IndyWatch Science and Technology News Feed Archiver

Go Back:30 Days | 7 Days | 2 Days | 1 Day

IndyWatch Science and Technology News Feed Today.

Go Forward:1 Day | 2 Days | 7 Days | 30 Days

IndyWatch Science and Technology News Feed was generated at World News IndyWatch.

Monday, 25 September


Week in review: CCleaner compromise, Optionsbleed, and Linux devices sending out spam "IndyWatch Feed Tech"

Heres an overview of some of last weeks most interesting news and articles: Hackers behind CCleaner compromise were after Intel, Microsoft, Cisco There is a new twist in the CCleaner hack saga: the attackers apparently didnt set out to compromise as many machines as possible, but were after some very specific targets. Three things to know about the dark web One of the more curious aspects about the dark web is that it didnt start More


Transhumanism: Could we live forever? BBC News "IndyWatch Feed Tech"

Dear all.

Hope you like it! Please make comments. Many tks.

Let me share a concept of with you. Its focus lies on human enhancement through the exponential technology available, such as: nanotechnology, genetics, AI, in order to lessen peoples suffering, stop aging and ultimately achieve a longer lifespan. .


Hackaday Links: September 24, 2017 "IndyWatch Feed Tech"

This is it. After twelve years we finally have a new Star Trek. Star Trek: Discovery (were using ST:DSC as the abbreviation) is airing right about when this post goes up. Next week, youll have to pay CBS $6USD a month to get your Star Trek fix, and today might be the last time a new episode of Star Trek is aired on broadcast TV ever. Enjoy it now, and hope the theme song doesnt have lyrics. Also, hope The Orville is a tenth as good as a Galaxy Quest series could be.

Whats the best way to describe Delta Sigma PLLs? The Cat In The Hat (PDF, page 31). [Dr. Tune] found a Seuss reference in a TI app note. Personally, Im a fan of hand-drawn cartoons, but well take what we can get.

This weekend the Prusa I3 MK3 was announced. A good printer just got better. Now heres the video.

The Raspberry Pi is a great media storage device, but its absolutely insufficient for audiophile tomfoolery. Heres a neat Pi DAC/amp/DSP thingy. The VoltaStream turns the Raspberry Pi into a WiFi-connected pair of speakers with low-latency audio in and a TOSLINK connector.

SpaceX! There is serious consideration being given to starting an Elon Musk column here on Hackaday. There will be SpaceX updates coming this week from the International Astronautical Congress in Adelaide. What will we find out? I dont know bruh, but I just got back from Burning Man and I realized it was a whole lot like Mars and I was wondering Elon, like, have you ever been to Burning Man because its really dusty and a whole lot like Mars and theres not much water Please, organizers of the IAC, I implore you: give more idiots microphones. That was hilarious.

How was the World Maker Faire in New York this weekend? In one word, empty. Abnormally so. Maker Faire was not as crowded as last year, and you could actually move around. My agoraphobia didnt kick in until the afterparties, and lines for the $5 bottles of water were short. Bay Area Faire attendance was down 16% from 2016-2017, and I would bet attendance for the NY Faire would be down a similar amount. Even a 10% decline in attendance would be noteworthy; the weather last year was cold and rainy and this year was beautiful. There are rumors, speculatio......


"Decapitated Man" Halloween Display Sparks 911 Calls in Greene County, Tennessee "IndyWatch Feed Tech"

A local US police department has urged people not to call 911 after reports that a man had been crushed by a garage door.

The supposed victim in Greene County, Tennessee, turned out to be a scarily realistic, early Halloween decoration. The department said it had received calls about a "suspicious person lying in a driveway with bloody handprints on the garage". Officers investigated, only to find it was a puppet stuffed with straw.

Greene County TN Sheriff's Department wrote on Facebook: "ATTENTION EVERYONE!!! For those of you driving on Chuckey Pike in Greene County: THIS IS A HALLOWEEN DECORATION! Do NOT call 911 reporting a dead body. Instead, congratulate the homeowner on a great display."

[Okay, Soylentils, what is your best Halloween prank? --Ed.]

Original Submission

Read more of this story at SoylentNews.


Animated GIFs Find & Share on GIPHY "IndyWatch Feed Tech"

Using sound waves, scientists sort markers for cancer and other diseases such as kidney disease, neurodegenerative diseases and other conditions.

Link to article:

Discover & share this Animated GIF with everyone you know. GIPHY is how you search, share, discover, and create GIFs.

Go Back:30 Days | 7 Days | 2 Days | 1 Day

IndyWatch Science and Technology News Feed Today.

Go Forward:1 Day | 2 Days | 7 Days | 30 Days

Sunday, 24 September


Re: tcpdump 4.9.2 is fully available "IndyWatch Feed Tech"

Posted by Leo Famulari on Sep 24

That's correct, I was informed of the upcoming 4.9.2 release as part of
my work on Guix security. I'm not involved with Arch.

When the embargo failed, I notified oss-security immediately. I did not
contact the distros lists because Guix is not represented on those


Re: Why send bugs embargoed to distros? "IndyWatch Feed Tech"

Posted by Ludovic Courts on Sep 24


Hanno Bck skribis:

FWIW, for GNU Guix (which doesnt have anyone yet on the distros list),
we pushed the patch less than 30 minutes after the public disclosure on

The fact that your message to oss-sec was very clear on the issue and
its consequences, and contained a link to the (small) patch surely made
it easier to prepare the fix.




24sep2017 "IndyWatch Feed Tech"


Mass Extinctions on Earth Coincided with Out-of-Whack Carbon Cycles "IndyWatch Feed Tech"

...Daniel Rothman, [is] a geophysicist at the Massachusetts Institute of Technology, who built a database of fossil records going back half a billion years. Rothman found the periods in which large percentages of existing species died off coincided with big swings in the carbon isotopes found in those records, suggesting the planet's carbon cycle was out of whack.

[...] human civilization has been pumping more carbon into the environment by burning carbon-rich fossil fuels like coal, oil, and natural gas. On the current trajectory, the oceans are expected to absorb at least another 300 billion tons of carbon by 2100 an amount that could end up producing long-term changes to the environment, Rothman concluded.

[...] Rothman isn't alone in warning of a potential extinction. Some scientists argue a sixth such event is under way already, with about two species a year disappearing and thousands seeing their populations and ranges shrink.

The more arid study is published in Science Advances and the full text is freely available.

Read more of this story at SoylentNews.


How Much Money Can Pirate Bay Make From a Cryptocoin Miner? "IndyWatch Feed Tech"

In recent years many pirate sites have struggled to make a decent income.

Not only are more people using ad-blockers now, the ad-quality is also dropping as copyright holders actively go after this revenue source, trying to dry up the funds of pirate sites.

Last weekend The Pirate Bay tested a cryptocurrency miner to see whether that could offer a viable alternative. This created quite a bit of backlash, but there were plenty of positive comments too.

The question still remains whether the mining efforts can bring in enough money to pay all the bills.

The miner is provided by Coinhive which, at the time of writing, pays out 0.00015 XMR per 1M hashes. So how much can The Pirate Bay make from this?

To get a rough idea we did some back-of-the-envelope calculations, starting with the sites visitor numbers.

SimilarWeb estimates that The Pirate Bay has roughly 315 million visits per month. On average, users spend five minutes on the site per visit. While we have reason to believe that this underestimates the sites popularity, well use it as an illustration.

We spoke to Coinhive and they estimate that a user with a mid-range laptop would have a hashrate of 30 h/s.

In Pirate Bays case this would translate to 30 hashes * 300 seconds * 315M visits = 2,835,000M hashes per month. If the miner is throttled at 30% this would drop to 850,000M hashes.

If Coinhive pays out 0.00015 XMR per million hashes, TPB would get 127.5 XMR per month, which is roughly $12,000 at the moment. Since the miner doesnt appear on all pages and because some may actively block it, this number will drop a bit further.

Keep in mind that this is just an illustration using several estimated variables which may vary greatly over time. Still, it gives a broad idea of the potential.

Since Pirate Bay tested the miner several other sites jumped on board as well. Well keep a close eye on the developments and hope we can share some real data in the future.

Source: TF, for the latest info on copyright, file-sharing, torrent sites and ANONYMOUS VPN services.


Hackaday Prize Entry: Inexpensive Emergency Button "IndyWatch Feed Tech"

Ive fallen and I cant get up. We all remember it, and we all know what product were talking about. Now, with cheap microcontrollers, ubiquitous WiFi, and wearable electronics, there must be a simpler solution. [Jean Paradedel]s emergency button project is designed to replace those wearable emergency buttons, which usually include an expensive call center plan.

[Jean]s button is based off an ESP8266 module, which sends an email to a care provider if a button is pressed. The whole thing is powered by a CR2032 watch battery and the devices case was 3D printed. The interface is simple its just a wearable button, after all and the form factor is small enough to be completely unobtrusive.

[Jean] reflashed the ESP8266 board with a simple sketch that runs the project. First, a button-press connects the device to WiFi and then blinks an LED so you know its connected. When the emergency button is pressed, an email is sent out letting a caregiver know that theres a problem.

Check out the video below for a demo of this cheap emergency button in action.

The HackadayPrize2017 is Sponsored by:
Texas Instruments

Filed under:...


Tips for an Information Security Analyst/Pentester career - Episode 16: IPv6 DoS attack "IndyWatch Feed Tech"

Over this episode, we're going to see a DoS attack on IPv6. 

Windows systems enable IPv6 networking by default and, if you go to your network adapter settings, you'll normally find IPv6 enabled. Microsoft recommends to leave it enabled, as it might be needed by some network functionalities.

However, this implies a built-in vulnerability.

In fact, these conditions might allow for IPv6 addresses to be handed out automatically, without any security implementations in mind, based on a Router Advertisement.

A hacker leveraged this vulnerability by setting up an attack that works by sending Router Advertisement packets and forcing operating systems to create IPv6 addresses in response to every packet received. By flooding the network with enough RA's, Windows machines consume more and more CPU time, causing CPU utilization to reach 100%.


For the purposes of this demonstration, I used two virtual machines, both of them configured in VirtualBox as using an internal network adapter:

  1. Kali Linux 2017 v. 1 prebuilt image:  Internal network adapter. Static IP address ( 
  2. Windows 10 64-bit:  Internal network adapter. Static IP address ( 

Both virtual machines have been configured with an i...


Megaherbivorous Dinosaurs Were Not Strict Vegetarians "IndyWatch Feed Tech"

A study (open, DOI: 10.1038/s41598-017-11538-w) (DX) has found that large plant-eating dinosaurs opportunistically dined on crustaceans that sheltered in rotting logs:

Large plant-eating dinosaurs are usually presumed to have been strictly herbivorous, because their derived teeth and jaws were capable of processing fibrous plant foods. This inferred feeding behavior offers a generalized view of dinosaur food habits, but rare direct fossil evidence of diet provides more nuanced insights into feeding behavior. Here we describe fossilized faeces (coprolites) that demonstrate recurring consumption of crustaceans and rotted wood by large Late Cretaceous dinosaurs. These multi-liter coprolites from the Kaiparowits Formation are primarily composed of comminuted conifer wood tissues that were fungally degraded before ingestion. Thick fragments of laminar crustacean cuticle are scattered within the coprolite contents and suggest that the dinosaurian defecators consumed sizeable crustaceans that sheltered in rotting logs. The diet of decayed wood and crustaceans offered a substantial supply of plant polysaccharides, with added dividends of animal protein and calcium. Nevertheless, it is unlikely that the fossilized fecal residues depict year-round feeding habits. It is more reasonable to infer that these coprolites reflected seasonal dietary shiftspossibly related to the dinosaurs' oviparous breeding activities. This surprising fossil evidence challenges conventional notions of herbivorous dinosaur diets and reveals a degree of dietary flexibility that is consistent with that of extant herbivorous birds.

Also at BBC and NPR.

Original Submission

Read more of this story at SoylentNews.


iPhone 8 is the worlds fastest smartphone and Android smartphones are not even close "IndyWatch Feed Tech"

Why iPhone 8 Is Worlds Fastest Smartphone Right Now? Faster even than Samsung Galaxy S8, OnePlus 5 and even MacBook Pro and Dell XPS laptops

its been almost two weeks since Apple launched its latest iPhone 8 at a gala in Cupertino. Apple has started shipping the iPhone 8 to its buyers from September 22 in stores across the world. You already know what the iPhone 8 looks like its just like the last three generations of iPhones, but with a glass back. The latest iteration from Apple is a continuation of iPhone journey but there is something about iPhone 8 that you dont know.

It is the fastest smartphone in the world! In fact, leave aside Samsung Galaxy S8/Note 8 and OnePlus 5T it is faster than Dell XPS and MacBook Pro iCore5 laptops. Toms Guide guys did a chop chop on iPhone 8 and the results were amazing.

Geekbench 4 Performance test of iPhone 8

Toms Guide guys started the testing of iPhone 8 with Geekbench 4, which measures overall performance.The test results were something out of blue. iPhone 8 beats Samsungs Galaxy Note 8 which is currently the fastest Android smartphone by a whopping margin. In the multicore portion of this test, the iPhone 8 hit 10,170 which was 54 percent faster than the score from Samsungs Galaxy Note 8 at 6,564.

Mind you Apple is powering iPhone 8 with an all-new A11 six-core chip and Samsung Galaxy S8 Note has 6GB of RAM paired with Qualcomms fastest and latest Snapdragon 835 chip. iPhone 8 also beat the other competitor, OnePlus 5 which got a score of 6,542.

Geekbench 4 Performance test of iPhone 8

Courtesy Toms Guide

The real surprise is that iPhone beat even its own brother in shelves MacBook Pro. Yes, the iPhone 8 GeekBench 4 scores were greater than Apple Mac OS run MacBook Pro 13 inch laptop with  7th-generation Core i5 processor. It also beat Windows 10 run Dell XPS 13. Mind you the founder of Geekbench, John Poole, said that laptops are better at delivering sustained performance over a longer period of time, as opposed to the shorter max burst performance that benchmark tests like those conducted at Geekbench 4 are designed to measure.

iPhone 8 3D test



Catastrophic Sleep-Loss Epidemic "IndyWatch Feed Tech"

Via: Independent: A catastrophic sleep-loss epidemic is causing a host of potentially fatal diseases, a leading expert has said. In an interview with the Guardian, Professor Matthew Walker, director of the Centre for Human Sleep Science at the University of California, Berkeley, said that sleep deprivation affected every aspect of our biology and was widespread []


A Thoughtful Variety of Projects and Failures "IndyWatch Feed Tech"

Our friends at [The Thought Emporium] have been bringing us delightful projects but not all of them warrant a full-fledged video. What does anyone with a bevy of small but worthy projects do? They put them all together like so many mismatched LEGO blocks. Grab Bag #1 is the start of a semi-monthly video series which presents the smaller projects happening behind the scenes of [The Thought Emporium]s usual video presentations.

Solar eclipse? There are two because the first was only enough to whet [The Thought Emporium]s appetite. Ionic lifters? Learn about the favorite transformer around the shop and see what happens when high voltage wires get too close. TEA lasers? Use that transformer to make a legitimate laser with stuff around your house. Bismuth casting? Pet supply stores may have what you need to step up your casting game and its a total hack. Failures? We got them too.

We first covered ionocraft (lifters) awhile back. TEA lasers have been covered before. Casting is no stranger to hackaday but [The Thought Emporium] went outside the mold with their technique.

Filed under: home hacks, laser hacks


Top Google Chrome Tricks That Will Make Your Life Easier "IndyWatch Feed Tech"

Hidden Google Chrome Tricks And Features That Will Make Your Life Easier

Google Chrome is the most popular internet browser on the planet. This is one such statement no one will debate over. Seeing how popular the browser is, its bound to have so many tips and tricks available, that some of them unfortunately get forgotten. Weve gone over and made a list of the lesser known Chrome tricks. Read on for the full list.

OK Google

For all those who wished they could use their phones voice search functionalities on their PCs as well. The OK Google feature of Android, works within the Chrome browser as well.

Google Keep

Ever felt the need to quickly note down an idea or a thought that came in your mind while you were surfing the internet ? With, you can now quickly note anything you need right in your browser.

See saved passwords

We all use Googles autofill feature to have Chrome remember our passwords. Ever wondered where the passwords are stored ? You can access them and/or change them by typing the following text in the address bar chrome://settings/passwords

Restore recently closed tabs

If youve ever closed your browser with multiple tabs open and then wanted to go back, Chrome has you covered. Just hit the Settings button on the top-right end of the browser, scroll down to history and you will see all your recent tabs ready to be opened with a single click.



XFree KWin: Ridding KDE's Wayland Compositor Of X11 Dependencies "IndyWatch Feed Tech"

Martin Flser (nee Grlin) has announced the "XFree KWin" project. This isn't to be confused with XFree86 but rather is about ridding KWin optionally of X11/X.Org dependencies...


Authors of Locky Ransomware are big fans Game of Thrones series "IndyWatch Feed Tech"

Researchers at PhishMe found the names of Game of Thrones show characters and other references into the script used to spread the Locky ransomware.

The fantasy drama television series Game of Thrones has an amazing number of fans, including the authors of the Locky ransomware.

The discovery was made by researchers at security firm PhishMe that found the names of show characters and other references into the source code of the Visual Basic script used by the crooks.

The Visual Basic script is included in the ZIP or RAR archive attached to email spam used in the ransomware campaign. When the victims open the archive and run the VB script contained within, it would download and install the Locky ransomware.

Lightweight script applications designed to deliver malware often use rotating or pseudorandom variable names to ensure that the malware delivery tools look unique. In this case, many of the variables (some misspelled) referred to characters and events from the globally-popular television fantasy epic Game of Thrones. states Phishme.

Experts discovered in the VB script reference to the TV show such as Aria, SansaStark, RobertBaration, JohnSnow, or HoldTheDoor .

Locky ransomware Game of thrones



Worlds first head transplant to happen early next year "IndyWatch Feed Tech"

The worlds first head transplant will be carried out on a Chinese patient

The worlds first head transplant surgery, is set to happen early next year in China. While this headline will sound straight out of a Hollywood film, this is set to happen in reality. In fact, the surgery was set to happen in December this year, but the Russian volunteer for the surgery -Valery Spiridonov has decided not to take part in the procedure and therefore, the surgery will now happen with a Chinese volunteer. There is no definitive date set, but it is expected to happen in the first quarter of 2018.

Junk Science ?

Dr. Sergio Canavero made headlines last year when he announced his plans to perform the first human head transplant. Since the announcement, the Italian neuroscientist has recruited a Chinese surgeon Dr. Xiaoping Ren, to perform the surgery with him. The first patient to undergo this procedure is a Russian man named Valery Spiridonov  suffers from  Werdnig-Hoffmann Disease, a genetic disease that breaks down muscles and kills nerve cells located in the brain and spinal cord thus making him unable to move. Currently, he is confined to his wheelchair with the only possible movements being the ability to feed himself, type and control his wheelchair with a joystick.

Spiridonov had been working with Dr. Canavero for about 2 years to get the surgery however, he has now said that he will not undergo the surgery because the doctor could not promise him what he wished for from the surgery the ability to walk again and live a normal life. The surgery does not even guarantee that he would live. He will now seek an alternative spinal surgery to improve his life instead as he said in his statement.

Given that I cannot rely on my Italian colleague, I have to take my health into my own hands. Luckily, there is quite a well-tested surgery for cases like mine when a steel implant is used to support a spine in straight position.

Chinese Volunteer

Dr. Sergio Canavero has since made a statement of his own wherein he confirmed that the surgery will instead proceed with a Chinese volunteer . Despite being criticized by the scientific community on his experiment, he is hopeful of success.

At present, nothing in detail. When the time comes, the official news will be announced by Xiaopings team in China. At the moment, I can only disclose that there has been massive progress in medical experiments that would have seemed impossible even as recently as a few months ago. The milestones that have been reached will undoubtedly revolutionize medicine. That much I can already say. ~ Sergio Canavero.



Effective Collaboration: You Don't Need Superstar Developers "IndyWatch Feed Tech"

[The] main problem here is that software development is not an individual sport. Assessing technical traits means that we are looking at candidates as individuals. At the same time, we will put them in a team context and the project's success will depend on their teamwork. A person's resume or LinkedIn profile says close to nothing about their team skills.

What's more, we know quite a lot about what makes teams effective. Anita Woolley's research on collective intelligence [DOI: 10.1126/science.1193147] [DX] provides extremely valuable insight on the topic. First of all, how do we define collective intelligence? It's basically the skill of a group to solve complex problems. Well, it sounds like the definition of everyday work for software development teams if you ask me.

Why is collective intelligence so important? Exploiting collective intelligence, as opposed to going with the opinion of the smartest person in a room, is a winning strategy. To put in Anita Woolley's words: "Collective intelligence was much more predictive in terms of succeeding in complex tasks than average individual intelligence or maximal individual intelligence."

The power is in the team.

Original Submission

Read more of this story at SoylentNews.


ASUS Tinker Board Is An Interesting ARM SBC For About $60 USD "IndyWatch Feed Tech"

Earlier this year ASUS announced the Tinker Board as their first step into the ARM single board computer world. Earlier this month I finally received a Tinker Board for testing and it has been quite interesting to say the least. The Tinker Board with its Rockchip SoC has been among the most competitive ARM SBCs we have tested to date in its price range and the form factor is compatible with the Raspberry Pi.


Battistellis Club Med at the EPO Part I: EPO Validation Agreement With Angola "IndyWatch Feed Tech"

From Friday:

Angola EPO

Summary: A series contemplating Benot Battistellis sudden interest in Angola, a country with no European Patents but plenty of connections to Antnio Campinos

TODAY, on a Sunday, we begin a long new series about the EPO. The timing seems perfect.

The minutes of the June 2017 meeting of the EPO Administrative Council confirm that Battistelli has been authorised to open negotiations on a validation agreement with Angola (dated Friday). Its the favourite day for the EPO to dump some words (e.g. in the intranet) or formal documents it prefers not to get noticed. There are already internal jokes about those Friday spills always check whats being buried and where/why.

Does Angola really matter for the EPO? The numbers (of lack thereof) speak for themselves:

Angola EPO, no patents

Its not hard to see why its tempting to suspect a political aspect to all of this. Prepare for some rather embarrassing t...


Development Release: Subgraph OS 2017-09-22 Alpha "IndyWatch Feed Tech"

Subgraph OS is a Debian-based Linux distribution which provides several security, anonymous web browsing and hardening features. The project has released a new development version, Subgraph OS 2017-09-22 Alpha. The alpha snapshot includes initial support for multiple named bridges which can be attached to application sandboxes. In addition,....


Intel IX4 Networking Performance On DragonFly Gets Boosted By Direct Input Support "IndyWatch Feed Tech"

DragonFlyBSD today picked up direct input support within the kernel's polling code. This can boost the networking performance though for now is just supported by the IX4 driver, what is used as the Intel 10Gb Ethernet driver...


Datalogger uses ESP32 and ESP8266 Low Power Modes "IndyWatch Feed Tech"

[G6EJD] wanted to design a low power datalogger and decided to look at the power consumption of an ESP32 versus an ESP8266. You can see the video results below.

Of course, anytime someone does a power test, you have to wonder if there were any tricks or changes that would have made a big difference. However, the relative data is interesting (even though you could posit situations where even those results would be misleading). You should watch the videos, but the bottom line was a 3000 mAh battery provided 315 days of run time for the ESP8266 and 213 days with the ESP32.

The fact that the hardware and software only differ in the central processing unit means the results should be pretty comparable. [G6EJD] accounts for the current draws throughout the circuit. The number of days were computed with math, so they dont reflect actual use. It also depends on how many samples you take per unit time. The goal was to get operation on batteries to last a year, and that was possible if you were willing to reduce the sample rate.

While we generally like the ESP32, [G6EJD] makes the point that if battery life is important to you, you might want to stick to the ESP8266, or look for something else. Naturally, if you are trying to maximize battery life, you are going to have to do a lot of sleeping.

Filed under: ARM, wireless hacks


BYD Predicts Ambitious China Shift to Electric Cars by 2030 "IndyWatch Feed Tech"

Via: Reuters: Chinese automaker BYD Co Ltd (002594.SZ) expects the countrys shift to cleaner new-energy vehicles (NEV) to be complete in just over a decade, an aggressive timeframe that would challenge traditional carmakers in the world top auto market. All vehicles in the country will be electrified by 2030, which could range from full electric []


PTAB Supreme Court Case (Oil States) is a Case of Patent Parasites Versus the Producing Industry "IndyWatch Feed Tech"

Patent sharks want (and profit from) legal chaos

Lighthouse fishSummary: Ahead of the decision regarding Oil States (probably months away, some time next year), various influential sites confront the misleading and self-serving propaganda from the patent microcosm, e.g. law firms (to whom patent quality is a threat)

The Patent Trial & Appeal Board (PTAB) is one of the best things about the USPTO. Its truly a shame that the EPO is nowadays driving away (to Haar) its own equivalent of PTAB. In this post wed like to focus our attention on PTAB, having written about it 24 hours ago in relation to the Mohawk tribe.

Who is it that spreads all the PTAB hate? The patent industry (trolls, lawyers and so on).Let it be understood, upfront, that PTAB is widely supported by scientists, technologists and their employers (including the very largest technology firms). Who is it that spreads all the PTAB hate? The patent industry (trolls, lawyers and so on). Covering additional CAFC cases, PTAB basher Dennis Crouch wrote about NFC Tech v Matal a few days ago to state:

Following an IPR administrative trial, the Patent Trial & Appeal Board (PTAB) concluded that the challenged claims of NFCs U.S. Patent 6,700,551 are unpatentably obvious. The focus of the dispute is on a pre-AIA inventorship claim The PTAB rejected NFCs attempt to claim priority to its date of invention.


On remand, it looks like the IPR case will continue in its original analysis, the PTAB did not actually determine whether the prototype embodied the claimed invention since it dismissed on other grounds. Thus, NFC is simply one step closer to success.

As we noted here back in August, Crouch and his blog (Patently-O) had become the loudest PTAB bashers out the...


Walmart Wants to Deliver Groceries Directly Into Your Fridge "IndyWatch Feed Tech"

Walmart wants to test "in-fridge delivery" for Silicon Valley customers with August Home "smart locks":

Here's how the test will work: I place an order on for several items, even groceries. When my order is ready, a Deliv driver will retrieve my items and bring them to my home. If no one answers the doorbell, he or she will have a one-time passcode that I've pre-authorized which will open my home's smart lock. As the homeowner, I'm in control of the experience the entire time the moment the Deliv driver rings my doorbell, I receive a smartphone notification that the delivery is occurring and, if I choose, I can watch the delivery take place in real-time. The Deliv associate will drop off my packages in my foyer and then carry my groceries to the kitchen, unload them in my fridge and leave. I'm watching the entire process from start to finish from my home security cameras through the August app. As I watch the Deliv associate exit my front door, I even receive confirmation that my door has automatically been locked.

While some may find the idea creepy, others have downplayed the creepiness factor:

Read more of this story at SoylentNews.


A New Project To Let You Run Qt Apps With GTK+ Windowing System Integration "IndyWatch Feed Tech"

A Norwegian developer has developed a new Qt platform abstraction plug-in to let Qt applications make use of GTK+ for windowing system integration. The Qt apps rely upon GTK+ as a host toolkit to provide GTK menus, GTK for input, and other integration bits...


Equifax or Equiphish? "IndyWatch Feed Tech"

More than a week after it said most people would be eligible to enroll in a free year of its TrustedID identity theft monitoring service, big three consumer credit bureau Equifax has begun sending out email notifications to people who were able to take the company up on its offer. But in yet another security stumble, the company appears to be training recipients to fall for phishing scams.

Some people who signed up for the service after Equifax announced Sept. 7 that it had lost control over Social Security numbers, dates of birth and other sensitive data on 143 million Americans are still waiting for the promised notice from Equifax. But as I recently noted on Twitter, other folks have received emails from Equifax over the past few days, and the messages do not exactly come across as having emanated from a company that cares much about trying to regain the publics trust.

Heres a redacted example of an email Equifax sent out to one recipient recently:


As we can see, the email purports to have been sent from, a domain that Equifax has owned for almost four years. However, Equifax apparently decided it was time for a new and perhaps snazzier name:

The above-pictured message says it was sent from one domain, and then asks the recipient to respond by clicking on a link to a completely different (but confusingly similar) domain.

My guess is the reason Equifax registered was to help people concerned about the breach to see whether they were one of the 143 million people affected (for more on how that worked out for them, see Equifax Breach Response Turns Dumpster Fire). Id further surmise that Equifax was expecting (and received) so much interest in the service as a result of the breach that all the traffic from the wannabe customers might swamp the site and ruin things for the people who were already signed up for the service before Equifax announced the breach on Sept. 7.

The problem with this dual-domain approach is that the domain is only a few weeks old, so it had very little time to establish itself as a legitimate domain. As a result, in the first few hours after Equifax disclosed the breach the domain was actually flagged as a phishing site by multiple brows...


Fake News About Software Patents in the United States "IndyWatch Feed Tech"

Science fiction does not just predict the future but rather inspires it. Similarly, in patent lobbying, making ridiculous claims can change the outcome to the effect the lobbyists want (UPC, Alice and so on)

Fake news about Alice

Summary: Spinning and twisting the facts (for so-called alternative facts), the patent microcosm is trying to give the impression that software patents are still fine in the US

THE previous post reminded readers that the Intellectual Property Owners Association (IPO), together with IBM, is trying to undermine Alice. They mislead the world. Its a lobbying and PR campaign. IBMs longtime asset, David Kappos (former USPTO Director), plays a role in that. But what role does crooked media play in the attempts to water down or suppress Alice? Actually, as we have been showing for years, such media is occupied or dominated by the patent microcosm.

Its a classic reversal of narratives, where the attacker is the defender and the attacked (defender) is the aggressor.Yesterday, Matthew Bultman was at it again, spinning against Alice, as usual. He is habitually cherry-picking and using misleading language to make it seem as though the patent microcosm is right and still has might. He writes for Law 360, a news site which many people would wrongly assume to be objective. Hidden behind paywalls is this latest article of his, with the word Surviving in the headline (sometimes he puts Attack in his headlines). To Bultman, the one being sued attacks and the troll survives. Its a classic reversal of narratives, where the attacker is the defender and the attacked (defender) is the aggressor. Its appal...


Massive HerbaLife spam campaign spreads a variant of Locky ransomware "IndyWatch Feed Tech"

Researchers spotted a new widespread ransomware campaign leveraging emails with malicious attachments using Herbalife branded messages.

Researchers at security firm Barracuda have spotted a new widespread ransomware campaign leveraging emails with malicious attachments, some of them pretend to be sent by the l multi-level marketing nutrition company Herbalife.

More than 20 million Herbalife branded emails were sent in a 24 hour period, since then, crooks sent out messages at a rate of about two million attacks per hour.

Most of the messages are sent from Vietnam other significant sources are India, Columbia, and Turkey and Greece.

The Barracuda Advanced Technology Group is actively monitoring an aggressive ransomware threat that appears to come in the largest volume from Vietnam.  Other significant sources of this attack include India, Columbia, and Turkey and Greece.  Other countries appear to be distributing the same attack in very low volumes. reads the analysis published by Barracuda.  So far we have seen roughly 20 million of these attacks in the last 24 hours, and that number is growing rapidly.

HerbaLife spam

The attackers are using a Locky variant with a single identifier to track the infections.

Barracuda researchers have confirmed that this attack is using a Locky variant with a single identifier. The identifier allows the attacker to identify the victim so that when the victim pays the ransom, the attacker can send that victim the decryptor, continues the analysis. In this attack, all victims get the same identifier, which means that victims who pay the ransom will not get a decryptor because it will be impossible for the criminal to identify them.

The email attachment claims to be an invoice for an order placed through the company Herbalife. If the user opens the file, it will launch the ransomware dropper.

Attackers are also observing attachments that claim to impersonate invoicing from


Linux 4.14 Is Up To Around 23.2 Million Lines Of Code "IndyWatch Feed Tech"

While I usually look at the Linux kernel code size following each merge window, I am a few days late this time around due to busy Xeon/EPYC benchmarking and XDC2017. Anyhow, Linux 4.14 is showing some weight gains but nothing too bad...


The State Of Intel's GPU Virtualization Pass-Through On Linux "IndyWatch Feed Tech"

Wrapping up our XDC2017 coverage for this annual X.Org developer event that took place this past week in Mountain View, Zhenyu Wang of Intel presented on their ongoing work for mediated GPU virtualization pass-through support on Linux, Intel GVT...


IBM and IPO Continue Working Behind the Scenes to Undermine Alice and Promote Software Patents "IndyWatch Feed Tech"

Ginni Rometty

Summary: The Intellectual Property Owners Association (IPO), together with IBM (Manny Schecter, Marian Underweiser and others), is still trying to overturn Mayo and Alice

THREE years ago Alice came to change everything. It was the summer of 2014 when the US patent system became more officially hostile towards software patents. Much has been written on the subject since then, including literally about a thousand articles here in Techrights (we regret not developing a detailed index page in Wiki form as we went along covering Alice; we had made one for the Bilski case).

We constantly need to defend and advocate Alice; in absence of opposition to these saboteurs (usually the patent microcosm, which produces nothing but lawsuits) things can quickly change for the worse.Alice is not a done deal, so to speak. Alice and Section 101 are constantly under attack. USPTO examiners often ignore the determination, instead relying on amorphous and dynamic guidelines, which contain loopholes for patenting software (a bunch of loopholes that courts dont quite fall for).

We constantly need to defend and advocate Alice; in absence of opposition to these saboteurs (usually the patent microcosm, which produces nothing but lawsuits) things can quickly change for the worse. We have already named some of these saboteurs. They dont quite keep it a secret (at least not effectively).

Yesterday we were reminded of the effect of stacked panels because Juves UPC specialist wrote: Nine panelist @Vossius #UPC Conference to vote on new start date of #UPC. All: at some day in 2019

We have already named some of these saboteurs. They dont quite keep it a secret (at least not effectively).I guess none of these panelists was a UPC sceptic, I wrote. Just gotta push the lie of Unitary Patent being inevitable.

UPC is a great example of echo chamber politics. Lots of people with financial stake in the outcome keep misleading one another. Its like a blind religion.

The same is true for software patents.

Just a short while ago IBMs patent chief, Manny Schecter, wrote that 99%...


Tech's Push to Teach Coding Isn't About Kids' Success - It's About Cutting Wages "IndyWatch Feed Tech"

Commentary from The Guardian

The rationale for this rapid curricular renovation is economic. Teaching kids how to code will help them land good jobs, the argument goes. In an era of flat and falling incomes, programming provides a new path to the middle class a skill so widely demanded that anyone who acquires it can command a livable, even lucrative, wage.

This narrative pervades policymaking at every level, from school boards to the government. Yet it rests on a fundamentally flawed premise. Contrary to public perception, the economy doesn't actually need that many more programmers. As a result, teaching millions of kids to code won't make them all middle-class. Rather, it will proletarianize the profession by flooding the market and forcing wages down and that's precisely the point.

Original Submission

Read more of this story at SoylentNews.


Giant D20 Is A Critical Hit in More Ways than One "IndyWatch Feed Tech"

[Mikael Vejdemo-Johansson] is a member of the NYC Resistor hackerspace and an avid fan of a D&D themed improv theatre called The Campaign. To show his appreciation, he decided to gift them a Christmas present: a giant D20. The original plan called for integrated LEDs to burst alight on a critical hit or miss, or let out pulses if it landed on another face. Cool, right? Well, easier said than done.

[Vejdemo-Johansson] figured a circle of 4 tilt sensors mounted on the one and twenty face would be enough to detect critical rolls. If any of the switches were tilted beyond 30 degrees, the switch would close. He mounted eight ball-tilt switches and glued in the LEDs. A hackerspace friend also helped him put together an astable multivibrator to generate the pulses for non-critical rolls.

This did not work out so well. His tilt sensor array proved to be a veritable electronic cacophony and terribly sensitive to any movement. That and some other electronic troubles forced a shelving of any light shows on a critical hit or miss. [Vejdemo-Johansson] kept the pulsing LEDs which made for a cool effect when shining through the mirrored, red acrylic panes he used for the die faces. Foam caulk backer rods protect as the dies structure to stop it from being shattered on its first use.

Before The Campaigns next show, [Vejdemo-Johansson] managed to stealthily swap-out of the troupes original die with his gift, only for it to be immediately thrown in a way that would definit...


Dori Liszkai, Advisory Council Member Blockchain at GLG (Gerson Lehrman Group), joins our New Money Systems Board. "IndyWatch Feed Tech"

Dori Liszkai, Advisory Council Member - Blockchain at GLG (Gerson Lehrman Group), joins our New Money Systems Board.


Rise of the Robolawyers "IndyWatch Feed Tech"

Thankfully, no ones out there systematically murdering lawyers. But advances in artificial intelligence may diminish their role in the legal system or even, in some cases, replace them altogether. Heres what we stand to gainand what we should fearfrom these technologies.

How legal representation could come to resemble TurboTax.


Security Researchers Warn that GO Keyboard is Spying on Millions of Android Users "IndyWatch Feed Tech"

Submitted via IRC for SoyCow8963

Security researchers from Adguard have issued a warning that the popular GO Keyboard app is spying on users. Produced by Chinese developers GOMO Dev Team, GO Keyboard was found to be transmitting personal information about users back to remote servers, as well as

Adguard made the discovery while conducting research into the traffic consumption and unwanted behavior of various Android keyboards. The AdGuard for Android app makes it possible to see exactly what traffic an app is generating, and it showed that GO Keyboard was making worrying connections, making use of trackers, and sharing personal information.

Read more of this story at SoylentNews.


This new ransomware asks to send nude photographs instead of Bitcoin "IndyWatch Feed Tech"

nRansomware demands victims to send nude pics instead of Bitcoin

Most of us are aware that ransomware is a type of malicious software from cryptovirology that threatens to publish the victims data or perpetually block access to it unless a cryptocurrencytypically Bitcoin is paid. But what happens if you are asked to send nude photographs instead of Bitcoin to get access to your device? Shocked, right?

That is what a new ransomware known as nRansomware is doing. On Thursday, the researchers at MalwareHunterTeam, a research group focused on ransomware, discovered the ransomware software installed through a file called nRansom.exe, which demands at least 10 nude photographs from the victim in order to get their files back. The victim is actually forced to create a Protomail account, which will then be verified as legitimate by the attacker. Once the photos are sent, the victim will receive a code to disable the malware. It appears that the attackers are looking to sell the photos to make money.

The ransomware has a background of several images of the fictional childrens character Thomas the Tank Engine and an image stating the conditions. The malware also appears to play looped music in the background.

The below screenshot was tweeted by the researchers displaying the message when a victims device is hacked:

Your computer has been locked. You can only unlock it with the special unlock code, reads the message. The victim is also asked to create an email account on a specified website and then email to hackers from that address. After we reply, you must send at least 10 nude pictures of you. After that we will have to verify that the nudes belong to you.

It is still unclear how many people have been affected with this ransomware or whether the demand is legitimate threat and not a prank. However, the file nRansom.exe, to some extent does appear to be legitimate, as it is classified as malicious by several antivirus engines, including VirusTotal and Hybrid Analysis, which are both public malware repositories.

To stay clear from these kinds of ransomware,...


Belgium Wants to Blacklist Pirate Sites & Hijack Their Traffic "IndyWatch Feed Tech"

The thorny issue of how to deal with the online piracy phenomenon used to be focused on punishing site users. Over time, enforcement action progressed to the services themselves, until they became both too resilient and prevalent to tackle effectively.

In Europe in particular, theres now a trend of isolating torrent, streaming, and hosting platforms from their users. This is mainly achieved by website blocking carried out by local ISPs following an appropriate court order.

While the UK is perhaps best known for this kind of action, Belgium was one of the early pioneers of the practice.

After filing a lawsuit in 2010, the Belgian Anti-Piracy Foundation (BAF) weathered an early defeat at the Antwerp Commercial Court to achieve success at the Court of Appeal. Since then, local ISPs have been forced to block The Pirate Bay.

Since then there have been several efforts (1,2) to block more sites but rightsholders have complained that the process is too costly, lengthy, and cumbersome. Now the government is stepping in to do something about it.

Local media reports that Deputy Prime Minister Kris Peeters has drafted new proposals to tackle online piracy. In his role as Minister of Economy and Employment, Peeters sees authorities urgently tackling pirate sites with a range of new measures.

For starters, he wants to create a new department, formed within the FPS Economy, to oversee the fight against online infringement. The department would be tasked with detecting pirate sites more quickly and rendering them inaccessible in Belgium, along with any associated mirror sites or proxies.

Peeters wants the new department to add all blocked sites to a national pirate blacklist. Interestingly, when Internet users try to access any of these sites, he wants them to be automatically diverted to legal sites where a fee will have to be paid for content.

While its not unusual to try and direct users away from pirate sites, for the most part Internet service providers have been so...


Passwords and much more for 540,000 SVR Tracking accounts leaked online "IndyWatch Feed Tech"

Login credentials for 540K records belonging to vehicle tracking device company SVR Tracking (aka Stolen Vehicle Records Tracking) have been leaked online.

Another day, another data breach to report, login credentials of more than half a million records belonging to vehicle tracking device company SVR Tracking (aka Stolen Vehicle Records Tracking) have been leaked online.

The incident potentially exposes the personal data and vehicle details of drivers and businesses using the SVR Tracking service.

A few hours ago Verizon data was leaked online, and last week a similar incident affected the entertainment giant Viacom, in both cases data were found on an unsecured Amazon S3 server.

The unsecured AWS S3 cloud storage bucket containing SVR Tracking data was discovered by experts at Kromtech Security Center.The SVR Tracking service allows its customers to track their vehicles in real time by using a physical tracking device hidden in the vehicles.

SVR Tracking device

The S3 bucket contained details of roughly 540,000 SVR accounts, including email addresses and passwords, as well as users vehicle data, such as VIN (vehicle identification number) and the IMEI numbers of GPS devices.

The exposed archive also includes information where the tracking device was hidden in the car.

The repository contained over a half of a million records with logins / passwords, emails, VIN (vehicle identification number), IMEI numbers of GPS devices and other data that is collected on their devices, customers and auto dealerships. Interestingly, exposed database also contained information where exactly in the car the tracking unit was hidden. reads the blog post published by Kromtech.

Experts highlighted that leaked passwords were protected by the weak SHA-1 hashing algorithm that was easy to crack.

The experts discovered a Backup Folder named accounts contained 540,642 ID numbers, account information that included many plate & vin numbers, emails, hashed passwords, IMEI numbers and mo......


Air conditioner that can fit in your pocket "IndyWatch Feed Tech"

This Air Conditioner Can Fit in Your Pocket

UCLA researchers have developed a new type of air conditioner that is not only energy efficient and eco-friendly , but can also fit inside your pocket. When we think about air conditioners, the image that comes into our minds is a big bulky machine that is fitted onto a wall that cools down the entire room. These machines usually pump refrigerant fluids, that can harm the environment when they break down or arent disposed of properly. This new research, can possibly change all of this.

How does it work ?

These devices are named   thermoelectric coolers do not work in the same manner as traditional ACs. They need expensive ceramic materials and are not the most efficient in cooling down entire rooms as the traditional ACs. The reason for this is the way they work.

The researchers have said these devices use electrocaloric effects , in simpler terms, an electric field is used to move the unwanted heat through specially designed materials. Polymers with special properties are used and is placed between two points a heat source where the heat is generated and the heat sink that takes away the heat.

When this polymer comes in contact with the heat source, it will absorb the heat. At this point, the electric field is inactive. When the polymer comes in contact with the heat sink, the electric field is turned on. This field will cause the molecules of the polymer to arrange themselves in a particular order which will push the heat into the sink.

Cheaper than traditional ACs ?

Besides being energy efficient, there is another reason why this technology could end up being cheaper than the AC we use today. Traditional ACs are used to cool an entire room. With this technology, companies could instead cool down individual seats thus saving on their AC bills. The researchers have even used this method to cool a Galaxy S4 by making a cooling device with flexible materials. Their results showed that this caused the phone to cool down by around 8 degrees.

Source: Sciencr

The post Air conditioner that can fit in your pocket appeared first on TechWorm.


Game Boy Advance Hiding In a Medical Device "IndyWatch Feed Tech"

It turns out that medical manufacturers also do hacking once in a while. [JanHenrikH] recently tweeted a photo of an ECG-Trigger-Unit that hed opened up. Inside he found that the LCD screen was that of a Game Boy Advance (GBA) and the reason he could tell was that the screens original case was still there, complete with GAME BOY ADVANCE SP written on it.

In the manufacturers defense, this device was likely made around the year 2000 when gaming products were some of the best sources for high speed, high quality, small LCDs displays.  This design document for a portable ECG measurement instrument from as recently as 2013 cites reasons for using a GBA as:

  • impressive plotting results,
  • no serious transmission delays, and
  • fine graphics processing capability.

The Verge had even turned up this US patent from 1997 that has the diagnostic medical device be a cartridge for plugging into a Game Boy. At the time, PCs were frequently used for medical displays but this patent cites issues such as the higher cost of PCs, software installation issues, and crashing. However, they talk about the crashing being due to running word processing and spreadsheet software on the same PC, something not likely to happen if the PC is dedicated to bedside monitoring.

But despite all those pros, wouldnt you feel surprise and alarm when you first glimpse the Game Boy inside the device thats monitoring your heart? We also have to wonder what licensing these products went through in the countries in which they were used. This particular device was made by German company Medical Imaging Electronics.

Game Boy hacks arent limited to the medical industry though. Here on Hackaday, weve seen them turned into remote controls for flying drones and weve seen Game Boy cartridge emulators that use STM32. Finally, if youre wondering where you saw [Jan Henrik]s name before, he was one of the two hackers driving the motorized armchair in a photo in our [Jenny List]s SHACamp 2017 write-up.

Our thanks to [geonomad] for the tip!

Filed under: Medical hac......


First Human Embryo Editing Performed in the UK "IndyWatch Feed Tech"

Scientists at the Francis Crick Institute have performed the UK's first human embryo editing experiment:

The blueprint for life - DNA - has been altered in human embryos for the first time in the UK. The team at the Francis Crick Institute are unravelling the mysteries of the earliest moments of life. Understanding what happens after a sperm fertilises an egg could lead to ways of improving IVF or explain why some women miscarry. The embryos were modified shortly after fertilisation and allowed to develop for seven days.

[...] The researchers used 41 embryos that had been donated by couples who no longer needed them for IVF. After performing the genetic modification, the team could watch how the embryos developed without OCT4.

Over the course of the first seven days, a healthy, normal embryo goes from one cell to about 200. It also goes through the first steps of organising itself and handing out specialised jobs to different cells. The embryo forms a hollow sphere called a blastocyst, with some cells destined to go on to form the placenta, some the yolk sac and others, ultimately, us. But without OCT4 the blastocyst cannot form. It tries - but implodes in on itself. From the embryo's perspective it is a disaster but for scientists it has given unprecedented insight.


Also at CNN, Science Magazine, and The Guardian.

Genome editing reveals a role for OCT4 in human embryogenesis (open, DOI: 10.1038/nature24033) (DX)

Original Submission

Read more of this story at SoylentNews.


Giving a 4k Webcam Special Eyes "IndyWatch Feed Tech"

Its a problem as old as photography: your camera is only as good as your lens. As cameras shrink, so do lenses, and so do the options for upgrading to a better lens. And forget about switching to a different focal length or aperture its often just not an option. Unless you make it an option by adding a CS lens mount to a high-end webcam.

Well stipulate that at 4k resolution and packed with all sorts of goodies, the Logitech Brio Pro is a heck of a nice camera. And the lens isnt bad either, as youd hope for a camera with almost 9 megapixels at its disposal. But with an optical field of view optimized for video conferencing, its hard to use this premium camera for much else. [Saulius] fixed that by taking the camera apart and adding a new case with a built-in C- and CS-mount, resulting in literally thousands of lens choices. [Saulius] post has valuable teardown information, which includes exposing the CCD sensor completely. The new case is sold as a kit, but it looks like a 3D-printed case would be pretty easy to whip up.

[Salius] sure seems to love those optical hacks, whether they be a budget microscope camera, high-resolution LIDAR, or capturing license plates at great distances.

Filed under: digital cameras hacks


Malicious code written into DNA infects the computer that reads it "IndyWatch Feed Tech"

In a mind-boggling world first, a team of biologists and security researchers have successfully infected a computer with a malicious program coded into a strand of DNA.

It sounds like science fiction, but I assure you its quite real although you probably dont have to worry about this particular threat vector any time soon. That said, the possibilities suggested by this project are equally fascinating and terrifying to contemplate.

The multidisciplinary team at the University of Washington isnt out to make outlandish headlines, although its certainly done that. They were concerned that the security infrastructure around DNA transcription and analysis was inadequate, having found elementary vulnerabilities in open-source software used in labs around the world. Given the nature of the data usually being handled, this could be a serious problem going forward.


WhatsApp Refused to add a Backdoor for the UK Government "IndyWatch Feed Tech"

Submitted via IRC for SoyCow8963

The UK government has made no secret of its dislike of encrypted messaging tools, and it has made frequent reference to the problems WhatsApp causes it with regard to investigations into terrorism. Calls have been made by the government to force companies to allow access to encrypted content when asked.

In the wake of Theresa May's "more needs to be done about extremist content" speech, it has emerged that WhatsApp refused to add a backdoor that would allow the government and law enforcement agencies to access private conversations.

Sky News reports anonymous sources as saying that during the summer the government told WhatsApp to devise a way that would enable it to access encrypted messages. While WhatsApp already complies with government requests to provide meta data such as the name of an account holder, associated email address, and IP addresses used, it does not -- and, indeed, due to lack of access itself, cannot -- provide access to, or the content of encrypted messages.


Original Submission

Read more of this story at SoylentNews.


These tiny robots can kill cancer cells "IndyWatch Feed Tech"

Scientists have developed tiny robots than can drill into deadly cancer cells, blasting them open.


EMMC Hacks For The Speed And Capacity Upgrade Win "IndyWatch Feed Tech"

You could say that it is the essence of a site like this one, that the kind of people who form our readership are also the kind of people who examine the specs of the devices in front of them to reveal hidden features. Such was the case with [Ryan], who noticed that the eMMC controller on his 96Boards HiKey development board supports both HS200 data transfer speeds and 1.8v signaling, both of which it wasnt using.

In unlocking the extra performance, he takes readers through a primer on the device tree, and is happy to report that his transfer rate has increased from 26 to 36 MB/s, a tidy return on his work.

However, the story doesnt end there. The 8GB Samsung eMMC chip wasnt quite as roomy as hed have liked, so it was time to replace it with a 32GB version. Even with careful desoldering, he managed to lift a few pads, though very fortunately they were ones that were either NC or power rails that were duplicated elsewhere. Some tricky reflowing of what is quite a formidable BGA package to do by hand, and he was rewarded with a working board featuring higher flash capacity. We salute him for taking it on, we probably wouldnt have had the courage.

Weve brought you a similar upgrade before, this time an eMMC on a Nexus 5 phone.

Thanks [darkspr1te] for the tip.

Filed under: parts


Development Release: FreeBSD 10.4-RC2 "IndyWatch Feed Tech"

Less than a week after the first release candidate (RC) was made available, the second RC build of FreeBSD 10.4 is now also ready for testing. Some of the recent noteworthy changes include: "Given that the amd64 disc1 image was overflowing, more of the base components installed into....


Microsoft, Facebook, and Telxius Complete 160 Tb/s Atlantic Ocean Cable "IndyWatch Feed Tech"

Microsoft, Facebook, and Telxius have completed the Marea subsea cable, which connects Virginia Beach, Virginia, U.S. to Bilbao, Spain:

The Marea cable's new "open" design allows it to evolve with technology, ensuring the highest performance for users now and well into the future, even as the global population of internet users grows. And make no mistake, the demand is growing. Just think of the many high-bandwidth applications and content you use today such as Skype and Facebook Live, and the volume of streaming videos, movies and music consumed daily. This ability to interoperate with many different kinds of networking equipment brings significant benefits including lower costs and easier equipment upgrades, leading to faster growth in bandwidth rates.

Completed in less than two years nearly three times faster than is typical Marea is a powerful example of the important role the private sector has to play in connecting the world. It also set a new standard for subsea cables because it is designed to meet today's demand and evolve with the progress of tomorrow, allowing companies offering digital services to be better equipped to handle cross-border internet traffic, which is expected to increase eightfold by 2025.

Read more of this story at SoylentNews.


Ashley Brooke Taylor, Cofounder at Future Culture, joins our New Money Systems Board. "IndyWatch Feed Tech"

Ashley Brooke Taylor, Cofounder at Future Culture, joins our New Money Systems Board. Future Culture is a nonprofit partnership honing a unique perspective on the integration of blockchain and community.


Uber to Lose its License to Operate in London "IndyWatch Feed Tech"

Uber will lose its license to operate inside London. The issue may be only a temporary setback since the license expires on September 30th and Uber can continue to operate in London while appealing the decision:

London's transportation agency dealt a major blow to Uber on Friday, declining to renew the ride-hailing service's license to operate in its largest European market. [...] "Uber's approach and conduct demonstrate a lack of corporate responsibility in relation to a number of issues which have potential public safety and security implications," the agency, Transport for London, said in a statement.

[...] In issuing its decision, Transport for London, which is responsible for the city's subways and buses as well as regulating its taxicabs, declared that Uber was not "fit and proper" to operate in the city a designation that carries significant weight in Britain. "Fit and proper" is a benchmark applied across different sectors of business and the charitable organizations in the country to ensure that people or organizations meet the requirements of their industry or specialty. Tests typically assess factors like an individual or company's honesty, transparency and competence, though there is no formal exam. In Uber's case, Transport for London said it examined issues of how it dealt with serious criminal offenses, how it conducted background checks on drivers and its justification for a software program called Greyball that "could be used to block regulatory bodies from gaining full access to the app."

Opinion: London's Uber Ban Is a Big Brexit Mistake

Original Submission

Read more of this story at SoylentNews.


Playing Mario on an Oscilliscope "IndyWatch Feed Tech"

Theres not many technical details but [phckopper] lets us know that the rendering is done using the SPI on the STM, transferred via DMA, which is synchronized to two saw-tooth waves that are fed in to the X and Y axes of the oscilloscope.  The Z axis, which controls the brightness of the dot, is fed from the MOSI. By making the oscilloscope range all over the screen, similar to the way a CRTs gun does, [] is able to draw sprites, rather than vector graphics. The display has a resolution of 400400 and each sprite is 1616. The input is from a PS2 joystick connected to [phckopper]s PC, with the information communicated over UART using a simple protocol.

[via Reddit]

Filed under: hardware, Microcontrollers, nintendo hacks

Go Back:30 Days | 7 Days | 2 Days | 1 Day

IndyWatch Science and Technology News Feed Today.

Go Forward:1 Day | 2 Days | 7 Days | 30 Days

Saturday, 23 September


NVIDIA Making Progress On Server-Side GLVND: Different Drivers For Different X Screens "IndyWatch Feed Tech"

While NVIDIA isn't doing much to help out Nouveau, at least the company is contributing to the open-source Linux graphics ecosystem in other ways. In addition to presenting at XDC2017 this week on the Unix device memory allocator API and DeepColor / HDR support, they also presented on server-side GLVND...


Antibody Combination Attacks 99% of HIV Strains "IndyWatch Feed Tech"

Scientists have engineered a "tri-specific antibody" that they say can attack 99% of HIV strains:

Scientists have engineered an antibody that attacks 99% of HIV strains and can prevent infection in primates. It is built to attack three critical parts of the virus - making it harder for HIV to resist its effects.

The work is a collaboration between the US National Institutes of Health and the pharmaceutical company Sanofi. The International Aids Society said it was an "exciting breakthrough". Human trials will start in 2018 to see if it can prevent or treat infection.

Trispecific broadly neutralizing HIV antibodies mediate potent SHIV protection in macaques (DOI: 10.1126/science.aan8630) (DX)

The development of an effective AIDS vaccine has been challenging due to viral genetic diversity and the difficulty in generating broadly neutralizing antibodies (bnAbs). Here, we engineered trispecific antibodies (Abs) that allow a single molecule to interact with three independent HIV-1 envelope determinants: 1) the CD4 binding site, 2) the membrane proximal external region (MPER) and 3) the V1V2 glycan site. Trispecific Abs exhibited higher potency and breadth than any previously described single bnAb, showed pharmacokinetics similar to human bnAbs, and conferred complete immunity against a mixture of SHIVs in non-human primates (NHP) in contrast to single bnAbs. Trispecific Abs thus constitute a platform to engage multiple therapeutic targets through a single protein, and could be applicable for diverse diseases, including infections, cancer and autoimmunity.

Original Submission

Read more of this story at SoylentNews.


Why Are These People Eating Worms to Be Healthy? (part I) "IndyWatch Feed Tech"

Summary: The Hygiene Hypothesis persuades people to consume parasitic worms as a way to treat chronic autoimmune disorders. As well, people eat tapeworms as a way to lose weight. Learn more about two closely related scientific beliefs called the Hygiene Hypothesis and the Old Freinds Hypothesis. Part 1 of a 2-part series. Cover photo: 3drenderings / Getty Images.

Its difficult to believe, but thousands of people eat worms as a way to lose weight or cure diseases.

People dont just eat worms on TV shows, like the Fear Factor. Some extreme dieters consume tapeworms as a way to lose weight. Another group of people ingests parasitic worms known as helminths to ward-off the debilitating symptoms of autoimmune diseases.


Over Half a Million Vehicle Records from SVR Tracking Leaked Online "IndyWatch Feed Tech"

By Waqas

Over Half a Million Vehicle Records from SVR Tracking Leaked

This is a post from Read the original post: Over Half a Million Vehicle Records from SVR Tracking Leaked Online


Why Are These People Eating Worms to Be Healthy? (part II) "IndyWatch Feed Tech"

Summary: Helminthic therapy is the intentional consumption of parasites as a treatment for autoimmune disease. Out of the 7000 people who practice helminthic therapy each year, this report tells the story of a young woman who purchases black market worms and then treats herself at a high cost. Part 2 of a 2-part series. Cover photo: Eraxion / Getty Images.

Would you eat worms to boost your overall health or cure what ails you?

Over 7,000 people intentionally self-infect with parasites, and the practice is growing in popularity.


Hackaday Prize Entry: Infrared Vein Illumination "IndyWatch Feed Tech"

Phlebotomy is a fun word, and the fine art of finding veins. While the skill of putting needles in arms is honed by nurses and physicians over the course of decades, there are, of course, technological solutions to finding veins. One of the more impressive medical devices that does this uses near-infrared imaging basically looking under the skin with almost visible light. These devices cost a fortune.

One project in the Hackaday Prize is looking to change that. Its a near-infrared vein finder. Instead of the thousands of dollars professional unit costs, this one can be built for under one hundred bucks.

As far as this build goes, veins are illuminated via IR light at about 950nm. The backscatter of this light is captured via a Raspberry Pi NoIR camera, with regular old photography film blocking visible light. From there, its just a simple matter of image processing and hitting enhance several times until veins appear on a display.

The HackadayPrize2017 is Sponsored by:
Texas Instruments

Filed under: The Hackaday Prize ...


Rhonda Stevenson, President of Tau Zero Foundation, joins our Space Settlement Board. "IndyWatch Feed Tech"

Rhonda Stevenson, President of Tau Zero Foundation, joins our Space Settlement Board.


Re: Why send bugs embargoed to distros? "IndyWatch Feed Tech"

Posted by Marcus Meissner on Sep 23

We have released openSUSE Leap and SUSE Linux Enterprise 12 SP2/SP3 updates.

Where did you look and not find this?

SUSE has rated the issue as moderate severity (bordering on important),
as exploitability seems difficult and not targetable.

So we were not targeting a "same as CRD day release" as with other more
severe issues, but have now released updates in the next days after the...


SDL 2.0.6 Released With Vulkan Helpers, DRM/KMS Driver "IndyWatch Feed Tech"

SDL 2.0.6 was released on Friday as the latest feature update for this widely-used library that allows for more cross-platform portability of applications and games centered around input, audio, and video helpers...


Re: Why send bugs embargoed to distros? "IndyWatch Feed Tech"

Posted by Till Drges on Sep 23

Am 23.09.2017 um 13:44 schrieb Hanno Bck:

JFTR, there are:

Regards -- Till


A Vaccine Is Being Developed For Preventing Tooth Decay And It Sounds Amazing "IndyWatch Feed Tech"

Regular visits to the dentist are an important part of keeping your teeth healthy. But what if you could give your oral health a boost by receiving a vaccine on top of your regular dental care routine?

Researchers from the Wuhan Institute of Virology (WIOV) of the Chinese Academy of Sciences are working on such a vaccine, and their study has just been published in Scientific Reports.

Led by WIOV scientist Yan Huimin, the researchers tested a fusion of proteins to prevent the development of dental caries. Better known as dental cavities, caries is caused by the bacteria Streptococcus mutans (S. mutans).


3D Printing At Maker Faire "IndyWatch Feed Tech"

The current trend of cheap, desktop, consumer 3D printers arguably began at the World Maker Faire in New York several years ago. What began with just a single printer exploded into a mindless proliferation of extrusion boxes, and by 2012, every single booth had to have a 3D printer on display no matter how applicable a CNC machine was to what they were actually selling.

Now were in the doldrums of the hype cycle and 3D printers just arent cool anymore. This year at the World Maker Faire, 3D printers were relegated to a tiny corner of the faire, right next to the portajohns. Its the smallest showing of 3D printing Ive ever seen at the New York Maker Faire.

Of course, this doesnt mean the state of 3D printing isnt constantly improving. 3D printers have never been cheaper, more capable, or more popular. This is how technology works, really: it doesnt get good until it gets boring. Still, there were some impressive displays of the current state of 3D printing at the World Maker Faire this weekend. You can check that out below.

Prusas I3 Mk. 3

One of the perennial favorite 3D printers is the Prusa I3, In the last year, Prusa has been knocking everything out of the park with actual innovation like a slicer for beginners, a dead-simple implementation of variable layer thickness printing, and of course multi-material extrusion.

Now the I3 is getting an upgrade, announced today at the World Maker Faire. The I3 MK 3 is an incremental upgrade, but still has some awesome, very desirable features. The stepper drivers have been upgraded to Trinamic drivers, and the fan is now a PC Master Race-approved Noctua unit. The print bed has been upgraded to a removable, magnetic piece of spring steel coated with PEI, and theres now a touch sensor to turn the printer on. Also on the upgrade list is a Bondtech drive gear, an optical filament encoder, and the ability to recover prints after a power failure and to recover shifted layers.

There are a few pics of the prints coming off the multi-extrusion Prusa below. These are really some of the finest prints Ive ever seen coming off a 3D printer. Of course, most of this is due to the incredible operator skill demonstrated by the Prusa team, but these results show the Prusa is capable of just about anything.


Neanderthal Brains Developed More Slowly than Humans "IndyWatch Feed Tech"

A new study of a Neanderthal child's skeleton has suggested that Neanderthal brains developed more slowly than previous studies had indicated:

A new study shows that Neanderthal brains developed more slowly than ours. An analysis of a Neanderthal child's skeleton suggests that its brain was still developing at a time when the brains of modern human children are fully formed. This is further evidence that this now extinct human was not more brutish and primitive than our species. The research has been published in the journal Science.

Until now it had been thought that we were the only species whose brains develop slowly. Unlike other apes and more primitive humans modern humans have an extended period of childhood lasting several years. This is because it takes time and energy to develop our large brain. Previous studies of Neanderthal remains indicated that they developed more quickly than modern humans - suggesting that their brains might be less sophisticated.

But a team led by Prof Antonio Rosas of the Museum of Natural Sciences in Madrid found that if anything, Neanderthal brains may develop more slowly than ours. "It was a surprise," he told BBC News. "When we started the study we were expecting something similar to the previous studies," he told BBC News.

Also at Science Magazine, NYT, and Discover Magazine.

The growth pattern of Neandertals, reconstructed from a juvenile skeleton from El Sidrn (Spain) (open, DOI: 10.1126/science.aan6463) (DX)

Original Submission

Read more of this story at SoylentNews.


2 awesome open source apps to share your terminal over the web "IndyWatch Feed Tech"

Want to share your terminal over the web for demo, learning or collaboration purpose? Try these two applications to share your terminal as a web application.


The Tiny, $25 PocketBone "IndyWatch Feed Tech"

It was announced a day or two ago, but now the PocketBone has made its first real-world appearance at the World Maker Faire in New York this weekend. This is a tiny, tiny Linux computer thats small enough to fit on a keychain, or in an Altoids mini tin. Its only $25 USD, and from the stock lists on Mouser and Digikey, there are plenty to go around.

The specs for the PocketBeagle are more or less exactly what you would expect from any BeagleBone. Theres an ARM Cortex-A8 running at 1GHz, 512 MB of RAM, and SD card storage. I/O is eight analog inputs, up to 44 digital GPIOs, up to 3 UARTs, 2 I2C busses, 2 SPI busses, and 4 PWM outputs. All of this is packed into the OSD3358 System on a Chip from Octavo Systems.

This isnt the first time weve seen Octavo Systems BeagleBone on a Chip Before the release, head Beagle herder [Jason Kridner] built a PocketBone in Eagle, which was shortly followed by [Michael Welling]s similar efforts in KiCad. The PocketBone has been a reality for months, but now its accessible to hackers who dont want to deal with soldering BGA packages.

Of course, a new development board isnt worth anything without a few demos and examples. For Maker Faire, [Jason] brought out two demos. The first of these is effectively a PacMan arcade game just a simple 3D printed enclosure, a screen, and two d-pads made out tact switches. It plays PacMan and only PacMan, but its good enough to demonstrate the Linux-ness of the PocketBone.



Re: Why send bugs embargoed to distros? "IndyWatch Feed Tech"

Posted by Kurt H Maier on Sep 23

This is standard operating procedure for Red Hat, at least. Generally
days or even weeks pass before patches are released. If you're an
"Extended Update Support" customer you can expect months to go by. If
you're super lucky you'll get a systemtap script to play with, but that
generally requires a kernel RCE.



Adobe Accidentally Publishes One of its Private PGP Keys "IndyWatch Feed Tech"

Adobe is showing that it can be transparent about its security practices:

Having some transparency about security problems with software is great, but Adobe's Product Security Incident Response Team (PSIRT) took that transparency a little too far today when a member of the team posted the PGP keys for PSIRT's e-mail accountboth the public and the private keys. The keys have since been taken down, and a new public key has been posted in its stead.

The faux pas was spotted at 1:49pm ET by security researcher Juho Nurminen:

Oh shit Adobe
Juho Nurminen (@jupenur) September 22, 2017

Nurminen was able to confirm that the key was associated with the e-mail account.

Also at The Register and Wccftech.

[How many here have done something like this? Perhaps an extra file accidentally uploaded to GitHub? --Ed.]

Original Submission

Read more of this story at SoylentNews.


Azam Shaghaghi, Strategy Analyst at BMO Financial Group, joins our New Money Systems Board. "IndyWatch Feed Tech"

Azam Shaghaghi, Strategy Analyst at BMO Financial Group, joins our New Money Systems Board.


How to install xfs and create xfs file system on Debian/Ubuntu Linux "IndyWatch Feed Tech"

I recently switched to a Ubuntu/Debian Linux server from a CentOS/RHEL 7.x. How do I install mkfs.xfs command on a Debian/Ubuntu Linux server? How do I create and manage file XFS file system on a Ubuntu or Debian Linux LTS server?


Retefe banking Trojan leverages EternalBlue exploit to infect Swiss users "IndyWatch Feed Tech"

Cyber criminals behind the Retefe banking Trojan have improved it by adding a new component that uses the NSA exploit EternalBlue.

ETERNALBLUE is the alleged NSA exploit that made the headlines with DOUBLEPULSAR in the WannaCry attack and NotPetya massive attacks.

ETERNALBLUE targets the SMBv1 protocol and it has become widely adopted in the community of malware developers.

Investigations on WannaCry, for example, revealed that at least other 3 different groups have been leveraging the NSA EternalBlue exploit. In August, a new fileless miner dubbed CoinMiner appeared in the wild, it uses NSA EternalBlue exploit and WMI tool to spread, earlier this year, researchers at Flashpoint observed the TrickBot banking Trojan also included an EternalBlue module as well.

Cyber criminals behind the Retefe banking Trojan have improved it by adding a new component that uses the NSA exploit EternalBlue.

The Retefe banking Trojan has historically targeted Austria, Sweden, Switzerland and Japan, and we have also observed it targeting banking sites in the United Kingdom. While it has never reached the scale or notoriety of better-known banking Trojans such as Dridex or Zeus, it is notable for its consistent regional focus, and interesting implementation. states the analysis published by ProofPoint.

Unlike Dridex or other banking Trojans that rely on webinjects to hijack online banking sessions, Retefe operates by routing traffic to and from the targeted banks through various proxy servers, often hosted on the TOR network, 

Researchers have observed a wave of phishing messages using weaponized Microsoft Office documents. containing embedded Package Shell Objects, or Object Linking and Embedding Objects, that are typically Windo...


Nouveau Developers Remain Blocked By NVIDIA From Advancing Open-Source Driver "IndyWatch Feed Tech"

Longtime Nouveau contributors Martin Peres and Karol Herbst presented at this week's XDC2017 X.Org conference at the Googleplex in Mountain View. It was a quick talk as they didn't have a whole lot to report on due to their open-source NVIDIA "Nouveau" driver efforts largely being restricted by NVIDIA Corp...


Security cameras can be hacked using infrared light, claims study "IndyWatch Feed Tech"

Researchers hack security camera networks with IR LEDs

Cybersecurity experts from Ben-Gurion University of the Negev (BGU) in Israel have demonstrated that security cameras infected with malware can be hacked invisibly and controlled using infrared (IR) light, which then can be used to either infiltrate a network or disclose sensitive information from the cameras network.

In a paper titled aIR-Jumper: Covert Air-Gap Exfiltration/Infiltration via Security Cameras & Infrared (IR), the researchers said that the technique can be used on professional and home security cameras, and even LED doorbells, which can detect infrared light (IR), not visible to the human eye. CCTV cameras are equipped with IR LEDs, used for night vision, and are perfect for the aIR-Jumper technique to exploit.

In this paper, we show how attackers can use surveillance cameras and infrared light to establish bi-directional covert communication between the internal networks of organizations and remote attackers. We present two scenarios: exfiltration (leaking data out of the network) and infiltration (sending data into the network), the researchers wrote.

The cyber team led by Dr. Mordechai Guri, head of research and development for BGUs Cyber Security Research Center (CSRC), demonstrated how IR can be used to create a secret communication channel between malware installed on an internal computer network and an attacker located at a distance of hundreds of metres to kilometres away with direct line of sight.

The researchers were able to leak internal data at a bit rate of 20bit/s per camera and were able to deliver commands to the network at bit rate of more than 100bit/s from one camera. The aIR-Jumper method can be used to transfer hidden signals to surveillance cameras, including PIN codes, passwords, and encryption keys, which are modulated, encoded, and then transferred to attackers.

Security cameras are unique in that they have one leg inside the organization, connected to the internal networks for security purposes, and the other leg outside the organization, aimed specifically at a nearby public space, providing very convenient optical access from various directions and angles, Mordechai Guri said in the release.

The researchers uploaded two videos on YouTube, wherein the first video shows an attacker sending infrared signals to the security camera, while the second one shows the camera (which is already infected with malware) exfiltrating data from the affected network.

In an infiltration scenario, an attacker standing in a public area (e.g., in the s...


Re: Why send bugs embargoed to distros? "IndyWatch Feed Tech"

Posted by Marc Deslauriers on Sep 23


Having access to the embargoed information allowed us (Ubuntu) to evaluate the
impact of the issue, look at the fix, and start locally testing the fix to
determine if there were any issues. It also allows us to properly assign
resources to working on the update.

It would have probably taken us more than a day to publish this update if we
didn't have access to the information in advance.

For issues that aren't critical, we tend to...


Samsung Galaxy S9 Video Camera May Be 4x Faster Than iPhone X "IndyWatch Feed Tech"

Samsung Galaxy S9 video with 1,000 frame-per-second, may be four times faster than iPhone X

We have always seen that Apple and Samsung try to outdo each other with their new flagships. Recently, Apple launched its premium smartphone iPhone X on September 12 in Cupertino to celebrate the 10th anniversary of the first ever iPhone. While people are still talking about Apples iPhone X, Samsung has decided not to be left behind and make its presence felt too.

According to a report by Korean publication ETNews, Samsung has reportedly developed a high speed new image sensor that can capture photos at an incredible 1,000 frames per second (fps) with 4x slow motion video capability. On the other hand, Apples iPhone X is able to take 240 frames per second based on full HD resolution.

The 4x slo-mo capture by Samsung is similar to how Sony created for its incredible Xperia XZ1 and XZ Premium smartphones. However, the company may use slightly different technology for the sensor to avoid infringement of Sony patent, the site said. For instance, Samsungs design is a little different from Sonys (which also uses a three-layer chip) in that the memory is bonded to the rear surface of an existing two-layer sensor design rather than fitted in between the image sensor and logic components.

The new image sensor camera is planned for Samsungs upcoming Galaxy S9 line and the company will start the mass production of the three-layered image sensor as early as November 17th. This layered three-structure design of the sensor is made into a layered structure by connecting a system semiconductor (logic chip) that is in charge of calculations and DRAM chip that can temporarily store data through TSV (Through Silicon Via) technology. After the pilot operation, the company will start mass producing it in December.

Currently, we are unsure if all these rumors and speculations are accurate. With Samsung not expected to announce the Galaxy S9 atleast till the start of 2018, we are likely to come across many more leaks about the device in the near future. However, on the other hand, if Samsung manages to fit the slow-mo camera into the Galaxy S9, it is expected to beat the Galaxy S8, Galaxy Note 8, iPhone X and maybe the current top end Sony phones too.

The post Samsung Galaxy S9 Video Camera May Be 4x Faster Than iPhone X appeared first on TechWorm.


The Think Liberty Podcast Candidate Spotlight Zoltan Istvan "IndyWatch Feed Tech"

I did a 30 minute podcast at Think Liberty about my #transhumanism ideas and governor run:

Our very own Kevin Shaw sits down and speaks with 2018 California Libertarian Governor candidate Zoltan Istvan. Comments comments Related.


The Court of Appeals for the Federal Circuit (CAFC) Gradually Champions Patent Quality, in a Spectacular Reversal on Its Past Ways "IndyWatch Feed Tech"

Under Chief Judge Sharon Prost

Sharon ProstSummary: Some of the latest actions and decisions from the Federal Circuit, which originally brought software patents to the United States and is now taking them away, gradually

LAST night we wrote about the Federal Circuit (CAFC) refuting Gilstrap yet again. We later updated our post with a statement from CCIA and then found this good coverage from a good journalist (a lot of those who cover patent issues are unfortunately with and usually from the patent microcosm). He summarised it as follows:

Not long after TC Heartland, though, the East Texas judge who hears more patent cases than any other turned down a motion to transfer by supercomputer maker Cray Inc., which was sued for patent infringement by Raytheon in 2015. Lawyers for Cray argued that, under the provisions of TC Heartland, their client was entitled to have its case in a home venue. But US District Judge Rodney Gilstrap disagreed and said that Crays ties to the districta single salesperson, working out of his homewas enough to keep the case in the Eastern District.

Today, Gilstraps decision was reversed by the US Court of Appeals for the Federal Circuit, which hears all patent appeals. In a 20-page decision (PDF), the three-judge panel directed the case against the Seattle-based tech company to be transferred.

Gilstraps decision to keep Raytheon v. Cray in his court turned the normally wonky area of patent venue into a scorching political issue. At a Capitol Hill hearing about patent reform, the judge was denounced by both Rep. Bob Goodlatte (R-Va.) and Rep. Darrell Issa (R-Calif.), with Issa calling Gilstraps decision reprehensible.

Last week the patent microcosm...


Dip update 90/n "IndyWatch Feed Tech"

[Orig: Sept 23, 2017]
Hi everyone,
Below is the latest LCO light curve. Comparing to other 'out of transit' times (e.g., pre- and post-Elsie), it is suggestive that the variability seen here after Angkor is real, though our observations are not sensitive enough to say more (you would need a space telescope to make this distinction at this low level of variability).        
More later,
~Tabby and team
PS: These observations are happening because of the wonderful backers of our 2016 Kickstarter project. The Kickstarter campaign has ended, but we are still accepting donations to purchase additional observing time on the LCO 0.4m network. Thanks in advance for your support!      


Re: Why send bugs embargoed to distros? "IndyWatch Feed Tech"

Posted by Anthony Liguori on Sep 23

Just as an FYI, we (Amazon Linux AMI) also did all of the preparation
during the embargo period published shortly after embargo lift.

The pre-disclosure period gives us an opportunity to take the time to
analyze the problem and run through testing of the reported fix. It's
super valuable for us.


Anthony Liguori


New ransomware scam asks for nude pics to unlock files "IndyWatch Feed Tech"

By Uzair Amir

A few months ago, two ransomware scams made news for

This is a post from Read the original post: New ransomware scam asks for nude pics to unlock files


Quick and Dirty Blimp Mount for a Shotgun Mike "IndyWatch Feed Tech"

Sometimes you dont have the hardware you need, and you can either do without or let the projects needs inspire you to create an alternative. Thats pretty sweet, and its even sweeter when you find a solution thats dirt cheap.

[Chu_st] created a sub-$10 blimp mount for his shotgun mike. It consists of a PVC pipe which attaches to the microphones shock mount. Plastic gardening grid is used for the shell, shaped by hand into the desired blimp shape and secured with zip ties and gaffer tape. [Chu_st] suggests using nylon stocking as a wind screen. The microphone itself attaches to a length of bicycle seat tube using a standard mic clamp.

For DIY microphone projects, we got you covered, with everything from a low noise floor microphone to one built out of a hard drive published previously.

Filed under: hardware


Re: Why send bugs embargoed to distros? "IndyWatch Feed Tech"

Posted by Simon McVittie on Sep 23

The Debian bug tracker ( is always public and has no
mechanism for embargoing individual bugs, so it is never used before
public disclosure.

It's entirely possible that your conclusion is correct in this case
(I don't have any more information than you do on whether the Debian
security team or package maintainer made use of the embargo period
for this vulnerability), but the late opening of a bug is not evidence
that no...


Re: Why send bugs embargoed to distros? "IndyWatch Feed Tech"

Posted by Levente Polyak on Sep 23


For Arch Linux I tested the patch beforehand and prepared the changed
buildscripts locally. The final build/release/publication process was
invoked just minutes after the public disclosure and the final artifact
was signed and hit the repository just 20 minutes after the disclosure.
The advisories were sent ~4 hours later once gone through a
peer-reviewing process (yes this could have been done even faster).

But that's not actually...


The Mohawk-PTAB Fiasco Threatens the Tribes Reputation More Than It Threatens PTAB "IndyWatch Feed Tech"

Since the patents are not even assigned to the Mohawk people, this whole scam accomplishes nothing

Suscol Intertribal Council
Photo credit: Sarah Stierch (CC BY 4.0)

Summary: In an effort to dodge scrutiny from the Patent Trial and Appeal Board (PTAB), Allergan Plc offloaded a lot of negative publicity onto the Mohawk people, owing primarily to the Mowhawk Tribes general counsel, Dale White

THE Patent Trial & Appeal Board (PTAB) has been making many headlines recently. The patent microcosm is trying as hard as it can to kill it. It cannot kill the people inside the PTAB (whom it vainly refers to as a death squad), so it wants to kill the entire institution. Its appalling.

We were very sad to see the Mohawk people exploited, or virtually used as a sort of instrument for killing PTAB. As some people have put it, the Mohawk tribe is now facilitating a "scam" (not our word). Dont expect the patent microcosm to admit this. In fact, in some comments that we saw over the past week, all criticisms of this ploy are being dismissed or played down as being just a substance-less cry of scam. Far from it!

Earlier this week, in a site of the patent microcosm, Philippe J.C. Signore from Oblon wrote about this as a case for refreshing Constitutional Law recollection. Well, as patent radicalism is waning (the system has improved in recent years) they will try to crush the system. Here is what Signore wrote:

Article III also states that the judicial power of the U.S. is vested in the federal courts and judges. In its brief filed in August 2017, Oil States argued that IPR proceedings are unconstitutional because they are set up as adversarial judicial trials (as opposed to examination proceedings) of granted private property rights, and as such should be handled by Article III judges and not administrative agency employees who are beholden to Executive Branch officials. Oil States also argued that IPR trials resolve questions of novelty or obviousness, which are precisely the same questions that English jurors resolved, such that they fall within the Seventh Amendments scope.

The Eleventh Amen...


SolarCity Will Pay $29.5 Million to Settle Allegations that it Lied to the Government "IndyWatch Feed Tech"

SolarCity, a company Tesla acquired in Nov. 2016, has agreed to pay $29.5 million to resolve allegations that it lied to the government by submitting inflated claims to cash in on a solar stimulus program, the Department of Justice announced Friday.

SolarCity has agreed to drop charges it had against the US government as part of the settlement, which is not an admission of guilt. The settlement is a SolarCity obligation, a SolarCity representative told Business Insider.

The investigation centered on a program Section 1603 set up under the Obama administration that was meant to encourage solar adoption by subsidizing installation costs. The program allowed solar companies to receive a federal grant that was equal to 30% of the cost to install or acquire solar systems.

The Justice Department alleges that SolarCity made thousands of claims that overstated the costs of its installations, allowing it to receive inflated grant payments. It has been probing SolarCity and several other solar companies since 2012.

Source: Business Insider

SolarCity was founded in 2006 by brothers Peter and Lyndon Rive, based on a suggestion for a solar company concept by their cousin, Elon Musk, who is the chairman and helped start the company. The Rive brothers left SolarCity earlier this year.

Original Submission

Read more of this story at SoylentNews.


HTTPS By Default For Everyone "IndyWatch Feed Tech"

Just a quick heads up for those that haven't noticed yet, HTTPS is now used by default across all of as of this week...


Dr. Aubrey de Grey "IndyWatch Feed Tech"

Aging is a consequence of physics, not biology. Dr. Aubrey de Grey believes that the aging of any machine with moving parents is fundamentally the same, whether that machine is alive or not. He states that the SENS Foundation doesnt work on longevity and immortality it works on health. The only way we are going to live substantially longer is by staying truly youthful for substantially longer.


Latest EPO Rumours Allege That Benot Battistelli Rigged the Process of EPO Presidents Selection "IndyWatch Feed Tech"

Dont mess with the cole

Order of succession
Reference: Order of succession

Summary: Antnio Campinos is quite likely the next EPO President, as insiders suspect that many applications for the job got rejected politically (turned down by political mischief)

THE German media believes that Antnio Campinos will be the next head of the EPO (the Office, not the Organisation, whose Chairman will leave one week from now). Campinos is believed to be French, for reasons we explained before [1, 2], and he is close to Battistelli. Insiders suspect that Battistelli is already paving the way for Campinos to win the job, as we previously explained in:

  1. Its a Family Business: French Succession Plan at EPO After Battistellis Departure
  2. One Week Left for Battistellis Coronation of Another Frenchman, Antnio Campinos, to Lobby for UPC?
  3. Rumours That Another Frenchman is the Only Candidate to Succeed Benot Battistelli at the EPO

Imagine having 3 French Presidents (out of 4) in succession! Never mind the fact that much of the remaining management, dubbed Team Battistelli, is also French. What a coup! (French word)

Insiders suspect that Battistelli is already paving the way fo...


X.Org Foundation Has Become A Khronos Adopter "IndyWatch Feed Tech"

The X.Org Foundation board announced during this week's XDC2017 summit that they have officially completed the paperwork to become a Khronos adopter...


Why send bugs embargoed to distros? "IndyWatch Feed Tech"

Posted by Hanno Bck on Sep 23


A few days have passed since the optionsbleed disclosure. Some
interesting things have surfaced, e.g. the fact that it was apparently
discovered already in 2014, but nobody noticed it was a security bug.

But I'd like to discuss something else:
I had informed the distros mailing list one week earlier about the
upcoming disclosure with a bug description and links to the already
available patch.
My understanding is that the purpose of the...


CSE CybSec ZLAB Malware Analysis Report: Petya "IndyWatch Feed Tech"

Im proud to share with you the second report produced by Z-Lab, the Malware Lab launched by the company CSE CybSec. Enjoy the Analysis Report Petya.

CybSec Enterprise recently launched a malware Lab called it Z-Lab, that is composed of a group of skilled researchers and lead by Eng. Antonio Pirozzi.

Its a pleasure for me to share with you the second analysis that we have recently conducted on the Petya Ransomware.

We have dissected the ransomware and discovered interesting details that are included in our report.

Below the abstract from the analysis, the detailed report is available for free on our website.


In a modern environment, where data stored in computers play a fundamental role in the private and work routine, we must consider the problem of the risk of losing these data. In fact, the ever-increasing threat, that is spreading, is Ransomware. In the last 15 years, malware writers have realized that they may have anyone in their hand with his data.

Figure 1: Characteristic Petya Skull with the corresponding UI containing the payment ransom instructions.



Intel Prepping Support For Huge GTT Pages "IndyWatch Feed Tech"

Intel OTC developers are working on support for huge GTT pages for their Direct Rendering Manager driver...


More Ice Found in Craters on Mercury "IndyWatch Feed Tech"

More ice has been found to exist in permanently shadowed craters and terrain on Mercury's surface:

The study, published in Geophysical Research Letters [DOI: 10.1002/2017GL074723] [DX], adds three new members to the list of craters near Mercury's north pole that appear to harbor large surface ice deposits. But in addition to those large deposits, the research also shows evidence that smaller-scale deposits scattered around Mercury's north pole, both inside craters and in shadowed terrain between craters. Those deposits may be small, but they could add up to a lot more previously unaccounted-for ice.

"The assumption has been that surface ice on Mercury exists predominantly in large craters, but we show evidence for these smaller-scale deposits as well," said Ariel Deutsch, the study's lead author and a Ph.D. candidate at Brown. "Adding these small-scale deposits to the large deposits within craters adds significantly to the surface ice inventory on Mercury."

[...] To seek further evidence that such smaller-scale deposits exist, the researchers looked though the altimeter data in search of patches that were smaller than the big crater-based deposits, but still large enough to resolve with the altimeter. They found four, each with diameters of less than about 5 kilometers. "These four were just the ones we could resolve with the MESSENGER instruments," Deutsch said. "We think there are probably many, many more of these, ranging in sizes from a kilometer down to a few centimeters."

A Mercury Colony?

Also at the American Geophysical Union.

Original Submission

Read more of this story at SoylentNews.


Keith Packard's Work On Better Supporting VR HMDs Under Linux With X.Org/DRM "IndyWatch Feed Tech"

Earlier this year Keith Packard started a contract gig for Valve working to improve Linux's support for virtual reality head-mounted displays (VR HMDs). In particular, working on Direct Rendering Manager (DRM) and X.Org changes needed so VR HMDs will work well under Linux with the non-NVIDIA drivers...


Building This TARDIS Is Anything But A Snap "IndyWatch Feed Tech"

As an avid fan of the show Dr Who, [Adam Sifounakis] saw a model for a laser-cut TARDIS that piqued his curiosity that eventually grew into a multi-week project involving multiple setbacks, missteps, revamps and finally gratification. Behold, his sound activated TARDIS.

First and foremost, assembling and painting the model was a fun puzzle despite a few trips to the store with a little backtracking on the painting due to impatience. Next, the creation of a pulsing soft white LED circuit timed with an audio clip to really sell the image of a mini-TARDIS proved to be a tedious ordeal, paying off in the end with a satisfying glow through the vellum-diffused windows on the model.

How to trigger the lights? [Sifounakis] initially wanted a capacitive sensor to trigger the sound effects, but that way lay dragons and madness so he went with snap-activated effect to activate the TARDIS like the Doctor himself. After struggling with building his own microphone setup, he switched to an electret mic with adjustable gain which worked like a charm. Setting up this TARDIS Adafruit Pro Trinket brain involved a snag or two, and after that it was smooth s...


Links 23/9/2017: Mesa 17.1.10 RC, Samba 4.7.0, KStars 2.8.4 "IndyWatch Feed Tech"

GNOME bluefish



  • Roughing it, with Linux

    I have been traveling for about two weeks now, spending 10 days camping in Iceland and now a few days on the ferry to get back. For this trip I brought along my Samsung N150 Plus (a very old netbook), loaded with openSUSE Linux 42.3.

  • Server

    • Finding the Mainframers of the Future Through Open Source Ecosystem Development

      Speak the word mainframe to many millennial techies, and the first things that likely come to mind are in the form of grainy sepia photos of floor-to-ceiling, wall-to-wall computers with big spinning tapes. But thats far from the reality of the modern mainframe.

      Imagine instead up to 240 10-core, 5.2ghz processors, 32TB of RAIM (redundant array of independent memory), hardware-based encryption, and fully hot-swappable hardware components. Those are the specs of the newly released IBM z14 a single machine that could replace the computing resources of an average corporate data center with room to spare.

    • Hybrid datacenter is Dockers latest open source goal


Chinese robot dentist is first to fit implants in patients mouth without any human involvement "IndyWatch Feed Tech"

An epidemiological survey has found there were about 400 million patients needing new teeth in China, but the number of qualified dentists was lagging behind demand.

In March this year the US Food and Drug Administration approved the use of a robot system named Yomi designed to assist human surgeons when fitting implants.

Successful procedure raises hopes technology could avoid problems caused by human error and help overcome shortage of qualified dentists.

PUBLISHED : Thursday, 21 September, 2017, 6:30pm.

UPDATED : Friday, 22 September, 2017, 9:43pm.


Beijing-Shanghai Railway Restores 350 km/h Train Service "IndyWatch Feed Tech"

China is once again operating the world's fastest train service after a speed cap was lifted:

China increased the maximum speed of bullet trains on the Shanghai-Beijing line to 350 kilometers per hour yesterday, six years after a fatal accident led to a speed cap. The limit was reduced to 300kph after 40 people died in a high-speed train crash near Wenzhou, east China's Zhejiang Province, in July 2011.

The decision to increase the speed means that China once again has the world's fastest train service. The new limit cuts the time of the 1,318-kilometer journey between Shanghai and the capital to four hours and 28 minutes, saving passengers nearly an hour. A total of 14 trains a day will run between the two cities at the higher speed.

Also at Xinhua and NextBigFuture.

Original Submission

Read more of this story at SoylentNews.


Russias Largest Torrent Site Celebrates 13 Years Online in a Chinese Restaurant "IndyWatch Feed Tech"

For most torrent fans around the world, The Pirate Bay is the big symbol of international defiance. Over the years the site has fought, avoided, and snubbed its nose at dozens of battles, yet still remains online today.

But there is another site, located somewhere in the east, that has been online for nearly as long, has millions more registered members, and has proven just as defiant.

RuTracker, for those who havent yet found it, is a Russian-focused treasure trove of both local and international content. For many years the site was frequented only by native speakers but with the wonders of tools like Google Translate, anyone can use the site at the flick of the switch. When people are struggling to find content, its likely that RuTracker has it.

This position has attracted the negative attention of a wide range of copyright holders and thanks to legislation introduced during 2013, the site is now subject to complete blocking in Russia. In fact, RuTracker has proven so stubborn to copyright holder demands, it is now permanently blocked in the region by all ISPs.

Surprisingly, especially given the enthusiasm for blockades among copyright holders, this doesnt seem to have dampened demand for the sites services. According to SimiliarWeb, against all the odds the site is still pulling in around 90 million visitors per month. But the impressive stats dont stop there.

Impressive stats for a permanently blocked site

This week, RuTracker celebrates its 13th birthday, a relative lifetime for a site that has been front and center of Russias most significant copyright battles, trouble which doesnt look like stopping anytime soon.

Back in 2010, for example, RU-Center, Russias largest domain name registrar and web-hosting provider, pulled the plug on the sites former domain. The Director of Public Relations at RU-Center said that the domain had been blocked on the orders of the Investigative Division of the regional prosecutors office in Moscow. The site never got its domain back but carried on regardless, despite the setbacks.

Back then the site had around 4,000,000 members but now, seven years on, its ranks have swelled to a reported 15,382,907. According to figures published by the site this week, 778,317 of those members signed up this year...


A humanely killed animal is still killed and thats wrong "IndyWatch Feed Tech"

Hereford cattle arrive at a meat processing plant. <em>Photo by Daniel Garcia/Getty</em>

This is a stretch of course.  The animal's death releases its spirit body for a new cycle of life.  A humane death does matter while death itself does not matter at all.  The reason that is true is because death is inevitable while the experience is what is retained by the spirit body.  .

The faux moralists argue nonsense that demands outright extinction for all domesticates and a complete rewilding of the Earth as well.

I am actually a fan of a successful vegetarian diet.  At the same time i am also a fan of organic farming methodology and all that demands a massive increase in our use of working livestock to assist us.  That does mean a steady stream of animal protein to be consumed and ultimately a global surf...


Scooter Wheels Keep DIY Barn Doors on Track "IndyWatch Feed Tech"

[MotoGeeking] built a giant spray booth and is in the process of making customized, air-filtering barn doors for it. When it came to buy hardware to move the doors, though, he found all the ready-made options to be prohibitively expensive. You know what comes next: he designed barn door hardware from the ground up, and did it as cheaply as possible.

After intensely studying many images of barn doors and hardware, [MotoGeeking] decided on the right wheels and went from there. Kick scooter wheels fit the bill nicely, since they are designed to support a lot of weight and come with their own bearings and spacers. And theyre cheap, too just $9 for a pair.

[MotoGeeking] found some C channel extruded aluminium that seemed to be a perfect match for the wheels, but the wheel was quick to bind whenever it touched the sides. He solved that one by epoxying a length of round bar into the bottom corners. This allows the wheel to move freely while forcing it to stay centered in the track.

In designing the 1/4 aluminium brackets, [MotoGeeking] took a measure thrice, order once approach to selecting the fasteners. You probably know by now that McMaster-Carr has free CAD drawings for every little thing. [MotoGeeking] imported the ones he liked into Illustrator and built around them. This helped him get it right the first time and kept the headaches and hair-tearing away. Watch the giant door skeleton glide effortlessly on its track after the break.

Filed under: hardware, how-to


Return of the city-state "IndyWatch Feed Tech"

I personally posit the Communion of Xanadu as a global entity in which governance is through the natural community of approx. 150 souls and the rule of twelve.  The Nation State as we know it reduces natural communities into virtual communities inefficiently and fails a significant portion of its citizens.
What can be retained is the nation city that provides direct citizenship to ethnic avocations.   For example the city of Edinburgh can grant Scottish citizenship to all Scots.  This would give it almost 50,000,000 citizens able to vote on obvious cultural issues and a real forum to promote cultural values. They just would not mostly live there as that would no longer matter anyway.
What needs to be delinked is control over land use generally as that is best handled through the local; natural community and the application of the rule of twelve for conflicting issues...

Return of the city-state 
Nation-states came late to history, and theres plenty of evidence to suggest they wont make it to the end of the century

If youd been born 1,500 years ago in southern Europe, youd have been convinced that the Roman empire would last forever. It had, after all, been around for 1,000 years. And yet, following a period of economic and military decline, it fell apart. By 476 CE it was gone. To the people living under the mighty empire, these events must have been unthinkable. Just as they must have been for those living through the collapse of the Pharaohs rule or Christendom or the Ancien Rgime.

We are just as deluded that our model of living in countries is inevitable and eternal. Yes, there are dictatorships and democracies, but the whole world is made up of nation-states. This means a blend of nation (people with common attribut...


Global cooperation depends on the strength of local connections "IndyWatch Feed Tech"

Of course it does.  Thus my Rule of Twelve.   No communicating fully networked population is able to sustain conflict at all.  Where the problem arises is when such communication is assigned to an ill chosen one in such a way that he or she restricts such communication.  In short, hierarchy acts to limit cooperation and by extension, the more hierarchy we have the less cooperation we earn

The future will see all this resolved.  A lot we are actually relearning.  It is instructive that my newly imagined rule of twelve is integral to Bronze Age community governance and likely goes back to Antediluvian times.

We still see little substantive movement in my indicated direction mostly because hierarchical structures have and continue to control access to credit.

Global cooperation depends on the strength of local connections
Benjamin Allen  is an assistant professor of mathematics at Emmanuel College in Boston....


The healing power of nature "IndyWatch Feed Tech"

This is a reminder, but also do note that methodology is also evolving as well and that this all needs to be taken much further.  I do think that running water has much to do with all this.

Thus there are plenty of local streams that need to be dressed up a little and set up for straight up canoe trips.  This also has the advantage of placing eyeballs on these forgotten rivers and getting political support for full restoration.  They will no longer be out of sight and out of mind.

My own experience tells me that even modest creeks can use this attention and be nicely restored.

The healing power of nature 

The idea that immersing yourself in forests and nature has a healing effect is far more than just folk wisdom 



Scientists Develop Device to Detect Counterfeit Booze "IndyWatch Feed Tech"

Researchers at The University of Manchester have developed the world's first handheld SORS device that can detect fake spirits, such as vodka and whisky, whilst still in their bottles.

SORS, or 'spatially offset Raman spectroscopy," devices give highly accurate chemical analysis of objects and contents beneath concealing surfaces, such as glass bottles. It works by using 'an optical approach' where lasers are directed through the glass, enabling the isolation of chemically-rich information that is held within the spirits.

Such devices are already commercially available but are usually used for security and hazmat detection, screening and pharmaceutical analysis. This latest version, developed at the University's School of Chemistry in the Manchester Institute of Biotechnology (MIB), is the first time such a handheld tool is being used for a food or beverage product. The reseach has been published in Nature today (21st September).

Spirit drinks are the EU's biggest agri-food export, with EU governments' revenues of at least 23 billion in excise duties and VAT, and approximately 1 million jobs linked to the production, distribution and sale of spirit drinks.

Bah, I make my own.

Original Submission

Read more of this story at SoylentNews.


Google Will Survive SESTA. Your Startup Might Not. "IndyWatch Feed Tech"

There was a shocking moment in this weeks Senate Commerce Committee hearing on the Stop Enabling Sex Traffickers Act (SESTA). Prof. Eric Goldman had just pointed out that members of Congress should consider how the bill might affect hundreds of small Internet startups, not just giant companies like Google and Facebook. Will every startup have the resources to police its users activity with the level of scrutiny that the new law would demand of them?  There is a large number of smaller players who dont have the same kind of infrastructure. And for them, they have to make the choice: can I afford to do the work that youre hoping they will do?

Goldman was right: the greatest innovations in Internet services dont come from Google and Facebook; they come from small, fast-moving startups. SESTA would necessitate a huge investment in staff to filter users activity as a companys user base grows, something that most startups in their early stages simply cant afford. That would severely hamper anyones ability to launch a competitor to the big Internet playersgiving users a lot less choice.

Sen. Richard Blumenthals stunning response: I believe that those outliersand they are outlierswill be successfully prosecuted, civilly and criminally under this law.

Given the extreme penalties for under-filtering, platforms would err in the opposite direction, removing legitimate voices from the Internet.

Blumenthal is one of 30 cosponsorsand one of the loudest championsof SESTA, a bill that would threaten online speech by forcing web platforms to police their members messages more stringently than ever before. Normally, SESTAs proponents vastly understate the impact that the bill would have on online communities. But in that unusual moment of candor, Sen. Blumenthal seemed to lay bare his opinions about Internet startupshe thinks of them as unimportant outliers and would prefer that the new law put them out of business.

Lets make something clear: Google will survive SESTA. Much of the SESTA fights media coverage has portrayed it as a battle between Google and Congress, which sadly misses the point. Large Internet companies may have...


Google released a Chrome 61 update that patches 2 High-Risk Flaws "IndyWatch Feed Tech"

The first high-risk bug, tracked as CVE-2017-5121, is an Out-of-bounds access in V8 reported by Jordan Rabet, Microsoft Offensive Security Research and Microsoft ChakraCore team on 2017-09-14.

The expert received a $ 7,500 reward under the Google bug bounty program.

The second high-risk vulnerability, tracked as CVE-2017-5122, is an Out-of-bounds access in V8 as well that was reported by Choongwoo Han of Naver Corporation on 2017-08-04.

The CVE-2017-5122 vulnerability was also awarded a $3,000 bounty.

According to Krishna Govind from Google, many vulnerabilities in Google solutions have been detected using AddressSanitizer, MemorySanitizer, UndefinedBehaviorSanitizer, Control Flow Integrity, libFuzzer, or AFL.

Google Chrome

To date, Google has already fixed 25 vulnerabilities (8 of them were assessed as High-severity issues) affecting different Chrome 61 releases, half of which were reported by external researchers.

Google already paid over $30,000 in bug bounty rewards to the external security researchers who discovered the vulnerabilities, the highest one was $7,500.

Pierluigi Paganini

(Security Affairs  Google Chrome, bug bounty)



Re: [CVE-2017-14266] tcprewrite Heap-Based Buffer Overflow "IndyWatch Feed Tech"

Posted by Salvatore Bonaccorso on Sep 22


Thanks for providing the (it looks the mail did not make it to
the list, the attachment was 6.4M so maybe it was rejected).

I'm attaching for list archiving purposed the base64 encoded tcp.pcap
gzip compressed file.

Now looking at an ASAN build, on i386:

sid-i386:/tmp/source-tcpreplay/tcpreplay-3.4.4# ./src/tcprewrite --portmap=21:2121 --infile=/tmp/tcp.pcap


Cheap, Full-Duplex Software Defined Radio With The LimeSDR "IndyWatch Feed Tech"

A few years ago, we saw the rise of software-defined radios with the HackRF One and the extraordinarily popular RTL-SDR USB TV tuner dongle. Its been a few years, and technology is on a never-ending upwards crawl to smaller, cheaper, and more powerful widgets. Now, some of that innovation is making it to the world of software-defined radio. The LimeSDR Mini is out, and its the cheapest and most capable software defined radio yet. Its available through a Crowd Supply campaign, with units shipping around the beginning of next year.

The specs for the LimeSDR mini are quite good, even when compared to kilobuck units from Ettus Research. The frequency range for the LimeSDR Mini is 10 MHz 3.5 GHz, bandwidth is 30.72 MHz, with a 12-bit sample depth and 30.72 MSPS sample rate. The interface is USB 3.0 (the connector is male, and soldered to the board, but USB extension cables exist), and the LimeSDR is full duplex. That last bit is huge the RTL-SDR cant transmit at all, and even the HackRF is only half duplex. This enormous capability is thanks to the field programmable RF transceiver found in all of the LimeSDR boards. We first saw these a year or so ago, and now these boards are heading into the hands of hackers. Someones even building a femtocell out of a Lime board.

The major selling point for the LimeSDR is, of course, the price. The early bird rewards for the Crowd Supply campaign disappeared quickly at $99, but there are still plenty available at $139. This is very inexpensive and very fun on the Crowd Supply page, you can see a demo of a LimeSDR mini set up as an LTE base station, streaming video between two mobile phones. These are the golden days of hobbyist SDR.

Filed under: Crowd Funding, radio hacks


Microsofts Andromeda OS to turn Windows 10 into a modular platform "IndyWatch Feed Tech"

Is Microsofts Andromeda OS, The New Windows 10 Mobile OS?

Microsoft is apparently working on to make Windows into a modular operating system known as Andromeda OS internally at the Redmond HQ, that will work cross-platform, on any device type or architecture, as reported by Microsoft insiders at Windows Central. Andromeda OS is the future support of Windows 10 operating system.

Windows OS is more than 30 years old now and is based on old and demanding code, architecture and features. With the introduction of Andromeda OS, Microsoft is looking to make Windows 10 a universal OS that will allow it to adapt to each specific device without being based on particular, prior product variants. In other words, Andromeda OS will turn Windows 10 into a modular system suitable for different architectures rather than the x86 architecture used by desktops, laptops, and tablets running Intel or AMD chips.

Andromeda OS will allow any functions to be added or removed to suit the system or device its required to run on. This will in turn offer developers the flexibility to build versions of Windows 10 with different features and functions, quickly and efficiently or use a Windows OS without being affected by performance-sapping features not required by the device.

Microsoft is expected to replace the mobile platform Windows 10 Mobile with Andromeda OS likely to be seen in phones and tablets, and possibly even wearables in 2018 or later.

The post Microsofts Andromeda OS to turn Windows 10 into a modular platform appeared first on TechWorm.


Janet Faulkner, Program Manager at the University of Houston, joins our Futurists Board. "IndyWatch Feed Tech"

Janet Faulkner, Program Manager at the University of Houston, joins our Futurists Board.


lowRISC is Hiring: Help Make Open-Source Hardware a Reality. "IndyWatch Feed Tech"

From the lowRISC blog:

We are looking for a talented hardware engineer to join the lowRISC team and help make our vision for an open source, secure, and flexible SoC a reality. Apply now!

lowRISC C.I.C. is a not-for-profit company that aims to demonstrate, promote and support the use of open-source hardware. The lowRISC project was established in 2014 with the aim of bringing the benefits of open-source to the hardware world. It is working to do this by producing a high quality, secure, open, and flexible System-on-Chip (SoC) platform. lowRISC C.I.C. also provides hardware and software services to support the growing RISC-V ecosystem. Our expertise includes the LLVM Compiler, hardware security extensions and RISC-V tools, hardware and processor design.

[...] lowRISC is an ambitious project with a small core team, so you will be heavily involved in the project's development direction. This role will involve frequent work with external contributors and collaborators. While much of the work will be at the hardware level the post will offer experience of the full hardware/software stack, higher-level simulation tools and architectural design issues.

Some practical experience of hardware design with a HDL such as Verilog/SystemVerilog is essential, as is a good knowledge of the HW/SW stack. Ideally, candidates will also have experience or demonstrated interest in some of: SoC design, large-scale open source development, hardware or software security, technical documentation, board support package development and driver development. Industrial experience and higher degree levels are valued, but we would be happy to consider an enthusiastic recent graduate with a strong academic record.

Informal enquires should be made to Alex Bradbury

takyon (thanks to an AC): lowRISC is a project to create a "fully open-sourced, Linux-capable, system-on-a-chip"; it is based around RISC-V, the "Free and Open RISC Instruction Set Architecture", which is meant to provide an extensible platform that scales from low-level microcontrollers up to highly parallel, high-bandwidth general-purpose supercomputers.

Reduced instruction set computer (RISC).

Previously: RISC-V...


Marsia Bealby, Coeditor of "Current Research in Egyptology 2012", joins our Futurists Board. "IndyWatch Feed Tech"

Marsia Bealby, Coeditor of "Current Research in Egyptology 2012: Proceedings of the Thirteenth Annual Symposium", joins our Futurists Board.


8-Channel ADC For the Raspberry Pi "IndyWatch Feed Tech"

The Raspberry Pi is a powerful embedded computing platform. However, for all its Linux-based muscle, it lacks one thing that even the simplest 8-bit microcontrollers usually have analog-to-digital conversion. There are a great many ways to rectify this shortcoming, and [Chris Burgess] has brought us another with an 8-channel ADC for the Raspberry Pi.

For the ADC, [Chris] chose the MCP3008, for its low cost and availability. In this configuration it offers 10-bit resolution and a maximum sampling rate of 200 kilosamples per second. Adafruit has a great guide on working with the MCP3008, too. With such a useful resource to hand, [Chris] was able to spin up a PCB to interface the chip to the Raspberry Pi using SPI. [Chris] took care to try to make the board to the official HAT specifications. As far as the physical aspects go, the board is to spec, however [Chris] omitted the EEPROM required for auto-configuration purposes. That said, the pads are on the board if someone wants to take the initiative to install one.

Its a tidy build that provides something sorely missing from the Raspberry Pi, for a reasonable cost. [Chris]s goal was to build something that would enable the measurement of analog sensors for a robot project; wed love to hear your ideas for potential uses in the comments!

Filed under: Raspberry Pi


Inside the Strange Science of the Fake Meat that 'Bleeds' "IndyWatch Feed Tech"

From Wired:

WIRED wants to take you on the deepest dive yet into the science behind the Impossible Burger.

Biting into an Impossible Burger is to bite into a future in which humanity has to somehow feed an exploding population and not further imperil the planet with ever more livestock. Because livestock, and cows in particular, go through unfathomable amounts of food and water (up to 11,000 gallons a year per cow) and take up vast stretches of land. And their gastrointestinal methane emissions aren't doing the fight against global warming any favors either (cattle gas makes up 10 percent of greenhouse gas emissions worldwide).

This is the inside story of the engineering of the Impossible Burger, the fake meat on a mission to change the world with one part soy plant, one part genetically engineered yeastand one part activism. As it happens, though, you can't raise hell in the food supply without first raising a few eyebrows.

Read more of this story at SoylentNews.


New antibody attacks 99% of HIV strains "IndyWatch Feed Tech"

Experiments on 24 monkeys showed none of those given the tri-specific antibody developed an infection when they were later injected with the virus.

It will enter clinical trials to prevent and treat the infection next year.


One year later, Microsoft AI and Research grows to 8k people in massive bet on artificial intelligence "IndyWatch Feed Tech"

Microsofts first mission statement envisioned a computer on every desk and in every home, but Bill Gates also had another goal: that computers would someday be able to see, hear, communicate and understand humans and their environment.

More than 25 years and two CEOs later, Microsoft is betting its future on it.


Guajataca Dam in Puerto Rico Failing - 70,000 at Risk - Evacuations Ordered "IndyWatch Feed Tech"

As if the onslaught of hurricanes Irma and Maria were not enough, the National Weather Service in San Juan is reporting that a major dam is failing in Puerto Rico and that 70,000 people are being evacuated by bus. From CBS:

The National Weather Service in San Juan said Friday that the northwestern municipalities of Isabela and Quebradillas, home to some 70,000 people, were being evacuated with buses because the nearby Guajataca Dam was failing after Hurricane Maria hit the U.S. territory.

Maria poured more than 15 inches of rain on the mountains surrounding the dam, swelling the reservoir behind it.

Details remained slim about the evacuation with communications hampered after the storm, but operators of the dam reported that the failure was causing flash-flooding downstream. The 345-yard dam holds back a man-made lake covering about 2 square miles and was built decades ago, U.S. government records show.

"Move to higher ground now," the weather service said in a statement. "This is an extremely dangerous and life-threatening situation. Do not attempt to travel unless you are fleeing an area subject to flooding or under an evacuation order."

"Act quickly to protect your life," it added. "Buses will be evacuating people from these areas."

Wikipedia has a page about Guajataca Dam

NWS report on Twitter; also at Al Jazeera and BBC.

Original Submission

Read more of this story at SoylentNews.


Tesla Reportedly Teaming Up With AMD for Custom AI Chip "IndyWatch Feed Tech"

According to CNBC, Tesla is teaming up with AMD to develop a custom chip optimized for AI, to be used for self-driving features in Tesla cars. The head of Tesla's "Autopilot" team is Jim Keller, formerly of AMD and Apple, who helped design the A4 and A5 chips while working at Apple and was lead architect on the Athlon 64 at AMD.

Also at Engadget, TechCrunch, and Business Insider

GlobalFoundries, which fabricates chips for Advanced Micro Devices Inc, said on Thursday that Tesla had not committed to working with it on any autonomous driving technology or product, contradicting an earlier media report. [...] The spokesperson for GlobalFoundries said that Jhas comments at the GlobalFoundries Technology Conference were not reported accurately.

Original Submission

Read more of this story at SoylentNews.


Warren no longer blocking Trump antitrust nominee: report "IndyWatch Feed Tech"

Sen. Elizabeth Warren (D-Mass.) is no longer blocking President Donald Trumps nominee to head the Justice Departments Antitrust Division, Reuters reported.Warren on Friday reportedly lifted her hold and will allow the Senate to vote on Makan...


GitLab 10.0 Released "IndyWatch Feed Tech"

GitLab 10.0 has been released. "With every monthly release of GitLab, we introduce new capabilities and improve our existing features. GitLab 10.0 is no exception and includes numerous new additions, such as the ability to automatically resolve outdated merge request discussions, improvements to subgroups, and an API for Wiki thanks to a contribution from our open source community."


The quest for eternal life is trending "IndyWatch Feed Tech"

A long summary.

Could we live to 140? 1,000? Is there a limit? Scientific research into extending the human life span is being backed by Silicon Valley giants like Google and Facebook.


Solar Tide Clock Keeps Track of the Moon "IndyWatch Feed Tech"

[rabbitcreek] based his the tide prediction software off of [Luke Millers] Tide Clock, which applies location-specific adjustments to the standard lunar clock, taking into consideration such factors as the geographic features (basin depth, etc.) that modify the default timing. [Miller]s Arduino code includes a library of common locations organized by NOAA station number.

[rabbitcreek]s project consists of a Adafruit Feather board hooked up to a DS3231 RTC breakout and a HS-225BB servo, which turns the clocks hand. Its an 180-degree servo, attached to a hacked-down Actobotics gearbox gearing the servo down 2:1 to permit 360 degrees of movement.

He also wanted his creation to be left to operate unattended for years, theoretically so solar power was a natch. The face of the clock consists of individual wavers o...


Announcing Intel Clear Containers 3.0 "IndyWatch Feed Tech"

The Clear Containers team at Intel has announced the release of Clear Containers 3.0. "Completely rewritten and refactored, Clear Containers 3.0 uses Go language instead of C and introduces many new components and features. The 3.0 release of Clear Containers brings better integration into the container ecosystem and an ability to leverage code used for namespace based containers."


Blockchain for Good Hackathon, September 30 and October 1 "IndyWatch Feed Tech"

When is it on?

The Blockchain for Good Hackathon takes place Saturday, 30 September and Sunday, 1 October. Full agenda can be found here.

How many years has it been going?

This is the inaugural event.

What exciting things can people look forward to for the 2017 version?


Facebook relicenses several projects "IndyWatch Feed Tech"

Facebook has announced that the React, Jest, Flow, and Immutable.js projects will be moving to the MIT license. This is, of course, a somewhat delayed reaction to the controversy over the "BSD+patent" license previously applied to those projects. "This decision comes after several weeks of disappointment and uncertainty for our community. Although we still believe our BSD + Patents license provides some benefits to users of our projects, we acknowledge that we failed to decisively convince this community."


Five Ways Ancient India Changed the World With Maths "IndyWatch Feed Tech"

India's contributions to mathematics:

It should come as no surprise that the first recorded use of the number zero, recently discovered to be made as early as the 3rd or 4th century, happened in India. Mathematics on the Indian subcontinent has a rich history going back over 3,000 years and thrived for centuries before similar advances were made in Europe, with its influence meanwhile spreading to China and the Middle East.

As well as giving us the concept of zero, Indian mathematicians made seminal contributions to the study of trigonometry, algebra, arithmetic and negative numbers among other areas. Perhaps most significantly, the decimal system that we still employ worldwide today was first seen in India.

With such a significant technical lead, how did they fall behind?

Original Submission

Read more of this story at SoylentNews.


A Guide to Common Types of Two-Factor Authentication on the Web "IndyWatch Feed Tech"

Two-factor authentication (or 2FA) is one of the biggest-bang-for-your-buck ways to improve the security of your online accounts. Luckily, it's becoming much more common across the web. With often just a few clicks in a given account's settings, 2FA adds an extra layer of security to your online accounts on top of your password.

In addition to requesting something you know to log in (in this case, your password), an account protected with 2FA will also request information from something you have (usually your phone or a special USB security key). Once you put in your password, you'll grab a code from a text or app on your phone or plug in your security key before you are allowed to log in. Some platforms call 2FA different thingsMulti-Factor Authentication (MFA), Two Step Verification (2SV), or Login Approvalsbut no matter the name, the idea is the same: Even if someone gets your password, they won't be able to access your accounts unless they also have your phone or security key.

There are four main types of 2FA in common use by consumer websites, and it's useful to know the differences. Some sites offer only one option; other sites offer a few different options. We recommend checking to find out which sites support 2FA and how, and turning on 2FA for as many of your online accounts as possible. For more visual learners, this infographic from Access Now offers additional information.

Finally, the extra layer of protection from 2FA doesn't mean you should use a weak password. Always make unique, strong passwords for each of your accounts, and then put 2FA on top of those for even better log-in security.


When you enable a site's SMS 2FA option, you'll often be asked to provide a phone number. Next time you log in with your username and password, you'll also be asked to enter a short code (typically 5-6 digits) that gets texted to your phone. This is a very popular option for sites to implement, since many people have an SMS-capable phone number and it doesn't require installing an app. It provides a significant step up in ac...

Friday, 22 September


Video Friday: ANYmal Robot, Jibo Unboxing, and Anki Overdrive Fast & Furious "IndyWatch Feed Tech"

Your weekly selection of awesome robot videos Image: ANYbotics via YouTube

Video Friday is your weekly selection of awesome robotics videos, collected by your Automaton bloggers. Well also be posting a weekly calendar of upcoming robotics events for the next two months; heres what we have so far (send us your events!):

ROSCon  September 21-22, 2017  Vancouver, B.C., Canada
IEEE IROS  September 24-28, 2017  Vancouver, B.C., Canada
RoboBusiness  September 27-28, 2017  Santa Clara, Calif., USA
BtS Maritime Robotics  October 1-8, 2017  Biograd na Moru, Croatia
Drone World Expo  October 2-4, 2017  San Jose, Calif., USA
HAI 2017  October 17-20, 2017  Bielefeld, Germany

Let us know if you have suggestions for next week, and enjoy todays videos.

This video shows some impressively robust autonomous rough-terrain locomotion from ANYmal, but its mostly worth watching for the epic ANYmal back massage (!) at the end:

We present an architecture for rough-terrain locomotion with quadrupedal robots. All sensing, state estimation, mapping, control, and planning runs in real-time onboard the robot. The method is implemented on the quadrupedal robot ANYmal and we present experiments of climbing stairs, steps, and slopes and show how the robot can adapt to changing and moving environments.

By Pter Fankhauser, Marko Bjelonic, Miki Takahiro, Tanja Baumann, C. Dario Bellicoso, Christian Gehring, and Marco Hutter.

ANYmal ]

Some of you have been waiting a long, long, long time for this: an actual Jibo unboxing and setup video!

Jibos are shipping now for early Indiegogo backers. Im not sure how Sean got his first, but itll be interesting to see what...


Samba 4.7.0 released "IndyWatch Feed Tech"

The Samba 4.7.0 release is out. New features include whole DB read locks (a reliability improvement), active directory with Kerberos support, detailed audit trails for authentication and authorization activities, a multi-process LDAP server, better read-only domain controller support, and more. See the release notes for details.


Courts Are Losing Patience for Gilstraps Unbridled Support of Patent Trolls "IndyWatch Feed Tech"

Hes no better than Randall Rader, a facilitator of trolls (discharged with dishonor, so to speak)

Randall R. Rader
Photo from Reuters

Summary: The man whose court has become a trolling factory is being refuted (but not reprimanded) by the CAFC, which certainly can see that something is amiss and serves to discredit the system as a whole

THE media does not usually name judges (personifying cases). But Gilstrap is a special case; he himself has become the story due to outrageous rulings on patents (and more recently copyrights, too). The judge whom prominent politicians have dubbed reprehensible keeps ignoring the Supreme Court [1, 2]. He has single-handedly decided that the litigation industry in his town is more important than the law itself.

What will people think of the legal system, having read about the tales of Gilstrap? Its almost as though he is proudly biased; he boasts about it and openly invites patent trolls to his court (for favourable treatment). If he continues to make complete and utter mockery of the law, how long will it take before higher courts intervene at a more personal level/capacity?

Well, towards the end of this week the patent microcosms media took note of one such development; Federal Circuit rejects Gilstraps test for patent venue, said the headline. Here is the opening paragraph (much of the rest is behind a paywall):

The Federal Circuit has reversed an Eastern District of Texas refusal to transfer the Cray case, and rejected Judge Gilstraps test for determining patent venue. This includes the appeals court stating there must be a physical, geographical location in the district from which the business of the defendant is carried out

Almost simultaneously the other site of the patent micr...


India to Join China and the United States With Its Own Quantum Computer "IndyWatch Feed Tech"

India to take on China and the United States by building its own Quantum Computer

Quantum computer is touted as the next big leap in technology. China has been leading the Quantum computer arena and has already sent a hack-proof quantum computer into space. They even managed to achieve the first ever Star Trek-like teleportation by sending a Photon 500 km from space to the Space Center in China. The United States is not far behind but its Quantum computer technology is shrouded in secret under the official secrets act.  Indian scientists who have made a name for themselves by sending Mangalyaan a Mars orbiter at 1/5th the price of American Mars Orbiter and launching an extraordinary 104 satellites in the space at one go.

Now the Indian scientists have embarked on their next mission building Indias own Quantum computer. Keen to tap into the next big advance in computing technology, the Department of Science and Technology (DST) is planning to build its own quantum computer.

What is a Quantum Computer?

Unlike the normal computer and laptops that we have at our homes, the quantum computer employs the principles of quantum mechanics to store information in qubits instead of the typical bits of 1 and 0. While our computers and laptops run on the principle of bits and bytes, the Quantum computers run on Qubits These Qubits are theoretically 100 times faster than the conventions bits and bytes and work faster because of the way such circuits are designed, and their promise is that they can do intensive number-crunching tasks much more efficiently than the fastest comparable computers.

How fast is a Quantum Computer?

Quantum computers are considered to the fastest things on Earth. To give you an example, a quantum computer would require 3.5 million fewer steps than a traditional machine to sort and parse a billion numbers. A quantum computer can find the solution in only 31,623 steps compared to the millions of steps a conventional computer would take.

What is the use of a Quantum Computer?

One of the top uses of Quantum computer is of course military. Indian military could have the power to number crunch any problems from field military formations to in-house missile tests and hydrogen yield testing. Quantum computer can also be used to predict the weather correctly. India depends on monsoon and a correct prediction may help its millions of farmers produce a variety of crops according to the monsoon outbreak. A quantum computer can also help ISROs space programme besides providing the necessary infrastructure for the Aadhar card backbone. The Indian government hopes to directly credit benefits and subsidies (Universal Basic Inco...


Zuckerberg abandons plan to reclassify Facebook stocks "IndyWatch Feed Tech"

Mark Zuckerberg announced on Friday that he was dropping a bid to maintain majority control of Facebook while he and his wife Priscilla sell off almost all of their shares in the company to fund their philanthropy.Zuckerberg specifically said in a...


New Verizon data leak, the second one in a few months "IndyWatch Feed Tech"

Experts at Kromtech Security Research Center discovered a new Verizon leak exposed confidential and sensitive data on internal systems.

It has happened again, security researchers with Kromtech Security Research Center discovered a new Verizon leak exposed confidential and sensitive data on internal systems.

Leaked data includes server logs and credentials for internal systems, the huge trove of documents was found on an unprotected Amazon S3 bucket.

The archive seems to refer to internal Verizon Wireless systems, known as Distributed Vision Services (DVS), that is a middleware system used by the company to deliver data from the back-end systems to the front-end applications used by employees and staff in stores and at call centers.

On September 20th, Kromtech Security researchers discovered publicly accessible Amazon AWS S3 bucket containing around 100MB of data attributing to internal Verizon Wireless system called DVS (Distributed Vision Services). states a blog post published by Kromtech.

DVS is the middleware and centralized environment for all of Verizon Wireless (the cellular arm of VZ) front-end applications, used to retrieve and update the billing data.

The Amazon cloud storage contained several files, mostly scripts and server logs that included some login credentials to internal systems, some folders contained internal Verizon confidential documents, another folder contained 129 Outlook messages with internal communications within Verizon Wireless domain.

The repository contained:

  • Admin user info that could potentially allow access to other parts of the network
  • Command notes, logs including
  • B2B payment server names and info
  • Internal PowerPoints showing VZ infrastructure, with server IPs, marked as Verizon Wireless Confidential and Proprietary information
  • Global router hosts
  • 129 saved Outlook messages with access info and internal communications

Although no customers data are involved in this data leak, some scripts could be used by an attacker to elevate privileges within the internal systems and access them.

Some documents, marked as confidential and proprietary materials, include detailed information on the internal infrastructure, including server IP addresses and global router hosts.

Its not clear why the confidential documents were exposed on a public server.

According to ZDNet, the unprotected Amazon S3 storage server was controlled by an employee that told ZDNet on the phone Thu...


Game Engine Powered Arcan Display Server With Durden Desktop Updated "IndyWatch Feed Tech"

Arcan, the open-source display server powered by a game engine, is out with a new release. Its Durden desktop environment has also been updated...


U.S. Marine Corps to Have its First Female Infantry Officer "IndyWatch Feed Tech"

The U.S. Marine Corps will soon have its first female infantry officer. The unnamed lieutenant is expected to lead an infantry platoon of about 40 marines:

The Marine Corps is set to have its first female infantry officer, a milestone in its nearly 250-year-long history.

The lieutenant is scheduled to graduate with her all-male peers on Monday after she completed all of the graduation requirements in the service's grueling 13-week Infantry Officer Course, the Corps said. Her completion of the course was first reported by The Washington Post. The officer's name was not made public.

The course was opened to women in 2012, and on an experimental basis. More than 30 women attempted it, but when none passed, the course was once again closed to females in the spring of 2015. After the Pentagon opened all military jobs to women, four additional women tried the course without success.

Also at The Hill.

Original Submission

Read more of this story at SoylentNews.


Intellectual Ventures, GNU/Linux/Android/FOSS Patents, and the Ascent of European Patent Trolls "IndyWatch Feed Tech"

Summary: The existing status of GNU/Linux in a world full of patent trolls, which not only target OEMs from Asia typically in the US but are also dragging them into Europe, aided by the EPOs patent bubble

THE FREE/LIBRE software world is thriving. Its spreading everywhere. But that does not mean that users of such software are protected from frivolous lawsuits, especially in countries where software patents exist. Developers too are occasionally being threatened or sued; we have given examples where projects got shut down due to these actions.

Readers might rightly wonder why we havent said a single thing about Red Hats latest press release; we instead included about a dozen stories in our daily links under the Red Hat section (not much new there, just reiteration of a promise from a decade and a half ago). We are more concerned about real, existing, potent threats to software.

According to todays blog post from IAM, Microsofts patent troll Nathan Myhrvold now dominates the worlds largest troll, Intellectual Ventures. IAM is a fan of his and this is what it wrote:

Intellectual Ventures founder Greg Gorder has left the firm, becoming the latest of the quartet of its founders to step away from the business, following Peter Detkin and Ed Jung. According to his bio, which remains on the IV website, Gorder left earlier this month and will now focus on his familys philanthropic activities.

Detkin stood down as vice chairman in January 2015, although he has continued to devote part of his time to IV-related work. Earlier this year he became a senior adviser to Sherpa Technology Group, the consulting business that was established by former VP of IP at IBM and IP Hall of Fame member Kevin Rivette. Jung also took on a new role at the start of the year, becoming CEO of Xinova, the innovation business that was spun out of IV in 2016.

Intellectual property is the next software, Myhrvold once said. It means that to him its all about patents. This Microsoft-connected patent troll is already suing quite a few companies that distribute BSD and/or GNU/Linux. Its not a matter of if or when. The battle began years ago, but Intellectual Ventures operates through v...


Startup: LPPFusion Embraces Instability "IndyWatch Feed Tech"

Rather than fighting to control plasma, this startups device exploits instabilities to fuse atoms Photos: LPPFusion (2)

img img Photos: LPPFusion (Almost) Tabletop Fusion: The heart of LPPFusions device is a vessel filled with gaseous fuel at low pressure [top]. Inside, a blast of current down a set of electrodes turns the gas into plasma. Instabilities fuse plasma atoms [bottom].

Since nuclear fusions earliest days, the sun has served as the ultimate prototype. Its the closest continuously functioning large-scale fusion reactor, after all. Why not copy from the best? So tokamaks, stellarators, and laser ignition facilities all strive to create high-pressure and high-temperature plasmas that behave like microcosms of the suns core.

One of the biggest challenges these systems face is achieving the tight control they require over the plasma fuel they seek to fuse. But one New Jersey fusion startup company is taking a very different tack: Guide the plasmas instability; dont fight it, says Eric Lerner, president and chief scientist at LPPFusion, based in Middlesex, N.J.

LPPFusion is building what it calls a Dense Plasma Focus (DPF) device. This consists of a thick, hollow central anode surrounded by a ring of cathodes that are about the size and shape of candles. And indeed, the whole thing looks rather like a candelabra.

Heres how its supposed to work: The device sits in a chamber filled with the gas to be fused at a low pressure, while a bank of external capacitors blast pulses of electricity down the electrodes, forming a plasma from the gas. In a millionth of a second, the electric blast reaches the top of the electrodes, and natural instabilities produce filaments of plasma. The pulse of current reaches the end of the electrodes, and the filaments combine and collapse near the mouth of the cathode. This produces microscopic balls of plasma called plasmoids. Further instabilities in the plasmoids produce electron beams, which heat up the plasmoids to the temperatures required for fusion.

Still under peer review as of press time was a paper submitted to the journal Physics of Plasmas,...



Report: T-Mobile, Sprint close to merger agreement "IndyWatch Feed Tech"

T-Mobile and Sprint are close to an agreement on a major wireless merger, Reuters reported on Friday.The deal would revive an effort that was abandoned in 2014 amid tough regulatory hurdles under President Obama. The Trump administration since...


Carbon Nanotube Thread Could Generate Electricity From The Bloodstream "IndyWatch Feed Tech"

Researchers have reported an idea to implant nanotube yarns that could draw electricity from flowing blood Image: Fudan University/Wiley

To power wearable electronics, engineers have for years been tinkering with ways to generate electricity from our bodies. Theyve cooked up schemes to convert heartbeats, footsteps, and muscle motions into electricity.

Now a team from Fudan University in China has come up with a method for generating electricity from blood flow using a tiny fiber spun from carbon nanotubes. The idea is that the fiber could be implanted in a blood vessel to harvest the energy from flowing blood. Theyve presented the rudimentary concept in Angewandte Chemie , and havent tested the device in animals yet.

To make the 0.8-millimeter-diameter fibers, they either wrap a plastic fiber with an ordered array of carbon nanotubes, or simply twist a carbon nanotube sheet to make a yarn-like thread.

As the solution flows past, negative ions in the solution and electrons drawn from the nanotubes try to balance out the electric double layer. But they dont quite succeed: more charge builds up at the front of the flow. And this leads to a potential difference between the two ends of the fiber, generating voltage and electric current. Other teams have made nanotube-based yarns that generate electricity when twisted and stretched.

When the fiber is put in a tube that is connected on each end with a copper wire and has salty fluid flowing through it, it generates power with an efficiency of over 23 percent. This is higher than previously reported fiber-shaped energy harvesting devices, the researchers say. The electrical output is higher with longer fibers, faster-flowing liquid, and more concentrated salt solution.

A 30-centimeter-long device generates...


For the First Time, Signal Transfer Between Molecules Has Been Achieved "IndyWatch Feed Tech"

Molecular computing reaches another milestone Image: Nanchang University/Nature Nanotechnology STM image of all the initial -form molecules in the middle row that changed into the -form owing to a single manipulation

The history of molecular computing and electronics has been a long and twisting roadone that was meticulously catalogued on the pages of IEEE Spectrum two years ago. While the future of molecular electronics and computing remains somewhat up in the air, a great deal of research is still being focused on the field.

There have been proof-of-concept molecular switches, molecular data storage bits, and diodes.  However, one fundamental issue that has not been resolved is the transfer and exchange of signals between molecular devices for complex signal processing at room temperature.

Now researchers at Nanchang University in China have described, in the journal Nature Nanotechnology , a device that uses a particular kind of molecule that takes on two specific geometries when in contact with a copper surface. These two geometries can serve as the 0 and 1 of digital logic.

The work is based on a phenomenon known as in-plane molecular orientation, which occurs when an organic molecule lands on a solid surface. This adsorbed molecule might take different adsorption geometries. These adsorption geometries can be classified into several groups.

In our case, the molecule we used has two distinguished adsorption geometries on a copper surface, explained Li Wang, professor of physics at Nanchang University, in an e-mail interview with IEEE Spectrum. One is left-handed, the other is right handed. For the purposes of data storage or transfer, We define left-handed geometry as 1 and the right-handed geometry as 0, added Wang.

Wang and his colleagues discovered that the in-plane orientation of a molecule could be controlled by the in-plane orientations of two neighboring molecules due to their intermolecular interactions. The researchers exploited this intermol...


Lidar-Equipped Autonomous Wheelchairs Roll Out in Singapore and Japan "IndyWatch Feed Tech"

No more waiting for an orderly to see you out, or an attendant to see you to your gate Photo: Panasonic

Photo: Panasonic The Uber of Wheelchairs: At Haneda Airport in Tokyo, people with disabilities will be able to hail autonomous wheelchairs using a smartphone app that lets them select a destination, sit back, and relax.

Autonomous vehicles can add anew member to their ranksthe self-driving wheelchair. This summer, two robotic wheelchairs made headlines: one at a Singaporean hospital and another at a Japanese airport.

The Singapore-MIT Alliance for Research and Technology, or SMART, developed the former, first deployed in Singapores Changi General Hospital in September 2016, where it successfully navigated the hospitals hallways. It is the latest in a string of autonomous vehicles made by SMART, including a golf cart, an electric taxi, and most recently, a scooter that zipped more than 100 MIT visitors around on tours in 2016.

The SMART self-driving wheelchair has been in development since January 2016, says Daniela Rus, director of MITs Computer Science and Artificial Intelligence Laboratory and a principal investigator in the SMART Future Urban Mobility research group. Today, SMART has two wheelchairs in Singapore and two wheelchairs at MIT being tested in a variety of settings, says Rus.

The robots computer uses data from three lidars to make a map. A localization algorithm then determines where the smart chair is on the map. The chairs six wheels lend stability, and the chair is designed to make tight turns and fit through normal-size doorframes. When we visited several retirement communities, we realized that the quality of life is dependent on mobility. We want to make it really easy for people to move around, said Rus in a recent MIT statement.

A s...

IndyWatch Science and Technology News Feed Archiver

Go Back:30 Days | 7 Days | 2 Days | 1 Day

IndyWatch Science and Technology News Feed Today.

Go Forward:1 Day | 2 Days | 7 Days | 30 Days

IndyWatch Science and Technology News Feed was generated at World News IndyWatch.

Resource generated at IndyWatch using aliasfeed and rawdog