IndyWatch Science and Technology News Feed Archiver

Go Back:30 Days | 7 Days | 2 Days | 1 Day

IndyWatch Science and Technology News Feed Today.

Go Forward:1 Day | 2 Days | 7 Days | 30 Days

IndyWatch Science and Technology News Feed was generated at World News IndyWatch.

Saturday, 24 September


Development release: PrimTux 2 Beta 2 "IndyWatch Feed Tech"

The PrimTux distribution is a French language Debian-based project designed for school teachers and other professionals working in an educational environment. The PrimTux project has released a new development snapshot, Primtux 2-2016-09-23-Beta2, which is now available for testing. The beta is based on Debian's Stable branch and features....


Patent Quality and Patent Scope the Unspeakable Taboo at the EPO, as Both Are Guillotined by Benoît Battistelli for the Sake of Money "IndyWatch Feed Tech"

The Battistelli ‘revolution’ is just a gory mess

Battistelli-like Guillotin
Reference: Joseph-Ignace Guillotin

Summary: The gradual destruction of the European Patent Office (EPO), which was once unanimously regarded as the world’s best, by a neo-liberal autocrat from France, Benoît Battistelli

THE extremely unpopular Battistelli regime at the EPO has turned the entire institution (or Organisation, not just the Office) into a laughing stock. We used to think it paled in comparison to the USPTO (about a couple of years ago), but after publishing more than a thousand articles about the EPO it seems evident that the EPO sets the standards for abuse at international bodies (worse by far than WIPO and broader in terms of scale). Right now there are attempts to blame low-level staff for this.

Due to Team Battistelli, the Office is rapidly losing public support. It took more than 40 years to gain credibility and Battistelli ruins it all in just a few years if not as little as months. He even harms the very function of the Office by killing patent scope and patent quality. Dr. Glyn Moody retweeted Stephen Curry regarding an article we mentioned the other day in relation to the EPO; the situation with regard to patent scope has gotten him upset enough to say “this is yet another reason why we need to abolish patents…” (we presume he meant as a whole because these patents serve to discredit the system’s goals).

Yesterday the EPO was trying to associate itself with aerospace, even though the EPO is run by a right-wing politician who knows zilch about science and detests people who are scientists. He treats the Office like a crude production line and it shows. At the same time the EPO is inherently rotten from the top down (the rot comes/starts from the head) and it is all crooked when it comes to bidding and tenders. Watch the latest nonsense from the EPO. They try to give an impression of transparency and accountability when in fact, as one comment put it today (emphasis is ours):



Colorful Display Keeps Track of Your Network "IndyWatch Feed Tech"

So you’ve built out your complete home automation setup, with little network-connected “things” scattered all around your home. You’ve got net-connected TVs, weather stations, security cameras, and whatever else. More devices means more chances for failure. How do you know that they’re all online and doing what they should?

[WTH]’s solution is pretty simple: take a Raspberry Pi Zero, ping all the things, log, and display the status on an RGB LED strip. (And if that one-sentence summary was too many words for you, there’s a video embedded below the break.)

Before you go screaming “NOTAHACK!”, we should let you know that [WTH] already described it as such. This is just a good idea that helps him keep track of his hacks. But that doesn’t mean that there aren’t opportunities for hacking. He uses the IFTTT service and Google Drive to save the ping logs in a spreadsheet, but we can think of about a billion other ways to handle the logging side of things.

For many of us, this is a junk-box build. We’re sure that we have some extra RGB LEDs lying around somewhere, and spare cycles on a single-board-computer aren’t hard to come by either. We really like the simple visual display of the current network status, and implementing something like this would be a cheap and cheerful afternoon project that could make our life easier and (even more) filled with shiny LEDs. So thanks for the idea, [WTH]!

Filed under: Network Hacks


Amazon Has Been Fined £65,000 for Trying to Fly Dangerous Goods in Europe "IndyWatch Feed Tech"

Amazon has been fined £65,000 after being found guilty of attempting to ship dangerous goods by air.

The online giant tried to transport lithium-ion batteries and flammable aerosols between 2014 and 2015. It was found guilty at Southwark Crown Court [London, UK] of causing dangerous goods to be delivered for carriage in an aircraft in breach of air navigation rules.

An Amazon spokesman said: "The safety of the public, our customers, employees and partners is an absolute priority."

The prosecution had been brought by the Civil Aviation Authority (CAA) under the Air Navigation (Dangerous Goods) Regulations 2002. The items were destined for flights in and outside the UK in four shipments between January 2014 and June 2015. They were only discovered when the cargoes were screened by Royal Mail before departure, and seized before they could reach the aircraft.

The court heard that Amazon had tried to ship a lithium-ion battery to Jersey on a day before 7 January 2014, and a flammable gas aerosol to Romania on a similar date.

Another shipment, destined for Ireland on a day before 17 July 2014, contained another aerosol, while Amazon illegally tried to send two more lithium-ion batteries to Northern Ireland between 12 May and 3 June 2015.

Original Submission

Read more of this story at SoylentNews.


Bristows LLP’s Hatred/Disdain of UK/EU Democracy Demonstrated; Says “Not Only Will the Pressure for UK Ratification of the UPC Agreement Continue, But a Decision is Wanted Within Weeks.” "IndyWatch Feed Tech"

Team UPC has no sense of shame or humility because it wants more money and power

Bristows LLP and EPO

Summary: Without even consulting the British public or the European public (both of whom would be severely harmed by the UPC), the flag bearers of the UPC continue to bamboozle and then pressure politicians, public servants and nontechnical representatives

THEY JUST NEVER give up, do they? Perseverance is therefore required from both sides.

Team UPC, a small group of self-serving patent law firms, is trying to steal democracy and hijack the law in a truly undemocratic if not antidemocratic move. They brainwash public officials, throw incentives at them, and then pressure Battistelli's British photo op mate, Lucy.

“Team UPC, a small group of self-serving patent law firms, is trying to steal democracy and hijack the law in a truly undemocratic if not antidemocratic move.”IP Kat (whose staff/writers include Bristows LLP staff who exploited the platform for UPC lobbying for a number of years now) published this piece in the afternoon. It must be like the hundredth so-called ‘analysis’ of Brexit and the UPC (we put analysis in scare quotes because these are typically composed by Team UPC or think tanks/pressure/interest groups like CIPA).

As we have demonstrated here many times in the past, the UPC is extremely undesirable to the vast majority of European businesses and after a Brexit referendum it is dead and buried, no doubt about it at all. Unless… Team UPC can pull some dirty tricks that they have up their sleeves, hence our eternal vigilance.

“So,” says IP Kat, “while it may be legally possible for the UK to overcome the requirements of Opinion 1/09 by a new agreement, it could still be very politically sticky to sell a treaty which proposes the ongoing supremacy of EU law over the UK – even within the relatively limited context of patent disputes before the UPC.”

“They brainwash public officials, throw incentives at them, and then pressure Battistelli’s British photo op mate, Lucy.”In other words, any attempt to ratify the UPC right now would be extremely antidemocratic and flirting with “corrupt”.

Meanwhile, as pointed out to us by one reader, one of the latest so-called ‘analyses’ of the UPC and Brexit came from Edward Nodder from Bristows LLP (attempting to rebrand as “Bristows UPC” in order to capitalise on change/transitions induced by their own lobbying). The wording is extremely revealing and it piggybacks Battistelli cronies like Margot Fröhlinger [...


OVH hosting suffers 1Tbps DDoS attack; largest Internet has ever seen "IndyWatch Feed Tech"

By Waqas

Hosting Company OVH’s servers Hit by 1 Tbps DDoS Attacks –

This is a post from Read the original post: OVH hosting suffers 1Tbps DDoS attack; largest Internet has ever seen


Chelsea Manning Sentenced to Solitary Confinement for Suicide Attempt "IndyWatch Feed Tech"

Chelsea Manning will spend at least seven days in solitary confinement for attempting suicide in July:

A military prison disciplinary board has sentenced US whistleblower Chelsea Manning to fourteen days in solitary confinement, her lawyer has said. She will spend seven days in solitary confinement for charges relating to her attempt to kill herself in July. She ended a hunger strike last week, after the military agreed to provide her with gender dysmorphia treatment. The army private, born as Bradley Manning, is serving a 35-year sentence for espionage.

Last July, the former intelligence officer attempted to take her own life, after what lawyers said was the Army's refusal to provide appropriate health care. She was found guilty on Thursday by prison officials in Leavenworth, Kansas, of "Conduct Which Threatens" for her suicide attempt. She also was convicted of having "prohibited property" - the book "Hacker, Hoaxer, Whistleblower, Spy," by Gabriella Coleman.

Earlier this month, it was announced that the US Army will grant Chelsea Manning's request for gender transition surgery.

The President of the United States and others believe that constraints must be placed on the practice of solitary confinement. Studies have found that solitary confinement leads to increased risks of self-harm.

Original Submission

Read more of this story at SoylentNews.


Hacklet 126 – Teensy Projects "IndyWatch Feed Tech"

The Arduino has proved to be a great platform for electronics projects. The same goes for the Raspberry Pi. However, there are some projects that fall in the gap between these two options. Projects that need more memory or processing power than the ATmega microcontrollers have to offer, but not so much as to require a full Linux/ARM powerhouse. For those projects, there is the Teensy series. [Paul Stoffregen] created these lilliputian boards, and he’s been adding features ever since. The thousands of Teensy projects out there stand as proof that these little boards have been well received by the hacker community. This week’s Hacklet is about some of the best Teensy projects on!

beatsWe start with [Jonathan Payne] and Beats by Teensy. Beats is an all in one music machine. A sampler, sequencer, and MIDI control surface; all powered by the Teensy 3.1 and the Teensy Audio Board. The audio board gives Beats the ability to record and playback 16 bit audio at a sampling rate of  up to 44.1 kHz. [Jonathan’s] inspiration came from devices such as the Akai MPC, and the MIDI Fighter. He utilized the incredible Teensy audio library on the software side. A project like this needs a serious case. [Jonathan] designed and built the perfect panel and case utilizing arcade buttons and a 128×64 LCD from Adafruit.

sabNext we have [RF William Hollender] and Teensy Super Audio Board. Not satisfied with CD quality 44.1 kHz audio, [William] decided to add a high quality audio codec to Teensy’s bag of tricks. He picked the CS4272 codec from Cirrus Logic. Capable of sampling rates up to 192 kHz, with a THD+N of -100 db, this codec should please all but the most discerning audiophiles. The high noise immune design doesn’t stop there though. [William’s] design isolated the Teensy and the rest of the interfaces from the codec to prevent ground loops. Connectivity is via standard I2S for the audio stream and I2C for control. This means the super audio board can be used with Raspberry Pi’s and the like.

spinoNext up is [Spino] with Spino. Teensy boards can do a lot more than just audio. Spino is a POV display with 32 spinning RGB LEDs. Spino can do more than just show pretty pictures though. With a Teensy 3.2 and bluetooth radio on board, the spino team is able to play games on their display. LEDs don’t work exactly like CRTs and LCDs though, so some color changes were necessary. The team utilized cell shading with a sobel filter to make Doom look even better than ever. The Teensy is even powerful enough to handle live webcam video sent over USB. The video is rendered and displayed on the spinning LEDs.

megsyFinally we have [Tim Trzepacz] with Megsy? A homebrew Teensy...


Monkeys to Operate Robots "IndyWatch Feed Tech"

Via: IEEE: As if quantum computing wasn’t mind-bending enough, one of D-Wave Systems’ founders is now pursuing another futuristic idea: using artificial intelligence and high-tech exoskeleton suits to allow humans—and, at least according to one description of the technology, monkeys, too—to control and train an army of intelligent robots. Geordie Rose is a co-founder and […]


Released Late on a Friday, EPO Social ‘Study’ (Battistelli-Commissioned Propaganda) Attempts to Blame Staff for Everything "IndyWatch Feed Tech"

On the same night as this, maybe for similar reasons:

Social study - 1

Social study - 2

Summary: The longstanding propaganda campaign (framing staff as happy or framing unhappy staff as a disgruntled minority) is out and the timing of the release is suspicious to say the least

THE ABOVE SCREENSHOTS, taken from the first phase of a propaganda campaign (to culminate with a so-called 'conference' intended to influence the Administrative Council), would not be exactly shocking to EPO staff. It’s part of an effort by Battistelli to dismiss and discredit any claims that he abuses staff, strategically at a point when the Administrative Council brings up the subject. It is an infamous politician’s trick (see what the US government did on the very same day as the debut of the film “Snowden” and simultaneous calls for Presidential pardon).

“The quick summary: Blame the staff for all the problems.”Lots of EPO coverage is planned for this weekend and we decided to begin by getting this propaganda out of the way. It wasn’t — as far as we are aware — expected to come out last night, which makes one wonder. If this propaganda about the social climate was released prematurely late on a Friday, then maybe they try to bury or distract from something. Are they trying to suppress discussion about it? Has Team Battistelli lost its mind again? Why did the social study appear on the intranet at such strategic timing (when few would even notice the release)? Why has nobody covered it yet? Journalists are obviously away for the weekend (see what the FBI has just done, as Wikileaks pointed out 19 hours ago). It’s a big document, no doubt, and staff might be taking it home for the weekend. The Financial Study and Occupational Health and Safety Risk Assessment have appeared also.

The quick summary: Blame the staff for all the problems. Expect us to say more about it in the near future. The above is just somewhat of a preview.


ISPs Offered Service to “Protect Safe Harbor” Under DMCA "IndyWatch Feed Tech"

warningEarly August, a federal court in Virginia found Internet service provider Cox Communications liable for copyright infringements carried out by its customers.

The ISP was found guilty of willful contributory copyright infringement and ordered to pay music publisher BMG Rights Management $25 million in damages.

The case was first filed in 2014 after it was alleged that Cox failed to pass on infringement notices sent to the ISP by anti-piracy outfit Rightscorp. It was determined that the ISP had also failed to take firm action against repeat infringers.

Although the decision is still open to appeal, the ruling has ISPs in the United States on their toes. None will want to fall into the same trap as Cox and are probably handling infringement complaints carefully as a result. This is where Colorado-based Subsentio wants to step in.

Subsentio specializes in helping companies meet their obligations under CALEA, the Communications Assistance for Law Enforcement Act, a wiretapping law passed in 1994. It believes these skills can also help ISPs to retain their safe harbor protection under the DMCA.

This week Subsentio launched DMCA Records Production, a service that gives ISPs the opportunity to outsource the sending and management of copyright infringement notices.

“With the average ISP receiving thousands of notices every month from owners of copyrighted content, falling behind on DMCA procedural obligations is not an option,” says Martin McDermott, Chief Operating Officer at Subsentio.

“The record award of US$25 million paid by one ISP for DMCA violations last year was a ‘wake-up call’ — service providers that fail to take this law seriously can face the same legal and financial consequences.”

Subsentio Legal Services Manager Michael Allison informs TorrentFreak that increasing levels of DMCA notices received by ISPs need to be handled effectively.

“Since content owners leverage bots to crawl the internet for copyrighted content, the volume of DMCA claims falling at the footsteps of ISPs has been on the rise. The small to mid-level ISPs receive hundreds to thousands of claims per month,” Allison says.

“This volume may be too high to add to the responsibilities of a [network operations center] or abuse team. At the same time, the volume might not constitute the hiring of a full-time employee or staff.”

Allison says that his company handles legal records production for a number of ISP clients and part of that process involves tying allegedly infringing IP addresses and timestamps to ISP subscribers.

“The logistics behind tying a target IP address and timestamp to a specific subscriber is usually an administrative and laborious process. But it’s a method we’re familiar with and it’s a procedure that’s inherent to processing any DMCA claim.”

Allison says that the Cox decision put ISPs on notice that they must have a defined policy addressing DMCA claims, including provisions for dealing with repeat infringers, up to and including termination. He believes the Subsentio system can help ISPs achieve those goals.

“[Our system] automatically creates a unique case for each legal request received, facilitates document...


Ardit Ferizi, the hacker who helped ISIS to share a Kill List of US Military Personnel has been sentenced to 20 years in prison "IndyWatch Feed Tech"

The hacker Ardit Ferizi, aka Th3Dir3ctorY, who helped ISIS to share a Kill List of US Military Personnel has been sentenced to 20 years in a US prison

Months ago, I reported you the story of Ardit Ferizi, aka Th3Dir3ctorY, who is the hacker that supported the ISIS organization by handing over data for 1,351 US government and military personnel.

Ferizi is the first man charged with cyber terrorism that was extradited to the US early this year.

He was charged with hacking crimes and providing support to a terrorist organization. The 20-year-old man was accused of supporting the ISIS terrorist organization, he was the subject of extradition from the Malaysian government, where he lived. The man of Kosovar origin was studying computer science in Malaysia.

He was arrested in Malaysia in September 2015 and transferred to the US to face trial.

Now Ardit Ferizi has been sentenced to 20 years in a U.S. prison. According to the US investigators, he provided the data to the popular IS militant Junaid Hussain, which disclosed it on the web. The collaboration between the IS hackers Hussain and Ferizi started in April 2015, according to the US authorities.

The details of the Ferizi’s case are described in  the court filings [PDF].

Leaked data included names, e-mail addresses, passwords, locations and phone numbers of 1,351 U.S. military and other government personnel.

Ardit Ferizi cyber terrorism ISIS invites to Kill US military personnel

The stolen data included names, physical addresses, phone numbers, email addresses, and passwords.

Ardit Ferizi, aka Th3Dir3ctorY, from Kosovo was sentenced in federal court in Alexandria, for “providing material support to the Islamic State of Iraq and the Levant (ISIL) and accessing a protected computer without authorization and obtaining information in order to provide material support to ISIL,” the Department of Justice announced on Friday.

The 21-year-old ISIS-linked hacker obtained the data by hacking into the US web hosting company’s servers on June 13, 2015.

The US authorities suspected that Ferizi is a member of a Kosovan hacking team known as KHS, he used the pseudonym of “Th3Dir3ctorY”. The KHS breached a database of a US retailer was able to identify the records belonging to military and government personnel.

The Kosova Hacker’s Security (KHS) hit numerous organizations across the world, including Serbian Government websites, Israeli websites under the #OpIsrael campaign, The Interpol, IBM Research, Hotmail, US National Weather Service Website and numerous targets in Ukraine.



Meet the Winners of This Year's Ig Nobel Prizes "IndyWatch Feed Tech"

Rats in tiny trousers, pseudoscientific bullshit, the personalities of rocks, and Volkswagen's, shall we say, "creative" approach to emissions testing were among the research topics honored by the 2016 Ig Nobel Prizes. The winners were announced last night at a live webcast ceremony held at Harvard University.

For those unfamiliar with the Ig Nobel Prizes, it's an annual celebration of silly science. Or a silly celebration of seemingly dubious science, courtesy of the satirical journal Annals of Improbable Research. The main objective is to honor research that first makes you laugh, and then makes you think. It's all in good fun, and the honorees frequently travel to the ceremony on their own dime to accept their awards.

Some of the honorees were:

Literature Prize: Fredrik Sjöberg, for his three-volume autobiographical work about the pleasures of collecting flies that are dead, and flies that are not yet dead.

Perception Prize: Atsuki Higashiyama and Kohei Adachi, for investigating whether things look different when you bend over and view them between your legs.

VW won the Chemistry category for "electromechanically producing fewer emissions whenever the cars are being tested".

Who would you have chosen to win an Ig Nobel Prize this year?

The 2016 Ig Nobel prizes were awarded yesterday, Thursday, September 22. Notable amongst the winners was VolksWagen, who won the Chemistry prize for "solving the problem of excessive automobile pollution emissions by automatically, electromechanically producing fewer emissions whenever the cars are being tested." No one from VW attended the ceremony to collect the prize. Other notable winners included a team who won the Peace Prize for their groundbreaking work analyzing the detection of "Pseudo-Profound Bullshit."

Original Submission 1

Original Submission 2

Read more of this story at SoylentNews.


Krebs Goes Down, Opera Gets a VPN & More… "IndyWatch Feed Tech"

Also included: Yahoo’s big hack, Garrett on Lenovo, new Audacious and GNOME, and Ubuntu get’s ready for Yakkety Yak.

FOSS Week in Review

I spent time this week terminating a Yahoo account I’ve had since way back in the last century. For years, the My Yahoo page was my “home” page whenever I fired-up the old dial-up to go online, but over time the portal (remember portals?) became less and less relevant and I found my visits to Yahoo becoming less and less frequent. By the time I closed the account, prompted by news of a massive hack involving 500 million accounts going back to 2014, I hadn’t visited my Yahoo page in well over a year. RIP Yahoo. It was nice knowing you.

The other big story this week involved Linux — or the inability to install Linux on certain Lenovo machines. As you might imagine, when a Lenovo rep on a Best Buy page put the blame squarely in Microsoft’s lap, all heck broke loose. Although it turned out that evidently Redmond had nothing to do with this — the blame goes to Intel for not supplying Linux with necessary drivers — you’d never know it from reading the comments on the story as it ran here on FOSS Force. The day after we ran our story, Matthew Garrett echoed what we said, but in much more detail. I’ll promise you this: If Garrett thought Microsoft had anything to do with it, he’d be the first to say so.

Now let’s get back to blaming Microsoft for things they really are doing.

Krebs on Security in record DDOS attack: Everybody’s go-to site for news and views of security issues, has been temporarily knocked offline in a DDOS attack for the record books. We first heard about the attack on Thursday morning after Brian Krebs reported that his site was being hit by as much as 620 Gbs, more than double the previous record which was considered to be a mind-blower back in 2013 when the anti-spam site Spamhaus was brought to its knees.

Security sites such as Krebs’ that perform investigative research into security issues are often targets of the bad guys. In this latest case, Ars Technica reported the attack came after Krebs published the identity of people connected with vDOS, Israeli black hats who launched DDOS attacks for pay and took in $600,000 in two years doing so. Akamai had been donating DDoS mitigation services to Krebs, but by 4 p.m. on the day the attack began they withdrew the service, motivated by the high cost of defending against such a massive attack. At this point, Krebs decided to shut down his site.

Opera’s free VPN: When Opera announced the release of Opera 40 on Monday, we didn’t pay much attention because we don’t generally care much about proprietary software, especially in an area like browsers where there’s more than enough FOSS and OSS to go around. But we started paying attention when we discovered that the new Opera comes complete with use of a “free, unlimited, no-log browser VPN service” for anonymous browsing, which can be toggled on and off from within the browser.

What I’m hoping is that the folks at Mozilla are paying attention. They certainly have enough bucks on hand to launch a robust public VPN...


FF1989: Grootlore "IndyWatch Feed Tech"

Grootlore #1-2
Grootlore volume 2 #1-3

By Peter Gullerud.

I’ve always known that Kim Thompson was the one of the two Fantagraphics owners who’s into anthropomorphics, but I wasn’t aware that it was so clear-cut: Anything funny-animal (Critters) or European(ish) (Sinner) is edited by Kim Thompson, and anything sci-fi-ish (Threat) or art (Flash Marks) is edited by Gary Groth.

Since this book is edited by Thompson, and the author isn’t European (despite the name), it’s anthropomorphic.

The first Grootlore series opens with a two-pager that explain the origins of the series (that Gullerud is an animator who’s doing this to relax).

The first series consists of strips (printed sideways) in a very traditional one-joke-per-strip format. The humour is a bit sitcom-ish. If you found those two jokes funny, there’s 37 more pages of it in this two-issue mini-series.

The second series is in a traditional comic book format, and is not joke-driven. Instead it’s about our heroes trying to save a rain forest from being destroyed.

Lots of oddly shaped panels with strangely big speech balloons with strangely large lettering.

There’s also a lack of differentiation visually between … well, anything. At a glance it’s often difficult to pick out the characters from the background, and everything seems to have the same greyness level. Even the text can be hard to pick out at times. My eyes were skidding around on the pages a lot.

Gullerud doesn’t seem to have published many comics after this, but is still an active artist.

This post is part of the Fantagraphics Floppies series.


FF1989: Teaser and the Blacksmith "IndyWatch Feed Tech"

Teaser and the Blacksmith by Timothy H. Glass.

This is a very strange comic book by a New Zealander called Timothy H. Glass. I don’t know whether that’s his real name: I could well understand it if whoever created this would want to do so under a pseudonym.

It seems to genuinely be from Australia or New Zealand, though, based on the sometimes barely comprehensible patter. It’s about the god Pan taking possession of that boy’s penis (it can sing and it’s pretty large), and I think owning this comic book may well be illegal in most jurisdictions. (I hope buying this book for this article series didn’t land me in any registries.)

But here’s a non-illegal page. I think it’s the only time I’ve seen adding arrows between panels make reading even more confusing that it normally would be, since the progression the arrows give is the one you would otherwise have read it, anyway.

It’s a pretty confused and confusing book. The artwork has a certain Howard Cruse-like charm, but the story-lines in the book are just… weird. And not in a good way.

To conclude: Ermn?

This post is part of the Fantagraphics Floppies series.


Wayland 1.13 Is Open For Development "IndyWatch Feed Tech"

Following this week's Wayland/Weston 1.12 release, Wayland 1.13 and the reference Weston 1.13 compositor are now open for development...


Google to Launch its Own Wi-Fi Router (Again!) "IndyWatch Feed Tech"

Over a year after releasing a neglected Wi-Fi router, Google is preparing to release a brand new router called Google Wi-Fi:

OnHub-schmonhub: two sources are now telling us that Google will introduce an own-brand Wi-Fi router called Google Wifi, and that the device will cost $129. A source that has proved reliable in the past has told us that the device will be launched alongside Google's Pixel phones, Google Home, and the 4K 'Chromecast Ultra' on October 4th.

Chromecast Ultra could be a good device for installing Kodi on, although it will cost more than previous generations ($69 vs. $35). The device will reportedly have support for high dynamic range (HDR) video.

Original Submission

Read more of this story at SoylentNews.


Stable kernel updates 4.7.5 and 4.4.22 "IndyWatch Feed Tech"

The 4.7.5 and 4.4.22 stable kernel updates are available. These are relatively large updates containing the usual important fixes.


Artificial Skylight Brings Sunlight To Any Room "IndyWatch Feed Tech"

Humans aren’t supposed to be cooped up indoors all day, but who wants to be bothered by UV rays, insects, allergens, traffic, physical activity, and other people? On the other hand, a gloomy living space generally inhibits productivity — if not making it difficult to find what you’re looking for. So, if you’re looking to illuminate any room in your place, and you have the cash and the patience to wait for its widespread release, CoeLux is a skylight that needs no sky or sun — not that you’ll be able to tell the difference.

The Italian developers [CoeLux Srl] are perhaps wisely remaining tight-lipped on how the effect is achieved, but confirm that nanoparticles in the skylight mimic the effect of atmospheric fluctuations, compressing that vast deep blue into a few milimetres while maintaining the perception of infinite depth.

Walking inside on a rainy day only to find the sun gleaming down on you would add a reality-bending touch to any space — especially a basement workshop or recreation room; to that end, the designers hope this will facilitate underground ‘earthscraper’ developments. At present, CoeLux has three lighting settings — tropical, mediterranean, and Nordic — but it’s not much of a stretch to imagine it could one day simulate any weather at any point on earth.

If in the meantime you’re stuck with a more traditional chandelier, check out this winch that will facilitate the process of changing any burt bulbs. If you are building a silo and need to further trick your captives vault dwellers try building one of these elevators.

Filed under: home hacks, led hacks


The Ongoing Work Of Nouveau Power Management / Re-Clocking "IndyWatch Feed Tech"

In addition to the Nouveau status update talk at XDC2016, Nouveau contributor Karol Herbst had carried out an additional presentation on Friday dedicated to this open-source NVIDIA driver's work on power management and re-clocking...


CVE Request: irssi: information disclosure vulnerabilit in "IndyWatch Feed Tech"

Posted by Salvatore Bonaccorso on Sep 24


An information disclosure vulnerability in the script provided
by irssi, a terminal based IRC client has been found. Quoting the
advisory at:


Upstream fix:

Debian Bug report:

Could a CVE be assigned for this issue?



Libreboot Drama Continues, GNU Might Keep The Project "IndyWatch Feed Tech"

It's been one week since the Libreboot downstream of Coreboot announced it would leave the GNU and denounced the FSF over supposedly a transgendered individual having been fired by the this free software group. Both Richard Stallman and the FSF denounced these claims made by Libreboot maintainer Leah Rowe. Since then, no actual proof has been presented to back up these claims by the Libreboot maintainer but the drama around it has seemingly continued...


Satellite Hacking: Star Wars Could be a Reality in the Near Future "IndyWatch Feed Tech"

By Waqas

Could Hacking of Satellites Bring World Closer to A Star-Wars

This is a post from Read the original post: Satellite Hacking: Star Wars Could be a Reality in the Near Future


GDB Continues Improving, libstdc++ Is Doing Well On C++17 & More "IndyWatch Feed Tech"

At the GNU Tools Cauldron earlier this month in the UK there was a presentation on forthcoming improvements to the GNU Tools, presented by Nick Clifton as part of the Red Hat Tools Team...


Melatonin Controls the Singing of Midshipman Fish "IndyWatch Feed Tech"

The singing of midshipman fish is linked to the melatonin cycle:

The researchers found the singing was controlled by a hormone that helps humans to sleep - melatonin. And looking more closely at how melatonin acts on receptors in different parts of the fish's brain could help explain why it is such a powerful "chemical clock" with a role in the timing of sleep-wake cycles, reproduction and birdsong. Prof Andrew Bass, who led the research, said his curiosity about midshipman fish had been piqued by a paper written in 1924 by an academic called Charles Greene, which described how the male fish would hum at night.

[...] To find out if the humming was controlled by an internal clock, or circadian rhythm, the team first kept a group of midshipman fish in constant light. This almost completely suppressed their humming. "But when [we gave the fish] a melatonin substitute," said Prof Bass, "they continued to hum, though at random times of day without a rhythm. "Melatonin essentially acted as a 'go' signal for the midshipman's nocturnal calling."

Original Submission

Read more of this story at SoylentNews.


The Student Working On "Soft" FP64 Support Is Good News For Older GPUs "IndyWatch Feed Tech"

This summer the student developer Elie Tournier participated in Google Summer of Code to develop a "soft" double-precision floating-point library for Mesa. While GSoC is past, it appears he is committed to seeing this library through and getting into Mesa. With potential soft/emulated ARB_gpu_shader_fp64 support, this could be good news for those GPUs lacking real double precision support...


The Mesa On-Disk Shader Cache Has Been Revised Again (V5) "IndyWatch Feed Tech"

Timothy Arceri of Collabora has revised his massive patch-set that implements an on-disk shader cache for the Intel open-source driver...


Questions For The Candidates "IndyWatch Feed Tech"

The New York Times has an article asking readers to select (from their list) what questions they'd like to ask the 2016 presidential candidates.

It's clear that both candidates haven't given specific answers to questions about issues which directly affect us. What questions would Soylentils ask the candidates (your choices, not mine as in the NYT article) to identify their positions on issues which matter to you?

Some of the questions I'd like to see answered are:
How would you work with a Congress which isn't aligned with the goals of your administration to actually get something accomplished?
Does money equal speech? If so/not so, why and how?
How will you rein in our intelligence agencies that are unconstitutionally spying on U.S. citizens?
What specific steps would you take (if any) to combat anthropogenic climate change?
Would you allow non-American foods to be cooked in the White House kitchen? If not, what steps will you take to reduce the obesity problem that will inevitably ensue?

What about the rest of you? What questions would you like to see answered by the candidates?

Original Submission

Read more of this story at SoylentNews.


Now is the Golden Age of Artisanal, Non-Traditional Tube Amps "IndyWatch Feed Tech"

Earlier in the month, [Elliot Williams] quipped that it had been far too long since we saw a VFD-based amplifier build. Well, that dry spell is over. This week, [kodera2t] started showing off his design for a VFD headphone amp.

Here’s the thing, this isn’t using old surplus vacuum fluorescent displays. This is actually a new part. We first covered it about 18 months ago when Korg and Noritake announced the NuTube. It’s the VFD form factor you would find in old stereo and lab equipment, but housed in the familiar glass case is a triode specifically designed for that purpose.

Check out [kodera2t’s] video below where he walks through the schematic for his amplifier. Since making that video he has populated the boards and taken it for a spin — no video of that yet but we’re going to keep a watchful eye for a follow-up. Since these parts can be reliably sourced he’s even planning to sell it in his Tindie store. If you want to play around with this new tube that’s a pretty easy way to get the tube and support hardware all in one shot. This is not a hack, it’s being used for exactly what Korg and Noritake designed it to do, but we hope to see a few of these kits hacked for specific tastes in amp design. If you do that (or any other VFD hacking) we want to hear about it!

And now for the litany of non-traditional VFD amps we’ve grown to love. There is the Nixie amp where [Elliot] made the quip I mentioned above, here’s an old radio VFD amp project, in this one a VCR was the donor, and this from wayback that gives a great background on how this all works.

Filed under: classic hacks, digital audio hacks


Hacker Interviews – Anonrising freesec "IndyWatch Feed Tech"

Today we will speak with Anonrising freesec, a hacker that is very active online and that is also fighting online terrorism.


You are a talented hacker that has already participated in several hacking campaigns, could you tell me more about you.

Sure, I’ve been working with OPDdosISIS mainly against ISIS, taking sites down (2013-2015) also Im working on OPAnonHQ, which is against the huge amount of profit they make with the anonymous idea, since they need about 200.000 dollars a year to run the servers (confirmed stats below)

  • Purchase/Sale Value: $452,520 USD
  • Daily Revenue: $1,240 USD
  • Monthly Revenue: $37,734 USD
  • Yearly Revenue: $452,510 USD
  • Daily Unique Visitors: 261,001
  • Monthly Unique Visitors: 7,944,048
  • Yearly Unique Visitors: 95,265,365

OpWhales, OpKillingBay-EU, OpSeaWorld – For this operations, we provide network support via creating media and assisting and bringing sites offline.

Op Gabon – To support Gabon population, by bringing websites offline and spreading awareness through the social media .

Op NoDapl – As AnonRising/Risingsquad we provided media mirrors and IRC support for this operation and shared awareness via other social media platforms.

And many more OPS which are still going on.

Could you tell me which his your technical background and when you started hacking?

started hacking in 2012-2013, before that I was just playing around with computers and networks, my technical background is mainly based on the knowledge of programming techniques and languages (e.g. Perl, PHP and Python) which are growing day by day. Hacking server/site exploiting common vulnerabilities such as Sqli, RFI, XSS, using certain exploits, and learning other methods everyday :). Of course, I have a deep knowledge of DDoS/DoS mainly on layer 3/7, I sue  heavily modified scripts to launch the attack, one in particular, was developed by Korrupt.

Which are your motivations?

Stop online terrorism, and just learn more and more everyday. And just have fun doing what you do or learn

What was your greatest hacking challenge?

Every hack is a new challenge for me/us, you will always have to find other ways to evade detection of defensive measures, and mostly you can`t use the same hack/exploit twice.

Which was your latest hack? Can you describe me it?

It is still going on, against...


US House Report on Snowden is "Mostly Lies" "IndyWatch Feed Tech"

National Whistleblower reports

House Intel Claim that Snowden Had Whistleblower Protection Is False and Misleading

In a brief 3-page report[PDF] dated September 15, 2016, the House Intelligence Committee concluded that Edward Snowden "was not a whistleblower" because there were "laws and regulations in effect at the time" that "afforded him protection" and he failed to exercise those whistleblower rights.  The Committee report specifically cited the Intelligence Community Whistleblower Protection Act of 1998 (IC WPA) that does permit employees, like Snowden, to make disclosures of wrongdoing to Congress if certain other conditions are met.

However, the House Intel Committee failed to state the obvious. That the IC WPA contains no whistleblower protections whatsoever if an employee were to exercise the right to disclose information about agency wrongdoing to Congress.

To make matters worse, the House Intel Committee report made the unsupportable claim that the IC WPA "affords" national security whistleblowers "with critical protections". Indeed, it is well known that claim is not true. As a result, the House Intel Committee's claim of whistleblower protection for national security employees, like Snowden, is knowingly false and entirely misleading.

U.S. News & World Report says

Snowden-Slamming Lawmakers Accused of Embarrassing Errors in Report

A three-time Pulitzer Prize-winning journalist says the House Intelligence Committee made surprisingly erroneous claims in the three-page executive summary of a report that denounces exiled whistleblower Edward Snowden.

The summary asserts that Snowden caused "tremendous damage to national security" and is "a serial exaggerator and fabricator." The full and unreleased report, 36 pages, was unanimously adopted last week after two years of work, says a committee release.

Barton Gellman, the former Washington Post journalist who first reported some of the most explosive 2013 Snowden revelations about mass surveillance, says two details in the committee summary are demonstrably false and others arguably so.

"A close review of Snowden's official employment records and submissions reveals a pattern of intentional lying", the committee summary says before detailing alleged lies.

Mike Masnick at TechDirt says

House Intelligence Committee's List Of 'Snowden's Lies' Almost Entirely False

So, last week, I wrote up a long analysis of the House Intelligence Committee's ridiculous smear campaign against Ed Snowden, highlighting a bunch of misleading to false statements that the report made in trying to undermine Snowden's credibility as he seeks a pardon from President Obama. The Committee insisted that it had spent...


Obama Used a Pseudonym in Emails with Clinton, FBI Documents Reveal "IndyWatch Feed Tech"

Via: Politico: President Barack Obama used a pseudonym in email communications with Hillary Clinton and others, according to FBI records made public Friday. The disclosure came as the FBI released its second batch of documents from its investigation into Clinton’s private email server during her tenure as secretary of state. The 189 pages the bureau […]


Still Not Even Wrong "IndyWatch Feed Tech"

A while back Tushna Commissariat of Physics World came to talk with me at Columbia, partly to discuss the topic of “Not Even Wrong, ten years later”, and that has now been turned into a podcast available as Still Not Even Wrong.

I’ve now forgotten what I said then, but presumably I still agree with it. This coming week I’m traveling and won’t have much time to deal with the blog, so comments from me may be few and far between.


Hacker Who Helped ISIS to Build 'Hit List' Of US Military Personnel Jailed for 20 Years "IndyWatch Feed Tech"

A computer hacker who allegedly helped the terrorist organization ISIS by handing over data for 1,351 US government and military personnel has been sentenced to 20 years in a U.S. prison. Ardit Ferizi, aka Th3Dir3ctorY, from Kosovo was sentenced in federal court in Alexandria, for "providing material support to the Islamic State of Iraq and the Levant (ISIL) and accessing a protected computer


Cyber crooks focus on the future as ATM Biometric Skimmers go on Sale "IndyWatch Feed Tech"

Kaspersky Lab presented an investigation on the future of ATM Biometric Skimmers and how cybercriminals could exploit them.

A recent investigation by Kaspersky Labs reports that a number of underground sellers are offering skimmers, which have the capability of stealing users biometric data such as fingerprints. A number of others are researching iris scanning and palm vein recognition systems.

With a number of banks looking to introduce fingerprint-reading technology into their ATMs, Cyber Criminals are looking to stay ahead of the curve by cashing in on exploiting these systems before they make it to general release.

With the inherent weaknesses in PIN and password based authentication, biometrics looks to take over as the most prominent authentication type in the near future.

Biometric skimmers first made their appearance in September of last year, however, due to a number of technical limitations and bugs including the slow data transfer rates of biometric over GSM impacting the functionality, progress was quickly stalled.

This generation of the technology, however, is proving to be more effective and faster.

“The problem with biometrics is that unlike passwords or pin codes, which can be easily modified in the event of compromise, it is impossible to change your fingerprint or iris image. Thus, if your data is compromised once, it won’t be safe to use that authentication method again. That is why it is extremely important to keep such data secure and transmit it in a secure way.” explained Olga Kochetova, a security expert at Kaspersky Labs. 

“Biometric data is also recorded in modern passports – called e-passports – and visas. So, if an attacker steals an e-passport, they don’t just possess the document, but also that person’s biometric data. They have stolen a person’s identity.”


Discussions have also been seen online where would be scammers are looking into mobile applications that use masks worn over they would be criminals face in order to fool facial recognition systems.

Although these techniques are more advanced than the current malware and ransomware attacks that are so prevalent against today’s Internet banking technologies, Kaspersky Labs also commented that it did not expect to see many of the more traditional methods abates.

Below a video PoC of an ATM attack.

It’s expected that exploiting biometric authentication will just be added to the banking scammers arsenal.

Enjoy the re...


Cracking Apple iOS 10 Backup Encryption is now 2,500 times faster "IndyWatch Feed Tech"

Experts from Elcomsoft discovered a new vector of attack to access password-protected local backups produced by iOS 10 devices.

According to security experts from the computer forensics company Elcomsoft, Apple has weakened the backup security protection of its recently-issued iOS 10 skipping certain security checks. This means that hackers could easily crack password protection used to protect the backups of iOS devices that are stored on Macs and PCs.

“We discovered a major security flaw in the iOS 10 backup protection mechanism. This security flaw allowed us developing a new attack that is able to bypass certain security checks when enumerating passwords protecting local (iTunes) backups made by iOS 10 devices.” reads a blog post published by Elcomsoft.


The researchers reported the presence of a security hole that opens the door for a new type of iOS brute-force password attack.

“We looked into it, and found out that the new mechanism (in iOS 10) skips certain security checks, allowing us to try passwords approximately 2,500 times faster compared to the old mechanism used in iOS 9 and older,” continues the post.

Apple has downgraded the hashing algorithm for iOS 10 from “PBKDF2 SHA-1 with 10,000 iterations” to“plain SHA256 with a single iteration.” With this premise, an attacker can brute-force the password via a standard desktop computer processor faster.

PBKDF2 (Password-Based Key Derivation Function) leverages on a SHA-1 hash with thousands of password iterations, making it hard the password cracking.

In iOS 9 and prior versions back to iOS 4, Apple was using the PBKDF2 function to generate the final crypto key using a pseudorandom function (PRF) 10,000 times (password iterations).

In a real attack scenario, hackers need to have a local or remote access to the machine where the Apple backup is stored, then crack it by running a brute-force attack.

The experts explained that the new security checks implemented by Apple allow 2,500 times faster brute force attacks compared to the old one that was used in iOS 9 backups.

Below data related to brute-force attacks reported by Elcomsoft:

  • iOS 9 (CPU): 2,400 passwords per second (Intel i5)
  • iOS 9 (GPU): 150,000 passwords per second (NVIDIA GTX 1080)
  • iOS 10 (CPU): 6,000,000 passwords per second (Intel i5)

Elcomsoft confirmed that the password hole could be exploited to gain access to Apple Keychain. iOS 10 backups allow a hacker to extract and decrypt Keychain data.

“Keychain contains information such as saved passwords or authentication tokens to applications requesting secure storage for authentication credentials, Safari logins and passwords, credit card information, Wi-Fi network information, and any data that third-party app developer consider worthy of extra protection.” states the post about the Keychain.

Users can download the Elcomsoft Phone Breaker 6.10 that comes with 6 million passwords per second (CPU only) for iOS 10 backups.



German Library Claims Copyright on “Nazi Anthem,” Censors Documentary on YouTube "IndyWatch Feed Tech"

docudownWhen it comes to Nazi propaganda, Germany has an extensive censorship track record. After the Second World War it was policy to ban all Nazi propaganda, most famously Hitler’s Mein Kampf.

Even today the issue is still a hot topic. For example, earlier this week our attention was drawn towards a rather unusual censorship effort on behalf of the German National Library.

With help from BR:Enter Music, the Deutsche Nationalbibliothek sent a takedown request to YouTube, targeting the historical 2006 documentary You Don’t Know Hitler.

The film in question serves as a reminder of the horrors Hitler brought forth. It is composed of historical material and other propaganda footage, including clips from Leni Riefenstahl’s 1935 film Triumph of the Will.

Documentarian and filmmaker James K. Lambert informs TorrentFreak that this is not the first time that his film has been targeted, but usually these claims are dropped when he protests them.

“The complete film has been posted for nearly four years and I periodically get claims against me from companies who say they own this sound recording or that image. These false claims were always dropped once I pushed back.”

Copyright claim

This time, however, that was not enough. The National German Library insists that the film infringes on their rights and as a result the filmmaker has been slapped with a copyright strike.

While it seems strange that the German state would own the rights to a 87-year-old song it didn’t produce, the issue is a bit of a minefield. Over the years, Germany has indeed obtained the copyrights to a lot of Nazi propaganda, some of which are still enforceable today.

On the other hand, there is a long history of denying Nazi copyrights or permitting its use, starting with the US Government which sanctioned it in Frank Capra’s counter propaganda series Why We Fight.

What’s clear, however, is that after all these years Nazi copyrights are still being enforced. This is something Lambert is fiercely protesting. According to the documentarian, people have the right to see history for what it was.

“Nazi propaganda is part of the criminal record of their Crimes Against Humanity; they are not marketable commodities that should exclusively belong to anyone,” Lambert tells us.

To get his documentary reinstated Lambert submitted a counter-notice which he documented in detail in a lengthy blog post. According to Lambert the song he used is in the public domain and even if it isn’t, it would fall under...


AT&T "Nears First Field Trials" for Millimetre-wave Network "IndyWatch Feed Tech"

A post on AT&T's corporate blog announced its Project AirGig, which would entail the use of power lines to carry millimetre-wave signals between stations that provide Internet access.

AT&T* unveiled today Project AirGig, a transformative technology from AT&T Labs that could one day deliver low-cost, multi-gigabit wireless internet speeds using power lines. We're deep in the experimentation phase. This technology will be easier to deploy than fiber, can run over license-free spectrum and can deliver ultra-fast wireless connectivity to any home or handheld wireless device. We designed Project AirGig literally from the ground up to be both practical and transformational. Our initial and ongoing testing at AT&T outdoor facilities has been positive. We expect to kick off our first field trials in 2017.

"Project AirGig has tremendous potential to transform internet access globally – well beyond our current broadband footprint and not just in the United States," said John Donovan, chief strategy officer and group president, Technology and Operations, AT&T. "The results we've seen from our outdoor labs testing have been encouraging, especially as you think about where we're heading in a 5G world. To that end, we're looking at the right global location to trial this new technology next year."

PC Magazine
Computer World

Original Submission

Read more of this story at SoylentNews.


Google WiFi Router — Combine Multiple Routers to Boost WiFi Signal "IndyWatch Feed Tech"

Can you rely on a single loudspeaker in your living room for great sound throughout your home? Nah! In the same way, you can not expect a single WiFi router to provide stable range throughout your home. To solve this issue, Google will soon power your home's wireless internet network with its own-brand new WiFi router called Google WiFi, according to a new report. Google is


E-Cigarettes May Have Helped 18,000 People Quit Smoking Last Year "IndyWatch Feed Tech"

I suspected that this would be the case and here we are confirming just that.  It is good news.
Converting to e cigs eliminates the bulk of the direct health risk while also making it easier to actually quit.  It does not get better than that. 

I know i will not sec the last smokers out there.  However, making it easier to stay healthy and easier to quit will keep the down trend moving along..

E-Cigarettes May Have Helped 18,000 People Quit Smoking Last Year
As more people used e-cigarettes, they were more successful at quitting.

09/14/2016 11:41 am ET

By Kate Kelland

LONDON (Reuters) - Electronic cigarettes may have helped about 18,000 people in England to give up smoking last year and there is no evidence of any serious side effects associated with their use for up to two years, according to studies published on Tuesday.

Researchers at University College London (UCL) analyzed the latest data on smoking and quitting in England - including details on smokers who worked with the health-worker devised Stop Smoking Services to set a quit date.

While they found no direct evidence that e-cigarettes prompted more people to make the decision to try to quit, the team did find that as more people used e-cigarettes, more people also successfully stopped smoking.

In a separate scientific analysis also published on Tuesday, researchers at the Cochrane Review found that the overall weight of evidence on e-cigarettes suggests they can help people stop smoking and have no serious side-effects.

E-cigarettes, which heat nicotine-laced liquid into vapor, have rapidly grown into a global market for “vaping” products that was estimated at around $7 billion in 2015.

Unlike nicotine chewing gum and patches, they mimic the experience of cigarette smoking because they are hand-held and generate a smoke-like vapor.

Tobacco smoking kills half of all those who indulge, plus at least another 600,000 non-smokers a year via second-hand smoke. This makes it the world’s biggest preventable killer, with a predicted death to...


How the Sugar Industry Shifted Blame to Fat "IndyWatch Feed Tech"

The shift in opinion has occurred in the ten years that i have been publishing this blog.  That ignoring sugar is nonsense becomes obvious when you look at the big statistical picture and i said as much early.  That industry paid researchers to obfuscate this connection is a huge setback for the credibility of all biological science.  Add in the mounting evidence of rampant use of manipulated science to support any convenient claim and all the commercially useful science becomes seriously suspect.

That we are already there does not mean that most are.  This is a new feeling for the public.  The result is the development of a massive blow - back that is challenging a lot of so called settled science as it applies to human health. 



The Free-Time Paradox in America "IndyWatch Feed Tech"


 Here is my cohort that ends poverty.  We start by guaranteeing a half shift every day consisting of four hours of work organized by the community.  If that ever runs out, then we groom woodlots to encourage superior forests.

It will get more sophisticated but that does not matter.  What matters is a simple protocol in the beginning to reveal the possibilities of a large pool of labor.

It is outrageous that young men are ever idle at all.  This is when strength and stamina is developed and useful skills as well.  And four hours leaves the entire day open to an additional eight hour shift or anything else....
The Free-Time Paradox in America

The rich were meant to have the most leisure time. The working poor were meant to have the least. The opposite is happening. Why?

Derek Thompson
Sep 13, 2016

"Every time I see it, that number blows my mind.”Erik Hurst, an economist at the University of Chicago, was delivering a speech at the Booth School of Business this June about the rise in leisure among young men who didn’t go to college. He told students that one “staggering” statistic stood above the rest. "In 2015, 22 percent of lower-skilled men [those without a college degree] aged 21 to 30 had not worked at all during the prior twelve months,” he said.

"Think about that for a second,” he went on. Twentysomething male high-school grads used to be the most dependable working cohort in America. Today one in five are now essentially idle. The employment rate of this group has fallen 10 percentage points just this century, and it has triggered a cultural, economic, and social decline. "These younger, lower-skilled men are now less likely to work, less likely to marry, and more likely to live with parents or close relatives,” he said.

So, what are are these young, non-working men doing with their time? Three quarters of their additional leisure time is spent with video games, Hurst’s research has shown. And these young men are happy—or, at least, they self-report higher satisfaction than this age group used to, even when its employment rate was 10 percentage points higher.

It is a relief to know that one can be poor, young, and unemployed, and yet fairly content with life; indeed, one of the hallmarks of a decent society is that it can make even poverty bearable. But the long-term prospects of these men may be even bleaker than their present. As Hurst and others have emphasized, these young men have disconnected from both the labor market and the dating pool. They are on track to grow up without spouses, families, or a work history. They may grow up to be rudderless middle-aged men, hovering around t...


Every Single Part of the Arctic is Becoming worse for Polar Bears "IndyWatch Feed Tech"

The bears are actually doing fine but no one asked them of course.  Our arctic warm spell is now ten years old.   It took tens years for the 1998 heat surge to knock back the ice to reach the 2007 low.  it then largely stabilized ...


Direct Observation of Graphene Decoupling On Cu(111) "IndyWatch Feed Tech"

A recent quantum mechanical study of graphene by a research team at Ulsan National Institute of Science and Technology (UNIST), South Korea, has elucidated the intercalation mechanism and pathways for graphene decoupling from the copper substrate.

The graphene films, grown on the copper (Cu) substrates must be detached clean without leaving residue behind, as residual metallic impurities can significantly alter electronic and electrochemical properties of graphene.
The difference between the armchair graphene nanoribbon (GNR) and zigzag GNR on the Cu(111) substrate, is distinguished by the presence of an edge state in the zigzag GNR edges, which has been attributed to the hybridization between the out-of-plane carbon π orbitals and the metal d orbitals. This edge state, however, is absent in the armchair GNR edge atoms. Such an observation has not been reported for H-terminated GNR on Cu(111).

Vibrational stretching mode calculations showed that the GNR edges influenced the molecular adsorption of oxygen at the bare and GNR/Cu sites, confirming the role of GNR edges in weakening the pre-elongated O-O bond at the GNR/Cu interface. The research team also explained that the GNR edges facilitated the stabilization of water molecules (regardless of surface oxygenation), which would otherwise be unstable on the bare Cu surface.

Precise control of graphene and carbon nanotube formation has been an ongoing challenge for their widespread adoption into production products.

Original Submission

Read more of this story at SoylentNews.


Choosing Public Service Locations via Local Concensus "IndyWatch Feed Tech"

A functioning society requires various public services, such as hospitals, schools, landfills, etc., but deciding where to build them can be a complicated and contentious issue. The cost to build them are typically shared across society in the form of taxes, and deciding where they go involves various optimizations and tradeoffs to maximize their impact on society while minimizing the cost to society. Optimizing this kind of decision making is an active research topic in the field of algorithmic and network game theory.

A very common approach is to address the issue from a centralized, top-down perspective whereby a city planner considers the network of society as a whole, and inputs the pros and cons into a global optimization algorithm to find a minimum cost solution. This approach is known to not provide the most optimal solution. Another approach is to let individual agents make decisions in best response to the choices of their neighbors. For instance, if a region can access a hospital in a neighboring region, then they would have little motivation to want to have a hospital built in their region; however if none of their neighbors have a hospital, then they would be more likely to be willing to have one built in their region. Although this sounds more appealing than the top-down approach, this approach is also known to not be very socially efficient.

Yi-Fan Sun and Hai-Jun Zhou from the Chinese Academy of Sciences have published an open access paper in Nature's Scientific Reports that considers a cooperative decision process where global decisions are made via local consensus.

Briefly speaking, the basic rules are that agents in need of service recommend their network neighbors of highest local impact (to be precisely defined later) as candidate service providers, and an agent may be chosen as a service provider only if all its non-server neighbors are happy with this appointment. This distributed selection mechanism does not require the global structural information of the system but only involves local-scale information exchange. Yet very encouragingly we find that it leads to socially efficient solutions with tax level approaching the lowest possible value.


Read more of this story at SoylentNews.


Microsoft and Sony's Emerging 4K Pissing Contest "IndyWatch Feed Tech"

Get ready to endlessly debate the value of "native 4K" on consoles

Sony's PlayStation 4 Pro (launching in November) and Microsoft's Xbox One Scorpio (launching late next year) are giving the pixel-counters out there a new, 4K-sized battlefield to fight over. Now, Microsoft is drawing a line in the sand in that developing battle, with Microsoft Studios Publishing General Manager Shannon Loftis telling USA Today that "any games we're making that we're launching in the Scorpio time frame, we're making sure they can natively render at 4K."

The word "natively" is important there, because there has been a lot of wiggle room when it comes to talking about what constitutes a truly "4K" game these days. For instance, according to developers Ars has talked to, many if not most games designed for the PS4 Pro will be rendered with an internal framebuffer that's larger than that for a 1080p game, but significantly smaller than the full 3840×2160 pixels on a 4K screen (the exact resolution for any PS4 Pro game will depend largely on how the developer prioritizes the frame rate and the level of detail in the scene). While the PS4 Pro can and does output a full 4K signal, it seems that only games with exceedingly simple graphics will be able to render at that resolution natively.

-- submitted from IRC

Original Submission

Read more of this story at SoylentNews.


Home-made Adjustable Knife Jig "IndyWatch Feed Tech"

When sharpening a knife, it is critical to have the knife at the right angle. A knife jig handles this for you, letting you focus on getting the edge right. You could just buy one, but where’s the fun in that? [origamimavin] decided to make his own adjustable knife jig using bits he bought from the hardware store for $27, and which you might have in your junk pile. Fortunately for us, he’s written up the process in excellent detail, explaining the how and why of each step.

He used a couple of tools that you might not have lying around (a bandsaw and a belt sander), but these could be easily replaced with their manual cousins, or your local hackerspace will doubtless provide you access to them. Either way, it’s a simple build which could help your knives keep their clean, sharp edge for years to come.

Filed under: repair hacks


NSA’s Failure to Report Shadow Broker Vulnerabilities Underscores Need for Oversight "IndyWatch Feed Tech"

In August, an entity calling itself the “Shadow Brokers” took the security world by surprise by publishing what appears to be a portion of the NSA’s hacking toolset. Government investigators now believe that the Shadow Brokers stole the cache of powerful NSA network exploitation tools from a computer located outside of the NSA’s network where they had been left accidentally, according to Reuters. A new detail, published for the first time in yesterday’s Reuters report, is that the NSA learned about the accidental exposure at or near the time it happened. The exploits, which showed up on the Shadow Brokers’ site last month, target widely used networking products produced by Cisco and Fortinet and rely on significant, previously unknown vulnerabilities or “zero days” in these products. The government has not officially confirmed that the files originated with the NSA, but the Intercept used documents provided by Edward Snowden to demonstrate links between the NSA and the Equation Group, which produced the exploits.

The Reuters story provides a partial answer to the most important question about the Shadow Brokers leak: why did the NSA seemingly withhold its knowledge of the Cisco and Fortinet zero days, among others, from the vendors? According to unnamed government sources investigating the matter, an NSA employee or contractor mistakenly left the exploits on a remote computer about three years ago, and the NSA learned about that mistake soon after. Because the agency was aware that the exploits had been exposed and were therefore vulnerable to theft by outsiders, it “tuned its sensors to detect use of any of the tools by other parties, especially foreign adversaries with strong cyber espionage operations, such as China and Russia.” Apparently finding no such evidence, the NSA sat on the underlying vulnerabilities until the Shadow Brokers posted them publicly.

But the NSA’s overconfidence should disturb us, as security researcher Nicholas Weaver points out. The “sensors” mentioned by Reuters are likely a non-technical reference to monitoring of the Internet backbone by the NSA under such authorities as Section 702 and Executive Order 12333, which could act as a form of Network Intrusion Detection System (NIDS). (The Department of Homeland Security also operates an NIDS called Einstein specifically to monitor government networks.) But Weaver explains that at least some of the exploits, including those that affected Cisco and Fortinet products, appear not to lend themselves to detection by outside monitoring since they operate within a target’s internal network. In other words, the NSA’s confidence that its surveillance tools weren’t being used by other actors might have been seriously misplaced.

The NSA’s decision not to disclose the Cisco and Fortinet vulnerabilities becomes even more questionable in light of the fact that some of the specific products affected had been approved by the Department of Defense’s Unified Capabilities (UC) Approved Products List (APL), which identifies equipment that can be used in DoD networks:...


Twitter Reportedly in Talks With Google, Salesforce for Potential Sale "IndyWatch Feed Tech"

Submitted via IRC for TheMightyBuzzard

Twitter is reportedly in conversation with a number of tech companies for a potential sale. According to CNBC, the social company is in talks with the likes of Google and cloud computing company...

The suiters [sic] courting Twitter are said to be interested in the data the company generates from its 313 million active users. However, sources say that, while conversations are ongoing and picking up steam, there's no assurance that a deal will be inked. As a result, Twitter's stocks have soared as high as 23 percent based on the news. Meanwhile, TechCrunch reports that the company has just lost two key staffers, including head of TV Andrew Adashek.


Original Submission

Read more of this story at SoylentNews.


Distribution Release: Apricity OS 09.2016 "IndyWatch Feed Tech"

Alex Gajewski has announced the availability of a new release of the Arch Linux-based Apricity OS. The new version, Apricity OS 09.2016, includes a few new features. This release includes builds for 64-bit and 32-bit computers. The new 32-bit builds use Firefox as the default web browser and....


From Audio, To 3D Printed Sculpture, And Back Again "IndyWatch Feed Tech"

Have you ever wondered what a song looks like? What it feels like in your hands?

Those odd questions have an answer that has taken shape over at [Reify], which has developed a way to turn sound waves into 3D-printed sculptures. These visualizations made manifest can be made from any audio — speeches, the ambience of a forest, classical music, a rocket launch — and rendered in coconut husk, plastic, bronze and more.

[Reify]  also works in reverse — they are developing software that allows the observer to scan the sculptures and play back the audio that created it. It’s not apparent from the video or the website how [Reify] generates the sculpture from the sound byte — and especially scanning it back into audio considering the internal structures appear to be relevant pieces from the clip.

We could wax poetic about how humans have stored data over the ages: how the the long wisdom of stones has given way to the impressions of electrons, so it’s compelling to see a different kind of solid-state data storage system come back into play. And who says old formats like vinyl are dead?

If you have a specific clip you want to see rendered at home, we featured one method a few months ago.

[via Colossal. Thanks for the tip Itay Ramot!]

Filed under: 3d Printer hacks, musical hacks


Pesticide Companies' Own Secret Tests Showed Their Products Harm Bees "IndyWatch Feed Tech"

Common Dreams reports

Agrochemical giants Syngenta and Bayer discovered in their own tests that their pesticides caused severe harm to bees, according to unpublished documents obtained through a Freedom of Information Act (FOIA) request by the environmental group Greenpeace.

The companies conducted the trials on products that used the controversial pesticides known as neonicotinoids, or neonics, which have long been linked to rapid bee decline. Neonics are also the world's most commonly used pesticide.

According to their own studies, Syngenta's thiamethoxam and Bayer's clothianidin were found to cause severe harm at high levels of use, although the effect was lessened when used under 50 parts per billion (ppb) and 40ppb respectively, the Guardian reports.

However, as Greenpeace notes, the research "assumes a very narrow definition of harm to bee health and ignores wild bees which evidence suggests are more likely to be harmed by neonicotinoids".

That means the findings may "substantially underestimate" the impact of neonics, Greenpeace said.

[...] the studies are not realistic. The bees were not exposed to the neonics that we know are in planting dust, water drunk by bees, and wildflowers wherever neonics are used as seed treatments. This secret evidence highlights the profound weakness of regulatory tests.

Our previous discussions about neonicotinoids.

Original Submission

Read more of this story at SoylentNews.

Go Back:30 Days | 7 Days | 2 Days | 1 Day

IndyWatch Science and Technology News Feed Today.

Go Forward:1 Day | 2 Days | 7 Days | 30 Days

Friday, 23 September


Top tech editor didn't disclose he was working for Apple "IndyWatch Feed Tech"

A deputy editor of tech news publication The Verge simultaneously worked for Apple for several months, but didn’t disclose that fact publicly or to his employers, The Verge’s editor in chief said Friday. Chris Ziegler accepted a job at Apple in...


FF1989: Fox Comics "IndyWatch Feed Tech"

Fox Comics Special
Fox Comics #24-27

Edited by David Vodicka.

The first twenty-three issues of Fox Comics were published in Australia, but they apparently wanted to get wider distribution by publishing through Fantagraphics. And that worked: Just see, I bought those issues.

I’ve been trying to find the Aussie-only issues over the years, and here’s the total result:

Yes, a grand total of three issues, but the editorial in the first Fantagraphics issue (which reprints stuff from the previous issues) helps explain why:

Yikes. If the first dozen issues had a print run of 200, the chances of me ever getting to read them seems pretty slim. The subsequent issues seem conceivable, though, even if they never seem to pop up on Ebay, in my experience. (Although searching for them there is pretty tricky, since there’s an American old published also called Fox Comics…)

Anyway, the editorial explains frankly about what the Australian comics scene was like in the 80s.

I re-read the three non-Fantagraphics issues I had, and it seemed like the magazine had taken a journey from being all funny all the time to try to also feature more ambitious and serious work. Lazarus Dobelsky and Ian Eddy’s work is in the former camp, but being funny isn’t all bad either, eh?

Dave Hodson’s oblique framing reminds me a lot of Rick Geary’s early work. The drawing styles are very different, but still there’s a similar eerie effect. It works very well.

But perhaps the most distinctive stylist here is Chloe Brookes-Kenworthy. In her strip in Fox Comics #13 she’s using traditional panel borders with gutters between the panels, but in her work in all the Fantagraphics issues, she drops the gutters, and later she also drops the panel borders themselves, just using obsessively different hatching in each panel to separate the panels.

Combined with sometimes ambiguous text (never dialogue) floating over the images, it gives it all a non-premediated feeling, like we’re connecting directly to her. It’s a very strange and ple...


DevOps for Pointy-Haired Bosses by Victoria Blessing, Texas A&M University "IndyWatch Feed Tech"

Victoria Blessing arms you with the basics of selling your boss on something, not only as it relates to DevOps, but in general.


GCC Preps ARMv8.2-A Support In Mainline "IndyWatch Feed Tech"

Landing in the mainline GCC compiler stack for next year's GCC 7.1 release is initial enablement on ARMv8.2-A support...


DDoS Against Brian Krebs Scores a Victory: KrebsOnSecurity is Offline "IndyWatch Feed Tech"

Akamai kicked journalist Brian Krebs' site off its servers after he was hit by a 'record' cyberattack is how Business Insider describes the ongoing DDoS (Distributed Denial of Service Attack) against Brian Krebs (currently offline; google cache). This is notable as Akamai was able to mitigate the effect of the record scale attack but has decided to end their service relationship with Krebs. Victory has currently been handed to the attackers: if the goal is to get Krebs' website off the Internet it has succeeded regardless of the mechanism. Despite being deleted off the Internet Krebs does not fault Akamai.

The really Interesting question is how long will it take for Krebs to return to operational status? Is there anyone else that will be willing to donate their mitigation services so Krebs can go back online? Is there any possible way he could afford to pay normal prices for mitigation services that could handle 600 gigabits per second of flooding? Exactly who do you have to piss off, how sophisticated do they need to be, and how long can they afford the risk involved with carrying out the attack? Free Speech for the Internet is going to be defined by how this plays out.

takyon: These cybercriminals are just going to get Krebs more attention and appearances in the mass media. Krebs expects his site to be back up later today. Also, it is important to note that Akamai/Prolexic provided Krebs free service.

Previously: Brian Krebs DDoSed After Exposing vDos Operators; Israeli Authorities Hit Back With Arrests
Brian Krebs' Blog Hit by 665 Gbps DDoS Attack

Original Submission

Read more of this story at SoylentNews.


Smart Watch Hack Lets You Use Your 3.5mm Headphones With An iPhone 7 "IndyWatch Feed Tech"

As you may have heard, the iPhone 7 is ditching the 3.5 mm headphone jack in the name of progress and courage. Whatever your take on that, it leaves the end user out in the cold if — for instance — their preferred headphones still use the old format. Here to save you from an untimely upgrade is YouTuber [Kedar Nimbalkar], who has modified a Bluetooth Smartwatch to incorporate a 3.5 mm jack to allow continued use your current headphones.

After opening up the smartwatch [Nimbalkar] removes the speaker, solders in a 3.5 mm headphone jack and clips out an opening in the watch’s case that maintains the watch’s sleek exterior.

This mod is a bit of a catch-22 — losing out on hearing any notifications from your phone unless your headphones are plugged in and in your ears, and you only get mono audio output using this method; some tinkering with the software might alleviate this issue. However practical this may be for you, workarounds like this one remind us that we can still achieve the functionality we want though innovative expertise. Challenge yourself!

If you want some even older-school audio output from your smart watch, 3D print a gramophone docking station.

Filed under: hardware


GNOME 3.22 Now Available On OpenSUSE Tumbleweed "IndyWatch Feed Tech"

If you are using openSUSE's Tumbleweed rolling-release Linux distribution, you now have access to the upstream GNOME 3.22 packages...


Microsoft Finally Retires Get Windows 10 "IndyWatch Feed Tech"

Finally, some good news for people who are determined to avoid the Windows 10 "upgrade". Microsoft has this week issued an update that removes the Get Windows 10 App and other software related to the the Windows 10 free update offer, which expired July 29, 2016. From a report on Redmond Channel Partner:

An update issued by Microsoft this week will delete the infamous "Get Windows App" from users' systems.

The Get Windows App (also known as the "GWX app") was a nag-ware-like popup that showed up on Windows 7 Service Pack 1 and Windows 8.1 desktops, prompting users to get a free upgrade to Windows 10. It hung around with that same message over a one-year period for those who didn't accept the offer. It took a lot of effort to make it go away.

The update that dispenses with the GWX app is labeled as "Knowledge Base article KB3184143." It became available through Windows Server Update Services as of Sept. 20, according to Microsoft's description article.

Original Submission

Read more of this story at SoylentNews.


Blizzard Suffers DDoS Attack; Servers Go Down.. AGAIN "IndyWatch Feed Tech"

By Agan Uzunovic

Blizzard servers are down that’s because they are under a

This is a post from Read the original post: Blizzard Suffers DDoS Attack; Servers Go Down.. AGAIN


The Nastiest of all Ransomware Mamba Encrypts Entire Hard Drive "IndyWatch Feed Tech"

By Waqas

Mamba ransomware is currently targeting Windows users in Brazil, India

This is a post from Read the original post: The Nastiest of all Ransomware Mamba Encrypts Entire Hard Drive


The Arduino Sleeps with the Fishes "IndyWatch Feed Tech"

[Eric Dirgahayu] wanted to explore underwater with some sensors and cameras. First, he needed a platform to carry them. That led to his Arduino-controlled swimming fish. The fish is made from PVC and some waterproof servos. From the video (see below) it isn’t clear how much control the fish has, but it does swim with an undulating motion like a real fish.

The included software allows for infrared control (so clean water is a must) and there is a ballast tank for buoyancy. The site has several videos and tabs that show different aspects of the project. We found the site a little difficult to navigate, so to help you out, you can go straight to the interesting bits of the construction. Here’s the electronics, too.

If you need a home for your robot fish, we’ve seen plenty of high-tech tanks. If you prefer your submersibles a little more futuristic, you can always try Star Trek.

Filed under: Arduino Hacks


Apple Weakens iOS 10 Backup Encryption; Now Can Be Cracked 2,500 Times Faster "IndyWatch Feed Tech"

After the iPhone encryption battle between Apple and the FBI, Apple was inspired to work toward making an unhackable future iPhones by implementing stronger security measures even the company can't hack. Even at that point the company hired one of the key developers of Signal — one of the world's most secure, encrypted messaging apps — its core security team to achieve this goal. But it


NVIDIA's Proposal For A New API Better Than GBM Has Already Made Some Progress "IndyWatch Feed Tech"

On the first day of the XDC2016 conference this week in Finland NVIDIA presented over their GBM vs. EGLStreams debate that's been ongoing for months with NVIDIA's lack of GBM API support by their driver being what's preventing the binary blob from working with current-generation Wayland compositors. In that session they called for a new community-driven API to suit the needs of device memory / surface allocation and could succeed the Generic Buffer Manager. By the end of XDC2016, some progress has already been made...


In the Wild, Goldfish Turn From Pet to Pest "IndyWatch Feed Tech"

The New York Times has a story that describes just how devastating it can be to an ecosystem to dispose of goldfish, "the most invasive aquatic species" in a river or stream.

Two decades ago, someone dropped a handful of unwanted pet goldfish into a creek in southwestern Australia. Those goldfish grew, swam downstream, mucked up waters wherever they went and spawned like mad. Before long, they took over the whole river.

Researchers from Murdoch University believe this scenario, or something like it, is the cause of a feral goldfish invasion in Australia's Vasse River. Since 2003, they have been running a goldfish tracking and control program that involves catching fish along the length of the river, freezing them to death and studying them in the lab. Despite this program, goldfish in the Vasse are thriving, with some fish growing as long as 16 inches and weighing up to four pounds — the size of a two-liter soda bottle.

The article contains some insightful information as to how to get rid of unwanted goldfish:

The best strategy is to give healthy fish away, to a responsible aquarium, pet store or hobbyist.... In Florida, the Fish and Wildlife Conservation Commission takes unwanted exotic pets off people's hands on regularly scheduled amnesty days.

If your fish is sick, the most humane way to kill it is probably to put it in an ice slurry. As for whether you should flush your fish down the toilet, experts recommend against it. Not only is there a slight chance your fish could survive a journey through the septic system and end up in the wild, but, in general, it's just not a very pleasant way to say goodbye to Bubbles.

I have a couple alternate solutions. First, tropical lion fish love goldfish, as I learned in a middle school science class. Second, goldfish are edible. Think about that the next time you complain about the price of fish!

Original Submission

Read more of this story at SoylentNews.


OpenSolaris-Derived Illumos Switching Away From GRUB 0.97 To A New Bootloader "IndyWatch Feed Tech"

The OpenSolaris-derived Illumos project is rolling out its new bootloader project to use on new systems in place of its old GRUB (v0.97) legacy bootloader...


Mexican Police Target Popular KickassTorrents ‘Clone,’ Seize Domain "IndyWatch Feed Tech"

kickasstorrents_500x500Two months ago KickassTorrents (KAT) was shut down by the U.S. Government, following the arrest of the site’s alleged owner.

Soon after the official site went offline various mirrors and clones launched to take its place, to the pleasure of hundreds of thousands of users.

One of the most popular mirrors started as While this domain name was swiftly seized, and later picked up by scammers, the initial site continued to operate from and

However, this week the site got in trouble again. Without prior notice the .MX domain name was taken out of circulation by the registry, following an intervention from Mexico’s federal police.

The authorities say they were tipped off by copyright holders and wasted no time in containing the threat.

“This action took place after various distribution companies reported intellectual property infringements. In response, staff at the Center for Prevention of Electronic Crimes started a cyber intelligence operation to locate the source where this crime was committed,” the federal police reported.

“Currently the website is out of service, and our research continues to locate the administrators,” they added.

Although there is no doubt that is offline, in a rather confusing press release police keep referring to, which appears to be an unrelated website.

TorrentFreak reached out to the operator of the “clone,” which is really just a Pirate Bay mirror with a KickassTorrents skin, who was surprised by the domain seizure.

“The suspension of the MX TLD was very unexpected and came as a shock to us because we used EasyDNS to register the domain name,” the operator says.

EasyDNS has a track record of standing up against domain seizures and suspensions that are requested without a proper court order. However, in this case EasyDNS was bypassed as the police went directly to the MX domain registry.

“Their team is trying to get into touch with the Mexican registry to get the domain back though any positive development in this regard seems unlikely,” the operator adds.

For now, the KAT-themed site remains available from the domain and more backup domains are expected to follow in the near future, probably without Mexican ties.

“We already have three more TLDs and plan to set up mirror sites on them to increase resilience,” he concludes.

Source: TF, for the latest info on copyright, file-sharing, torrent sites and ANONYMOUS VPN services.


Creating A PCB In Everything: Eagle, Part 2 "IndyWatch Feed Tech"

In the last (and first) post in this series, we took a look at Eagle. Specifically, we learned how to create a custom part in Eagle. Our goal isn’t just to make our own parts in Eagle, we want to make schematics, boards, and eventually solder a few PCBs.

The board we’ll be making, like all of the boards made in this Creating A PCB In Everything series, is the Nanite Wesley, a small USB development platform based on the ATtiny85. This board has less than a dozen parts, most of which are through-hole. This is the simplest PCB I can imagine that has sufficient complexity to demonstrate how to make a board.

With that said, let’s get onto the second part of our Eagle tutorial and lay out our circuit board.

The Eagle Workflow

Although this guide to making a PCB in Eagle began with making a part, this obviously isn’t the usual workflow. Hundreds of libraries for almost every part you can imagine already exist, including the fantastic Sparkfun libraries, the Adafruit libraries, Dangerous Prototypes, and Seeed’s Open Parts Library for Eagle. In these libraries, or elsewhere on the Internet, you’ll be able to find just about every part you could possibly need.

The general overview of how to create a board in Eagle is to first create a schematic. This schematic will contain all the parts you’re going to use in your project and all the connections between these parts. After the schematic is complete, we then create the board. The board is the physical representation of a PCB, with parts,  pads, and traces. This board file can be sent off to any of the usual board houses (OSHpark, Seeed, or DirtyPCBs), and in a week or two, a pile of printed circuit boards will arrive in your mailbox.

Getting Started

To create a schematic, open Eagle, and select File -> New -> Schematic ...


Five takeaways from the new driverless car guidelines "IndyWatch Feed Tech"

The White House unveiled highly anticipated guidelines this week that establish the first-ever national framework for the operation and deployment of self-driving vehicles. The guidance is seen as a major step toward getting autonomous vehicles on...


TV Manufacturers Get their Own Dieselgate Over Power Consumption Tests "IndyWatch Feed Tech"

El Reg reports

The NRDC [Natural Resources Defense Council] reckons TV makers are configuring sets to perform well on government tests, while in the living room they become energy hogs.

Its specific claims are:

  • The TVs perform well on the US Department of Energy-mandated energy use test--but that's based on a clip that doesn't match real-world video content. ([To El Reg,] that seems like a slip-up by the DoE);
  • TVs from Samsung, LG, and Vizio are designed to disable energy-saving features if the user changes their screen settings, but there's little or no warning about this. This, the NRDC says, can as much as double the power consumption; and
  • UHD TVs turn into energy hogs when they're playing high dynamic range (HDR) content, but HDR isn't included in the DoE's test (again, surely that means the DoE needs to update its tests?).

The NRDC says European testing seemed to match another observation it made: that during the DOE test loop, some TVs seemed to exhibit "inexplicable and sustained drops in energy use". It suggests that software is specifically detecting the test loop and adjusting the TV's performance to suit.

One assumes that "a clip" refers to the standard video loop used in the tests.

Original Submission

Read more of this story at SoylentNews.


Mitchell: The MIT License, Line by Line "IndyWatch Feed Tech"

At his blog, Kyle E. Mitchell ("who is not your attorney") takes a close, line-by-line reading of the popular MIT software license. The details he points out begin on line one with the license's title: "'The MIT License' is a not a single license, but a family of license forms derived from language prepared for releases from the Massachusetts Institute of Technology. It has seen a lot of changes over the years, both for the original projects that used it, and also as a model for other projects. The Fedora Project maintains a kind of cabinet of MIT license curiosities, with insipid variations preserved in plain text like anatomical specimens in formaldehyde, tracing a wayward kind of evolution."

Despite the license being only 171 words, Mitchell finds quite a bit to expand on, such as the ambiguities of the phrase "to deal in the Software without restriction": "As a result of this mishmash of legal, industry, general-intellectual-property, and general-use terms, it isn’t clear whether The MIT License includes a patent license. The general language 'deal in' and some of the example verbs, especially 'use', point toward a patent license, albeit a very unclear one. The fact that the license comes from the copyright holder, who may or may not have patent rights in inventions in the software, as well as most of the example verbs and the definition of 'the Software' itself, all point strongly toward a copyright license." Nevertheless, Mitchell notes, "despite some crusty verbiage and lawyerly affectation, one hundred and seventy one little words can get a hell of a lot of legal work done."


Intel 600P Series SSD NVMe M.2 Linux Tests "IndyWatch Feed Tech"

Last month Intel introduced the 600P Series solid-state drives as the most competitively-priced NVMe SSDs launched to date. Here are a few Linux comparison benchmarks from my initial testing of the SSDPEKKW256G7X1 M.2 SSD on Linux.


Join Hackaday For an NYC Meetup "IndyWatch Feed Tech"

On the eve of the New York Maker Faire, Hackaday is throwing a meetup in the heart of Manhattan. Join us next Thursday for a low-key get-together, a few talks on assistive technologies, and a demo of the coolest new tool in recent memory.

Although these meetups are highly informal (and bringing some of the cool stuff you’ve built is encouraged), we do have a few speakers lined up. Holly Cohen and John Schimmel of DIYAbility are speaking about using homebrew devices for making everyone’s life easier. Johnny Falla of the Enable Community Foundation will give a talk about using 3D printing technology to make hyper-affordable prosthetic devices for underserved populations. Chad Leaman will be representing the Neil Squire Society and will speak about using technology to empower people with disabilities.

As always, snacks and drinks will be provided, and like all Hackaday meetups, bring some cool gear or whatever project you’re working on along with you. This bring-a-hack isn’t a competition, but if it was, we know who would win. Nisan Larea will be attending the meetup, demoing the Wazer desktop waterjet cutter. We caught a glimpse of this machine in San Francisco, and it’s amazing. If you want to see the Wazer waterjet before Maker Faire, this is your chance.

This month’s Hackaday NYC meetup will be at Pivotal Labs, 625 Avenue of the Americas, on Thursday, September 29. It would be really, really cool if you could RSVP beforehand.

This is Hackaday’s pre-game for the World Maker Faire. We’ll be attending, scoping out all the coolest projects and products from this year’s NYC Maker Faire. Find one of the Hackaday crew at the faire, and we’ll hook you up with some swag.

Filed under: cons, Hackaday Columns


What is DevOps? Bridget Kromhout Explains "IndyWatch Feed Tech"

Bridget Kromhout can be found traveling and speaking at conferences on a variety of DevOps topics. She is a global core organizer for devopsdays and is on the program committee for Velocity in addition to organizing local tech meetups in Minneapolis. She is a Principal Technologist for Cloud Foundry at Pivotal and a host of the Arrested DevOps podcast. Why are so many organizations embracing DevOps?


Repercussions of the massive Yahoo breach "IndyWatch Feed Tech"

Yahoo has announced on Thursday that they have suffered a breach and that account information of at least half a billion users has been exfiltrated from the company’s network in late 2014. The stolen data “may have included names, email addresses, telephone numbers, dates of birth, hashed passwords (the vast majority with bcrypt) and, in some cases, encrypted or unencrypted security questions and answers,” but not “unprotected passwords, payment card data, or bank account information,” … More


FF1988: Christmas with Superswine "IndyWatch Feed Tech"

Christmas with Superswine by Gary Fields.

This is rather weird. It sounds like a special edition of a running series, but Superswine wasn’t published as its own series until three years later. But perhaps the point was just to publish something seasonal.

The indicia says that it was published in February, which sounds typical for Fantagraphics around this time. I don’t think any Critters Christmas issues, for instance, were published before March the following year.

The main story is a take-off on the Clement C. Moore Xmas thingie….

… and it’s… er… that’s a pretty representative gag. The rest of the issue is also Xmas themed:


Gary Fields was the guy who did Enigma Funnies in the Threat magazine that was cancelled around this time.

This post is part of the Fantagraphics Floppies series.


This Week in Open Source News: Linux Foundation Offering Free OpenStack Training, GitHub Wants More Business Users, & More "IndyWatch Feed Tech"

This Week in Open Source News: Linux Foundation Offering Free OpenStack Training, GitHub Wants More Business Users, & More


Re: CVE request Qemu: hw: net: Fix a heap overflow in xlnx.xps-ethernetlite "IndyWatch Feed Tech"

Posted by cve-assign on Sep 23

Yes, this was already assigned CVE-2016-7161. Other references are:;a=commit;h=a0d1cbdacff5df4ded16b753b38fdd9da6092968

This resulted from the web site, not an
oss-security post. In that situation, the "Select a request type"
"Notify CVE about a publication" process could have been used. At the
moment, that process is not...


Facebook VR founder secretly backed pro-Trump group "IndyWatch Feed Tech"

The creator of Facebook’s Oculus Rift virtual reality venture, Palmer Luckey, has been secretly backing a group supporting Republican presidential nominee Donald Trump that aims to influence via “shitposting” and “meme magic.” The group, called...


Enlightenment EFL Adds Atomic Modesetting, Nuclear Page-Flipping "IndyWatch Feed Tech"

The Enlightenment Foundation Libraries (EFL) now has support for atomic mode-setting and nuclear page-flipping!..


Finding ESP8266 Inside Big-Box Store IoT Plugs "IndyWatch Feed Tech"

When we buy new shiny toys, we usually open them up to at least have a look. [Scott Gibson] does the same, apparently. He found an ESP8266 module inside the EcoPlug brand WiFi-controlled wall switches.

The original device was intended to be controlled by a (crappy) app. He sniffed the UDP packets enough to send the on-off signals to an unmodified device, but where’s the fun in that? [Scott] gave it an upgrade by replacing the ESP8266’s firmware with his own and now he’s got a much more capable remote switch, one that speaks MQTT like the rest of his home automation system.

There’s not much to the code — it just does what you’d think it does. And that’s the beauty of open standards and our community of open-source hardware hackers. It’s easier than ever to take commercial crap that doesn’t do what you want and “fix” it.

There are other ways to crack the home automation egg. On the ESP8266 front, we’ve got even cheaper products for you to hack and even complete-DIY options. Before the ESP8266, firms used to put complete Linux routers into switches, if you can believe that, and they’re hackable as well. But kudos to [Scott] for looking at what he had, and making it into what he wanted.

Thanks [Milos] for the tip!

Filed under: home hacks


Survival Horror Game Sees Linux Sales Around 1% "IndyWatch Feed Tech"

It's been one year since Frictional Games launched SOMA as their latest science fiction survival horror game. The game is supported on Windows, OS X, Linux, and PlayStation 4. This game saw close to half a million sales, but just over 1% of them were from Linux gamers...


You can now stream Android games and apps to Facebook Live from your PC "IndyWatch Feed Tech"

Bluestacks Helps You To Stream Android Apps On Facebook Live

Mobile gaming is a huge business, as people like to record videos of their gameplay or stream the action. While streaming your favourite smartphone apps on Twitch is very time consuming, it is even more difficult to set it up on Facebook Live.

However, thanks to BlueStacks desktop emulator for PC and Mac, you can stream your game play (or other apps) directly to Facebook Live. The integration was already available for Amazon’s Twitch, which is popular among the gamer crowd, TechCrunch reports. It also points out that the Facebook Live integration has the potential to reach a much wider audience of mobile games streamers than Twitch.

Since, the Android emulator basically runs the Google OS inside your PC or Mac, it becomes very easy to fire up the Play Store and download any app or game that you want. The same emulator interface can then be used to stream the action to Facebook Live.

With this new feature, you can stream yourself playing the game. This means that the webcam connected to your computer is recording you, and also the app’s screen is being recorded. While a similar setup is available on Twitch and YouTube Gaming, it will just be available on Facebook. It’s pretty simple to set up, after installing BlueStacks, all you have to do is just press a button to go live. These videos will be on Facebook forever or until you delete them. For the ones, who are unable to watch the stream live can go back later and watch it again.

Source: TechCrunch

The post You can now stream Android games and apps to Facebook Live from your PC appeared first on TechWorm.


Codingame Gamifies Coding Education "IndyWatch Feed Tech"

Codingame has developed a platform to gamify coding education for developers, and provide a channel for employers to find prospective employees. From the website:

Practice & learn the fun way
    Practice pure code

Learn new concepts by solving fun challenges in 25+ languages addressing all the hot programming topics.
    Learn from the best

In a matter of hours, discover new languages, algorithms or tricks in courses designed by top developers.
    Become the expert

Our approach has been designed to lead advanced developers to the next level.

There might be developers, team leaders, or employers in the Soylent community who would find it useful.

Original Submission

Read more of this story at SoylentNews.


Teen Student Arrested For Hacking University And Changing Grades "IndyWatch Feed Tech"

Former Georgia student hacker changed grades and stole data

A former Kennesaw State University (KSU) student accused of hacking into the school’s computer system to change grades and stealing personal data was arrested by the police, reports Fox 5 Atlanta.

Chase Arthur Hughes, 19, is charged on three counts of computer trespassing, computer invasion of privacy and computer forgery. Hughes turned himself in to the Cobb County Sheriff’s Office on Monday. Crimes relating to computer privacy can result in a fine up to $50,000 or jail time of up to 15 years in the state of Georgia.

Kennesaw State police began an investigation in May after receiving reports of the hacking. Hughes illegally hacked the university’s Owl Express program using his girlfriend’s internet connection to change several students’ grades, including his own. He reportedly changed fellow students’ grades from an “F” to “A” and another from a “C” to “A”. For himself, he upgraded his “B” to an “A,” police said.

The incident was detected after a KSU professor received a confirmation email from the university’s computer system alerting him of a grade change that he did not make, according to the police report. The professor alerted school officials who then told police.

The grades were immediately corrected to the original posting.

“While the system worked as it should and alerted professors of the grade changes, additional measure have been put into place to help further detect unauthorized access,” said Lectra Lawhorne, the school’s interim chief information officer.

In addition to changing grades, Hughes allegedly stole data from the university. The police are reporting that he used the login data from several professors to look at sensitive and confidential information, including employment history, financial, credit, and medical information, of both professors and students. The usernames and passwords of at least 36 faculty members were recorded by him in a notebook that the officers found in his home.

At the moment, it is unclear if Hughes had downloaded any of this data, or how he managed to get hold of so many details of KSU professors.

Hughes was enrolled at the KSU from fall 2015 to summer 2016, as a business major with a concentration in finance.

The post Teen Student Arrested For Hacking University And Changing Grades appeared first on TechWorm.


University Student Arrested for hacking computer and changing grades "IndyWatch Feed Tech"

By Uzair Amir

Hacking your school’s computers is no ordinary feat and it

This is a post from Read the original post: University Student Arrested for hacking computer and changing grades


Blender: An Introduction for Final Cut Pro Users "IndyWatch Feed Tech"

Have you often considered quitting your day job to begin an exciting career as a filmmaker? You don’t need the resources of a Hollywood studio anymore. In fact, you can do it all with free and open source software.

The Video Screening Room

Blender is a very popular 3D animation program, but not many people know that this open source, cross platform software also works well as a video editor. Some people consider Blender to be the best open source video editor available. (See the comments at the end of this article on

To quickly get you up to speed, this well-done 23-minute video explains Blender to people who are already familiar with Final Cut Pro video editor — as well as with others.

This type of instructional video can provide a vital bridge to open source. Every person who is familiar with Final Cut Pro probably has a friend, relative or neighbor who cannot afford to buy Final Cut Pro. Bingo — the no-cost option suddenly becomes a viable option worth considering.

Do show your support for this kind of video by subscribing to this video channel, leaving a supportive comment on this video, or doing both of those

The post Blender: An Introduction for Final Cut Pro Users appeared first on FOSS Force.


Two Indian students win a partial victory over Facebook in the data privacy case "IndyWatch Feed Tech"

Indian Students Score a Partial Win in Facebook Privacy Dispute

Two Indian students have in India achieved what many have tried and failed in the United States of America. Two students scored a partial victory over Facebook in a closely watched legal battle over privacy.

Readers may remember that Facebook-owned WhatsApp had revised its privacy policy last month. The new policy allows WhatsApp to share its users’ data with owner Facebook. The data will allow Facebook to target ads and messages from businesses, laying the groundwork for the free messaging service to begin making money. Students Karmanya Singh Sareen and Shreya Sethi, 19 and 22 respectively, then filed a public-interest litigation — akin to a class action — seeking to block those changes. They wanted a rollback of those updates, in a lawsuit that’s attracted attention as a test case for how legal authorities around the world may respond.

Students Karmanya Singh Sareen, 19 and Shreya Sethi, 22 filed a public-interest litigation in India to block WhatsApp from sharing user data with its parent. Public-interest litigation or PIL as it’s popularly called is equivalent to a Class Action Suit filed in the US. In the PIL the two students had asked the Judge to order a complete rollback of those updates. During the hearing, lawyers appearing for WhatsApp said it doesn’t intend to share content with Facebook except user names and phone numbers.

Though the two students could fully get what they wanted, the Delhi High Court on Friday ruled that WhatsApp has to delete all data on users who choose to stop using the service before Sept. 25, when the new policy takes effect. The judge also ruled that WhatsApp may share only that data which is collected after 25th September 2016.

However, going forward, WhatsApp is free to share information on users who haven’t opted out. The court also asked India’s government to consider if it was feasible to craft regulations to oversee WhatsApp and other messaging apps, though it didn’t specify what form they could take.

The ruling marks a great victory for privacy activists who have been seeking to puncture Facebook’s growing privacy related issues. Facebook has a lot of stake in the ruling as it has close to 150 million users, its biggest base outside the U.S. Research firm eMarketer said India would soon have the world’s largest Facebook population. WhatsApp alone has over 70 million users in India, according to a SimilarWeb report in May.

The Indian challenge follows similar hurdles around the world, with the European Union and the U.S. Federal Trade Commission examining whether users have been wronged and a German consumer group threatening to sue the company.

Facebook hasn’t yet commented on the ruling.

If you are a WhatsApp user and is worried about WhatsApp sharing your data/details with its parent, Facebook, you are free to delete the App and safeguard your privacy. In case you don’t delete the App by 25th Sept. 2016, WhatsApp will be allowed to share your data/details with Facebook from that date.

The post Two Indian students win a partial victory over Facebook in the data privacy case appeared first on TechWorm.


US elections and the hacking of e-voting machines "IndyWatch Feed Tech"

As the day when US citizens cast a vote for their preferred presidential nominee quickly approaches, the issue of whether the actual voting process can be tampered with is a topic that interests many. It is widely believed, but never officially confirmed, that the DNC hack – and subsequent leaking of data stolen during the breach – is the work of hackers backed by the Russian government and president Vladimir Putin. As Harvard law professor … More


Microsoft asked to compensate users for bricked PC/laptops while updating to Windows 10 "IndyWatch Feed Tech"

British watchdog asks Microsoft to compensate after Windows 10 update bricked PCs

Microsoft was dealt a serious blow by the UK consumer watchdog when it asked the tech behemoth to pay compensation to customers who bricked their PCs when upgrading to its new software Windows 10.

Microsoft had released its latest operating system, Windows 10, last year amidst much fanfare. But ever since the company released the software last year it has been plagued by complaints, with customers claiming their computers upgraded without their permission and, in some cases, completely stopped working.

Based on such complaints from British citizens, the UK consumer watchdog, has told Microsoft to “honour consumers’ rights” and compensate those who have suffered from problems, including lost files, email accounts no longer syncing and failed WiFi connection.

It may be noted that Microsoft was panned by techies for pushing down the Windows 10 upgrade down the Windows 7/8.1 users throat. Many users also complained that the Windows 10 upgrade and subsequent updates bricked their PCs/laptops while a few others reported that their webcams suddenly stopped working, as did speakers and printers in the wake of the upgrade.

Similar complaints were noticed in United States as well. In fact, Microsoft had to pay Teri Goldstein $10,000 in compensation after a failed Windows 10 update left her computer unusable for days. However, it has been accused of neglecting to Windows 10 users in other countries, who have experienced similar problems after upgrading.

A spokesman for Microsoft said: “The Windows 10 upgrade is designed to help people take advantage of the most secure and productive Windows. Should a customer need help with the upgrade experience, we have numerous options, including free customer support.”

The post Microsoft asked to compensate users for bricked PC/laptops while updating to Windows 10 appeared first on TechWorm.


Web Bluetooth: The New Hotness and Its Dangers "IndyWatch Feed Tech"

On the one hand, this is awesome functionality. The browser is the most ubiquitous cross-platform operating system that the world has ever seen. You can serve a website to users running Windows, Linux, Android, iOS, or MacOS and run code on their machines without having to know if it’s a cellphone, a desktop, or a virtual machine in the Matrix. Combining this ubiquity with the ability to control Bluetooth devices is going to be fun. It’s a missing piece of the IoT puzzle.

On the other hand, it’s a security nightmare. It’s bad enough when malicious websites can extract information from files that reside on your computer, but when they connect directly to your lightbulbs, your FitBits, or your BTLE-enhanced pacemaker, it opens up new possibilities for mischief. The good news is that the developers of Web Bluetooth seem to be aware of the risks and are intent on minimizing them, but there are still real concerns. How does security come out in the balance? Read on.

Nothing New, Everything Changes

engaging-with-the-real-world-web-bluetooth-and-physical-web-chrome-dev-summit-2015-_buwobdljzqwebm-shot0002Of course you could just write a Bluetooth LE application. But then your users have to be able to install it on their computers, on their phones, and on whatever other platforms people will be using in three years — perhaps the dashboard of their flying cars. Web applications are delivered to and deployed on your browser between those funny ’



Uber to use facial recognition for drivers amid safety concerns "IndyWatch Feed Tech"

Uber is turning to facial recognition in what it says is an attempt to reduce fraud and boost rider safety.Drivers will now be asked to take a photo of themselves "periodically" before starting a session where they accept rides. That photo will be...


Friday's security updates "IndyWatch Feed Tech"

Debian has updated firefox-esr (multiple vulnerabilities).

Debian-LTS has updated wordpress (multiple vulnerabilities).

Fedora has updated distribution-gpg-keys (F23: privilege escalation), mock (F23: privilege escalation), openvas-libraries (F24; F23: multiple vulnerabilities), openvas-scanner (F24; F23: denial of service), and shiro (F24: access control bypass).

openSUSE has updated pdns (13.2, Leap 42.1: multiple vulnerabilities).

Oracle has updated kernel (4.1.12 O6; O7: multiple vulnerabilities; 3.8.13 O7; O6: multiple vulnerabilities; 2.6.39 O6; O5: multiple vulnerabilities).

Slackware has updated openssl (14.0, 14.1, 14.2, -current: multiple vulnerabilities) and pidgin (13.0, 13.1, 13.137, 14.0, 14.1: mysterious vulnerabilities).

Ubuntu has updated openssl (12.04, 14.04, 16.04: multiple vulnerabilities).


Google, Salesforce in conversations to buy Twitter: report "IndyWatch Feed Tech"

Tech companies including Google and Salesforce have indicated interest in purchasing Twitter, CNBC reported Friday morning. Twitter has had conversations with several companies interested in a bid to buy the San Francisco-...


White Male-Dominated EPO Management Sinks to New Lows, Again "IndyWatch Feed Tech"

Next photo op: puppies?

EPO Boxer

Summary: Benoît Battistelli continues to make the EPO look like Europe’s biggest laughing stock by attempting to tackle issues with corny photo ops rather than real change (like SUEPO recognition, diverse hiring, improved patent quality, and cessation of sheer abuses)

ONE of the many things that EPO management is routinely criticised for is lack of diversity (both gender and race). Today, tactlessly enough, Benoît Battistelli published himself posing for photo op with a black boxer. It’s like US politicians who pose for photos with black baseball/basketball/football players (or other athletes) to ‘prove’ they are not racist and thus attract votes/consent from the black population/community. Remember that Battistelli is inherently a politician, so he has these tricks/routines up his sleeve. These tricks might be effective in charming the general population, but EPO examiners are not this gullible. It’s embarrassing for them. It’s like the EPO has become a political party. Employees of the EPO are not sure whether to laugh or sob. Not too long ago Benoît Battistelli did a photo op along with Cambodia (with zero patents at the EPO!).

“It’s like US politicians who pose for photos with black baseball/basketball/football players (or other athletes) to ‘prove’ they are not racist and thus attract votes/consent from the black population/community.”We expect a Battistelli photo op with Neelie Kroes (with Bahamas shell companies) and José Manuel Barroso (Goldman Sachs revolving doors) next… because photo ops can supposedly solve all issues (ask FFPE-EPO which helped Battistelli create a perception of peace with ‘unions’).


Court finds Apple guilty of stealing Nokia and Sony’s ring-silencing patent for its iPhone "IndyWatch Feed Tech"

Apple asked to pay $3 million for patent infringement

Apple has lost a patent infringement law suit to patent licensing entity, Mobile Media Ideas LLC and has been ordered to pay $3 million in damages to the company, reported Ars Technica.

A Delaware federal jury on Wednesday ruled that Apple had infringed a patent, owned by Maryland-based MobileMedia Ideas LLC, for ring-silencing technology on mobile phones.

Apple apparently infringed MobileMedia’s Patent No. RE 39,231, which is related to ring-silencing features on mobile phones. In 1994, Sony patented a method for users to control incoming calls on a mobile phone, whereby an alert sound would be either stopped, or the sound would reduce after the initial loud alert during certain user actions or as a result of user operations with the phone.

MobileMedia Ideas LLC, owned by Nokia, Sony and IP rights management firm MPEG LA, has been fighting a war since 2010 to get it legally declared that Apple has infringed Patent No. RE 39,231, together with 15 other patents, in its iPhone line of smartphones.

In 2012, the court made the first decision against Apple wherein it found the electronics giant infringing only four patents, which included call alerts, call handling, call rejection and the phone’s camera. However, in 2015, Apple appealed again and an appeals court dismissed three of the patents but sent back the fourth patent (call silencing) to be reviewed by the courts.

This led to another trial in which Apple argued that the telephone ring patent was invalid because it was too vague. However, the federal court of Delaware disagreed, and decided that Apple was indeed guilty of infringing the patent on September 21.

Even though the $3 million verdict is hardly going to make an impact on Apple, it is likely that Apple will not take this lying down either and will appeal to the Federal Circuit.. On the other hand, this verdict is not a huge win for MobileMedia Ideas LLC, who was reportedly seeking $18 million in royalties from the trial.

The post Court finds Apple guilty of stealing Nokia and Sony’s ring-silencing patent for its iPhone appeared first on TechWorm.


ESA-2016-097: RSA Identity Governance and Lifecycle Information Disclosure Vulnerability "IndyWatch Feed Tech"

Posted by EMC Product Security Response Center on Sep 23

ESA-2016-097: RSA Identity Governance and Lifecycle Information Disclosure Vulnerability

EMC Identifier: EMC-2016-097

CVE Identifier: CVE-2016-0918

Severity Rating: CVSS v3 Base Score: 4.3 (AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N)

Affected Products:
•RSA Identity Management and Governance versions prior to 6.8.1 P25
•RSA Identity Management and Governance versions prior to 6.9.1 P15
•RSA Via Lifecycle and Governance versions prior to...


Upgrading to iOS 10 may have made your backups a lot faster to crack "IndyWatch Feed Tech"

Password cracking a local iTunes backup is now 2,500 faster than with iOS 9, claims Russian firm.


Bad security habits persist, despite rising awareness "IndyWatch Feed Tech"

While 82 percent of respondents believe the IT security industry is making progress against cyber attacks, those gains are undercut by egregious security practices in critical areas such as privileged account security, third-party vendor access and cloud, according to CyberArk. Which industries allow third-party vendors (supply chain, IT management rms, etc.) remote access to internal networks? Bad security habits persist Headline-making cyber attacks have driven significant increases in cyber security awareness. However, the failure to … More


500 Million Yahoo Accounts Hacked "IndyWatch Feed Tech"

Reuters via Yahoo News reports on an announcement by Yahoo! that an attacker "may have stolen names, email addresses, telephone numbers, dates of birth and encrypted passwords" for 500 million accounts in 2014. According to the announcement, the FBI is looking into the matter and that "The investigation has found no evidence that the state-sponsored actor is currently in Yahoo's network".

Yahoo Inc said on Thursday that at least 500 million of its accounts were hacked in 2014 by what it believed was a state-sponsored actor, a theft that appeared to be the world's biggest known cyber breach by far. Cyber thieves may have stolen names, email addresses, telephone numbers, dates of birth and encrypted passwords, the company said. But unprotected passwords, payment card data and bank account information did not appear to have been compromised, signalling that some of the most valuable user data was not taken. The attack on Yahoo was unprecedented in size, more than triple other large attacks on sites such as eBay Inc , and it comes to light at a difficult time for Yahoo. Chief Executive Officer Marissa Mayer is under pressure to shore up the flagging fortunes of the site founded in 1994, and the company in July agreed to a $4.83 billion cash sale of its internet business to Verizon Communications Inc . "This is the biggest data breach ever," said well-known cryptologist Bruce Schneier, adding that the impact on Yahoo and its users remained unclear because many questions remain, including the identity of the state-sponsored hackers behind it. On its website on Thursday, Yahoo encouraged users to change their passwords but did not require it.

Also covered at: Ars Technica

Original Submission

Read more of this story at SoylentNews.


Journalism 102: Do Not Become Like ‘Managing IP’ or IAM ‘Magazine’ (the Megaphones of the EPO’s Management) "IndyWatch Feed Tech"

How ‘professional’… media repurposed as a shadow EPO platform

Managing IP and EPO

Summary: Another look at convergence between media and the EPO, which is spending virtually millions of Euros literally buying the media and ensuring that the EPO’s abuses are scarcely covered (if ever mentioned at all)

THE previous post about the EPO bemoaned poor press coverage that merely propagated lies of the EPO. Stakeholders were not at all contacted as part of fact-checking. That’s churnalism, not journalism.

“As rebutting/debunking the lies requires some basic knowledge of this system and also no professional loyalty to it, Techrights is often alone in responding to such misinformation.”In this second part we plan to tackle some more of the same things and bring to light unexplored issues pertaining to the EPO under Benoît Battistelli.

AIPPI World Congress

James Nurton (aforementioned EPO ‘stenographer’ of sorts) attended the AIPPI World Congress and wrote a bunch of articles. As we don’t think these relate directly to the UPC we won’t dig into each one of these, but MIP (Managing IP, Nurton’s employer) omitted disbelief that the UPC will become a reality from its reports, as we already noted the other day. Agenda by omission? Nokia, based on this new report from WIPR, shares this view on UPC disbelief. To quote:

The UK’s ratification of the Unified Patent Court (UPC) Agreement is politically “very unlikely” at the moment, according to Nokia’s head of European litigation Clemens Heusch.

He was speaking in a session yesterday, September 20, at the 2016 AIPPI World Congress in Milan about the implications of Brexit on the UPC.

Heusch said that instead, negotiations were likely to play out over two years once article 50 of the Lisbon Treaty has been invoked.

Commenting on the negotiations, Heusch said it was essential for the UK to stay in the common market or some form of free trade agreement, so the talks will be a great chance to include the UPC.

Sadly though, on UPC among other topics, the IAM and MIP staff are just megaphones amplifying the EPO’s liars like Margot Fröhlinger [...


Dem senator calls for probe over Yahoo hack "IndyWatch Feed Tech"

Sen. Richard Blumenthal (D-Conn.) is ripping Yahoo’s delayed response in making public details of a massive security breach public and calling for congressional action on the matter.Yahoo confirmed Thursday that 500 million accounts on its platforms...


Biometric skimmers: Future threats to ATMs "IndyWatch Feed Tech"

Kaspersky Lab experts investigated how cybercriminals could exploit new biometric ATM authentication technologies planned by banks. While many financial organizations consider biometric-based solutions to be one of the most promising additions to current authentication methods, cybercriminals see biometrics as a new opportunity to steal sensitive information. Stealing authentication data with NFC-sniffer For years, ATMs have been in the sights of fraudsters hunting financial data. It all started with primitive skimmers – homemade devices attached to … More


Hackers hit White House staffer's Gmail account, raises security concerns by leaking sensitive emails "IndyWatch Feed Tech"

A scan seemingly of Michelle Obama's passport is amongst the haul of leaked information.

Read more in my article on the Hot for Security blog.


2D Rendering On X11 Remains Barely Faster Than CPU Rendering "IndyWatch Feed Tech"

In addition to being the organizer of XDC2016, Martin Peres also participated in several presentations at this week's conference in Helsinki. One of these pesentations by Martin was concerning 2D X.Org acceleration...


Rise of cyber attacks against the public sector "IndyWatch Feed Tech"

The use of information and communication technologies in the public sector, specifically online government services, is a key factor for being targeted by cybercriminals. Technological advances have made it possible to store personal data in digital format, a great benefit to users, but also a highly-prized target. While cyberccrime is now more prevalent than ever, attacks against the public sector are not brand new. Panda Security outlines several major government breaches over the last decade, … More


CVEs for vulnerabilities listed in MySQL 5.6.33 release note "IndyWatch Feed Tech"

Posted by Thomas Deutschmann on Sep 23


the MySQL 5.6.33 changelog [1] lists multiple fixed vulnerabilities but
I can't find CVEs for all of these problems. Am I missing something? If
not, could you please assign CVEs which would help tracking the status
of these problems in MariaDB and Percona-Server (see Percona's latest
release notes for their 5.6.32-based fork [2] which seems to address
vulnerabilities listed in 5.6.33):

This one seems to be related to CVE-2016-6662...


Basic file deletion increases exposure to security risks "IndyWatch Feed Tech"

The use of improper data removal methods and the poor enforcement of data retention policies have created the perfect storm for confidential, oftentimes sensitive data to be lost or stolen, according to Blancco Technology Group. The study, which surveyed over 400 IT professionals in the United States, Canada, Mexico, United Kingdom, Germany, France, Japan, China and India, indicates just how challenging and complicated it can be to permanently erase data. When asked how they wipe … More


CVE request Qemu: hw: net: Fix a heap overflow in xlnx.xps-ethernetlite "IndyWatch Feed Tech"

Posted by Hu Chaojian on Sep 23

The .receive callback of xlnx.xps-ethernetlite doesn't check the length

of data before calling memcpy. As a result, the NetClientState object in
heap will be overflowed. Attackers may leverage it to execute arbitrary

code with privileges of the qemu process on the host.

Upstream patches:<...


CVE Assignment for Crypto++ and "AES and incorrect argument to _freea() under Microsoft compilers" "IndyWatch Feed Tech"

Posted by Jeffrey Walton on Sep 23

CVE assignment, please.


John Byrd reported a crash in Crypto++'s AES implementation under
Microsoft compilers due to use of `_malloca`, `AliasedWithTables` and
`_freea`. Crypto++ can potentially free the wrong pointer when the
pointer is adjusted to flush cache lines to avoid Bernstein's cache
timing attacks.

=== SCOPE ===

The bug only affects Crypto++ 5.6.4 and was introduced at...


[CVE-2016-4978] Apache ActiveMQ Artemis: Deserialization of untrusted input vunerability "IndyWatch Feed Tech"

Posted by Martyn Taylor on Sep 23

Severity: Important

Vendor: The Apache Software Foundation

Versions Affected: Apache Artemis 1.0.0, 1.1.0, 1.2.0, 1.3.0

A class implementing the Serializable interface is free to implement
the “readObject(
in)” method however it chooses. This readObject method is used during the
deserialization process, when constructing a java object from a serialized
byte stream. It is possible to implement the method in such a...


Iris scanning: A secure ID trend for smartphones? "IndyWatch Feed Tech"

The release of the Samsung Galaxy Note 7 sparked something positive – iris scanning. ABI Research forecasts global shipments of smartphones equipped with iris scanners will reach almost 300 million in 2021. “As the iris is an unchanging, protected, and completely unique feature of the human body, smartphone vendors are gradually incorporating iris scanning capabilities into their products as a secure biometric identification solution to unlock devices or certify mobile payments,” says Marina Lu, Senior … More


Journalism 101: Do Not Believe Anything That Benoît Battistelli and the EPO’s Management Say (Also Don’t Fall for the UPC Hype) "IndyWatch Feed Tech"

Battistelli’s Ministry of Truth is no reliable source of information


Summary: A survey/review (or an overview) of recent articles about the EPO and why they’re wrong (mostly because they parrot the official lies from Battistelli’s department)

THE Battistelli campaign (or coup d’état) recently entered a new phase. A year ago we noted that the EPO had begun deliberately lying both to journalists and to staff. It’s inexcusable and it causes irreparable damage to the EPO both as a service and as an employer (or prospective employer). Battistelli appears to have become a man without accountability; he’s liable to nobody, except Sarkozy perhaps. What a joke the EPO has become under this man’s so-called ‘leadership’. Even IP-centric circles lost respect for him, but they have to keep pretending that he’s President even when the staff pretty much disowned him and Board 28 views him as a liability. How this man managed to maintain his position might one day become the subject of some incredible book! Eponia is an autocrat’s fantasy land.

Today we would like to counter or respond to several reports we saw. Some of them are so shallow that one starts to wonder if the EPO directly paid for them (we already know that the EPO pays publications to print out puff pieces).

Façade of Independence

A couple of months ago we wrote about how Battistelli (in part) would be appointing another one of his cronies, in order for this crony to be framed as "independence" for the appeal boards. Earlier this week we found this article titled “EPO seeks to allay independence fears with new appointment”; problem is, they don’t mention who makes this appointment and why it’s merely an illusion of independence, as explicitly pointed out by AMBA. To quote this report:



Critical DoS Flaw found in OpenSSL — How It Works "IndyWatch Feed Tech"

The OpenSSL Foundation has patched over a dozen vulnerabilities in its cryptographic code library, including a high severity bug that can be exploited for denial-of-service (DoS) attacks. OpenSSL is a widely used open-source cryptographic library that provides encrypted Internet connections using Secure Sockets Layer (SSL) or Transport Layer Security (TLS) for the majority of websites, as well


Don't Expect An Open-Source NVIDIA Vulkan Driver Anytime Soon "IndyWatch Feed Tech"

Besides Nouveau developers being frustrated by NVIDIA's signed firmware blobs, at XDC2016 they also made other remarks about their focus on OpenGL and performance while Vulkan support isn't expected anytime soon...


Qualys expands cloud-based offering for security consultants "IndyWatch Feed Tech"

Qualys unveiled two new packages in its Qualys Consultant suite for independent consultants, auditors and security firms. With these new packages, this suite now offers multiple comprehensive security assessment tools in a centralized console, allowing consultants to consolidate their current toolsets and eliminate time spent manually installing, managing, and administering them. Consultants can perform comprehensive security services and generate fully customizable and actionable reports by easily deploying pre-configured and self-updating Qualys scanners remotely or locally, … More


Shaping Sound Waves in 3D: Tech and Medical Applications "IndyWatch Feed Tech"

Sound can now be structured in three dimensions. Researchers from the Max Planck Institute for Intelligent Systems and the University of Stuttgart have found a way of generating acoustic holograms, which could improve ultrasound diagnostics and material testing. The holograms can also be used to move and manipulate particles.

Peer Fischer, a Research Group Leader at the Max Planck Institute for Intelligent Systems and Professor at the University of Stuttgart, normally works on micro- and nanorobots. His lab also develops the nanofabrication methods that are needed to develop such tiny swimmers. Holography was not one of his core interests. "However, we were looking for a way to move large numbers of microparticles simultaneously so that we could assemble them into larger more complex structures," explains Fischer. His research team has now found such a method with acoustic holography, and it reports the first acoustic hologram in this week's issue of Nature. The method promises a number of applications in addition to particle manipulation.

Journal Reference: Kai Melde, Andrew G. Mark, Tian Qiu, Peer Fischer. Holograms for acoustics. Nature, 2016; 537 (7621): 518 DOI: 10.1038/nature19755

The article has an image of a Picasso peace dove created with an acoustic hologram.

Original Submission

Read more of this story at SoylentNews.


AMD's DAL Was Just Presented At XDC2016, Still Not Clear When It Will Be Mainlined "IndyWatch Feed Tech"

Harry Wentland of AMD just presented at the XDC2016 conference about DAL, the big Display Abstraction Layer code-base, which many AMD Linux users have been waiting to see merged in order to have Polaris audio support and this is one of the stepping stones for seeing FreeSync/Adaptive-Sync and other modern display capabilities...


Building Pneumatic Actuators With 3D Printed Molds "IndyWatch Feed Tech"

Pneumatic actuators offer interesting perspectives in applications like soft robotics and interaction design. [Aidan Leitch] makes his own pneumatic actuators from silicone rubber. His actuators contain embedded air channels that can be filled with pressurized air and completely collapse to a flat sheet when no pressure is applied.

pneumatic-actuators-animationThe process is based on the research work of Kevin C. Galloway et al. on “Zero Volume Air Chambers”. The team found that they could pour a thin layer of silicone rubber into a flat mold, then selectively apply a pattern of mold release to the surface of the cured layer using a laser-cut mask, and then pour a second layer of silicone on top. The mold release prevents the two layers of silicone from bonding together, leaving inflatable air channels behind that require close to zero volume when unpressurized.

To replicate their results, [Aidan’s] wrote an OpenSCAD script that generates 3D printable molds from black and white images. The molds include the mask for the release agent, whereas white regions in the image define the embedded air channels and black regions define solid silicone. Enjoy the video below where [Aidan] demonstrates his process!

Thanks to [Jean] for the tip!

Filed under: 3d Printer hacks, robots hacks


Warhammer 40,000: Dawn of War II Coming To Linux Next Week "IndyWatch Feed Tech"

Feral Interactive will be releasing three new Linux games next week...


Akamai Kicks off Brian Krebs from its network after 665 Gbps DDoS attack "IndyWatch Feed Tech"

By Waqas

A couple of days ago Brian Krebs’ blog suffered the

This is a post from Read the original post: Akamai Kicks off Brian Krebs from its network after 665 Gbps DDoS attack


Sky customers told to change passwords after massive Yahoo hack "IndyWatch Feed Tech"

Sky yahoo thumb

Do you have a Sky email account? There's potentially bad news - that service comes courtesy of Yahoo.


The leak of NSA hacking tools was caused by a staffer mistake "IndyWatch Feed Tech"

A US investigation into the leak of the NSA hacking tools used by the Agency is focusing on a theory that it was caused by a staffer mistake.

The hack of the NSA-linked group Equation Group and the leakage of the NSA hacking tools in its arsenal it probably one the most disconcerting events of the year.

Sources close to the investigation revealed that the NSA knew about the data breach for three years but it maintained the secret on the case.

The sources provided further elements on the alleged attack against the US Intelligence Agency, according to the Reuters the NSA itself wasn’t directly hacked by the Shadow Brokers group and the NSA hacking tools and exploits were not stolen by the popular whistleblower Edward Snowden.

According to the sources, it seems that an employee or a contractor mistakenly left the NSA hacking tools unattended on a remote server about three years ago during a cyber operation. The NSA was aware of the incident and did not inform the companies of the risks related to the exposure of the exploits.

The ShadowBrokers hackers then have discovered the server and raided it.

“But officials heading the FBI-led investigation now discount both of those scenarios, the people said in separate interviews. NSA officials have told investigators that an employee or contractor made the mistake about three years ago during an operation that used the tools, the people said.” reported the Reuters.

“That person acknowledged the error shortly afterward, they said. But the NSA did not inform the companies of the danger when it first discovered the exposure of the tools, the sources said. Since the public release of the tools, the companies involved have issued patches in the systems to protect them.”

The staffer, who has since left the US Agency for other reasons, acknowledged the mistake shortly afterward.


Why did the NSA keep the secret?

According to the experts, the NSA was monitoring the Internet searching for evidence of the use of the tools with the intent to discover who was using the dangerous arsenal.

“After the discovery, the NSA tuned its sensors to detect use of any of the tools by other parties, especially foreign adversaries with strong cyber espionage operations, such as China and...


LunarG's Vulkan Sample Tutorials Is Easy For Learning This New Graphics API "IndyWatch Feed Tech"

Earlier this month LunarG published up-to-date Vulkan Sample Tutorials for those wanting to learn more about using this high-performance Khronos graphics API...


Is Apple buying F1 carmaker McLaren? "IndyWatch Feed Tech"

Apple In Talks to Seek Strategic Stake In Luxury Carmaker McLaren?

McLaren Technology Group, a British luxury-car maker has apparently been approached by Apple who is considering buying out the company or strategically investing in it, according to a new report from Fortune’s Matthew Garrahan and Tim Bradshaw on Wednesday. The news comes after reports that Apple has hit the brakes on developing a car in-house.

Apple “is considering a full takeover of McLaren or a strategic investment, according to three people briefed on the negotiations who said talks started several months ago,” the FT report said. The automotive engineering firm is valued at $1.3 billion to $2 billion, the FT said.

Depending on how much of a chunk the iPhone maker acquires, a strategic investment in McLaren would likely cost Apple less.

However, McLaren denied that a takeover or investment was currently in the works.

“There’s no takeover, no strategic investment,” A McLaren spokesperson told Business Insider. “It’s completely untrue.”

McLaren is a low-volume producer of luxury sports cars that can cost as much as $1 million and owns an advanced technologies group, as well as the eponymous Formula One racing team.

The rumour becomes more interesting due to the drama surrounding Apple’s interest in cars. Apple has been said to be not-so-secretly developing a car for the last few years, a project rumoured to be dubbed as “Project Titan.” The company was in news when it was hiring prominent automobile engineers, picking up employees from Tesla, and building a design team charged with making an all-electric vehicle, as explained in many reports. However, on September 9, the New York Times reported that Apple had scrapped plans to build its own car and instead is focusing on software for future cars.

Self-driving-car projects have been aggressively pursued by some companies, including Tesla Motors (TSLA), Google parent Alphabet (GOOGL), ride-hailing service Uber and major automakers such as Ford (F) and General Motors (GM).

Apple had invested $1 billion in Didi Chuxing, a Chinese ride-hailing company in May.

The post Is Apple buying F1 carmaker McLaren? appeared first on TechWorm.


BT investigates Yahoo hack, tells BT Yahoo mail users to reset passwords "IndyWatch Feed Tech"

With at least 500 million Yahoo users exposed by the 2014 hack, other services are also advising customers to reset their passwords.


7 scary job interview questions and how you should answer them "IndyWatch Feed Tech"

Here are 7 scary job interview questions and how to face them

You will agree with me that job interviews are stressful, difficult, and most importantly, unpredictable. Even if you have a good resume and good recommendation from industry reputed personalities, it is tough to find a job these days. And if that’s not enough, you need to go through the dreadful interviews.

Job interviews can be pressure situations not only for fresh graduates but also for experienced campaigners. This because of the fact that your future job may decide completely on how you answer the job interview questions and the unpredictable nature of the interview.

It is worthwhile to remember that HR departments and hiring manager  often ask candidates things that they had never even thought or heard about in their lives. The general purpose of these type of questions is to find out your true grit if a similar situation occurs in real life. The idea is to make you come up with a witty reply as the interview waits patiently for you to answer.

As much as you have to brand your self for an job interview, it is important to use your wit, your knowledge, and your poise to answer the questions that the hiring guys will throw at you.

Here are some of the questions that are designed to throw prospective job seekers off balance and really show their tact in handling pressure situations :

What makes you happy about work on a Saturday evening?

The objective of this question is pretty straightforward: understanding how you react to the prospect of working extra hours. Though this question is basically designed for social media and digital marketing jobs, it can also apply to production or supply chain jobs. As a candidate, you have to think of an honest reply using both wit and diplomatese.

What career advice would you give to a room full of people, aged between 15 and 45?

Here is another trick question for candidates for mid-level management positions. It is often asked to trick the candidate into a corner. In this situation, you can use a quote from any well-known management guru and wrap it up with your logic to make it more credible.  Be sure to add a postscript that you are giving your opinion because you have found it to be highly relevant to the question.

Tell me a secret, something that you wouldn’t even tell your best friend

This question may trip even an experienced campaigner. As you can see how ironic the question is. Imagine you sharing something precious with the people you hardly know.  You just met these people and they are not even your friends leave alone your best friend. But the question is to judge your character. Will you give up a secret to unknown strangers for sake of a job?  How do you tell them your deepest secrets? In such situations, it is best to make up a random story and tell that to the eager recruiters. Make sure you don’t make up any story about some illegal activity you carried out; that would cost you the job.

Tell me a joke

Like the above one, this question too is to make you as uncomfortable as possible. Normally  a joke shared between 20-30 years old may not be a good one and in all probability a dirty joke. You have to make the guys sitting in front of you laugh and telling a joke in the middle of an interview is hardest. The best way to deal with the situation is to go prepared for the interview by reading one or two funny one-liners beforehand. Avoid sex, politics and current affair jokes.

What do you hate most about your former boss?

This is another of the trick question the hiring guy fires at you. The underlying objective of this question is to know how...


Lenovo denies claims of blocking Linux on Windows 10 PCs "IndyWatch Feed Tech"

Lenovo’s Signature laptops are shutting out other operating systems

There were recent reports of Lenovo blocking installation of Linux on its Windows 10 laptops. However, Lenovo has denied that it is intentionally blocking Linux-based operating systems from being installed on Windows 10 PCs.

Apparently, multiple owners of the Lenovo Yoga 900 13ISK2 laptop are being blocked from installing Linux on the devices. Owners of Lenovo Ideapad 710S PCs are too experiencing the same problems. They were told by a “Lenovo Product Expert” that the supposed lockout is due to an agreement between Microsoft and Lenovo.

However, a Lenovo spokesperson has denied claims that Linux users are being locked out and instead blamed the problem on a recent change to how the SSD is set up on the Windows 10 Signature Edition-branded machine.

“To improve performance, the industry is moving to RAID on the SSDs and Lenovo is leading with this change,” he said.

“Lenovo does not block customers using other operating systems on its devices but relies on the alternative operating system vendors to release appropriate drivers.”

“When the appropriate drivers and kernel support are in place for Linux-based operating systems, users will be able to install the operating system on an SSD with RAID,” he added.

In response to Lenovo’s statement, users complained that they are unable to switch these devices from using RAID mode to AHCI mode, a capability that’s standard in almost all modern motherboard/BIOS systems. Without the ability to switch from RAID, Linux users are effectually blocked from installing anything but Windows (or other operating systems with RAID support) on the machines.

It appears that the company was aware about the issue for some time, as a Lenovo rep had posted on the company’s forums that it was looking into the issue back in July.

You can read more about the story here.

The post Lenovo denies claims of blocking Linux on Windows 10 PCs appeared first on TechWorm.


'Raiders of Found Ark' Decipher Ancient Biblical Scroll, Without Unrolling It "IndyWatch Feed Tech"

In the 1970s, some charred fragments of ancient scrolls were discovered inside the ark of a synagogue at En-Gedi, on the western shore of the Dead Sea. The archaeologists could not unroll them without destroying them, and it was doubtful any text would be legible. So they preserved the fragments in hope that one day better technology might come along.

That day is finally here, as computer scientists at the University of Kentucky have developed a technique to read them. Recently, we've seen news about being able to read closed books, but in the past couple years technology has revolutionized the field of classical studies by allowing "virtual unrolling" of ancient scrolls. The combination of a micro-CT scan and specialized software was developed as part of a project to allow scholars to read the scrolls from Herculaneum, an ancient town near Pompeii which was also destroyed in the volcanic eruption. The so-called "Villa of the Papyri" contains the only intact ancient library ever discovered and has so far yielded nearly 2000 ancient scrolls, mostly obscure and lost works associated with Epicurean philosophical ideas. (Excavation at Herculaneum is not currently active, but many scholars speculate there could be additional chambers in the villa, possibly with thousands of other lost ancient works.)

The most recent accomplishment with this technique is the reading of a biblical fragment from the En-Gedi synagogue. As Yosef Porath, a researcher involved in the original archaeological dig nearly a half-century ago, was preparing a final report on the charred scroll fragments, he asked Pnina Shor (the head of the Dead Sea Scrolls project at the Israel Antiquities Authority) to try making some high-resolution scans. Dr. Shor was skeptical, given the poor condition of the fragments (which looked like chunks of charcoal), but she included one fragment on a whim along with other objects she was submitting for cross-sectional scanning. She forwarded the results to W. Brent Seales, a computer scientist at the University of Kentucky who has been working on the "virtual unrolling" software.

The results were striking. Not only did they obtain a clear and legible text, but it was also found to be the earliest extant fragment of the Hebrew Bible with an identical text to the medieval Masoretic Text used as the standard Hebrew edition today. The Masoretic text serves as the basis for most modern translations, and this recent find demonstrates a possible continuous stable text going back as much as 1700-2000 years. According to the researchers, it is also the first ancient biblical fragment recovered from the ark of a synagogue (as opposed to the Dead Sea Scrolls, which were preserved in desert caves.)

Links to published studies:
Article on Technical Methodology and Findings
Article on Recovered Hebrew Text and Historical Significance

Original Submission

Read more of this story at SoylentNews.


RAUM weaponises the most popular torrents to spread malicious malware "IndyWatch Feed Tech"

Security company reveals the malicious torrent network tool

Black Team, an Eastern European cybercrime syndicate has recognized a huge underground malicious network, which is capable of weaponizing popular torrent files to spread malware.

This underground cyber-crime network named RAUM was discovered by the U.S. security firm InfoArmor, who said that the RAUM was used in active campaigns to spread malware through torrents.

Researchers at InfoArmor discovered that RAUM has been used to essentially “weaponize” torrents to spread a variety of ransomware types including, CryptXXX, CTB-Locker and Cerber, the online-banking Trojan Dridex and password stealing spyware Pony.

“RAUM is a special system developed by the owners of the identified underground malicious network, used for two things – analysis of trending torrent files on torrent trackers with high number of downloads, and further repacking of this files with malware for further distribution. The system uploads final weaponized torrent file to the same trackers under various stolen user accounts, having good reputation there,” Andrew Komarov, InfoArmor’s CIO, told in an email.

Once the torrent tracker identifies the most popular content being downloaded at that time, malware is inserted into the parsed torrent files, and the weaponized file is then placed for further distribution through popular torrent sites like PirateBay, ExtraTorrent and TorrentHound.

“Later, they upload them to the same trackers, and other trackers, using stolen credentials of ‘seeders’, having good reputations on them, as it helps their files to be distributed better. In such way, they infect big number of users systematically,” Komrarov added.

According to the researchers, “Threat actors were systematically monitoring the status of the created malicious seeds on famous torrent trackers such as The Pirate Bay, ExtraTorrent and many others.

“In some cases, they were specifically looking for compromised accounts of other users on these online communities that were extracted from botnet logs in order to use them for new seeds on behalf of the affected victims without their knowledge, thus increasing the reputation of the uploaded files.”

“We have identified in excess of 1,639,000 records collected in the past few months from the infected victims with various credentials to online-services, gaming, social media, corporate resources and exfiltrated data from the uncovered network,” they added.

The RAUM tool has been distributed exclusively to threat actors by invitation only, who then distribute malware through torrents based on a pay-per-install (PPI) model. The more times the malware is installed unknowingly by a user, the more money the cybercriminal is due.

Considering how important trust is in the torrent community, if major uploaders were compromised, malware distribution could be increased exponentially.

“In some cases, the lifespan of these seeded malicious files exceeded 1.5 months and resulted in thousands of successful downloads,” InfoArmor says.

The most popular targets are PC-based online games and activation files (as opposed to video and music files) for operating systems including Microsoft Windows and Apple Mac OS.

“All of the created malicious seeds were monitored by cybercriminals in order to prevent early detection by [anti-virus software] and had different statuses such as ‘closed,’ ‘alive,’ and ‘detected by antivirus.’ Some of the identified elements of their infrastructure were hosted in the TOR network,” InfoArmor explains.

Users should take extreme caution when visiting torrent download sites, or downloa...


Leaked NSA Hacking Tools Were 'Mistakenly' Left By An Agent On A Remote Server "IndyWatch Feed Tech"

If you are a hacker, you might have enjoyed the NSA's private zero-day exploits, malware and hacking tools that were leaked last month. But the question is: How these hacking tools ended up into the hands of hackers? It has been found that the NSA itself was not directly hacked, but a former NSA employee carelessly left those hacking tools on a remote server three years ago after an


Red Hat Platform-as-a-Service Cloud Loves Containers "IndyWatch Feed Tech"

When Red Hat launched its OpenShift Platform as a Service (PaaS) cloud in 2013, the focus was on making life easier for developers. OpenShift's theme remains the same but Red Hat has made it crystal clear that developing on the cloud today means using containers.

Red Hat Platform-as-a-Service Cloud Loves Containers "IndyWatch Feed Tech"

When Red Hat launched its OpenShift Platform as a Service (PaaS) cloud in 2013, the focus was on making life easier for developers. OpenShift's theme remains the same but Red Hat has made it crystal clear that developing on the cloud today means using containers.


Young hacker Luca Todesco announced the iPhone 7 jailbreak "IndyWatch Feed Tech"

The popular hacker Luca Todesco (aka @qwertyoruiopz) has announced the existence of the iPhone 7 jailbreak for devices running iOS 10.

Only a few hours, this is the time spent by the popular hacker Luca Todesco (aka @qwertyoruiopz) to jailbreak the new and secure iPhone 7. The iPhone 7 was launched by Apple a few days ago and of course, hackers worldwide started their race to jailbreak the new device.

The 19-year-old hacker Luca Todesco shared via Twitter an image of his jailbroken iPhone 7, not so bad! The expert exploited a series of bugs to hack the device in just 24 hours and demonstrating that also the iPhone 7 is “not 100 percent secure-like nothing else is

The image shows an iPhone 7 running both iOS 10.0.1 as well as the Cydia repository, used by owners of jailbroken device to install apps and other software that Apple does not officially support.


Cydia is an application very popular within the community of iOS Apple users, it is the jailbreaker’s App Store alternative for iOS. The unofficial store contains thousands of apps, themes, and many other downloads. Using Cydia iOs users can find and install applications on their jailbroken iOS Apple devices, the majority of the software in the store are available for free.

At the time I was writing it is not clear if Todesco will release the iPhone 7 jailbreak to the public, he hasn’t provided much information about the hack, for example he doesn’t explain if the exploit is an untethered jailbreak.

An untethered jailbreak is a procedure that doesn’t require the iPhone any reboot every time it connects to an external device capable of executing commands on the device.

The untethered jailbreak is more complicated, it makes the jailbroken device totally independent of the computer and allows users turning off and on the device without prob...


Salmon Trucking Success Could Open Miles of Historical Spawning Habitat "IndyWatch Feed Tech"

For the past several years, technicians have been trucking spring Chinook salmon above Foster Dam in Sweet Home to see if they would spawn, and if their offspring could survive the passage over the dam and subsequent ocean migration to eventually return as adults some 3-5 years later.

A new study examining the genetic origin of adult spring Chinook returning to Foster Dam offers definitive proof that the offspring survived, potentially opening up miles of spawning habitat on the upper South Santiam and other river systems.

Results of the study have been published in the Canadian Journal of Fisheries and Aquatic Sciences.

"With a little human assistance, it is now clear that we can restore natural production to areas above some dams and there is prime habitat on some river systems, such as the North Santiam above Detroit Dam," said Kathleen O'Malley, an Oregon State University geneticist and principal investigator on the project. "This could really contribute to the long-term population viability in some river systems."

Original Submission

Read more of this story at SoylentNews.


World’s Biggest, Most Useless AI Machine "IndyWatch Feed Tech"

In a time when we’re inundated with talk of an impending AI apocalypse it’s nice to see an AI that’s intentionally useless. That AI is HAL 9000. No, not the conflicted HAL from the movie 2001: A Space Odyssey but the World’s Biggest AI Useless Machine HAL built by [Rafael], [Mickey] and [Eyal] for GeekCon 2016 in Israel.

Standing tall, shiny and black, the box it’s housed in reminds us a bit of the monolith from the movie. But, in a watchful position near the top is HAL’s red eye. As we approach, HAL’s voice from the movie speaks to us asking “Just what do you think you’re doing, Dave?” as the eye changes diameter in keeping with the speech’s amplitude. And at the bottom is a bright, yellow lever marked ON, which of course we just have to turn off. When we do, a panel opens up below it and a rod extends upward to turn the lever back to the ON position.

Behind the scenes are two Arduinos. One Arduino manages servos for the panel and rod as well as playing random clips of HAL from the movie. The other Arduino uses the Arduino TVout library to output to a projector that sits behind the red diffuser that is the eye. That Arduino also takes input from a microphone and based on the amplitude, has the projector project a white circle of corresponding diameter, making the eye’s appearance change. You can see all this in action in the video after the break.

Paradoxically, useless machines serve the purpose of being fun and we’ve seen other fun ones in the past, such as one that snuffs out a candle the moment you light it and another that turns the pages of a book and scans them, with wooden eyes. So check them out while not wasting time having fun.

Filed under: Arduino Hacks, robots hacks


SDN Platforms Boron, Hummingbird Released "IndyWatch Feed Tech"

Seen by some as competing for supremacy in the software-defined networking (SDN) controller space, the ONOS Project and the OpenDaylight Project just released respective platforms within one day of another.


Unauthenticated SQL Injection in Huge-IT Catalog v1.0.7 for Joomla "IndyWatch Feed Tech"

Posted by Larry W. Cashdollar on Sep 23

Title: Unauthenticated SQL Injection in Huge-IT Catalog v1.0.7 for Joomla
Author: Larry W. Cashdollar, @_larry0
Date: 2016-09-16
Download Site:
Vendor Notified: 2016-09-17
Vendor Contact: info () huge-it com
Description: Huge-IT Product Catalog is made for demonstration, sale, advertisements for your products. Imagine a stand
with a variety of catalogs with a specific product category. To...


Copyright Troll Partner “Kicked Uber Driver in the Head” "IndyWatch Feed Tech"

croucherIn October 2015, a well-known copyright-trolling outfit announced the launch of the “largest” anti-piracy campaign seen in the UK for years.

German-based monitoring company Maverick Eye said that it had teamed up with London-based Hatton & Berkeley and other key players to target file-sharers with cash settlement demands.

Due to the complexity of the setup, some likened the project to a “smoke and mirrors” operation.

Initially, Hatton & Berkeley and its owner Robert Croucher became known for demanding money from alleged Sky Broadband downloaders of the Robert Redford movie The Company You Keep.

“Hatton and Berkeley stands alongside our colleagues in an international operation that has so far yielded drastic reductions in streaming, torrenting and illegal downloads across Europe,” a company spokesperson said at the time.

Common to all of Hatton and Berkeley’s letters to ISP subscribers are threats that if they don’t pay, ultimately they will end up in court. To date, that has never happened, but interestingly Hatton and Berkeley’s Robert Croucher is now in some legal trouble of his own.

According to a Court News report (subscription), 35-year-old Croucher has been appearing in court this week following allegations of a serious assault.

It all began following a night out at the exclusive members-only Raffles club in Chelsea, London, which is frequented by the rich, famous, and Croucher. It is the only nightclub the Queen has ever attended.

After leaving the club, it’s understood that Croucher tried to get into an Uber car but things quickly got out of hand.

According to driver Mohammad Hussain, a woman was the first to get into his vehicle. Croucher is said to have thrown his bag into the car, something which provoked an argument between the pair. Croucher then slammed the door.

“I got out to open the door, and then the gentlemen took the keys from through the window,” Hussain told Hammersmith Magistrates’ court. “He then slapped me.”

Croucher admits hitting Mr Hussain but according to the Uber driver, things got much worse from there.

“I was begging for my keys and he suddenly pushed me on the pavement,” Hussain told the Court.

“He has just kicked me in several parts of my body and head. My head was very swollen, I went to hospital where I stayed for four hours. I went to my GP a few days later and got prescribed antibiotics, it was severe pain.”

Croucher, who gave his address as Hawthorn Road, Hornsey, north London, admits assault but denies kicking Mr Hussain.

This is the third time in as many months Croucher has made the news.

In the House of Lords during July, Lord Lucas advised recipients of threatening letters from Croucher’s Hatton & Berkeley to thrown them away.

“I really urge them to put [their correspondence] in the bin. The current scammers aren’t pursuing anyone [in court] they’re just after threats, and extortion, and shaking people down,” Lord Lucas...


Unauthenticated SQL Injection in Huge-IT Portfolio Gallery "IndyWatch Feed Tech"

Posted by Larry W. Cashdollar on Sep 23

Title: Unauthenticated SQL Injection in Huge-IT Portfolio Gallery Plugin v1.0.6
Author: Larry W. Cashdollar, @_larry0
Date: 2016-09-16
Download Site:
Vendor:, fixed v1.0.7
Vendor Notified: 2016-09-17
Vendor Contact: info () huge-it com
Description: Huge-IT Portfolio Gallery extension can do wonders with your website. If you wish to show your photos,
videos, enclosing the additional images...


Recon Europe 2017 Call For Papers - January 27 - 29, 2017 - Brussels, Belgium "IndyWatch Feed Tech"

Posted by cfpbrussels2017 on Sep 23

` . R E C O N * B R U S S E L S .
. . C F P ' .
. 27 - 29 January 2017 . .
. ' Brussels, Belgium .
\ .
-6)) +
\ † ....


[SECURITY] [DSA 3674-1] firefox-esr security update "IndyWatch Feed Tech"

Posted by Moritz Muehlenhoff on Sep 23

Debian Security Advisory DSA-3674-1 security () debian org Moritz Muehlenhoff
September 22, 2016

Package : firefox-esr
CVE ID : CVE-2016-5250 CVE-2016-5257...


This 12 black dots optical illusion is driving everyone crazy "IndyWatch Feed Tech"

Why This 12-Dot Illusion Is Bending Everyone’s Brain?

A new optical illusion is breaking the internet. Twelve black dots are the focus of this optical illusion, as people are unable to understand as to why they are not able to see all the dots at once.

(Image credits : The verge)

Will Kerslake, a game developer, took to Twitter on Sunday to post a confusing picture of intersecting grey lines over a white background. The image was retweeted over 30,000 times as people tried to understand how it worked.

The optical illusion came to prominence in the past few days after it was posted to Facebook this weekend by Japanese psychology professor Akiyoshi Kitaoka.

However, the origin of this tricky image is a scientific paper published in the journal Perception in 2000.

In the picture, there are actually twelve dots at each intersection. However, your brain will not let you see them all at the same time. As a result, each time you move your eyes, a dot disappears and another appears.

“They think, ‘It’s an existential crisis,'” says Derek Arnold, a vision scientist at the University of Queensland in Australia. “How can I ever know what the truth is?” But, he adds, scientists who study the visual system know that perception doesn’t always equal reality.

French scientist Jacques Ninio said the illusion has to do with humans having sketchy peripheral vision.

“When the white disks in a scintillating grid are reduced in size, and outlined in black, they tend to disappear. One sees only a few of them at a time, in clusters which move erratically on the page,” Mr Ninio explained.

“Where they are not seen, the grey alleys seem to be continuous, generating grey crossings that are not actually present.

“Some black sparkling can be seen at those crossings where no disk is seen. The illusion also works in reverse contrast.”

So, when you are focusing on a single black dot in the centre of your field of view, your brain paints in what it believes is most likely going on around it.

And, it assumes that there will simply be more grey lines on a white background, missing out the intermittent black dots, which is why there are no black dots.

Source: The Verge

The post This 12 black dots optical illusion is driving everyone crazy appeared first on TechWorm.


Why a Trump Victory in November is a Virtual Certainty "IndyWatch Feed Tech"

I  strongly recommend this analysis.  I have made many successful calls based on paying attention to the popular vote instead of the enthusiasms of newspapermen.  Here we see that the popular vote has shifted to Trump as a result of his no holds barred battle to drive the pretenders from the ring.

Remember we are merely asking two folks out of every one hundred to switch.  That is not much at all.  And it is now the strategic end game.

Trump will now easily campaign as a robust centralist Democrat as that is what he has always been.  After all the Republican party is going nowhere after he conducted his unfriendly takeover.  He owns it and they are all lining up to make smiley faces in the hope of whatever crumbs come their way.

Astonishingly, even the radical left who is union centric has common cause with him.  Many may stay home as he is espousing their cause as well.

Add in the accelerating collapse of  Clinton fortunes and the desperate last minute attempts by the Democrats to regig their campaign and he may well be campaigning against a ghost as well.

Why a Trump victory in November is a virtual certainty

By Helmut Norpoth, contributor

September 12, 2016, 06:03 pm

To venture the prediction that Donald Trump is a sure bet to be elected President in November sounds about as outlandish, perhaps even ludicrous and delusional as anything coming out of the mouth of the candida...


Over 30,000 scientists say 'Catastrophic Man-Made Global Warming' is a complete hoax and science lie "IndyWatch Feed Tech"

This is the correct way to answer the 97 percent nonsense.  The hard reality is that even fully engaged scientists are at best uncommitted and should be!  Worse, the evidence of the past eighteen years has been amazingly neutral after the brief peak that occurred in 1998.

 However it has been neutral but warmed up which provides a shifted range of temperature variation or should.  Thus we have had a better climate for twenty years.

I have good reason to expect a downward shift in the next two decades as against a further upward shift. In fact, were i a betting man i would give odds on it if i could discover a way to actually measure it with confidence and no meddling.  Certainly the worst of the warming effects have ameliorated.

More scary is that a sharp drop is also possible, but a much lower probability.  It simply may not happen..

Over 30,000 scientists say 'Catastrophic Man-Made Global Warming' is a complete hoax and science lie

Wednesday, August 31, 2016 by: Daniel Barker

NaturalNews) The highly-politicized climate change debate rages on as we approach the crucial 2016 U.S. presidential election, despite an ever-growing body of evidence revealing the fact that "catastrophic man-made global warming" is nothing more than an elaborate hoax.

And the November election may prove to be a victory for the hoaxers, according to experts who happen to be among those who dare to challenge the spurious climate change narrative.

One of these experts is Weather Channel founder John Coleman, who is now warning that the election could prove to be a "tipping point" in favor of people like Al Gore, who continue to amass vast fortunes based on the global warming scam.

In a recent interview with Climate Depot, Coleman said:

"Al Gore may emerge from the shadows to declare victory in the 'global warming' debate if Hillary Clinton moves into the White House. Yes, if that happens and the new climate regulations become the law of the land, they will be next to impossible to overturn for four to eight years."

Climate change proponents remain undeterred in their miss...


Mountain Lion in Guy's Face "IndyWatch Feed Tech"

This is interesting.  A lion is an ambush hunter mostly.  This looks to be a case of confrontation and stare down.  Certainly enough to send the observe up a tree.

I am more concerned by the lack of fear.  We have not been serious about hunting apex predators for a couple of generations.  That leads to a serious increase in direct confrontation.  That is not a good plan.  It is far better that they avoid us.

This will start to be a serious problem.  Young children are terribly vulnerable to both cougars and wolves who normally avoid adults.  Coyotes are also a potential threat to the very small.

I have walked fearlessly in the woods for years but remain conscious of just how blind we are.  A cougar can sit in a handy tree apron and watch you go by ten feet away



Self-driving Tractors "IndyWatch Feed Tech"

Self Driving will have issues for some time in terms of the private automobile.  Most of those will not exist in the agricultural setting.  The speed is naturally slow and you are interested in repetition which is not as easy on the open road.

Much more significant, this technology allows for small machines which are potentially very valuable to the farm.  Such machines allow for small densely cropped fields and narrow strips holding trees and fruit shrubs creating a vastly more productive biome.

The most important tool is a robotic device able to pick raspberries and strawberries and all else. It is easy to keep such a device working from spring through late September with the right blend of crops.

Such technology will hugely support organic farming in particular. It could even pick bugs...

Self-driving tractors promise to get themselves to work, plow without complaint

 August 30, 2016

Self-driving tractors can work day and night, through rain, hail and shine. View gallery (16 images)

There's been a lot of focus on consumer self-driving technology recently, but autonomy promises to shake things up in the agricultural world too. CNH Industrial's latest concepts aim to demonstrate how self-driving tractors can deliver faster, more precise results than their human controlled counterparts.

New Holland NH Drive Concept...


Containerized Production Environments: Networking, Security, and Storage "IndyWatch Feed Tech"

So you have an application that is composed around containers. You have lightweight base images, a centralized container registry, and integration with the deployment and continuous integration (CI) pipeline — everything needed to get containers working at full scale on your hardware. For running a multitier application, you spent time on using a service discovery mechanism for your application containers. You have a logging mechanism that pulls out the information from each container and ships them to a server to be indexed.


Yahoo Confirms 500 Million Accounts Were Hacked by 'State Sponsored' Hackers "IndyWatch Feed Tech"

500 million accounts — that's half a Billion users! That's how many Yahoo accounts were compromised in a massive data breach dating back to 2014 by what was believed to be a "state sponsored" hacking group. Over a month ago, a hacker was found to be selling login information related to 200 million Yahoo accounts on the Dark Web, although Yahoo acknowledged that the breach was


17 and Going Blind: The High Stakes of Getting Into a Gene Therapy Trial "IndyWatch Feed Tech"

Last week, after more than six months of waiting, 17-year-old Gary Ruot of Debary, Florida, was accepted into a clinical trial testing a novel treatment for a rare degenerative eye disease that strikes fast and leads to irreversible blindness.

Called gene therapy, treatments such as this one attempt to slow or in some cases reverse an inherited disease by delivering a new gene to the site of a mutated, disease-causing one. But to get into a clinical trial for such therapies, patients must meet specific criteria set by drug makers. They must fall into a certain age group, they must have had symptoms for a defined period of time, and they must harbor the precise genetic mutation the therapy is designed to correct. Matching the right people to these experimental therapies is challenging, and the stakes are high for patients with no other options.

In Gary's case, there was little time to act. His vision first started declining in December 2015. In January he stopped playing baseball, and by February he couldn't see to drive anymore. That month he was diagnosed with Leber's hereditary optic neuropathy, or LHON, which affects a[s] few as one in 50,000 people worldwide.

"This is a devastating disorder that has no proven therapy of any great efficacy," says Nancy Newman, principal investigator in the trial and a professor of ophthalmology at Emory University School of Medicine, where it is taking place. "That's why a patient would be willing to move into the gene therapy area, despite the fact that there will always be risks."


Read more of this story at SoylentNews.


Hacker Interviews – Toxic Venom from #Z3ro0d3 crew "IndyWatch Feed Tech"

Today I’ll present the hacker Toxic Venom, a member of P.G.A hacking group that is one of the most active teams in this period


You are a popular hacker that has already participated in several hacking campaigns, could you tell me more.

I began hacking 5 years ago. I was drawn by the Anonymous collective as I believe in the truth and valid information which should be available to all. I worked solo until I was asked to join P.G.A now known as . This team has a good variety of skills among its members. We have worked on and #OpKillingBay targeting aquariums who facilitate the capture of wild dolphins. At present, we are running the  campaing against the censorship of information by the media.

Which are your motivations?

I see security as a challenge. Most companies do not provide adequate protection for their clients’ data. I like to prove this as fact.

What was your greatest hacking challenge?

Recently I took down the servers of PoodleCorp () one of the most dreaded hacker group on Internet that targeted the gaming industry) to stop the attack against Blizzard and save their game servers. Skids like these give Anonymous a bad reputation.

Which was your latest hack? Can you describe me it?

My latest attack is for which is still ongoing. We have shut down several media sites world wide including The Japan Times to protest against the corruption within the media. Journalists use to tell what governments want us to hear.

What are the 4 tools that cannot be missed in the hacker’s arsenal and why?

  • Botnets – to attack strong websites. A good Vpn – to protect yourself online and hide your personal IP Linux syste...


As of October 5, automatic OAuth 2.0 token revocation upon password reset "IndyWatch Feed Tech"

Google announced a change to its security policy to increase the account security that includes the OAuth 2.0 token revocation upon password reset.

Google has finally announced a new OAuth 2.0 token revocation according to its security policy, the company will roll out the change starting on Oct. 5.

The change to the Google security policy was announced last year by Google, the company explained that OAuth 2.0 tokens would be revoked when a user’s password was changed.

Google decided not to move forward with this change for Apps customers and began working on a more admin-friendly approach.

The company has implemented the OAuth 2.0 authentication protocol in 2012 with the intent of boosting the security of its services like Gmail and Google Talk.

Google aims to improve users’ security limiting the impact on the usability of its application, at least in this first phase so although initially planned for a wider set of applications, the OAuth 2.0 token revocation rule will be limited to the email mail service.

Google confirmed that the App Script tokens and apps installed via the Google Apps Marketplace are not subject to the token revocation.

“To achieve the security benefits of this policy change with minimal admin confusion and end-user disruption, we’ve decided to initially limit the change to mail scopes only, and to exclude Apps Script tokens. Apps installed via the Google Apps Marketplace are also not subject to the token revocation.” reads the Google announcement. “Once this change is in effect, third-party mail apps like Apple Mail and Thunderbird―as well as other applications that use multiple scopes that include at least one mail scope―will stop syncing data upon password reset until a new OAuth 2.0 token has been granted. A new token will be granted when the user re-authorizes with their Google account username and password.”


After the change will be effective, third-party mail applications that include at least one mail scope will no longer sync data when the user password is reset. The data syncing will start again after a new OAuth 2.0 token has been granted.

The change will impact also mobile users, it will affect for example mail applications. The Apple iOS users who use the mail application included in the mobile OS will have to re-authorize it with their Google account credentials when they change their password.

This is nothing new for Gmail apps on both iOS and Android the already require to grant a new OAuth 2.0 token upon password reset, but Google will enforce the change also to third-par...


Windows 10 Software Condemned by Which? "IndyWatch Feed Tech"

Microsoft has been criticised over its Windows 10 software by consumer rights group Which?.

The body said it had received hundreds of complaints about the upgrade, including lost files, emails no longer syncing and broken wi-fi and printing.

In some cases, it said, users had had to pay for their computer to be repaired.

Microsoft defended its software and highlighted that it provided help online and by phone.

"The Windows 10 upgrade is a choice designed to help people take advantage of the most secure and most productive Windows," said a spokesman.

"Customers have distinct options. Should a customer need help with the upgrade experience, we have numerous options including free customer support."

Which? surveyed more than 5,500 of its members in June, and said that 12% of the 2,500 who had upgraded to Windows 10 had later reverted to an earlier version.

It's not a surprise to anyone on Soylent, but this is the sort of thing that causes conventional wisdom to shift.

Original Submission

Read more of this story at SoylentNews.


“Stephen Hawking Wants to Find Aliens Before They Find Us” "IndyWatch Feed Tech"

Via: Cnet: In his new half-hour program “Stephen Hawking’s Favorite Places” on science-themed subscription service CuriosityStream, the world’s most famous theoretical physicist flies by the potentially habitable exoplanet Gliese 832c in a CGI spaceship as part of his hypothetical dream itinerary for a tour of the universe. The super-Earth is only 16 light-years away and […]


Real Headline: “Get Ready for Freeways That Ban Human Drivers” "IndyWatch Feed Tech"

Sure, they lead with the safety argument, but what you’re going to wind up with is something like this: Didn’t pay taxes? “Driving disabled. Would you like to pay overdue taxes, penalties, fees and interest now?” Didn’t pay parking fine? “Driving disabled. Would you like to pay your fine now?” Children not vaccinated? “Limited destinations. […]


NASA Scientists Find 'Impossible' Cloud On Titan -- Again "IndyWatch Feed Tech"

The puzzling appearance of an ice cloud seemingly out of thin air has prompted NASA scientists to suggest that a different process than previously thought -- possibly similar to one seen over Earth's poles -- could be forming clouds on Saturn's moon Titan.

Located in Titan's stratosphere, the cloud is made of a compound of carbon and nitrogen known as dicyanoacetylene (C4N2), an ingredient in the chemical cocktail that colors the giant moon's hazy, brownish-orange atmosphere.
"The appearance of this ice cloud goes against everything we know about the way clouds form on Titan," said Carrie Anderson, a CIRS co-investigator at NASA's Goddard Space Flight Center in Greenbelt, Maryland, and lead author of the study.
The first step in the proposed process is the formation of ice particles made from the related chemical cyanoacetylene (HC3N). As these tiny bits of ice move downward through Titan's stratosphere, they get coated by hydrogen cyanide (HCN). At this stage, the ice particle has a core and a shell composed of two different chemicals. Occasionally, a photon of ultraviolet light tunnels into the frozen shell and triggers a series of chemical reactions in the ice. These reactions could begin either in the core or within the shell. Both pathways can yield dicyanoacteylene ice and hydrogen as products.

Original Submission

Read more of this story at SoylentNews.


Electric Train Demonstrator "IndyWatch Feed Tech"

If you ever want to pique a kid’s interest in technology, it is best to bring out something simple, yet cool. There was a time that showing a kid how a crystal radio could pull in a radio station from all the way across town fit the bill. Now, that’s a yawner as the kid probably carries a high-tech cell phone with a formidable radio already. Your latest FPGA project is probably too complicated to grasp, and your Arduino capacitance meter is–no offense–too boring to meet the cool factor criterion.

There’s an old school project usually called an “electromagnetic train” that works well (Ohio State has a good write up about it as a PDF file). You coil some bare copper wire around a tubular form to make a tunnel. Then a AAA battery with some magnets make the train. When you put the train in the tunnel, the magnetic forces propel the train through the tunnel. Well, either that or it shoots it out. If that happens, turn the train around and try again. There’s a few of these in Internet videos and you can see one of them (from [BeardedScienceGuy]) below.

This isn’t a new idea, but the Ohio State instructions are well suited for use in a classroom or just to work with an intellectually curious kid. Since this is simple enough, you can work with the kids (or kid) to actually build the device or let them build several in groups.

Getting kids interested in tech might be the ultimate hack. If you are looking for other ideas, you can try an electromagnetic egg drop (or a more traditional one) or a little pretend robot exercise.

Filed under: classic hacks


Lenovo's "Signature Edition" Laptops Refuse to Install Linux "IndyWatch Feed Tech"

Lenovo has confirmed that several of its Yoga laptops are refusing to install Linux-based operating systems. The Chinese firm said the issue had been caused by its switch to a new storage system, which reads and records data faster than normal.

There had been confusion after one of its employees posted that Linux was blocked because of an "agreement with Microsoft". However, Lenovo has denied enforcing a deliberate ban.

The restriction affects PCs sold with the "signature edition" of Windows 10. The term refers to a promise that "junk" software is not pre-installed alongside the OS to avoid slowing down its operation.

The Lenovo rep's response (linked to in the excerpt) seems to have been given before the company PR people got involved.

Hot Hardware , offers an alternative perspective:

Yesterday, Lenovo confirmed that Linux cannot be installed on the machine because there are no OS-specific drivers for the device's proprietary RAID configuration. Given that this machine has been designed to work with Windows 10, it should come as no surprise that Lenovo probably didn't want to devote too much of its resources to developing alternative drivers for this particular model.

To be more specific, Lenovo had this to say:

To support our Yoga products and our industry-leading 360-hinge design in the best way possible we have used a storage controller mode that is unfortunately not supported by Linux and as a result, does not allow Linux to be installed. Beyond the controller setup limitation, other advanced capabilities of the Yoga design would likely not work with current Linux offerings.

Lenovo does not intentionally block customers using other operating systems such as Linux on Yoga or any of its devices and is fully committed to providing Linux certifications and installation guidance on a wide range of suitable products.

In a statement provided to The Register , Lenovo further clarified its position on RAID support in Linux for the Yoga 900, writing, "Unsupported models will rely on Linux operating system vendors releasing new kernel and drivers to support features such as RAID on SSD."

Original Submission

Read more of this story at SoylentNews.


[OSSA 2016-011] Nova may fail to delete images in resize state regression (CVE-2016-7498) "IndyWatch Feed Tech"

Posted by Tristan Cacqueray on Sep 22

OSSA-2016-011: Nova may fail to delete images in resize state regression

:Date: September 21, 2016
:CVE: CVE-2016-7498

- Nova: ==13.0.0

Rajesh Tailor from Red Hat reported a vulnerability in Nova. If an
authenticated user deletes an instance while it is in...


TAILS Linux 2.6 is Out "IndyWatch Feed Tech"

Release 2.6 of TAILS (The Amnesic Incognito Live System) has been announced:

TAILS is believed to be one of the most secure ways currently in use on the internet of protecting your identity, although it is possible to compromise information if it is used used incorrectly.

Their home page is

Original Submission

Read more of this story at SoylentNews.


DNA Hints at Earlier Human Exodus From Africa "IndyWatch Feed Tech"

Hints of an early exodus of modern humans from Africa may have been detected in living humans.

People outside Africa overwhelmingly trace their descent to a group that left the continent 60,000 years ago.

Now, analysis of nearly 500 human genomes appears to have turned up the weak signal of an earlier migration.

But the results suggest this early wave of Homo sapiens all but vanished, so it does not drastically alter prevailing theories of our origins.

And two separate studies in the academic journal Nature failed to find the signal of a later movement.

Writing in Nature , Luca Pagani, Mait Metspalu and colleagues describe hints of this pioneer group in their analysis of DNA in people from the Oceanian nation of Papua New Guinea.

The researchers examining the DNA in Papua New Guinea found the traces of the earlier migration by subtracting the DNA from the more recent migration out of Africa 60,000 years ago and the DNA from the Denisovans.

Original Submission

Read more of this story at SoylentNews.


More AMD PowerPlay Fixes Queued For Linux 4.9 "IndyWatch Feed Tech"

The AMDGPU DRM code for Linux 4.9 is already queued in DRM-Next with virtual display support and other features as well as experimental GCN Southern Islands support while today another feature pull request was submitted to DRM-Next with more Radeon/AMDGPU changes...


Scratch-Built EV From Hoverboards "IndyWatch Feed Tech"

Electric vehicles are everywhere now. Even though battery technology hasn’t had the breakthrough that we need to get everyone out driving an electric car, the price for batteries has dropped enough that almost anything else is possible. The hoverboard was proof of this: an inexpensive electric vehicle of sorts that anyone who was anyone in 2015 had. Taking his cue from there, [Harris] used off-the-shelf parts normally used for hoverboards to build his own battery-powered trike.

The trike is homemade from the ground up, too. The H-frame was bolted together using steel and lots and lots of bolts. Propulsion comes from a set of hub motors that are integrated into the wheels like a hoverboard or electric bicycle would have. Commonly available plug-and-play lithium batteries make up the power unit and are notably small. In fact, the entire build looks like little more than a frame and a seat, thanks to the inconspicuous batteries and hub motors.

Steering is accomplished by spinning the wheels at different rates, similar to how a tracked vehicle like a tank would steer. Each battery controls one of the drive wheels, and are both connected to a homemade controller. Be sure to check out the video below which shows him riding it all around his neighborhood at a respectable speed for a vehicle built out of hoverboard parts. Plans for an improved electric trike include switching out the front wheel for caster wheels which would be easier to steer.

If you need to scratch that electric vehicle itch, an electric longboard isn’t a bad idea but you could also modify hoverboards in other interesting ways.

Filed under: misc hacks


Patent Law Firms, David Kappos, and IAM ‘Magazine’ Still Shelter Software Patents by Cherry-Picking and Lobbying "IndyWatch Feed Tech"

Ignoring the bulk of cases or inter partes reviews in order to advance their agenda

Many cherries

Summary: Amid the gradual collapse of software patents in the United States there are disingenuous efforts to bring them back or maintain a perception that these patents are still potent

FOLLOWING the CAFC-level McRO case we have seen a new wave of software patents lobbying. We last wrote about it in yesterday's sole article and prior to it we showed how McRO got exploited for software patents agenda by the patent microcosm [1, 2, 3]. We estimated that we would probably see it lasting for weeks in the media and indeed, even a week later we still see new examples. Fenwick & West LLP of Bilki Blog is promoting software patents using this decision and watch this sensationalist and misleading headline from Paul Hastings LLP (a truly gross generalisation). They are intentionally extrapolating/generalising while ignoring all the court outcomes that they don’t like (because it disproves their claims/marketing).

Judging by the article “Alice Ruling Limits Patentability of Business Processes”, David Kappos is still at it. He is a software patents lobbyist (he used to be an official, namely USPTO Director, but he is taking money from Microsoft and IBM these days). He bemoans Alice at every turn and here’s the latest talking point from him:

David Kappos, a former director of the patent office, is quoted by Bloomberg Businessweek saying that invalidation of patents is “out of control” and has “definitely gone too far. Important software innovations that are highly technical are being deemed unpatentable. You can get software patents allowed in both China and Europe that aren’t allowable in the U.S. anymore.”

Other proponents of software patents, si...


Dutch Brothers in Court for Bitcoin Mining With Stolen Power "IndyWatch Feed Tech"


Prosecutors in the Netherlands are seeking prison sentences for two brothers who they say used stolen electricity to power computers they used to mine bitcoins worth an estimated 200,000 euros ($223,500).

Prosecutors said in a statement Wednesday that powerful computers used to "mine" the electronic currency were found in a building in the port city of Rotterdam that belonged to one of the brothers and also was used as a cannabis nursery.

Equipment in the nursery and the computers were running on illegally tapped electricity when they were discovered in 2014.

Also at

Original Submission

Read more of this story at SoylentNews.


Overnight Tech: Pressure builds ahead of TV box vote | Intel Dems warn about Russian election hacks | Spending bill doesn't include internet measure "IndyWatch Feed Tech"

LEDE: The FCC is voting on its contentious set-top box proposal in a week and you can tell the pressure is mounting.Letters are flying in both directions on Capitol Hill as the debate over how the commission should open up the market for the...


House passes bill to reimburse fed workers for Uber "IndyWatch Feed Tech"

Lawmakers are trying to ensure that federal employees can take advantage of ride-hailing services like Uber and Lyft when they travel on official government business.The House unanimously passed legislation on Thursday that would require the General...


Microsoft-Connected Patent Trolls Going Places and Suing Microsoft Rivals, Microsoft Wants More ‘Linux Patent Tax’ "IndyWatch Feed Tech"

troll dollSummary: Microsoft-connected patent trolls like Larry Horn’s MobileMedia are still attacking Microsoft rivals and Microsoft wants more money from Korea, after it attacked Linux with software patents over there (notably Samsung and LG)

“US Pat RE39231,” wrote a patent attorney, eventually meant that “Apple Must Pat MobileMedia $3M for Infringing this Patent” (MobileMedia is not as real company and we wrote about it before, in relation to MPEG-LA and Larry Horn; we wrote about him in [1, 2]).

How many people out there know that MPEG-LA is a patent troll whose head himself is/was a patent troll? Not many people know this. Horn relies on dishonest lawyers from Proskauer Rose and sues Apple, which itself is part of MPEG-LA (we already took note of how bizarre this is).

Well, “Apple loses ringtone infringement case to Nokia and Sony’s patent troll firm,” according to the headline of this report. To quote: “Apple has been ordered to pony up $3 million in damages by a Delaware judge for infringing the patent of a firm partially owned by Sony and Nokia. The case, which has been running since way back in 2010, saw MobileMedia Ideas originally accuse Apple on 16 counts of patent infringement. Six years and plenty of court activity later, the original claim has been whittled down to just one patent pertaining to iPhone ringer alerts, for which MobileMedia has been awarded a tidy sum of money.”

A patent troll connected to Nokia — a legacy of Microsoft entryism and subsequent passage of patents to trolls like MOSAID — is somewhat of a pattern we’ve seen a lot of recently. Android too is being targeted by these trolls.

“MobileMedia Ideas just won a Delaware trial against Apple over a former Sony patent,” Florian Müller wrote about it. “May file further lawsuit now over iPhone 4S and later.”

Tom O’Reilly from Mobile Media Ideas is advertising for this patent troll. He passed around the press release “MobileMedia Ideas Wins Trial against Apple” and it said:

(CHEVY CHASE, MD, US – 21 September 2016) – MobileMedia Ideas LLC is pleased to announce that the US District Court for the District of Delaware today found MobileMedia Ideas’ “polite-ignore” patent (Re 39,231) for mobile phone call silencing valid an...

Thursday, 22 September


Copyright Loophole Could Undermine Important Consumer Protection Bill "IndyWatch Feed Tech"

The Consumer Review Fairness Act Is a Noble Bill but Could Leave the Door Open for Copyright Abuse

There’s a bill making its way through Congress that would protect consumers’ freedom of speech by limiting unfair form contracts. The Consumer Review Fairness Act (H.R. 5111), introduced by Leonard Lance (R-NJ) and cosponsored by several representatives, would address two shameful practices: contracts that bar customers from sharing negative reviews of products and services online, and contracts that attempt to assign the copyright in customers’ reviews to the businesses themselves (who then file copyright takedown notices to have negative reviews removed). The CRFA is an important bill, and it addresses a major problem, but it contains one loophole that could undermine its ability to protect people who write online reviews.

If a company claims that a review is not “otherwise lawful” (for example, because it allegedly defames the company), then the law may permit the company to claim that it owns the copyright in the review and have it removed as copyright infringement, thus creating a shortcut for having speech removed. We don’t think this is what Congress intended, and we hope it’s not too late to remove the two offending words.

Imagine that I’m a vendor offering you a contract for a service. My contract includes a clause saying that you assign me the copyright in any review you write of my service. Under the CRFA, that clause would be invalid and my including it in the contract would be against the law. But if my contract says you assign me the copyright in any unlawful review you write, I could argue that that contract is valid under the CRFA.

We’re concerned that businesses could effectively use this language to bypass the traditional protections for allegedly illegal speech and instead rely on the censorship tools available to copyright owners. Filing a DMCA takedown notice is both easier and faster than convincing a judge that a piece of online speech is defamatory, especially because sending a DMCA takedown doesn’t require you to prove anything. A business could claim to be the copyright owner and get a review taken down without ever testing its claims in court.

Furthermore, transforming a different possible speech violation into a copyright infringement case brings the possibility of astronomical statutory damages, penalties with no relation to any actual harm done by the alleged infringer. Lawmakers should think twice before opening a loop...


Dem criticizes Yahoo for not disclosing hack sooner "IndyWatch Feed Tech"

Sen. Mark Warner (D-Va.) criticized Yahoo on Thursday, saying the tech giant should have come forward sooner about a massive data breach.“While its scale puts it among the largest on record, I am perhaps most troubled by news that this breach...


The Open-Source Intel Vulkan Linux Driver's Anatomy "IndyWatch Feed Tech"

Intel Open-Source Technology Center developer Jason Ekstrand presented earlier today at XDC2016 with a presentation entitled "The Anatomy of a Vulkan Driver" where he covers how he and fellow Intel developers brought up the first open-source Vulkan driver and had it ready for launch-day when Khronos formally unveiled the specification earlier this year...


House Dems tell regulator more work needed on TV boxes "IndyWatch Feed Tech"

A group of more than 60 House Democrats on Thursday said a federal regulator should release and vet a proposal to open up the market for television boxes.Under Federal Communications Commission Chairman Tom Wheeler’s proposal, set to be voted on...


Yahoo says it was hacked; ‘state-sponsored actor’ stole 500 million accounts "IndyWatch Feed Tech"

By Waqas

Yahoo hacked! Yes, yahoo just announced that 500 million user

This is a post from Read the original post: Yahoo says it was hacked; ‘state-sponsored actor’ stole 500 million accounts


FF1988: Flash Marks "IndyWatch Feed Tech"

Flash Marks by Carel Moiseiwitsch.

This is a collection of short pieces that have previously appeared in various anthologies in the 80s. It is, unfortunately, the only major collection of her work, and it isn’t very major. I mean, it’s bigly excellent, as the vernacular goes, but it’s just 32 pages. Magazine size, though.

The stories are short and angry and to the point. The artwork isn’t quite like anything else: It’s a kind of neo-expressionism, I guess, and I think you could see parallels to artists like Caro and Sue Coe, but it seems to come from a different place.

It’s more Picasso than Gary Panter. Here’s she’s illustrating a CIA handbook for rebels, and it just packs such an emotional punch.

She seems to be using scratch-board for some of these drawings, but not all of them…

Here she draws Dennis P. Eichhorn getting a blow job, so I would guess this has been reprinted from a Real Stuff issue.

She hasn’t published much after this collection, I think, and was most recently spotted in 2009.

Somebody should publish a proper retrospective. There must be more of her work floating around than is here. I seem to remember stumbling onto more of her jwork than is featured here.

This post is part of the Fantagraphics Floppies series.


Yahoo Dyslexia "IndyWatch Feed Tech"

Yahoo probably has enough on its plate right now, facing possibly the largest data breach ever –  Yahoo says at least 500 million accounts hacked in 2014 – but I just wanted to point out that it doesn’t inspire confidence when their log in screen contains a glaring typo: 

Screenshot 2016 09 23 05 11 47

(I’m not sure the links below about the ‘account security issue’ are particularly helpful either. Users may not have heard about it, and so don’t know what it’s referring to, and the second link does not enlighten the user in this case about whether they’re ‘potentially affected’ or not.) 

But a typo on a login screen? I had to double check I’d not been diverted to a scam site. Not reassuring. 


Sen. Thune slams Dems for protecting Internet transition "IndyWatch Feed Tech"

Sen. John Thune (R-S.D.) hammered Democrats on Thursday for refusing to allow a provision in the government funding bill to stop the Obama administration from ceding oversight of internet domain names to an international body.Over the past...


Star Trek Fan Films May Not be Dead After All "IndyWatch Feed Tech"

I found this article that explains CBS's real reason for the Star Trek fan film crack down. They say they are trying to stop huge money making productions full of ex-Trek actors (Renegades probably) and they will ignore any small productions now and in the future.

Quoted from the article:

Van Citters stressed that the guidelines were not designed to quash fan films... "That's not what we're trying to do here," Responding to compiled fan questions, Van Citters explained that CBS won't be going after pre-existing Star Trek fan films which don't adhere to the new guidelines, nor will it be actively reviewing and policing new ones for compliance.

The question is, can they be trusted not to sue any group making a fan film after the new rules came out?

Previous SoylentNews Coverage on the topic:

Original Submission

Read more of this story at SoylentNews.


Links 22/9/2016: Linux Professional Institute Redesign, Red Hat Upgraded "IndyWatch Feed Tech"

GNOME bluefish



  • Desktop

    • Linux “lockout” tangle snarls Lenovo

      After failing to install Linux on a recent Lenovo laptop, a Reddit user claims to have received a short reply from Lenovo’s support team: “This system has a Signature Edition of Windows 10 Home installed. It is locked per our agreement with Microsoft.”

      The company is reportedly shutting discussion threads on its official forums to prevent “disruption,” though the snarl of links and outrage flying around makes everything rather murky. The core facts at hand appear to be that a) the BIOS is programmed to enforce a RAID setup that is currently compatible only with Windows 10, and b) there’s no technical rationale for it, it’s just there to prevent other operating systems being installed. A is, of course, more plausibly true than B.

    • Which? slams Microsoft for Windows 10 update woes

      The problems included printers, WiFi cards and speakers no longer working, files being lost and emails no longer syncing. In some cases the computer required professional repair.

      Many complained that the only reason they upgraded in the first place was to get rid of the constant nagware employed by Microsoft through the GWX system installed on machines that qualified for a free upgrade.

      Many said that they had actually turned down the nagware offers and found that Windows 10 had installed anyway.

    • Windows 10 software condemned by Which? [Ed: Microsoft should stand trial for it]

      Microsoft has been criticised over its Windows 10 software by consumer rights group Which?.

      The body said it had received hundreds of complaints about the upgrade, including lost files, emails no longer syncing and broken wi-fi and printing.

      In some cases, it said, users had had to pay for their computer to be repaired.

      Microsoft defended its software and highlighted that it provided help online and by phone.

      “The Windows 10 upgrade is a choice designed to help people take advantage of the most secure and most productive Windows,” said a spokesman.

      “Customers have distinct options. Should a customer need help with the upgrade experience, we have numerous options including free customer support.”

      Which? surveyed more than 5,500 of its members in June, and said that 12% of the 2,500...


2016 LiFT Scholarship Winner Yasin Sekabira: Open Source Entrepreneur "IndyWatch Feed Tech"

2016 LiFT Scholarship Winner Yasin Sekabira: Open Source Entrepreneur


BMG Pressed Internet Provider to Pay Piracy Compensation "IndyWatch Feed Tech"

piratkeybFor several years, music rights group BMG has been chasing down pirating BitTorrent users. With help from Rightscorp the company regularly sends DMCA notices to ISPs.

These notices are bundled with settlement demands, intended for Internet subscribers who allegedly shared pirated content. If the accused subscribers pay $30, they avoid further trouble.

However, BMG’s enforcement efforts are not only directed at individual subscribers. Behind the scenes, the company is also putting pressure on ISPs to cooperate with their scheme, or pay up instead.

One of their targets is US-based Internet provider RCN. A relatively small player with roughly 400,000 subscribers, but allegedly good for millions of alleged copyright infringements.

According to BMG, the ISP is liable for the infringements of its users. RCN clearly disagrees with this accusation and went to court earlier this year to ask clarification in the form of a declaratory judgment.

A few days ago the ISP submitted an amended complaint (pdf), revealing a letter that shows how the music licensing group put pressure on them by demanding preventive measures as well as compensation.

In the letter, BMG’s law firm Steptoe & Johnson informed RCN’s executive vice president Jeffrey Kramp that the ISP failed to terminate repeat infringers on its network, despite receiving millions of notices.

“The evidence shows that RCN is allowing repeat infringers to use its network to continue their infringement of BMG works even after RCN has been notified of their specific instances of infringement,” the letter reads.

“Since Rightscorp began monitoring BMG’s copyrights, it has identified millions of instances of infringement involving thousands of BMG copyrighted works using the RCN network.”

BMG’s letter to RCN (full pdf)

RCN had previously noted that BMG accused the ISP of secondary copyright infringement and the letter shared by RCN late last week shows how.

“RCN’s knowledge and allowance of unchecked infringement to occur using its network makes it liable for secondary copyright infringement and actual or statutory damages as high as $150,000 per infringed work,” BMG’s lawyer writes.

With hundreds of works at stake, the potential damages run to dozens of millions. However, just like the accusations against individual subscribers, RCN can make these go away by signing a settlement agreement and paying compensation.

“We are hopeful that a resolution of this ongoing and damaging infringement can be reached. To that end, we suggest the parties meet to discuss a settlement that would include a means of preventing or limiting future infringement and appropriate compensation to BMG,” the letter suggests.

It’s clear that with this language BMG hoped to pressure the Internet provider into cooperating. This didn’t work out though, as RCN decided to lawyer-up instead and sue them instead.

In the amended complaint, the Internet provider asks for a declaratory judgment t...


Yahoo Data Breach, the company confirms the incident that exposed 500M accounts "IndyWatch Feed Tech"

The announcement about the Yahoo data breach is online, the company confirmed that hackers managed to access data from at least 500 million user accounts.

Today I wrote about the imminent announce of the Yahoo data breach related to an incident that resulted in the leakage of 200 million Yahoo account credentials this summer.

The company has finally made the announce, the news related the Yahoo data breach is in the headlines. The IT giant confirmed that hackers have stolen at least 500 million user accounts in a data breach dating back to 2014.

Yahoo also added that its security experts suspect the involvement of nation-state actors.

“We have confirmed that a copy of certain user account information was stolen from the company’s network in late 2014 by what it believes is a state-sponsored actor. The account information may have included names, email addresses, telephone numbers, dates of birth, hashed passwords (the vast majority with bcrypt) and, in some cases, encrypted or unencrypted security questions and answers.” reads the security notice issued by Yahoo.

“The ongoing investigation suggests that stolen information did not include unprotected passwords, payment card data, or bank account information; payment card data and bank account information are not stored in the system that the investigation has found to be affected. Based on the ongoing investigation, Yahoo believes that information associated with at least 500 million user accounts was stolen and the investigation has found no evidence that the state-sponsored actor is currently in Yahoo’s network. Yahoo is working closely with law enforcement on this matter.”

This summer the notorious hacker Peace advertised 200 Million Yahoo accounts on Dark Web, and the company was aware of the sale.

Peace offered for sale the 200 million of Yahoo account credentials (from “2012 most likely,”) on The Real Deal black marketplace. Yahoo was informed of the events and launched an internal investigation avoiding public comment on the case. The hacker was offering the data leak for 3 bitcoins (roughly $1,800 at the time of the disclosure).

yahoo data breach

The security notice informs users that the company is taking the necessary action to protect them. Below the list published by Yahoo:


Garrett: Microsoft aren't forcing Lenovo to block free operating systems "IndyWatch Feed Tech"

Matthew Garrett looks at the real problem behind the inability of some Lenovo laptops to run Linux. "The real problem here is that Intel do very little to ensure that free operating systems work well on their consumer hardware - we still have no information from Intel on how to configure systems to ensure good power management, we have no support for storage devices in "RAID" mode and we have no indication that this is going to get better in future. If Intel had provided that support, this issue would never have occurred."


Hi-Tech Tool For Measuring Your Kid’s Height "IndyWatch Feed Tech"

Sure we can have our kids back up against a wall, force them to stand up straight, and use a ruler on their head to mark their height on the wall, but what kind of hacker would we be? There isn’t a single microcontroller or any electronic component involved! The DIY-family that calls themselves [HomeMadeGarbage] stood tall and came up with a high-tech tool to measure their kid’s height.

In place of the ruler they got a small wooden box to place on the head. Under the box, at the rear end facing down, they mounted a VL53L0X laser ranging sensor. With a range of 2 meters it’s sure to work with any child. But the box has to be sat level on the child’s head, otherwise the laser will be pointing down at an angle. To handle that they put an MPU6050 6-axis motion sensor in the box along with an Arduino Nano to tie it all together. A LCD display, measurement push-button and LED are mounted outside the box on the rear facing side.

To use it, a parent sits the box on the child’s head, making sure the laser sensor isn’t blocked and can see the floor. The LCD shows the height, along with the acceleration in the x and y directions. The LED is red if the box isn’t level and green if it is. Holding the measurement button pressed puts the tool in measurement mode and when it’s level, the LED turns blue and the LCD display freezes so you can make a note of the height. You’re good for a while, depending on your child’s age. See it being used to measure a child after the break as well as an additional clip showing what the output looks like when waving a hand up and down below it.

Here they measure their child’s height.

And here’s the output when raising and lowering a hand below the sensor. The x and y values are acceleration values from the motion sensor.

And while on the topic of measuring our children’s parameters, check out this Robo Doc that reads children’s pulses without scaring them.


Filed under: misc hacks


Yahoo announces major data breach "IndyWatch Feed Tech"

Yahoo on Thursday confirmed a large-scale data breach in which 500 million accounts have been compromised in what it believes was a state-sponsored hack.According to the company, users’ “names, email addresses, telephone numbers, dates of birth,...


Groups push for probe of WhatsApp-Facebook data sharing "IndyWatch Feed Tech"

Privacy groups pushed the Federal Trade Commission (FTC) on Thursday to investigate WhatsApp’s decision to share user data with Facebook.“We are deeply concerned about the impact this proposed change in data practices will have on the privacy and...


Spending bill doesn't include Cruz internet fight "IndyWatch Feed Tech"

A push by Sen. Ted Cruz (R-Texas) to block the Obama administration from handing over management of the internet is not part of a short-term spending bill backed by Senate GOP leadership.  Majority Leader Mitch McConnell (R-Ky.) filed the...


Dems push television box proposal ahead of vote "IndyWatch Feed Tech"

Two Democratic lawmakers are trying to rally support for the Federal Communications Commission’s controversial set-top box market reforms ahead of a vote on the proposal next week.“On September 29th the FCC will vote on an updated proposal to...


HTML standardization group calls on W3C to protect security researchers from DRM "IndyWatch Feed Tech"

The World Wide Web Consortium has embarked upon an ill-advised project to standardize Digital Rights Management (DRM) for video at the behest of companies like Netflix; in so doing, they are, for the first time, making a standard whose implementations will be covered under anti-circumvention laws like Section 1201 of the DMCA, which makes it a potential felony to reveal defects in products without the manufacturer's permission.

The EFF has proposed that W3C members should be required to promise not to use the DMCA and laws like it this way; this has had support from other multistakeholder groups, like the Open Source Initiative, which has said that the W3C work will not qualify as an "open standard" if it doesn't do something to prevent DMCA abuse.

Now, another important body, WHATWG, has joined the chorus calling on the W3C to prevent their technical work from become a legal weapon. WHATWG is a breakaway web standards body, backed by all the major browser vendors, and much of the W3C's standardization process consists of snapshotting WHATWG's documents and putting W3C's stamp of approval on them.

In an op-ed on the WHATWG blog, Ian "Hixie" Hickson (who formerly oversaw HTML5 for the W3C, and now edits the HTML spec for WHATWG, while working for Google) calls on the W3C to adopt the rules protecting security research, saying "We can ill afford a chilling effect on Web browser security research. Browsers are continually attacked. Everyone who uses the Web uses a browser, and everyone would therefore be vulnerable if security research on browsers were to stop."

Hixie's letter is co-signed by fellow WHATWGers Simon Pieters from Opera, and Anne van Kesteren from Mozilla.

The charter for the W3C's DRM working group runs out in eight days and will have to be renewed. Some 20 W3C members have pledged to block any further renewal unless the W3C executive requires the group to solve this problem before finishing its work. The last time this happened, the executive dismissed these objections, but the numbers have swelled and now include prominent disabled rights groups like the UK Royal National Institute for Blind People and Media Access Australia, as well as a browser vendor, Brave.

A who's who of security researchers, including the W3C's own invited experts, have signed an open letter asking the W3C to ensure that control over disclosure of vulnerabilities in web browsers isn't given to the companies whom these disclosures might potentially embarrass.

From Hixie's post:

Much has been written on how DRM is bad for users because it prevents fair use, on how it is technically impossible to ever actually implement, on how it's actually a tool...

IndyWatch Science and Technology News Feed Archiver

Go Back:30 Days | 7 Days | 2 Days | 1 Day

IndyWatch Science and Technology News Feed Today.

Go Forward:1 Day | 2 Days | 7 Days | 30 Days

IndyWatch Science and Technology News Feed was generated at World News IndyWatch.

Resource generated at IndyWatch using aliasfeed and rawdog