference) but we cannot sell them after then. We want the space so we're slashing the price effective immediately. We're offering 18-packs for just $20 plus shipping. That's just over $1 a bottle, cheaper than it's ever been anywhere! But again, we don't have a lot so we expect it to run out. And even if it doesn't, we can't sell it after next week. Follow this link to take advantage of this - and don't expect this to happen again anytime soon. (We will also be out of stock until early 2018 - we are expecting some Winter Edition in January, however.)


Synthetic T Cells Seek and Destroy Cancer "IndyWatch Feed Tech"

T Cells are a major component of the formidable immune system that the body keeps at the ready to respond to the first sign of infection or disease. T cells detect if cells have been infected with a virus; upon detection, they trigger these cells ablation and destroy the virus.

Unfortunately, the T cells do not detect cancer cells, as these cells use various tricks to fool the immune system into believing that they are normal healthy cells. Thus, they hide in plain sight, and the T cells cannot seek and destroy them. A new study has found a possible solution to this problem.


Facebook adds two lobbyists amid Russia probe "IndyWatch Feed Tech"

Facebook is adding to its federal lobbying forces amid scrutiny from Congress about how the companys platform was used by Russians as part of a disinformation campaign intended to influence U.S. politics.One of the two new hires, Luke Albee, is a...


Intel Optane SSD 900P Offers Stunning Linux Performance "IndyWatch Feed Tech"

At the end of October Intel released the Optane 900P solid-state drive as their new ultra high-end performance SSD. Windows reviews have been positive, but what about using the Optane 900P on Linux? It's working well and delivers stunning NVMe SSD performance.


The Perils of Developing the Hackaday Superconference Badge "IndyWatch Feed Tech"

In case you havent heard, the best hardware conference in the world was last weekend. The Hackaday Superconference was three days of hardware hacking, soldering irons, and an epic hardware badge. Throw in two stages for talk, two workshop areas, the amazing hallwaycon and the best, most chill attendees you can imagine, and you have the ultimate hardware conference.

Already weve gone over the gory details of what this badge does, and now its time to talk about the perils of building large numbers of an electronic conference badge. This is the hardware demoscene, artisanal manufacturing, badgelife, and an exploration of exactly how far you can push a development schedule to get these badges out the door and into the hands of eager badge hackers and con attendees.

The good news is that we succeeded, and did so in time to put a completed badge in the hand of everyone who attended the conference (and we do have a few available if you didnt make it to the con). Join me after the break to learn what it took to make it all happen and see the time lapse of the final kitting process.

Some Important Thank Yous:



NumPy will drop Python 2 support "IndyWatch Feed Tech"

The NumPy project is phasing out support for Python 2. "The Python core team plans to stop supporting Python 2 in 2020. The NumPy project has supported both Python 2 and Python 3 in parallel since 2010, and has found that supporting Python 2 is an increasing burden on our limited resources; thus, we plan to eventually drop Python 2 support as well. Now that we're entering the final years of community-supported Python 2, the NumPy project wants to clarify our plans, with the goal of to helping our downstream ecosystem make plans and accomplish the transition with as little disruption as possible." NumPy releases will fully support both Python 2 and Python 3 until December 31, 2018. New feature releases will support only Python 3 as of January 1, 2019. (Thanks to Nathaniel Smith)


FDA Approves "Digital" Pill "IndyWatch Feed Tech"

The U.S. Food and Drug Administration (FDA) has approved a "digital pill" that contains a sensor intended to track whether a patient has taken their medicine:

For the first time, the Food and Drug Administration has approved a digital pill a medication embedded with a sensor that can tell doctors whether, and when, patients take their medicine. The approval, announced late on Monday, marks a significant advance in the growing field of digital devices designed to monitor medicine-taking and to address the expensive, longstanding problem that millions of patients do not take drugs as prescribed.

Experts estimate that so-called non-adherence or noncompliance to medication costs about $100 billion a year, much of it because patients get sicker and need additional treatment or hospitalization. "When patients don't adhere to lifestyle or medications that are prescribed for them, there are really substantive consequences that are bad for the patient and very costly," said Dr. William Shrank, chief medical officer of the health plan division at the University of Pittsburgh Medical Center.

Ameet Sarpatwari, an instructor in medicine at Harvard Medical School, said the digital pill "has the potential to improve public health," especially for patients who want to take their medication but forget. But, he added, "if used improperly, it could foster more mistrust instead of trust."

FDA news release.

Original Submission

Read more of this story at SoylentNews.


Tips for an Information Security Analyst/Pentester career - Ep. 37: ARP Spoofing "IndyWatch Feed Tech"

Computer networks work thanks to several protocols.

One of the most important network protocols is ARP (Address Resolution Protocol), converting IP addresses into MAC addresses.

The way it works is the following: a client needs to communicate with another client on the same network but it doesn't know its MAC address, it only knows its IP address.

The client sends a broadcast request with that specific information and the client that IP address was assigned to replies with its MAC address.

Both clients keep track of this learned information in their respective ARP tables.



We have a local network with two clients (two virtual machines built based off Georgia Weidman's book), which are both assigned a static IP address in a bridged network configuration.

  • Windows XP SP3:
  • Linux Ubuntu 8.10:

These two clients communicate with each other.


The attacker runs a Kali Linux machine sitting on the same network and sniffing the traffic on the IP address.

The attacker would like to intercept all the traffic between these two machines but this is impossible in a normal switched network.

Of course, the graphs below are simplified, because our two target machines communicate with the router as well, but bear with me for the purposes of this demonstration.


Mozilla takes on Google Chrome by launching faster new Firefox Quantum browser "IndyWatch Feed Tech"

Meet Firefox Quantum that has improved speed and lower RAM usage compared to Chrome

According to Mozilla, the new browser is twice as fast as Firefox 52 from six months ago. Its by far the biggest update weve had since we launched Firefox 1.0 in 2004, the company wrote in a blog post.

Firefox Quantum is over twice as fast as Firefox from 6 months ago, built on a completely overhauled core engine with brand new technology stolen from our advanced research group, and graced with a beautiful new look designed to get out of the way and let you do what you do best.

Quantum now comes with a new CSS engine called Quantum CSS or Stylo. Quantum CSS allows the browser to take advantage of the modern hardware with multi-core processes and low power consumption. While Mozilla has claimed Quantum CSS to be twice as fast as the older Firefox browser, there are some operations that can load up to 18 times faster because of it. It is also claimed that Firefox Quantum uses 30 percent less memory than its competitors like Chrome, Edge, and Safari on Windows operating systems.

Further, Mozilla has also made changes to enhance the outward appearance of the browser. It boasts a stylish new user interface (UI), dubbed as Photon, which streamlines a number of elements included in previous versions of Firefox. It is designed to provide smooth and fast performance when browsing your favorite websites.

To create Photon, our user research team studied how people browsed the web, wrote Mozillas Mark Mayo. We looked at real world hardware to make Firefox look great on any display, and we made sure that Firefox looks and works like Firefox regardless of the device youre using. Our designers created a system that scales to more than just current hardware but lets us expand in the future.

Other features include Pocket, the read-later client, which has now been improved by Mozilla to di...


Xen Security Advisory 243 (CVE-2017-15592) - x86: Incorrect handling of self-linear shadow mappings with translated guests "IndyWatch Feed Tech"

Posted by Xen . org security team on Nov 15

Xen Security Advisory CVE-2017-15592 / XSA-243

x86: Incorrect handling of self-linear shadow mappings with translated guests


New final patch, addressing a hypervisor crash the original fix caused,
which by itself represents another security issue (DoS).


The shadow pagetable code uses linear mappings to inspect...


Stable kernel updates "IndyWatch Feed Tech"

Stable kernels 4.13.13, 4.9.62, 4.4.98, and 3.18.81 have been released. They all contain important fixes and users should upgrade.


Security updates for Wednesday "IndyWatch Feed Tech"

Security updates have been issued by Debian (libxml-libxml-perl and varnish), openSUSE (GraphicsMagick, mongodb, shadowsocks-libev, and snack), Red Hat (flash-plugin, kernel, php, and redis), Scientific Linux (kernel and php), and Ubuntu (shadow).


Friday Hack Chat: High Speed Data Acquisition "IndyWatch Feed Tech"

For this weeks Hack Chat, were going to be talking all about High-Speed Data Acquisition. If youve ever needed to shove voltages, currents, logic signals, temperature, pressure, or sound into a computer, youve used a DAQ. If youve ever needed to acquire a signal at a very high speed, youve probably paid a lot of money for that piece of equipment.

Our guest for this weeks Hack Chat will be [Kumar Abhishek], engineering student, Hackaday Prize finalist, and creator of the very, very cool Beaglelogic, a logic analyzer for the BeagleBone. The interesting bit about the Beaglelogic is its utilization of the Programmable Real-Time Units (PRUs) found in every BeagleBone.

These PRUs are basically DMA machines, shuttling bits back and forth between memory and GPIOs. This year, [Kumar] turned the Beaglelogic cape into the Beaglelogic Standalone, a device based on the Octavo Systems OSD3358 (the BeagleBone On A Chip) that gives those Saleae logic analyzers a run for their money.

In this Hack Chat, well be discussing the PRUs found in various iterations of the BeagleBoard, how the Beaglelogic performs its data acquisition, and how programming the PRUs is actually accomplished. If you have a question for [Kumar],...


Cracking Group 3DM Loses Piracy Case Against Game Maker "IndyWatch Feed Tech"

While most cracking groups operate under a veil of secrecy, China-based 3DM is not shy to come out in public.

The groups leader, known as Bird Sister, has commented on various gaming and piracy related issues in the past.

She also spoke out when her own group was sued by the Japanese game manufacturer Koei Tecmo last year. The company accused 3DM of pirating several of its titles, including Romance of the Three Kingdoms.

However, Bird Sister instead wondered why the company should be able to profit from a work inspired by a 3rd-century novel from China.

why does a Japanese company, Koei have the copyright of this game when the game is obviously a derivation from the book Romance of the Three Kingdoms written by Chen Shou. I think Chinese gaming companies should try taking back the copyright, she said.

Bird Sister

The novel in question has long since been in the public domain so theres nothing stopping Koei Tecmo from using it, as Kotaku points out. The game, however, is a copyrighted work and 3DMs actions were seen as clear copyright infringement by a Chinese court.

In a press release, Koei Tecmo announces that it has won its lawsuit against the cracking group.

The court ordered 3DM to stop distributing the infringing games and awarded a total of 1.62 million Yuan ($245,000) in piracy damages and legal fees.

While computer games are cracked and pirated on a daily basis, those responsible for it are rarely held accountable. This makes the case against 3DM rather unique. And it may not be the last if its up to the game manufacturer.

We will continue to respond rigorously to infringements of our copyrights and trademark rights, both in domestic and overseas markets, while also developing satisfying games that many users can enjoy, said the company, commenting on the ruling.

While the lawsuit may help to steer the cracking group away from piratin...


Top UK cybersecurity official: Russia targeted British media, energy firms "IndyWatch Feed Tech"

The U.K.'s top cybersecurity official has confirmed for the first time that Russian hackers targeted British media, telecommunications and energy firms over the past year.Ciaran Martin, head of the National Cyber Security Center (NCSC), made...


Firefox Quantum: Security and privacy improvements "IndyWatch Feed Tech"

Mozilla has released Firefox 57, aka Firefox Quantum, and it comes with many performance improvements. It sports a new browsing engine that takes full advantage of the processing power in modern devices, AMD VP9 hardware video decoder support for improved video playback with lower power consumption, and a cleaner and faster user interface with optimizations for touch screens. Security fixes and improvements From now on, Firefox will support extensions built using the WebExtension API, a More


Announcing the Security Education Companion "IndyWatch Feed Tech"

The need for robust personal digital security is growing every day. From grassroots groups to civil society organizations to individual EFF members, people from across our community are voicing a need for accessible security education materials to share with their friends, neighbors, and colleagues.

We are thrilled to help. Today, EFF has launched the Security Education Companion, a new resource for people who would like to help their communities learn about digital security but are new to the art of security training.

Its rare to find someone with not only technical expertise but also a strong background in pedagogy and education. More often, folks are stronger in one area: someone might have deep technical expertise but little experience teaching, or, conversely, someone might have a strong background in teaching and facilitation but be new to technical security concepts. The Security Education Companion is meant to help these kinds of beginner trainers share digital security with their friends and neighbors in short awareness-raising gatherings.

A new resource for people who would like to help their communities learn about digital security but are new to the art of security training.

Lesson modules guide you through creating sessions for topics like passwords and password managers, locking down social media, and end-to-end encrypted communications, along with handouts, worksheets, and other remix-able teaching materials. The Companion also includes a range of shorter Security Education 101 articles to bring new trainers up to speed on getting started with digital security training, foundational teaching concepts, and the nuts and bolts of planning a workshop.

Teaching requires mindful facilitation, thoughtful layering of content, sensitivity to learners needs and concerns, and mutual trust built up over time. When teachi...


Lethal Microdrones, Dystopian Futures, and the Autonomous Weapons Debate "IndyWatch Feed Tech"

The future of weaponized robots requires a reasoned discussion, not scary videos Image: Slaughterbots/YouTube In "Slaughterbots," a film created by a group of academics concerned about lethal autonomous weapons, swarms of explosive-carrying microdrones are used to kill thousands of people.

This week, the first meeting of the Convention on Conventional Weapons (CCW) Group of Governmental Experts on lethal autonomous weapons systems is taking place at the United Nations in Geneva. Organizations like the Campaign to Stop Killer Robots are encouraging the UN to move forward on international regulation of autonomous weapons, which is great, because talking about how these issues will shape the future of robotics and society is a very important thing.

Over the weekend, however, I came across a video that struck me as a disturbing contribution to the autonomous weapons debate. The video, called Slaughterbots and produced with support from Elon Musks Future of Life Institute, combines graphic violence with just enough technical plausibility to imagine a very bleak scenario: A fictional near future in which autonomous explosive-carrying microdrones are killing thousands of people around the world.

We are not going to embed the video here because it contains a number of violent scenes, including a terrorist attack in a classroom (!). You can find  it on the Future of Life  website .

Its very disappointing to me that robotics and AI researchers who I otherwise have a lot of respect for would support this kind of sensationalism that seems designed to shock and scare people rather than impart any sort of useful information about what the actual problem is. The message here seems to be that if youre interested in having a discussion about these issues, or if you think that perhaps there might be other, potentially more effective ways of shaping the future of autonomous weapons besides calling for a ban, then youre siding with terrorists. This is a dismally familiar form of rhetoric that has been shown to be effective when the objective is not to communicate facts, but rather exploit emotions and fears. Another problem is that videos like this, created and promoted by academics, might make the public more dist......


IBM Announces Working Prototype of a 50-Qubit Quantum Computer "IndyWatch Feed Tech"

IBM Raises the Bar with a 50-Qubit Quantum Computer

IBM established a landmark in computing Friday, announcing a quantum computer that handles 50 quantum bits, or qubits. The company is also making a 20-qubit system available through its cloud computing platform.

IBM, Google, Intel, and a San Francisco startup called Rigetti are all currently racing to build useful quantum systems. These machines process information in a different way from traditional computers, using the counterintuitive nature of quantum physics.

The announcement does not mean quantum computing is ready for common use. The system IBM has developed is still extremely finicky and challenging to use, as are those being built by others. In both the 50- and the 20-qubit systems, the quantum state is preserved for 90 microsecondsa record for the industry, but still an extremely short period of time.

[...] IBM is also announcing an upgrade to its quantum cloud software system today. "We're at world record pace. But we've got to make sure non-physicists can use this," Gil says.

The announcement should perhaps be treated cautiously, though. Andrew Childs, a professor at the University of Maryland, points out that IBM has not published details of its system in a peer-reviewed journal. "IBM's team is fantastic and it's clear they're serious about this, but without looking at the details it's hard to comment," he says. Childs says the larger number of qubits does not necessarily translate to a leap in computational capability. "Those qubits might be noisy, and there could be issues with how well connected they are," he says.

Also at The Mercury News and SiliconANGLE.

Previously: IBM Promises Commercialization of 50 Qubit Quantum Computers
IBM and D-Wave Quantum Computing Announcements
Intel Ships 17-Qubit Quantum Chip to Researchers



A Mix of Nanomaterials Leads to a New Quantum Photonic Circuit Architecture "IndyWatch Feed Tech"

NIST researchers develop an underlying architecture for a new class of quantum photonic circuits Image: NIST/Nature Communications In this false color image from a scanning electron microscope, single photons travel through a pink waveguide atop a blue surface made of silicon dioxide.

Scientists at the National Institute of Standards and Technology (NIST) have developed an underlying architecture for a new class of quantum photonic circuitschip-based devices that leverage the quantum properties of light to process and communicate information.

In research described in the journal Nature Communications , the NIST researchers and their collaborators in China and the UK developed a class of devices that are composed of networks of low-loss waveguides and single-photon sources, all on a single chip. The resulting quantum circuit architecture could have an impact on photonic quantum computing and simulation, as well as metrology and communications.

Operating the device consists of producing streams of single photons, launching them into a network of waveguides and beamsplitters in which they are allowed to interfere with each other, and then detecting them at the networks outputs.

To get a sense of the impact of this research, one must understand that until now, quantum information researchers have devised many types of systems to perform quantum simulations, metrology, and communications that rely on the interference of single, identical photons in large networks of waveguides and beamsplitters.

In these systems, photons are injected and will move around and interfere with each other randomly. Finally, they will come out at the output ports of the network, with a probability at each port that is determined by quantum mechanics. These probabilities are the final outcome of the experiment. Because of the inherent randomness of this process, the experiment has to be run a large number of times so that the probabilities can be determined with high confidence.

Unfortunately, there are three possible undesirable results. For one, the photons could get lost in the waveguides that compose the network. Another possibility is that the photons get lost in the process of launching them into the waveguides. And a final possibility is that if the photon source itself can only produce photons at a low rate, the experiment needs to run for much longer. For very large networks in particular, this could mean unrealistically long run times.

The NIST-develo...

Rewire Your Own Brushless Motors "IndyWatch Feed Tech"

Hackaday likes the idea of fine-tuning existing hardware rather than buying new stuff. [fishpepper] wrote up a tutorial on rewinding brushless motors, using the Racerstar BR1103B as the example. The BR1103B comes in 8000 Kv and 10000 Kv sizes,  but [fishpepper] wanted to rewind the stock motor and make 6500 Kv and 4500 Kv varieties or as close to it as he could get.

Kv is the ratio of the motors RPM to the voltage thats required to get it there. This naturally depends on the magnet coils that it uses. The tutorial goes into theory with the difference between Wye-terminated and Star-terminated winding schemes, and how to compute the number of winds to achieve what voltage for his project he ended up going with 12 turns, yielding 6700 Kv and 17 turns for 4700 Kv. His tutorial assumes the same gauge wire as the Racerstar.

Just as important as the theory, however, the tutorial also covers the physical process of opening up the motor and unwinding the copper wire, cleaning the glue off the stator, and then rewinding to get the required stats.

[fishpepper]s handle has graced Hackaday before: he created what he calls the worlds lightest brushless FPV quadcopter. In addition to motors and drones, he also rocks a mean fidget spinner.


Filed under: drone hacks


10-year-old kid uses his face to unlock moms iPhone X with Face ID "IndyWatch Feed Tech"

By Waqas

When iPhone X was launched, Apple claimed its Face ID

This is a post from Read the original post: 10-year-old kid uses his face to unlock moms iPhone X with Face ID


Igalia Posts Initial OpenGL SPIR-V Patches For Mesa, Intel i965 "IndyWatch Feed Tech"

Spanish development outfit Igalia has posted their initial work on wiring up the OpenGL 4.6 ARB_gl_spirv and ARB_spirv_extensions into core Mesa and the i965 OpenGL driver...


EU competition chief promises more cases against Google "IndyWatch Feed Tech"

The European Unions (EU) competition chief said Wednesday that regulators will be bringing more cases against Google in the future, according to Reuters.Margrethe Vestager's office hit the internet search giant with a record $2.8 billion...


Severe flaw in Microsoft Office stuns the world "IndyWatch Feed Tech"

A shocking discovery by security researchers has stunned the technological world. This discovery is in a software that almost every computer consists i.e. Microsoft Office. What is more shocking is the presence of this vulnerability in MS office since 17 years. Termed as the Microsoft Office RCE exploit, this flaw can be used by hackers

The post Severe flaw in Microsoft Office stuns the world appeared first on Hacker News Bulletin | Find the Latest Hackers News.


Visual 3D Print Finishing Guide "IndyWatch Feed Tech"

With 3D printers now dropping to record low prices, more and more people are getting on the additive manufacturing bandwagon. As a long time believer in consumer-level desktop 3D printing, this is a very exciting time for me; the creativity coming out of places like Thingiverse or the 3D printing communities on Reddit is absolutely incredible. But the realist in me knows that despite what slick promotional material from the manufacturers may lead you to believe, these arent Star Trek-level replicators. What comes out of these machines is often riddled with imperfections (from small to soul crushing), and can require considerable cleanup work before they start to look like finished pieces.

If all you hope to get out of your 3D printer are some decent toy boats and some low-poly Pokemon, then have no fear. Even the most finicky of cheap printers can pump those out all day. But if youre looking to build display pieces, cosplay props, or even prototypes that are worth showing to investors, youve got some work cut out for you.

With time, patience, and a few commercial products, you can accomplish the ultimate goal: turning a 3D printed object into something that doesnt look like it was 3D printed. For the purposes of this demonstration Ill be creating a replica of the mobile emitter used by the Emergency Medical Hologram in Star Trek: Voyager. I can neither confirm nor deny I selected this example due to the fact that Im currently re-watching Voyager on Netflix. Lets make it look good.

Choosing Layer Height

Before you get out your sandpaper or paints, before the print has even started, you need to make a decision. As anyone whos used a 3D printer can tell you, layer height is the biggest factor in overall print time. Thicker layers are faster, but result in loss of surface detail. You need to decide before the print even begins if the higher resolution settings are worth the additional time, and the only way to do that is with a clear idea of how the printers resolution will effect your final product.

The following image illustrates the effect the three most common layer heights (0.3 mm, 0.2 mm, and 0.1 mm) have on final print quality. For reference, the skull in the Hackaday logo is a bit bigger than Lincolns head on a US penny.


Crunch Texture Compression Showing Off Promising Results For Unity "IndyWatch Feed Tech"

The Crunch texture compression library developed by former Valve Linux/OpenGL engineer Rich Geldreich who cofounded the Binomial consulting firm is making much progress with showing off impressive compression capabilities for game engines...


Australia is Banning Software Patents and Shelston IP is Complaining as Usual "IndyWatch Feed Tech"

Because Shelston IP does not care what actual software developers want

Happy Birthday Sydney Harbour Bridge

Summary: The Australian Productivity Commission, which defies copyright and patent bullies, is finally having policies put in place that better serve the interests of Australians, but the legal industry is unhappy (as expected)

THE decision to more officially ban software patents in Australia is not news. We wrote quite a few articles about that earlier in the year. As Kluwer Patent Blog put it this morning: The purpose of the Bill is to implement the Governments response to the Productivity Commissions recommendations on Australias IP Arrangements.

The article neglects to say that Australia is cracking down on software patents (software is not being mentioned at all by the author) and instead says that Australias Government introduces draft legislation to abolish innovation patents (which sounds rather misleading, as can often be expected from sites such as Kluwer Patent Blog). To quote:

The Productivity Commission recommended that Australia abolish the innovation patents regime, the principal reasons being that such patents have a lower inventive step than that of a standard patent and inhibited rather than assisted innovation from small business enterprises. The Government has agreed with this conclusion, noting that neither small business enterprises nor the Australian community at large benefited from it.

Part 4 of the draft Bill contains amendments to commence the abolition of the innovation patent system by preventing the filing of new applications, subject to certain exceptions. For example, existing rights before the commencement of the abolishing Act will remain unaffected, including the right to file divisional applications and convert standard patent applications to innovation patent applications where the patent date and priority date for each claim are before the abolishing Acts commencement date.



Security Jobs Are Hot: Get Trained and Get Noticed "IndyWatch Feed Tech"

Security Jobs Are Hot: Get Trained and Get Noticed


China surpasses US with the worlds most powerful computers in latest TOP500 list "IndyWatch Feed Tech"

Linux Now Runs On All Top 500 Supercomputers In The World

According to the TOP500 list of the fastest supercomputers which shows that all of the worlds fastest supercomputers run Linux, reports ZDNet. The previous two exceptions on the list Chinese IBM POWER computers which ran AIX, are no longer on the November 2017 list.

Linux first appeared on the TOP500 list in 1998, and by 2004 Linux had become the favorite operating system in supercomputing. There were 485 Linux-powered systems in the TOP500 list in 2015, which increased to 498 out of 500 in 2016 and in 2017 it is running on all the 500 supercomputers in the list.

Linux [became] the driving force behind the breakthroughs in computing power that have fueled research and technological innovation, as reported in The Linux Foundations 20 years of

Further, the TOP500 list that is released twice annually, shows that China has overtaken the US in the total number of ranked systems by a margin of 202 to 144 in the TOP500 list 2017. This is the first time that China has surpassed the US in the rankings. Only a few months ago, the US had 169 systems in the Top500 compared to Chinas 159.

It is the largest number of supercomputers China has ever claimed on the TOP500 ranking, with the US presence shrinking to its lowest level since the lists inception 25 years ago, TOP500 said in a statement.

While the US ranks second in the world for supercomputers, Japan comes in at third and Germany at fourth with 35 and 20 supercomputers respectively. These were followed by France and UK with 18 and 15 supercomputers respectively in the TOP500 list 2017.

Also, according to the new TOP500 list, Chinas Sunway TaihuLight for the fourth time in a row retained its number one ranking with a performance of 93.01 petaflops on the High Performance Linpack (HPL) test. A petaflop is a thousand trillion floating point operations per second.

Tianhe-2, or Milky Way-2, another Chinese computer once again maintained the number two position with 33.86 petaflops. Tianhe-2, which is based on Intel chips, was the number one system on the TOP500 list for three consecutive years until it was displaced by Sunway TaihuLight in June last year.

In terms of aggregate performance, China came in first with its supercomputers representing 35.4 percent of the Top500s flops, while the US came in second with 29.6 percent.

In the meanwhile, Chinas overtaking of the US in the total number of ranked supercomputers is not re...


Infosec expert viewpoint: IoT security initiatives "IndyWatch Feed Tech"

IoT went quickly from buzzword to mainstream, and connected devices have become common in households and enterprises around the globe. A worrying lack of regulation has fueled a plethora of security problems causing headaches to security teams and endangering end users. A recent survey found that security and LoB leaders are experiencing high levels of anxiety due to IoT/OT security concerns, largely due to the negative business ramifications a security failure can have on critical More


US retailer Forever 21 Warns customers of payment card breach at some locations "IndyWatch Feed Tech"

The US clothes retailer FOREVER 21 announced it has suffered a security breach, hackers stole payment card data at some locations.

Another data breach made the headlines, this time the victim is the US clothes retailer Forever 21 that announced it has suffered a security breach.

According to the company, unknown hackers gain unauthorized access to its payment systems stealing payment cards used at a number of its retail locations.

Customers who shopped between March and October this year may be affected.

The company revealed that it implemented encryption and token-based authentication systems back in 2015, but it was deployed only at certain points of sale.

FOREVER 21 is notifying its customers that it recently received a report from a third party that suggested there may have been unauthorized access to data from payment cards that were used at certain FOREVER 21 stores. Forever 21 immediately began an investigation of its payment card systems and engaged a leading security and forensics firm to assist. announced FOREVER 21.Because of the encryption and tokenization solutions that FOREVER 21 implemented in 2015, it appears that only certain point of sale devices in some FOREVER 21 stores were affected when the encryption on those devices was not in operation. The companys investigation is focused on card transactions in FOREVER 21 stores from March 2017 October 2017. 


The US retailer operates over 815 stores in 57 countries, at the time the firm didnt say which stores were affected.

The US retailer received the news of the hack from a third-party monitoring service who informed the company there may have been unauthorized access to data from payment cards that were used at certain stores.

The investigation is still ongoing, customers are advised to closely monitor their payment card statements reporting unauthorized charges.

Forever 21 immediately began an investigation of its payment card systems and engaged a leading security and forensics firm to assist, the US clothing retailer said while...


Los Alamos National Laboratory is Using a 750-Node Raspberry Pi Supercomputer "IndyWatch Feed Tech"

Cheap Supercomputers: LANL has 750-node Raspberry Pi Development Clusters

One of the more esoteric announcements to come out of SuperComputing 17, an annual conference on high-performance computing, is that one of the largest US scientific institutions is investing in Raspberry Pi-based clusters to aid in development work. The Los Alamos National Laboratory's [LANL] High Performance Computing Division now has access to 750-node Raspberry Pi clusters as part of the first step towards a development program to assist in programming much larger machines.

The platform at LANL leverages a modular cluster design from BitScope Designs, with five rack-mount Bitscope Cluster Modules, each with 150 Raspberry Pi boards with integrated network switches. With each of the 750 chips packing four cores, it offers a 3000-core highly parallelizable platform that emulates an ARM-based supercomputer, allowing researchers to test development code without requiring a power-hungry machine at significant cost to the taxpayer. The full 750-node cluster, running 2-3 W per processor, runs at 1000W idle, 3000W at typical and 4000W at peak (with the switches) and is substantially cheaper, if also computationally a lot slower. After development using the Pi clusters, frameworks can then be ported to the larger scale supercomputers available at LANL, such as Trinity and Crossroads.

Original Submission

Read more of this story at SoylentNews.


R.I.P. root9B? We Hardly Knew Ya! "IndyWatch Feed Tech"

root9B Holdings, a company that many in the security industry consider little more than a big-name startup aimed at cashing in on the stock markets insatiable appetite for cybersecurity firms, surprised no one this week when it announced it was ceasing operations at the end of the year.

Founded in 2011 as root9B Technologies, the company touted itself as an IT security training firm staffed by an impressive list of ex-military leaders with many years of cybersecurity experience at the Department of Defense and National Security Agency (NSA). As it began to attract more attention from investors, root9Bs focus shifted to helping organizations hunt for cyber intruders within their networks.

By 2015, root9B was announcing lucrative cybersecurity contracts with government agencies and the infusion of millions from investors. The companys stock was ballooning in price, reaching an all-time high in mid-May 2015.

That was just days after root9B issued a headline-grabbing report about how its cyber intelligence had single-handedly derailed a planned Russian cyber attack on several U.S. financial institutions.

The report, released May 12, 2015, claimed root9B had uncovered plans by an infamous Russian hacking group to target several banks. The company said the thwarted operation was orchestrated by Fancy Bear/Sofacy, a so-called advanced persistent threat (APT) hacking group known for launching sophisticated phishing attacks aimed at infiltrating some of the worlds biggest corporations.  root9B released its Q1 2015 earnings two days later, reporting record revenues.

On May 20, 2015, KrebsOnSecurity published a rather visceral dissection of that root9B report: Security Firm Redefines APT; African Phishing Threat. The story highlighted the thinness of the reports claims, pointing to multiple contradictory findings by other security firms which suggested the company had merely detected several new phishing domains being erected by a c...


GNOME 3.27.2 Released: More Meson Porting, Nautilus Starring Files "IndyWatch Feed Tech"

GNOME 3.27.2 is now available as the second development release in the road to next March's GNOME 3.28 desktop stable update...


Tech pushes for focus on copyright in NAFTA renegotiations "IndyWatch Feed Tech"

The technology industry is mobilizing to push the Trump administration over concerns on copyright matters in discussions to renegotiate the North American Free Trade Agreement (NAFTA). Top technology trade associations, which lobby on behalf...


Bot-driven web traffic and its application security impact "IndyWatch Feed Tech"

New research conducted by the Ponemon Institute, which focused on such highly targeted industries as retail, healthcare and financial services, exposes the proliferation of bot-driven web traffic and its impact on organizations application security. Bots conduct 52% of all Internet traffic flow. For some organizations, bots represent more than 75% of their total traffic. This is a significant finding considering one-in-three organizations cannot distinguish between good bots and bad ones. The report also found that More


17-Year-Old MS Office Flaw Lets Hackers Install Malware Without User Interaction "IndyWatch Feed Tech"

You should be extra careful when opening files in MS Office. When the world is still dealing with the threat of 'unpatched' Microsoft Office's built-in DDE feature, researchers have uncovered a serious issue with another Office component that could allow attackers to remotely install malware on targeted computers. The vulnerability is a memory-corruption issue that resides in all versions of


Vulnerability in antivirus quarantine allows attacker to release malware "IndyWatch Feed Tech"

Antivirus software flaw helps spread malware into your system

In todays computer-dependent society, hackers are a constant threat for all Internet users. Hence, we implement stronger measures such as installing an antivirus program to protect our computers from hackers, malicious software, malware, etc. But what will you do if the vulnerability in your antivirus allows malware to escape quarantine and infect your system? Scary, right?

Florian Bogner, a researcher with security firm Kapsch, has discovered an exploit that takes advantage of antivirus programs. Dubbed as AVGater, this exploit takes advantage of the restore from quarantine feature found on many antivirus programs, wherein the malware is relocated from an AV quarantine folder and stored on to another sensitive location.

For those unaware, quarantine is a secure storage that is used by an antivirus program to place a potentially malicious file detected by it. This feature allows the users to restore files that have been erroneously detected as malware, known as a false positive detection.

Bogner said in blog post that the exploit allows a user to remove a certain entry of malware from the quarantined folder and place it somewhere else on the targeted computer, allowing the malware to be executed. Bogner has also uploaded a video that gives more information on how the exploit works.

As explained in the video, a local attacker can manipulate the antivirus scanning engine to bring the malicious file out. Usually, a non-administrator user does not have access to write a file to system folders like Program Files or Windows, but by abusing a windows feature called NTFS file junction point allows the attacker to relay the file to a privileged directory, for instance, a folder within C:\Program Files or C:\Windows.

AVGater can be used to restore a previously quarantined file to any arbitrary file system location. This is possible because the restore process is most often carried out by the privileged AV Windows user mode service. Hence, file system ACLs [Access Control Lists] can be circumvented (as they dont really count for the SYSTEM user). This type of issue is called a privileged file write vulnerability and can be used to place a malicious DLL anywhere on the system, Bogner explained.

However, in order to execute the attack, the attacker must be physically present at the targeted PC, which is the most significant limitation of AVGater.

Prior to the disclosure of the exploit, Bogner repeated the attack in products of the firms including Kaspersky Lab, Malwareb...


Gene Therapy for Blindness May Soon Be Reality "IndyWatch Feed Tech"

The success of a novel gene therapy for blindness caused by a genetic mutation paves the way for gene therapies which treat other forms of blindness as well as genetic therapies which treat other diseases.

After being treated with a novel gene therapy for blindness, patients who had lost their sight due to a genetic retinal disease could see well enough to navigate a maze, according to research presented today at the 2017 Annual Meeting of the American Academy of Ophthalmology (AAO 2017).

Novel Gene Therapy for Blindness

Patients in the study had a form of blindness called Leber congenital amaurosis (LCA), an inherited degenerative retinal disease characterized by severe loss of vision at birth. This novel gene therapy for blindness is currently under review by the FDA for potential approval. There are no other FDA-approved treatments available for inherited retinal diseases.


Can We Rejuvenate Our Bodies with HGH Boosting Gene Therapy? "IndyWatch Feed Tech"

Can growth hormone (HGH) boosting gene therapy rejuvenate our bodies without side effects? One man has already started self-experimenting with a novel gene therapy to boost his flagging levels of HGH.

Summary: HGH (human growth hormone) promises to be easily boosted by plasmid-based gene therapy. Moreover, implanting cells which generate growth hormone releasing hormone (GHRH) mimics the bodies natural processes of producing HGH and thus may rejuvenate our bodies without side effects. One man is already self-experimenting and using gene therapy to boost his flagging HGH levels. This article first appeared on Follow us on Google+ | Facebook | Reddit. Author: Brady Hartman.

Can human growth hormone (HGH) boosting gene therapy rejuvenate our bodies without side effects?

One man certainly thinks so and has already started experimenting using a novel method to boost his flagging levels of growth hormone.


Fix Host IP is blocked because of many connection errors on MySQL/MariaDB "IndyWatch Feed Tech"

I am trying to login to my mysql/mysqld server using the following Unix command: $ mysql -u foo -h -p dbnmame But greeted with the following error on screen: ERROR 1129 (HY000): Host '' is blocked because of many connection errors; unblock with 'mysqladmin flush-hosts' How do I fix this problem on a Linux or Unix-like system?


[SECURITY] New security advisory CVE-2017-12633 released for Apache Camel "IndyWatch Feed Tech"

Posted by Andrea Cosentino on Nov 15

A new security advisory has been released for Apache Camel, that is fixed in
the recent 2.19.4 and 2.20.1 releases:

CVE-2017-12633: Apache Camel's Hessian unmarshalling operation is vulnerable to Remote Code Execution attacks

The full text of the advisory is the following:

CVE-2017-12633: Apache Camel's Hessian unmarshalling operation is vulnerable to Remote Code Execution attacks

Severity: MEDIUM

Vendor: The Apache Software...


[SECURITY] New security advisory CVE-2017-12634 released for Apache Camel "IndyWatch Feed Tech"

Posted by Andrea Cosentino on Nov 15

A new security advisory has been released for Apache Camel, that is fixed in
the recent 2.19.4 and 2.20.1 releases:

CVE-2017-12634: Apache Camel's Castor unmarshalling operation is vulnerableto Remote Code Execution attacks

The full text of the advisory is the following:

CVE-2017-12634: Apache Camel's Castor unmarshalling operation is vulnerable to Remote Code Execution attacks 

Severity: MEDIUM

Vendor: The Apache Software...


Bill Gates Invests $80 Million in Arizona "Smart City" "IndyWatch Feed Tech"

Bill Gates is Buying Land in Arizona to Build a "Smart City"

An investment firm run by Bill Gates has put down $80 million to develop a planned community in Arizona. The 25,000 acres of land is about 45 minutes west of Phoenix, in an area called the West Valley. The community, which Gates wants to turn into a "smart city," will be named Belmont.

"Belmont will create a forward-thinking community with a communication and infrastructure spine that embraces cutting-edge technology, designed around high-speed digital networks, data centers, new manufacturing technologies and distribution models, autonomous vehicles and autonomous logistics hubs," Belmont Partners, the Arizona real state investment company involved in the deal, said in a news release.

The proposed freeway I-11, which would connect the Belmont area to Las Vegas, makes the land an ideal spot for a new community, according to Ronald Schott, the executive emeritus at the Arizona Technology Council. Of the 25,000 acres, 3,800 will be used for office, retail, and commercial space. Another 470 acres will be used for public schools. That leaves enough space for 80,000 residential units.

Also at TheUSBPort, Fossbytes, CNET, and Real Estate Daily News.

Original Submission #1   Original Submission #2

Read more of this story at SoylentNews.


Mobile devices present a significant risk for GDPR noncompliance "IndyWatch Feed Tech"

Accessing data from mobile devices presents a significant risk for GDPR noncompliance, according to Lookout. 84 percent of U.S. security and IT executives agree that personal data accessed on employees mobile devices could put their company at risk for GDPR noncompliance. In fact, 64 percent of U.S. employees say they do access their organizations customer, partner and employee data while on their mobile device. As organizations increasingly rely on mobile devices, the amount of personal More


Cisco Training Courses: Prepare for CCNA, CCNP Networking Certifications "IndyWatch Feed Tech"

As governments and enterprises migrate toward controller-based architectures, the role of a core network engineer are evolving and more important than ever. There is a growing number of jobs in Networking, but if you lack behind, you need to pass some certification exams to enter into this industry and get a significant boost in your IT career. If you are looking forward to making career


How VoIP could take your businesss efficiency to a whole new level "IndyWatch Feed Tech"

A few years ago, we all marvelled at the idea of Apples very clever iMessage system that allowed us to send text messages via the internet rather than using a cellular network. Granted, its only truly a viable feature of the iPhone when youre hooked up to Wi-Fi but still it was a great, unique idea Wasnt it?

Well, actually, no it was not unique as we have had access to internet based communication for years you just hadnt heard of it or didnt think it was worth investing in at the time.

Voiceover Internet Protocol (or VoIP for short) is essentially a communication tool that uses an internet connection to relay the content instead of a complex wiring system that can take days to install and will forever require maintenance, upgrading, rehashing etc essentially, its far simpler but could it help your business? Could it be that important?

The most common VoIP devices are phones and fax machines that connect to the nearest computer with access to the internet or a specific network sounds simple enough. Calls, messages and documents can all be sent via the networked device and all information relating to the communications is stored on a secure server still sounding relatively simple.

To add a layer of complexity, we have now reached a technological level that allows us to carry out Cloud Calling. This is basically calling someone via the network/internet using a similar system to Skype or Facetime so how could it help your business?

VoIP could take your businesss efficiency to a whole new level thanks to its superb flexibility. As an example, if a key staff member is absent from work; the member of staff handling their work could be assigned their Cloud Phone Number without the need to arrange for tricky call forwarding or re-routing a phone line temporarily far more practical.

In addition, as communication data is recorded and stored, it makes it far easier to trace back conversations  than ever before. If youve ever worked in an office environment, youll know it can be very difficult to trace back who said what at any given time or during a meeting not a problem any longer.

Of course, Cloud VoIP is different to the standard VoIP system but they...


Venezuela Defaults on Foreign Debt Repayments "IndyWatch Feed Tech"

Via: Radio New Zealand: The ratings agency said the South American nation had failed to make $200m in repayments on its foreign debt. Venezuelas state-run oil company PDVSA has also been declared in default by rating agencies Fitch and Moodys. The news came just hours after the government met investors in Caracas to try to []


Patent Trial and Appeal Board (PTAB) Defended by Technology Giants, by Small Companies, by US Congress and by Judges, So Why Does USPTO Make It Less Accessible? "IndyWatch Feed Tech"

Its not like the Patent Office desperately needs more money (theres excess)

United States Patent and Trademark Office
Reference: United States Patent and Trademark Office at Wikipedia

Summary: In spite of the popularity of PTAB and the growing need/demand for it, the US patent system is apparently determined to help it discriminate against poor petitioners (who probably need PTAB the most)

LAST week the US government dealt with a serious issue we had been writing about for a number of months. CCIA, as it turns out, submitted a letter to the House Judiciary Subcommittee On IP [sic] and yesterday wrote this post:

Yesterday, we submitted a letter for the record to the House Judiciary Committee Subcommittee On Courts, Intellectual Property and the Internet. This letter, written in response to testimony submitted for the Subcommittees hearing on Sovereign Immunity and IP, provides the details of our analysis of the patents which Josh Malone and Phil Johnson identified as showing a disagreement on validity between the PTAB and federal courts. In contrast to their allegation of 200 patents, the real figure is far lower. Of the 3,056 patents reviewed by the PTAB which were also at issue in litigation in federal district courts, there are 43 cases (just over 1%) in which the PTAB and a district court have disagreed with one another.



The data, when correctly understood, shows that the PTAB only rarely disagrees with the federal courts when both review the validity of the same patent. The data also shows that the two venues only rarely review the validity of the same patent. We believe the Subcommittees work will benefit from this understanding of the extreme infrequency with which the PTAB and a district court reach different conclusions.

Additionally, based on information that William New wrote about...


Is the healthcare industry prepared to combat evolving cyber threats? "IndyWatch Feed Tech"

One in four UK healthcare IT professionals arent confident in their organisations ability to respond to cyberattacks, according to Infoblox. Technology is booming in healthcare organisations with digital transformation policies leading to increased adoption of connected medical devices, big data analytics for faster and more accurate diagnoses, and paperless systems for the easy exchange of patient information. As technology becomes more ingrained into core healthcare offerings, there is an increased threat of cyberattacks disrupting services, More


17-Year-Old MS Office flaw CVE-2017-11882 could be exploited to remotely install malware without victim interaction "IndyWatch Feed Tech"

Ops, a 17-Year-Old flaw in MS Office, tracked as CVE-2017-11882, could be exploited by remote attackers to install a malware without user interaction.

Ops, a 17-Year-Old vulnerability in MS Office could be exploited by remote attackers to install a malware without user interaction.
The flaw is a memory-corruption issue that affects all versions of Microsoft Office released in the past 17 years, including the latest Microsoft Office 365. The vulnerability could be triggered on all versions of Windows operating system, including the latest Microsoft Windows 10 Creators Update.

The vulnerability, tracked as CVE-2017-11882, was discovered by the security researchers at Embedi, it affects the MS Office component EQNEDT32.EXE that is responsible for insertion and editing of equations (OLE objects) in documents.

The component fails to properly handle objects in the memory, a bug that could be exploited by the attacker to execute malicious code in the context of the logged-in user.

The EQNEDT32.EXE component was introduced in Microsoft Office 2000 seventeen years ago and affects Microsoft Office 2007 and later because the component was maintained to maintain the backward compatibility.


The attacker can gain full control on the target system by chaining the vulnerability with Windows Kernel privilege escalation exploits like CVE-2017-11847.

Researcher at Embedi researchers described several attack scenarios :

By inserting several OLEs that exploited the described vulnerability, it...


Why and How to Set an Open Source Strategy "IndyWatch Feed Tech"

Open source projects are generally started as a way to scratch ones itch  and frankly thats one of its greatest attributes. Getting code down provides a tangible method to express an idea, showcase a need, and solve a problem. It avoids over thinking and getting a project stuck in analysis-paralysis, letting the project pragmatically solve the problem at hand.


Forever 21 Warns Shoppers of Payment Card Breach at Some Stores "IndyWatch Feed Tech"

Another day, another data breach. This time a fast-fashion retailer has fallen victim to payment card breach. American clothes retailer Forever 21 announced on Tuesday that the company had suffered a security breach that allowed unknown hackers to gain unauthorized access to data from payment cards used at a number of its retail locations. The Los Angeles based company, which operates over


Homebrew SNES Mini Aims for Historical Accuracy "IndyWatch Feed Tech"

While normies are out fighting in the aisles of Walmart to snap up one of the official Classic Mini consoles that Nintendo lets slip out onto the market every once and awhile, hackers have been perfecting their own miniature versions of these classic gaming systems. The Classic Mini line is admittedly a very cool way to capitalize on nostalgic masses who have now found themselves at the age where they have disposable income, but the value proposition is kind of weak. Rather than being stuck with the handful of generation-limited games that Nintendo packed into the official products, these homebrew consoles can play thousands of ROMs from systems that stretch across multiple generations and manufacturers.

But for those old enough to remember playing on one of these systems when they first came out, these modern reincarnations always lack a certain something. It never feels quite right. That vaguely uncomfortable feeling is exactly what [ElBartoME] is aiming to eliminate with his very slick miniature SNES build. His 3D printed case doesnt just nail the aesthetics of the original (PAL) console, but the system also uses real SNES controllers in addition to NFC cartridges to load different ROMs.

The projects page on Thingiverse has all the wiring diagrams and kernel configuration info to get the internal Raspberry Pi 3 to read an origi...

Canonical Is Hiring Graphics Stack Developers To Work On Mir "IndyWatch Feed Tech"

While it was only months ago that Canonical let go of several Mir developers at the same time as other staff reductions for the Unity team and different areas as the company changed their focus, they are now looking for new Mir hires...


CVE-2017-15115: Linux kernel: sctp: use-after-free in sctp_cmp_addr_exact() "IndyWatch Feed Tech"

Posted by Vladis Dronov on Nov 15


It was found that in Linux kernel when peeling off an association to the socket
in another network namespace, all transports in this association are not to be
rehashed and keep use the old key in hashtable. A kernel would miss removing
transports from hashtable when closing the socket and all transports are being
freed. Later on a use-after-free could be caused when looking up an association
and dereferencing the transports.

This is a...


Ross 128 b: A Temperate Planet? "IndyWatch Feed Tech"

At 10.89 light years from Earth, Ross 128 is the twelfth closest star to the Solar System, a red dwarf (M4V) first cataloged in 1926 by astronomer Frank Elmore Ross. Now we have news that a team working with the European Southern Observatorys HARPS spectrograph (High Accuracy Radial velocity Planet Searcher) at the La Silla Observatory in Chile has discovered an Earth-sized planet orbiting Ross 128 every 9.9 days, a world whose orbit could conceivably place it in the habitable zone, where liquid water could exist on the surface. That gives us a second nearby world in an interesting orbit, the other of course being Proxima Centauri b.

What gives the Ross 128 b detection a wrinkle of astrobiological interest is that the star the planet orbits is relatively inactive. Red dwarfs are known for the flares that can flood nearby planets with ultraviolet and X-ray radiation. Compounded with the fact that habitable zone planets must orbit quite close to a parent M-dwarf (given the stars small size and low temperature compared to the Sun), such flares could act as a brake on the development of life.

Ross 128 b may thus have a higher likelihood for astrobiological activity than Proxima b, assuming that it actually is in the habitable zone. Right now the team behind this work, led by Xavier Bonfils (Universit Grenoble Alpes) hedges its bets by referring to the planet as temperate and close to the inner edge of the conventional habitable zone.

Image: This artists impression shows the temperate planet Ross 128 b, with its red dwarf parent star in the background. This planet, which lies only 11 light-years from Earth, was found by a team using ESOs unique planet-hunting HARPS instrument. The new world is now the second-closest temperate planet to be detected after Proxima b. It is also the closest planet to be discovered orbiting an inactive red dwarf star, which may increase the likelihood that this planet could potentially sustain life. Ross 128 b will be a prime target for ESOs Extremely Large Telescope, which will be able to search for biomarkers in the planets atmosphere. Credit: ESO/M. Kornmesser.

Lets dig into habitability a bit more. Ross 128 is a star with about half the surface temperature of the Sun. The newly discovered planet orbits it some twenty times closer than the Earth to the Sun, while receiving 1.38 times the irradiation the Earth receives. The researchers derive an equilibrium temperature between -60 and 20C, eq...


Hypothetical White Holes Could Link us to Different Universes "IndyWatch Feed Tech"

Black holes everyone knows that they exist, but nobody really knows what they are exactly.

A lot of laws of physics seem to be ignored or omitted when it comes to black holes, so there always seems to be a missing link when it comes to understanding how they work.



Declines in Patent Quality at the EPO and Independent Judges Can No Longer Say a Thing "IndyWatch Feed Tech"

They do, however, complain about their loss of independence

A shocked Battistelli

Summary: The EPOs troubling race to the bottom (of patent quality) concerns the staff examiners and the judges, but they cannot speak about it without facing rather severe consequences

THE EPO, wrongly and arrogantly assuming that the UPC will materialise, is already making judges inside the EPO redundant or subservient. Even in defiance of the EPC. This is extremely serious as its a removal of oversight.

Several years ago we said that the EPO had done that (in late 2014) in order to gag those who speak about patent quality and can do so without fear of retribution. Quality [of patents at the EPO] has dropped drastically the last 3 or 4 years, one person wrote yesterday*. Ever since then, for obvious reasons, we have seen no dissenting judges (except retired ones). They self-censor, just like staff representatives do (consciously or subconsciously). EPO insiders already know what it means for EPO management to send judges to Haar (a symbolic act) and then try to invite chairs to actually celebrate this. Thankfully, most chairs are snubbing and declining this invitation.

Deep inside, EPO staff representatives dont really believe much will change when Battistelli leaves. They just give Campinos the benefit of the doubt and act diplomatically. To quote a key paragraph (and the only one which contains new information of any kind in this article):

A source cl...


Department of Homeland Security Terror Bulletin Warns of "Weaponized Drones" "IndyWatch Feed Tech"

Homeland Security bulletin warns of weaponized drones and threat to aviation

The Department of Homeland Security (DHS) issued an updated terror bulletin on Thursday highlighting the threat of weaponized drones, chemical attacks and the continued targeting of commercial aircraft.

"We continue to face one of the most challenging threat environments since 9/11, as foreign terrorist organizations exploit the internet to inspire, enable or direct individuals already here in the homeland to commit terrorist acts," reads the bulletin.

[...] "The current bulletin introduces unmanned aircraft systems as potential threats and highlights sustained concern regarding threats against commercial aviation and air cargo," said DHS acting press secretary Tyler Houlton in a statement.

There's been an "uptick in terrorist interest" in using unmanned aerial systems as weapons in the United States and other western countries, according to a senior DHS official. These tactics have been used by terrorists on the battlefield, and the department wants to "guard against those tactics being exported to the west," said the official. The official said that DHS wants to be "forward leaning" about seeing what terrorists are doing overseas and tactics they might adopt in the future.

Since the last bulletin, concerns about terrorist targeting aviation sector have grown, said the official. "[T]errorists continue to target commercial aviation and air cargo, including with concealed explosives," reads the updated bulletin.

Related: UK Criminals Use Drones To Case Burglary Targets
Drones Banned from Flying Within 32 Miles of Super Bowl
FAA Updates its Ban on Drones in Washington
Prison Blames Drone for Inmate's Escape
FAA Restricts Drone Operations Over 10 U.S. Landmarks

Original Submission

Read more of this s...


Linux Totally Dominates Supercomputers "IndyWatch Feed Tech"

Linux rules supercomputing. This day has been coming since 1998, when Linux first appeared on the TOP500 Supercomputer list. Today it finally happened: All 500 of the world's fastest supercomputers are running Linux.

The last two non-Linux systems, a pair of Chinese IBM POWER computers running AIX, dropped off the November 2017 TOP500 Supercomputer list. ...


New Touchpad & Touchscreen Support, Better Dell Canvas Support In Linux 4.15 "IndyWatch Feed Tech"

The HID and input pull requests have been submitted for the Linux 4.15 kernel merge window...


US Government issues alert about North Korean "Hidden Cobra" cyber attacks "IndyWatch Feed Tech"

The FBI and US Department of Homeland Security have issued an alert that hackers have targeted the aerospace industry, financial services and critical infrastructure with a remote access trojan (RAT) to further exploit vulnerable networks.

Read more in my article for the Hot for Security blog.


Using bots to scam the scammers "IndyWatch Feed Tech"

Using bots to scam the scammers

A new bot takes the work out of fighting back against the scammers.

Bob Covello reports.


Epiphany 3.27.2 Improves GNOME Web Apps, Firefox Sync "IndyWatch Feed Tech"

Epiphany 3.27.2 is now available as the latest web browser release in the road to next year's GNOME 3.28 desktop...


The EPO is Now Corrupting Academia, Wasting Stakeholders Money Lying to Stakeholders About the Unitary Patent (UPC) "IndyWatch Feed Tech"

UPC boat

Summary: The Unified Patent Court/Unitary Patent (UPC) is a dying project and the EPO, seeing that it is going nowhere fast, has resorted to new tactics and these tactics cost a lot of money (at the expense of those who are being lied to)

NOT a day goes by without some EPO scandal (large or small). Its like watching the action on the deck of the Titanic while worrying for the fate of helpless passengers aboard.

Those so-called studies published by the EPO are mendacious speak totally worthless
Yesterday, as noted by Benjamin Henrion (FFII), the EPO wrote: New report finds that the #UnitaryPatent could significantly enhance technology transfer in the EU. Other findings here

Ive asked them: New report or new lies?

Henrion responded by saying enhance patent litigation in the EU.

Because it has nothing to do with technology transfer whatever exactly that means (it usually gets used as a euphemism for licensing, amicable of coerced for).

they actually do the opposite by suppressing permanent employment for new recruits from 1st January 2018 at the EPO. The impact on patent quality will be huge. But still, Battistelli prefers burning money by producing pro-UPC lies!
Funnily enough, the EPO has once again linked to localhost:8080 in its official news feed (RSS) an issue which they only fixed later in the day and several days too late. Are any competent workers left at the EPO? They appear to have misconfigured their software. Did some key IT staff leave? Either way, the news at hand (warning: link) says the report was carried out by a team of economists from the EPO, the University of Colorado Boulder and the London School of Economics

They did that for a fee, or with direct support from the EPO. The chief economist of the EPO seems like an old French mate of Battistelli and we have repeatedly caught him lying about the UPC.

What we see here is the EPO basically wasting a lot of money. Its payi...


QEMU 2.11-RC1 Released: Drops IA64, Adds OpenRISC SMP & More "IndyWatch Feed Tech"

QEMU 2.11-RC1 is available for this important piece of the open-source Linux virtualization stack...


VC4 & VC5 Drivers Get More Fixes Ahead Of The Holidays "IndyWatch Feed Tech"

Eric Anholt at Broadcom has continued his spree of bringing up the next-gen VC5 Linux graphics driver stack while also continuing to maintain and improve upon the VC4 driver most commonly associated as being the open-source GPU driver option for the Raspberry Pi...


How to Monitor the SRE Golden Signals "IndyWatch Feed Tech"

Site Reliability Engineering (SRE) and related concepts are very popular lately, in part due to the famous Google SRE book and others talking about the Golden Signals that you should be monitoring to keep your systems fast and reliable as they scale.

Everyone seems to agree these signals are important, but how do you actually monitor them? No one seems to talk much about this.


Why This New Quantum Computing Startup Has a Real Shot at Beating Its Competition "IndyWatch Feed Tech"

A startup called Quantum Circuits plans to compete with the likes of IBM, Google, Microsoft, and Intel to bring quantum computing out of the lab and into the wider world. Theres one good reason to think it might be able to beat them all.

Thats because Quantum Circuits was founded by Robert Schoelkopf, a professor at Yale, whose work in many ways has helped kick-start this exciting new era of quantum advances.

Quantum computers exploit two strange features of quantum physics, entanglement and superposition, to process information in a fundamentally different way from traditional computers. The approach allows the power of such machines to scale dramatically with even just a few quantum bits, or qubits. Those racing to build practical quantum computers are nearing the point where quantum machines will be capable of doing things that no conventional machine couldan inflection point known as quantum supremacy.


BCache Gets New Maintainer, NVMe Improvements & More For Linux 4.15 "IndyWatch Feed Tech"

The changes to the MD RAID and block areas of the Linux kernel have been submitted for the 4.15 cycle...


Patch Tuesday: Microsoft Releases Update to Fix 53 Vulnerabilities "IndyWatch Feed Tech"

It's Patch Tuesdaytime to update your Windows devices. Microsoft has released a large batch of security updates as part of its November Patch Tuesday in order to fix a total of 53 new security vulnerabilities in various Windows products, 19 of which rated as critical, 31 important and 3 moderate. The vulnerabilities impact the Windows OS, Microsoft Office, Microsoft Edge, Internet Explorer,


Apple Watch Could be Used to Detect Hypertension and Sleep Apnea "IndyWatch Feed Tech"

A study suggests that the Apple Watch could be used to detect hypertension and sleep apnea in users:

A new study out from health startup Cardiogram and the University of California San Francisco (UCSF) suggests wearables like the Apple Watch, Fitbit and others are able to accurately detect common but serious conditions like hypertension and sleep apnea.

Cardiogram and UCSF previously demonstrated the ability for the Apple Watch to detect abnormal heart rhythm with a 97 percent accuracy. This new study shows the Watch can detect sleep apnea with a 90 percent accuracy and hypertension with an 82 percent accuracy.

Sleep apnea affects an estimated 22 million adults in the U.S., with another 80 percent of cases of moderate and severe obstructive sleep apnea undiagnosed, according to the American Sleep Apnea Association. This is a serious condition where the person affected stops breathing in their sleep and can lead to death.

Another 75 million American adults have high blood pressure (hypertension), according to the Centers for Disease Control (CDC), putting them at risk for heart disease and stroke, the top causes of death in the United States.

Cardiovascular Risk Stratification Using Off-the-Shelf Wearables and a Multi-Task Deep Learning Algorithm (DOI unknown)

Previously: Apple's Watch Can Detect an Abnormal Heart Rhythm With 97% Accuracy, UCSF Study Says

Original Submission

Read more of this story at SoylentNews.


Richest 1% own half the worlds wealth, study finds "IndyWatch Feed Tech"

The worlds richest people have seen their share of the globes total wealth increase from 42.5% at the height of the 2008 financial crisis to 50.1% in 2017, or $140tn (106tn), according to Credit Suisses global wealth report published on Tuesday.

At the other end of the spectrum, the worlds 3.5 billion poorest adults each have assets of less than $10,000 (7,600). Collectively these people, who account for 70% of the worlds working age population, account for just 2.7% of global wealth.

Credit Suisse report highlights increasing gap between the super-rich and the remainder of the globes population.


Swedish Data Authority Investigates Piracy Settlement Letters "IndyWatch Feed Tech"

Companies that aim to turn piracy into profit have been in existence for more than a decade but still the controversy around their practices continues.

Most, known colloquially as copyright trolls, monitor peer-to-peer networks such as BitTorrent, collecting IP addresses and other data in order to home in on a particular Internet account. From there, ISPs are sued to hand over that particular subscribers personal details. Once theyre obtained, the pressure begins.

At this point, trolls are in direct contact with the public, usually by letter. Their tone is almost always semi-aggressive, warning account holders that their actions are undermining entire industries. However, as if by magic, all the harm can be undone if they pay up few hundred dollars, euros, or pounds quickly.

Thats the case in Sweden, where law firm Njord Law is representing the well-known international copyright trolls behind the movies CELL, IT, London Has Fallen, Mechanic: Resurrection, Criminal, and September of Shiraz.

Have you, or other people with access to the aforementioned IP address, such as children living at home, viewed or tried to watch [a pirate movie] at the specified time? Njord Law now writes in its letters to alleged pirates.

If so, the case can be terminated by paying 4,500 SEK [$550].

Its clear that the companies involved are diving directly for cash. Indeed, letter recipients are told they have just two weeks to pay up or face further issues. The big question now is whether these demands are permissible under law, not necessarily from a copyright angle but due to the way they are presented to the alleged pirates.

The Swedish Data Protection Authority (Datainspektionen) is a public authority tasked with protecting the privacy of the individual in the information society. Swedish Radio reports that it has received several complaints from Swedes who have received cash demands and as a result is investigating whether the letters are legal.

As a result, the authority now has to determine whether the letters can be regarded as a debt collection measure. If so, they will have to comply with special laws and would also require special permission.

They have not classified this as a debt collection fee, but it is not that element that is crucial. A debt collection measure is determined by whether there is any kind o...


Three Steps to Blend Cloud and Edge Computing on IoT "IndyWatch Feed Tech"

For years, companies have relied on systems that compute and control from a relatively central location. Even cloud-based systems rely on a single set of software components that churn through data, gather results and serve them back.

The internet of things changes that dynamic. Suddenly, thousands of devices are sharing data, talking to other systems and offering control to thousands of endpoints.


10-year-old kid succeeds in unlocking his mum's iPhone X, with just a glance "IndyWatch Feed Tech"

Is Apple's Face ID really as secure as we're told?

Read more in my article on the Hot for Security blog.


Automated Chamber Passes Just the Right Gas "IndyWatch Feed Tech"

It sounds like an overly complicated method a supervillain would use to slowly and painfully eliminate enemies a chamber with variable oxygen concentration. This automated environmental chamber isnt for torturing suave MI6 agents, though; rather, it enables cancer research more-or-less on the cheap.

Tasked with building something to let his lab simulate the variable oxygen microenvironments found in some kinds of tumors, [RyanM415] first chose a standard lab incubator as a chamber to mix room air with bottled nitrogen. With a requirement to quickly vary the oxygen concentration from the normal 21% down to zero, he found that the large incubator took far too long to equilibrate, and so he switched to a small acrylic box. Equipped with a mixing fan, the smaller chamber quickly adjusts to setpoints, with an oxygen sensor providing feedback and controlling the gas valves via a pair of Arduinos. Its quite a contraption, with floating ball flowmeters and stepper-actuated variable gas valves, but the results are impressive. If it werent for the $2000 oxygen sensor, [RyanM145] would have brought the whole project in for $500, but at least the lab can use the sensor elsewhere.

Modern biology and chemistry labs are target-rich environments for hacked instrumentation. From DIY incubators to cheap electrophoresis rigs, weve got you covered.

Filed under: chemistry hacks


US DHS and FBI share reports on FALLCHILL and Volgmer malware used by North Korean Hidden Cobra APT "IndyWatch Feed Tech"

US DHS published the details of the malware FALLCHILL and Volgmer used by the APT group Hidden Cobra that is linked to the North Korean government.

The US Department of Homeland Security (DHS) published the details of the hacking tool FALLCHILL used one of the APT group linked to the North Korean government tracked as Hidden Cobra (aka Lazarus Group).

The activity of the Lazarus Group surged in 2014 and 2015, its members used mostly custom-tailored malware in their attacks and experts that investigated on the crew consider it highly sophisticated.

This threat actor has been active since at least 2009, possibly as early as 2007, and it was involved in both cyber espionage campaigns and sabotage activities aimed to destroy data and disrupt systems.  Security researchers discovered that North Korean Lazarus APT group was behind recent attacks on banks, including the Bangladesh cyber heist.

According to security experts, the group was behind, other large-scale cyber espionage campaigns against targets worldwide, including the Troy Operation, the DarkSeoul Operation, and the Sony Picture hack.

In June, the United States Computer Emergency Readiness Team (US-CERT) issued a technical alert about the activity of the North Koreas Hidden Cobra APT group.

Many experts believe the WannaCry ransomware was developed by the Lazarus Group due to similarities in the attack codes. UK Government also linked the WannaCry attack that crippled NHS to North Korea.

The DHS and FBI issued a joint alert that reveals a remote administration tool (RAT) known as FALLCHILL was used by the North Korean hackers to target companies in the aerospace, finance, and telecommunications sectors.

Working with U.S. government partners, DHS and FBI identified Internet Protocol (IP) addresses and other...


For The First Time Ever Scientists Have Boosted Human Memory With a Brain Implant "IndyWatch Feed Tech"

With everyone from Elon Musk to MIT to the US Department of Defense researching brain implants, it seems only a matter of time before such devices are ready to help humans extend their natural capabilities.

Now, a professor from the University of Southern California (USC) has demonstrated the use of a brain implant to improve the human memory, and the device could have major implications for the treatment of one of the USs deadliest diseases.

Dong Song is a research associate professor of biomedical engineering at USC, and he recently presented his findings on a memory prosthesis during a meeting of the Society for Neuroscience in Washington D.C. According to a New Scientist report, the device is the first to effectively improve the human memory.


Star Wars Game in U-Turn After Player Anger "IndyWatch Feed Tech"

Games publisher EA has changed a rule in its Star Wars Battlefront II video game after a huge backlash.

During the game, players have to obtain credits - either by buying them or through long hours of game play - to unlock popular characters including Luke Skywalker and Darth Vader.

Many players said it was unfair as the gaming required worked out at around 40 hours per character, unless they paid.

EA says the number of credits required will now be reduced by 75%.

"Unlocking a hero is a great accomplishment in the game, something we want players to have fun earning," said executive producer John Wasilczyk from the developer Dice, in a statement.

Maybe EA should spend less time withholding heros from players and more time helping players find the hero within.

Original Submission

Read more of this story at SoylentNews.


How to Install Firefox Quantum in Linux "IndyWatch Feed Tech"

How to Install Firefox Quantum in Linux


The Moons City and Towers "IndyWatch Feed Tech"

It goes almost without saying that the unique nature of the moon as a tool for Terraforming Earth, and humanities prior high civilization prior to the Pleistocene Nonconformity 12950 BP makes a physical presence a near certainty.  It also makes a continuing presence an equal certainty, just as deep underground facilities surely exist on Earth itself.

Thus a sustained effort to collate surface data should be fruitful although most should be underground.  They certainly will not be hiding anything from the likes of us.

The assumption is made that much of what is seen is abandoned.  Why?  The whole purpose of surface hardware is to protect life.  Once built, it is easily sustained and even maintained.  The huge scales involved merely reflects the low gravity.  Space frames  covering a square mile is plausible and huge inflated domes as well. 

The Moons City and Towers

The average person will be surprised to learn that there are huge structures on the Moon that appear to be quite old. The photographs certainly suggest an ancient advanced civilization and an attempt to keep it sec...


Mainstream admits Food quality major Cancer source "IndyWatch Feed Tech"

 It took essentially three generations for the industrial agricultural paradigm to replace our traditional system.  That traditional system also had ample faults but high quality mostly overcame all that.  Now we have real product issues been lied about and deteriorating global health responses.

The successor paradigm has begun to take hold and will prevail.  It includes organics, bio cbhar for nutrient retention and robot support.

That paradigm will ultimately support  100 million on hte earth's surface.


October 30, 2017

Alex Pietrowski, Staff Writer

For years it has been a supposed mystery, but it is finally being acknowledged that a primary cause of cancer in the world today is diet. Studies are now showing that obesity plays an enormous role in ones chances of getting cancer, and the main cause of obesity is the type of foods people eat. It is in large part a lifestyle disease, and the most important relevant lifestyle choice is food.

Overall, we estimated that 40.8% of incident cancer cases were attributable to exposure to the 24 factors included in the analysis (Table 2). Tobacco smoking was responsible for the greatest cancer burden, accounting for an estimated 15.7% of all incident cancer cases (2485 cases), followed by physical inactivity and excess body weight, which were responsible for an estimated 7.2% and 4.3% of incident cancer cases, respectively. All other exposures of interest were estimated to be responsible for less than 4.0% of incident cancer cases each. [Source]

More specifically, researchers are pointing out the connection between the bodys insulin response to foo...


Yellowstone Volcano "IndyWatch Feed Tech"

I think we need to put this on a serious watch.  If we are going into an eruption phase it appears that it can occur in several locations and with the ground heaving we are already close to collapses that opens major calderas.

Massive gas leaks are also indicated and any movement at elevations close to hot spots should be with an mask and  oxygen tank.  This cycle is likely limited to one serious open caldera spewing alot of ash before it all settles back down.

Not the time to buy a nearby cattle ranch or to enterthose dead zones either.

Yellowstone Volcano 

Yellowstone is worse than we thought. The h...


6 Radical Shifts in society being Normalized by NWO "IndyWatch Feed Tech"

Certainly intent has been shown.  Sustainability far less so.  It is after all the eternal propagation of evil.

The counter movement is steadily building and will wash all this away and establish a internally organized civilization around the concept of a natural community and the eternal elimination of poverty.

The same counter movement will also wash away Islam as presently understood..



October 30, 2017

Sigmund Fraud, Staff Writer

Waking Times

The New World Order has evolved into the unspoken of finish line that anyone in power strives for. It is not a particular group any longer, per se, but rather the supreme idea that total centralization of power is the forgone conclusion for the people of the earth.

I dont think its right to frame the New World Order as necessarily a policy or group. I think its more part of an ideology of globalism that has been explicitly articulated in various ways by various people who are linked, but not always directly like we might think. ~James Corbett

To manifest an idea as big as this for the entire world requires sweeping changes to how people live, what they believe, what they value, and how they interact with each other. It is, in essence, a cultural revolution. This is being accompli...


The Hidden Science and Tech of the Byzantine Empire - Facts So Romantic "IndyWatch Feed Tech"

Byzantine military inventors perfected Greek Fire, a combustible liquid like napalm that could be hurled at enemy ships (or lobbed against land armies as hand grenades).Madrid Skylitzes (12th century) / Wikicommons

Byzantine civilization, the eastern Roman empire whose capital was at Constantinople, is mostly known today for its spirituality and eccentricities, including the spectacular church of Hagia Sophia (a feat of Roman engineering), glittering mosaics, sombre but colorful icons, ambitious bishops, bizarre holy men, intriguing eunuchs, and the massive amounts of gold that its emperors had at their disposal before western Crusaders and then the Turks destroyed the empire in 1453 A.D. This romantic image has long catered to western audiences and markets alongside the pejorative (and unfair) usage of Byzantine, for unnecessarily complicated systems that work through intrigue, evasion of responsibility, obfuscation, and backstabbing.

Philoponos rarely receives credit for this breakthrough, made over one thousand years before Galileo.

In reality, Byzantium was also a pragmatic and down-to-earth cultureit developed sophisticated systems for taxation, justice, administration, and military deploymentand it also exhibited prowess in science and technology. My new book, A Cabinet of Byzantine Curiosities: Strange Tales and Surprising Facts from Historys Most Orthodox Empire, aims to capture this side
Read More


PoliceOne - 709,926 breached accounts "IndyWatch Feed Tech"

In February 2017, the law enforcement website PoliceOne confirmed they'd suffered a data breach. The breach contained over 700k accounts which appeared for sale by a data broker and included email and IP addresses, usernames and salted MD5 password hashes. The file the data was contained in indicated the original breach dated back to July 2014.


This Weekend: Vintage Computer Festival Zurich "IndyWatch Feed Tech"

This weekend, November 18th and 19th, the greatest vintage computer conference in Europe is going down. Its the Vintage Computer Festival Europe, and if youre around Zurich this weekend, we highly recommend that you check it out.

On deck for this years VCF Europe is an incredible amount of amazing retrotechnology. A demonstration of high-resolution graphics without using computer memory will be found in a few Tektronix storage tube terminals (their Wikipedia entry is phenomenal, by the way). There will be a few Olivetti microcomputers on display demonstrating Italys contribution to the computer revolution. A PDP 6 will be recreated, and a 1964 IBM 360/30 will be revived. There will be discussions on using logarithms as a basis for computers. [Oscar], creator of the PiDP-8/I will be bringing his latest project, an exquisite miniature recreation of a PDP-11/70, with a molded enclosure and purple toggle switches.

This is a retrocomputer conference where an Apple I is the least interesting computer on display, an extremely difficult feat to pull off. VCFe will be held at Rote Fabrik in Zurich, and tickets are five units of the local currency per day. You can check out the festival on Twitter, Google+, and the main website.

Filed under: classic hacks, cons


Go to HELL, PowersHELL : Powerdown the PowerShell Attacks "IndyWatch Feed Tech"

Powerdown the PowerShell Attacks : Harnessing the power of logs to monitor the PowerShell activities

Lately, I have been working on analyzing the PowerShell attacks in my clients environment. Based on the analysis and research, I have come up with a few indicators that will help to detect the potential PowerShell attacks in your environment using windows event logs. First, we will understand how PowerShell is weaponized in the attacks that are observed in the wild and then we will look at the detection mechanism.

How PowerShell is used in the attacks

As all of us are aware that PowerShell is extremely powerful and we have seen that attackers are increasingly using PowerShell in their attack methods lately. PowerShell is a default package that comes with Microsoft Windows OS and hence it is readily available on the victim machines to exploit.

Powershell is Predominantly used as a downloader

The most prominent use of PowerShell, that is observed in the attacks in-the-wild, is to download the malicious file from the remote locations to the victim machine and execute it using commands like Start-PorcessInvoke-Item OR Invoke-Expression (-IEX) file OR downloading the content of the remote file directly in to the memory of the victim machine and execute it from there.

Two methods of that are prevalent in the live attacks



The simplest example of this method to check how it works is shown in the snapshot below. (an experiment that one can perform to check the functionality of this method by setting up a http/s server using program like Xampp )

In the example shown above, the file is downloaded to the disk as evilfile.txt at the path C:\Users\kirtar_oza\AppData\Roa...


3 Open Source Alternatives to ArcGIS Desktop "IndyWatch Feed Tech"

Looking to create a great looking map or perform analysis on geospatial data? Look no further than these open source desktop GIS tools.


Votes in 18 Nations 'Hacked' in Last Year "IndyWatch Feed Tech"

Elections in 18 separate nations were influenced by online disinformation campaigns last year, suggests research.

Independent watchdog Freedom House looked at how online discourse was influenced by governments, bots and paid opinion formers.

In total, 30 governments were actively engaged in using social media to stifle dissent, said the report.

Educating users to spot fake news and making tech firms police their networks could combat the manipulation, it said.

Hacking must explain why voters are going off-script.

Original Submission

Read more of this story at SoylentNews.


Build one, get two: CPLD and STM32 development on a single board "IndyWatch Feed Tech"

Programmable logic devices have claimed their place in the hobbyist world, with more and more projects showing up that feature either a CPLD or their bigger sibling, the FPGA. That place is rightfully earned creating your own, custom digital circuitry not only adds flexibility, but opens up a whole new world of opportunities. However, this new realm can be overwhelming and scary at the same time. A great way to ease into this is combining the programmable logic with a general purpose MCU system that you already know and are comfortable with. [Just4Fun] did just that with the CPLD Fun Board, a development board connecting an Arduino compatible STM32F103 Cortex-M3 controller to an Altera MAX II CPLD.

The PCB itself has some standard development board equipment routed to the CPLD: LEDs, buttons, a seven-segment display, and additional GPIO. The rest of the CPLDs pins are going straight to the STM32 and its SPI, I2C and UART pins. Lets say you want to create your own SPI device. With the CPLD Fun Board, you can utilize all the pre-existing libraries on the STM32 and fully focus on the programmable logic part. Better yet, every connection from MCU to CPLD has its own pin header connection to attach your favorite measurement device for debugging. And in case youre wondering yes, you can attach external hardware to those connectors by setting either MCU or CPLD pins to Hi-Z.

The downside of all this is the need for proprietary design software and a dedicated programmer for the CPLD, which sadly is the everyday reality with programmable logic devices. [Just4Fun] did a great job though writing up a detailed step-by-step tutorial about setting up the environment and getting started with the board, but there are also other tutorials on getting started with CPLDs out there, in case you crave more.

Filed under: ARM, FPGA


Links 15/11/2017: Fedora 27 Released, Linux Mint Has New Betas "IndyWatch Feed Tech"

GNOME bluefish



  • Munich has putsch against Linux [Ed: does not quote any of the other side's arguments; Microsoft played dirty to cause this. It has been well documented.]

    Once the open sauce poster-boy Munich city councils administrative and personnel committee has decided to purge Linux from its desk-top and invite Windows 10 to return by 2020.


    She said the cost of the migration will not be made public until November 23, but today about 40 percent of 30,000 users already have Windows machines.

  • My Adventure Migrating Back To Windows

    I have had linux as my primary OS for about a decade now, and primarily use Ubuntu. But with the latest release I have decided to migrate back to an OS I generally dislike, Windows 10.

  • Top 10 Linux Tools

    One of the benefits to using Linux on the desktop is that theres no shortage of tools available for it. To further illustrate this point, Im going to share what I consider to be the top 10 Linux tools.

    This collection of Linux tools helps us in two distinct ways. It serves as an int...


Intel and Micron Boost 3D XPoint Production "IndyWatch Feed Tech"

Intel and Micron will produce more 3D XPoint non-volatile memory/storage:

Intel appears confident in the future of its 3D Xpoint media and the Optane products that incorporate it. The company announced today that it's finished an expansion of the facilities at IM Flash in Lehi, Utah (a joint Intel-Micron Technologies venture) that will allow it to produce more of its high-speed, low-latency non-volatile memory. Given the introduction of the Optane SSD 900P series of drives for consumers and the increasing capacities of Optane data-center SSDs, along with the existing Optane Memory line of storage-caching accelerators, Intel will likely have no problem finding homes for the chips it produces with this additional capacity.

The facility also produces 3D NAND.

Also at Digitimes and bit-tech.

Previously: Intel Announces the Optane SSD 900P: Cheaper 3D XPoint for Desktops

Original Submission

Read more of this story at SoylentNews.


Modified protein promotes hair growth and fights ageing in mice "IndyWatch Feed Tech"

#genetherapy #protein #biology #ageing

Scientists create a chemical that can restore hair and give youthful energy, the Daily Mail reports. FOXO4-DRI, a modified protein, has been successfully used to remove broken ageing cells. However, the research thus far has only been used with mice.

This study examined cells that have stopped dividing, called senescent cells. Senescent cells are believed to be responsible for ageing, along with age related diseases such as arthritis.


LFS311 Advanced Linux System Administration and Networking "IndyWatch Feed Tech"

The need for sysadmins with advanced administration and networking skills has never been greater, and competition for people with experience is fierce. Whether you're looking for expert test prep for the Linux Foundation Certified Engineer certification, need training to help transition to Linux from other platforms, or you're just brushing up on these vital admin and networking skills, this course will teach you what you need to know.

LFD401 Developing Applications For Linux "IndyWatch Feed Tech"

Learn how to develop for and bring applications to the Linux environment. Get up to speed quickly with the necessary tools for Linux application development and learn about special features offered by Linux.

LFD430 Developing Linux Device Drivers "IndyWatch Feed Tech"

Learn how to write Linux device drivers, about the specifics of different types of devices and drivers, and learn the appropriate APIs and methods through which devices interface with the kernel.

LFD440 Linux Kernel Debugging and Security "IndyWatch Feed Tech"

Learn the methods and internal infrastructure of the Linux kernel, focussing on the important tools used for debugging and monitoring the kernel, and how security features are implemented and controlled.

LFD420 Linux Kernel Internals and Development "IndyWatch Feed Tech"

Learn the basic methods and internal infrastructure of the Linux kernel, grasping both the theoretical and practical underpinnings.

LFD450 Embedded Linux Development "IndyWatch Feed Tech"

Get advanced Linux training on the key steps to developing an embedded Linux product. Gain real world experience through extensive hands-on practice with target devices.

LFS452 Essentials of OpenStack Administration "IndyWatch Feed Tech"

OpenStack is growing at an unprecedented rate, and there is incredible demand for individuals who have experience managing this cloud platform. Youll become adept at managing and using private and public clouds with OpenStack, and youll develop hands-on experience with essential commands, automation, and troubleshooting, under the expert guidance of our instructors who impart state-of-the-market OpenStack experience. And all course materials are vendor neutral, so youll be able to apply these skills regardless of how your OpenStack installation has been constructed.

LFD460 Embedded Linux Development with Yocto Project "IndyWatch Feed Tech"

Obtain a solid understanding of embedded development using the Yocto Project, including the Poky Reference Distribution and Bitbake, the use of emulators, building images for multiple architectures and the creation of board support packages (BSP).

LFS426 Linux Performance Tuning "IndyWatch Feed Tech"

This course teaches you to optimize your systems performance by acquiring useful performance metrics from the hardware, tracing applications and the Linux kernel, and tuning various aspects of the system, including both hardware and kernel settings.and optimizations.

LFS301 Linux System Administration "IndyWatch Feed Tech"

This course helps you master the tools used by system administrators in enterprise Linux environments, including maintaining software and hardware, updating, configuring, troubleshooting and securing systems, using a variety of Linux enterprise distributions.


Graphene Water Filter Turns Whisky Clear "IndyWatch Feed Tech"


Previously graphene-oxide membranes were shown to be completely impermeable to all solvents except for water. However, a study published in Nature Materials, now shows that we can tailor the molecules that pass through these membranes by simply making them ultrathin.

The research team led by Professor Rahul Nair at the National Graphene Institute and School of Chemical Engineering and Analytical Science at The University of Manchester tailored this membrane to allow all solvents to pass through but without compromising it's ability to sieve out the smallest of particles.

In the newly developed ultrathin membranes, graphene-oxide sheets are assembled in such a way that pinholes formed during the assembly are interconnected by graphene nanochannels, which produces an atomic-scale sieve allowing the large flow of solvents through the membrane.
Prof. Nair said, "Just for a fun, we even filtered whisky and cognac through the graphene-oxide membrane. The membrane allowed the alcohol to pass through but removed the larger molecules, which gives the amber colour. The clear whisky smells similar to the original whisky but we are not allowed to drink it in the lab, however it was a funny Friday night experiment!"

Minute control over the sheets of graphene allow them to tailor filters for exact purposes like desalinization.

Original Submission

Read more of this story at SoylentNews.


If You Want to Spend on a Microscope "IndyWatch Feed Tech"

A quick check of the usual Chinese websites will yield USB microscopes for a very low price. However, many of these are little more than webcams with some cheap optics. Not that they cant be useful, but they probably wont compete with an expensive instrument like a Dino-Lite. [Shahriar] looks at the latest offerings from Dino-Lite and shows how they can be useful when examining electronics. You can see the video below, but be warned: these little microscopes are not cheap. The entry-level model starts at about $100 and they go up   way up from there.

Still, many of us spend as much or more on necessary gear and these days a microscope for inspecting tiny circuits is pretty handy. In addition to the optical instruments, [Shahriar] also looks at a stepper motor-driven microscope stage, which is interesting.

The video shows practical applications of inspecting and measuring ICs and PCBs, along with tips on lighting and other real-world advice. We realize paying $1,000 or more for a microscope is probably overkill for most of us, but it is interesting to see how these perform and it isnt out of reach if you really need the capability or if you are decking out a lab or hackerspace.

Naturally, you can easily get by with less for most purposes like soldering. Even a modest web camera can do the job.

Filed under: tool hacks


Quake swarm rocks San Andreas fault at Monterey County "IndyWatch Feed Tech"

Fears of a huge quake have risen in California after a series of 10 mini quakes yesterday hit the San Andreas fault.

A string of 10 tremors struck Monterey County, a rural area in California, in what seismologists call a swarm of earthquakes.

The largest of this swarm, a 4.6-magnitude quake, was felt in San Francisco more than 90 miles (145 km) away.


Jupiters lights are acting very STRANGE and NO ONE knows why "IndyWatch Feed Tech"

THE dazzling lights on Jupiter have been behaving rather peculiar and even scientists have no idea why.


Security Breach and Spilled Secrets Have Shaken the N.S.A. to Its Core "IndyWatch Feed Tech"

A serial leak of the agencys cyberweapons has damaged morale, slowed intelligence operations and resulted in hacking attacks on businesses and civilians worldwide.


Appeals Courts Disturbing Ruling Jeopardizes Protections for Anonymous Speakers "IndyWatch Feed Tech"

A federal appeals court has issued an alarming ruling that significantly erodes the Constitutions protections for anonymous speakersand simultaneously hands law enforcement a near unlimited power to unmask them.

The Ninth Circuits decision in  U.S. v. Glassdoor, Inc. is a significant setback for the First Amendment. The ability to speak anonymously online without fear of being identified is essential because it allows people to express controversial or unpopular views. Strong legal protections for anonymous speakers are needed so that they are not harassed, ridiculed, or silenced merely for expressing their opinions.

In Glassdoor, the courts ruling ensures that any grand jury subpoena seeking the identities of anonymous speakers will be valid virtually every time. The decision is a recipe for disaster precisely because it provides little to no legal protections for anonymous speakers.

EFF applauds Glassdoor for standing up for its users First Amendment rights in this case and for its commitment to do so moving forward. Yet we worry that without stronger legal standardswhich EFF and other groups urged the Ninth Circuit to apply (read our brief filed in the case)the government will easily compel platforms to comply with grand jury subpoenas to unmask anonymous speakers.

The Ninth Circuit Undercut Anonymous Speech by Applying the Wrong Test

The case centers on a federal grand jury in Arizona investigating allegations of fraud by a private contractor working for the Department of Veterans Affairs. The grand jury issued a subpoena to Glassdoor, which operates an online platform that allows current and former employees to comment anonymously about their employers, seeking the identities of eight accounts who posted about the contractor.

Glassdoor challenged the subpoena by asserting its users First Amendment rights. When the trial court ordered Glassdoor to comply, the company appealed to the U.S. Court of Appeals for the Ninth Circuit.

The Ninth Circuit ruled that because the subpoena was issued by a grand jury as part of a criminal investigation, Glassdoor had to comply absent evidence that the investigation was being conducted in bad faith.

There are several problems with the courts ruling, but the biggest is that in adopting a bad faith test as the sole limit on w...


Parity's $280m Ethereum Wallet Freeze Was No Accident Claims Startup "IndyWatch Feed Tech"

Submitted via IRC for SoyCow1984

A crypto-currency collector who was locked out of his $1m Ethereum multi-signature wallet this week by a catastrophic bug in Parity's software has claimed the blunder was not an accident it was "deliberate and fraudulent."

On Tuesday, Parity confessed all of its multi-signature Ethereum wallets which each require multiple people to sign-off transactions created since July 20 were "accidentally" frozen, quite possibly permanently locking folks out of their cyber-cash collections. The digital money stores contained an estimated $280m of Ethereum; 1 ETH coin is worth about $304 right now. The wallet developer blamed a single user who, apparently, inadvertently triggered a software flaw that brought the shutters down on roughly 70 crypto-purses worldwide.

[...] Cappasity has alleged the wallet freeze was no accident: someone deliberately triggered the mass lock down, we're told, and there's evidence to prove it. By studying devops199's attempts to extract and change ownership of ARToken's and Polkadot's smart contracts, it appears the user was maliciously poking around, eventually triggering the catastrophic bug in Parity's software. "Our internal investigation has demonstrated that the actions on the part of devops199 were deliberate," said Cappasity's founder Kosta Popov in a statement this week.



Previously: $300m in Cryptocurrency Accidentally Lost Forever Due to Bug

Original Submission

Read more of this story at SoylentNews.


NEW 'Off The Wall' ONLINE "IndyWatch Feed Tech"

NEW 'Off The Wall' ONLINE

Posted 15 Nov, 2017 2:05:12 UTC

The new edition of Off The Wall from 14/11/2017 has been archived and is now available online.


unblock "IndyWatch Feed Tech"

How to unblock website that is blocked by your isp or for any other reason. There are many ways to do that. You can easily unblock the site using your own pc and get access to the resource of the site with this easy to learn tutorial.

  1. Use Vpn
  2. Use Proxy Websites
  3. Use IP Rather Than URL
  4. Use Google Translate
  5. Bypass via Extensions
  6. URL recasting
  7. Replace your DNS Server
  8. Wayback Machine
  9. Use RSS Feed
  10. Change Network Proxy In Browsers
  11. Redirection with Short URL service
  12. Google Cache
  13. Retrieve web pages via Email

Restrictions and bans over websites are always annoying, and governments are now censoring content more than ever. Check out the 10 easy ways to bypass the censorship to access blocked websites. These easy-to-use and effective methods include the use of VPN, extensions, DNS hack, proxy websites, and others.

1. Use VPN

VPN or Virtual Proxy Network allows you to connect your device to a secure connection to another network over the internet. VPN enables you to access blocked websites from your home network and puts your IP address in a land far away. You can also download the apps or open the sites blocked in your country.

VPN acts as a tunnel that converts your data into garbage value thats difficult for anyone to sniff and recognize. There are tons of free/cheap VPN services that one can use and enjoy an uninterrupted internet experience.

If you are into exploring ways to enhance your computer security, you can also go for the deadly combination of TOR and VPN.

2. Use Proxy Websites

Very often, in a professional environment, the employers draw certain boundaries, restricting your the access to some particular websites. At times, you need a way to access the blocked websites and in those situations, proxy websites act as a rescue method.

On the web, there are hundreds of proxy websites that make your web experience unrestricted. A proxy website becomes a moderator between the user and server site. The proxy website camouflages the blocked site from...


kickasstorrents (kat) proxy mirror unblocked "IndyWatch Feed Tech"

Here is the biggest list of kickasstorrents proxy and mirror sites. You can find kickasstorrents alternatives here on the go. Kickass proxy and mirror sites. Here is the complete list of mirror and proxy sites with daily downtime checkups.

Access to kickasstorrents

Cant access Kickass Torrents? Kickass Torrents is blocked in many countries. Try one of the torrent proxies below for full Kickass Torrents access. Kickass Torrents proxies are tested every hour for availability and sorted by speed and status. Online Online Online Online Online Online Online Online

Kickasstorrents (also known as KAT torrents) is one of the largest torrent site. Kickass torrents is a torrent meta search engine founded in 2008. It is the 2nd most popular torrent site after thepiratebay in 2014 according to TorrentFreak. Due to domain seizure possibilities they have moved from multiple domains and finally settling in .to domain. They have more than 10 million torrents and more added daily. They also provide an api to download all data from their website.

Kickass Torrent Proxy...


123movies proxy mirror unblocked "IndyWatch Feed Tech"

How to unblock website that is blocked by your isp or for any other reason. There are many ways to do that. You can easily unblock the site using your own pc and get access to the resource of the site with this easy to learn tutorial.

  1. Use Vpn
  2. Use Proxy Websites
  3. Use IP Rather Than URL
  4. Use Google Translate
  5. Bypass via Extensions
  6. URL recasting
  7. Replace your DNS Server
  8. Wayback Machine
  9. Use RSS Feed
  10. Change Network Proxy In Browsers
  11. Redirection with Short URL service
  12. Google Cache
  13. Retrieve web pages via Email

Restrictions and bans over websites are always annoying, and governments are now censoring content more than ever. Check out the 10 easy ways to bypass the censorship to access blocked websites. These easy-to-use and effective methods include the use of VPN, extensions, DNS hack, proxy websites, and others.

1. Use VPN

VPN or Virtual Proxy Network allows you to connect your device to a secure connection to another network over the internet. VPN enables you to access blocked websites from your home network and puts your IP address in a land far away. You can also download the apps or open the sites blocked in your country.

VPN acts as a tunnel that converts your data into garbage value thats difficult for anyone to sniff and recognize. There are tons of free/cheap VPN services that one can use and enjoy an uninterrupted internet experience.

If you are into exploring ways to enhance your computer security, you can also go for the deadly combination of TOR and VPN.

2. Use Proxy Websites

Very often, in a professional environment, the employers draw certain boundaries, restricting your the access to some particular websites. At times, you need a way to access the blocked websites and in those situations, proxy websites act as a rescue method.

On the web, there are hundreds of proxy websites that make your web experience unrestricted. A proxy website becomes a moderator between the user and server site. The proxy website camouflages the blocked site from...


Unblock "IndyWatch Feed Tech"

Youtube is one of the largest Social Engine on the web. Here are Youtube unblock proxy and mirrors. Unblocked Youtube with these proxies. Proxy and mirrors of sites are the sites or servers that are not blocked by the ISPs or anything and they give us free access to the sites that are blocked by our isp. Youtube proxy List down below to unblock

FilterByPass Online
Skull Proxy Online
Unlock My Web


Unblock "IndyWatch Feed Tech"

Facebook is one of the largest Social Engine on the web. Here are Facebook unblock proxy and mirrors. Unblocked Facebook with these proxies. Proxy and mirrors of sites are the sites or servers that are not blocked by the ISPs or anything and they give us free access to the sites that are blocked by our isp. Facebook proxy List down below to unblock

FilterByPass Online
Skull Proxy Online
Unlock My Web


[$] KAISER: hiding the kernel from user space "IndyWatch Feed Tech"

Since the beginning, Linux has mapped the kernel's memory into the address space of every running process. There are solid performance reasons for doing this, and the processor's memory-management unit can ordinarily be trusted to prevent user space from accessing that memory. More recently, though, some more subtle security issues related to this mapping have come to light, leading to the rapid development of a new patch set that ends this longstanding practice for the x86 architecture.


Demonoid proxy mirror unblocked "IndyWatch Feed Tech"

Demonoid torrents is one of the largest torrents on the web. Here are demonoid unblock proxy and mirrors. Unblocked demonoid with these proxies. Proxy and mirrors of sites are the sites or servers that are not blocked by the ISPs or anything and they give us free access to the sites that are blocked by our isp. demonoid Torrents proxy List down below

... online
https://www.dnoid.meOFFICIAL PROXY online online


Torrentz proxy mirror unblocked "IndyWatch Feed Tech"

Torrentz torrents is one of the largest torrents on the web. Here are Torrentz unblock proxy and mirrors. Unblocked Torrentz with these proxies. Proxy and mirrors of sites are the sites or servers that are not blocked by the ISPs or anything and they give us free access to the sites that are blocked by our isp. Torrentz Torrents proxy List down below


Isohunt proxy mirrors unblocked "IndyWatch Feed Tech"

Isohunt torrents is one of the largest torrents on the web. Here are Isohunt unblock proxy and mirrors. Unblocked Isohunt with these proxies. Proxy and mirrors of sites are the sites or servers that are not blocked by the ISPs or anything and they give us free access to the sites that are blocked by our isp. Isohunt Torrents proxy List down below

... Online Online Online Online Online Online


Read "Preparing for a World that Doesn't Exist Yet: Framing a Second Enlightenment to Create Communities of the Future". "IndyWatch Feed Tech"

Read "Preparing for a World that Doesn't Exist -- Yet: Framing a Second Enlightenment to Create Communities of the Future".


Limetorrents proxy mirror unblocked "IndyWatch Feed Tech"

Limetorrent torrents is one of the largest torrents on the web. Here are Limetorrents unblock proxy and mirrors. Unblocked Limetorrents with these proxies. Proxy and mirrors of sites are the sites or servers that are not blocked by the ISPs or anything and they give us free access to the sites that are blocked by our isp. Limetorrent Torrents proxy List down below


Rarbg proxy mirror unblocked "IndyWatch Feed Tech"

Rarbg torrents is one of the largest torrents on the web. Here are Rarbg unblock proxy and mirrors. Unblocked Rarbg with these proxies. Proxy and mirrors of sites are the sites or servers that are not blocked by the ISPs or anything and they give us free access to the sites that are blocked by our isp. Rarbg Torrents proxy List down below. Use one of the proxies below to access RARBG Like a Boss!

The proxies below are automatically tested every hour! Online Online Online Online Online Online


thepiratebay proxy mirror unblocked "IndyWatch Feed Tech"

This is one of the sites which needs no introduction. It has been one of the most popular websites for getting your movies, tv series and what not.  There have  been long running blockades on the piratebay in many countries and schools. Many glype proxies allow you access the piratebay but, they donot allow you to click on magnet links, which renders, the piratebay unusable. But these proxies allow you to access the piratebay without any problems!! It has been raided by police twice. It has been down many times. But, people still remember it even now. TPB standsout from other torrents sites because they never comply with takedown notices.

The Pirate Bay has been blocked on many ISPs accross Europe. Proxy sites are the easiest methods to bypass the block. Check the Alternate methods for other ways of accessing The Pirate Bay.

Thepiratebay proxy and mirrors Online Online


Extratorrents proxy mirror unblocked "IndyWatch Feed Tech" was once a biggest bittorrent system. Our goal is to provide an easy-to-use directory and search engine for all kind of torrent files. Visitors of can upload torrents to this site, tracked by any BitTorrent tracker. One of the main reasons you should visit extratorrent is that they have high quality torrents and very friendly website and a vibrant community.

You wont be disappointed!!. It is one of the largest bittorrent systems still online after the recent government-led hunt for illegal downloading of content. Like other torrent systems, it works on a p2p (peer to peer) file protocol that bases its usefulness on the number of peers as well as their willingness to seed or share their files.

Extratorrent is one of the largest torrent sites. Here are the Extratorrence unblock proxy mirrorsProxy and mirrors of sites are the sites or servers that are not blocked by the ISPs or anything and they give us free access to the sites that are blocked by our isp. These proxies provided here are one of the fastest mirrors proxy mirrors unblocked

... Online Online Online


[SECURITY] [DSA 4033-1] konversation security update "IndyWatch Feed Tech"

Posted by Salvatore Bonaccorso on Nov 14

Debian Security Advisory DSA-4033-1 security () debian org Salvatore Bonaccorso
November 13, 2017

Package : konversation
CVE ID : CVE-2017-15923
Debian Bug...


Eztv proxy mirror unblocked "IndyWatch Feed Tech" is on the best torrent network i like. Here are the eztv proxy mirrors for eztv Torrentors. unblocked proxy and mirrors.Proxy and mirrors of sites are the sites or servers that are not blocked by the ISPs or anything and they give us free access to the sites that are blocked by our isp. These Proxy mirrors are down below Online Online Online Online Online Online Online Online Online Online Online Online Online


[CVE-2017-15288] A privilege escalation vulnerability in the Scala compilation daemon "IndyWatch Feed Tech"

Posted by jason . zaugg on Nov 14

A privilege escalation vulnerability has been identified in the Scala compilation daemon.

The compile daemon is started explicitly by the `fsc` command, or implicitly by executing
a Scala source file as a script (e.g `scala MyScript.scala`). Note: Using the `scala`
command to start a REPL or to run a pre-compiled class does not start the compile daemon.

# Impact

While the compile daemon is running, an attacker with local access to the machine...

01:50 proxy mirror unblocked "IndyWatch Feed Tech"

1337x torrents is one of the largest torrents on the web. Here are 1337x unblock proxy and mirrors. Unblocked with these proxies. Proxy and mirrors of sites are the sites or servers that are not blocked by the ISPs or anything and they give us free access to the sites that are blocked by our isp. 1337x Torrents proxy List down below

1337x proxy and mirrors Status Online Online Online Online Online Online Online Online Online Online Online Online


Redtube proxy mirror unblocked "IndyWatch Feed Tech"

How to unblock website that is blocked by your isp or for any other reason. There are many ways to do that. You can easily unblock the site using your own pc and get access to the resource of the site with this easy to learn tutorial.

  1. Use Vpn
  2. Use Proxy Websites
  3. Use IP Rather Than URL
  4. Use Google Translate
  5. Bypass via Extensions
  6. URL recasting
  7. Replace your DNS Server
  8. Wayback Machine
  9. Use RSS Feed
  10. Change Network Proxy In Browsers
  11. Redirection with Short URL service
  12. Google Cache
  13. Retrieve web pages via Email

Restrictions and bans over websites are always annoying, and governments are now censoring content more than ever. Check out the 10 easy ways to bypass the censorship to access blocked websites. These easy-to-use and effective methods include the use of VPN, extensions, DNS hack, proxy websites, and others.

1. Use VPN

VPN or Virtual Proxy Network allows you to connect your device to a secure connection to another network over the internet. VPN enables you to access blocked websites from your home network and puts your IP address in a land far away. You can also download the apps or open the sites blocked in your country.

VPN acts as a tunnel that converts your data into garbage value thats difficult for anyone to sniff and recognize. There are tons of free/cheap VPN services that one can use and enjoy an uninterrupted internet experience.

If you are into exploring ways to enhance your computer security, you can also go for the deadly combination of TOR and VPN.

2. Use Proxy Websites

Very often, in a professional environment, the employers draw certain boundaries, restricting your the access to some particular websites. At times, you need a way to access the blocked websites and in those situations, proxy websites act as a rescue method.

On the web, there are hundreds of proxy websites that make your web experience unrestricted. A proxy website becomes a moderator between the user and server site. The proxy website camouflages the blocked site from...


Pornhub proxy mirror unblocked "IndyWatch Feed Tech"

How to unblock website that is blocked by your isp or for any other reason. There are many ways to do that. You can easily unblock the site using your own pc and get access to the resource of the site with this easy to learn tutorial.

  1. Use Vpn
  2. Use Proxy Websites
  3. Use IP Rather Than URL
  4. Use Google Translate
  5. Bypass via Extensions
  6. URL recasting
  7. Replace your DNS Server
  8. Wayback Machine
  9. Use RSS Feed
  10. Change Network Proxy In Browsers
  11. Redirection with Short URL service
  12. Google Cache
  13. Retrieve web pages via Email

Restrictions and bans over websites are always annoying, and governments are now censoring content more than ever. Check out the 10 easy ways to bypass the censorship to access blocked websites. These easy-to-use and effective methods include the use of VPN, extensions, DNS hack, proxy websites, and others.

1. Use VPN

VPN or Virtual Proxy Network allows you to connect your device to a secure connection to another network over the internet. VPN enables you to access blocked websites from your home network and puts your IP address in a land far away. You can also download the apps or open the sites blocked in your country.

VPN acts as a tunnel that converts your data into garbage value thats difficult for anyone to sniff and recognize. There are tons of free/cheap VPN services that one can use and enjoy an uninterrupted internet experience.

If you are into exploring ways to enhance your computer security, you can also go for the deadly combination of TOR and VPN.

2. Use Proxy Websites

Very often, in a professional environment, the employers draw certain boundaries, restricting your the access to some particular websites. At times, you need a way to access the blocked websites and in those situations, proxy websites act as a rescue method.

On the web, there are hundreds of proxy websites that make your web experience unrestricted. A proxy website becomes a moderator between the user and server site. The proxy website camouflages the blocked site from...


A Helium-Resistant Material Could Usher in the Age of Nuclear Fusion "IndyWatch Feed Tech"

Researchers have found a way to prevent helium from weakening nuclear fusion reactors, potentially eliminating an obstacle to harnessing fusion energy.


XNXX proxy mirror unblocked "IndyWatch Feed Tech"

How to unblock website that is blocked by your isp or for any other reason. There are many ways to do that. You can easily unblock the site using your own pc and get access to the resource of the site with this easy to learn tutorial.

  1. Use Vpn
  2. Use Proxy Websites
  3. Use IP Rather Than URL
  4. Use Google Translate
  5. Bypass via Extensions
  6. URL recasting
  7. Replace your DNS Server
  8. Wayback Machine
  9. Use RSS Feed
  10. Change Network Proxy In Browsers
  11. Redirection with Short URL service
  12. Google Cache
  13. Retrieve web pages via Email

Restrictions and bans over websites are always annoying, and governments are now censoring content more than ever. Check out the 10 easy ways to bypass the censorship to access blocked websites. These easy-to-use and effective methods include the use of VPN, extensions, DNS hack, proxy websites, and others.

1. Use VPN

VPN or Virtual Proxy Network allows you to connect your device to a secure connection to another network over the internet. VPN enables you to access blocked websites from your home network and puts your IP address in a land far away. You can also download the apps or open the sites blocked in your country.

VPN acts as a tunnel that converts your data into garbage value thats difficult for anyone to sniff and recognize. There are tons of free/cheap VPN services that one can use and enjoy an uninterrupted internet experience.

If you are into exploring ways to enhance your computer security, you can also go for the deadly combination of TOR and VPN.

2. Use Proxy Websites

Very often, in a professional environment, the employers draw certain boundaries, restricting your the access to some particular websites. At times, you need a way to access the blocked websites and in those situations, proxy websites act as a rescue method.

On the web, there are hundreds of proxy websites that make your web experience unrestricted. A proxy website becomes a moderator between the user and server site. The proxy website camouflages the blocked site from...


Robots could be used on FARMS by 2020 "IndyWatch Feed Tech"

Engineers from Harper Adams University in Shropshire are working on machines that can autonomously plant seeds, weed, water and spray without a farmer needing to venture into the field.

Professor Blackmore said: I am trying develop a completely new agricultural mechanisation system based on small smart machines.

We are developing laser weeding, droplet application where only 100 per cent of the chemical goes onto the target leaf, selective harvesting where we can grade the product at the point of harvest.


xvideos proxy mirror unblocked "IndyWatch Feed Tech"

How to unblock website that is blocked by your isp or for any other reason. There are many ways to do that. You can easily unblock the site using your own pc and get access to the resource of the site with this easy to learn tutorial.

  1. Use Vpn
  2. Use Proxy Websites
  3. Use IP Rather Than URL
  4. Use Google Translate
  5. Bypass via Extensions
  6. URL recasting
  7. Replace your DNS Server
  8. Wayback Machine
  9. Use RSS Feed
  10. Change Network Proxy In Browsers
  11. Redirection with Short URL service
  12. Google Cache
  13. Retrieve web pages via Email

Restrictions and bans over websites are always annoying, and governments are now censoring content more than ever. Check out the 10 easy ways to bypass the censorship to access blocked websites. These easy-to-use and effective methods include the use of VPN, extensions, DNS hack, proxy websites, and others.

1. Use VPN

VPN or Virtual Proxy Network allows you to connect your device to a secure connection to another network over the internet. VPN enables you to access blocked websites from your home network and puts your IP address in a land far away. You can also download the apps or open the sites blocked in your country.

VPN acts as a tunnel that converts your data into garbage value thats difficult for anyone to sniff and recognize. There are tons of free/cheap VPN services that one can use and enjoy an uninterrupted internet experience.

If you are into exploring ways to enhance your computer security, you can also go for the deadly combination of TOR and VPN.

2. Use Proxy Websites

Very often, in a professional environment, the employers draw certain boundaries, restricting your the access to some particular websites. At times, you need a way to access the blocked websites and in those situations, proxy websites act as a rescue method.

On the web, there are hundreds of proxy websites that make your web experience unrestricted. A proxy website becomes a moderator between the user and server site. The proxy website camouflages the blocked site from...


Who Has Your Back in Colombia? Our Third-Annual Report Shows Progress "IndyWatch Feed Tech"

According to the Colombian Ministry of Information and Communication Technologies, broadband Internet penetration in Colombia is well over 50% and growing fast. Like users around the world, Colombians put their most private data, including their online relationships, political, artistic and personal discussions, and even their minute-by-minute movements online. And all of that data necessarily has to go through one of a handful of ISPs. But without transparency from those ISPs, how can Colombians trust that their data is being treated with respect?
This project is part of a series across Latin America, adapted from EFFs annual Who Has Your Back? report. The reports are intended to evaluate mobile and fixed ISPs to see which stand with their users when responding to government requests for personal information. While theres definitely room for improvement, the third edition of the Colombian report shows substantial improvement.
The full report is available only in Spanish from Fundacin Karisma, but here are some highlights.
This third-annual report goes even further in evaluating companies than ever before. The 2017 edition doesnt just look at ISPs data practices; it evaluates whether companies have corporate policies of gender equality and accessibility, whether they publicly report data breaches, and whether theyve adopted HTTPS to protect their users and employees. By and large, the companies didnt do very well at the new criteria, but thats part of the point. Reports like this help push the companies to do better.
Thats especially clear by looking at the criteria evaluated in previous years. Theres been significant improvement.
New for 2017, a Colombian ISP, known as ETB, has released the countrys first transparency report. This type of report, which lists the number and type of legal demands for data from government and law enforcement, is essential to helping users understand the scope of Internet surveillance and make informed decisions about storing their sensitive data or engaging in private communications. Weve long urged companies to release these reports regularly, and were happy to see...


Dnde Estn Mis Datos en Colombia? Nuestro tercer informe anual muestra el progreso "IndyWatch Feed Tech"

La Fundacin Karisma en cooperacin con EFF ha lanzado su tercer ao, Dnde Estan Mis Datos? Informe que es la versin colombiana de Who Has Your Back de EFF. Y la edicin de este ao tiene algunas buenas noticias.

Segn el Ministerio de Tecnologas de la Informacin y las Comunicaciones de Colombia, la penetracin de Internet de banda ancha en Colombia supera con creces el 50% y est creciendo rpidamente. Al igual que los usuarios de todo el mundo, los colombianos ponen sus datos ms privados en lnea, incluidas sus relaciones en lnea, debates polticos, artsticos y personales, e incluso sus movimientos minuto a minuto. Y todos esos datos necesariamente tienen que pasar por alguno del puado de ISP disponibles. Pero sin transparencia por parte de esos ISP, cmo pueden, los colombianos, confiar en que sus datos estn siendo tratados con respeto?

Este proyecto forma parte de una serie a lo largo de Amrica Latina, a partir de la publicacin anual del informe Who Has Your Back? de EFF. Estos informes tienen la intencin de evaluar los ISP mviles y fijos para ver qu soporte tienen sus usuarios cuando responden a las solicitudes gubernamentales de informacin personal. Si bien, claramente , hay margen de mejora, la tercera edicin del informe colombiano muestra una mejora sustancial.

El informe completo est disponible, solo en espaol, desde la web de la Fundacin Karisma [LINK], pero aqu hay algunos puntos destacados.

Este tercer informe anual evala a las empresas ms concienzudamente que nunca. La edicin de 2017 no solo mira las prcticas de datos de los ISP; evala si las empresas tienen polticas corporativas de igualdad de gnero y accesibilidad, ya sea que denuncien pblicamente las infracciones de datos, y si han adoptado HTTPS para proteger a sus usuarios y empleados. En general, a las empresas no les fue muy bien con los nuevos criterios, pero esto es parte del punto a tratar. Informes como este ayudan a las empresas a mejorar.

Eso es especialmente claro al observar los criterios evaluados en aos anteriores. Ha habido una mejora significativa.

Como novedad  este 2017; un ISP colombiano, conocido como ETB, ha lanzado el primer informe de transparencia del pas. Este tipo de informe, que enumera el nmero y tipo de demandas legales de datos del gobierno y las fuerzas del orden pblico, es esencial para ayudar a los usuarios a comprender el alcance de la vigilancia de Internet y tomar decisiones informadas sobre el almacenamiento de sus datos confidencia...


xhamster proxy mirror unblocked "IndyWatch Feed Tech"

How to unblock website that is blocked by your isp or for any other reason. There are many ways to do that. You can easily unblock the site using your own pc and get access to the resource of the site with this easy to learn tutorial.

  1. Use Vpn
  2. Use Proxy Websites
  3. Use IP Rather Than URL
  4. Use Google Translate
  5. Bypass via Extensions
  6. URL recasting
  7. Replace your DNS Server
  8. Wayback Machine
  9. Use RSS Feed
  10. Change Network Proxy In Browsers
  11. Redirection with Short URL service
  12. Google Cache
  13. Retrieve web pages via Email

Restrictions and bans over websites are always annoying, and governments are now censoring content more than ever. Check out the 10 easy ways to bypass the censorship to access blocked websites. These easy-to-use and effective methods include the use of VPN, extensions, DNS hack, proxy websites, and others.

1. Use VPN

VPN or Virtual Proxy Network allows you to connect your device to a secure connection to another network over the internet. VPN enables you to access blocked websites from your home network and puts your IP address in a land far away. You can also download the apps or open the sites blocked in your country.

VPN acts as a tunnel that converts your data into garbage value thats difficult for anyone to sniff and recognize. There are tons of free/cheap VPN services that one can use and enjoy an uninterrupted internet experience.

If you are into exploring ways to enhance your computer security, you can also go for the deadly combination of TOR and VPN.

2. Use Proxy Websites

Very often, in a professional environment, the employers draw certain boundaries, restricting your the access to some particular websites. At times, you need a way to access the blocked websites and in those situations, proxy websites act as a rescue method.

On the web, there are hundreds of proxy websites that make your web experience unrestricted. A proxy website becomes a moderator between the user and server site. The proxy website camouflages the blocked site from...


Air Pollution Linked to Osteoporosis and Bone Fractures "IndyWatch Feed Tech"

Air pollution has been linked to weakening of bones:

Poor air quality may be a modifiable risk factor for osteoporosis and bone fractures, especially among people living in low-income communities, according to a newly published analysis of data from two independent studies.

In one study researchers documented higher rates of hospital admissions for bone fractures in communities exposed to elevated levels of ambient particulate matter (PM25) air pollution in an analysis of data on more than nine million Medicare enrollees.

In another 8-year follow-up of approximately 700 middle-age, low-income adults participating in a bone health study, participants living in areas with relatively high levels of PM25 and black carbon vehicle emissions had lower levels of a key calcium and bone-related hormone and greater decreases in bone mineral density than participants exposed to lower levels of these air pollutants.

All associations were linear and observed -- at least for part of the PM25 distribution -- at PM25 concentrations below the annual average limits set by the U.S. Environmental Protection Agency (12 g/m3) and most other industrialized nations.

[...] The researchers acknowledged multiple limitations in both studies, which limit the ability to establish causality. But in an editorial [open, DOI: 10.1016/S2542-5196(17)30143-2] [DX] published with the studies, Tuan Nguyen, PhD, of the Garvan Institute of Medical Research in New South Wales, Australia, wrote that the studies are just the latest in a growing body of research linking air pollution exposure to osteoporosis: "Osteoporosis and its consequence of fragility fracture represent one of the most important public health problems worldwide because fracture is associated with increased mortality."

Association of air particulate pollution with bone loss over time and bone fracture risk: analysis of data from two independent studies (open, DOI: 10.1016/S2542-5196(17)30136-5) (DX)

Related: 80 Percent of World's City Dwellers Breathing Bad Air: UN


OpenGL 4.2 Support Could Soon Land For AMD Cayman GPUs On R600g "IndyWatch Feed Tech"

David Airlie is looking to land OpenGL image support in the R600 Gallium3D driver that would be enabled for Radeon HD 5000 "Evergreen" GPUs and newer. For the HD 6900 "Cayman" GPUs, this would be the last step taking it to exposing OpenGL 4.2 compliance...


AT&T wants to probe Trump's role in Time Warner merger: report "IndyWatch Feed Tech"

AT&T reportedly wants to investigate if the White House influenced the Justice Department's review of its merger with Time Warner should the pending deal fail.Sources told Bloomberg that AT&T will seek court approval to access...


Overnight Tech: Sessions won't say if WH intervened in AT&T merger talks | Dems want hearing on Trump's involvement in merger | YouTube expands crackdown on extremist videos "IndyWatch Feed Tech"

SESSIONS WON'T SAY IF HE'S TALKED TO WHITE HOUSE ABOUT AT&T MERGER: Attorney General Jeff Sessions on Tuesday refused to say whether he has discussed the pending AT&T-Time Warner merger with anyone at the White House."I'm not able to...


A Dreamcast VMU With A Secret "IndyWatch Feed Tech"

Since the Raspberry Pi range of boards first appeared back in 2012, weve seen them cleverly integrated into a host of inventive form factors. Today we bring you the latest offering in this space, [Kite]s Raspberry Pi Zero W installed in the case of a Sega Dreamcast VMU. The result is a particularly nicely executed build in which the Pi with a few of its more bulky components removed or replaced with low-profile alternatives sits on the opposite side of a custom PCB from a small LCD display.

The PCB contains the relevant buttons, audio, and power supply circuitry, and when installed in a VMU shell makes for a truly professional quality tiny handheld console. In a particularly nice touch the Pis USB connectivity is brought out alongside the SD card on the end of the Zero, under the cap that would have originally protected the VMUs connector. Some minimal paring away of Sega plastic was required but the case is surprisingly unmodified, and there is plenty of space for a decent-sized battery.

The VMU, or Visual Memory Unit, makes an interesting choice for an enclosure, because it is a relic of one of console gamings dead ends. It was the memory card for Segas last foray into the console market, the Dreamcast, and unlike those of its competitors it formed a tiny handheld console in its own right. Small games for the VMU platform were bundled with full titles, and there was a simple multiplayer  system in which VMUs could be linked together. Sadly the Dreamcast lost the console war of the late 1990s and early 2000s to Sonys PlayStation 2, but it remains a console of note.

Thanks [Giles Burgess] for the tip.

Filed under: classic hacks, Raspberry Pi

HPR2423: Open Source Gaming #2: Oolite "IndyWatch Feed Tech"

The game's website. If you're interested in playing, check it out. Also here's the forum I was looking up during the podcast to find out if Elite Dangerous was multiplayer or not.


AMD Stoney Ridge Audio Supported By Linux 4.15 "IndyWatch Feed Tech"

The sound driver changes have been submitted for the Linux 4.15 kernel and includes finally supporting AMD Stoney Ridge hardware...


There is a Pre-Installed Backdoor in OnePlus 5, 3 and 3T Devices "IndyWatch Feed Tech"

By Waqas

If you are using OnePlus 5, 3 or its 3T model,

This is a post from Read the original post: There is a Pre-Installed Backdoor in OnePlus 5, 3 and 3T Devices


Adobe, Microsoft Patch Critical Cracks "IndyWatch Feed Tech"

Its Nov. 14 the second Tuesday of the month (a.k.a. Patch Tuesday) and Adobe and Microsoft have issued gobs of security updates for their software. Microsofts 11 patch bundles fix more than four-dozen security holes in various Windows versions and Office products including at least four serious flaws that were publicly disclosed prior to today. Meanwhile, Adobes got security updates available for a slew of titles, including Flash Player, Photoshop, Reader and Shockwave.

Four of the vulnerabilities Microsoft fixed today have public exploits, but they do not appear to be used in any active malware campaigns, according to Gill Langston at security vendor Qualys. Perhaps the two most serious flaws likely to impact Windows end users involve vulnerabilities in Microsoft browsers Internet Explorer and Edge.

Qualys Langston reminds us that on last Patch Tuesday, Microsoft quietly released the fix for CVE-2017-13080, widely known as the KRACK vulnerability in WPA2 wireless protocol, but did not make it known until a week later, when the vulnerability was publicly disclosed. Check out the Qualys blog and this post from...

Tuesday, 14 November


Amazon Will be Bringing Middle Earth to TV "IndyWatch Feed Tech"


In its quest to launch a hit fantasy series of the caliber of Game of Thrones, Amazon has closed a massive deal, said to be close to $250 million, to acquire the global TV rights to The Lord of the Rings, based on the fantasy novels by J.R.R. Tolkien. The streaming service has given a multi-season commitment to a LOTR series in the pact, which also includes a potential spin-off series.

The LOTR original series, a prequel to Tolkien's The Fellowship of the Ring, will be produced by Amazon Studios in cooperation with the Tolkien Estate and Trust, HarperCollins and New Line Cinema, a division of Warner Bros. Entertainment, which produced the hugely successful LOTR movie franchise.

No details about the deal were disclosed but it believed to be dwarfing any TV series pact to date with a whopping price tag attached.

Original Submission

Read more of this story at SoylentNews.


Dems push for hearing on Trump's involvement in AT&T-Time Warner merger "IndyWatch Feed Tech"

Two top House Judiciary Committee Democrats are pushing the panel to hold a hearing examining the White Houses role in the troubling pattern of potential political interference by President Trump in the Department of Justices (DOJ) review...


Adobe Patch Tuesday addresses 80 flaws, 56 bugs in Reader and Acrobat "IndyWatch Feed Tech"

Adobe released todays Patch Tuesday, a total of 80 vulnerabilities across 9 products, most of which for Acrobat and Reader, including dozens of RCE issues.

Adobe released patches for a total of 80 vulnerabilities across its products, including Flash Player, Photoshop, Connect, Acrobat and Reader, DNG Converter, InDesign, Digital Editions, Shockwave Player, and Experience Manager products.

Half of the vulnerabilities addressed with the last Adobe Patch Tuesday were discovered by experts of the Chinese firm Tencent.

The highest number of flaw (56) has been fixed in Acrobat and Reader for Windows and Mac. The patches addressed many critical uninitialized pointer access, use-after-free, buffer access, buffer over-read, buffer overflow, out-of-bounds read/write, improper array index validation, security bypass, type confusion, and untrusted pointer dereference issues that can be exploited for remote code execution.

Adobe Patch Tuesday

Adobe fixed five remote code execution by releasing updates for the Windows, Mac, Linux and Chrome OS versions of Flash Player.

The company also fixed four server-side request forgery (SSRF) and cross-site scripting (XSS) vulnerabilities in Adobe Connect, Adobe also implemented a feature to mitigate clickjacking attacks.

Adobe fixed some critical code execution issues affecting Windows and Mac versions of Photoshop CC, and Shockwave Player for Windows, the company also solved a critical memory corruption vulnerability in DNG Converter for Windows.

Adobe addressed six flaws in Digital Editions for Windows, Mac, iOS, and Android that can lead to the disclosure of memory addresses and other sensitive data.

Adobe fixed three vulnerabilities in Experience Manager, including one information disclosure bug rated moderate severity, the firm also addressed a critical remote code execution bug in Adobe InDesign.

According to Adobe, none of the vulnerabilities patched are under active attack



Bill Gates Commits $100 Million to Alzheimer's Research "IndyWatch Feed Tech"

Microsoft founder Gates commits $100 million for fund, start-ups, to fight Alzheimer's

Billionaire Microsoft co-founder Bill Gates is to invest $50 million in the Dementia Discovery Fund, a venture capital fund that brings together industry and government to seek treatments for the brain-wasting disease. The investment is not part of Gates' philanthropic Bill & Melinda Gates Foundation and will be followed with another $50 million in a number of start-up ventures working in Alzheimer's research, Gates said.

With rapidly rising numbers of people suffering from Alzheimer's and other forms of dementia, the disease is taking a growing emotional and financial toll as people live longer, Gates told Reuters in an interview. "It's a huge problem, a growing problem, and the scale of the tragedy - even for the people who stay alive - is very high," he said.

Despite decades of scientific research, there is no treatment that can slow the progression of Alzheimer's. Current drugs can do no more than ease some of the symptoms. Gates said, however, that with focused and well-funded innovation, he's "optimistic" treatments can be found, even if they might be more than a decade away.

Original Submission

Read more of this story at SoylentNews.


Less Than Production, More than One-Offs "IndyWatch Feed Tech"

We build things we think are cool. Sometimes, other people agree with us and they want a copy of what weve built. If youre lucky enough to have an enviable product but youre not ready for full-scale manufacturing, you may be looking at a low-volume production run. [Eric Strebel] walks us through one such instance where he makes some custom color swatches for a show. Video after the break.

[Eric Strebel] is an industrial designer so he plays to his strengths by designing the swatch shape, jig, tool, and hangers. He hires out the painting, laser cutting, and CNC machining. This may seem like a simple statement but some of us have a hard time paying other people for things were capable of learning. In some cases, we just have to pay the professionals to do it correctly and keep our focus.

The mentality of small runs in this video is perfect for people who sell on Tindie or want to make more than a handful of consistently nice parts. Our own [Lewin Day] recently talked about his experience with a run of 200 mixers called gMix.

Filed under: how-to


20 Years of Protecting Intermediaries: Legacy of 'Zeran' Remains a Critical Protection for Freedom of Expression Online "IndyWatch Feed Tech"

This article first appeared on Nov. 10 in

At the Electronic Frontier Foundation (EFF), we are proud to be ardent defenders of 230. Even before 230 was enacted in 1996, we recognized that all speech on the Internet relies upon intermediaries, like ISPs, web hosts, search engines, and social media companies. Most of the time, it relies on more than one. Because of this, we know that intermediaries must be protected from liability for the speech of their users if the Internet is to live up to its promise, as articulated by the U.S. Supreme Court in ACLU v. Reno, of enabling any person [to] become a town crier with a voice that resonates farther than it could from any soapbox and hosting content as diverse as human thought.

As we hopedand based in large measure on the strength of the Fourth Circuits decision in Zeran230 has proven to be one of the most valuable tools for protecting freedom of expression and innovation on the Internet. In the past two decades, weve filed well over 20 legal briefs in support of 230, probably more than on any other issue, in response to attempts to undermine or sneak around the statute. Thankfully, most of these attempts were unsuccessful. In most cases, the facts were uglyZeran included. We had to convince judges to look beyond the individual facts and instead focus on the broader implications: that forcing intermediaries to become censors would jeopardize the Internets promise of giving a voice to all and supporting more robust public discourse than ever before possible.

This remains true today, and it is worth remembering now, in the face of new efforts in both Congress and the courts to undermine 230s critical protections.

Attacks on 230: The First 20 Years

The first wave of attacks on 230s protections came from plaintiffs who tried to plead around 230 in an attempt to force intermediaries to take down online speech they didnt like. Zeran was the first of these, with an attempt to distinguish between publishers and distributors of speech that the Fourth Circuit rightfully rejected. As we noted above, the facts were not pretty: the plaintiff sought to hold AOL responsible after an anon...


EFFs Street-Level Surveillance Project Dissects Police Technology "IndyWatch Feed Tech"

Step onto any city street and you may find yourself subject to numerous forms of police surveillancemany imperceptible to the human eye.

A cruiser equipped with automated license plate readers (also known as ALPRs) may have just logged where you parked your car. A cell-site simulator may be capturing your cell-phone data incidentally while detectives track a suspect nearby. That speck in the sky may be a drone capturing video of your commute. Police might use face recognition technology to identify you in security camera footage.

EFF first launched its Street-Level Surveillance project in 2015 to help inform the public about the advanced technologies that law enforcement are deploying in our communities, often without any transparency or public process.  Weve scored key victories in state legislatures and city councils, limiting the adoption of these technologies and how they can be used, but the surveillance continues to spread, agency by agency. To combat the threat, EFF is proud to release the latest update to our work: a new mini-site that shines light on a wide range of surveillance technologies, including ALPRs, cell-site simulators, drones, face recognition, and body-worn cameras.

Designed with community advocates, journalists, and policymakers in mind, Street-Level Surveillance seeks to answer the pressing questions about police technology. How does it work? What kind of data does it collect? How are police using it? Whos selling it? What are the threats, and what is EFF doing to defend our rights? We also offer resources specially tailored for criminal defense attorneys, who must confront evidence collected by these technologies in court.

These resources are only a launching point for advocacy. Campus and community organizations working to increase transparency and accountability around the use of surveillance technology can find additional resources and support through our...


Women Less Likely to Receive CPR from Bystanders "IndyWatch Feed Tech"

Study Suggests Women Less Likely to Get CPR From Bystanders

Women are less likely than men to get CPR from a bystander and more likely to die, a new study suggests, and researchers think reluctance to touch a woman's chest might be one reason.

Only 39 percent of women suffering cardiac arrest in a public place were given CPR versus 45 percent of men, and men were 23 percent more likely to survive, the study found. It involved nearly 20,000 cases around the country and is the first to examine gender differences in receiving heart help from the public versus professional responders.

"It can be kind of daunting thinking about pushing hard and fast on the center of a woman's chest" and some people may fear they are hurting her, said Audrey Blewer, a University of Pennsylvania researcher who led the study. Rescuers also may worry about moving a woman's clothing to get better access, or touching breasts to do CPR, but doing it properly "shouldn't entail that," said another study leader, U Penn's Dr. Benjamin Abella. "You put your hands on the sternum, which is the middle of the chest. In theory, you're touching in between the breasts."

The study was discussed Sunday at an American Heart Association conference in Anaheim.

Get touchy and save women's lives.

Also at Penn Medicine and the American Heart Association. Journal of the American College of Cardiology.

Other study mentioned in the AP article: Sexual Activity as a Trigger for Sudden Cardiac Arrest (DOI: 10.1016/j.jacc.2017.09.025) (DX)

Related study: Sex-Based Disparities in Incidence, Treatment, and Outcomes of Cardiac Arrest in the United States, 2003-2012. (DOI: 10.1161/JAHA.116.003704) (DX)

Original Submission

Read more of this story at SoylentNews....


A Backdoor in OnePlus devices allows root access without unlocking bootloader "IndyWatch Feed Tech"

Expert discovered a backdoor in OnePlus devices that allows root access without unlocking the bootloader.

Other problems for the owners of the OnePlus smartphone, this time experts discovered a backdoor that allows root access without unlocking the bootloader.

Just over a month after OnePlus was caught collecting personally identifiable information on its users, the Chinese smartphone company has been found leaving a backdoor on almost all OnePlus handsets.

The Twitter user, who goes by the handle of Elliot Anderson , (the name of the Mr. Robots main character), discovered a backdoor in OnePlus devices running OxygenOS that could allow anyone to obtain root access to the handsets.

Most of the OnePlus devices, including OnePlus 2, 3, 3T and brand-new OnePlus 5, comes with a pre-installed diagnostic testing application dubbed EngineerMode.

root oneplus devices android hacking

The app was developed by Qualcomm to help device manufacturers to easily test all hardware components of the devices.

The app is visible in the list of applications insta...


Judge Puts Brakes on Piracy Cases, Doubts Evidence Against Deceased Man "IndyWatch Feed Tech"

In recent years, file-sharers around the world have been pressured to pay significant settlement fees, or face legal repercussions.

These so-called copyright trolling efforts have been a common occurrence in the United States for more than half a decade, and still are.

While copyright holders should be able to take legitimate piracy claims to court, there are some who resort to dodgy tactics to extract money from alleged pirates. The evidence isnt exactly rock-solid either, which results in plenty of innocent targets.

A prime candidate for the latter category is a man who was sued by Venice PI, a copyright holder of the film Once Upon a Time in Venice. He was sued not once, but twice. Thats not the problem though. What stood out is that defendant is no longer alive.

The mans wife informed a federal court in Seattle that he passed away recently, at the respectable age of 91. While age doesnt prove innocence, the widow also mentioned that her husband suffered from dementia and was both mentally and physically incapable of operating a computer at the time of the alleged offense.

These circumstances raised doubt with US District Court Judge Thomas Zilly, who brought them up in a recent order (citations omitted).

In two different cases, plaintiff sued the same, now deceased, defendant, namely Wilbur Miller. Mr. Millers widow submitted a declaration indicating that, for about five years prior to his death at the age of 91, Mr. Miller suffered from dementia and was both mentally and physically incapable of operating a computer, the Judge writes.

The Judge notes that the IP-address tracking tools used by the copyright holder might not be as accurate as is required. In addition, he adds that the company cant simply launch a fishing expedition based on the IP-address alone.

The fact that Mr. Millers Internet Protocol (IP) address was nevertheless identified as part of two different BitTorrent swarms raises significant doubts about the accuracy of whatever IP-address tracking method plaintiff is using.

Moreover, plaintiff may not, based solely on IP addresses, launch a fishing expedition aimed at coercing individuals into either admitting to copyright infringement or pointing a finger at family members, friends, tenants, or neighbors. Plaintiff must demonstrate the plausibility of their claims before discovery will be permitted, Judge Zilly adds.

From the order


RADV Will Now Enable "Sisched" For The Talos Principle, Boosting Frame Rates "IndyWatch Feed Tech"

The RADV Mesa Radeon Vulkan driver will now enable the sisched optimization automatically when running The Talos Principle in order to boost performance...


High Speed Chronograph Looks Like Pro Gear "IndyWatch Feed Tech"

It can be hard enough to take a good photograph of a running kid or pet, and if were being honest, sometimes even stationary objects manage to allude our focus. Now imagine trying to take a picture of something moving really fast, like a bullet. Trying to capture the moment a fast moving projectile hits an object is simply not possible with a human behind the shutter button.

Enter the ballistic chronometer: a device that uses a set of sensor gates and a highly accurate timer to determine how fast an object is flying through it. Chronometers that operate up to a couple hundred meters per second are relatively common, but [td0g] had something a little faster in mind. Hes come up with an optical setup that he claims can capture objects moving as fast as Mach 2. With this chronometer tied into a high-speed flash rig, [td0g] is able to capture incredible shots such as the precise instant a bullet shatters a glass of water.

Because he couldnt find any phototransistors with the sub-microsecond response time necessary to detect a small object moving at 1,000 m/s, [td0g] ended up using LEDs in a photoconductive configuration, where 27 VDC is applied backwards against the diode. Careful monitoring of voltage fluctuations across the diode allows for detection of changes in the received light level. To cut down on int...


Giving Tuesday Approaches: Help us to Fund SENS Rejuvenation Research "IndyWatch Feed Tech"

Giving Tuesday is two weeks away, on November 28th. As manufactured celebrations go, I think we could do far worse than a holiday that encourages philanthropy. While most people are basically well-meaning, and I think would agree in principle that support for medical research is to the common good, we all lead busy lives and need prompting.

So here is a prompt, to remind you that we are all still aging, that aging causes an enormous toll of suffering and death, and that, absent progress, you too will be one of the victims. To offer material support to the research groups that are working to treat the causes of aging is not just the most compassionate thing you can do for the millions suffering today, it is also in your self-interest for tomorrow. If you are organized enough to save for retirement, because it will make your life easier decades from now, then you should also be organized enough to help establish the new medical technologies that will reduce or eliminate the age-related disease that also lies ahead, waiting.

The most effective way to help make progress through charitable contributions is to give to the SENS Research Foundation or their allies such as the Methuselah Foundation. This year we have put out a call for SENS Patrons, people willing to pledge a monthly contribution to the SENS Research Foundation. Josh Triplett, Christophe and Dominique Cornuejols, and Fight Aging! have put up a $36,000 challenge fund to encourage new supporters, and we will match the next full year of your donations if you sign up before the end of 2017.


Sessions refuses to say whether WH intervened in AT&T merger discussions "IndyWatch Feed Tech"

Attorney General Jeff Sessions on Tuesday refused to say whether he has discussed the pending AT&T-Time Warner merger with anyone at the White House.Im not able to comment on conversations or communications that Department of Justice top...


Stereoscopy/3D Protocol Being Worked On For Wayland "IndyWatch Feed Tech"

Collabora consultant Emmanuel Gil Peyrot has sent out a series of patches proposing a new (unstable) protocol for Wayland in dealing with stereoscopic layouts for 3D TV support but could be used in the future for VR HMDs, etc...


Dip update 115/n "IndyWatch Feed Tech"

[Orig: Nov 14, 2017]
Hi everyone,
Today I am sharing a preliminary plot that includes data from the Las Cumbres "ELP" 0.4m telescope located in Texas. I say that this is preliminary because the photometry here only uses one comparison star.  More work will be done over the next few days to include additional comparison stars, so these points are likely to shift around a bit before we settle on the best set to use.     
More later!
~Tabby and team
PS: These observations are happening because of the wonderful backers of our 2016 Kickstarter project. The Kickstarter campaign has ended, but we are still accepting donations to purchase additional observing time on the LCO 0.4m network. Thanks in advance for your support!      


Development Release: Linux Mint 18.3 Beta "IndyWatch Feed Tech"

The Linux Mint team has announced the availability of a new development snapshot for Linux Mint. The new testing snapshot, Linux Mint 18.3 Beta, features several overhauled applications. The software manager and backup utilities in particular have been given a new look. Linux Mint now makes it easier....


Flying-Car Company Terrafugia is Bought by China's Geely "IndyWatch Feed Tech"

With real money behind its project, maybe Terrafugia will finally hit its latest deadline, in 2019. But it'll probably lose money anyway Photo: Terrafugia

We wanted flying cars, instead we got 140 characters," wrote tech billionaire Peter Thiel, in 2011. Well, Twitter is now going to allow 280 characters in a tweet, and soonwe are toldwe will finally get a flying car.

Terrafugia, which in 2006 became one of the very first of a new crop of flying-car companies, says it will have one in 2019. And though that is only the latest in a long string of deadlines the company has set, perhapsPerhaps!this will be the first one that it honors. Reason: The company has just been acquired for an undisclosed sum by Geely, the Chinese automotive company that owns Volvo. The R&D funds should flow profusely.

A lot of companies from around the world are chasing the same dreamamong them Toyota, Googles Larry Page, Germanys eVolo, and Chinas EHang. Vahana, a subsidiary of Airbus, was supposed to test-fly a prototype this year, as I wrote back in January, but here we are in November with no air taxi. I am not shocked, that this is the case; in this business, deadlines are aspirational.

Whats more, the Vahana craft was supposed to be autonomous. That makes sense, even if its devilishly hard to manage. Theres just no other way to make money off a battery-powered plane that can ferry a mere one or two passengers at a time.

Terrafugia has dreams of autonomy as well, in the shape of its TF-X model, but the company has put its deadline a good seven or eight years further out. Not including a fudge factor.

Okay, so it may seem were beating up on a futuristic company that dares to dream big. But IEEE Spectrum and Terrafugia go back a long way, like an old married couple. Weve been grousing about why we consider Terrafugias ambitions unreasonable ever since we first labeled the company a loser, back in 2007.

A man sits in a Terrafugia car as it exits a garage. Photo: Terrafugia

The reasons for our skepticism havent changed. Making a car into a plane is really just a way of making a plane that can kinda, sorta...



Re: CVE-2017-15102: Linux kernel: usb: NULL-deref due to a race condition in [legousbtower] driver "IndyWatch Feed Tech"

Posted by Maier, Kurt H on Nov 14

First you objected to a specific bug, then it turned into "do
everything or give up," now we're back to a specific bug, and each
iteration is more unrealistic "just run whatever we release immediately
across all devices" advice.

Please, this is not productive.

And without rancor, jibes like the "know better" line are basically
just trash-talking people who actually run systems for a living and the...


YouTube broadens effort to remove extremist videos "IndyWatch Feed Tech"

YouTube is expanding its crackdown on extremist videos by now removing content that does not show violence or explicitly advocate hate.The move is a large shift from the companys former policy of only removing the most egregious extremist content...


Texas National Guard secretly installed spying devices on surveillance aircrafts "IndyWatch Feed Tech"

By Waqas

The Texas National Guard bought two DRT 1301C cell-site simulator

This is a post from Read the original post: Texas National Guard secretly installed spying devices on surveillance aircrafts


WikiLeaks Publishes Vault 8 CIA Software Projects "IndyWatch Feed Tech"

Vault 8:

Today, 9 November 2017, WikiLeaks publishes the source code and development logs to Hive, a major component of the CIA infrastructure to control its malware.

Hive solves a critical problem for the malware operators at the CIA. Even the most sophisticated malware implant on a target computer is useless if there is no way for it to communicate with its operators in a secure manner that does not draw attention. Using Hive even if an implant is discovered on a target computer, attributing it to the CIA is difficult by just looking at the communication of the malware with other servers on the internet. Hive provides a covert communications platform for a whole range of CIA malware to send exfiltrated information to CIA servers and to receive new instructions from operators at the CIA.

Hive can serve multiple operations using multiple implants on target computers. Each operation anonymously registers at least one cover domain (e.g. "") for its own use. The server running the domain website is rented from commercial hosting providers as a VPS (virtual private server) and its software is customized according to CIA specifications. These servers are the public-facing side of the CIA back-end infrastructure and act as a relay for HTTP(S) traffic over a VPN connection to a "hidden" CIA server called 'Blot'.

The code shows how the CIA could impersonate Kaspersky Lab:

According to WikiLeaks, CIA used these fake certificates to impersonate existing entities including Kaspersky Lab. "The three examples included in the source code build a fake certificate for the anti-virus company Kaspersky Laboratory, Moscow pretending to be signed by Thawte Premium Server CA, Cape Town. In this way, if the target organization looks at the network traffic coming out of its network, it is likely to misattribute the CIA exfiltration of data to uninvolved entities whose identities have been impersonated," noted WikiLeaks.

Also at The Register (follow-up).

Original Submission

Read more of this story at SoylentNe...


Homeland Security team remotely hacked a Boeing 757 in a controlled experiment "IndyWatch Feed Tech"

DHS Team remotely took control of a Boeing 757

A team of cybersecurity experts working with the US Department of Homeland Security (DHS) had reportedly hacked a Boeing 757 aircraft on the runway at Atlantic City airport, New Jersey in a controlled experiment carried out as a part of the test in September 2016. The team comprising of academicians and industry experts were able to remotely crack the IT systems of the 757 and take control of the aircraft, with the pilots unaware of the experiment taking place.

During a keynote speech at the CyberSat Summit 2017 in Virginia last week, Robert Hickey, the aviation program manager within the Cyber Security Division of the DHS Science and Technology (S&T) Directorate, revealed the chilling details of the hack.

We got the airplane on Sept. 19, 2016. Two days later, I was successful in accomplishing a remote, non-cooperative, penetration, said Hickey. [Which] means I didnt have anybody touching the airplane, I didnt have an insider threat. I stood off using typical stuff that could get through security and we were able to establish a presence on the systems of the aircraft.

Hickey said the details of the hack were classified but the researchers exploited the planes own radio frequency communications to penetrate its internal network. The classified test was reportedly carried out by the DHS artificial environment and risk reduction measures were already in place. Also, a Boeing official was present during the hacking of the aircraft

Following testing, Hickey said that experts advised that it was no big deal.

Apparently, Aviation and IT security experts were aware of the security flaws discovered by DHS. But it was only in March 2017 that seven airline pilot captains from American Airlines and Delta Air Lines were informed that their aircrafts could be hacked.

A Boeing spokesperson said: The Boeing Company has worked closely for many years with DHS, the FAA, other government agencies, our suppliers and customers to ensure the cybersecurity of our aircraft and will continue to do so.

Boeing observed the test referenced in the Aviation Today article, and we were briefed on the results. We firmly believe that the test did not identify any cyber vulnerabilities in the 757, or any other Boeing aircraft.

Back in 2015, a security researcher, Chris Roberts claimed to have gained access to an aircraft engine during a flight through its entertainment system; however, those claims were never verified.

Source: Hackread



The post...


Apple to release three new iPhone X-inspired models next year, KGI says "IndyWatch Feed Tech"

Apple to launch three iPhones with the bezel-less iPhone X design in 2018

If the gossip mills going around is true, then we could see Apple launching three new models of iPhones in the market in 2018.

Kuo expects the 5.8-inch model to have 458 pixels per inch, suggesting the second-generation iPhone Xs display will likely continue to have a resolution of 1,125 X 2,436. He said the 6.1-inch model will have the bezel-less design and approximate resolution between 320 and 330 PPI, while the 6.5-inch model is estimated to have between 480 to 500 PPI.

Kuo believes that all three models will have Apples TrueDepth camera system and the associated Face ID as standard features. All the three phones are expected to feature a full-screen design and 3D sensors. Also, Apple is likely to ditch its Touch ID fingerprint scanning system in favour of Face ID in 2018. This means that none of Apples handheld devices released next year will feature a Home button.

The 6.1-inch model will have a lower-resolution LCD display and feature an edge-to-edge display with a notch. It will target the low-end and mid-range markets with an estimated starting price of $649 to $749 in the U.S., reads the research note obtained by MacRumors.

We believe the major hardware difference in the two new OLED models is size, in a bid to satisfy various needs of the high-end market. The new TFT-LCD model will differ significantly from the OLED models in hardware and design specs (for instance, the PPI will be lower). The primary selling points of the TFT-LCD model may be the innovative user experience of an integrated full-screen design and 3D sensing with a lower price tag (we expect it will likely be US$649-749), Kuo said.

However, the research note does not provide any pricing estimates for the next 5.8-inch iPhone X, which currently starts at $999, or the all-new 6.5-inch model.

What do you think about the three iPhone models lined up by Apple next year? Do let us know your thoughts in the comments section below.






Maria Goeppert-Mayer: The Other Nobel Prize Winner "IndyWatch Feed Tech"

Maria Goeppert-Mayer was one of only two women to win the Nobel prize for physics thus far, the other being Marie Curie. And yet her name isnt anywhere near as well known as Marie Curies. She also worked on the Manhattan Project and spent time during her long career with Enrico Fermi, Max Born, Edward Teller, and many other physics luminaries.

She was other in another way too. She followed her husband from university to university, and due to prevailing rules against hiring both husband and wife, often had to take a non-faculty position, sometimes even with no salary. Yet being the other, or plus-one, seemed to give her what every pure scientist desires, the freedom to explore. And explore she did, widely. She was always on the cutting edge, and all the time working with the leading luminaries of physics. For a scientist, her story reads like its too good to be true, which is what makes it so delightful to read about.

Inevitably A Theoretical Physicist


Maria was born in 1906 in what is now Katowice, Poland, but was then Kattowitz in Germany. In 1910, her family moved to Gttingen, a university town and also in Germany. There her Father became a professor of pediatrics at the University of Gttingen, making his the sixth generation in a row to have a professor. Would Maria continue the tradition for a seventh? Time would tell.

Gttingen was the perfect location for putting her on the path to be the scientist she would become. For starters, Max Born, involved in the development of quantum mechanics and event...


Re: CVE-2017-15102: Linux kernel: usb: NULL-deref due to a race condition in [legousbtower] driver "IndyWatch Feed Tech"

Posted by Eddie Chapman on Nov 14

Does Linus, Greg, Al, etc, etc, etc owe anyone anything? Yes, they're
time is paid by companies and/or the Linux Foundation, but do those orgs
have a responsibility to anyone? They're working incredibly hard on
probably one of the most difficult project management feats anyone could
attempt, which anyone can take the end results of, and use without
monetary cost. Linus has the right to treat security in whatever way he
wishes to,...


Apache CouchDB CVE-2017-12635 and CVE-2017-12636 "IndyWatch Feed Tech"

Posted by Joan Touzet on Nov 14

Forwarding from
on Jan Lehnardt's behalf.


Dear CouchDB Community,

Last week, we announced the release of CouchDB versions 2.1.1 &
1.7.0/1.7.1 and marked them as CRITICAL security updates.

Today we are releasing detailed information about the security issues.

We expect all users to have updated already....


Trump adviser: White House relationship with tech better than appears "IndyWatch Feed Tech"

A top adviser to President Trump says that despite appearances, technology firms are actually interacting with the administration more than they let on. Reed Cordish, who advises Trump on tech policy, said on Monday that even though the...

IndyWatch Science and Technology News Feed Archiver

Go Back:30 Days | 7 Days | 2 Days | 1 Day

IndyWatch Science and Technology News Feed Today.

Go Forward:1 Day | 2 Days | 7 Days | 30 Days

IndyWatch Science and Technology News Feed was generated at World News IndyWatch.

Resource generated at IndyWatch using aliasfeed and rawdog