|IndyWatch Science and Technology News Feed Archiver|
IndyWatch Science and Technology News Feed was generated at World News IndyWatch.
Heres an overview of some of last weeks most interesting news and articles: Fooling security tools into believing malicious code was signed by Apple Security, incident response, and forensics processes and personnel use code signing to weed out trusted code from untrusted code. To undermine a code signing implementation for a major OS would break a core security construct that many depend on for day to day security operations. Patch management is not just ITs More
The post Week in review: Digital signature spoofing, securing microservices appeared first on Help Net Security.
Let me propose a hypothetical future scenario: Lets say that weve since developed an advanced method of brain-to-brain (B2B) communication, to which, naturally, has become quite popular among the younger generation of that time.
How might we judge futuristic societies using our present day standards? Better yet, how might the past have judged us today and would there be a difference?
By the time that Linus Torvalds released 4.18-rc1 and closed the merge window for this development cycle, 11,594 non-merge changesets had found their way into the mainline kernel repository. Nearly 4,500 of those were pulled after last week's summary was written. Thus, in terms of commit traffic, 4.18 looks to be quite similar to its predecessors. As usual, the entry of significant new features has slowed toward the end of the merge window, but there are still some important changes on the list.
The future is autonomous robots. Whether that means electric cars with rebranded adaptive cruise control, or delivery robots that are actually just remote control cars, the robots of the future will need to decide how to move, where to move, and be capable of tracking their own movement. This is the problem of odometry, or how far a robot has traveled. There are many ways to solve this problem, but GPS isnt really accurate enough and putting encoders on wheels doesnt account for slipping. Whats really needed for robotic odometry is multiple sensors, and for that we have [Pablo] and [Alfonso]s entry to the Hackaday Prize, the IMcorder.
The IMcorder is a simple device loaded up with an MPU9250 IMU module that has an integrated accelerometer, gyro, and compass. This is attached to an Arduino Pro Mini and a Bluetooth module that allows the IMcorder to communicate with a robots main computer to provide information about a robots orientation and acceleration. All of this is put together on a fantastically tiny PCB with a lithium battery, allowing this project to be integrated into any robotics project without much, if any, modification.
One interesting aspect of the IMcorders is that they can be used for robot kidnapping issues. This, apparently, is an issue when it comes to robots and other electronic detritus littering the sidewalks. Those electric scooters abandoned on the sidewalk in several cities contain some amazing components that are ripe for some great hardware hacking. Eventually, were going to see some news stories about people stealing scooters and delivery robots for their own personal use. Yes, its a cyberpunks dream, but the IMcorder can be used for a tiny bit of theft prevention. Pity that.
The Associated Press and the Everett Washington HeraldNet carry a story about a 30 year old double murder solved using Public Genealogy Sites similar to the Golden State Killer story carried here on SoylentNews.
Deaths of two Canadian visitors shopping in the Seattle area were unsolved since 1987.
The deaths remained a mystery for more than 30 years, until DNA led to a major breakthrough. A genealogist, CeCe Moore, worked with experts at Parabon NanoLabs to build a family tree for the suspect, based on the genetic evidence recovered from the crime scenes. They used data that had been uploaded by distant cousins to public genealogy websites. They pinpointed a suspect, Talbott, a trucker living north of Sea-Tac International Airport.
Police kept him under surveillance until a paper cup fell from his truck in Seattle in early May. A swab of DNA from the cup came back as a match to the evidence that had waited 30 years. Before then, Talbott had never been considered a suspect. Days later he was in handcuffs.
This time the police used Parabon NanoLabs (more well-known for generating facial models from mere samples of DNA) to build a family tree of the killer by submitting the 30 year old crime scene DNA samples to multiple genealogy sites.
Results from those sites were combined by a Parabon genealogist to map the family of distant cousins found in those data bases. Police were then able to narrow down the list using other methods unmentioned.
Neither article mentions if any family members were stalked by police while being eliminated as suspects, or whether any samples were submitted by other family members.
Read more of this story at SoylentNews.
In preparation for the commercial crewed modules that will arrive at the International Space Station soon, astronauts took a lengthy spacewalk to install some crucial equipment to the docking module. The extra-vehicular activity moved commander Drew Feustel to third on the list of all-time spacewalkers.
Watch extremely realistic limbs, complete with hair and freckles, get made from beginning to end.
Computer simulations have become so accurate that cosmologists can now use them to study dark matter, supermassive black holes, and other mysteries of the real evolving cosmos.
You can now pass input data to all tools via
?input-url=URL query argument.
Check out this example - Load a GIF from Giphy and extract 15th frame from it as a PNG.
In this example GIF's URL is:
?input-url query is:
Full url to a tool that extracts 15th frame:
Input-url query argument also works with chaining.
Image tools also accepts input images as Data URI encoded data
Here's an example -...
By jan mcharg, texas A&M university college of engineering
A new technology combining a laser beam and a particle beam for interstellar propulsion could pave the way for space exploration into the vast corners of our universe. This is the focus of PROCSIMA, a new research proposal by Dr. Chris Limbach and Dr. Ken Hara, assistant professors in the Department of Aerospace Engineering at Texas A&M University.
NASA has chosen the proposal PROCSIMA: Diffractionless Beam Propulsion for Breakthrough Interstellar Missions, for the 2018 NASA Innovative Advanced Concepts (NIAC) phase 1 study. PROCSIMA stands for Photon-paRticle Optically Coupled Soliton Interstellar Mission Accelerator, and is meant to evoke the idea that interstellar travel is not so far away.
They want to keep the pie and eat it as well
Summary: 35 U.S.C. 101 still squashes a lot of software patents, reducing confidence in US patents; the only way to correct this is to reduce patent filings and file fewer lawsuits, judging their merit in advance based on precedents from higher courts
The patent microcosm prefers to
cherry-pick cases based on their outcome.Among the main
casualties? Software patents. The patent microcosm prefers to
cherry-pick cases based on their outcome. The latest such example
is Zeroclick v Apple, a Federal
Circuit (CAFC) case from
the very start of this month
wrote about it a couple of days later and Watchtroll did too (a
relatively long time afterwards); its said to be about (G)UI code
even though theres no such thing (in programming theres a callback
function associated with pertinent GUI elements, but the GUI itself
is just a layout, which could possibly be seen as copyrighted).
Anyway, this isnt a case about software patents or even
101/Alice. Some say it is about
112. Those same people (or a colleague, Charles Bieneman) speak
of DDR Holdings, which is utterly desperate to salvage
some abstract patents from 101; the famous case of DDR Holdings was
mentioned a lot in 2016 (even here, e.g. [1,
[SESTA/FOSTA] is in force and all it's doing is hurting efforts to track down sex traffickers and harming sex workers whose protections were already minimal. Sex traffickers, however, don't appear to be bothered by the new law. But that's because the law wasn't written to target sex traffickers, as a top DOJ official made clear at a law enforcement conference on child exploitation. Acting Assistant Attorney General John P. Cronan's comments make it clear SESTA/FOSTA won't be used to dismantle criminal organizations and rescue victims of sex traffickers. It's there to give the government easy wins over websites while sex traffickers continue unmolested.
In April, Backpage.com the internet's leading forum to advertise child prostitution was seized and shut down, thanks to the collective action by CEOS and our federal and state partners. The Backpage website was a criminal haven where sex traffickers marketed their young victims. The Backpage takedown and the contemporaneous arrests of individuals allegedly responsible for administering the site struck a monumental blow against child sex traffickers.
But other sites inevitably will seek to fill the void left by Backpage, and we must be vigilant in bringing those criminals to justice as well. With the recent passage of the SESTA-FOSTA legislation, state and local prosecutors are now positioned to more effectively prosecute criminals that host online sex trafficking markets that victimize our children.
"Criminals" that "host sex trafficking markets." That's the target. That's any website that might be used by actual sex traffickers to engage in actual sex trafficking. There's no dedicated web service for sex trafficking -- at least not out in the open where Section 230 immunity used to matter. This is all about taking down websites for hosting any content perceived as sex trafficking-related. It wasn't enough to han...
In this day and age, aspiring artists have access to a wide variety of tools they can use to create a decent product.
Creating something is easy, but the real challenge is to escape obscurity and get noticed by the public.
Traditionally, this task has been fulfilled by major publishers and other media distributors, but there are also alternative routes.
The stories of YouTube sensations who turned into their own media empires come to mind. But in darker corners of the web, which are mostly associated with piracy, there are success stories too.
This week we spoke to Italian author Wallace Lee, whose unofficial Rambo-prequel Rambo Year One received great reviews after relying on torrents as a main distribution channel.
Lees story starts several years ago, when he began publishing short Rambo stories on a personal blog hosted by WordPress. It was fan-fiction in its purest form, but the author soon realized that not everyone was happy with his work.
Two years before free-sharing my first novel, I had a blog where I used to post my Rambo prequel short tales for free. And yet, a few months later, my site was shut down because the laws in the US allow copyright owners to stop fanfiction too, and even if its just for free.
It turned out that a rightsholder objected to his use of the Rambo character. While Lee doesnt recall the sender of the notice, it meant that he could no longer publish his work as he pleased.
Caught in a copyright stranglehold, the author felt limited in his creative expression. Ironically, he saw torrents as his way out. If he published his works on The Pirate Bay, copyright holders couldnt touch him, he thought.
It was a defiant thought, which may have worked, but luckily for him, it didnt get that far. Instead of becoming a pirate writer, Lee received permission from David Morrell, author of the novel First Blood on which the Rambo empire was built.
Frankly, I feel very lucky things ended up this way because I did not want to be at war with the same guys who owned Rambo in the first place, Lee tells TorrentFreak.
With permission to freely share his book, the unofficial Rambo-prequel was finally released. While Lee no longer had to turn to piracy, he was still committed to using torrent sites to get exposure and escape obscurity.
That worked to a certain degree. The book was picked up here and there, but without a major publisher, it was hard to be taken seriously by literary critics.
Anyone old enough to have driven before the GPS era probably wonders, as we do, how anyone ever found anything. Navigation back then meant outdated paper maps, long detours because of missed turns, and the far too frequent stops at dingy gas stations for the humiliation of asking for directions. It took forever sometimes, and though we got where we were going, it always seemed like there had to be a better way.
Indeed there was, but instead of waiting for the future and a constellation of satellites to guide the way, some clever folks in the early 1970s had a go at dead reckoning systems for car navigation. The video below shows one, called Cassette Navigation, in action. It consisted of a controller mounted under the dash and a modified cassette player. Special tapes, with spoken turn-by-turn instructions recorded for a specific route, were used. Each step was separated from the next by a tone, the length of which encoded the distance the car would cover before the next step needed to be played. The controller was hooked to the speedometer cable, and when the distance traveled corresponded to the tone length, the next instruction was played. Theres a long list of problems with this method, not least of which is no choice in road tunes while using it, but given the limitations at the time, it was pretty ingenious.
Dead reckoning is better than nothing, but its a far cry from GPS navigation. If youre still baffled by how that cloud of satellites points you to the nearest Waffle House at 3:00 AM, check out our GPS primer for the details.
Thanks for the tip, [Chaffel]
Investigators at Harvard Medical School have identified the key cellular mechanisms behind vascular aging and its effects on muscle health, and they have successfully reversed the process in animals.
The scientists used a chemical compound thats an NAD+ booster called NMN which plays a critical role in repairing cellular DNA as well as maintaining cell vitality to test what would happen.
Could reversing the aging of blood vessels hold the key to restoring youthful vitality? If the old adage you are as old as your arteries reigns true then the answer is yes, at least in mice.
According to a new study by Harvard Medical School researchers, they have identified the cellular mechanisms that cause the aging of vascular arteries as well as the effects of such aging on the health of muscles. The Medical team was also able to successfully reverse this aging process.
What these findings seem to indicate is that theres a glitch in the normal crosswalk between both muscles and blood vessels and keeping both tissues healthy. The scientists were also able reverse the demise of blood vessels and muscle atrophy in the aging mice by using the synthetic precursors of two molecules naturally present in the body. This boosted their exercise endurance in the process.
The Medical team is excited because such a breakthrough will now pave the way to identifying new therapies for humans.
Study senior investigator David Sinclair, professor in the Department of Genetics at Harvard Medical School and co-director of the Paul F. Glenn Center for the Biology of Aging at Harvard Medical School stated weve discovered a way to reverse vascular aging by boosting the presence of naturally occurring molecules in the body that augment the physiological response to exercise.
Because there are some very important differences in biology between humans and mice theres a possibility that this treatment may not have the same effect in humans. Nonetheless, the research team plans to follow through with human clinical trials because the results of this experiment were important enough to prompt the research team in doing so.
Submitted via IRC for BoyceMagooglyMonkey
[...] A new analysis by researchers at UC Santa Cruz, published June 14 in Monthly Notices of the Royal Astronomical Society, explains these and other puzzling features of active galactic nuclei as the result of small clouds of dust that can partially obscure the innermost regions of AGNs.
[...] The findings have important implications because researchers use the optical emissions from the broad-line region to make inferences about the behavior of the gases in the inner regions around a supermassive black hole.
[...] "Once the dust crosses a certain threshold it is subjected to the strong radiation from the accretion disk," said Harrington. "This radiation is so intense that it blows the dust away from the disk, resulting in a clumpy outflow of dust clouds starting at the outer edge of the broad-line region."
The effect of the dust clouds on the light emitted is to make the light coming from behind them look fainter and redder, just as Earth's atmosphere makes the sun look fainter and redder at sunset. In their paper, Gaskell and Harrington present several lines of observational evidence supporting the existence of such dust clouds in the inner regions of active galactic nuclei. They developed a computer code to model the effects of dust clouds on observations of the broad-line region.
Read more of this story at SoylentNews.
Yesterday, between 9:00 and 11:00, DSLWP-B made its first JT4G 70cm transmissions from lunar orbit. Several stations such as Cees Bassa and the rest of the PI9CAM team at Dwingeloo, the Netherlands, Fer IW1DTU in Italy, Tetsu JA0CAW and Yasuo JA5BLZ in Japan, Mike DK3WN in Germany, Jiang Lei BG6LQV in China, Dave G4RGK in the UK, and others exchanged reception reports on Twitter. Some of them have also shared their recordings of the signals.
Last week I presented a JT4G detection algorithm intended to detect very weak signals from DSLWP-B, down to -25dB SNR in 2500Hz. I have now processed the recordings of yesterdays transmissions with this algorithm and here I look at the results. I have also made a Python script with the algorithm so that people can process their recordings easily. Instructions are included in this post.
The JT4G transmissions are made just after the end of each GMSK telemetry packet, as illustrated by the following figure made by Cees Bassa using the signals he received at Dwingeloo. Also note that the JT4G signal starts at an UTC minute, as it is common with WSJT-X modes. The frequency of the lowest JT4G tone seems to be 1kHz higher than the GMSK carrier.GMSK and JT4G signals from DSLWP-B recorded by Cees Bassa at PI9CAM
As far as I know, the following stations have shared recordings of the JT4G signals:...
Poor assessment of patent applications can now be stopped or compensated for by the Patent Trial and Appeal Board (PTAB) and, failing that, the Court of Appeals for the Federal Circuit (CAFC)
A death squad is what patent maximalists nowadays call a court (where the only casualty is a piece of paper, or a low-quality patent which US law renders invalid)
Summary: The struggle between law, public interest, and the Cult of Patents (which only ever celebrates more patents and lawsuits) as observed in the midst of recent events in the United States
THE ideology of patent maximalism is a toxic one and it is infectious only within circles that sell, trade, and exploit patents for litigation, not innovation. Its all about financial motivations and those motivated to spread patent maximalism typically profit from mass litigation. Its their most expensive product or service as it can last several years (appeals, discovery, so-called damages with a cut for respective law firms).
They dont seem to care about facts, only mythology and beliefs.Earlier this year we started habitually referring to patent maximalism (of the patent microcosm) as Cult of Patents because it has become almost like a religion to these people. They dont seem to care about facts, only mythology and beliefs.
A reader suggested this chart as we approach U.S. Patent No. 10,000,000, Patently-O wrote on Friday. As we said before, its a pretty meaningless milestone from this Cult of Patents (the patent maximalists). Half a decade or so after Alice and nearly a decade after the Bilski case the Office just granted far too many patents far too fast. Look at the rate of expansion of grants; do people invent twice as many things today as they did about a decade ago? Or a hundred times more than a century ago? Or maybe its just patent maximalism taking over, dubbing just about anything an invention and justifying/ permitting a monopoly on it?
Earlier this year we started habitually referring to patent maximalism (of the patent microcosm) as Cult of Patents because it has become almost like a religion to these people. They dont seem to care about f...
Tutoring is a fantastic way to earn some cash on the side. Whether youre a full time student doing some tutoring after classes or on weekends, or just trying to help your friendly neighbors get their GEDs, it can be a very satisfying and fulfilling experience.
But is there a way you could turn that part time job into a successful business and start earning serious cash while doing something that you love?
Were here to tell you that there is a way and that its much simpler than you think. You can use your tutoring skills to create something long lasting and meaningful and were here to show you how.
Create a website
Nothing is better at showcasing you and your business than a well made website. SITE123 is a free website builder that allows its users to create beautifully designed, fully responsive websites for free.
Use SITE123 to create a personal website that will make you look more professional and dedicated. Add your biography and your educational background to the About me page, and include testimonials from your former or current students.
Add a booking widget
Youll need a powerful calendar/booking tool to keep track of all of your students and classes, and luckily SITE123 has a few amazing ones to offer.
It even sends out confirmation and reminder emails to your students when their appointment is due.
Add a pricing chart
Being transparent with your fees will make you look more professional and trustworthy. Browsing SITE123s App Market, youll come across a few Ninja apps like Pricer Ninja and Charts Ninja. Add them to your website to make your pricing clear and visible. Add a short description of each class you teach and a price per hour per course.
Having additional teaching material on your website will help your students learn more about your classes. Create a video and upload it via Huzzaz, a video gallery app you can add to your website. The player fits perfectly into any design and is incredibly fast and responsive.
Having an online base for your tutoring business will help it grow. Your students will have a quick and easy way to book appointments and share your website w...
Summary: The meta-industry which profits from patents and lawsuits claims that its guiding us and pursuing innovation, but in reality its sole goal is enriching itself, even if that means holding science back
The problem is, such patent consultants or practitioners or whatever they call themselves are rarely independent and impartial observers.When it comes to patent advisors, their motivation is usually to get more business or returning customers. This means that advice would likely gravitate towards lawsuits, even futile ones that cannot be won. The problem is, such patent consultants or practitioners or whatever they call themselves are rarely independent and impartial observers. Theyre personally involved and theyre immersed in a particular industry that relies on certain activities a subject we shall cover separately in our next post.
Patent attorneys and lawyers are typically in the business of advising on how to manage the mess which they themselves create (or at least perpetuate); we say so with no intention of offending anyone in particular. Its just putting the simple truth out there. Sure, there are some attorneys and lawyers who are honest and with great integrity (some of them send us information and material); some are willing to express the occasional dissent towards patent maximalism at great risk of being framed traitors to their profession. But theyre the exception rather than the norm. They wont be the ones to become abundantly wealthy.
The latter prior art is very important as it helps document the history of science and credit/attribute the correct people for their contribution to the sciences.To give a couple of examples from several hours ago, over at Patent Docs they now market or promote some upcoming webinars (Patent Portfolio Management and...
[Markus_p] has already finished one really successful 3D printed tracked robot build. Now hes finished a second one using standard motors and incorporating what he learned from the first. The results are pretty impressive and you can see a video demo of the beast, below.
Most of the robot is PLA, although there are some parts that use PETG and flex plastic. There is an infrared-capable camera up front and another regular camera on the rear. All the electronics are pretty much off the shelf modules like an FPV transmitter and an electronic controller for the motors. Theres a servo to tilt the camera, as you can see in the second video.
The body fits together using nuts and magnets. The robot in the video takes a good beating and doesnt seem to fall apart so it must be sufficient. What appealed to us was the size of the thing. It looks like it would be trivially easy to mount some processing power inside or on top of the rover and it could make a great motion base for a more sophisticated robot.
Looking for a tracked rover you can drive around on the desktop? [Markus_p] has one of those too!
Researchers at Oregon State University have confirmed that last fall's union of two neutron stars did in fact cause a short gamma-ray burst. The findings, published today [14 June] in Physical Review Letters, represent a key step forward in astrophysicists' understanding of the relationship between binary neutron star mergers, gravitational waves and short gamma-ray bursts.
Commonly abbreviated as GRBs, gamma-ray bursts are narrow beams of electromagnetic waves of the shortest wavelengths in the electromagnetic spectrum. GRBs are the universe's most powerful electromagnetic events, occurring billions of light years from Earth and able to release as much energy in a few seconds as the sun will in its lifetime. GRBs fall into two categories, long duration and short duration. Long GRBs are associated with the death of a massive star as its core becomes a black hole and can last from a couple of seconds to several minutes.
Short GRBs had been suspected to originate from the merger of two neutron stars, which also results in a new black hole -- a place where the pull of gravity from super-dense matter is so strong that not even light can escape. Up to 2 seconds is the time frame of a short GRB.
Read more of this story at SoylentNews.
There are many changes and new features for Linux 4.18 with the merge window having just closed on this next kernel version, but still there are some prominent features that have yet to work their way to the mainline tree...
The IT security researchers at Qihoo 360 Total Security have discovered
This is a post from HackRead.com Read the original post: ClipboardWalletHijacker malware replaces address to steal cryptocurrency
The Co-Deck was Technics (rushed?) response to the runaway success of the Sony Walkman.
After the Sony Walkman arrived on the scene in 1979 at a price of 33,000 Yen the Technics Co-Deck M1 turned up in 1980 at a price of 29,800 Yen. Whilst also being a portable cassette player, this was a very different machine in a form-factor that was never to be repeated. A look inside reveals a tell tale mystery button that gives away its simple origins.
FAQs including an update on the operation of the Rewind Auto-play function can be found in the youtube comments.
The best news of the week with Security Affairs.
Let me inform you that my new book, Digging in the Deep Web is online with a special deal
Once again thank you!
|Search Engines in Russia cannot link to banned VPN services and Internet proxy services|
|Experts warn hackers have already stolen over $20 Million from Ethereum clients exposing interface on port 8545|
|Former GCHQ chief Hannigan warns of Russias aggressive approach to the cyberspace|
|InvisiMole Spyware is a powerful malware that went undetected for at least five years|
Democrats are looking to seize on growing public worries about data privacy to rally voters in the upcoming midterms.Tech policy typically ranks low on an average voters list of priorities, prompting skepticism that data privacy can rally move the...
Experts from Qihoo 360 Netlab discovered that the author of the Satori botnet have integrated a the proof-of-concept (PoC) code for the XionMai web server software package after it was published on June 8.
The code recently included in the Satori botnet exploits a buffer overflow vulnerability, tracked as CVE-2018-10088, in XionMai uc-httpd 1.0.0. The exploit could be used by remote attackers to execute arbitrary code by sending a malformed package via ports 80 or 8000.
Two days ago, on 2018-06-14, we noticed that an updated Satori botnet began to perform network wide scan looking for uchttpd 1.0.0 devices. reads the report published by Qihoo 360 Netlab.
Most likely for the vulnerability of XiongMai uchttpd 1.0.0 (CVE-2018-10088). The scanning activities led to a surge in scanning traffic on ports 80 and 8000.
Submitted via IRC for BoyceMagooglyMonkey
Letter to judge reveals 731 pages of messages, call logs uncovered on one of two phones.
[...] The letter to Judge Kimba Wood stated that "the Government was advised that the FBI's original electronic extraction of data from telephones did not capture content related to encrypted messaging applications, such as WhatsApp and Signal... The FBI has now obtained this material."
In a letter to the presiding judge in the case against Michael Cohen, President Donald Trump's long-time personal attorney, the US Attorney's Office for the Southern District of New York revealed today that it had obtained additional evidence for reviewincluding a trove of messages and call logs from WhatsApp and Signal on one of two BlackBerry phones belonging to Cohen. The messages and call logs together constitute 731 pages of potential evidence. The FBI also recovered 16 pages of documents that had been shredded, but it has not yet been able to complete the extraction of data from the second phone.
This change is likely because of the way the messages are stored by the applications, not because the FBI had to break any sort of encryption on them. WhatsApp and Signal store their messages in encrypted databases on the device, so an initial dump of the phone would have only provided a cryptographic blob. The key is required to decrypt the contents of such a database, and there are tools readily available to access the WhatsApp database on a PC.
Read more of this story at SoylentNews.
The production capability available to the individual hacker today is really quite incredible. Even a low-end laser engraver can etch your PCBs, and it doesnt take a top of the line 3D printer to knock out a nice looking enclosure. With the wide availability of these (relatively) cheap machines, the home builder can churn out a very impressive one-off device on a fairly meager budget. Even low volume production isnt entirely out of the question. But theres still one element to a professional looking device that remains frustratingly difficult: a good looking front panel.
Now if your laser is strong enough to engrave (and ideally cut) aluminum sheets, then youve largely solved this problem. But for those of us who are plodding along with a cheap imported diode laser, getting text and images onto a piece of metal can be rather tricky. On Hackaday.io, [oaox] has demonstrated a cost effective way to create metal front panels for your devices using a print service that offers Dibond aluminum. Consisting of two thin layers of aluminum with a solid polyethylene core, this composite material was designed specifically for signage. Through various online services, you can have whatever you wish printed on a sheet of pre-cut Dibond without spending...
Posted by Lionel Debroux on Jun 17Hi,
A compromised local user can leak your IP by using a script to start unsafe-browser hidden in the background and use X11 trickery to leak your real IP without privilege escalation. Most applications exploited on Tails would be capable of this.
deleting /etc/sudoers.d/zzz_unsafe-browser after booting will fix this issue until Tails fixes it themselves
Feature #7072: Research potential for deanonymization by a compromised "amnesia" user
The Unsafe Browser allows to retrieve the public IP address by a compromised amnesia user with no user interaction
Read more of this story at SoylentNews.
That growth in factory worker salaries has been a double-edged sword for China. On one hand, it has increased the purchasing power of Chinese which in turn has powered consumer-led economic growth, but on the other it has made China less competitive on wages and forced companies like Foxconn to introduce more automation.
With 1 million employees and half a dozen factories contributing 4 per cent of the countrys export value, Foxconns expansion symbolises Chinas role as tech manufacturing powerhouse.
After about eight years of serving up links to large volumes of mainstream content, the site had apparently disappeared. There was no warning or indication of what may have transpired, but several weeks ago a message appeared on its homepage, indicating the platform was up for sale.
Intrigued as to why its operators had decided to throw in the towel, TF made contact seeking information. This week we received a response from part owner and long-standing editor Error but it wasnt what we were expecting.
The problems started when we stopped paying attention to our website due to real-life issues, Error explained.
Once we forgot to renew our domain which caused a few days of down time and more recently we switched to a new server and the payment renewal was not automated, so it expired. In the end, I decided it would be better to sell the site to a person who can actually take care of it and run it as we used to years back.
Error says that after putting the site up for sale they had a lot of responses from people with bids, but one individual stood out as a reasonable person with a decent offer.
In the world of warez, however, not many things are straightforward. Few people want to make their identities known and meeting people face to face is mostly out of the question. Error says he asked the prospective buyer to nominate an intermediary, such as a trusted and well-known person within the warez scene. The offer was declined.
[The buyer] said that he didnt trust anyone and was fine sending the money in two payments, half before he received the database and half after he was satisfied that he can work with the old database. Then the domain transfer could happen, Error explains.
The buyer identified himself as a former editor of a Sceper rival which had shut down under legal pressure back in 2012.
Additional proof came in the form of a panel screenshot which showed the buyer had access to a current scene release blog and other related domains. An email address used in correspondence with Error also belonged to the same blog, confirming the buyers identity.
Error says he hadnt heard of the release blog until that moment, bu...
Security researchers from Qihoo 360 Total Security have spotted a new malware campaign spreading a clipboard hijacker, tracked as ClipboardWalletHijacker, that has already infected over 300,000 computers. Most of the victims are located in Asia, mainly China.
Recently, 360 Security Center discovered a new type of actively spreading CryptoMiner, ClipboardWalletHijacker. The Trojan monitors clipboard activity to detect if it contains the account address of Bitcoin and Ethereum. reads the analysis published by the company.
It tampers with the receiving address to its own address to redirect the cryptocurrency to its own wallet. This kind of Trojans has been detected on more than 300 thousand computers within a week.
Modus operandi for ClipboardWalletHijacker is not a novelty, the malware is able to monitor the Windows clipboard looking for Bitcoin and Ethereum addresses and replace them with the address managed by the malwares authors.
In March 2018, researchers at Palo Alto Networks discovered a malware dubbed ComboJack that is able of detecting when users copy a cryptocurrency address and alter clipboards to steal cryptocurrencies and payments.
In a similar way, ClipboardWalletHijacker aims at hijacking BTC and ETH transactions.
Experts observed the malware using the following addresses when replacing legitimate ones detected in users clipboards:
The biggest allure of 3D printing, to us at least, is the ability to make hyper-personalized objects that would otherwise fall through the cracks of our mass-market economy. Take, for instance, the Frozen Rat Kidney Shipping Container, or maybe some of the less bizarro applications in the US National Institute of Healths 3D Print Exchange.
The Exchange is dominated, at least in terms of sheer numbers, by 3D models of proteins and other biochemical structures. But there are two sections that will appeal to the hacker in you: prosthetics and lab equipment. Indeed, we were sent there after finding a nice model of a tray-agitator that we wanted to use for PCB etching. We havent printed one yet, but check out this flexible micropositioner.
While its nowhere near as comprehensive a resource as some other 3D printing model sites, the focus on 3D printing for science labs should really help those who have that particular itch to find exactly the right scratcher. Or a tailor-made flexible container for slicing frozen rat kidneys. Whatever youre into. We dont judge.
Man with skull image: [jaqtikkun]
Sculpt OS is striving to become a general purpose operating system built off the Genode OS framework. The second release of Sculpt OS is now available and it's much easier now to try out...
Startup SpinLaunch Inc. has received $40 million in funding. The company intends to use a centrifuge to catapult small payloads to the edge of space:
The company remains tight-lipped about exactly how this contraption will work, although its name gives away the basic idea. Rather than using propellants like kerosene and liquid oxygen to ignite a fire under a rocket, SpinLaunch plans to get a rocket spinning in a circle at up to 5,000 miles per hour and then let it gomore or less throwing the rocket to the edge of space, at which point it can light up and deliver objects like satellites into orbit.
[...] Over the past few years, the rocket industry has become quite crowded. Following in the footsteps of Elon Musk's Space Exploration Technologies Corp., dozens of companies have appeared, trying to make small, cheap rockets that can be launched every week or perhaps even every day. These smaller rockets have been built to carry a new breed of shoebox-sized satellitesdubbed smallsatsthat are packed full of imaging, telecommunications and scientific equipment. The small rockets, though, are really just miniaturized versions of the large, traditional rockets that have flown for decades. SpinLaunch is an entirely new take on the rocket-launch concept itself.
[...] SpinLaunch has a working prototype of its launcher, although the company has declined to provide details on exactly how the machine operates or will compare to its final system. The startup plans to begin launching by 2022. It will charge less than $500,000 per launch and be able to send up multiple rockets per day. The world's top rocket companies usually launch about once a month, and most of SpinLaunch's rivals have been aiming for $2 million to $10 million per launch for small rockets. If the startup were able to reach its goals, it would easily be the cheapest and most prolific small launcher on the market.
NextBigFuture puts the velocity at up to 4,800 km/h (3,000 mph) instead.
She retired from NASA on Friday after blazing a trail for countless female astronauts.
NASA astronaut Peggy Whitson, the 58-year-old from Iowa farm country who spent a record-breaking 665 days in space, retired from the space agency on Friday.
I have hit my radiation limit, Whitson told Business Insider during a recent interview. So not going into space with NASA anymore.
That realization is both melancholic and exciting for the biochemist, who only half-jokingly admits shes still not sure what shes going to do when I grow up.
Black holes are notoriously messy eaters.
Using more than ten years of data, astronomers discovered traces of an unlucky star that got too close to a black hole. Because this event was partly hidden from us by dust, this discovery shows how we might find other cases of star-eating black holes.
Probiotics can do more than improve your gut health. They also may indirectly enhance your brain, too.
Research shows that the gut and brain are connected, a partnership called the gut-brain axis. The two are linked through biochemical signaling between the nervous system in the digestive tract, called the enteric nervous system, and the central nervous system, which includes the brain. The primary information connection between the brain and gut is the vagus nerve, the longest nerve in the body.
The gut has been called a second brain because it produces many of the same neurotransmitters as the brain does, like serotonin, dopamine, and gamma-aminobutyric acid, all of which play a key role in regulating mood. In fact, it is estimated that 90% of serotonin is made in the digestive tract.
Former president Bill Clinton has contributed to a cyberthriller
"The President is Missing", the plot of which is that the president
stops a cybervirus from destroying the country. This is scary,
because people in Washington D.C. are going to read this book,
believe the hacking portrayed has some basis in reality, and base
policy on it.
This "news analysis" piece in the New York Times is a good
example, coming up with policy recommendations based on fictional
cliches rather than a reality of what hackers do.
The cybervirus in the book is some all powerful thing, able to infect everything everywhere without being detected. This is fantasy no more real than magic and faeries. Sure, magical faeries is a popular basis for fiction, but in this case, it's lazy fantasy, a cliche. In fiction, viruses are rarely portrayed as anything other than all powerful.
But in the real world, viruses have important limitations. If you knew anything about computer viruses, rather than being impressed by what they can do, you'd be disappointed by what they can't.
Go look at your home router. See the blinky lights. The light flashes every time a packet of data goes across the network. Packets can't be sent without a light blinking. Likewise, viruses cannot spread themselves over a network, or communicate with each other, without somebody noticing -- especially a virus that's supposedly infected a billion devices as in the book.
The same is true of data on the disk. All the data is accounted for. It's rather easy for professionals to see when data (consisting of the virus) has been added. The difficulty of anti-virus software is not in detecting when something new has been added to a system, but automatically determining whether it's benign or malicious. When viruses are able to evade anti-virus detection, it's because they've been classified as non-hostile, not because they are invisible.
Such evasion only works when hackers have a focused target. As soon as a virus spreads too far, anti-virus companies will get a sample, classify as malicious, and spread the "signatures" out to the world. That's what happened with Stuxnet, a focused attack on Iran's nuclear enrichment program that eventually spread too far and got detected. It's implausible that anything can spread to a billion systems without anti-virus companies getting a sample and correctly classifying it.
In the book, the president creates a team of the 30 brightest cybersecurity minds the country has, from government, the private sector, and even convicted hackers on parole from jail -- each more brilliant than the last. This is yet another lazy cliche about genius hackers.
The cliche comes from the fact that it's rather e...
The US Drug Enforcement Administration's decision to restrict prescription drugs containing hydrocodone (a popular opioid painkiller) was associated with a 'significant' increase in illicit trading of opioids through online markets, finds a study published by The BMJ today.
In this study, the term opioids refers to drugs that are usually available by prescription but here are sourced illegally through the dark net and are not prescribed by anyone.
The findings show that the proportion of sales of opioids through illicit markets doubled over the study period and sales of more potent opioids also increased. Overdose death rates have quadrupled in the US since 1999, and 40% of all deaths involve prescription opioids, which are primarily used for pain relief.
Read more of this story at SoylentNews.
Heres a full chapter out exploring my novel The Transhumanist Wager as part of a new book out called Ayn Rand and the Posthuman: http://link-springer-com-443.webvpn.jxutcm.edu.cn//9783-3 #transhumanism
In his novel The Transhumanist Wager, Zoltan Istvan recreates certain elements of Ayn Rands work, in order to advance an argument for transhumanism. Istvan sees the transhuman
Wait, was that 423 or 424? When youre stuck winding a transformer or coil that has more than a few hundred turns, youre going to want to spend some time on a winding jig. This video, embedded below, displays a simple but sufficient machine with a few twists.
The first elaboration is the addition of a shuttle that moves back and forth in sync with the main spindle to lay the windings down nice and smooth. Here, its tremendously simple a piece of threaded rod and a set of interchangeable wheels that are driven by a big o-ring belt. We love the low-tech solution of simply adding a twist into the belt to swap directions. We would have way overthought the mechanism.
But then the hack is the digital counter made out of an old calculator. Weve seen this before, of course, but heres a great real-world application.
Thanks [Jnis] for the tip!
As another step towards the long-awaited Xfce 4.14 desktop environment release, Xfdesktop 4.13.2 is now available as the latest development release for this important piece of the Xfce desktop stack...
Submitted via IRC for BoyceMagooglyMonkey
The music industry sees stream ripping as one of the largest piracy threats, worse than torrent sites or direct download portals.
The RIAA, IFPI, and BPI showed that they're serious about the issue when they filed legal action against YouTube-MP3, the largest stream ripping site at the time.
This case eventually resulted in a settlement where the site, once good for over a million daily visitors, agreed to shut down voluntarily last year.
YouTube-MP3's demise was a clear victory for the music groups, which swiftly identified their next targets, putting them under pressure, both in public and behind the scenes.
This week this appears to have taken its toll on several 'stream ripping' sites, which allowed users to download videos from YouTube and other platforms, with the option to convert files to MP3s.
Read more of this story at SoylentNews.
Submitted via IRC for SoyCow8093
The rate at which deepfake videos are advancing is both impressive and deeply unsettling. But researchers have described a new method for detecting a "telltale sign" of these manipulated videos, which map one person's face onto the body of another. It's a flaw even the average person would notice: a lack of blinking.
Researchers from the University at Albany, SUNY's computer science department recently published a paper titled "In Ictu Oculi: Exposing AI Generated Fake Face Videos by Detecting Eye Blinking." The paper details how they combined two neural networks to more effectively expose synthesized face videos, which often overlook "spontaneous and involuntary physiological activities such as breathing, pulse and eye movement."
Read more of this story at SoylentNews.
The first 4.18 prepatch is out, and the merge window has closed for this development cycle. "You may think it's still Saturday for me, and that I should give you one more day of merge window to send in some last-minute pull requests, but I know better. I'm in Japan, and it's Sunday here."
While 3D printing has been a great thing all by itself, it has also made electromechanical hardware a commodity item. Instead of raiding an old printer for motors and rods of unknown provenance, you can now buy everything very inexpensively due to the economy of scale and offshore manufacturing.
[Mr. Innovation] proves this point with his recent paper cutting machine which feeds and slices paper strips with user-selected width and quantity. He did steal one roller assembly from an old printer, but most of it is straight out of a 3D printer build. Theres NEMA stepper motors, modular motor driver boards, smooth rods, belts, and pulleys.
The blade of the cutter is just a standard snap off box cutter blade. It is angled so it doesnt drag when the motor pulls it back to the home position after a cut. Honestly, we might have made the paper mechanism retract the paper a bit at that point, but that would be simple to add to the devices firmware.
You might think an automated paper cutter is a bit lazy, but we could see if you were cutting up flyers for a hackerspace event, or cutting paper insulators to fit in an enclosure for a kit you were selling in small quantities.
The biggest issue we saw was that the machine is open loop. It would have been interesting to put an optical sensor between the roller and the blade. When the paper covered the sensor youd know the position of the edge and could then move the paper a precise amount, assuming it didnt slip. Another idea would be to put the sensor after the blade in such a way that it could be moved so that the cut would happen once the paper covered the sensor. You could probably do the same thing with a microswitch or some other sensor.
Still, this looks like a simple but useful project for some leftover 3D printer parts. Just be careful with the open blade.
Robots arent playing professional soccer just yet, but they can certainly help predict it! With the FIFA World Cup kicking off, San Francisco-based tech firm Unanimous A.I. has used its considerable artificial intelligence expertise to predict the outcome of the 32-team mens soccer tournament. Given that the startup has previously predicted the Super Bowl results successfully right down to the exact final score, we totally think this is worth taking seriously.
These predictions were generated using swarm A.I. technology, Louis Rosenberg, founder and CEO of Unanimous A.I., told Digital Trends. This means it uses a unique combination of human insights and artificial intelligence algorithms, resulting in a system that is smarter than the humans or the machines could be on their own. It works by connecting a group of people over the internet using A.I. algorithms, enabling them to think together as a system, and converge upon predictions that are the optimized combination of their individual knowledge, wisdom, instincts, and intuitions.
The technology is modeled on the remarkable abilities of swarms in nature, such as swarms of bees, schools of fish, or flocks of birds. These natural swarms combine the insights of large groups in optimized ways. Unanimous swarms utilize this same principle to answer complex questions such as giving precise probability-based outcomes on each game in the World Cup.
Theresa May says she is "disappointed" an attempt to make upskirting a criminal offence in England and Wales did not progress through Parliament after one of her own MPs blocked it. Conservatives have criticised Sir Christopher Chope for objecting to the private member's bill.
If passed, it could see someone who has secretly taken a photo under a victim's skirt face up to two years in prison. The PM said she wanted to see it pass soon "with government support". Minister for Women, Victoria Atkins, said the government will allocate time for the bill in Parliament to ensure it does not get pushed down the list of private members' bills, which would mean it could some time to return to the Commons.
[...] Sir Christopher has yet to speak out about why he blocked the bill but upskirting victim Gina Martin - who started the campaign for the new law - said he had told her he objected to it "on principle" because it "wasn't debated". She also told the BBC that he said he "wasn't really sure" what upskirting was. "I said, 'well, I can help you with that'," Ms Martin added.
The bill was expected to sail through the Commons on Friday, but parliamentary rules mean it only required one MP to shout "object" to block its progress. Sir Christopher's intervention was met with shouts of "shame" from other MPs.
Read more of this story at SoylentNews.
Scientists have determined the minimum amount of crew members needed for a 6,300-year journey to Proxima b.
A team of French scientists have recently published a new study detailing everything that would be needed if humans were to one day make the long interstellar journey to Proxima Centauri to start a new life and civilization. The research went to great lengths to determine the correct amount of people that would ensure a successful voyage to Proxima b.
The study was conducted by particle physicist Dr. Camille Beluffi and Dr. Frederic Marin from the Astronomical Observatory of Strasbourg and marks the second study conducted on such an interstellar journey to Proxima b, as ScienceAlert reported.
With the early release of Linux 4.18-rc1, feature development on Linux 4.18 is over and it's onto roughly eight weeks worth of testing and bug fixes. For those that are behind in their Phoronix reading with our extensive and original reporting on the Linux 4.18 merge window happenings, here is our recap of the big changes that made it into Linux 4.18. We are also in the process of firing off the start of our Linux 4.18 kernel benchmarks.
Frogs trapped in amber for 99 million years are giving a glimpse of a lost world. The tiny creatures have been preserved in sticky tree resin since the end of the Age of the Dinosaurs.
The four fossils give a window into a world when frogs and toads were evolving in the rainforests. Amber from Myanmar, containing skin, scales, fur, feathers or even whole creatures, is regarded as a treasure trove by palaeontologists.
Dr Lida Xing of China University of Geosciences in Beijing said it was a "miracle" find. "In China, frogs, lizards and scorpions are called three treasures of amber," he told BBC News. "These amber fossils provide direct evidence that frogs inhabited wet tropical forests before the mass extinction event at the end of the Cretaceous."
The fossil record of the earliest amphibians is sparse, which makes the discovery particularly valuable for science.
The earliest direct evidence of frogs in wet tropical forests from Cretaceous Burmese amber (open, DOI: 10.1038/s41598-018-26848-w) (DX)
Read more of this story at SoylentNews.
Sent out earlier this week were the AppArmor feature updates for the Linux 4.18 kernel merge window...
The WS2812 addressable LED is a marvellous component. Any colour light you want, all under the control of your favourite microcontroller, and daisy-chainable to your hearts content. Unsurprisingly they have become extremely popular, and can be found in a significant number of the project s you might read about in these pages.
A host of products have appeared containing WS2812s, among which Adafruits Neopixel rings are one of the more memorable. But they arent quite as cheap as [Hyperlon] would like, so the ever-resourceful hacker has created an alternative for the constructor of more limited means. It takes the form of a circular PCB that apes the Adafruit original, and it claims to deliver a Bill of Materials cost that is 85% cheaper.
In reality the Instructables tutorial linked above is as much about how to create a PCB and surface-mount solder as it is specific to the pixel ring, and many readers will already be familiar with those procedures. But we wont rest until everyone out there has tried their hands at spinning their own PCB project, and this certainly proves that such an endeavour is not out of reach. Whether or not you pay for the convenience of the original or follow this lead is your own choice.
The real thing has been in so many projects its difficult to pick just one to link to. This Christmas tree is rather nice.
A new analysis of data collected by NASA's Dawn orbiter suggests that organic molecules may exist in surprisingly high concentrations on the surface of Ceres. The study [DOI: 10.1029/2018GL077913] [DX] appears in the journal Geophysical Research Letters.
[...] To get an initial idea of how abundant those compounds might be, researchers compared the [Visible and Infrared Spectrometer] data from Ceres with lab reflectance spectra of organic material formed on Earth. Based on that standard, they concluded that 6-10% of the spectral signature they detected on Ceres could be explained by organic matter.
But for this the new study, Southwest Research Institute researcher Hannah Kaplan and co-authors wanted to re-examine those data using a different standard. Instead of relying on Earth rocks to interpret the data, they turned to an extraterrestrial source: meteorites. Some meteorites have been shown to contain organic material that's slightly different from what's commonly found on our own planet. And the new analysis shows that the spectral reflectance of the extraterrestrial organics is distinct from that of terrestrial counterparts. [...] "We estimate that as much as 40-50% of the spectral signal we see on Ceres is explained by organics. That's a huge difference compared to the 6-10% previously reported based on terrestrial organic compounds."
[...] There are two competing possibilities for where Ceres' organics may have come from. They could have been produced internally on Ceres and then exposed on the surface, or they could have been delivered to the surface by an impact from an organic-rich comet or asteroid.
Previously: Organic Molecules Found on Ceres
Somehow, walking robots at our level never really seem to deliver on the promise that should be delivered by all those legs. Articulation using hobby servos is simple enough to achieve, but cumbersome, slow, and not very powerful. [Paul Gould] has a plan to make a better, 3D-printed articulated robot actuator.
His solution is both novel and elegant, a fairly conventional arm geometry that has at its joints a set of brushless motors similar to but a little larger than the kind you might be more familiar with on multirotors, paired with 3D-printed cycloidal gearboxes. Magnetic encoders provide the necessary positional feedback, and the result is a unit that is both compact and powerful.
With such a range of small brushless motor controllers on the market, its at first sight unexpected that hes designed his own controller board. But this gives him complete control over his software, plus the CAN bus that ties everything together. Hes given us a video which weve placed below the break, showing the build process, the impressive capabilities of his system, and a selection of builds including a robot dog complete with tail. This is definitely a project to watch.
The Chandra X-Ray Observatory is a NASA telescope that looks at black holes, quasars, supernovas, and the like all sources of high energy in the universe. It shows a side of the cosmos that is invisible to the human eye.
After more than a decade in service, the observatory has helped scientists glimpse the universe in action. It has watched galaxies collide, observed a black hole with cosmic hurricane winds, and glimpsed a supernova turning itself inside out after an explosion.
The telescope billed as one of NASAs Great Observatories along with the Hubble Space Telescope, Spitzer Space Telescope and the Compton Gamma Ray Observatory has been a public relations tool for the agency, as well. Its pictures are frequently used by NASA in press releases.
deepin is a Debian-based Linux distribution which strives to provide an attractive and user-friendly experience via the Deepin Desktop Environment (DDE). The project's latest release, deepin 15.6, features a new welcome window and a quick settings navigation bar. There is also a new launcher window, designed to use....
The newest weekly release candidate of the upcoming FreeBSD 11.2 is now available for testing...
Submitted via IRC for BoyceMagooglyMonkey
Replacing potatoes or rice with pulses can lower your blood glucose levels by more than 20 per cent, according to a first-ever University of Guelph study.
Prof. Alison Duncan, Department of Human Health and Nutritional Sciences, and Dan Ramdath of Agriculture and Agri-Food Canada, found that swapping out half of a portion of these starchy side dishes for lentils can significantly improve your body's response to the carbohydrates.
Replacing half a serving of rice with lentils caused blood glucose to drop by up to 20 per cent. Replacing potatoes with lentils led to a 35-per-cent drop.
"Pulses are extremely nutrient-dense food that have the potential to reduce chronic diseases associated with mismanaged glucose levels," said Duncan, who worked on the study with PhD student Dita Moravek and M.Sc. students Erica Rogers, Sarah Turkstra and Jessica Wilson.
Dita Moravek, Alison M Duncan, Laura B VanderSluis, Sarah J Turkstra, Erica J Rogers, Jessica M Wilson, Aileen Hawke, D Dan Ramdath. Carbohydrate Replacement of Rice or Potato with Lentils Reduces the Postprandial Glycemic Response in Healthy Adults in an Acute, Randomized, Crossover Trial. The Journal of Nutrition, 2018; 148 (4): 535 DOI: 10.1093/jn/nxy018
Read more of this story at SoylentNews.
Via: WGN: The strangeness of the largest migrant childrens center in the United States, near the border with Mexico, shows up in the details. Here, there are 1,469 boys, ages 10 to 17, housed inside the 250,000-square-foot shell of a former Walmart superstore. None of the 313 bedrooms have doors. Or ceilings, so that children 
Assisted by police in France and the Netherlands, the FBI took down the pirate Android stores Appbucket, Applanet, and SnappzMarket during the summer of 2012.
During the years that followed several people connected to the Android app sites were arrested and indicted, resulting in prison sentences for some.
SnappzMarkets Scott Walton was handed a 46-month prison sentence for conspiracy to commit copyright infringement, and his colleague Joshua Taylor was sentenced to a 16-month term.
While some defendants pleaded guilty in order to get a reduced sentence, not all did. David Lee, a California man linked to Applanet, decided to fight the case instead, and not without success.
The US Government had charged Lee with aiding and abetting criminal copyright infringement (pdf). In addition, he was charged with conspiring to infringe copyrights and violating the DMCAs anti-circumvention provision.
As the case progressed, it became clear that the U.S. Governments evidence wasnt as strong as initially thought. Before the trial even started, the prosecution voluntarily dropped the criminal copyright infringement charge.
What remained was the conspiracy charge, but after hearing evidence and testimony from both sides of the case, the jury was unable to issue a unanimous decision. As a result, the case ended in a mistrial two years ago.
The Department of Justice did not let the case go though. Soon after the mistrial, it informed the court that it would re-try Lee. This second trial was delayed a few times but never took place.
Instead, the US Government asked the court to dismiss the indictment against the alleged pirate app store operator, without providing any context. This request was granted earlier this week, which means that Lee is relieved of all charges.
It is not clear what moved the US to dismiss the case. TorrentFreak contacted both Lees lawyers and the US Department of Justice for comment, but at the time of publication, we have yet to hear back.
However, with the indictment dismissed, Lee can close this chapter of his life after nearly six years.
Horizontal gene transfer is an important way that antibiotic resistance moves between bacterial species, but the process has never been observed before, since the structures involved are so incredibly small, said biologist Ankur Dalia of Indiana University Bloomington.
Bacteria are slippery little suckers. They evolve rapidly, developing resistance to antibiotics and therefore becoming increasingly difficult to deal with. Now, for the first time, researchers have caught on film one of the mechanisms the microbes use for this speedy evolution.
Two Vibrio cholerae bacteria the pathogen responsible for cholera sit under a microscope, glowing a vivid green. As we watch, a tendril snakes forth from one of the bacterium, harpooning a piece of DNA and carrying it back to its body.
That appendage is called a pili, and the process whereby the bacteria incorporates the new genetic material from a different organism into its own DNA to expedite its evolution is called horizontal gene transfer.
[Peter] is at it again. Not content with being one of the best RC confabulators on YouTube, and certainly not content with the first airplane he built in his basement, [Peter Sripol] is building another airplane in his basement.
The first airplane he built was documented on YouTube over a month and a half. It was an all-electric biplane, built from insulation foam covered in fiberglass, and powered by a pair of ludicrously oversized motors usually meant for large-scale RC aircraft. This was built under Part 103 regulations an ultralight which means there were in effect no regulations. Anyone could climb inside one of these without a license and fly it. The plane flew, but there were a few problems. It was too fast, and the battery life wasnt really what [Peter] wanted.
Now [Peter] is onto his next adventure. Compared to the previous plane, this has a more simplified,...
Pebble's online services will officially die at the end of this month, but some could live on through Rebble, an unofficial group of Pebble users who are trying to keep their watches alive.
Rebble initially popped up after Pebble said in 2016 that it would cease operations and be acquired by Fitbit. Now that Fitbit is weeks away from shutting down Pebble's remaining services, Rebble is promoting an unofficial replacement system that's meant to keep the majority of Pebble's internet-connected functions alive. Former Pebble employee Katharine Berry is spearheading the effort, and it's received an endorsement from Pebble founder Eric Migicovsky.
Also at Engadget.
Previously: Pebble Dead, Assets Sold to Fitbit
Read more of this story at SoylentNews.
In March this year I spoke about the Amateur VLBI with LilacSat-2 experiment. This experiment consisted of a GPS-synchronized recording of LilacSat-2 at groundstations in Harbin and Chongqing, China, which are 2500km apart. The experiment was a preparation for the Amateur VLBI project with the DSLWP lunar orbiting satellites, and I contributed with some signal processing techniques for VLBI.
As you may know, the DSLWP-B satellite is now orbiting the Moon since May 25 and the first Amateur VLBI session was performed last Sunday. The groundstations at Shahe in Beijing, China, and Dwingeloo in the Netherlands performed a GPS-synchronized recording of the 70cm signals from DSLWP-B from 04:20 to 5:40 UTC on 2018-06-10. I have adapted my VLBI correlation algorithms and processed these recordings. Here are my first results.
The baseline for these VLBI recordings (i.e., the distance between the groundstations) is roughly 7250km. The signals transmitted by DSLWP-B are 250bps GMSK using an \(r=1/2\) turbo code. Two transmit frequencies are used: 435.4MHz and 436.4MHz. Each transmit frequency uses a different antenna. The antenna marked below as UV Antenna A is used for 435.4MHz, while the UV Antenna B is used for 436.4MHz.DSLWP diagram
The transmissions are done in packets. A packet lasts about 15 seconds and is transmitted roughly every 5 minutes. Packets are transmitted simultaneously in both frequencies, but the data transmitted in each of the frequencies is different.
The format of the recordings is as follows. Each recording is 20
seconds long (or 19 seconds in some cases) and contains a single
packet. It is formed by two files, one for 435.4MHz and the other
for 436.4MHz. Each of these files is an IQ file at 40ksps centred
at 435.4MHz or 436.4MHz. The format of the files is the GNURadio
metadata format. The file metadata can be read with
gr_read_file_metadata and contains the UTC timestamps
for the IQ stream. These timest...
This video is the ninth in a multi-part series discussing computing and the second discussing non-classical computing. In this video, well be discussing what quantum computing is, how it works and the impact it will have on the field of computing.
[0:286:14] Starting off well discuss, what quantum computing is, more specifically the basics of quantum mechanics and how quantum algorithms will run on quantum computers.
[6:149:42] Following that well look at, the impact quantum computing will bring over classical computers in terms of the P vs NP problem and optimization problems and how this is correlated with AI.
[9:4214:00] To conclude well discuss, current quantum computing initiatives to reach quantum supremacy and ways you can access the power of quantum computers now!
Today, we want to draw your attention to an open-access review that focuses on the role of senescent cells in sarcopenia, the age-related loss of muscle mass and strength that leads to frailty.
Arthur T Knackerbracket has found the following story:
Storm-driven ocean swells have triggered the catastrophic disintegration of Antarctic ice shelves in recent decades, according to new research published in Nature today.
Lead author Dr Rob Massom, of the Australian Antarctic Division and the Antarctic Climate and Ecosystems Cooperative Research Centre, said that reduced sea ice coverage since the late 1980s led to increased exposure of ice shelves on the Antarctic Peninsula to ocean swells, causing them to flex and break. "Sea ice acts as a protective buffer to ice shelves, by dampening destructive ocean swells before they reach the ice shelf edge," Dr Massom said. "But where there is loss of sea ice, storm-generated ocean swells can easily reach the exposed ice shelf, causing the first few kilometres of its outer margin to flex."
"Over time, this flexing enlarges pre-existing fractures until long thin 'sliver' icebergs break away or 'calve' from the shelf front. This is like the 'straw that broke the camel's back', triggering the runaway collapse of large areas of ice shelves weakened by pre-existing fracturing and decades of surface flooding."
Study co-author Dr Luke Bennetts, from the University of Adelaide's School of Mathematical Sciences, said the finding highlights the need for sea ice and ocean waves to be included in ice sheet modelling. This will allow scientists to more accurately forecast the fate of the remaining ice shelves and better predict the contribution of Antarctica's ice sheet to sea level rise, as climate changes. "The contribution of the Antarctic Ice Sheet is currently the greatest source of uncertainty in projections of global mean sea level rise," Dr Bennetts said.
-- submitted from IRC
Read more of this story at SoylentNews.
Anyone who has ever wound a coil by hand has probably idly wondered How do they do this with a machine? at some point in the tedious process. Thats about when your attention wanders and the wire does what physics wants it to do, with the rats nest and cursing as a predictable result.
Theres got to be a better way, and [Russ Gries] is on his way to finding it with this proof-of-concept CNC flat coil winder. The video below is a brief overview of what came out of an intensive rapid prototyping session. [Russ] originally thought that moving the coil would be the way to go, but a friend put him onto the idea of using his delta-style 3D-printer to dispense the wire. An attachment somewhat like a drag knife was built, but with a wire feed tube and a metal roller to press the wire down onto an adhesive surface. The wire feed assembly went through a few design iterations before he discovered that a silicone cover was needed for the roller for the wire to properly track, and that the wire spool needed to be fed with as little friction as possible. Fusion 360s CAM features were used to design the tool paths that describe the coils. It seems quite effective, and watching it lay down neat lines of magnet wire is pretty mesmerizing.
Weve seen a couple of cylindrical coil winding rigs before, but it looks like this is the first flat coil winder weve featured. We cant help but wonder about the applications. Wireless power transfer comes to mind, as do antennas and coils for RF applications. We also wonder if there are ways to use this to make printed circuit boards.
Thanks to [smerrett79] for the tip.
With the recent stable debut of the Linux 4.17 kernel, one of the most common performance test requests coming in has been for checking out the Radeon WattMan-like support that was introduced with the Linux 4.17 AMDGPU code for recent generations of Radeon graphics card. Here are some benchmarks of that and on a somewhat related note also some Linux gaming benchmark results when carrying out some power capping tests to restrict the graphics card to a given Wattage...
David Eagleman, the science adviser for HBOs TV series Westworld, shares his thoughts on the future of AI and whether robots will ever become conscious.
Another success of the Europol made the headlines, the European police announced that several French nationals were arrested in the past year on suspicion of being involved with notorious hacker group known as Rex Mundi (King of the World).
The Rex Mundi crime group has been active since at least 2012. it hacked into the systems of several organizations worldwide and attempted to blackmail them.
The list of the victims is long and includes AmeriCash Advance, Webassur, Drake International, Buy Way, Hoststar, Websolutions.it, Numericable, Habeas, AlfaNet, Dominos Pizza, and the Swiss bank Banque Cantonale de Geneve (BCGE).
The hackers used to steal sensitive information from the victims, then they demanded fees for not disclosing the stolen data.
The operation coordinated by the Europol was launched in May 2017 after the group targeted a UK-based company. Crooks stole significant amounts of customer data from the company, then attempted to blackmail it by demanding the payment of a bitcoin ransom of nearly 580,000 ($670,000) for not disclosing the incident. The group also requested more than 825,000 ($776,000) for details on the hack.
The hackers also asked the victim additional 210,000 ($240,000) for each day the payment was delayed.
A 25-year-old coder was arrested on 18 May by the Royal Thai Police based on a French international arrest warrant. The arrest of this young cybercriminal was the eight in an international operation supported by Europol and the Joint Cybercrime Action Taskforce (J-CAT) that started exactly one year ago. reads the announcement published by the Europol.
In May 2017 a British-based company was the victim of a cyber-attack during which a large amount of customer data was compromised. The a...
Quantum computers, once they become common, will complete difficult tasks thousands of times more quickly than current PCs. That could obviously threaten a classic chipmaker like Intel, but it plans to use its knowledge of silicon production to build quantum chips more quickly than its peers.
A few months ago, during my keynote at Black Hat Europe, I was discussing how we should be limiting the amount of trust when building computer systems. Recently, a new technology from Intel has been gaining popularity among both developers and researchers, a technology which promises a big step towards such trust-minimizing systems. I'm talking about Intel SGX, of course.
Intel SGX caught my attention for the first time about 5 years ago, a little while before Intel has officially added information about it to the official Software Developer's Manual. I've written two posts about my thoughts on this (then-upcoming) technology, which were a superposition of both positive and negative feelings.
Over the last 2 years or so, together with my team at ITL, we've been investigating this fascinating technology a bit closer. Today I'd like to share some introductory information on this interesting project we've been working on together with our friends at Golem for several months now.
Read more of this story at SoylentNews.
There has been a lot of back and forth around the use of Free Software in public administration. One of the latest initiatives in this area was started by the Free Software Foundation Europe, FSFE. It focuses on the slogan: Public Money Public Code. There are various usage scenarios for Free Software in public administration. The span ranges from the use of backend technology over user-facing software, e.g. LibreOffice, up to providing a whole free desktop for the administrative staff in a public service entity such as a city council. In this article we will focus on the latter.
When the desktops in an administration are migrated to Linux, the administration becomes a distribution provider. An example for this is the LiMux desktop, that powers the administration of the city of Munich since 2012.
LiMux is a distribution, maintained by the central IT department of the City of Munich. Technically, it builds upon Kubuntu. It provides specific patches, a modified user experience and an automatic distribution system, so all desktops in all departments of the city can be easily administered and offer a consistent user experience.
Distributions in the Free Software ecosystem have different roles, one of them surely being the provider of the finishing touches, especially to important software for its own users. Obviously public administration has spec...
Manual transmissions! Those blessed things that car enthusiasts swear by and everyone else pretends no longer exists. Theyre usually shifted by using the gearstick, mounted in the centre console of the car. Swapping out the knob on the gearstick is a popular customization; you can have everything from 8-balls to skulls, to redback spiders mounted in epoxy, sitting proud atop your gearstick. Its rare to see anything new under the sun, but [John Allwine] came up with something wed never seen before.
[John]s design leans heavily on the unique ability of additive manufacturing to produce complex hollow geometries that are incredibly difficult or impossible to produce with traditional subtractive methods. The part was designed in CAD software, and originally printed on a Makerbot in plastic. After this broke, it was decided to instead produce the part in stainless steel using Shapeways custom order process. You can even buy one yourself. This is a much smarter choice for a part such as a gearknob which undergoes heavy use in an automotive application. The part is printed with threads, but due to the imperfect printing process, these should be chased with a proper tap to ensure good fitment.
The design was eyecatching enough to grab the attention of a professional engineer from a 3D printing company, who worked with [John] to make the part out of titanium. Its a very tough and hardy material, though [John] notes it was an arduous task to go about tapping the threads because of this.
Its a great example of what can now be achieved with 3D printing technology. No longer must we settle for plastic through services like Shapeways, its now possible to 3D print attractive metal parts in complex designs! And, if youve got the right friends, you can even step it up to titanium, too.
Posted by Marcus Brinkmann on Jun 16Hi,
The Fedora Engineering and Steering Committee (FESCo) approved on Friday more of the proposed features for this fall's release of Fedora 29, including two of the more controversial proposals...
Via: The Local: Swedens 22,000 volunteer soldiers were on Tuesday evening grabbing their guns and uniform, cancelling social engagements, and rushing to their stations, as the Swedish Armed Forces launched its biggest surprise exercise since 1975. The idea behind this exercise is that we are now strengthening our military defence of the country, Swedens Supreme 
The Syscoin clients allow users to mine Syscoin cryptocurrency or manage Syscoin funds.
The other versions in the v188.8.131.52 release were not replaced, this means that Mac and Linux clients were not replaced by the hackers.
The Syscoin developers found that a malicious, unsigned copy of the Windows Syscoin 184.108.40.206 installer was made available via the Syscoin Github release page on June 9th, 2018 due to a compromised GitHub account. This installer contained malicious code. (Trojan:Win32/Feury.B!cl) reads the security notice published by the development team.
The virustotal scan of the malicious file named re.exe that is saved to the local temp folder (C:\Users\user\AppData\Local\Temp) upon running the fake installer: https://www.virustotal.com/#/file/b105d2db66865200d1b235c931026bf44428eb7327393bf76fdd4e96f1c622a1/detection
The Syscoin team discovered the security breach after receiving a warning from users that Windows Defender SmartScreen, AVG and Kaspersky was marking downloads of the Syscoin Windows client as a virus.
The affected executabl...
Oracle Solaris 11.4 is still being prepared for release but in the meantime there is now the thirty-third stable release update for Solaris 11.3...
Yet even the U.S. is disturbingly vulnerableand in some respects is becoming quickly more so. It depends on a just-in-time medical economy, in which stockpiles are limited and even key items are made to order. Most of the intravenous bags used in the country are manufactured in Puerto Rico, so when Hurricane Maria devastated the island last September, the bags fell in short supply. Some hospitals were forced to inject saline with syringesand so syringe supplies started running low too. The most common lifesaving drugs all depend on long supply chains that include India and Chinachains that would likely break in a severe pandemic. Each year, the system gets leaner and leaner, says Michael Osterholm, the director of the Center for Infectious Disease Research and Policy at the University of Minnesota. It doesnt take much of a hiccup anymore to challenge it.
The epidemics of the early 21st century revealed a world unprepared, even as the risks continue to multiply. Much worse is coming.
Image above: Workers at the University of Nebraska Medical Centers biocontainment unit practicing safe procedure on a mannequin.
Two soylentils have submitted stories about improvements in lithium battery storage capacity. The first focuses on the cathode while the second features improvements in the anode.
Submitted via IRC for BoyceMagooglyMonkey
A collaboration led by scientists at the University of Maryland (UMD), the U.S. Department of Energy's (DOE) Brookhaven National Laboratory, and the U.S. Army Research Lab have developed and studied a new cathode material that could triple the energy density of lithium-ion battery electrodes. Their research was published on June 13 in Nature Communications.
"Lithium-ion batteries consist of an anode and a cathode," said Xiulin Fan, a scientist at UMD and one of the lead authors of the paper. "Compared to the large capacity of the commercial graphite anodes used in lithium-ion batteries, the capacity of the cathodes is far more limited. Cathode materials are always the bottleneck for further improving the energy density of lithium-ion batteries."
Scientists at UMD synthesized a new cathode material, a modified and engineered form of iron trifluoride (FeF3), which is composed of cost-effective and environmentally benign elementsiron and fluorine. Researchers have been interested in using chemical compounds like FeF3 in lithium-ion batteries because they offer inherently higher capacities than traditional cathode materials.
Read more of this story at SoylentNews.
KANSAS CITY, MO Researchers at the Stowers Institute for Medical Research have captured the one cell that is capable of regenerating an entire organism. For over a century, scientists have witnessed the effects of this cellular marvel, which enables creatures such as the planarian flatworm to perform death-defying feats like regrowing a severed head. But until recently, they lacked the tools necessary to target and track this cell, so they could watch it in action and discover its secrets.
Now, by pioneering a technique that combines genomics, single-cell analysis, flow cytometry and imaging, scientists have isolated this amazing regenerative cell a subtype of the long-studied adult pluripotent stem cell before it performs its remarkable act. The findings, published in the June 14, 2018, issue of the journal Cell, will likely propel biological studies on highly regenerative organisms like planarians and also inform regenerative medicine efforts for other organisms like humans that have less regenerative capacity.
This is the first time that an adult pluripotent stem cell has been isolated prospectively, says Alejandro Snchez Alvarado, Ph.D., an investigator at the Stowers Institute and Howard Hughes Medical Institute and senior author of the study. Our finding essentially says that this is no longer an abstraction, that there truly is a cellular entity that can restore regenerative capacities to animals that have lost it and that such entity can now be purified alive and studied in detail.
Researchers at F5 Labs have observed a spike in the number of cyber-attacks targeting Singapore from June 11 to June 12, in the wake of the meeting between U.S. President Donald Trump and North Korean President Kim Jong-un in a Singapore hotel.
Experts remarked that typically Singapore is not a top attack destination, and the skipe of the number of attacks coincides with Trump-Kim Jong-un meeting.
Most of the attacks originated from Russia (88% of overall attacks) and frankly speaking, Im not surprised due to the importance of the Trump-Kim summit.
According to F5 Labs and Loryka, 97% of all the attacks that originated from Russian from June 11 to June 12 targeted Singapore.
From June 11 to June 12, 2018, F5 Labs, in concert with our data partner, Loryka, found that cyber-attacks targeting Singapore skyrocketed, 88% of which originated from Russia. Whats more, 97% of all attacks coming from Russia during this time period targeted Singapore. reads the analysis published by F5 Labs. We cannot prove they were nation-state sponsored attacks, however the attacks coincide with the day President Donald Trump met with North Korean President Kim Jong-un in a Singapore hotel.
The cyber attacks hit almost any computer system, from VoIP phones to IoT devices. The attacks began out of Brazil targeting port SIP 5060 of IP phones where communications are transmitted in clear text.
After an initial attack that lasted for a couple of hours, researchers observed a reconnaissance activity originated from the Russian IP address 220.127.116.11 that is owned by ASN 49505, operated by Selectel; the scans targeted a variety of ports.
None of the attacks was carried out to spread malware.
The number two attacked port was Telnet, consistent with IoT device attacks that could be leveraged to gain access to or listen in on targets of interest. continues the analysis.
Other ports attacked include the SQL database port 1433, web traffic ports 81 and 8080, port 7541, which was used by Mirai and Annie to target ISP-managed routers, and port 8291, which was targeted by Hajime to PDoS MikroTik routers.
Singapore was hit by 40,000 attacks in just 21 hours, starting at 11:00 p.m. on June 11 through 8:00 p.m. June 12, local time.
The experts highlighted that only 8% were exploit attacks, while 92% were reconnaissance scans for potential targets.
34% of t...
[Charlie Morris] has been busy building a portable ham radio rig and documenting his progress in a series of videos. You can see the first one below. Theres four parts (more if you count things like part 4 and part 4a as two parts) so far and it is always interesting to see inside a build like this, where the choices and tradeoffs are explained.
The first part covers the Si5351 VFO and the associated display. Theres very little to the VFO other than off-the-shelf modules including an Arduino. You can also see the portable Morse code key which is actually a micro switch. The second part experiments with audio amplifiers. [Charlie] looked at the NE5534 vs discrete amplifiers. He was shooting for lowest current draw that was usable. Other parts discuss the RF amplifier and the receiver. Despite the VFO, there is quite a bit of non-module parts by the time things start shaping up.
Theres a lot of good information about why he selected particular devices and component values. Theres doubtless more videos to come, but theres enough there now to get started. You can not only pick up some design ideas, but looking at the neat prototype construction can give you some thoughts too.
We arent sure what the final project will look like, but we are sure it will be interesting to follow along. [Charlie] has done other homebrew radio design videos and they are always educational.
Two weeks back we shared the news that one of Intel's open-source Linux graphics driver veterans decided to change roles and is now focused on improving FreeBSD for Intel hardware. Ben Widawsky is working on FreeBSD improvements that can at least relate to Intel and it turns out the company has a new team of developers on the task...
Ask just about anybody, and you'll probably hear that a healthy diet is one full of fruits and vegetables, olive oil, nuts and fish what's called Mediterranean diet. A lot of research has suggested people who eat this way tend to be healthier, but it's been harder to prove whether that is because of the diet or some other factor. So in 2013, many took notice of a study in the New England Journal of Medicine that seemed to provide some proof. The study found that people eating the Mediterranean diet supplemented with olive oil were 30 percent less likely to experience a heart attack, stroke, or death from cardiovascular causes than people assigned to a low-fat diet. People who stuck with a Mediterranean diet supplemented with mixed nuts had a 28 percent lower risk than those asked to follow a low-fat diet.
Anesthesiologist Dr. John Carlisle published an analysis of clinical studies in 2012 that led to the retraction of over 160 papers by Dr. Yoshitaka Fujii due to improper randomization of study participants. He began applying his method to thousands of other studies, including 934 in the New England Journal of Medicine. He flagged 11 of them, including the 2013 Mediterranean diet paper. The lead author of the paper confirmed that there were problems with randomization in the study:
It turns out...
As a result, much blame is laid at the feet of companies like Google, who are regularly blamed for not doing more to tackle infringements carried out by individuals and entities outside of their control.
Search results are a particularly sticky subject. Google, Bing, and Yahoo, for example, wish to provide the most comprehensive indexes possible. On the flip side, entertainment industry companies insist that those indexes shouldnt help people find pirated content. If they do, its argued that these companies act as piracy facilitators.
This familiar battle is now underway in Russia, where Yandex is in receipt of a strongly-worded letter which accuses the search giant of being a big part of the piracy problem.
According to local publication Vedomosti, the letter is signed by Leonid Agronov, general director of the National Federation of the Music Industry, Alexei Byrdin, general director of the Internet Video Association, Sergei Selyanov, director of the Association of Film and Television Producers, and Pavel Stepanov, president of the Media Communication Union.
The entertainment giants explain that due to pirate search results appearing in its indexes, Yandex is contributing to the growth of online piracy. They want the company to show responsibility by adopting measures to both find and remove infringing links from search and related products.
We urge Yandex to use all available methods to detect illegal content and eliminate it both from search results and from the applications and services of Yandex, the letter reads.
Its suggested that Yandex should take a similar path to that taken by search companies in the UK, via the signing of a Memorandum of Understanding which declares common interests in fighting piracy.
Yandex wont be alone, however.
A spokesman for the Media and Communications Union, which is one of the groups behind the letter, told Vedomosti that a similar letter would be sent to Google in the near future. Needless to say, Google is no stranger to these kinds of allegations, whether in Europe or the United States.
In the letter, search engines like Yandex are accused of promoting illegal resources over legal content, resulting in revenue being siphoned away from legitimate players and into the hands of criminals. The search engine is a...
With regard to any application that claims to provide privacy: The simple fact is that the platforms on which it runs are compromised from the operating systems down to the silicon. Im not saying to not encrypt. Encryption can prevent your data from falling into the hands of thieves, Google and maybe the local police. 
On May 20, China launched Queqiao, a lunar communications relay satellite for the upcoming Change 4 lander and rover mission. On the way out to the Moon, it dropped off a pair of small satellites bound for lunar orbit called Longjiang-1 and Longjiang-2. The satellites weigh just 45 kilograms each and measure 50-by-50-by-40 centimeters. Their purpose is testing out future radio astronomy and interferometry techniques, and one also has a camera built by Saudi Arabia.
Unfortunately, Longjiang-1 had a problem and didnt make it into lunar orbit. Longjiang-2, however, was successful, and sent home a few pictures! Check them out:
GNOME's Mutter Wayland compositor support is among the few Wayland implementations offering support for EGLStreams so it can play along with the approach used by the NVIDIA proprietary driver as an alternative to the GBM API used by the open-source graphics drivers. One of the NVIDIA engineers has just furthered along Mutter's EGLStreams support...
A surprising use of 3D printing has been in creating life-like models of human body parts using MRI or CT scans. Surgeons and other medical professionals can use models to plan procedures or assist in research. However, there has been a problem. The body is a messy complex thing and there is a lot of data that comes out of a typical scan. Historically, someone had to manually identify structures on each slice a very time-consuming process or set a threshold value and hope for the best. A recent paper by a number of researchers around the globe shows how dithering scans can vastly improve results while also allowing for much faster processing times.
As an example, a traditional workflow to create a 3D printed foot model from scan data took over 30 hours to complete including a great deal of manual intervention. The new method produced a great model in less than an hour.
One thing the researchers note is that the technique should be easy to adopt since it uses all open source software and existing image processing algorithms. There are some limitations, though. There are several things that limit the resolution and can introduce inaccuracies. For example, MRI intensity versus actual tissue appearance is highly variable based on the scanning machines settings and operator.
The researchers also note that advances in scanning technology will make even better 3D printed models possible. Naturally though, these prints arent coming off a $150 hobby-grade printer. The Connex500 printer used costs a cool quarter of a million dollars. It can print up to 14 different materials in the same job and has a reasonably large build volume (500x400x200 mm). That price, however, doesnt include the water station to wash away support material, so budget accordingly.
We couldnt help but wonder if you will one day have a bad part of your body scanned, printed, and then youll get the new part to replace the old. It seems like if you have a model of a body part, it would be just a little math to print a perfect cast, brace, or splint, too. But, then again, we arent doctors.
Photo Credit: Steven Keating and Ahmed Hosny/Wyss Institute at Harvard University
Kim Bayley breaks down UK spending statistics to show that superfans buying old school physical media are providing for 15% of the UK's total retail music market, even when streaming is counted. She asserts that curtailing the availability of these physical storage media will damage not just retailers, but the overall health of the music industry itself. In doing so, she presents a strong economic case for why the music industry should treasure its vinyl and CD superfans.
Naturally it would have a clear financial cost: according to ERA's research those 157,000 vinyl Superfans spent between them 63m on vinyl in 2017, equivalent to more than half a million 525,000 premium music subscriptions.
In other words, lose a town's worth of vinyl buyers the size of Chelmsford and you need a city's worth of premium music subscribers the size of Manchester to make up the loss.
When it comes to CD, the impact is even greater. ERA's researches show that in 2017 an incredible 292,000 Britons spent 400 or more on the format. That's equivalent to buying a CD virtually every week.
Read more of this story at SoylentNews.
Via: The Verge: Today, President Trump announced an aggressive new set of tariffs against China, setting a 25 percent import tax on $50 billion worth of industrially significant technologies imported from China. In previous discussions, China has threatened to retaliate against such tariffs, stoking fears of a far-reaching and unpredictable trade war between the countries. 
Initial RISC-V architecture support was added to the Linux 4.15 kernel and in succeeding kernel releases have been mostly modest updates. With Linux 4.18 the RISC-V changes are on the small side still, but with a few notable additions for this open-source, royalty-free processor ISA...
New gTLDs are becoming less popular, as registrations have fallen precipitously over the last year. Verisign's recently released Q1 2018 Domain Name Industry Brief indicates that new gTLDs represent only 6%, or 20.2 million, of the total of registered TLDs.
The report indicates that active registrations of new gTLDs "decreased by approximately 5.3 million domain name registrations, or 20.7 percent, year over year." Of the top 10 most used new gTLDs, four were listed in Symantec's Top 20 list. Meanwhile, registrations overall increased by 3.2 million, year over year.
[...] Last year, a group of researchers at the Delft University of Technology and SIDN Labs in The Netherlands found (PDF link) that there are "higher concentrations of compromised domains in legacy gTLDs" but that "miscreants frequently choose to maliciously register domain names using one of the new gTLDs." The number of spam domains per 10,000 for new gTLDs was nearly 10 times that of standard gTLDs like .com. However, not all new gTLDs are a problem, as approximately one-third of new gTLDs had zero reported incidents of spam. But, according to the researchers, "Spamhaus blacklisted at least 10% of all 24 registered domains in as many as 15 new gTLDs at the end of 2016."
Read more of this story at SoylentNews.
When you saw the picture for this article, did you think of a peacocks feather? These fibers are not harvested from birds, and in fact, the colors come from transparent rubber. As with peacock feathers, they come from the way light reflects off layers of differing materials, this is known as optical interference, and it is the same effect seen on oil slicks. The benefit to using transparent rubber is that the final product is flexible and when drawn, the interference shifts. In short, they change color when stretched.
Most of the sensors we see and feature are electromechanical, which has the drawback that we cannot read them without some form of interface. Something like a microcontroller, gauge, or a slew of 555 timers. Reading a single strain gauge on a torque wrench is not too tricky, but simultaneously reading a dozen gauges spread across a more complex machine such as a quadcopter will probably require graphing software to generate a heat map. With this innovation it could now be done with an on-board camera in real-time. Couple that with machine learning and perhaps you could launch Skynet. Or build a better copter.
The current proof-of-concept weaves the fibers into next-generation bandages to give an intuitive sense of how tightly a dressing should be applied. For the average first-aid responder, the rule is being able to slide a finger between the fabric and skin. Thats an easy indicator, but it only works after the fact whereas saying that the dressing should be orange while wrapping gives constant feedback.
1 in 3 Adults In The U.S. Take Medications That Can Cause Depression. These drugs already list depression as a possible symptom:
If you take Prilosec or Zantac for acid reflux, a beta blocker for high blood pressure, or Xanax for anxiety, you may be increasing your risk of depression.
More than 200 common medications sold in the U.S. include depression as a potential side effect. Sometimes, the risk stems from taking several drugs at the same time. Now, a new study finds people who take these medicines are, in fact, more likely to be depressed.
The list includes a wide range of commonly taken medications. Among them are certain types of proton pump inhibitors (PPIs) (used to treat acid reflux), beta blockers, anxiety drugs, painkillers including ibuprofen, ACE inhibitors (used to treat high blood pressure), and anti-convulsant drugs.
I often take Zantac or Rantab for acid reflux. I used to take the beta blocker propanolol for the hand tremor caused by the anti-convulsant Depakote.
About 15 percent of participants who simultaneously used three or more of these drugs were depressed. By comparison, among participants who didn't use any of the medications, just 5 percent were depressed. Even those who used just one of these medications were at slightly higher risk of depression: About 7 percent were depressed.
Read more of this story at SoylentNews.
The IT security researchers at Kaspersky Lab have published a
This is a post from HackRead.com Read the original post: Chinese hackers attack National Data Center using watering hole attack
Submitted via IRC for Runaway1956
Facebook has consistently denied allegations that it listens to its users' conversations through their phone's microphone, but a new document suggests the tech giant has not ruled out doing so in the future.
Facebook users have been sharing circumstantial evidence for several years that suggests Facebook snoops on their private conversations in order to deliver more personalised ads. In April, US lawmakers finally brought the concerns to CEO Mark Zuckerberg in a hearing about data misuse on the firm's platform.
The social media firm released a 454-page document this week to follow up with questions posed to Mr Zuckerberg, after he was criticised for evading some of the most important ones.
[Editor's Note: the two response documents are 229 and 225 pages, respectively for a total of 454 pages.]
Read more of this story at SoylentNews.
New Mesa release manager Dylan Baker has issued the second point release of the Mesa 18.1 series...
If you work for a large company, you probably have test equipment that is routinely calibrated. Some companies have their own metrology labs and others send out to an external lab. In a garage lab, you are less likely to do calibrations and in our experience that isnt usually a problem. Still, it is nice to be able to do at least a sanity check on your gear. Also, if you buy old test gear and repair it, it would be nice to be able to check it, as well. [IMSAI guy] built his own little calibration setup, adding to it over the years, and he shares the details in a recent video, which you can see below.
The board started out simply as one voltage regulator and some 0.01% resistors. Over time, though, he added a few more bells and whistles. The setup isnt going to rival a NIST-traceable lab setup, but for your garage it is perfectly fine.
The regulators are really precision voltage reference ICs that are readily available, so they should be better than your old bench supply. However, we didnt think youd really want to slavishly copy this design, but the idea of having a single calibration kit on a board is something you can grow organically out of your junk box and hamfest finds.
Among the additions to the board are a precision oscillator module from an old GPS and a second voltage reference. The initial reference was a 10V device that is specified to have a maximum error at room temperature of +/- 0.05%. He might have wanted to put some diode protection on the device, though, since reverse wiring it destroyed it. On the plus side, it caused him to look to see if any new better devices.
So when he replaced the reference he also added an AD587 as a second 10V reference which is just as accurate and has an ability to trim the output (although he doesnt use that capability).
Of course, if you get obsessed with calibration, you might want to get a rubidium standard in fact, one shows up in the video. There are also a variety of precision resistors weve looked inside of in the past.
Researchers at the Stanford University School of Medicine have found a way to predict whether someone exposed to the flu virus is likely to become ill.
Purvesh Khatri, PhD, associate professor of medicine and of biomedical data science, and his team used a computational approach to pinpoint a blood-based genetic biomarker to determine an individual's susceptibility to the disease.
"We've been after this for about four years," Khatri said. "To our knowledge, it's the first biomarker that shows susceptibility to influenza, across multiple strains."
The biomarker is a gene called KLRD1, and it essentially acts as a proxy for the presence of a special type of immune cell that may be a key to stamping out nascent flu infection. Put simply: the more of this cell type found in a person's blood, the lower their flu susceptibility. The research even hints at new avenues for pursuing a broadly applicable flu vaccine.
A paper describing the work will be published online June 14 in Genome Medicine. Khatri is the senior author. Graduate student Erika Bongen is the lead author.
[...] Khatri said his findings could help health professionals understand who's at the highest risk for flu infection. "If, for example, there's a flu epidemic going on, and Tamiflu supplies are limited, this data could help identify who should be prophylactically treated first," Khatri said.
Khatri emphasizes that for now, the link between KLRD1 levels and influenza susceptibility is only an association. The next step, he said, is to find the mechanism.
Read more of this story at SoylentNews.
Founded around the turn of the last century, Soulseek is a small dinosaur in the file-sharing world.
Created by former Napster programmer Nir Arbel, the application swiftly turned into a tight community of music fans, which is still active today.
Over the years Soulseek operators Nir and Roz Arbel have seen other file-sharing tools come and go, but all this time they remained dedicated to their principles. Despite its name, Soulseek had long found its purpose.
While it kept a relatively low profile, Soulseek is not immune to the stigma that comes with being a file-sharing tool. In 2015, PayPal cut off its ability to collect donations, claiming that sharing tools required pre-approval, even though that policy didnt exist when it signed up.
Soulseek is not a profit-oriented platform but donations are welcomed. Without PayPal, this became a challenge, but luckily for the developers, the Electonic Frontier Foundation (EFF) was able to intervene.
February 2016 everything returned to normal when the PayPal account was restored, for a while at least. Earlier his year, PayPal apparently changed its mind and booted the application once again.
Soulseek operator Roz Arbel was told that the application violated the payment services acceptable use policy and that pre-approval was required for file-sharing tools. It was pretty much the same recycled argument from years before.
Faced with this deja-vu, Soulseek turned to EFF for help once again, but this time PayPal wouldnt budge.
PayPal made it clear that theyre not willing to offer Soulseek financial services any longer. The company did give the Arbels access to their funds and tax documentation, after a request from EFF, the digital rights group writes.
EFF asked whether PayPals latest ban was linked to a concrete copyright complaint, but the payment processor didnt provide any further information. It just confirmed that Soulseek was banned, apparently for good.
Elizabeth Holmes, the founder of the embattled health startup Theranos, on Friday was charged in federal court with wire fraud with prosecutors alleging that the company was a multi-million dollar scheme to defraud investors.Holmes and Ramesh ...
Summary: Sidestepping the existential crisis of the EPO (running out of work and issuing many questionable patents with expectation of impending layoffs), the PR people at the Office choose a facts-denying, face-saving damage control strategy while staff speaks out, wholeheartedly agreeing with concerned stakeholders
THE WORLDS patent offices/systems, with the exception of Chinas (SIPO), are doing reasonably OK. The USPTO is nowadays in the process of improving patent quality and we commend US courts for that, notably SCOTUS and the Federal Circuit below it.
The EPO isnt just above the law; it actively exploits that to break the law, so it has no credibility talking about courts.The EPO, by contrast, is quite a monster. The EPO repeatedly disobeyed court orders. Corruption at the EPO is just outstanding, not to mention violations of the law, constitutions, and the EPC. The EPO isnt just above the law; it actively exploits that to break the law, so it has no credibility talking about courts. It seems incapable of grasping the notion of justice. It also assaulted a judge, who is now rumoured to be hospitalised. Several hours ago the EPO wrote: Next week we’...
Hillicon Valley: Trump hits China with massive tech tariffs | Facebook meets with GOP leaders over bias allegations | Judge sends Manafort to jail ahead of trial | AT&T completes Time Warner purchase "IndyWatch Feed Tech"
The Cyber and Tech overnights have joined forces to give you Hillicon Valley, The Hill's new comprehensive newsletter detailing all you need to know about the tech and cyber news from Capitol Hill to Silicon Valley.Welcome! Follow the cyber team,...
President Trump's 2020 reelection campaign is working either directly or indirectly with former staffers from the shuttered consulting firm Cambridge Analytica, according to an Associated Press report. The AP reported on Friday that...
Two senators are demanding answers from Amazon following an incident where an Echo device reportedly recorded a couples conversation and sent it to an acquaintance.While Amazon has stated that the company is evaluating options to make this series...
A supercomputer, of course, isn't really a "computer." It's not one giant processor sitting atop an even larger motherboard. Instead, it's a network of thousands of computers tied together to form a single whole, dedicated to a singular set of tasks. They tend to be really fast, but according to the folks at the International Supercomputing Conference, speed is not a prerequisite for being a supercomputer.
|IndyWatch Science and Technology News Feed Archiver|
IndyWatch Science and Technology News Feed was generated at World News IndyWatch.
Resource generated at IndyWatch using aliasfeed and rawdog