IndyWatch Science and Technology News Feed Archiver

Go Back:30 Days | 7 Days | 2 Days | 1 Day

IndyWatch Science and Technology News Feed Today.

Go Forward:1 Day | 2 Days | 7 Days | 30 Days

IndyWatch Science and Technology News Feed was generated at World News IndyWatch.

Friday, 29 December


Raw: Central Staff Committee of the EPO Warns the Organisation That It Votes in Favour of Breaching Fundamental Rights "IndyWatch Feed Tech"

Original/full: Social unrest at the EPO and your role in it: The consequences of a vote in favour of the proposed strike regulations [PDF]

Radford letter to ational representatives

Summary: Citing ECHR (which now has a pending complaint about the EPO) and ILO (which is flooded with countless complaints from the EPO), the Radford-led Staff Committee writes to national representatives of the European Patent Organisation


Microbes Sampled and Sequenced Aboard the ISS "IndyWatch Feed Tech"

Astronauts can now sequence microbes they find on the International Space Station (ISS) without having to send them back to Earth:

Being able to identify microbes in real time aboard the International Space Station, without having to send them back to Earth for identification first, would be revolutionary for the world of microbiology and space exploration. The Genes in Space-3 team turned that possibility into a reality this year, when it completed the first-ever sample-to-sequence process entirely aboard the space station. Results from their investigation were published in Scientific Reports [open, DOI: 10.1038/s41598-017-18364-0] [DX].

The ability to identify microbes in space could aid in the ability to diagnose and treat astronaut ailments in real time, as well as assisting in the identification of DNA-based life on other planets. It could also benefit other experiments aboard the orbiting laboratory. Identifying microbes involves isolating the DNA of samples, and then amplifying or making many copies - of that DNA that can then be sequenced, or identified.

The investigation was broken into two parts: the collection of the microbial samples and amplification by Polymerase Chain Reaction (PCR), then sequencing and identification of the microbes. NASA astronaut Peggy Whitson conducted the experiment aboard the orbiting laboratory, with NASA microbiologist and the project's Principal Investigator Sarah Wallace and her team watching and guiding her from Houston.

Now Russian cosmonauts can test their crazy ideas. At least, until the ISS gets split apart and deorbited.

Original Submission

Read more of this story at SoylentNews.


Raw: When the EPO Violated German Law and ECHR Got Invoked Along With the German Constitutional Court (Bundesverfassungsgericht) "IndyWatch Feed Tech"

Original/full: English [PDF] | French [PDF] | German [PDF]

EPO health checks

Summary: EPO staff health checks and handling of illness-induced leave are against German law (more examples of the EPO breaking German law soon followed)


This Was 2017 in Pirate Searches "IndyWatch Feed Tech"

Lists, list, lists, its that time of the year again. In December many prominent search engines publish their overviews of most used search terms.

On Google, Hurricane Irma was the most searched for term of the year, globally. With It and Stranger Things ending up as the most sought after movie and TV show respectively.

But whats happening on torrent search engines? With billions of searches every year, its worth taking a look at the most-entered keywords on the dominant file-sharing network.

With data from one of the most visited torrent indexes, we compiled a list of 50 popular terms, to give an indication.

2017s number one query is Game of Thrones, which was entered in several variations, often paired with the episode number. While its no surprise, considering the shows popularity, as a TV-show its somewhat of an outlier.

The top 50 is mostly made up of movie titles. Spider Man: Homecoming ended up in the second spot, followed by Baby Driver and War for the Planet of the Apes.

The only non-title entry in the top ten is Telugu 2017, which shows how popular BitTorrent is in India. On most torrent sites nowadays, a large chunk of all visitors come from the Asian country.

Torrent sites are predominantly used to download video, which is evident from the list. There are no references to music at all, and CracksNow appears to be the only software related search.

Below is the full list of the Top 50 most-entered search queries based on a data sample provided by one of the most popular torrent sites on the Internet. Searches pointing to the same title have been combined.


Note that searches are not the same as download activity. The former are, in theory, easier to manipulate by outsiders.

... ...
What Pirates Searched for in 2017
rank search
1. Game of Thrones


New Places, New Faces in Patents: 2017 in Review "IndyWatch Feed Tech"

This year was once again active in terms of patent law and policy. Throughout it all, EFF worked to protect end user and innovator rights. We pushed for a rule that would end the Eastern District of Texas unwarranted dominance as a forum for patent litigation. We also defended processes at the Patent Office that give it the opportunity to correct mistakes (many, many mistakes) made in issuing patents. And we fought to prevent new patent owner tactics that would increase consumer costs.

New Places

First, because of recent developments both at the Supreme Court and at the U.S. Court of Appeals for the Federal Circuit, this year we finally saw a shift away from the dominance of the Eastern District of Texas as the primary forum for patent litigation. The Supreme Court issued its highly anticipated decision in TC Heartland v. Kraft Foods, finding that patent cases are subject to a special statute when determining where they can be filed. This decision reversed a rule, announced by the Federal Circuit in 1990, that allowed patent owners to file in practically any far-flung corner of the country (enter the Eastern District, stage right). EFF filed an amicus brief urging the Supreme Court to recognize the problems created by the Federal Circuit.

Following close on the heels of TC Heartland was a second, arguably more important decision from the Federal Circuit in In re Cray. While TC Heartland determined what statute controlled patent venue, In re Cray clarified that the statute did not have the broad scope a court in the Eastern District of Texas was trying to give it.

Together, these two decisions are having an impact: Lex Machina reports 22% of patent cases were filed in the Eastern District of Texas this year (down from 44% and 37% in 2015 and 2016, respectively). When looking on a quarterly basis, the effect of these two cases is more pronounced. In the first quarter of 2017 (before TC Heartland and In re Cray were decided), 33% of cases were filed in the Eastern District. So far in the fourth quarter, only 12% of cases were filed there.

Where patent issues will be heard is also at issue in another Supreme Court case:...


Re: Path traversal flaws in awstats 7.6 and earlier. "IndyWatch Feed Tech"

Posted by John Lightsey on Dec 29

These issues were assigned CVE-2017-1000501


Kansas Man Killed In SWATting Attack "IndyWatch Feed Tech"

A 28-year-old Kansas man was shot and killed by police officers on the evening of Dec. 28 after someone fraudulently reported a hostage situation ongoing at his home. The false report was the latest in a dangerous hoax known as swatting, wherein the perpetrator falsely reports a dangerous situation at an address with the goal of prompting authorities to respond to that address with deadly force. This particular swatting reportedly originated over a $1.50 wagered match in the online game Call of Duty. Compounding the tragedy is that the man killed was an innocent party who had no part in the dispute.

The following is an analysis of what is known so far about the incident, as well as a brief interview with the alleged and self-professed perpetrator of this crime.

It appears that the dispute and subsequent taunting originated on Twitter. One of the parties to that dispute allegedly using the Twitter handle SWauTistic threatened to swat another user who goes by the nickname 7aLeNT. @7aLeNT dared someone to swat him, but then tweeted an address that was not his own.

Swautistic responded by falsely reporting to the Kansas police a domestic dispute at the address 7aLenT posted, telling the authorities that one person had already been murdered there and that several family members were being held hostage.

Image courtesey @mattcarries

A story in the Wichita Eagle says officers responded the 1000 block of McCormick and got into position, preparing for a hostage situation.

A male came to the front door, Livingston said. As he came to the front door, one of our officers discharged his weapon.

Livingston didnt say if the man, who was 28, had a weapon when he came to the door, or what caused the officer to shoot the man. Police dont think the man fired at officers, but the incident is still under investigation, he said. The man, who has not been identified by police, died at a local hospital.

A family member identified that man who was shot by police as Andrew Finch. One of Finchs cousins said Finch didnt play video games.

Not long after that, Swautistic was back on Twitter saying he could see on television that the police had fallen for his swa...


Seven-Segment Flip Clock Display Finally Finished "IndyWatch Feed Tech"

Earlier this year, we mentioned in a Hackaday Links article that [Spencer Hamblin] was in the process of building a seven-segment flip clock. Well, its finally finished, and it looks great!

Vintage seven segment digits make up the display. These digits work the same way that flip-dot displays work current through each segments coil creates a magnetic field which causes the segment to flip over. Current in the other direction creates the opposite magnetic field and flips the segment the other way. On these digits, there are three connections on the coils. The middle one is power and the other two are used to enable and disable the segment ie., flip it one way or the other. To save on pins on the microcontroller, [Spencer] connected all the middle coil pins together on a digit. Each coil can be powered using a single pin on the microcontroller. Similarly, the segments for each digit are connected together as well, so one pin on the micro controls the same segment on each of the digits. The microcontroller in question is the AVR ATMega48.

There are two parts of the clock face left to do: AM/PM and whether the alarm is set or not. [Spencer] used a fifth digit, slightly offset, for those the top and middle segments are used.

For the housing of the clock, [Spencer] used layers of offsetting colored wood. The wood (sapele and ash) were CNC cut and aligned. The back plate, also made from wood, holds buttons for setting the time and alar...


Apple Offers $29 Battery Replacements in Response to iPhone Slowdown Scandal "IndyWatch Feed Tech"

Apple Offers $29 Battery Replacements in Response to iPhone Slowdown Scandal

Apple posted a response to iPhone battery and performance concerns on Dec. 28. From the "Addressing customer concerns" section:

We've always wanted our customers to be able to use their iPhones as long as possible. We're proud that Apple products are known for their durability, and for holding their value longer than our competitors' devices.

To address our customers' concerns, to recognize their loyalty and to regain the trust of anyone who may have doubted Apple's intentions, we've decided to take the following steps:

  • Apple is reducing the price of an out-of-warranty iPhone battery replacement by $50 from $79 to $29 for anyone with an iPhone 6 or later whose battery needs to be replaced, starting in late January and available worldwide through December 2018. Details will be provided soon on
  • Early in 2018, we will issue an iOS software update with new features that give users more visibility into the health of their iPhone's battery, so they can see for themselves if its condition is affecting performance.
  • As always, our team is working on ways to make the user experience even better, including improving how we manage performance and avoid unexpected shutdowns as batteries age.

At Apple, our customers' trust means everything to us. We will never stop working to earn and maintain it. We are able to do the work we love only because of your faith and support and we will never forget that or take it for granted.

Some have found the response annoying. Others have praised the "good vibes".

iFixit has in turn cut the price of its own battery replacement kits to $29 or less.

Previously: Eight Lawsuits Filed Against Apple Over iPhone Slowdow...


Nearly End-Of-The-Year Summary "IndyWatch Feed Tech"

Another year is almost behind us and I thought it would be useful to take a look at what we have accomplished up to this point.

For those who may be new-ish here, SoylentNews went live on 2014-02-17. Since then, we have:

  • Reached 244th place in the world with our folding-at-home team.
  • Had nearly 780 site subscriptions.
  • Had over 2740 articles posted to journals.
  • Signed up over 6,800 user nicks/accounts.
  • Published over 20,000 stories.
  • Received over 24,000 story submissions.
  • Had over 403,000 comment moderations.
  • Posted over 615,500 comments.
  • Had nearly 9,200,000 hits (views) on stories.

All of this was provided with absolutely no advertising by a purely volunteer staff!

Please accept my sincere thanks to all of you who have subscribed and helped to keep the site up and running! We could not have done it without your support.

I must also report that we have just over 100 people who have accessed the site in the past month whose subscription has lapsed. It is easy enough to do -- I've let it happen, myself. So, please go to the subscription page to check/renew your subscription. Be aware that the preferred amount is the minimum for the selected duration; feel free to increase the amount (hint hint).

Oh, and I would be remiss in not thanking the staff here for their dedication and perseverance. Linode decided to open a new data center and we had to migrate our servers to the new location. We accomplished this with almost no downtime on the site, and only about a 30-minute hiccup on our IRC (Internet Relay Chat) server.

Because of performance degradation on our servers when loading highly-commented stories, we rolled out a new comment display system early in the year. It had several issues at the outset, but seems to have settled down quite nicely. We appreciate your patience, and constructive feedback reporting issues as they arose. It helped greatly in stomping out those bugs.

We have a bug-fix update to the site in the works... mostly minor things that are waiting on testing for release. We hope to roll those out in the next couple of weeks.

To all of you who have contributed to the site, in other words: to our community, thank-you! It has been a privilege to serve you this past year and I look for...


Meet the CIAs Insectothopter "IndyWatch Feed Tech"

Sadly, the 1-gram spy craft couldnt withstand a gentle breeze, but later dragonfly-inspired UAVs proved far more capable Photo: CIA Museum

photo of the Insectothopter Photo: CIA Museum

It was the 1970s, the Cold War was in full swing, and the U.S. Central Intelligence Agencys Office of Research and Development had developed a miniaturized listening device. But they didnt have a good way to maneuver the device into place without raising suspicions.

After scrapping the idea of a mechanical bumblebee, CIA engineers prototyped a dragonfly to carry the bug. Dubbed the Insectothopter, the bug-carrying bug was the agencys first insect-size unmanned aerial vehicle (UAV), and it seemed to show potential. Under ideal conditions, it had a range of 200 meters and a flight time of 60 seconds.

photo of the Insectothopter propulsion kit

Photo: CIA Museum Flight Kit: The propulsion system for the Insectothopter was based around a miniature fluidic oscillator, which moved the wings up and down to mimic a real dragonflys flight.

In taking a cue from nature, CIA engineers were wise to choose the dragonfly. Dragonflies are nimble aerialists, able to hover, glide, and even fly backward. They can turn 180 degrees in three wingbeats. The Insectothopters 6-centimeter-long body and 9-cm wingspan were well within the range of an actual dragonflys dimensions. Plus, dragonflies are native to every continent except Antarctica, so their presence would be unremarkable, at least in the appropriate season.

According to a CIA description, the robobug was supposed to work like this:

A laser beam directed at a bimetallic strip in the insectothopters tail guided the device. That same laser beam acted as a data link for the miniature acoustic sensor onboard the craft. A miniature oscillating engine drove the wings; the fuel bladder contained a liquid propellant that when mixed with an oxifier created additional thrust.
Unfortunately, even the gentlest breeze blew the 1-gram Insectothopter off course. Its unclear if the laser guidance and data link were ever implemented. In any event, the UAV never flew an actual spy mission.

Decades later, though, dragonflies remain popular research models fo...


Wine 3.0-RC4 Released With One Dozen Fixes "IndyWatch Feed Tech"

The fourth weekly release candidate of Wine 3.0 is now available for testing...


87 Bergman Things "IndyWatch Feed Tech"

Ingmar Bergman. Theres nobody more jolly, so Ive long wanted to (re-)watch all his films. But every time Ive poked around to find a convenient way to do that, Ive been discouraged by the spotty way his filmography has been made available: One film here; three films on this box set; five on this (with one overlap with the first one) It just seemed exhausting.

I had kinda expected some enterprising Swede to get a government grant to create An Extremely Complete Bluray Box, but apparently the Swedes arent proud enough of their most famous person to do that

In 2006 Tartan released a 30 DVD box set, but getting a copy was like . (Thats about 20% more than $$$.) It apparently went out of print toot sweet because Tartan went under. But, finally, this December, Palisades (who bought up the remnants of Tartan) made a new edition, and I got one, so now, surely, I could sit down and get jollified!

Then I started looking at the list of films included Hey this doesnt have that film or that other film HEY! THIS ISNT COMPLETE!

But, of course, it made no promise to be. I just assumed. So my OCD kicked in and I started poking around, and got the rest of the films on single DVDs. Which brought the total up to about 55. And then I started looking into his TV stuff, which a...


[Ken Shirriff] Becomes a Core Memory Repairman (Again) "IndyWatch Feed Tech"

Lately, [Ken Shirriff] has been on some of the most incredible hardware adventures. In his most recent undertaking we find [Ken] elbow-deep in the core memory of a 50-year-old machine, the IBM 1401. The computer wasnt shut down before mains power was cut, and it has refused to boot ever since. The culprit is in the core memory support circuitry, and thanks to [Kens] wonderful storytelling we can travel along with him to repair an IBM 1401.

From a hardware standpoint core memory makes us giddy. Its a grid of wires with ferrite toroids at every intersection. Bits can be set or cleared based on how electricity is applied to the intersecting wires. [Al Williams] walked through some of the core memory history last year and we enjoyed hearing [Pamela Liou] recount the story of how textile workers consulted on the fabrication of core memory for the Apollo missions during her OHWS Talk in October. But giddiness aside, core memory has pretty much gone the way of the dodo having been displaced by technologies that take up exponentially less space.



Steal This Show S03E12: Attack Of The Propaganda Bots "IndyWatch Feed Tech"

stslogo180If you enjoy this episode, consider becoming a patron and getting involved with the show. Check out Steal This Shows Patreon campaign: support us and get all kinds of fantastic benefits!

In this episode, we meet Sam Woolley, director of the Digital Intelligence Lab at the Institute for the Future, to dig deeper into the topic of troll farms, political disinformation and the use of social media bots to create what Sam calls Computational Propaganda.

What happens when the ability to create propaganda is democratized out of the hands of governments and corporate media and into the hands of unknown, weird and downright dangerous online actors?

Steal This Show aims to release bi-weekly episodes featuring insiders discussing copyright and file-sharing news. It complements our regular reporting by adding more room for opinion, commentary, and analysis.

The guests for our news discussions will vary, and well aim to introduce voices from different backgrounds and persuasions. In addition to news, STS will also produce features interviewing some of the great innovators and minds.

Host: Jamie King

Guest: Sam Woolley

Produced by Jamie King
Edited & Mixed by Riley Byrne
Original Music by David Triana
Web Production by Siraje Amarniss

Source: TF, for the latest info on copyright, file-sharing, torrent sites and more. We also have VPN discounts, offers and coupons


Some Internet-Exposed Sonos and Bose Speakers Can be Hacked Remotely "IndyWatch Feed Tech"

Vulnerable IoT speakers from Sonos and Bose can be hacked to scare/annoy users:

Researchers at Trend Micro have found that certain models of Sonos and Bose speakers have vulnerabilities that leave them open to hijacking, as reported by Wired. The accessible speakers are being exploited by hackers that are using them to play spooky sounds, Alexa commands, and... Rick Astley tracks.

Only a small percentage of speakers by the two companies are actually affected, including some of the Sonos Play:1, the Sonos One, and the Bose SoundTouch. All it takes is for the speaker to be connected to a misconfigured network and a simple internet scan. Once the speaker is discovered via the scan, the API it uses to talk to apps can be utilized to tell the speakers to play any audio file hosted at a specific URL. Of all the models, between 2,500 to 5,000 Sonos devices and 400 to 500 Bose devices were found by Trend Micro to be open to audio hacking.

Sonos told Wired in an email that it is "looking into this more, but what you are referencing is a misconfiguration of a user's network that impacts a very small number of customers that may have exposed their device to a public network. We do not recommend this type of set-up for our customers."

Also at TechCrunch.

Original Submission

Read more of this story at SoylentNews.


Chrome Extension with 105,000 installs is a Cryptocurrency Miner "IndyWatch Feed Tech"

By Waqas

Archive Poster extension for Chrome browser is being currently used by 105,000

This is a post from Read the original post: Chrome Extension with 105,000 installs is a Cryptocurrency Miner


Battistelli Becomes Judge Corcorans (Almost) Direct Boss and People Doubt He Will Last Long "IndyWatch Feed Tech"

French EPO

Summary: The French-dominated (Team Battistelli) DG1 will soon boss Patrick Corcoran, which means Battistelli can retaliate against him as early as next week if not later

THINGS get even worse at the EPO. On December 12th we presented the claim that seemed inevitable the claim that Judge Corcoran would be transfered to DG1, bossed by Team Battistelli (we already covered the controversial changes made in this DG against common sense and in spite of many warnings). Two days later we wrote about it again. It seems to be almost a confirmed fact, but it took another 8 days for that to happen (when most people are already away on holiday and not able to pay much attention, certainly not journalists).

According to this new comment (hours old), as feared, Mr Corcoran received notification of his transfer to DG1 on 22 December 2017, the last working day of the year.

Corcoran and his wife are in a limbo in Munich. Their lives must have been in disarray with all this uncertainty, defamation, and sheer injustice (ironically directed at an actual judge).The Boards are thus trully [sic] independent, the commenter added sarcastically. Its very much believable even though the comment is anonymous. We heard similar things from other sources. Remember that, effective a few days from now, long-term contracts are over; this means that Corcoran can be fired by Battistelli (indirectly, by his French loyalists and old friends whom he put in control). Its beyond farcical. Even the next President is French and close to Battistelli.

But what is the broader significance of it? The appeal boards have absolutely no independence; worse they can be legally bullied, potentially into personal bankruptcy (with their salary halved and having to pay hefty legal bills in...


Stable kernels 4.14.10 and 4.9.73 "IndyWatch Feed Tech"

Greg Kroah-Hartman has announced the release of the 4.14.10 and 4.9.73 stable kernels. Both have fixes across the tree, though 4.14.10 is rather larger and contains more of the kernel page-table isolation work.


Apple Lisa: The overly expensive machines OS source code will be available very soon "IndyWatch Feed Tech"

Did you know? The Apple Lisa carried a price tag of $10,000? Thats twice the price of the iMac Pro base model

A piece of computing history is going to be available for all those who can learn to take advantage of it, or not. Apple Lisa, the $10,000 computer that was supposed to change the face of the computing industry will have its source code available real soon.

Just wanted to let everyone know the sources to the OS and applications were recovered, I converted them to Unix end of line conventions and spaces for Pascal tabs after recovering the files using Disk Image Chef, and they are with Apple for review. After thats done, CHM will do an @CHM blog post about the historical significance of the software and the code that is cleared for release by Apple will be made available in 2018. The only thing I saw that probably wont be able to be released is the American Heritage dictionary for the spell checker in LisaWrite.

Apple Lisa at the time was a brilliant piece of hardware; a cutting-edge machine and one of the first to offer consumers a GUI, mouse, and file system. Unfortunately, that steep $10,000 price tag, which if adjusted for inflation will cost you an outright $25,000 will certainly turn people away rather than forcing them to reach for their wallet.

We will see soon, what developers will be able to figure out with the source code once it is available.

The post Apple Lisa: The overly expensive machines OS source code will be available very soon appeared first on TechWorm.


Kernel Exploit For Sony PS4 Firmware 4.05 Released, Full Jailbreak Coming Soon "IndyWatch Feed Tech"

Sony PlayStation 4 4.05 Kernel Exploit Released, Jailbreak Coming Soon

Developer SpecterDev has just released a fully-functional kernel exploit for PlayStation 4 (4.05 firmware) online. With the exploit being published, the full jailbreak of the console is closer than ever. Over two months ago, Team Fail0verflow had revealed the technical details of the kernel exploit.

The new 4.05 kernel exploit dubbed as namedobj allows users to run arbitrary code on the gaming console, facilitating  jailbreaking and kernel-level modifications to the system.

However, the developer specifies that in the kernel exploit release there is no code related to the violation of the anti-piracy systems of PlayStation 4 and the execution of homebrew software. But this release can be used by other developers to create their own exploit including jailbreak.

He reveals that the exploit contains a loader that listens for a payload and once it receives it, executes it automatically.

Ive also uploaded a test payload you can use after the kernel exploit runs that jailbreaks and patches the kernel to allow access to debug settings, just needs to be netcatted to the loader via port 9020, he concludes.

A jailbreak allows users to modify (a smartphone or other electronic device) to remove restrictions imposed by the manufacturer or operator, for instance, allow the installation of unauthorized software, third-party applications, and games that are basically not possible because of the anti-piracy mechanisms implicated on the device. In this case, it is the Sony PlayStation 4, which comes with its own firmware and an operating system designed by the company, but with the option to install GNU / Linux distros.

However, for some users it may not work as smoothly as it may sound.

This exploit is actually incredibly stable at around 95% in my tests. WebKit very rarely crashes and the same is true with kernel. Ive built in a patch so the kernel exploit will only run once on the system. You can still make additional patches via payloads, SpecterDev cautioned.

Users who have a PlayStation 4 with firmware lower than 4.05 can simply upgrade their console to take advantage of the vulnerability.

The release is available on GitHub, where the developer provides more details. Please note that Techworm does not in any way encourage piracy, and we have reported the news only for information purposes and illustrating technical advances in the field of gaming.



Game of Thrones Season 8 script leaked: Major spoilers with two confirmed deaths "IndyWatch Feed Tech"

Spoiler Alert! Script Of Game Of Thrones Season 8 Leaked Online

With every season of Game of Thrones viewers get a bunch of spoilers; sometimes small spoilers from friends or social media and sometimes huge spoilers from the leaked script.
In August 2017, internet was full of leaks of then airing Game of Thrones Season 7. HBO faced a cybertheft due to which 1.5 TB of data from the server was leaked. It consisted of scripts of few non-televised shows and scripts of some of the biggest shows of HBO, including Game of Thrones.

And now one of the biggest news of this week is the leaked script of GOT Season 8 on internet. Going according to DNAs reports, one of the Reddit users posted four pages of Game of Thrones script: one page from Episode three, two from Episode 5, and one from Episode 6.

According to the leaked scripts, Arya Stark (Maisie Williams), Tyrion Lannister (Peter Dinklage), Brienne of Tarth (Gwendoline Christie), Sansa Stark (Sophie Turner), Podrick Payne (Daniel Portman), and the Hound (Rory McCann) will try to run away from a group of wights using the Hound driven wagon. The wagon will be crashed. According to the Reddit post, two major deaths were revealed. One of the deaths will be of Podrick.

The post also claimed the sixth and the final episode of GoT Season 8 will contain a conversation between Bronn and Tyrion, where the latter revealed that Jamie was killed before handing over the promised castle. So, the other death will be of Tyrions brother towards the end of the series.

Although, HBO has yet to give an official reaction upon the leakage of the script by the Reddit post.

Game of Thrones Season 8 will be released in 2019.

Source:The Christian Post

The post Game of Thrones Season 8 script leaked: Major spoilers with two confirmed deaths appeared first on TechWorm.


The Essential Open Source Reading List: 21 Must-Read Books "IndyWatch Feed Tech"

Is your organization looking to build out an open source program or are you already managing one? If so, youre probably already considering the kinds of tools and guidance that can make your program a holistic success. That is why, in this article series, we have been covering tools for managing open source programs and providing advice from leading experts.


Retrotechtacular: 1950s Televisions Were Beasts "IndyWatch Feed Tech"

Television has been around for a long time, but what we point to and call a TV these days is a completely different object from what consumers first fell in love with. This video of RCA factory tours from the 1950s drives home how foreign the old designs are to modern eyes.

Right from the start the apparent chaos of the circuitry is mindboggling, with some components on circuit boards but many being wired point-to-point. The narrator even makes comments on the new technique for making electrical connections that uses a wire wrapping gun. The claim is that this is cleaner, faster, and neater than soldering. ([Bil Herd] might agree.) Not all of the methods are lost in todays manufacturing though. The hand-stuffing and wave soldering of PCBs is still used on lower-cost goods, and frequently with power supplies (at least the ones where space isnt at a premium).

Its no surprise when talking about 60+ year-old-designs that these were tube televisions. But this goes beyond the Cathode Ray Tube (CRT) that generates the picture. They are using vacuum tubes, and a good portion of the video delves into the manufacture and testing of them. You&#821...


14 Linux and Open Source Conferences Worth Attending in 2018 "IndyWatch Feed Tech"

Whether your budget permits you to attend large, global events or just small local shows, there's a Linux and open source conference to suit everyone.


The Carpetbaggers of Tech "IndyWatch Feed Tech"

A The Baffler story, which doesnt seem very nice to the tech industry. I support tech industry spreading across the heartland, which in my opinion would be very good for America. Nothing is perfect people, but a positive direction is a good thing: #transhumanism

The faces are different, but the schemes are the same. Mark Zuckerberg, Jeff Bezos, Steve Chase, and J.D. Vance launch techs takeover of the heartland.


Set Ubuntu Derivatives Back to Default with Resetter "IndyWatch Feed Tech"

Set Ubuntu Derivatives Back to Default with Resetter


Richard Stallman on why you should join the FSF "IndyWatch Feed Tech"

As 2017 draws to a close, Richard M. Stallman, President of the Free Software Foundation (FSF), offers his thoughts about why you should become an FSF Associate Member.

Becoming an Associate Member reflects a long-term commitment to supporting free software projects, licenses, and advocacy that helps the FSF's staff and volunteers focus on the big picture and work toward software freedom for all. Join today.

Why you should join the Free Software Foundation

There are many organizations that usefully promote free software, but no other organization we know of stands for software freedom as firmly as the Free Software Foundation. If freedom in your computing is important to you, please join the Free Software Foundation.

Photo of Richard M.
Richard M. Stallman at the European
Dialogues in Spain, November 2016

There are many organizations that criticize Digital Restrictions Management (DRM). No other organization we know of campaigns against DRM as firmly and strongly as the Free Software Foundation. If you fighting DRM is important to you, please join the Free Software Foundation.

There are many organizations that develop free software licenses, but they don't make protecting users' freedom the principal goal, as the Free Software Foundation does. If defending users' freedom is important to you, please join the Free Software Foundation.

There are many organizations that maintain lists of free programs, but no other organization has a list like our Free Software Directory. If guidance on what programs you can trust is important to you, please join the Free Software Foundation.

There are many organizations that certify products for various criteria, but no other organization certifies computers and peripherals that Respect Your Freedom as the Free Software Foundation does. If guidance on what to buy for freedom is important to you, please join the Free Software Foundation.

Many organizations try to...


Russia Blames Human Error for Loss of Angolan Satellite "IndyWatch Feed Tech"

Russia Blames Human Error for Loss of Angolan Satellite

Russia's recent rocket launch was programmed with the wrong point of origin:

The loss of a multi-million pound weather mapping satellite was due to programming errors, the Russian deputy prime minister has said. Dmitry Rogozin said Meteor-M had been programmed for take-off from a different space station.

Speaking to Russian state TV, he blamed "human error". "The rocket was programmed as if it was taking off from Baikonur," he told the Rossyia 24 TV channel.

In fact the rocket was actually taking off from new base Vostochny, in the east of the country.

Angola Loses Contact With First Commercial Satellite

AngoSat-1, a communications satellite built for almost $300m, was launched on Tuesday evening from the launch facility in Baikonur, Kazakhstan.

It was scheduled to work for 15 years and was made to improve telecommunications in the African country. About 50 Angolan aerospace engineers were trained around the world. This crew was supposed to oversee mission from a control centre in Angola.

Earlier this year, Angola made public its long-term plan for its space programme, which envisages a steady expansion in the coming years. It is unclear how a failure of AngoSat-1 will influence that multi-year plan.

Also at Reuters.

Original Submission #1 Original Submission #2

Read more of this story at SoylentNews.


Small Open-Source OSs for Small IoT Devices "IndyWatch Feed Tech"

A range of open-source operating-system solutions are available for those confined to scaled-down dimensionshoming in on the best option does require some research, though.


FCC creates national Blue Alert system just in time for the holidays "IndyWatch Feed Tech"

Happy holidays everyone, the FCC, DHS and the Department of Justice just created a national Blue Alerts system.

Two weeks ago, the FCC created a national Blue Alert system that will notify everyone of a threat to law enforcement.

Do American's really believe we need a Blue Alert system to keep the police safe?

America's police are equipped to wage a war on anyone that threatens them. Take a look at this 2014 picture of police in Ferguson, Missouri.

Does that look like police are afraid of anyone or anything?


Realtime Updates of Web Content Using WebSockets "IndyWatch Feed Tech"


You've seen web sites with stock prices or retweet counts that update in real time. However, such sites are more the exception rather than the norm. WebSockets make it easy, and are widely supported, but not used as much as they could be.

Examples provided for WebSockets typically don't focus on the "pubsub" use case; instead they tend to focus on echo servers and the occasional chat server. These are OK as far as they go.

This post provides three mini-demos that implement the same design pattern in JavaScript on both the client and server.

Quick Start

For the impatient who want to see running code,

git clone
cd websocket-demos
npm install
node server.js

After running this, visit http://localhost:8080/ in a browser, and you should see something like this:


  • one
  • two
  • three

Server support

The primary responsibility of the server is to maintain a list of active websocket connections. The code below will maintain three such sets, one for each of the demos provided.

// attach to web server
var wsServer = new websocket.server({httpServer: httpServer});

// three sets of connections
var connections = {
  text: new Set(),
  html: new Set(),
  json: new Set()

// when a request comes in for one of these streams, add the websocket to the
// appropriate set, and upon receipt of close events, remove the websocket
// from that set.


Take the Coin Cell Challenge This Weekend! "IndyWatch Feed Tech"

The year is drawing to a close, and we have a weekend project for you to while away the remaining hours. Take the Coin Cell Challenge!

The point of the challenge is to do something interesting with a coin cell. Thats it! Its a challenge that can be as simple or as involved as you want. Low power is where its at these days, so if youve never used the hardware sleep modes in your favorite microcontroller, that would make an excellent challenge entry. Show us what youre able to do with short wake periods, and talk about when and why that wake happens. Or go a completely different route and build your own cell!

[Ben Krasnow] makes the most of a tiny power sourceThe top twenty entries will each receive a $100 Tindie credit so they can score some excellent gear. Three top winners in some special areas who will each be awarded a $500 cash prize. Were looking for something interesting that demonstrates longest life (Lifetime Award), something that burns through that coin cell as if its going out of style (Supernova Award), and something that fills us with disbelief (Heavy Lifting Award) because it shouldnt be possible with just a coin cell.

One of our biggest inspirations for...


Looking for Promo Codes and Deals on New Tech? Check Out These 4 Tips "IndyWatch Feed Tech"

Staying up to speed on the latest developments coming out of the world of technology is important for most people. Whether you are buying a computer, gaming system, cell phone or tablet, doing your research before investing money is important. The last thing you want to do is skimp on the quality of your electronics due to the problems it can cause. Once you have narrowed down the search regarding the type of electronics you want to purchase, you should start searching around for the best coupons and sales around. Saving money on these technology-related issues is easy if you take some time to do your homework. Rushing through this buying process will generally cost you a lot of money, which is why trying to find every possible means of saving money is important. Read below to find out more about how you can save money on these types of purchases.

  1. Avoid Spending Money on Extended Warranties

As you are getting rang up at your favorite electronics retailer, you will probably be confronted with a decision regarding an extended warranty. Some people think that foregoing this warranty is a big mistake, but in most cases they are wrong. The money that you pay versus what the actual warranty will cover usually dont even out. Instead of spending an untold amount of money on a warranty you dont really need, you can save this money and put it away just in case something happens to the electronic equipment in question. By doing this, you can have a rainy day fund for electronic repair emergencies and save money at the same time.

  1. Be Wary of Contract Tablets and Phones

One of the biggest mistakes most people make when it comes to buying a cell phone or tablet is starting a new contract with their cell phone service provider. While it appears that you will get a better deal on the electronic equipment in question, this is usually misconception. Often times, you will end up paying more for a cell phone or tablet on a contract plan. The best thing you can do when trying to save money on these items is to buy them outright. While it may take you a bit of time to save up enough money to make this purchase, it will be worth it. When investing in a phone that is unlocked, you will be in the drivers seat regarding which cell service provider you want to use.

  1. Expensive Does Not Equal Quality

Another misconception that most people have when it comes to buying electronics is the higher the price tag, the higher the overall quality of the item is. The truth is that price generally has nothing to do with how well a piece of electronic equipment is made. Before inves...


Security updates for Friday "IndyWatch Feed Tech"

Security updates have been issued by Debian (imagemagick, mercurial, and thunderbird), Fedora (asterisk, libexif, python-mistune, sensible-utils, shellinabox, and webkitgtk4), Mageia (glibc, kernel-firmware, and phpmyadmin), and openSUSE (global).


The Plasma Magnet Drive: A Simple, Cheap Drive for the Solar System and Beyond "IndyWatch Feed Tech"

Can we use the outflow of particles from the Sun to drive spacecraft, helping us build the Solar System infrastructure well one day use as the base for deeper journeys into the cosmos? Jeff Greason, chairman of the board of the Tau Zero Foundation, presented his take on the idea at the recent Tennessee Valley Interstellar Workshop. The concept captured the attention of Centauri Dreams regular Alex Tolley, who here analyzes the notion, explains its differences from the conventional magnetic sail, and explores the implications of its development. Alex is co-author (with Brian McConnell) of A Design for a Reusable Water-Based Spacecraft Known as the Spacecoach (Springer, 2016), focusing on a new technology for Solar System expansion. A lecturer in biology at the University of California, he now takes us into a different propulsion strategy, one that could be an enabler for human missions near and far.

by Alex Tolley

Suppose I told you that a device you could make yourself would be a more energy efficient space drive than an ion engine with a far better thrust to weight ratio? Fantasy? No!

Such a drive exists. Called the plasma magnet, it is a development of the magnetic sail but with orders of magnitude less mass and a performance that offers, with constant supplied power, constant acceleration regardless of its distance from the sun.

At the recent Tennessee Valley Interstellar Workshop (TVIW), Jeff Greason presented this technology in his talk [1]. What caught my attention was the simplicity of this technology for propulsion, with a performance that exceeded more complex low thrust systems like ion engines and solar sails.

What is a plasma magnet?

The plasma magnet is a type of magsail that creates a kilometers wide, artificial magnetosphere that deflects the charged solar wind to provide thrust.

Unlike a classic magsail [9] (figure 1) that generates the magnetic field with a large diameter electrical circuit, the plasma magnet replaces the circular superconducting coil by inducing the current flow with the charged particles of the solar wind. It is an upgraded development of Robert Winglees Mini-Magnetospheric Plasma Propulsion (M2P2) [7, 8], a drive th...


Samsung Android Browser is affected by a critical SOP bypass issue, a Metasploit exploit code is available "IndyWatch Feed Tech"

The browser app pre-installed on Samsung Android devices is affected by a critical SOP bypass issue, tracked as CVE-2017-17692.

The browser app pre-installed on Android devices is affected by a critical flaw, tracked as CVE-2017-17692, that could be exploited by an attacker to steal data from browser tabs if the user visits an attacker-controlled site.

The SOP bypass issue in the Samsung Internet Browser was discovered by the security researcher Dhiraj Mishra.

The Same Origin Policy is one of the most important security mechanisms implemented in modern browsers, the basic idea behind the SOP is the javaScript from one origin should not be able to access the properties of a website on another origin.

A SOP bypass occurs when a is ...


Should we out Bitcoin creator, Satoshi? "IndyWatch Feed Tech"

Everyone likes a good mystery. After all, who isnt fascinated with Sherlock Holmes or the Hardy Boys? The thirst to explore a mystery led us to the New World, to the ocean depths and into space.

One of the great mysteries of the past decade is the identity of Satoshi Nakamoto, the inventor of Bitcoin and the blockchain. Some have even stepped forward in an effort to usurp his identity for fame, infamy or fortune. But in this case, we have a mystery in which the subject does not wish to be fingered. He prefers anonymity.

This raises an interesting question. What could be achieved by discovering or revealing the identity of the illusive Satoshi Nakamoto?

The blockchain and Bitcoin present radically transformative methodologies with far ranging, beneficial impact on business, transparency and social order.

How so? The blockchain demonstrates that we can crowd-source trust, while Bitcoin is much more than a payment mechanism or even a reserve currency. It decouples governments from monetary policy. Ultimately, this will benefit consumers, businesses and even the governments that lose that control.

Why Has Satoshi Remained Anonymous?

I believe that Satoshi remains anonymous, because his identity, history, interests and politics would be a distraction to the fundamental gift that his research has bestowed. The world is still grappling with the challenge of education, adoption, scaling, governance, regulation and volatility.

Some people are still skeptical of Bitcoins potential or they fail to accept that it carries intrinsic value (far more than fiat currency, despite the absence of a redemption guaranty). Additionally, we are still witnessing hacks, failing exchanges and ICO scams. Ignorance is rampant. Some individuals wonder if Satoshi is an anarchistor if his invention is criminal. (Of course, it is not!).

Outing him now is pointless. He is a bright inventor, but he is not the story. The concepts and coin that he gave us are still in their infancy. Our focus now must be to understand, scale and smooth out the kinks, so that adoption and utility can serve mankind.

Related Ruminations:


Dig Into the Apple Device Design Guide "IndyWatch Feed Tech"

Millions of people worldwide have just added new Apple gadgets to their lives thanks to the annual end of December consumerism event. Those who are also Hackaday readers are likely devising cool projects incorporating their new toys. This is a good time to remind everybody that Apple publishes information useful for such endeavors: the Accessory Design Guidelines for Apple Devices (PDF).

This comes to our attention because [Pablo] referenced it to modify an air vent magnet mount. The metal parts of a magnetic mount interferes with wireless charging. [Pablo] looked in Apples design guide and found exactly where he needed to cut the metal plate in order to avoid blocking the wireless charging coil of his iPhone 8 Plus. What could have been a tedious reverse-engineering project was greatly simplified by Reading The Fine Manual.

Apple has earned its reputatio...


Strategies to Get Your Website Ranked on Google Top 10 "IndyWatch Feed Tech"

If you are running a business, it is necessary that you get it ranked among the best 10 on Googles search list. Unfortunately, it is not easy to ensure that you remain on top of Google ranking throughout. Some terms and conditions as explained at have been laid down by Google and should be followed to ensure that your website stays at the top. Trying to manipulate your ranking in a way that Google disapproves will not help you, but attract Googles wrath and get you punished. If the manipulation is severe, you will get penalized by having your website removed from Google ranking list. This post looks at some of the things that you must do to help your site get a top spot on Googles ranking.

Follow Googles Guidelines

Google has laid down guidelines that should help webmasters in their endeavour to enhance their ranking on Google. Unfortunately, most of them ignore and flout Googles basic rules, a thing that leads to having their sites penalized and at times removed from the webs index. As a webmaster, it is important that you avoid things that Google disapproves which will make your website to be victimized and removed from the index.

Check Out Your Links

Claiming a top spot in your niche requires that you have quality links and content for a sufficient period. However, maintaining a consistent and good ranking throughout can also raise eyebrows and a red flag to Google. In fact, this is why sites that rely on low-quality technique will rise to Google top but get slapped back to less than 100 places. It may not happen overnight, but after sometimes, the sites will fall back and even get delisted.  Google has employed thousands of manual reviewers whose job is to carry out a deeper analysis, review your site and rate you. It means that you must always remain cautious about sudden appearance at the top especially if you know that your pages are of low-quality pages.


It is important that you focus on the content production and pay closer attention to the keywords. This is an old online strategy that has remained relevant and which has helped website rank high. Once the backlinks help you to attain the top slot, the focus should shift to the keyword and thus, you should pay closer attention to the main terms that your niche competitors use to attract traffic. It is an old strategy alright but has remained relevant and fruitful to webmasters.

Organic Listing

Again this is a yesteryear strategy that new webmaster will want to overlook yet it remains a critical element for anyone interested in improving his ranking on google. Websites that make use of organic numbers enjoy a...


Twenty-plus years on, SMTP callbacks are still pointless and need to die "IndyWatch Feed Tech"

A rarely used legacy misfeature of the main Internet email protocol creeps back from irrelevance as a minor annoyance. You should ask your mail and antispam provider about their approach to 'SMTP callbacks'. Be wary of any assertion that is not backed by evidence.

Even if you are an IT professional and run an email system, you could be forgiven for not being immediately aware that there is such a thing as SMTP callbacks, also referred to as callback verification. As you will see from the Wikipedia article, the feature was never widely adopted, and for all too understandable reasons.

If you do run a mail system, you have probably heard about that feature's predecessor, the still-required but rarely used SMTP VRFY and EXPN commands. Those commands offer a way to verify whether an address is valid and to show the component addresses that a mailing list resolves to, respectively.

Back when all things inter-networking were considered experimental and it was generally thought that information should flow freely in and between those experimental networks, it was quite common for mail servers to offer VRFY and EXPN service to all comers.

I'm old enough to remember using VRFY by hand, telnet-ing to port 25 on a mail server and running VRFY $user@$domain.$tld commands to check whether an email address was indeed valid. I've forgotten which domains and persons were involved, but I imagine the reason why was that I wanted to contact somebody who had said something interesting in a post to a USENET news group.

But networkers trying to make contact with each other were not the only ones who discovered the VRFY and EXPN commands.  Soon spammers were using those commands to actively harvest actually! valid! deliverable! addresses, and by 1999 the RFC2505 best practices document recommended disabling the features altogether. After all, there would usually be some other way available to find somebody's email address (there was even a FAQ, a longish Frequentl...


There's One Big Feature Left For The Radeon Linux Driver Left To Tackle In 2018 "IndyWatch Feed Tech"

AMD/Radeon had a stellar 2017 for Linux most notably with delivering working Radeon RX Vega open-source driver support at launch, AMDGPU DC finally being merged to the mainline Linux kernel, and the official "AMDVLK" Vulkan driver now being open-source. Besides never-ending performance tuning, there's really just one major feature/area where the Radeon Linux graphics driver support is missing...


Link Between Lead Exposure and Criminality Could be Weaker Than Thought "IndyWatch Feed Tech"

One popular theory has linked declines in crime rates to the elimination of leaded gasoline. A study of New Zealanders suggests that this is not the case:

Lead exposure during childhood has been tied to a variety of developmental problems, but a new study suggests it may not be associated with higher odds of criminal behavior later in life.

The study set out to address a flaw in much of the previous research linking lead and crime: mainly that it's hard to determine how much of this connection might be explained by poverty and other socioeconomic circumstances that can influence both criminal activity and lead exposure. Researchers followed 553 people born in Dunedin, New Zealand, in 1972 and 1973, when lead exposure was common among children of all economic backgrounds because of widespread use of leaded gasoline. All of the kids were tested for lead exposure when they were 11 years old, and the study team followed them until age 38 to see how many of them were convicted of crimes.

By the end of the study, 154 participants, or 28 percent, had at least one criminal conviction, the researchers report in JAMA Pediatrics. But the odds of this happening were barely influenced by the amount of lead exposure people had during childhood. Just being male had a stronger effect than lead levels, the researchers note. "Many studies have shown that higher exposure to lead could predict more criminal behavior, but our study actually found that there isn't a clear connection between the two," said lead author Amber Beckley, a researcher at Duke University in Durham, North Carolina. The reason for the different results this time is that the current study found children from all walks of life had high lead levels, Beckley said by email.

The Need to Include Biological Variables in Prospective Longitudinal Studies of the Development of Criminal Behavior (open, DOI: 10.1001/jamapediatrics.2017.4237) (DX)

Association of Childhood Blood Lead Levels With Criminal Offending (open, DOI: 10.1001/jamapediatrics.2017.4005) (DX)



Video Friday: Feisty ANYmal, TechEthics, and Belated Robot Holidays "IndyWatch Feed Tech"

Your weekly selection of awesome robot videos

Video Friday is your weekly selection of awesome robotics videos, collected by your Automaton bloggers. Well also be posting a weekly calendar of upcoming robotics events for the next few months; here's what we have so far (send us your events!):

IEEE IRC 2018  January 31-2, 2018  Laguna Hills, Calif.
HRI 2018  March 5-8, 2018  Chicago, Ill.

Let us know if you have suggestions for next week, and enjoy today's videos.

Since Christmas hasn't gotten its act together and has poor coordination with Video Friday, there are some last-minute robot Chrismas videos that didn't make it in last week. The first comes from EPFL's Reconfigurable Robotics Lab:

[ RRL ]

Two 6-DOF spacecraft simulators dance to holiday music at Caltech's Aerospace Robotics and Control Lab.

[ CAST ]

Sawyer is putting a gift into a bag into a box, just for you:

I'm not sure Sawyer is allowed that stocking if it doesn't have any legs.

[ Rethink Robotics ]

Velodyne and their VLP-32C wish you a Happy Holidays that's a solid two minutes longer than it needs to be:

[ Velodyne ]

Crescent Industries, in New Freedom, PA, decked out its Baxters (and a musically inclined Sawyer) to wish a merry Christmas to anyone who happened to drive past:



Happy 8th Birthday, KrebsOnSecurity! "IndyWatch Feed Tech"

Eight years ago today I set aside my Washington Post press badge and became an independent here at What a wild ride it has been. Thank you all, Dear Readers, for sticking with me and for helping to build a terrific community.

This past year KrebsOnSecurity published nearly 160 stories, generating more than 11,000 reader comments. The pace of publications here slowed down in 2017, but then again I have been trying to focus on quality over quantity, and many of these stories took weeks or months to report and write.

As always, a big Thank You to readers who sent in tips and personal experiences that helped spark stories here. For anyone who wishes to get in touch, I can always be reached via this sites contact form, or via email at krebsonsecurity @ gmail dot com.

Here are some other ways to reach out:

Twitter (open DMs)


via Wickr at krebswickr

Protonmail: krebsonsecurity at protonmail dot com


Below are the Top 10 most-read stories of 2017, as decided by views and sorted in reverse chronological order:

The Market for Stolen Account Credentials

Phishers are Upping Their Game: So Should You

Equifax Breach Fallout: Your Salary History

USPS Informed Delivery is a Stalkers Dream

The Equifax Breach: What You Should Know

Got Robocalled? Dont Get Mad, Get Busy



6 Video Marketing Mistakes to Leave on the Cutting Room Floor "IndyWatch Feed Tech"

Creating video marketing content for your business is the ideal way to engage your audience. In fact, it is probably one of the strongest methods available presently. If you fail to take the time or put in sufficient effort for the video creation, you might as well scrap the entire idea.

When a consumer sees the video you create, it is an automatic reflection of your brand. No matter what type of video you make humorous promotional video, product showcase or explainer video you are cementing your brand image into the minds of an entirely new audience. In order to ensure you make the right impression, be sure you avoid the all-too-common mistakes that are found here.

  1. Making a Video Just Because

The old adage you have likely heard time and time again when you fail to plan, you plan to fail definitely applies when making a video. You must ask two essential questions when creating a video and have definite, concise answers in order to create a great video:

  • What is the strategic purpose?
  • Why is the video being made?

If you cannot provide an answer to these questions, take time to revisit your plan.

  1. Creating an Overly Long Video

When someone lands on your website, you have approximately three seconds to grab their attention. While the attention for a video is a bit longer at about 10 seconds, keeping your video short and sweet will yield the best results. If you do successfully capture the attention of a visitor, at most they will spend three minutes watching.

If what you want to share runs over this amount of time, consider making a series of videos. This will keep your audience engaged and coming back for more.

  1. Not Creating a Clear Call to Action

The last line of your video should be a call to action, such as:

  • Follow us on Twitter.
  • Click to Learn More.
  • Sign Up Here.

It does not matter what the CTA is, the key is to make sure it is present so your viewers know what they should do next. Without a call to action, your video is pretty much a bunch of pretty visuals that will do little-to-no good for your actual business.

  1. Not Editing the Video

No matter how wonderful of a masterpiece you create, it is essential that you edit your video prior to publishing it. A video that has not been properly edited will actually hurt your business and your reputation. Be sure you view your video, and you have o...


Kodi Returns to Its Roots, Now Available on Xbox One "IndyWatch Feed Tech"

The Kodi media player software has seen a massive surge in popularity over the past few years.

With help from a wide range of third-party add-ons, some of which offer access to pirated content, millions of people now use Kodi as their main source of entertainment.

The Kodi software itself is perfectly legal, however, and has been around for more than 15 years. The roots of Kodi are directly connected to the Xbox, as the first iterations of the project were called the Xbox Media Player.

As time went by XBMP became XBMC, and eventually Kodi. The last name change made sense as the software was no longer being developed for Xbox, but for other devices, running on Linux, Windows, OSX, and Android.

While the broader public was perfectly happy with this, the sentimental few were missing the Xbox connection. For them, and many others, Kodi has a surprise in store today after returning to its roots.

Let us end the year 2017 with a blast including a nostalgic reference to the past, the Kodi team announced.

It has long been asked for by so many and now it finally happened. Kodi for Xbox One is available worldwide through Windows and Xbox Store.

The Kodi team provides quite a bit of history and context to the Xbox return in a detailed blog post. At the same time, it also cautions users to keep in mind that this is just the initial release, which still has some very rough edges.

Kodis look and feel on the Xbox One are very familiar though. Anyone who had Kodi installed on a different platform should have no issue navigating the interface. The usual add-ons should work fine as well.

With the new Xbox One release, Kodi has come full circle. After 15 years they are back where things began.

Source: TF, for the latest info on copyright, file-sharing, torrent sites and more. We also have VPN discounts, offers and coupons


India cautions investors, compares bitcoin to 'Ponzi scheme' "IndyWatch Feed Tech"

Indias finance ministry cautioned investors on Friday about the risks digital currencies such as bitcoin, likening them to Ponzi schemes.There is a real and heightened risk of investment bubble of the type seen in Ponzi schemes which can result...


Try This for 3D Printing Without Support "IndyWatch Feed Tech"

Have a look at the object to the right. Using a conventional fused deposition printer, how would you print the object? Theres no flat surface to lay on the bed without generating a lot of overhangs. That usually requires support.

In theory, you might be able to print the bottom of the sphere down, but it is difficult to get that little spot to adhere to the bed. If you have at least two extruders and you are set up to print support material, that might even be the best option. However, printing support out of the same material you are printing with makes it hard to get a good clean print. There is another possibility. It does require some post-processing, but then again, not as much as hacking away a bunch of support material.

A Simple Idea

The idea is simple and at first it will sound like a lot of trouble. The basic idea is to cut the model in half at some point where both halves would be easy to print and then glue them together.  Stick around (no pun intended), though, because Ill show you a way to make the alignment of the parts almost painless no matter how complex the object might be.

The practical problem with gluing together half models is getting the pieces in the exact position, but that turns out to be easy if you just make a few simple changes to your model. Another lesser problem is clamping a piece while gluing. You can use a vise, but some oddly-shaped parts are not conducive to traditional vise jaws.

In Practice

Starting with an OpenSCAD object, it i...


Bitcoin exchange hit by DDoS attack after kidnapping of its official "IndyWatch Feed Tech"

By Waqas

Bitcoin is one of those cryptocurrencies whose value has rapidly

This is a post from Read the original post: Bitcoin exchange hit by DDoS attack after kidnapping of its official


Whos Hiring (BAE Systems, Amazon, ARM) Whos Firing (Oath, Brocade Cisco) "IndyWatch Feed Tech"

Yahoo, Brocade acquisitions spark the biggest layoffs; a good time to be a defense engineer Illustration: iStockphoto

The end of 2017 brings mostly good news on the engineering jobs front, unless your company was recently acquired.

First, the bad news, by the numbers:


Thats the latest layoff announced by Oath, Verizons new umbrella organization that encompasses the former AOL, Yahoo, and the Huffington Post. This follows 2100 cuts just after the Yahoo acquisition. No word on exactly where, geographically, the ax is falling.


Broadcoms recently completed acquisition of Brocade Communications means that at least 360 employees in San Jose will be terminated, according to a filing with the Employment Development Department. This announcement comes after a layoff of 96 from Brocades San Jose office, blamed on delays in closing the acquisition.


Cisco in November laid off 60 employees from cloud operations, mostly from two companies it had acquired, according to The Information. This follows a string of cuts throughout 2017.


In December, ABC News reported that 75 engineers working in wind turbine design and related technologies were told by General Electric in Schnectady, NY, that their jobs were being eliminated, and that number is expected to rise.

Now the good news:


BAE Electronic Systems in November indicated that by the end of 2017 it will have hired about 1200 engineers, manufacturers, and technicians, including 300 interns,...


Krita 4.0 Is Aiming For Release In March "IndyWatch Feed Tech"

The KDE-aligned Krita digital painting software has published a retrospective of 2017 and a look ahead to 2018...


Huawei router exploit (CVE-2017-17215) involved in Satori and Brickerbot was leaked online "IndyWatch Feed Tech"

The exploit code used to trigger the CVE-2017-17215 vulnerability in Huawei routers over the past several weeks is now publicly available.

Before Christmas, the Mirai botnet made the headlines once again, a new variant dubbed Satori was responsible for hundreds of thousands of attempts to exploit a recently discovered vulnerability in Huawei HG532 home routers.

The activity of the Satori botnet has been observed over the past month by researchers from Check Point security.

The attacks against Huawei HG532 devices were observed in several countries, including the USA, Italy, Germany, and Egypt.

CVE-2017-17215 exploit satori

Experts observed that attacks attempt to exploit the CVE-2017-17215 zero-day vulnerability in the Huawei home router residing in the fact that the TR-064 technical report standard, which was designed for local network configuration, was exposed to WAN through port 37215 (UPnP Universal Plug and Play).

News of the day is that the code used to target the Huawei routers over the past several weeks is now publicly available.

The discovery was made by Ankit Anubhav, a researcher at security firm NewSky.

Anubhav first discovered the code on early this week.

NewSky Security observed that a known threat actor released working code for Huawei vulnerability CVE-201717215 free of charge on Pastebin this Christmas. This exploit has already been weaponized in...


Proteins Can Now be Built From Scratch to "Do What We Want" "IndyWatch Feed Tech"

The New York Times has published an article about the recent work of Dr. David Baker, a biochemist who launched Rosetta@home in 2005:

Scientists Are Designing Artisanal Proteins for Your Body

[...] Scientists have studied proteins for nearly two centuries, and over that time they've worked out how cells create them from simple building blocks. They have long dreamed of assembling those elements into new proteins not found in nature.

But they've been stumped by one great mystery: how the building blocks in a protein take their final shape. David Baker, 55, the director of the Institute for Protein Design at the University of Washington, has been investigating that enigma for a quarter-century.

Now, it looks as if he and his colleagues have cracked it. Thanks in part to crowdsourced computers and smartphones belonging to over a million volunteers, the scientists have figured out how to choose the building blocks required to create a protein that will take on the shape they want.

In a series of papers published this year, Dr. Baker and his colleagues unveiled the results of this work. They have produced thousands of different kinds of proteins, which assume the shape the scientists had predicted. Often those proteins are profoundly different from any found in nature.

This expertise has led to a profound scientific advance: cellular proteins designed by man, not by nature. "We can now build proteins from scratch from first principles to do what we want," said Dr. Baker.

Massively parallel de novo protein design for targeted therapeutics (DOI: 10.1038/nature23912) (DX)

Computational design of environmental sensors for the potent opioid fentanyl (open, DOI: 10.7554/eLife.28909.001) (DX)

Evolution of a designed protein assembly encapsulating its own RNA genome (DOI: 10.1038/nature25157) (DX)

Original Submission



Tax law leads to higher salaries for Netflix execs "IndyWatch Feed Tech"

Executives at Netflix will received substantially higher salaries in 2018 as result of the passage of the GOP tax plan, The Wall Street Journal reported Thursday.Among those receiving raises include Chief Content Officer Ted Sarandos, who will earn...


Trump: US Postal Service getting 'dumber and poorer' while making Amazon 'richer' "IndyWatch Feed Tech"

President Trump insisted on Friday that the U.S. Postal Service should be charging online retailers, like Amazon, more to deliver packages, saying the service's cheap delivery rates were making it "dumber and poorer.""Why is the United States Post...


Microneedle Patch Could Help Burn Fat "IndyWatch Feed Tech"

There's a patch for that:

A new approach to reducing bulging tummy fats has shown promise in laboratory trials. It combines a new way to deliver drugs, via a micro-needle patch, with drugs that are known to turn energy-storing white fat into energy-burning brown fat. This innovative approach developed by scientists from Nanyang Technological University, Singapore (NTU Singapore) reduced weight gain in mice on a high fat diet and their fat mass by more than 30 per cent over four weeks.

The new type of skin patch contains hundreds of micro-needles, each thinner than a human hair, which are loaded with the drug Beta-3 adrenergic receptor agonist or another drug called thyroid hormone T3 triiodothyronine.

When the patch is pressed into the skin for about two minutes, these micro-needles become embedded in the skin and detach from the patch, which can then be removed. As the needles degrade, the drug molecules then slowly diffuse to the energy-storing white fat underneath the skin layer, turning them into energy-burning brown fats.

Transdermal Delivery of Anti-Obesity Compounds to Subcutaneous Adipose Tissue with Polymeric Microneedle Patches (DOI: 10.1002/smtd.201700269) (DX)

Original Submission

Read more of this story at SoylentNews.


Critical "Same Origin Policy" Bypass Flaw Found in Samsung Android Browser "IndyWatch Feed Tech"

A critical vulnerability has been discovered in the browser app comes pre-installed on hundreds of millions of Samsung Android devices that could allow an attacker to steal data from browser tabs if the user visits an attacker-controlled site. Identified as CVE-2017-17692, the vulnerability is Same Origin Policy (SOP) bypass issue that resides in the popular Samsung Internet Browser version


Wayland Made More Inroads In 2017 "IndyWatch Feed Tech"

Wayland had a very successful year with Ubuntu 17.10 now using it by default, more niche/hobbyist Wayland compositors making progress, KDE Plasma on Wayland becoming more usable for day-to-day use, more applications/libraries natively supporting Wayland, GTK4's Vulkan renderer becoming very usable, and other advancements...


Sonoff Factory Tour is a Lesson on Life in Shenzhen "IndyWatch Feed Tech"

Judging by the popularity of How Its Made and other shows of the genre, watching stuff being made is a real crowd pleaser. [Jonathan Oxer] from SuperHouse is not immune to the charms of a factory tour, so he went all the way to China to visit the factory where Sonoff IoT devices are made, and his video reveals a lot about the state of electronics manufacturing.

Test jig for six units at once

For those interested only in how Sonoff devices are manufactured, skip ahead to about the 7:30 mark. But fair warning youll miss a fascinating discussion of how Shenzhen rose from a sleepy fishing village of 25,000 people to the booming electronics mecca of 25 million that it is today. With growth supercharged by its designation as a Special Economic Zone in the 1980s, Shenzhen is now home to thousands of electronics concerns, including ITEAD, the manufacturers of the Sonoff brand. [Jonathan]s tour of Shenzhen includes a trip through the famed electronics markets where literally everything needed to build anything can be found.

At the ITEAD factory, [Jonathan] walks the Sonoff assembly line showing off an amazingly low-tech process. Aside from the army of pick and places robots and the reflow and wave soldering lines, Sonoff devices are basically handma...


RADV Gets A Big Performance Boost Thanks To DCC "IndyWatch Feed Tech"

Not only is Vega now Vulkan 1.0 conformant with RADV, but it's also much faster if pulling down the very latest Mesa bits...


A perf Cheat Sheet "IndyWatch Feed Tech"

Right now Im working on finishing up a zine about perf that I started back in May, and Ive been struggling with how to explain all there is to say about perf in a concise way. Yesterday I finally hit on the idea of making a 1-page cheat sheet reference which covers all of the basic perf command line arguments.

All the examples in this cheat sheet are taken (with permission) from, which is a fantastic perf reference and has many more great examples.


HATSouth Survey Discovers Four New "Hot Jupiter" Exoplanets "IndyWatch Feed Tech"

HATSouth discovers four 'hot Jupiter' exoplanets

An international team of astronomers reports the discovery of four new 'hot Jupiter' extrasolar worlds by the HATSouth survey. The newly found exoplanets received designations HATS-50b through HATS-53b. The finding is presented in a paper published December 12 on

The Hungarian-made Automated Telescope Network-South (HATSouth) Exoplanet Survey is a network of 24 robotic wide-field telescopes. The telescopes are distributed over three locations in the southern hemisphere (Las Campanas Observatory in Chile, the H.E.S.S. site in Namibia, and Siding Spring Observatory in Australia). The primary goal of the HATSouth survey is to discover and characterize a large number of transiting extrasolar planets, reaching out to long periods and down to small planetary radii.

To date, HATSouth has identified nearly 2,000 candidate transiting alien worlds of which more than 40 were confirmed as planets. Now, a group of researchers led by Thomas Henning of the Max Planck Institute for Astronomy in Heidelberg, Germany, reports the discovery of four new exoplanets, expanding the list of exoworlds found by HATSouth.

HATS-50b through HATS-53b: four transiting hot Jupiters orbiting G-type stars discovered by the HATSouth survey

We report the discovery of four close-in transiting exoplanets, HATS-50 through HATS-53, discovered using the HATSouth three-continent network of homogeneous and automated telescopes. These new exoplanets belong to the class of hot Jupiters and orbit G-type dwarf stars, with brightness in the range V=12.5-14.0 mag. While HATS-53 has many physical characteristics similar to the Sun, the other three stars appear to be metal rich, larger and more massive. Three of the new exoplanets, namely HATS-50, HATS-51 and HATS-53, have low density and similar orbital period. Instead, HATS-52 is more dense and has a shorter orbital period. It also receives an intensive radiation from its parent star and, consequently, presents a high equilibrium temperature. HATS-50 shows a marginal additional transit feature consistent with an ultra-short period hot super Neptune, which will be able to be confirmed with TESS photometry.



Info Stealing The cyber security expert Marco Ramilli spotted a new operation in the wild "IndyWatch Feed Tech"

The Italia cyber security expert Marco Ramilli, founder of Yoroi, published an interesting analysis of a quite new InfoStealer Malware delivered by eMail to many International Companies.

Attack attribution is always a very hard work. False Flags, Code Reuse and Spaghetti Code  makes impossible to assert This attack belongs to X. Indeed nowadays makes more sense talking about Attribution Probability rather then Attribution by itself. This attack belongs to X with 65% of attribution probability it would be a correct sentence.

I made this quick introduction because the following analysis would probably take the reader to think about specific attribution, but it wont be so accurate, so please be prepared to have not such a clear conclusions.

Today Id like to show an interesting analysis of a quite new InfoStealer Malware delivered by eMail to many International Companies. The analysis shows up interesting Code Reuse capabilities, apparently originated by Japanese Attackers reusing an English Speaker Attacker source code. Again I have not enough artifacts to give attributions but only few clues as follows. In the described analysis, the original sample was delivered by (with high probability a compromised South Africa account) to one of my spamming email addresses.

The obtained sample is a Microsoft Word document within macro in it. The macros were heavily obfuscated by using four rounds of substitutions and UTF-8 encoding charsets (which, by the way, is super annoying). The following image shows the obfuscated macro code with UTF-8 charsets.
Info Stealing
Stage 1: Obfuscation


Our Kodi Box Is Legal & Our Users Dont Break the Law, TickBox Tells Hollywood "IndyWatch Feed Tech"

Georgia-based TickBox TV is a provider of set-top boxes that allow users to stream all kinds of popular content. Like other similar devices, Tickboxes use the popular Kodi media player alongside instructions how to find and use third-party addons.

Of course, these types of add-ons are considered a thorn in the side of the entertainment industries and as a result, Tickbox found itself on the receiving end of a lawsuit in the United States.

Filed in a California federal court in October, Universal, Columbia Pictures, Disney, 20th Century Fox, Paramount Pictures, Warner Bros, Amazon, and Netflix accused Tickbox of inducing and contributing to copyright infringement.

TickBox sells TickBox TV, a computer hardware device that TickBox urges its customers to use as a tool for the mass infringement of Plaintiffs copyrighted motion pictures and television shows, the complaint reads.

TickBox promotes the use of TickBox TV for overwhelmingly, if not exclusively, infringing purposes, and that is how its customers use TickBox TV. TickBox advertises TickBox TV as a substitute for authorized and legitimate distribution channels such as cable television or video-on-demand services like Amazon Prime and Netflix.

The copyright holders reference a TickBox TV video which informs customers how to install themes, more commonly known as builds. These builds are custom Kodi-setups which contain many popular add-ons that specialize in supplying pirate content. Is that illegal? TickBox TV believes not.

In a response filed yesterday, TickBox underlined its position that its device is not sold with any unauthorized or illegal content and complains that just because users may choose to download and install third-party programs through which they can search for and view unauthorized content, thats not its fault. It goes on to attack the lawsuit on several fronts.

TickBox argues that plaintiffs claims, that TickBox can be held secondarily liable under the theory of contributory infringement or inducement liability as described in the famous Grokster and isoHunt cases, is unlikely to succeed. TickBox says the studios need to show four elements distribution of a device or product, acts of infringement by users of Tickbox, an object of promoting its use to infringe copyright, and causation.

Plaintiffs have failed to establish any of these four elements, TickBoxs lawyers write.

Firstly, TickBox says that while its device can be programmed to infringe, its the third party software (the builds/themes containing addons) that do all th...


RADV Is Now Effectively Conformant For Vega GPUs With Vulkan 1.0 "IndyWatch Feed Tech"

Since October RADV has officially become a Vulkan 1.0 conformant driver for Volcanic Islands GPUs while Sea Islands and Polaris hardware has also been on this same support level. RADV support for the newer Vega GPUs had been lagging behind, but these latest-generation AMD GPUs are now also effectively conformant...


NVIDIA's New Allocator Library Will Need A Lot Of Work In 2018 "IndyWatch Feed Tech"

Last week NVIDIA sent out an experimental allocator driver for the Nouveau code-base as well as EXT_external_objects support for Nouveau NVC0 in Mesa. So far though many upstream open-source driver developers are not yet convinced about the current design of this Unix Device Memory Allocation library as a potential replacement to GBM...


OpenStack Foundation Embraces Containers With Kata Containers "IndyWatch Feed Tech"

Kata Containers were one of the exciting announcements from this year's KubeCon. See how they work and how the makers are working with the community.

On Dec. 5, when the enthusiastic container community was getting ready for KubeCon, the OpenStack Foundation renewed its long-standing friendship with the announcement of a new effort called Kata Containers with the goal of unifying the speed and manageability of containers with the security advantages of virtual machines (VMs).


Wattup Wireless charging technology gets FCC Certification "IndyWatch Feed Tech"

Energous Gets FCC Certification for WattUp Wireless Charging Technology

After three years of debut of Energous wireless power at a distance charging system, it has now approved by the Federal Communications commission (FCC). FCC has approved this new type of charger, Wattup Mid Field transmitter, for the first time.

This technology is much more advance than the previous wireless charging technologies because this will charge up batteries from as far as three feet away. And with this, we enter a complete new era of wireless charging of devices.

It is able to charge battery-operated devices like phone, tablets, smart speakers, smart watches, fitness trackers etc. using a technique that Energous compares to Wi-Fi, as long as the battery-operated device has the companys receivers. Wattup has a transmitter which emits energy via a radio frequency signal. It is being delivered by custom chips and miniature antenna arrays. And after the transmission, device having the Wattup receiver converts the RF signal into battery power.

Energous claims its product being the only one which can charge using both wired as well as wireless charging technology. It can even charge more than one devices simultaneously and will keep on charging until they are charged to a certain point.

Wattup was released in 2015 at CES and rumors were there for Wattup collaborating for wireless charging of iPhone X in 2017 but Apple went ahead with inductive wireless charging on iPhone X and iPhone 8 this year. It is being speculated that Apple may work with Energous on implementing this technology on future iPhones or at least make a Wattup iPhone accessory certified by MFi.

Energous will be displaying this wireless charging technology at the Consumer Electronic show at Las vegas next  month from 9th-12th January.

The post Wattup Wireless charging technology gets FCC Certification appeared first on TechWorm.


Tips and Resources for Learning Kubernetes "IndyWatch Feed Tech"

Regardless of how you decide to begin, it's time to start learning Kubernetes.

If you read Kubernetes' description"an open source system for automating deployment, scaling, and management of containerized applications" you may think that getting started with Kubernetes is quite a daunting feat. But there are a number of great resources out there that make it easier to learn this container orchestration system.


Raw: eljko Topi Tries to Defend an Illegal Suppression of Labour Rights "IndyWatch Feed Tech"

Topi had already done in Croatia various similar things; that wasnt long before he was keenly hired with Battistellis support

General Advisory Committee on VP4
Original/full: English [PDF] | German [PDF] | French [PDF]

Summary: When the General Advisory Committee discussed the highly controversial nature of impediments to strikes Vice-President Topi (just months on the jobs) stonewalled in order to suppress opposition by staff representatives, who moreover noted that the proposal was illegal, would likely be challenged by ILO (can take many years to happen) and would contravene international laws [...] host nations have a duty to intervene if they suspect breach of international conventions on their territory.


Two Romanians charged with infecting US Capital Police cameras with ransomware early this year "IndyWatch Feed Tech"

Two Romanian people have been arrested and charged with hacking into US Capital Police cameras ahead of the inauguration of President Trump.

Two Romanian people have been arrested and charged with hacking into control systems of the surveillance cameras for the Metropolitan Police Department in the US. The two suspects, Mihai Alexandru Isvanca, 25, and Eveline Cismaru, 28, hacked the US Capital Police cameras earlier this year.

A ransomware infected 70 percent of storage devices used by the Washington DC CCTV systems just eight days before the inauguration of President Donald Trump.

The attack occurred between 12 and 15 January, the ransomware infected 123 of 187 network video recorders, each controlling up to four CCTVs. IT staff was forced to wipe the infected systems in order to restore the situation, fortunately, the ransomware did not affect other components of the Washington DC network.

Capital Police cameras hacked

The first infections were discovered by the Police on Jan. 12 D.C. when the authorities noticed four camera sites were not functioning properly. Experts at the city technology office detected two distinct ransomware (Cerber and Dharma) in four recording devices, then they extended the analysis to the entire surveillance network and wiped all the infected equipment.

The duo was arrested in Bucharest on December 15 and charged with conspiracy and various forms of computer fraud.

According to an affidavit dated December 11, the two criminals acted in an effort to extort money in exchange for unlocking the surveillance system.

Prosecutors collected evidence that revealed a scheme to distribute ransomware by email to at least 179,000 email addresses.

The investigation uncovered information that the MPD surveillance camera computers were compromised between Jan. 9 and Jan. 12, 2017, and that ransomware variants called cerber and dharma had been stored on the computers.  Other evidence in the...


Wi-Fi Based Technology Can Send a Distress Signal Up to "Several Kilometers" "IndyWatch Feed Tech"

New app developed to locate people in areas with no phone signal

Researchers of the Universidad de Alicante (UA) have developed new technology that makes it possible to locate people who have suffered an accident in remote locations without a phone signal and where a speedy rescue is essential to save lives. The system can also be used in emergency situations that arise as a result of earthquakes, floods or forest fires, where mobile phone infrastructure is often rendered useless.

"We have designed an application (app) that can be incorporated to any Smartphone and that, without a signal, emits a Wifi signal which in turn acts as a distress beacon over a distance of several kilometers", explains the creator of the technology and professor at the UA's Department of Physics, Systems Engineering and Theory of the Signal of the Higher Polytechnic School, Jos ngel Bern. This signal contains the location (coordinates) of the person who has suffered the accident or disappeared and is using the Smartphone emitter, along with a short message that "can be altered depending on the situation, with examples such as 'I am injured', 'I am disorientated' or 'I need help'", specifies Bern.

In order to detect the distress signal, the researcher has also created a light (half a kilo), portable receptor device which rescue teams or mountain shelters could use. This device has a small antenna and connects to the Smartphone of the search party. When an accident occurs, the victim only has to activate the mobile phone app, which will in turn emit the distress signal periodically for hours or even days, even if he or she is unconscious indicating the coordinates of its location.

The Network of Valencian Universities for the promotion of Research, Development and Innovation, RUVID, is a non-profit private organisation that was born in December 2001 through a partnership agreement between the five public universities from the Valencian Region.

Original Submission

Read more of this story at SoylentNews.


The Robots Are Coming, and Sweden Is Fine "IndyWatch Feed Tech"

But such talk has little currency in Sweden or its Scandinavian neighbors, where unions are powerful, government support is abundant, and trust between employers and employees runs deep. Here, robots are just another way to make companies more efficient. As employers prosper, workers have consistently gained a proportionate slice of the spoils a stark contrast to the United States and Britain, where wages have stagnated even while corporate profits have soared.

In a world full of anxiety about the potential job-destroying rise of automation, Sweden is well placed to embrace technology while limiting human costs.


Raw: EPO Compared to Thatcherism Amid Suppression of Bargaining/Strikes "IndyWatch Feed Tech"

Original/full: Strikes and unauthorised absence [PDF]

Strikes and unauthorised absence

Summary: Members of the EPOs staff committee explain why Battistellis new regulations curtailing strikes (and more) are not just illegal but also unethical


Unraveling the MEC Standards Puzzle "IndyWatch Feed Tech"

Multi-access Edge Computing (MEC) is quickly gaining traction as a disruptive technology that promises to bring applications and content closer to the network edge. It is also expected to reduce latency in networks and make new services possible.


Amazon Echo Dot Upgraded to Retro Futuristic Look "IndyWatch Feed Tech"

It takes a surprising amount of planning and work if you want something to look old. [vemeT5ak] wanted the Echo Dot sitting on his desk to fit a different aesthetic motivated by a 1940s Canadian radio. Armed with Solidworks, a Tormach CNC, and some woodworking tools at Sector67 hackerspace, he built a retro-futuristic case for the Amazon Alexa-enabled gadget. Future and past meet thanks to the design and material appearance of the metal grille and base molding wrapping the wood radio case. The finishing touch is of course the ring of blue light which still shines through from the Echo itself.

A short USB extension cable connects the Echo Dot to the back of the enclosure, and the cavernous inside plus ample holes provide a nice rich sound.

It took about 15 hours of modeling, scaling, and tweaking in Solidworks with an interesting design specification in mind: single-bit operation. This single-bit is not in the electrical sense, but refers to the CNC milling operation. All pieces are cut with a 1/4 end mill, without any tool changes. Metal pieces were milled from 6061 al...


Raw: When the EPO Suppressed Human Rights, Including Strikes, Chairman Jesper Kongstad Supported the Suppression "IndyWatch Feed Tech"

Original/full: English [PDF] | French [PDF]

Jesper Kongstad shutdown of intervention

Summary: Jesper Kongstads shutdown of intervention by staff at a crucial/historic point in time may have played a role in the EPOs deviation from basic rights and international norms

A desire to resist oppression is implanted in the nature of man. ~Tacitus

If you are neutral in situations of injustice, you have chosen the side of the oppressor. ~Desmond Tutu

09:41 Responds Well To RootsWeb Data Breach "IndyWatch Feed Tech"

The popular expert Troy Hunt notified the security team of an unsecured file on a RootsWeb server containing email addresses/username and password combinations as well as usernames from a server.

When you think of personal security questions, you might think of your mothers surname or other family information that normally isnt shared unless you are building your family tree with an online genealogy search. When notifies its users of a potential security breach it sounds worse than most. is a company with millions of customers that use their online tools to research their family tree. The company also hosts servers for RootsWeb, a free, community-driven collection of genealogy tools and discussion forums. On December 20th, 2017, Troy Hunt, of, notified the security team of an unsecured file on a RootsWeb server containing email addresses/username and password combinations as well as usernames from a server, and a quick and detailed investigation ensued.


According to Ancestry.coms blog post detailing the incident, the security team reviewed the file identified by Hunt, and determined that it does contain login details for 300,000 accounts although they describe, the majority of the information was old. They continued their investigation and determined that of the 300,000 accounts, 55,000 had been reused by users on both the RootsWeb and Ancestry websites. Most of the 55,000 were from free trial, or currently unused accounts, but 7,000 login credentials were in use by active users. supports millions of users so this...


Two Romanians Charged With Hacking Police CCTV Cameras Before Trump Inauguration "IndyWatch Feed Tech"

Remember how some cybercriminals shut down most of Washington D.C. police's security cameras for four days ahead of President Donald Trump's inauguration earlier this year? Just a few days after the incident, British authorities arrested two people in the United Kingdom, identified as a British man and a Swedish woman, both 50-year-old, on request of U.S. officials. But now US federal court


Development Release: Linux Lite 3.8 Beta "IndyWatch Feed Tech"

Jerry Bezencon has announced the availability of the beta release of Linux Lite 3.8, a beginner-friendly distribution featuring the Xfce desktop. It is based on Ubuntu 16.04 LTS. "Linux Lite 3.8 beta is now available for testing. There have been a number of changes since the 3.6 release.....


BSDCAN2017 Interview with Peter Hessler, Reyk Floeter, and Henning Brauer "IndyWatch Feed Tech"

In a message to misc@, Tom Smyth wrote (in part):

While  attending BSDCAN2017 in Ottawa I met many OpenBSD Developers,
and I was fortunate to grab a few moments and video an interview
with Peter Hessler, Henning Brauer and Reyk Floeter and talk to
them about OpenBSD generally,
I really appreciate the guys generosity in their time on the
I have posted the video here

Nice work, Tom!


Why Don't More Low-Quality Patents Get Rejected? "IndyWatch Feed Tech"

Why don't more low-quality patents get rejected? A recent paper published by the Brookings Institution offers fascinating insights into this question. Written by legal scholars Michael Frakes and Melissa Wasserman, the paper identifies three ways the patent process encourages approval of low-quality patents:

  • The United States Patent and Trademark Office (USPTO) is funded by feesand the agency gets more fees if it approves an application.
  • Unlimited opportunities to refile rejected applications means sometimes granting a patent is the only way to get rid of a persistent applicant.
  • Patent examiners are given less time to review patent applications as they gain seniority, leading to less thorough reviews.

None of these observations is entirely new. For example, we have covered the problems created by unlimited re-applications in the past. But what sets Frakes and Wasserman's work apart is that they have convincing empirical evidence for all three theories.

They have data showing that these features of the patent system systematically bias it in the direction of granting more patents. Which means that if we reformed the patent process in the ways they advocate, we'd likely wind up with fewer bogus patents floating around.

Source : These experts figured out why so many bogus patents get approved

Original Submission

Read more of this story at SoylentNews.


US Tax Reform Puts Pressure on Chinas Authoritarian State "IndyWatch Feed Tech"

 Read this carefully.  China has dodged real political reform and reform of the State sector of the economy for the past thirty five years.  Suddenly they are totally vulnerable as the USA roars back as an industrial behemoth.
US tax reform is not finished either.  The USA needs to adopt a VAT that is equivalent to that used by all others and thus force the end of  trade advantage granted thereby.

I would also like to see the whole agricultural subsidy  phased out at perhaps ten percent per year or at least shifted over to the organic agriculture industry.  Industrial agriculture is failing and the sooner we start the full transition the better..
US Tax Reform Puts Pressure on Chinas Authoritarian State

Warnings against 'tax war' reflect Communist Partys fear of rising private sector

By Leo Timm

December 10, 2017 11:45 am Last Updated: December 14, 2017 9:15 pm

Senate Majority Leader Mitch McConnell (R-KY) addresses a tax reform news conference with Sen. Shelley Moore Capito (R-WV) and representatives from small business interest groups in the Dirksen Senate Office Building on Capitol Hill in Washington, DC on November 30, 2017. (Chip Somodevilla/Getty Images)

For years, Chinese companies leveraged favorable exchange rates, cheap labor, thin environmental regulations, and other advantages to attract U.S. capital and technology in exchange for huge profits.

Now, U.S. tax cutsthe biggest passed since those during the presidency of Ronald Reagan three decades agohave Beijing in a bind.

Prominent in the new tax policy are generous reductions in the corporate tax and a rationalization of the global tax scheme. Both are expected to draw capital and skilled labor back to the United States.

The reform comes at a time when...


World Health Organization Acknowledges the Effectiveness of Cannabis as Medicine "IndyWatch Feed Tech"

Once the research floodgates finally opened, this was inevitable.  So many disease profiles are inflammation driven is is certain that CBD will displace all opiodes to which it provides an excellent alternative without the addiction issue.

Yet the long adherence to a false doctrine does take years to overcome.

Yet it is now inevitable and those supporting the supply chain know this.
World Health Organization Acknowledges the Effectiveness of Cannabis as Medicine

December 14, 2017 

Anna Hunt, Staff Writer

Cannabis legalization proponents have argued for years that the cannabis plant offers numerous medical applications. Now, the World Health Organization (WHO) has finally joined the bandwagon. ...


Recent Arrests Clear Way for Reform of Saudi Arabia and Its US Ties "IndyWatch Feed Tech"

Inasmuch as there is  a massive operation taking place in the USA that has so far produced 10,000 sealed indictments, it is reasonable that Trump's visit with the King provided much needed intelligence and been Saudi Arabia, the fallout is typically more direct.  something huge and historic is happening and the actual storm will be well over before anyone really knows anything.

The storm is very much happening under a cloud of total secrecy..

What has clearly happened in Saudi Arabia, is that Princes meddle and this has just blown up in their faces and they are all buying themselves out of sudden death.  It also appears radical Islam is now on the agenda as an enemy of the Saudis as well.

Again no one is actually talking, but the foot prints are Trumps and they are global..
Recent Arrests Clear Way for Reform of Saudi Arabia and Its US Ties
Arrested princes tied to subversive movements, terrorist support, and finances for US politicians
By Joshua Philipp, The Epoch Times
December 14, 2017 12:32 pm Last Updated: December 14, 2017 11:18 pm


How Strong is Your Intuition? It Might be the Highest Form of Intelligence "IndyWatch Feed Tech"


Understand that your intuition is the supercomputer operating every cell in your body.  When queried, it throws back a response.  It will be correct in terms of your query and that is not naturally rigorous and can become misleading.  Thus we use our brain to add structure to the query and to rigorously test the potential answer.  That is why it is not a sure thing.
In fact i learned a long time ago to master the art of defining the problem and to not worry much about the actual answer which can be counted on to present itself once you have done this even twenty years later.  Think about that for a moment.  By clearly defining a problem you allow the subconscious to order events and your life to solve the problem.
Thus i discovered how to build the Great Pyramid on time and on budget using only Bronze Age technology..

How Strong is Your Intuition? It Might be the Highest Form of Intelligence

By Liberty

Posted on December 14, 2017

Intuition is our first instinct; its what we feel right away before the mind has time to come in and consciously analyze.

Alanna Ketler, Collective Evolution

This article was inspired by one published in Forbes with the same title. Who would have ever expected to see Forbes, a finance publication, post something about intuition? This is a surefire sign that times really are changing.

So, if youre thinking, intuition has nothi...


European Patent Office Works With Blue Coat Systems, Enabler of Authoritarian Regimes "IndyWatch Feed Tech"

A Controversial Surveillance Firm Was Granted a Powerful Encryption Certificate
Reference: A Controversial Surveillance Firm Was Granted a Powerful Encryption Certificate

Summary: The European Patent Offices (EPO) controversial relationships with firms such as Control Risks and Blue Coat Systems are a reminder that its no ordinary institution and should not be regarded as law-abiding, either

THE EPOs business partnership with Blue Coat Systems isnt new to us. We have already covered it in the following older articles:

Its neither news nor a surprise that the EPO handles its own staff like authoritarian tyrants treat their citizens. At the EPO, for example, surveillance has already crept into workers private homes (e.g. medical visits).

Its neither news nor a surprise that the EPO handles its own staff like authoritarian tyrants treat their citizens.The following comments are worth adding in light of information we got (and never got around to publishing). The business relationship with Blue Coat Systems isnt entirely transparent; We couldnt find any tender notice in the relevant year/s concerning the provision of a staff study, either. Yet the EPO demands competitive bids for all sorts of services, such as providing Blue Coat hardware and software, carpets, folders, or customer surveys. These tenders typically get published in a Microsoft Web site, LinkedIn (as if the EPO cannot afford its own platform for such business purposes).

Judging based on tenders found on the EUs TED (Tender Electronic Daily) system*, the Blue...


EPO Surveillance in Scanners and Printers "IndyWatch Feed Tech"

Just something to be aware of

EFF printer spying

Summary: Tips for potential EPO whistleblowers, who we invite to send leaks; they use Office equipment and sometimes rely on making copies of internal documents

Whistleblowers of the EPO can take proactive/preventive measures to protect themselves.

One thing many people are not aware of is surveillance in scanners and printers. Reality Winner, an NSA-related whistleblower, made an error earlier this year. She sent a printed document, not knowing that pale yellow dots are embedded in every printout, containing information about the identity/location of printers. I had read about this years beforehand; its not information which is widely publicised and trying to decipher the encoding of the dots is still a subject which is shrouded in mystery.

We have a rough (but gradually-improved) idea about equipment at the EPO and how it is used (e.g. by the management and its secret police, the IU). According to the metadata we have seen before, an input file generated by insiders says how long ago it was created (e.g. months ago, weeks ago, which can help work out who was there and when) on some device with particular specifications, e.g. Xerox Color C60. Thats just something to bear in mind. We have various means/methods for removing such data. C60 sounds like the big iron models which would typically be used at the EPO*, so a correspondent should beware. Dont upload such material to public spaces like Google or Amazon.

The EPO does not always use the same printer/scanner model. In some cases, the document is tagged with a name or userid; if not, it may have been scanned elsewhere. Nowadays a badge is required to access the scanning options, a source told us, and you can only send the output to your own E-mail address.

Regarding colour, we dont know whether colour printing trickled down to the basic staff. In the older days, it used to be reserved for the management floors. So, herein clues may lie. Its something to be aware of. And unless we have additional knowledge as to the origin of documents, or several independent copies, in our opinion we should avoid posting the original documents in full/altogether. Sometimes we convert to HTML for these/similar reasons. Sometimes we intentionally distort screenshots (not content), in essence passing them through filters.



Google's Voice-Generating AI is Now Indistinguishable From Humans "IndyWatch Feed Tech"

A research paper published by Google this monthwhich has not been peer revieweddetails a text-to-speech system called Tacotron 2, which claims near-human accuracy at imitating audio of a person speaking from text.

The system is Google's second official generation of the technology, which consists of two deep neural networks. The first network translates the text into a spectrogram (pdf), a visual way to represent audio frequencies over time. That spectrogram is then fed into WaveNet, a system from Alphabet's AI research lab DeepMind, which reads the chart and generates the corresponding audio elements accordingly.

[...] The Google researchers also demonstrate that Tacotron 2 can handle hard-to-pronounce words and names, as well as alter the way it enunciates based on punctuation. For instance, capitalized words are stressed, as someone would do when indicating that specific word is an important part of a sentence.

[...] Unlike some core AI research the company does, this technology is immediately useful to Google. WaveNet, first announced in 2016, is now used to generate the voice in Google Assistant. Once readied for production, Tacotron 2 could be an even more powerful addition to the service.

However, the system is only trained to mimic the one female voice; to speak like a male or different female, Google would need to train the system again.

Original Submission

Read more of this story at SoylentNews.


Raw: Staff Union of the EPO Explains the Battistelli Operandi "IndyWatch Feed Tech"

Original/full: When Bush meets Machiavelli [PDF]

EPO and George Bush

EPO repression

Summary: The repression at the European Patent Office (EPO), in the words of the staff union which represents most employees and predates the EPO itself


Another Option for EPO Whistleblowers "IndyWatch Feed Tech"


Summary: New ProtonMail account provides another, potentially safer, option for submitting internal documents/communications to Techrights

OVER the holidays (Christmas and the period extending all the way to New Years Day) we help improve transparency at the EPO and show anyone the public included (not just insiders) what is/was happening inside the EPO. We decided that its important to have it permanently documented. Over time we may want to link back to older material in order to support particular assertions. A lot of this stuff deserves to be in the public domain; Battistelli is leaving in 6 months and his bad behaviour isnt something which as the metaphor goes he should take to the grave.

For those wishing to help the endeavours, theres now an E-mail address which is more secure than my own (self-hosted, but lacking end-to-end encryption except PGP). That address is

We remind people not to use real names.For anyone willing to anonymously disclose EPO-related documents, the ProtonMail address may be a more secure one to use. As always, we take the liberty to remove metadata or anything else which might give away identities. In over 11 years we have never betrayed or caused any trouble for a source (and we have had internal sources for over a decade, going back to the Novell days).

Additional details and advice were also published in:

We remind people not to use real names. We judge pseudonyms based on their track record and the substance. It is best for us not to know the real identity of submitters; we just need to know that the information/material is authentic. We do verify. We never...


34C3: Ultimate Apollo Guidance Computer Talk "IndyWatch Feed Tech"

While it might not be as exciting as the Saturn V rocket itself, the Apollo Guidance Computer (AGC) was one of the most important developments of the entire Apollo program. While comically underwhelming compared to modern hardware, the AGC was nothing short of revolutionary when it was developed in the 1960s. Before the AGC, the smallest computers were about the size of a refrigerator and consumed hundreds of watts; both big problems if youre trying to pack them into a relatively tiny space capsule with limited resources. Not only did the AGC get humanity to the Moon and back, but it also redefined the state of the art for microcomputers, paving the way for the desktop systems of the 1970s.

That said, the design and operation of the AGC is downright bizarre to modern eyes; it comes from a time of limitations we can hardly fathom. With this in mind, [Michael Steil] and [Christian Hessmann] put together The Ultimate Apollo Guidance Computer Talk for 34C3.

This hour-long presentation walks viewers through every aspect of not only the AGC itself, but how it interacted with the Saturn V rocket and the overall lunar mission. Even if you arent enough of a vintage computing aficionado to appreciate the complexities of core rope memory, the presentation gives a fascinating look at the gritty details of one of humanitys greatest achievements.



Eight Lawsuits Filed Against Apple Over iPhone Slowdowns "IndyWatch Feed Tech"

Apple defrauded iPhone users by slowing devices without warning to compensate for poor battery performance, according to eight lawsuits filed in various US federal courts in the week since the company opened up about the year-old software change. The tweak may have led iPhone owners to misguided attempts to resolve issues over the last year, the lawsuits contend.

All of the lawsuits filed in US District Courts in California, New York and Illinois seek class-action to represent potentially millions of iPhone owners nationwide. A similar case was lodged in an Israeli court on Monday, the newspaper Haaretz reported.

Apple did not respond to an email seeking comment on the filings.

The company acknowledged last week for the first time in detail that operating system updates released since "last year" for the iPhone 6, iPhone 6s, iPhone SE and iPhone 7 included a feature "to smooth out" power supply from batteries that are cold, old or low on charge. Phones without the adjustment would shut down abruptly because of a precaution designed to prevent components from getting fried, Apple said.

The disclosure followed a December 18 analysis by Primate Labs, which develops an iPhone performance measuring app, that identified blips in processing speed and concluded that a software change had to be behind them.

[...] The problem now seen is that users over the last year could have blamed an ageing computer processor for app crashes and sluggish performance and chose to buy a new phone when the true cause may have been a weak battery that could have been replaced for a fraction of the cost, some of the lawsuits state. "If it turns out that consumers would have replaced their battery instead of buying new iPhones had they known the true nature of Apple's upgrades, you might start to have a better case for some sort of misrepresentation or fraud," Boston University professor Rory Van Loo, who specialises in consumer technology law, said.

[...] The lawsuits seek unspecified damages in addition to, in some cases, reimbursement. A couple of the complaints seek court orders barring Apple from throttling iPhone computer speeds or requiring notification in future instances.

Previously: Two Class Action Lawsuits Filed After Apple Admits Slowing Down iPhones



Massive Reduction in U.S. Pastureland Possible "IndyWatch Feed Tech"

Rethinking how the US grows beef

As of now, cattle eat not only local pasture, but also grains, hay, and grass that is grown elsewhere and stored. A recent analysis by an international team of researchers looked into what would change if the US switched to sustainable ranching, in which cattle eat only from local grasslands and agricultural byproducts.

It turns out that the current amount of pastureland in the US could only support 45 percent of our current beef production and consumption. This admittedly narrow definition of sustainability relies on feeding cows more agricultural byproducts, which, as of now, account for only about 10 percent of their diet; the scientists note that, "despite the recent doubling of distillers' grain utilization," these byproducts are still plentiful.

If we were to cut the pastureland that ranchers currently use in half, that would diminish beef availability to... 43 percent of current values, rather than 45. So freeing up about 135 hectaresalmost a quarter of our national surface area, and twice the size of Francewould decrease beef availability by only two percentage points.

Most of this is not especially productive grassland, and it could be rewilded or conserved. But some of it is high-quality cropland that could be used to grow other food sources, like pork, poultry, grains, legumes, vegetables, and even dairy. All of these utilize less water and fertilizer than beef while emitting fewer greenhouse gases. In addition, they provide us with more calories, fiber, micronutrients, and even protein than the beef they'd supplant. The only thing we'd be missing is vitamin B12, for which the authors of this analysis offer a quick fix: take a pill.

A model for 'sustainable' US beef production (open, DOI: 10.1038/s41559-017-0390-5) (DX)

Original Submission

Read more of this story at SoylentNews.


Learning ARM assembly with visUAL "IndyWatch Feed Tech"

Learning assembly is very important if you want to get a grasp of how a computer truly works under the hood. VisUAL is a very capable ARM emulator for those interested in learning the ARM assembly.

The GUI: A simply program to ADD two numbers

In addition to supporting a large subset of ARM instructions, the CPU is emulated via a series of elaborate and instructive animations that help visualise the flow of data to/from registers, any changes made to flags, and any branches taken. It also packs very useful animations to help grasp some of the more tricky instruction such as shifts and stack manipulations.

As it is was designed specifically to be used as teaching tool at Imperial College London, the GUI is very friendly, all the syntax errors are highlighted, and an example of the correct syntax is also shown.



Apple Lisa Source Code Recovered, to be Released in 2018 by Computer History Museum "IndyWatch Feed Tech"

Source code for Apple's legendary Lisa operating system to be released for free in 2018

You'll soon be able to take a huge trip down memory lane when it comes to Apple's computer efforts. The Computer History Museum has announced that the source code for the Lisa, Apple's computer that predated the Mac, has been recovered and is being reviewed by Apple itself...

The announcement was made by Al Kossow, a Software Curator at the Computer History Museum. Kossow says that source code for both the operating system and applications has been recovered. Once that code is finished being reviewed by Apple, the Computer History Museum will make the code available sometime in 2018.

While you've been able to run emulators of the Lisa operating system before, this is notable as it's not just a third-party hack solution, but rather Apple is directly involved and the full code will be available for everyone.

Apple Lisa.

Original Submission

Read more of this story at SoylentNews.


My Twitter was hacked, claims John McAfee "IndyWatch Feed Tech"

My Twitter was hacked, claims John McAfee

Security veteran John McAfee says that his Twitter account was hacked, and that's why he's turned OFF two-factor authentication.


Record-breaking hybrid drone stays aloft for over four hours "IndyWatch Feed Tech"

Drone technology is getting better all the time, and one area folks are putting a lot of energy into is boosting the amount of time the things can stay in the air. Drone manufacturer Quaternium is claiming a new milestone in this field, after flying its HYBRiX.20 fuel-electric quadcopter for four hours and forty minutes in what it describes as a world record flight for a self-powered multicopter.

Most multicopter drones you can buy off the shelf boast flight times of 25 to 30 minutes, though we have seen custom-built multicopters fly for far longer. Last year, for example, a commercial drone operator used a bespoke quadcopter to cross the English channel in a 72-minute jaunt, while others such as dronemaker Skyfront have previously claimed endurance records well in excess of four hours.


Uber closes multibillion-dollar deal with SoftBank "IndyWatch Feed Tech"

Uber reached a multibillion-dollar deal with SoftBank on Thursday, as the ride-hailing company prepares to go public.A group of Uber shareholders that owns high volumes of company equity agreed to sell a significant stake to SoftBank, a...


34C3: Hacking into a CPUs Microcode "IndyWatch Feed Tech"

Inside every modern CPU since the Intel Pentium fdiv bug, assembly instructions arent a one-to-one mapping to what the CPU actually does. Inside the CPU, there is a decoder that turns assembly into even more primitive instructions that are fed into the CPUs internal scheduler and pipeline. The code that drives the decoder is the CPUs microcode, and it lives in ROM thats normally inaccessible. But microcode patches have been deployed in the past to fix up CPU hardware bugs, so its certainly writeable. Thats practically an invitation, right? At least a group from the Ruhr University Bochum took it as such, and started hacking on the microcode in the AMD K8 and K10 processors.

The hurdles to playing around in the microcode are daunting. It turns assembly language into something, but the instruction set that the inner CPU, ALU, et al use was completely unknown. [Philip] walked us through their first line of attack, which was essentially guessing in the dark. First they mapped out where each x86 assembly codes went in microcode ROM. Using this information, and the ability to update...


HPR2455: Interface Zero RPG Part 5 "IndyWatch Feed Tech"

An extra-long episode of the grand finale of the Interface Zero RPG play-through. Spoilers: Chaiwei dies in combat and Syd runs off with Tina. At the end of the show are all the credits containing sound effects and source materials. Here they are in text form. Sound effects were taken from Thanks to the following artists: interfacezero/muzak/70891__spukkin__trumpetmetal.wav interfacezero/muzak/212926__simongray__mojo-cafe-nr-wagamama.flac interfacezero/muzak/243629__lebcraftlp__heavy-rain.flac interfacezero/muzak/382735__schots__gun-shot.flac interfacezero/muzak/186104__marcel-farres__elevator.flac interfacezero/muzak/187866__theomegapixel__metal-grind.flac interfacezero/muzak/66713__sunnysidesound__desk-pound.wav interfacezero/muzak/367222__bluedelta__thunder-rain-low-frequencies-4-channel-48khz.wav interfacezero/muzak/212678__fridobeck__firework-explosion-1.wav interfacezero/muzak/213610__dpoggioli__laser-gun-explosion.wav interfacezero/muzak/100772__cgeffex__huge-rocket-launcher.wav interfacezero/muzak/336735__newagesoup__double-explosion-bright-dark.wav interfacezero/ep2/329877__klavo1985__music-of-the-black-circus-the-very-best-by-kris-klavenes.flac interfacezero/ep2/94914__pcaeldries__lakeside2.flac interfacezero/ep2/153376__inchadney__the-bay.flac interfacezero/ep3/152396__taavi55__big-smash.ogg interfacezero/ep3/135465__joelaudio__quick-smash-001.wav interfacezero/ep3/387177__pfranzen__smashing-a-glass.ogg Music Lyphrygerator and Wood/Water by William Kenlon, used with permission. All other music by Klaatu. Story Want to play this game yourself? Pathfinder and Starfinder are by Paizo Interface Zero module available from Adventure path Job inSecurity is available from The source of the story is available from Editor's note 2017-12-28: link added from comments.


More Pregnant Women Are Using Cannabis "IndyWatch Feed Tech"

Pregnant women are increasingly using cannabis, according to two studies published this year:

More pregnant women seem to be using pot -- sometimes to ease the nausea of morning sickness or heightened anxiety -- and a new study suggests that this slight rise in marijuana use is most pronounced among those younger in age. The prevalence of marijuana use among a sample of moms-to-be in California climbed from 4.2% to 7.1% from 2009 through 2016, according to a research letter published in the journal JAMA on Tuesday [DOI: 10.1001/jama.2017.17225] [DX]. Among pregnant teens younger than 18, marijuana use climbed from 12.5% to 21.8%, and among women 18 to 24, marijuana use climbed from 9.8% to 19%, the researchers found.

That research involved only certain women in California, but a separate study of pregnant women across the United States, published in JAMA [open, DOI: 10.1001/jama.2016.17383] [DX] in January, found that those who reported using marijuana in the previous month grew from 2.37% in 2002 to 3.85% in 2014. The women were 18 to 44.

Doctors caution that the health effects of marijuana on a fetus remain unclear but could include low birth weight and developmental problems [DOI: 10.1097/CHI.0b013e318160b3f0] [DX], according to the US Centers for Disease Control and Prevention. Many of the chemicals in marijuana, like tetrahydrocannabinol, known as THC, could pass through a mother's system to her baby. The American Congress of Obstetricians and Gynecologists recommends that "women who are pregnant or contemplating pregnancy should be encouraged to discontinue marijuana use" and "to discontinue use of marijuana for medicinal purposes in favor of an alternative therapy." Additionally, "there are insufficient data to evaluate the effects of marijuana use on infants during lactation and breastfeeding, and in the absence of such data, marijuana use is discoura...

Go Back:30 Days | 7 Days | 2 Days | 1 Day

IndyWatch Science and Technology News Feed Today.

Go Forward:1 Day | 2 Days | 7 Days | 30 Days

Thursday, 28 December


Apple apologizes for iPhone slowdowns, will slash battery replacement fee "IndyWatch Feed Tech"

Apple apologized to customers for deliberately slowing down older iPhones as their batteries age, in a letter it released on Thursday.We know that some of you feel Apple has let you down. We apologize, the Cupertino, Calif.-based firms...


U.S. Research Reactors Could Switch to Low-Enriched Uranium-Molybdenum Fuel "IndyWatch Feed Tech"

Nuclear research reactors around the country, including the Massachusetts Institute of Technology Reactor (MITR), could switch to a low-enriched uranium fuel:

The preliminary report on uranium-molybdenum (U-Mo) monolithic fuel contains data about the performance of the new fuel in a reactor and how it perfoms under a variety of conditions.

The international community is working to minimise amounts of HEU material, which could potentially be used for nuclear weapons. To that end, programmes are under way to convert research reactors to the use of LEU fuel, which does not present a proliferation risk. In some cases - including six high-performance research reactors in the USA - this can mean designing a new LEU fuel.

Original Submission

Read more of this story at SoylentNews.



Pizzagate and Beyond: Using Social Research to Understand Conspiracy Legends "IndyWatch Feed Tech"

IT HAPPENED less than a year ago. On December 4, 2016, customers were sitting down for a Sunday afternoon meal in the Washington, D.C., pizzeria Comet Ping Pong. Known locally for its quirky atmosphere, live music, and of course its ping pong, on this day the restaurant would make national headlines. Shortly before 3 PM, a man walked in bearing an assault rifle. The man took aim in the direction of one employee, who quickly fled, before discharging his firearm. Law enforcement promptly responded to calls, and officers were able to take the man into custody without further incident. They found two firearms on the suspect and another in his vehicle. Fortunately no one was hurt, but the event has left many people shaken, and not only for the obvious reasons. The accused had apparently not intended to commit a mass shooting, nor had he intended to rob the restaurant. The truth, such as it is, turned out to be quite strange nonetheless.

The accused shooter was twenty-eight-year-old Edgar Maddison Welch, a father of two daughters and resident of Salisbury, North Carolina. After his arrest, he told police that he had made the 350-mile drive up to the capital to investigate claims regarding a conspiracy theory, circulating online, that quickly came to be called Pizzagate (Metropolitan Police Department 2016). According to this outlandish set of claims, leaked emails from Hillary Clintons campaign manager, John Podesta, contained coded signs and messages revealing that Comet Ping Pong was actually a front for an occult, child sex slave ring involving the owner of the restaurant, James Alefantis, Podesta, and Clinton herself. For several days before the presidential election, claims of this sort proliferated across the Internet. Alefantis and his employees began receiving menacing messages via social media, including overt death threats (Kang 2016). The events seemed to reach a climax with Welchs misadventure. He subsequently told police that his intention was to investigate these claims in person and, if he found them to be true, rescue the children held captive there.

This story is admittedly bizarre in many ways, and learning more about the shooters motivations does not seem to shed much light on it. Likewise, while others have documented the origins and spread of the groundless Pizzagate conspiracy theory (e.g., Kang 2016), neither does this mapping necessarily help us understand how something so ludicrous found traction in a surprisingly wide audience, nor why it would motivate anyone to investigate in person. These eventspreposterous as they arecan be understood by applying well-established lessons from social research.

First, there is the peculiar nature of the conspiracy theory...


Tips for an Information Security Analyst/Pentester career - Ep. 48: Web application pentesting "IndyWatch Feed Tech"

This post will deal with web application pentesting.

For this post, I'm going to use a vulnerable web app included in Georgia Weidman's book (within its additional files), based on IIS and SQL Server 2008.

I'm going to use BurpSuite to intercept and manipulate web requests.


Let's start out by inserting a single quote symbol in the login field. If any input validation were in place, nothing should happen, because the single quote wouldn't be an allowed character.

There's no reason why you should have such character in a login field, you should be allowed letters, numbers and specific characters such as dashes and underscores only.

Instead, lo and behold, we get a very nice error message, returning useful information about the back-end database.

Thank you, webmaster!

By entering a SQL injection in the login field (see video for more details), we can login as user Mike, very likely the first user in the database.

If we go to Profile/View Newsletters, we notice another handy input field, where can we look for the latest newsletter.

Intercepting the GET request with BurpSuite, we notice that each user has a newsletter, stored in a folder that's personal for each individual user.

The newsletter functionality seems to grab the newsletters from the local filesystem by using absolute paths.

Furthermore, it seems to be using the directory C:\inetpub\wwwroot\Book, instead of bookservice, as we...


Becoming Fantastic: Why Some People Embellish Their Already Accomplished Lives with Incredible Tales "IndyWatch Feed Tech"

There is no shortage of stories from impressive people attesting to the reality of UFO technology or extraterrestrial bodies held in secret at Wright-Patterson Air Force Base, or near Area 51 or elsewhere (Dolan 2014, 152).

It started with a simple question: Why would otherwise successful, professional people with long, prosperous careers tell wild tales? Why would someone of good reputation, education, and a gainful career embellish their record with incredible adventures? Why would, say, a retired lieutenant colonel with numerous high-level accomplishments in his career, awarded numerous medals and praises from superior officers, why would he upon retirement, start telling people he was part of a team that analyzed the wreckage of a crashed UFO? And why go through the elaboration with painted-in details, citing documents and naming others who were involved? Why would he do this if it were not true?

It seems to me that as someone gains credibility, status, and a reputation, he or she would become less inclined to puff themselves up with fantastic tales. Why risk losing it all by going off the reservation and telling incredible narratives? Why would someone do that?

Philip J. Corso, in my opinion, is someone who had an impressive resume. According to his DA Form 66, he was a U.S. Army battalion commander for a time and Chief of the Foreign Technology Division. He was granted numerous awards and decorations and served in World War II and Korea. He then retired March 1, 1963 (Phillip J. Corso 2016). But in 1997, he published The Day After Roswell where he claimed that when he worked with the Foreign Technology Division, not only did he divvy up Russian and German tech to private companies for back engineering, but he also sent out parts of the UFO Roswell crash as well.

Why would a man of his prestige say such a thing if it were not true?

Philip J. Klass has already taken Corso to task on the book, noting several glaring errors such as Corsos claim that the U2 flights over Russia were, in part, to see if they could fire on us by provoking them and to see if Russia had obtained UFO technology. But most important, he challenged Corso on his claim that the Roswell wreckage sat unattended for fourteen years until he was allegedly put in charge by General Trudeau. Klass notes:

(Choosing) Corso for this task is surprising because Corso did not have even a bachelors degree in science or engineering. (He had majored in Industrial Arts at a teachers college prior to being drafted in 1942.) One would expect Trudeau, or one of his predecessors, to have thought of turning the Roswell debris over to some of the many very competent scientis...


Ergonomic Keyboard Designed from the Ground Up "IndyWatch Feed Tech"

In 2011, [Fabio] had been working behind a keyboard for about a decade when he started noticing wrist pain. This is a common long-term injury for people at desk jobs, but rather than buy an ergonomic keyboard he decided that none of the commercial offerings had all of the features he needed. Instead, he set out on a five-year journey to build the perfect ergonomic keyboard.

Part of the problem with other solutions was that no keyboards could be left in Dvorak (a keyboard layout [Fabio] finds improves his typing speed) after rebooting the computer, and Arduino-based solutions would not make themselves available to the computers BIOS. Luckily he found the LUFA keyboard library, and then was able to salvage a PCB from another keyboard. From there, he programmed everything on a Teensy microcontroller, added an OLED screen, and soldered it all together (including a set of Cherry MX switches).

Of course, the build wasnt truly complete until recently, when a custom two-part case was 3D printed. The build quality and attention to detail in this project is impressive, and if you want to roll out your own [Fabio] has made all of the CAD files and software available. Should you wish to incorporate some of his designs into other types of specialized keyboards, there are some ideas floating around that will surely improve your typing or workflow.

Filed under: computer hacks


Apple CEO Tim Cook, top execs get pay raise "IndyWatch Feed Tech"

Apple gave CEO Tim Cook and other top executives a large pay raise this year, according to a Securities and Exchange Commission (SEC) filing on Wednesday.Cooks total compensation for 2017 jumped to $12.8 million a roughly 47 percent increase...


Court Challenges to NSA Surveillance: 2017 in Review "IndyWatch Feed Tech"

One of the governments most powerful surveillance tools is scheduled to sunset in less than three weeks, and, for months, EFF has fought multiple legislative attempts to either extend or expand the NSAs spying powerswarning the public, Representatives, and Senators about circling bills that threaten Americans privacy. But the frenetic, deadline-pressure environment on Capitol Hill betrays the slow, years-long progress that EFF has made elsewhere: the courts.

2017 was a year for slow, procedural breakthroughs.

Here is an update on the lawsuits that EFF and other organizations have against broad NSA surveillance powers.

Jewel v. NSA

EFF began 2017 with significant leverage in our signature lawsuit against NSA surveillance, Jewel v. NSA. The year prior, U.S. District Court Judge Jeffrey White in Oakland, California, ordered the U.S. government to comply with EFFs discovery requestswhich are inquiries for evidence when lawsuits advance towards trial. In several lawsuits, this process can take months. In Jewel v. NSA, simply allowing the process to begin took eight years.

This year, EFF waited expectantly for the U.S. government to provide materials that could prove our plaintiff was subject to NSA surveillance through the agencys practice of tapping into the Internets backbone to collect traffic. But expectations were tempered. The U.S. governments lawyers missed the discovery deadline, asked for an extension, and were given a new, tentative deadline by the judge: August 9, 2017.

The U.S. governments lawyers missed that deadline, and asked for an extension, approved by the judge: October 9, 2017.

The U.S. governments lawyers missed that deadline, and asked for another extension, this time indefinitely.                                                          

Producing the materials, the government attorneys claimed, was simply too difficult to do on a timely basis.

[T]he volume of documents and electronic data that the government defendants must review for potentially responsive information is massive, the attorneys wrote.

EFF strongly opposed the governments request for an indefinite extension, and suggested a new...


Pulsars Could Host "Habitable" Exoplanets With Thick Atmospheres "IndyWatch Feed Tech"

Despite the harsh radiation released by pulsars, exoplanets orbiting them may be "habitable" if their atmospheres are thick enough:

The most exciting exoplanet finds are those that orbit within their host star's habitable zone, an area at just the right distance from the star to allow for liquid surface water and thus, potentially life. The paper's authors, two astronomers at Leiden Observatory in the Netherlands, suggest that pulsars have their own habitable zones surprising, given the harsh X-rays and other radiation that such stars emit.

But, if a planet is big enough some one to 10 times Earth's mass and it has an atmosphere at least 1 million times as thick as Earth's, then it might just cut it as habitable even around a pulsar. The idea is that the enormous atmosphere would act as a shield for the planet's surface, absorbing the deadly radiation while still allowing for enough heat to melt water. And a bigger world, preferably with a decent magnetic field, is necessary to hold on to that atmosphere over long enough time scales.

It doesn't sound like complex life would make the cut.

Neutron star planets: Atmospheric processes and irradiation (open, DOI: 10.1051/0004-6361/201731102) (DX)

Of the roughly 3000 neutron stars known, only a handful have sub-stellar companions. The most famous of these are the low-mass planets around the millisecond pulsar B1257+12. New evidence indicates that observational biases could still hide a wide variety of planetary systems around most neutron stars. We consider the environment and physical processes relevant to neutron star planets, in particular the effect of X-ray irradiation and the relativistic pulsar wind on the planetary atmosphere. We discuss the survival time of planet atmospheres and the planetary surface conditions around different classes of neutron stars, and define a neutron star habitable zone based on the presence of liquid water and retention of an atmosphere. Depending on as-yet poorly constrained aspects of the pulsar wind, both Super-Earths around B1257+12 could lie within its habitable zone.

Original Submission



Sound Waves can Help Hackers Disrupt Functions of Hard Disk Drives "IndyWatch Feed Tech"

By Waqas

Hard Disk Drives (HDDs) are most commonly used storage components

This is a post from Read the original post: Sound Waves can Help Hackers Disrupt Functions of Hard Disk Drives


UPC IT Working Group is Chasing Rainbows and Unicorns "IndyWatch Feed Tech"

Team UPC continues dumping money into software that wont be used by anybody

Unitary Patent unicorn

Summary: Bristows, one of the most misleading parties among Team UPC, maintains the illusion that Unitary Patent is just around the corner; in reality, the whole thing comes tumbling down along with the EPC

On 22 December 2017, Bristows Luke Maunder wrote today about the dead-end UPC, Dario Pizzolante, the Coordinator of the IT Working Group, reported by email on its work on establishing the Unified Patent Court (UPC) IT system.

But what kind of progress can there possibly be when the UPC is stuck in the middle of nowhere? He says work will continue during 2018 in preparation for the opening of the Court.

Got to maintain the illusion of progress

They might as well stop development and cease investment of money in it as nobody is going to use it.Someone must be delusional because, as we explained yesterday, its unlikely that any concrete progress will be made next year. They might as well stop development and cease investment of money in it as nobody is going to use it. Theres a very serious constitutional complaint in Germany right now and the latest scandal implicating Battistelli and the Boards of Appeal will certainly reinforce this complaint. Earlier this week someone wrote: Im not sure if the EPC says what happens if the President disobeys an order (eg to publish a decision) from the Enlarged Board.

Soon came this reply: The President did not disobey any order. It was the AC that decided that there would be no publication.

If true, its another new scandal in the making. As another comment put it today:

Interesting. Is there any publicly available documen...


Artificial Intelligence Experts Warn of Social Upheaval "IndyWatch Feed Tech"

Experts in artificial intelligence say the world is unprepared for the enormous changes automation is bringing to the global economy. Some say artificial intelligence could help us create an almost perfect world. But they also warn it could lead to the collapse of democracy and civilisation within a generation. Al Jazeeras Laurence Lee reports from London.

Source: Al Jazeera English


Coaxing Light From Graphene "IndyWatch Feed Tech"

How a research institute near Barcelona exploits graphenes potential in light-based technologies to advance 5G efforts Photo: ICFO

Camera Photo: Daniel Bartolom/ICFO The first graphene-quantum dot based CMOS integrated camera developed by ICFO.

One day this past September, I found myself on a shuttle bus heading 20 minutes outside the center of Barcelona to the Institut de Ciencies Fotoniques, or ICFO (Institute of Photonic Sciences).

After five years of covering the groundbreaking photonics research coming out of this relatively small research institute nestled in the northeast corner of Spain, I figured it was time to visit the people and the facility that has had everyone buzzing since its participation at the 2016 GSMA Mobile World Congress. At this event, held in Barcelona that year, the worlds mobile network and device companies recognized that ICFO was offering a potential solution to a technological showstopper to the rollout of 5G networks: data centers that consume too much energy and dont offer enough bandwidth.

At the Mobile World Congress, ICFO exhibited a prototype of a graphene-based integrated transceiver that could significantly reduce the power consumption of data centers, shrink their footprint, and increase their bandwidth. This has since led mobile companies such as Ericsson, Nokia, and Alcatel to support to ICFOs research through their participation in the European Unions US $1 billion research effort in all things graphene, known as the Graphene Flagship.

Frank Koppens Photo: ICFO Frank Koppens

Were building an integrated transceiver fully packaged with 100-gigabyte-per-second data transfer, said Frank Koppens, the leader of the quantum nano-optoelectronic group at ICFO, when we spoke at his offices at the ICFOs...


Raw: Lies Inside the EPO Gazette "IndyWatch Feed Tech"

Original/full: Clarification on untrue allegations in the July issue of the Gazette [PDF]

Meetings with lodie Bergot

Summary: lodie Bergots imaginary events and statements which are neither true nor [..] bear any resemblance to the facts. (it happened on other occasions)


The Supreme Court Finally Takes on Law Enforcement Access to Cell Phone Location Data: 2017 in Review "IndyWatch Feed Tech"

Protecting the highly personal location data stored on or generated by digital devices is one of the 21st centurys most important privacy issues. In 2017, the Supreme Court finally took on the question of how law enforcement can get ahold of this sensitive information.

Whenever you use a cell phone, whether to make calls, send or receive texts, or browse the Internet, your phone automatically generates cell site location information (CSLI) through its interactions with cell towers. This means that cell providers like AT&T, Verizon, and T-Mobile have records of everywhere your phone has been, going back months and even years. And since almost everyone has a cell phone, cell providers have these records for nearly everyone.

The government has long argued that it doesnt need a warrant to obtain CSLI from cell providers because of two 1970s Supreme Court cases, Smith v. Maryland and United States v. Miller. Smith and Miller are the basis for the Third Party Doctrine, which holds that information you voluntarily share with a third partysuch as deposit and withdrawal information shared with banks (Miller) or numbers dialed on a phone shared with the phone company (Smith)isnt protected by the Fourth Amendment because you cant expect that third party to keep the information secret.

For years, courts around the country have been deeply divided on whether the Third Party Doctrine should apply to CSLI or whether the invasiveness of long term monitoring it enables should require a more privacy-protective rule. EFF has been involved in almost all of the significant past cases on this issue.

In June, the Supreme Court agreed to consider that question in Carpenter v. United States. In Carpenter, the government obtained 127 days of the defendants cell phone records from MetroPCSwithout a warrantto try to place him at the locations of several armed robberies around Detroit. As in other cases, the government argues that Mr. Carpenter had no reasonable expectation of privacy in these records, which it claimed were simultaneously incriminating but not precise enough to reveal his exact location and movements over those 127 days.

EFF filed briefs both...


Raw: EPO Stonewalled Staff Committee, Failing to Reply to About 30 Letters in Succession "IndyWatch Feed Tech"

Original/full: Letter from the Central Staff Committee [PDF]

Stonewalling the Central Staff Committee

Summary: Desmond Radford, the Chairman of the Central Staff Committee at the time, explained how one-sided dialogue with Battistelli really was for a number of years (Battistelli did not respond, instead he had spread highly misleading messages to staff, e.g. [1, 2])


Hackaday Superconference Talk: Cory Grosser "IndyWatch Feed Tech"

When we look at a product or project here at Hackaday it is likely that our interest has been caught by its internal technology, or perhaps by its functionality. It is easy to forget that there is another angle to each and every item that graces these pages, and it is every bit as important as those we have already mentioned. Aesthetic design, the look and feel of a product, is something that is so often overlooked.

One of the speakers at the Hackaday Superconference was [Cory Grosser], one of Americas leading independent product designers, and the designer of the Supplyframe Design Lab in which the Superconference was being held. In his talk he covered some of the principles of design, touching on its psychology and its purpose in creating a successful product. In doing so he delivered a fascinating talk full of insights into the design of products both famous and somewhat obscure.

The Spoon and the Smartphone

Cory starts by asking the question: does form follow function? His examples were well-chosen, a spoon and a smartphone.

The function of the spoon is easy to define, but the smartphone has hundreds if not thousands of functions and thus its form is not dictated by them in particular. Design can be defined in terms of psychology, identifying instinctive, rational, and narrative influences in a nuclear flask designed to signify danger, a classic Honeywell thermostat, and a wine storage product inspired by a bowling ball.

Emotion has a huge influence on design, particularly in engineering a design that will be sold to its users. Cory details the Philipe Starck Alessi lemon squeezer, the first iPod, and then Apples iconic adverts featuring their then-unique white earbuds. Products that you want to own despite your perhaps having little use for them, and products that create a tribe around their ownership.

What is the Context of the Design?

Perhaps the most interesting point he made though was that there is sometimes an emphasis on design for its own sake as in fulfilling a particular purpose associated with its object, as opposed to design for the sake of style. He told us There is nothing wrong with style, and took us through the car industry as a particular example of one in which style is a crucial element of the success of a product. He split the effect of design in this context into the visceral, the reflective, and the rational. As examples, he looked at his instantaneous reaction of desire to a sportscar, and then at how Volkswagen had taken an unattractive and...


How Linux Performance Changed In 2017 With Clear Linux & Ubuntu "IndyWatch Feed Tech"

The latest in our streak of year-end benchmarking is seeing how Linux performance has evolved over the course of 2017. For that we tested Intel's performance-optimized Clear Linux distribution as well as Ubuntu using releases from the start of the year to their current state for seeing how the performance compares using the same system.


Hackers are attempting to breach Magento stores through the Mirasvit Helpdesk extension "IndyWatch Feed Tech"

The cybersecurity expert Willem de Groot reported cyber attacks against Magento websites running the popular helpdesk extension Mirasvit Helpdesk.

de Groot observed attackers sending a message like this to Magento merchants:

Hey, I strongly recommend you to make a redesign! Please contact me if you need a good designer!

The message contains a specially crafted sender that triggers an XSS attack.

Upon closer examination, the message contains a specially crafted sender that contains an XSS attack: an attempt to take control of the backend of a Magento store (archived copy here):

This exploits a flaw in the popular Mirasvit Helpdesk extension. When a helpdesk agent opens the ticket, it will run the code in the background, in the browser of the agent. wrote de Groot.

When a helpdesk agent opens the ticket, it will run the code for the XSS attack in the background, then a malicious code is added to the footer of the Magento template. In this way, the attacker is able to get its code executed on any page accessed by visitors. The malware used in the attacks spotted by the expert was designed to intercept payments data and send it offshore as the customer types it into the payment form.

Ultimately, the malware intercepts payments data and send it offshore as the customer types it into the payment form. de Groot added.

This attack is particularly sophisticated, as it is able to bypass many security measures that a merchant might have taken. For example, IP restriction on the backend, strong passwords, 2-Factor-Authentication and using a VPN tunnel will not block this attack.



Raw: Battistelli Threatened EPO Staff Representatives as They Walked Out "IndyWatch Feed Tech"

Original/full: Document from the EPOs Central Staff Committee [PDF]

Threat to staff representatives

Summary: EPO staff representatives complained about intrusive Investigation Guidelines, contempt for Internal Appeal Committees recommendations, censorship, attacks on freedom of association, curtailment of strike rights, and threats to hundreds of staff.


Federal Agents Found Preserved Fetuses During 2013 Raid of a Detroit Body Broker's Warehouse "IndyWatch Feed Tech"

Exclusive: Federal agents found fetuses in body broker's warehouse (Warning: Graphic images)

Federal agents discovered four preserved fetuses in the Detroit warehouse of a man who sold human body parts, confidential photographs reviewed by Reuters show. The fetuses were found during a December 2013 raid of businessman Arthur Rathburn's warehouse. The fetuses, which appear to have been in their second trimester, were submerged in a liquid that included human brain tissue. Rathburn, a former body broker, is accused of defrauding customers by sending them diseased body parts. He has pleaded not guilty and his trial is set for January.

How Rathburn acquired the fetuses and what he intended to do with them is unclear. Rathburn's lawyers did not respond to requests for comment, and neither the indictment nor other documents made public in his case mention the fetuses.

"This needs to be reviewed," said U.S. Representative Marsha Blackburn, a Republican from Tennessee who recently chaired a special U.S. House committee on the use of fetal tissue. Blackburn recoiled when a Reuters reporter showed her some of the photographs, taken by government officials involved in the raid.

Reuters: The Body Trade

Original Submission

Read more of this story at SoylentNews.


NASA Planning Mission to Alpha Centauriin 2069 "IndyWatch Feed Tech"

NASA is prepping for a trip to the nearby three-star Alpha Centauri systemin 2069.

Thats my kind of advanced planning.

The mission, first announced by New Scientist, would include a 44-year-long expedition to an exoplanet in search of signs of life. Assuming NASAs Jet Propulsion Laboratory (JPL) can figure out how to travel at a tenth of the speed of light.


Raw: A Vote on Strike Action Has Turned Into a Vote of Non-Confidence. "IndyWatch Feed Tech"

Original/full: SUEPO on LIFER initiative [PDF]

EPO strike numbers

Summary: The high levels of dissatisfaction among EPO staff, including managers who voted in favour of a strike


Raw: Bergot and Topi Sent Threats to Hundreds of EPO Staff as Far Back as Half a Decade Ago "IndyWatch Feed Tech"

MoU signed by Bergot

Summary: As little as a few months after Topi had been brought to the EPO (along with the incredible promotion to grade A6 of the wife of Battistellis longtime colleague) a campaign of intimidation began at the EPO

Date: 08.10.2013

Meeting with the President on 10 October 2013

Dear Mr Battistelli,

An overwhelming majority of Staff has voted in favour of the strikes, as called for in the LIFER initiative. You have now published the relevant information on intranet. In case this is not already being organized, we take the liberty of reminding you to activate the online DG4 strike registration, too.

The CSC, and the local Staff Committees, were not responsible for the LIFER initiative. We have only seen it as our duty under Art. 34 to channel to you the concerns of staff, and forward to you the letter of the LIFERs (whose call for strike has been supported by 4181 staff, i.e. more than 90% of the voters).

Please understand that neither the CSC nor any of the local Staff Committees have a mandate to represent the LIFER people in this matter. Contrary to what you state, we did not propose to represent the staff in leading the actions related to the strike. We have to decline any negotiating role on behalf of LIFER, but we will continue to do our best to contribute to the smooth running of the office, as is our duty under Art. 34.

It will not have escaped your attention that the LIFER claims overlap with those of an independent union, SUEPO. This is not a coincidence: it is a clear expression of a problem. The CSC itself has attempted on several occasions to address the matter with you (in particular in respect of free

The CSC cannot speak for LIFERs or represent independent Unions, but on behalf of the EPO staff we would be willing to exchange views on the problems underlying the staff discontent, which has attained a level unprecedented in the history of the EPO. Be aware, though, that

discussing with us will not mean that the LIFER claims are met, and that Staff will no longer have cause to strike. If you want to avoid strikes, you have to meet all of their claims. Previous actions have been called by SUEPO and their termination would have to be negotiated with SUEPO.

We note your invitation to a meeting on 10 October. Questions of representation aside, we remind you that...


Wlroots Is A New, Modular Wayland Compositor Library "IndyWatch Feed Tech"

Drew DeVault who is the lead developer of the i3-compatible Sway Wayland compositor has introduced wlroots as a new modular Wayland compositor library...


Raw: LIFER Strike at the European Patent Office (EPO) "IndyWatch Feed Tech"


Summary: Before the escalation of EPO scandals Battistelli threatened anew to restructure the Staff Representation challenging its functioning, says the Central Staff Committee

Meeting with the President

The President invited a delegation of the CSC to discuss the conflict issues underlying the current planned strike actions.

The meeting began in a tense atmosphere maintained so until the end. The President addressed the five strike issues covered by the acronym LIFER (Legal Protection Investigation Guidelines Fair Strike Regulations E-mail freedom to communicate Repair the career system by removing the bottleneck to promotions). No single concrete progress can be reported on any of the above five issues.

The proposal of the SR to withdraw or suspend any of the contentious decisions was rejected by the President. In respect of the Investigation Guidelines and the Legal Protection issues the President dismissed the proposal by the SR to set up independent committees of legal experts entrusted to review the existing provisions. He also refused to withdraw the disciplinary threats against staff and their representatives. Furthermore, he threatened anew to restructure the Staff Representation challenging its functioning.

The only move which can be reported is a proposal from the President to discuss individual provisions of the current strike regulations. Unfortunately he is neither prepared to propose amendments to the Council nor to suspend the effects of Circ. 347.

We regret that the President seems to not have understood the clear message of staff.

Your Delegates of the Central Staff Committee


Falcon Heavy raised on pad 39A for first time "IndyWatch Feed Tech"

SpaceXs first Falcon Heavy rocket, made up of two previously-flown Falcon 9 boosters and a beefed up central core stage, made the trip to launch pad 39A at NASAs Kennedy Space Center in Florida and was raised vertical Thursday for testing ahead of its first liftoff next month.

The fully-assembled 229-foot-tall (70-meter) rocket will be the most powerful in the world when it blasts off, and Thursdays arrival atop pad 39A marks a major step toward readying the Falcon Heavy for flight.

SpaceX engineers are expected to conduct a fit check and complete other tests at pad 39A this week, followed by a hold-down firing of all 27 first stage engines some time after New Years Day. The company has not set a target date for the Falcon Heavys first liftoff, but officials say the launch is targeted in January, some time after the hold-down hotfire test.


Bose & Sonos Smart Speakers can be Hacked to Play Disturbing Sounds "IndyWatch Feed Tech"

By Waqas

Another day, another IoT flaw Sonos and Bose Smart

This is a post from Read the original post: Bose & Sonos Smart Speakers can be Hacked to Play Disturbing Sounds


Barbara McClintock: Against The Genetic Grain "IndyWatch Feed Tech"

The tale of much of Barbara McClintocks life is that of the scientist working long hours with a microscope seeking to solve mysteries. The mystery she spent most of her career trying to solve was how all cells in an organism can contain the same DNA, and yet divide to produce cells serving different functions; basically how cells differentiate. And for that, she got a Nobel prize all to herself, which is no small feat either.

Becoming a Scientist

Human chromosomes, long strands of DNAHuman chromosomes, long strands of DNA by Steffen Dietzel CC BY-SA 3.0

McClintock was born on June 16, 1902, in Hartford, Connecticut, USA. From age three until beginning school, she lived with her aunt in Brooklyn, New York while her father strove financially to start up a medical practice. She was a solitary and independent-minded child, a trait she later called her capacity to be alone.

In 1919, she began her studies at Cornells College of Agriculture and took her first course in genetics in 1921. A year later, due to t...


Filmmakers Want The Right to Break DRM and Rip Blu-Rays "IndyWatch Feed Tech"

The major movie studios are doing everything in their power to stop the public from copying films.

While nearly every movie and TV-show leaks on the Internet, these companies still see DRM as a vital tool to prevent piracy from spiraling out of control.

Technically speaking its not hard to rip a DVD or Blu-Ray disc nowadays, and the same is true for ripping content from Netflix or YouTube. However, people who do this are breaking the law.

The DMCAs anti-circumvention provisions specifically forbid it. There are some exemptions, for educational use for example, and to allow for other types of fair use, but the line between legal and illegal is not always clear.

Interestingly, filmmakers are not happy with the current law either. They often want to use small pieces of other videos in their films, but under the current exemptions, this is only permitted for documentaries.

The International Documentary Association, Kartemquin Films, Independent Filmmaker Project, University of Film and Video Association and several other organizations hope this will change.

In a comment to the Copyright Office, which is currently considering updates to the exemptions, they argue that all filmmakers should be allowed by break DRM and rip Blu-Rays.

According to the filmmakers, the documentary genre is vaguely defined. This leads to a lot of confusion whether or not the exemptions apply. They, therefore, suggest to apply it to all filmmakers, instead of criminalizing those who dont identify themselves as documentarians.

Since 2010, exemptions applicable to documentary filmmaking have been in effect. This exemption has helped many filmmakers, and there has been neither evidence nor any allegation that this exemption has harmed rightsholders in any way.

There is no reason this would change if the documentary limitation were removed. All filmmakers regularly need access to footage on DVDs and without an exemption to DVDs, many non-infringing uses simply cannot be made, the groups add.

The submission includes letters from several filmmakers who explain why an exemption would be crucial to them.

Filmmakers Steve Boettcher and Mike Trinklein explain that they refrained from making a film how they wanted it to be, fearing legal trouble. Their film included a lot of drama elements and was not a typical documentary.

Given the significant amount of drama in the film [we are working on], we decided early on that our storytelling toolbox could not include fair us...


Links 28/12/2017: Jailhouse 0.8, Linux Lite 3.8 Beta "IndyWatch Feed Tech"

GNOME bluefish



  • Desktop

    • How to Configure Linux for Children

      If youve been around computers for a while, you might associate Linux with a certain stereotype of computer user. How do you know someone uses Linux? Dont worry, theyll tell you.

      But Linux is an exceptionally customizable operating system. This allows users an unprecedented degree of control. In fact, parents can set up a specialized distro of Linux for children, ensuring children dont stumble across dangerous content accidentally. While the process is more prolonged than using Windows, its also more powerful and durable. Linux is also free, which can make it well-suited for classroom or computer lab deployment.

  • Kernel Space

    • Linux Kernel Developer: Shuah Khan

      The Linux Kernel community should continue its focus on adding support for new hardware, harden the security, and improve quality. Focusing on effective ways to proactively detect security vulnerabilities, race conditions, and hard-to-find problems will help towards achieving the above goals. As a process issue, community would have to take a close look at the maintainer to developer ratio to avoid maintainer...


Chatbots Could "Learn" About Words Using Implicit Confirmation "IndyWatch Feed Tech"

Technique to allow AI to learn words in the flow of dialogue developed

A group of researchers at Osaka University has developed a new method for dialogue systems. This new method, lexical acquisition through implicit confirmation, is a method for a computer to acquire the category of an unknown word over multiple dialogues by confirming whether or not its predictions are correct in the flow of conversation.

[...] The group led by Professor Komatani developed an implicit confirmation method by which the computer acquires the category of an unknown word during conversation with humans. This method aims for the system to predict the category of an unknown word from user input during conversation, to make implicit confirmation requests to the user, and to have the user respond to these requests. In this way, the system acquires knowledge about words during dialogues.

In this method, the system decides whether the prediction is correct or not by using the user response following each request, its context, by using machine learning techniques. In addition, this system's decision performance improved by taking the classification results gained from dialogues with other users into consideration.

Lexical Acquisition through Implicit Confirmations over Multiple Dialogues

Original Submission

Read more of this story at SoylentNews.


The Twitter account of the popular security expert John McAfee was hacked "IndyWatch Feed Tech"

The official Twitter account of popular cyber security expert John McAfee was hacked today, hackers used it to promote alternative cryptocurrencies.

The official Twitter account of legendary security expert John McAfee was hacked today, attackers used it to send several tweets promoting alternative cryptocurrencies like Siacoin, NXT, XRP, PTOY, and BAT.

At the time of writing, there arent further info related to the attack, John McAfee explained that its account was protected with a two-factor authentication process.

This suggests that the attackers have found a way to obtain the authentication code sent by Twitter, this is possible by compromising the mobile device or via an SS7 attack.

In this latter scenario, hackers can exploit a flaw in the SS7 protocol to steal the victims identity on the messaging services with just basic skills.

The principal instant messaging services, including WhatsApp and Telegram, rely on the SMS authentication as the primary security verification mechanism, which is routed through SS7 signalling. This means that hackers exploit the SS7 to compromise the verification mechanism and take over the victims account and impersonate him.

According to McAfee, someone has compromised his smartphone.




Cryptocurrency Exchange EXMO Director Gets Kidnapped In Ukraine "IndyWatch Feed Tech"

Managing Director Of Major UK-Based Cryptocurrency Exchange Kidnapped In Kiev

Pavel Lerner, IT specialist and the managing director of EXMO, a major UK-based cryptocurrency exchange, has been allegedly kidnapped by unknown criminals in the Ukranian capital of Kiev, according to local media reports.

Lerner, 40-year-old citizen of Russia, was abducted on December 26 while leaving his office in Stepan Bandera Avenue in Kiev and driven off in a black Mercedes-Benz Vito brand (state number AA 2063 MT) car to an unknown location, according to news resource, which cited an anonymous source in local law enforcement. The unidentified kidnappers were dressed in dark clothes and balaclavas who forcibly dragged Lerner into the car.

Lerner, who holds a residence permit in Poland, is a recognized IT specialist in Ukraine who has led a number of startups related to the technologies of crypto-currency and blockade mining. While his Facebook page says he is originally from Kursk, Russia, EXMOs site states that the company is based in Polegate, England. EXMO is well-known with Russians, as the exchange is a route for exchanging Russian Rubles into Bitcoin.

Currently, multiple investigations are in progress to determine why and by whom Lerner was kidnapped. The law enforcers in Kiev have classified the case as a kidnapping of a person part 2, article 161 of the Criminal Code of Ukraine and currently carrying out search operation, and working out all possible leads in the case.

EXMOs representatives confirmed media reports and told local crypto journal ForkLog that the incident has not affected the companys functioning and in no way the users data and funds have been compromised.

We are doing everything possible to speed up the search of Pavel Lerner. Any information regarding his whereabouts is very much appreciated. Despite the situation, the exchange is working as usual. We also want to stress that nature of Pavels job at EXMO doesnt assume access either to storages or any personal data of users. All users funds are absolutely safe.

EXMO is a sizable exchange with upward of $93 million turnover and is ranked 23rd by 24-hour volume. The exchange currently has  six currencies available on EXMO right now USD, EUR, RUR (Russian Ruble), BTC, LTC and DOGE and also offers a selection of anonymous coins such as ZCash and Monero.

The post...


Apple faces class action lawsuits for slowing down older iPhones "IndyWatch Feed Tech"

Apple is facing lawsuits after admitting that it slows down iPhones as they get older to deal with a battery performance problem.The lawsuits argue that Apple misled and defrauded customers who may have spent money on fixes that didn't speed up...


Quick and easy SSH key installation. "IndyWatch Feed Tech"

I know I haven't posted much this month.  The holiday season is in full effect and life, as I'm sure you know, has been crazy.  I wanted to take the time to throw a quick tip up that I just found out about which, if nothing else, will make it easier to get up and running on a Raspberry Pi that you've received as a gift.  Here's the situation:

You have a new account on a machine that you want to SSH into easily.  So, you want to quickly and easily transfer over one or more of your SSH public keys to make it easier to log in automatically, and maybe make running Ansible a bit faster.  Now, you could do it manually (which I did for many, many years) but you'll probably mess it up at least once if you're anything like me.  Or, you could use the ssh-copy-id utility (which comes for free with SSH) to do it for you.  Assuming that you already have SSH authentication keys this is all you have to do:

[drwho@windbringer ~]$ ssh-copy-id -i .ssh/ pi@jukebox /bin/ssh-copy-id: INFO: Source of key(s) to be installed: ".ssh/" /bin/ssh-copy-id: INFO: attempting to log in with the new key(s), to filter out any that are already installed /bin/ssh-copy-id: INFO: 1 key(s) remain to be installed -- if you are prompted now it is to install the new keys pi@jukebox's password: Number of key(s) added: 1 Now try logging into the machine, with: "ssh 'pi@jukebox'" and check to make sure that only the key(s) you wanted were added.

Now let's try to log into the new machine:

[drwho@windbringer ~]$ ssh pi@jukebox Linux jukebox 4.9.70-v7+ #1068 SMP Mon Dec 18 22:12:55 GMT 2017 armv7l The programs included with the Debian GNU/Linux system are free software; # I didn't have to enter a password because my SSH pubkey authenticated me # automatically. pi@jukebox:~ $ cat .ssh/authorized_keys ecdsa-sha2-nistp521 AAAAE....

You can run this command again and again with a different pubkey, and it'll append it to the appropriate file on the other machine (~/.ssh/authorized_keys).  And there you have it; your SSH pubkey has been installed all in one go.  I wish I'd known about this particular trick... fifteen years ago?


Meta: Site Update Update "IndyWatch Feed Tech"

So, among the many nifty presents I brought back from my holidays with the family was a case of the black plague. Or possibly a cold. Either way, I don't want to be deploying new code on the production servers while my thinking's impaired*, so we're pushing the site update we'd planned for this weekend back another week**. That's all. Enjoy the last bits of 2017.

*Shut up.

**or two. [martyb here. I've not had the time to finish testing the changes and am recovering from overload-mode at work and the start of a cold, as well.]

Read more of this story at SoylentNews.


Fingerling Disemboweled for Your Entertainment "IndyWatch Feed Tech"

Due to the graphic nature of this post, small children and the elderly may want to leave the room. One of the hottest toys this holiday season has been gutted like a fish so that we may better understand the nature of its existence. Or maybe just what kind of sensors and motors the craftsmen over at WowWee managed to cram into a robot with an MSRP of only $15 USD.

[Josh Levine] mercilessly tears a Fingerling Monkey limb from limb on his blog, and points out some interesting design decisions made. While some elements of the toy are rather clever, theres a few head-scratchers to be had inside the Fingerling. Its interesting to see the final results of a decision process that had to balance the relatively rough life such a toy will live with the ever crucial cost of production.

The eyelids are particularly well thought out, operated by charging a coil under a magnet which is embedded in the plastic. Opening and closing the eyelids without a separate motor or gearbox is not only easier and cheaper, but prevents the possibility of damage if a child attempts to force open the eyes or otherwise manipulate the mechanism.

Other cost saving measures include the use of foil tape as a cap...


GCC 8 vs. LLVM Clang 6 Performance At End Of Year 2017 "IndyWatch Feed Tech"

For those wondering how the LLVM Clang vs. GCC C/C++ compiler performance is comparing as we end out 2017, here are some recent benchmarks using the latest Clang 6.0 SVN and GCC 8.0.0 compilers in a range of benchmarks.


Container Basics: Terms You Need to Know "IndyWatch Feed Tech"

Container Basics: Terms You Need to Know


MIT Researchers Improve Time-of-Flight Imaging Depth Resolution by 1,000-Fold "IndyWatch Feed Tech"

A new time-of-flight imaging system could improve computer vision for self-driving vehicles:

In a new paper appearing in IEEE Access, members of the Camera Culture group present a new approach to time-of-flight imaging that increases its depth resolution 1,000-fold. That's the type of resolution that could make self-driving cars practical.

The new approach could also enable accurate distance measurements through fog, which has proven to be a major obstacle to the development of self-driving cars.

At a range of 2 meters, existing time-of-flight systems have a depth resolution of about a centimeter. That's good enough for the assisted-parking and collision-detection systems on today's cars.

But as Achuta Kadambi, a joint PhD student in electrical engineering and computer science and media arts and sciences and first author on the paper, explains, "As you increase the range, your resolution goes down exponentially. Let's say you have a long-range scenario, and you want your car to detect an object further away so it can make a fast update decision. You may have started at 1 centimeter, but now you're back down to [a resolution of] a foot or even 5 feet. And if you make a mistake, it could lead to loss of life."

At distances of 2 meters, the MIT researchers' system, by contrast, has a depth resolution of 3 micrometers. Kadambi also conducted tests in which he sent a light signal through 500 meters of optical fiber with regularly spaced filters along its length, to simulate the power falloff incurred over longer distances, before feeding it to his system. Those tests suggest that at a range of 500 meters, the MIT system should still achieve a depth resolution of only a centimeter.

Cascaded LIDAR using Beat Notes

Rethinking Machine Vision Time of Flight with GHz Heterodyning (open, DOI: 10.1109/ACCESS.2017.2775138) (DX)

LIDAR at MIT Media Lab (2m48s video)

Related: MIT Researchers Improve Kinect 3D Imaging Resolution by 1,000 Times Using Polarization

Original Submission



IEEE Spectrums Most Popular Stories of 2017 "IndyWatch Feed Tech"

Here are the technology stories that captured your attention this year Illustration: IEEE Spectrum; Font: Shutterstock

In 2017, IEEE Spectrum published more than 1,000 feature and news stories about technology. Here, we resurface our most popular posts of the year. If you missed them the first time around, we hope youll enjoy this chance to look back and discover new stories or revisit a favorite.

1. In How I Built an AI to Sort 2 Tons of Lego Pieces, coder and technology consultant Jacques Mattheij described how he trained a neural net to recognize more than 1,000 different types of Legos. His ulterior motive was to buy unsorted pieces at a discount, sort them with this system, and resell the most valuable ones at a markup.   

2. Earlier this year, researchers at the University of Washington used a neural net to produce a fake video of former U.S. President Barack Obama, described in AI Creates Fake Obama. Their research raised questions about what it will mean for anyone to be able to falsify a video or audio clip of anyone else, and how scientists might develop systems that could identify a fake. 

3. Bitcoin was one of the popular Google search terms of 2017, but many people are still puzzled by the blockchain its built on. For SpectrumBlockchain World special report, contributing editor Morgen E. Peck explained whats so transformative about blockchains and what you need to know about them in Blockchains: How They Work and Why Theyll Change the World.

4. When John Goodenough, the 95-year-old coinventor of the lithium ion battery, said hed found a new type of battery that could transform the electric car industry, Spectrum readers were eager to hear more. Read about his new favorite technology in Will a New Glass Battery Accelerate the End of Oil? 

5. Its always nice to have something to look forward to. This year, Spectrum readers were particularly excited to hear that the GPS in their smartphones would soon be getting an upgrade. Find out more in...


Solar System Formation near a Massive Star "IndyWatch Feed Tech"

An unusual type of star may be showing us something about the origin of our own Solar System. Wolf-Rayet stars display unusual spectra, prominent in which are heavy elements as well as broad emission lines of ionized helium, nitrogen and carbon. These are massive objects 40 to 50 times the size of our Sun, with surface temperatures ranging up to 200,000 K. Have a look at one of these, showing another Wolf-Rayet trait, the strong stellar winds ejecting material into nearby space. A bubble with a dense shell forms around such stars, trapping gas and dust that could form into new stars.

Vikram Dwarkadas (University of Chicago) and colleagues believe that Wolf-Rayet stars can unlock the mystery of how our Solar System emerged. The researchers are hoping to update the older view that our system formed in the vicinity of a relatively conventional supernova, noting peculiarities in the proportion of two isotopes in the early Solar System. One of these is aluminium-26, which turns up in relatively high proportion in our system compared with the rest of the galaxy.

The other issue is with iron-60, which earlier work by Nicolas Dauphas, a co-author on the current paper, suggests is found in smaller amounts than we would expect. We couple this with the interesting fact that Wolf-Rayet stars release a good deal of aluminium-26, but are not associated with iron-60. Add into the mix the giant stars ability to shed mass through intense stellar winds. We wind up with a bubble structure with a dense shell, a potential star-making...


4 Years After Target, the Little Guy is the Target "IndyWatch Feed Tech"

Dec. 18 marked the fourth anniversary of this site breaking the news about a breach at Target involving some 40 million customer credit and debit cards. It has been fascinating in the years since that epic intrusion to see how organized cyber thieves have shifted from targeting big box retailers to hacking a broad swath of small to mid-sized merchants.

In many ways, not much has changed: The biggest underground shops that sell stolen cards still index most of their cards by ZIP code. Only, the ZIP code corresponds not to the legitimate cardholders billing address but to the address of the hacked store at which the card in question was physically swiped (the reason for this is that buyers of these cards tend to prefer cards used by people who live in their geographic area, as the subsequent fraudulent use of those cards tends to set off fewer alarm bells at the issuing bank).

Last week I was researching a story published here this week on how a steep increase in transaction fees associated with Bitcoin is causing many carding shops to recommend alternate virtual currencies like Litecoin. And I noticed that popular carding store Jokers Stash had just posted a new batch of cards dubbed Dynamittte, which boasted some 7 million cards advertised as 100 percent valid meaning the cards were so fresh that even the major credit card issuers probably didnt yet know which retail or restaurant breach caused this particular breach.

An advertisement for a large new batch of stolen credit card accounts for sale at the Jokers Stash Dark Web market.

Translation: These stolen cards were far more likely to still be active and useable after fraudsters encode the account numbers onto fake plastic and use the counterfeits to go shopping in big box stores.

I pinged a couple of sources who track when huge new batches of stolen cards hit the market, and both said the test cards theyd purchased from the Jokers Stash Dynamittte batch mapped back to customers who all had one thing in common: Theyd all recently eaten at a Jasons Deli location.

Jasons Deli is a fast casual rest...


Path traversal flaws in awstats 7.6 and earlier. "IndyWatch Feed Tech"

Posted by John Lightsey on Dec 28

Hi there,

The cPanel Security Team discovered two path traversal flaws in awstats
that could be leveraged for unauthenticated remote code execution. Both
issues have been submitted to the DWF CVE request page at

Path traversal in the "config" parameter:

Path traversal in the "migrate" parameter:...


8ban records - purposefully low-fi "IndyWatch Feed Tech"

The 8ban is a format I've wanted to cover for a few years, but it's not been simple, as while the special turntables are relatively easy to find, the miniature records that play on them have proved to be much more elusive. 
However I've finally been able to obtain a stack of unopened records together with a new-old-stock turntable upon which to play them, so it's high time to take a look at this low-fi format.


Hunting Rogue Access Points with the ESP8266 "IndyWatch Feed Tech"

Cantennas outperform every consumer-grade Wi-Fi antenna Ive had the bad luck of purchasing. Cantenna is a mashup of can and antenna creating the nickname for a directional waveguide antenna built from re-purposed steel cans. For anyone who has yet to build one, it makes an excellent afternoon project. Here are some build instructions and technical details. I went beyond that, and ended up catching a rogue WiFi access point in the process.

When I needed to extend the range of some ESP8266-based sensors, cantennas were right at the top of my list of things to try. It was easy enough to build one, attach it to a Wemos Mini D1 Pro, and call the job done leaving me with plenty of time to over-engineer it, and I ended up down a bit of a rabbit hole.

The first thing I did was stop using cans. Canned goods are not only expensive in my corner of the world, but more importantly dont lend themselves that well to making a standardized antenna in volume. I can also only eat so many beans! The latter reason alone is enough to consider an alternative design like a modular dish reflector.

Building a Better Cantenna: Ditch the Cans

However, for about the same price as a large canned food item, I was able to purchase a sheet of 0.6mm thick copper. After measuring it out and cutting it, I wrapped it around the inside of an 80 mm PVC pipe, resulting in a tube about 79 mm wide. Later I found out it was easier to wrap the copper around the outside of the tube, and attach 90 mm diameter hose clamps to hold it in place. In both cases I soldered the result on to a copper base.



Pavel Lerner, head of EXMO cryptocurrency exchange, was kidnapped in Ukraine "IndyWatch Feed Tech"

According to Ukrainian media, the head of the EXMO cryptocurrency exchange Pavel Lerner has been kidnapped in Kiev, the police is investigating the case.

According to Ukrainian media, the Russian IT expert Pavel Lerner has been kidnapped in Kiev.

Pavel Lerner (40) is a and managing director EXMO, one of the largest cryptocurrency exchanges, and according to a Ukrainian media he stopped responding to phone calls on December 26.

According to the applicant in the case, Lerner was abducted near his workplace an office center in Stepan Bandery Street (before renaming Moscow Avenue). The programmer was dragged into the car of Mercedes-Benz Vito brand (state number AA 2063 MT) by unknown persons in dark clothes and balaclava, and taken away to an unknown destination. states the

Pavel Lerner kidnapped

Lerner has been kidnapped while he was leaving his office in Stepan Bandera Prospect in Kiev.

The IT specialist led a number of startups, related to blockchain technology and cryptocurrency mining.

Ukrainian police are investigating the case, at the time I was writing it is still unclear who and why kidnapped the man.

EXMO confirmed the news of the kidnapping and clarified that company operations were not affected by what has happened.  EXMO also added that Lerner did not have direct access to any cryptocurrency account or other personal data.

We are doing everything possible to speed up the search of Pavel Lerner. Any information regarding his whereabouts is very much appreciated, PR-d...


The Sweetness of JAMstack: JavaScript, APIs and Markup "IndyWatch Feed Tech"

The JAMstack approach to web development has been emerging for several years, but really took off in 2017. More a design philosophy than an explicit framework, JAMstack takes the concept of static, database-free websites to the next level via an architecture advocates are calling the future of the internet.


AMD Pushes Out Their First Post-Release Update Of AMDVLK/XGL "IndyWatch Feed Tech"

AMD developers working on the newly open-sourced AMDVLK Vulkan driver have pushed out their first post-release code update synced against the latest changes in their internal AMD driver tree...


AI Researchers Create Video to Call for Autonomous Weapons Ban at UN "IndyWatch Feed Tech"

In response to growing concerns about autonomous weapons, a coalition of AI researchers and advocacy organizations released a fictitious video on Monday that depicts a disturbing future in which lethal autonomous weapons have become cheap and ubiquitous.

The video was launched in Geneva, where AI researcher Stuart Russell presented it at an event at the United Nations Convention on Conventional Weapons hosted by the Campaign to Stop Killer Robots.

Russell, in an appearance at the end of the video, warns that the technology described in the film already exists and that the window to act is closing fast.


Data From 14 Million Papers Is Now Available for Free "IndyWatch Feed Tech"

A new initiative, I4OC, is working towards making reliable, structured data of authors, reference lists, and citations accessible to the public. Their launch marks the availability of 14 million scholarly works, with more to come.

The Initiative of Open Citations (140C) announced today that science papers reference lists will now be accessible to anyone.


DC Police Used Sonic Cannon To Direct Crowd Flow During Women's March "IndyWatch Feed Tech"

Arthur T Knackerbracket has found the following story:

Despite risks which include permanent hearing loss, LRADs are increasingly part of police's crowd control arsenal

After a wait of nearly ten months, MuckRock has finally received documents from the D.C. Metropolitan Police Department regarding their response to the protests surrounding President Donald Trump's inauguration early this year. Surprisingly, while we didn't receive any records related to the J20 protests, we did receive documents relating to January 21st's Women's March, which in Washington D.C. alone attracted by conservative estimates between 450,000 and 500,000 people. While it was the largest protest in the city since the anti-Vietnam War protests of the '60s and '70s, no arrests were made.

The After-Action Report provided by the DCMPD, under the header "Improvements," contains the information that the department utilized both a D.C. National Guard Jump Team, and a Long Range Acoustical Device, better known as an LRAD. The LRAD was used "to assist in instructing the crowd flows on continuing to flow away from the entrances of the stations."

Since the first documented use of an LRAD sound cannon on protesters by Pittsburgh Police during the 2009 G20 summit, LRAD use by police against activists appears to be on the rise. The Pittsburgh Police Bureau used it again in 2011 during the Super Bowl, the New York Police Department has used it several times including the Eric Garner protests and during Occupy, the Oakland Police Department also used it against Occupy protesters, and more recently and perhaps most prominently, an LRAD was deployed during the Ferguson unrest and the Standing Rock protests.

There are various models of LRAD, with military grade versions that can send voice communications up to 5.5 miles away, and slightly less powerful versions like the LRAD 500X or 300X which are what police departments generally use. All can produce a sound somewhat akin to a high-powered car alarm that can cause intense headaches, nausea, loss of balance, and potentially permanent hearing loss....


Faster, stronger, better jumpers: Genetically engineered super-horses to be born in 2019 "IndyWatch Feed Tech"

Scientists, who had previously cloned polo ponies, have achieved yet another breakthrough in their work that could lead to the creation of genetically engineered super-horses that are faster, stronger and better jumpers than regular horses within two years.

Scientists in Argentina reportedly managed to rewrite the genomes of cloned horses by using a powerful DNA editing technique called CRISPR. They also produced healthy embryos that are now expected to be implanted into a surrogate mother by 2019.

CRISPR, an acronym that stands for Clustered, Regularly Interspaced, Short Palindromic Repeats, is basically a technique in a bacterias immune system. When a virus invades a bacterial cell, the CRISPR system captures a piece of the viruss DNA and slides it into a section of the bacterias own DNA, allowing it to detect and destroy the virus as well as similar viruses in future attacks.


John McAfee Twitter account hack: Most likely my phone was compromised "IndyWatch Feed Tech"

By Waqas

The official Twitter account of security guru John McAfee was apparently

This is a post from Read the original post: John McAfee Twitter account hack: Most likely my phone was compromised


How to install LiberiOS Jailbreak on your iPhone? "IndyWatch Feed Tech"

Here is the first official iPhone X Jailbreak and how you can install it on your iPhone

The LiberiOS Jailbreak for the iPhone X, iPhone 8 Plus and iPhone 8 is here and you while you can download it from here, we are going to be walking you through the entire process of successfully completing this operation.

Few things you must know before installing the LiberiOS Jailbreak

This Jailbreak is semi-untethered, so if your iPhone restarts, the device will no longer be jailbroken, and thus you will have to follow all the steps.

Liberi Jailbreak supports the following iOS 11 software updates

  • iOS 11, iOS 11.0.1, iOS 11.0.2, iOS 11.0.3, iOS 11.1, iOS 11.1.1, iOS 11.1.2

Unsupported software updates

  • iOS 11.2, iOS 11.2.1

iPhone models that the Jailbreak supports

  • iPhone X, iPhone 8, iPhone 8 Plus, iPhone 7, iPhone 7 Plus, iPhone 6s, iPhone 6s Plus, iPhone 6, iPhone 6 Plus, iPhone SE, iPhone 5s

iPad models that the Jailbreak supports

  • 9-inch iPad Pro, 2nd generation 12.9-inch iPad Pro, 1st generation 10.5-inch iPad Pro, 9.7-inch iPad Pro, iPad Air 2, iPad Air, iPad 5th generation, iPad mini 4, iPad mini 3, iPad mini 2

iPod touch models that the Jailbreak supports

  • iPod touch 6G

Download LiberiOS jailbreak and Cydia impactor

  1. Try to stay away from mirror links as they could bring malware to your system.

Install the LiberiOS IPA using Cydia Impactor and Jailbreaking

  1. Connect your iPhone, iPad or iPod touch to the computer via Lightning cable and sideload the IPA file that you downloaded on your computer.
  2. Launch Cydia Impactor on your computer, and drag the LiberiOS jailbreak IPA on to Cydia Impactor.
  3. Dial in your Apple ID and password for the Apple Developer account.
  4. Wait for Cydia Impactor to sideload the IPA file on your iOS device.
  5. After LiberiOS Jailbreak has successfully been sideloaded, launch the Settings app.
  6. Go to Settings > General > Profile & Device Ma...


Handful of North Korean Defectors Show Signs of Radiation Exposure "IndyWatch Feed Tech"

Four defectors from Kilju county in North Korean have shown signs of radiation exposure:

At least four defectors from North Korea have shown signs of radiation exposure, the South Korean government said on Wednesday, although researchers could not confirm if they were was related to Pyongyang's nuclear weapons program.

The four are among 30 former residents of Kilju county, an area in North Korea that includes the nuclear test site Punggye-ri, who have been examined by the South Korean government since October, a month after the North conducted its sixth and most powerful nuclear test, Unification Ministry spokesman Baik Tae-hyun told a news briefing.

They were exposed to radiation between May 2009 and January 2013, and all defected to the South before the most recent test, a researcher at the Korea Atomic Energy Research Institute, which carried out the examinations, told reporters. [...] The researcher cautioned that there were a number of ways people may be exposed to radiation, and that none of the defectors who [...] had lived in Punggye-ri itself showed specific symptoms.

Original Submission

Read more of this story at SoylentNews.


Syzbot: Google Continuously Fuzzing The Linux Kernel "IndyWatch Feed Tech"

On the Linux kernel mailing list over the past week has been a discussion about Syzbot, an effort by Google for continuously fuzzing the mainline Linux kernel and its branches with automatic bug reporting...


Facebook testing Aadhaar verification for new users, says not mandatory "IndyWatch Feed Tech"

Facebook Asking New Users To Enter Aadhaar Card Information For Creating An Account

The Government of India has made it mandatory for its citizens to link their Aadhaar card with bank accounts, PAN, insurance policies, small savings schemes like PPF and NSC, mutual fund investments and social security schemes to make it the most authentic identity proof.

For those unaware, Aadhaar is a unique identification document bearing a unique 12 digit Aadhaar number, that is issued to an individual by the Unique Identification Authority of India (UIDAI).

Now, Facebook, the social networking giant, too has followed suit and is apparently encouraging its new users in India to use their real names on its site as shown in their Aadhaar card while creating a new account.

Whats your name? Using the name on your Aadhaar card makes it easier for friends to recognise you, the prompt reads.

The testing was first spotted by users on Reddit and Twitter. However, the prompt while creating a new account is a small test and expected to be available only to a small percentage of people who use Facebooks mobile site ( This is an optional prompt, and users are not required to enter the name on their Aadhaar card nor have to upload a photo of their Aadhaar Card or perform any other such verification step at the moment.

We want to make sure people can use the names theyre known by on Facebook, and can easily connect with friends and family. This is a small test where we provide additional language when people sign up for an account to say that using the name on their Aadhaar card makes it easier for friends to recognize them. This is an optional prompt which we are testing, people are not required to enter the name on their Aadhaar card, said Facebook spokesperson to GadgetsNow in an emailed statement.

If log-in to Facebook account with Aadhaar card feature becomes a reality, it could help the social networking giant to counter fake accounts and discourage users to use bogus names.

The post Facebook testing Aadhaar verification for new users, says not mandatory appeared first on TechWorm.


SpaceX BFR construction will start in 4 to 6 months "IndyWatch Feed Tech"

The SpaceX BFR (Big Falcon Rocket or Big Fucking Rocket) has a planned payload of 150,000 kg (330,000 lb) when flying reusable or 250,000 kg (550,000 lb) when flying expendable, making it a super heavy-lift launch vehicle.

SpaceX plans to replace of all their current rockets by the early 2020s with the BFR. Tooling for the main tanks has been ordered and a facility to build the vehicles is under construction; construction of the first BFR is scheduled to begin in the second quarter of 2018. SpaceX has the aspirational goal for initial Mars-bound cargo flights of BFR launching as early as 2022, followed by the first crewed BFR flight one synodic period later, in 2024. Serious development of the BFR began in 2017.

Testing of the BFR is expected to begin with short suborbital hops of the full-scale ship, likely to just a few hundred kilometers altitude and lateral distance.


A Proposal To Update Ubuntu's Kernel/Mesa/GNOME Components On A Monthly Basis "IndyWatch Feed Tech"

It's not quite the Ubuntu rolling-release process that some have proposed over the years, but a new proposal is being formulated for shipping updates to key Ubuntu system components on a monthly basis rather than having to wait six months for updates to the Linux kernel, Mesa, etc...


Fidget Spinner Becomes a Brushless Motor; Remains Useless "IndyWatch Feed Tech"

Your grandmother means well. But by the time she figures out somethings a fad, it is old news. So maybe you got a fidget spinner in your stocking this year. Beats coal. Before you regift it to your niece, you could repurpose it to be a motor. Technically, [B.Aswinth Raj] made a brushless motor, although it isnt going to fly your quadcopter anytime soon, it is still a nice demonstrator.

You can see a video below. The idea is to put magnets on the spinner and use an electromagnet to impart energy into the spinner which is on a piece of threaded rod left over from your last 3D printer build. A hall effect sensor determines when to energize the electromagnet.

A brushed motor uses a spring-loaded brush to carry current through to the motors coils and keep the magnetic field oriented properly. A brushless motor works differently. There are several schemes that will work, but the one [Raj] uses is the most common. He adds fixed magnets on the rotor then uses an electromagnet to provide the correct push at the right time. A practical brushless motor will likely have more than one coil, though, and the controller has to do a particular sequence to move the rotor around the rotation.

If you want to see the insides of a real motor, we looked at how to rewind them earlier. If youd rather repurpose your spinner to something more practical, you could always make some music.

Filed under: Toy Hacks


Kodi Piracy and Addon Predictions for 2018 "IndyWatch Feed Tech"

During 2017, Kodi and its sea of third-party addons hit the headlines hundreds of times.

Streaming in this fashion became a massive deal throughout the year and eventually, copyright holders decided to take action, cracking down on groups such as TVAddons, ZemTV, and addons offered by jsergio123 and The_Alpha.

In November, the problems continued when the Ares Project, the group behind the hugely popular Ares Wizard and Kodi repository, threw in the towel after being threatened by the MPA-led anti-piracy coalition Alliance for Creativity and Entertainment.

The combined might of Columbia, Disney, Paramount, Twentieth Century Fox, Universal, Warner, Netflix, Amazon, and Sky TV was too much, leading to Ares Project leader Tekto shutting everything down.

This was a significant development. Over a two year period, Ares serviced an estimated 100 million users. After interviewing Tekto last month, today we catch up with the developer again, listening to his thoughts on how the scene might further develop in 2018 and what threats lie ahead.

TF: Could you tell us a bit about Kodis suitability as an unauthorized streaming platform moving forward? Is it flexible enough to deal with threats, is its current development effort sufficient, do addon developers like the way it works, and how could it be improved?

Tekto: The public awareness of Kodi and the easy ways with which it can be customised via builds and its open source nature makes it the perfect platform for Python coders. Its easy to fork, copy, adapt and learn, and its good for builders who modify, personalize, and brand.

Its also easy for users to obtain, install, and work with the plethora of wizards and addons etc, all backed by up blogs and YouTube tutorials. Its the perfect open source platform to develop and customise to access a massive range of content. Content that may well be contentious but regardless, it is publicly available all over the web.

TF: Obviously Kodi is the big thing at the moment but other apps, such as Showbox, TerrariumTV, and similar products are carving a decent niche for themselves. Where do you see the market sit...


Jailhouse v0.8 Linux Hypervisor Released "IndyWatch Feed Tech"

The past few years Siemens has been working on Jailhouse as a Linux-based partitioning hypervisor that has aimed to be a lighter alternative to KVM. It's been seven months since the last update, but now Jailhouse 0.8 is now available...


The Secret KGB Manual for Recruiting Spies "IndyWatch Feed Tech"

This is the first of a three-part series based on never-before-published training manuals for the KGB, the Soviet intelligence organization that Vladimir Putin served as an operative, and that shaped his view of the world. Its veterans still make up an important part of now-Russian President Vladimir Putin's power base. All were trained in the same dark arts, and these primers in tradecraft are essential to an understanding of the way they think and the way they operate.

Source : Revealed: The Secret KGB Manual for Recruiting Spies

Original Submission

Read more of this story at SoylentNews.


A Kernel Exploit for Sony PS4 Firmware 4.05 is available online "IndyWatch Feed Tech"

The developer SpecterDev finally released a fully-functional kernel exploit for PlayStation 4 (firmware 4.05) dubbed namedobj.

Good news for PlayStation gamers, the developer SpecterDev finally released a fully-functional kernel exploit for PlayStation 4 (firmware 4.05) dubbed namedobj.

The Kernel exploit was released two months after Team Fail0verflow revealed the technical details about the first PS4 Kernel Exploit.

The kernel exploit namedobj is now available on Github, it works for the PlayStation 4 on 4.05FW and allows users to run arbitrary code on the device.

In this project you will find a full implementation of the namedobj kernel exploit for the PlayStation 4 on 4.05. It will allow you to run arbitrary code as kernel, to allow jailbreaking and kernel-level modifications to the system. This release however, does not contain any code related to defeating anti-piracy mechanisms or running homebrew. This exploit does include a loader that listens for payloads on port 9020 and will execute them upon receival. reads the description published on GitHub.

PS4 Kernel Exploit

The availability of the kernel exploit could allow developers to write a working jailbreak and kernel-level modifications to the system.

Jailbreaking allows removing hardware restrictions implemented by the operating system, it allows users to run custom code on the console and install mods, games, and third-party applications bypassing the anti-piracy mechanisms implemented by Sony.

This release, however, does not contain any code related to defeating anti-pirac...


Cannonlake/Icelake Desktop CPUs Won't Have PKU Memory Protection Support "IndyWatch Feed Tech"

Support for Memory Protection Keys (a.k.a. PKU / PKEYs) was finished up this year in the Linux kernel, glibc, and related components. This memory protection feature premiered with Intel Xeon Scalable CPUs and is said to be coming to future desktop CPUs, but it doesn't look like that's happening for the Cannonlake or Icelake generations...


How to exclude file when using scp command recursively "IndyWatch Feed Tech"

I need to copy all the *.c files from local laptop named hostA to hostB including all directories. I am using the following scp command but do not know how to exclude specific files (such as *.out): $ scp -r ~/projects/ user@hostB:/home/delta/projects/ How do I tell scp command to exclude particular file or directory at Continue reading "How to exclude file when using scp command recursively"

The post How to exclude file when using scp command recursively appeared first on nixCraft.


Raw: Half of EPO Staff Went on Strike, Topi Gave False Figures "IndyWatch Feed Tech"

Original/full: Report from the 137th Administrative Council meeting/session [PDF] | French [PDF]

EPO strike

Summary: Topi, appointed EPO Vice-President (VP4) in March 2012, low-balled strike participation/protest attendance numbers (as is common at the EPO) after the EPO had turned 40


CEO of Major UK-Based Cryptocurrency Exchange Kidnapped in Ukraine "IndyWatch Feed Tech"

Pavel Lerner, a prominent Russian blockchain expert and known managing director of one of the major crypto-exchanges EXMO, has allegedly been kidnapped by "unknown" criminals in the Ukranian capital of Kiev. According to Ukraine-based web publication Strana, Lerner, 40-year-old citizen of Russia, was kidnapped on December 26 when he was leaving his office in the center of town (located on the


NetBSD 7.1.1 Released "IndyWatch Feed Tech"

The first point release to NetBSD 7.1 is now available as this BSD operating system ends out 2017...


Raw: Another Example of Battistelli Trying to Hold the EPOs Central Staff Committee Accountable for Other Peoples Words "IndyWatch Feed Tech"

Original/full: Request for strike [PDF]

Battistelli reich

Summary: The basis upon which Battistelli denied a call for strike mentioned, among other things, words used by some anonymous people (akin to collective accountability, which is a notorious authoritarian methodology, a branch of collective guilt or collective punishment)


One Small Step to Harden USB Over IP on Linux "IndyWatch Feed Tech"

The USB over IP kernel driver allows a server system to export its USB devices to a client system over an IP network via USB over IP protocol. Exportable USB devices include physical devices and software entities that are created on the server using the USB gadget sub-system. This article will cover a major bug related to USB over IP in the Linux kernel that was recently uncovered; it created some significant security issues but was resolved with help from the kernel community.

The Basics of the USB Over IP Protocol

There are two USB over IP server kernel modules:


Raw: European Patent Offices Willy Minnoye Interferes With Discussion of EPO Policies "IndyWatch Feed Tech"

Original/full: English [PDF] | French [PDF] | German [PDF]

EPO VP1 Willy Minnoye bemoans

Summary: EPO VP1 (Vice-President, Directorate-General 1, namely Operations) bemoans along with other confidants of Team Battistelli legitimate questions being asked by representatives of EPO staff rather than Benot Battistelli appointees


BSD Release: NetBSD 7.1.1 "IndyWatch Feed Tech"

Soren Jacobsen has announced the release of NetBSD 7.1.1, a security and bug-fix update from the project that develops a lightweight operating system that runs on a wide range of hardware platforms: "The NetBSD Project is pleased to announce NetBSD 7.1.1, the first security/critical update of the NetBSD....


Unhackable computer under development with $3.6 million DARPA funding project "IndyWatch Feed Tech"

University of Michigan is developing unhackable computer

The Defense Advanced Research Projects Agency (DARPA) has awarded a $3.6 million grant to a team of computer scientists and engineers at the University of Michigan who are working to create an unhackable computer with circuits acting like unsolved puzzles.

The project called Morpheus is a new approach to hardware design capable of creating an unhackable computer. In other words, scientists from the University of Michigan are developing a security system that is not based on software, but is implanted in the components of the system to detect vulnerabilities that could lead to backdoor exploits.

U of M is one of nine grant recipients chosen as part of a $50 million R&D cybersecurity program by DARPA.

As part of its cybersecurity program, DARPA wants protection against seven major classes of hardware weakness within five years, which, if fixed, would close almost half of those backdoor exploits. These vulnerabilities include permissions and privileges, buffer errors, resource management, information leakage, numeric errors, crypto errors and code injection.

Instead of relying on software Band-Aids to hardware-based security issues, we are aiming to remove those hardware vulnerabilities in ways that will disarm a large proportion of todays software attacks, Linton Salmon, manager of DARPAs System Security Integrated Through Hardware and Firmware (SSITH) program, said in a statement.

To keep hackers away, the scientists have created a new hardware design that pushes data around the computer regularly and randomly while also destroying past versions as it goes. However, its not just the targeted data that shuffles around. According to the developers, any bug that could be exploited will also be a moving target, as would any passwords. Even if a hacker manages to find a vulnerability, it will immediately move, leaving no time for the hacker to exploit the resources.

Typically, the location of this data never changes, so once attackers solve the puzzle of where the bug is and where to find the data, its game over, Austin said. We are making the computer an unsolvable puzzle. Its like if youre solving a Rubiks Cube and every time you blink, I rearrange it.

According to the scientists, a working Morpheus computer would be able to defend against future threats that have to be identified yet.

Whats incredibly exciting about the project is that it will fix tomorrows vulnerabilities, Austin said. Ive never known any security system that could be future proof.

The po...


Raw: Collective Accountability for Staff Committees Over Anonymous Letters? "IndyWatch Feed Tech"

These letters (or just one letter) were allegedly used as a pretext for cracking down on dissent among EPO staff

EPO management mockery

Summary: A report from 4 years ago, ending with a section about Anonymous letter / Defamation or defamatory letters [which] had been circulated in the Office (about half a year earlier)

Report on the Meeting between the CSC and the President 20 Nov 2013

The Meeting lasted over two hours and all the points on the agenda were covered including four additional points which were raised during the meeting. In general, the mood was calmer than during previous meetings and it was possible to exchange views without major incident. As has been the case with previous meetings, the President introduced two new points as his agenda: social democracy and the new salary method.

With regard to the existing claims of staff which are the subject of industrial actions and legal challenges, no progress was made. The President clarified his position on these topics, but was unwilling to make any concessions. Towards the end of the meeting the proposal of the CSC to use a mediator was briefly discussed, but dismissed because the President saw no added value by engaging in mediation.

Overall, it would be fair to characterise this meeting as civil but largely unproductive: no signs of willingness to address the concerns of staff were apparent. The individual points are covered below. Comments in [brackets] are supplementary information and were not made during the meeting.

Social Democracy

Under the topic of social democracy, the President clarified that he sees problems with regard to the representative character of the staff committee and their lack of an ability to make decisions. He proposed a more centralised role with direct election for central bodies: they may intend to have the members of the GAC elected in the future. The administration argues that they have no control over the election process, but that the President can be held accountable for any problems, therefore the administration proposes to make new regulations regarding the elections of the staff committees. The administration also proposed to have a more proportionate system where the number of staff representatives better reflects the number of staff they each represent. We understood this to imply less representation in the smaller sites. The administration also proposed...


Chinas latest plans to dominate robot, smart car and railway industries by 2020 "IndyWatch Feed Tech"

China has unveiled three-year plans to increase the countrys economic competitiveness by developing key technologies in nine industrial sectors, from robotics to railways.

Other areas include smart cars, robotics, advanced shipbuilding and maritime equipment, modern agricultural machinery, advanced medical devices and drugs, new materials, smart manufacturing and machine tools.

The aim is to make China a powerful manufacturing country and upgrade the nations industrial power through the internet, big data and artificial intelligence, the commission said.

To achieve that goal, the agency has laid out specific targets to develop key technologies and guide research and the flow of funds in each sector.


Raw: EPO Democracy With No Separation of Powers and No Access to Justice "IndyWatch Feed Tech"

EPO democracy

Summary: While the EPOs autocrat attempted to frame the European Patent Office (EPO) as a social democracy in reality the Office was the exact opposite of it, explains the staff committee (CSC)

Working Group Social Democracy

Dear Mr Battistelli,

As indicated by the CSC delegation in the meeting with you on 20 November, we would like to reiterate our position with respect to the Working Group Social Democracy and express the following reservations concerning our participation.

As a preliminary remark, we remain of the opinion that it is not the right time to start discussions on reforms of the staff representation when we are in the middle of an intense social conflict, the causes of which are in no way related to the Staff Committee structure. Additionally, we see no need for haste in the view of the recent elections in Munich and Berlin which are valid for the next two years.

Further, Staff would appreciate not to be confronted with a further reform which will be perceived as ill-conceived1 and hastily introduced. In the light of the Office poor track record over the last years, we consider that the extremely tight time constraint you propose (end of discussions before February 2014) is over-ambitious and cannot guarantee proper discussion of such a complex matter under suitable conditions.

Beside the above issues of timing and timeframe, the CSC has fundamental concerns about the scope of the matter to be addressed in the working group. So far, you seem to consider that Social Democracy is limited to reforming the structure, modus operandi and the election rules of the functioning Staff Committee institution2.

The CSC disagrees with such over-restrictive understanding. In our view the mandate should be put into conformity with the key principles of Social
1 as symptom please see the large number of appeals regarding Circ.347 or the Well-being policy
2 see Communiqu 35

Democracy3 and must contain at least the following elements which are pillars of any democratic system:

- Separation of powers
- Access to justice (repair of the EPO appeal system)
- Fundamental rights (Investigation Guidelines, freedom of speech and communication, right to strike, disciplinary threats or measures on staff and their representatives, access to information)

At the moment none of above points is addressed in a satisfactory mann...


Planetary Resources' Arkyd-6 Ready for Launch "IndyWatch Feed Tech"

Planetary Resources' Arkyd-6 ready for launch

After years of development, the Planetary Resources-built Arkyd-6 is finally on the last leg of its journey into space. It is scheduled to be launched as a secondary payload atop India's PSLV-C40 mission in January 2018.

At approximately 4 by 8 by 12 inches (10 by 20 by 30 centimeters), Arkyd-6 is about twice the size of its predecessor, Arkyd-3R, which was deployed from the International Space Station's Kibo module airlock in 2015.

The Arkyd-6 contains the technology that will be used in Planetary Resources' asteroid exploration program such as second-generation avionics, communications, and attitude control systems, as well as orientation systems to aid in attitude control. It also includes the A6 instrument, which will provide infrared images of the Earth in the midwave slice of the spectrum.

The broadband imager spans 3 to 5 microns of the infrared spectrum. This slice of the spectrum reveals the presence of water and is sensitive to heat. As such, the A6 can search for traces of water not only on Earth but elsewhere. The ultimate objective of future versions of this instrument is to find water on near-Earth asteroids.

Original Submission

Read more of this story at SoylentNews.


How to add ssh key to qcow2 Linux cloud images using virt-sysprep "IndyWatch Feed Tech"

I have installed and setup KVM server on an Ubuntu Linux. I downloaded various .qcow2 cloud images. How do I setup public ssh keys for downloaded CentOS/FreeBSD/Ubuntu cloud images using virt-sysprep? You need to use a command called virt-sysprep that lets you reset or unconfigure virtual machines in preparation for cloning them. Step 1: Install Continue reading "How to add ssh key to qcow2 Linux cloud images using virt-sysprep"

The post How to add ssh key to qcow2 Linux cloud images using virt-sysprep appeared first on nixCraft.


EPO Remains in Defiance or Violation of ILO Rulings as Corcoran Contract Ends in 3 Days "IndyWatch Feed Tech"

The EPO operates outside the Rule of Law and judges now know it, seeing what their colleague has been subjected to

A technical board cluster

A technical board cluster

Summary: How Herr Ernst (Herrnst) succumbing to the will of Battistelli represents a rogue state of affairs that undermines the Unitary Patent (UPC) and should get further scrutiny from the international establishment (whoever has sufficient political clout as well as desire to tackle these profound issues)

Kluwer Patent Blog, a longtime propaganda platform of Team UPC (the writers there have a stake in the outcome), is facing severe backlash in the comments. See the comment here (probably in reply to Bristows) and 15 comments in reply to Tilmann. Those are very UPC-hostile comments in a pro-UPC blog which got caught deleting UPC-hostile comments in the past. Its quite revealing and increasingly evident that even the patent industry has shifted or changed its tune. Indeed, people in the legal community have totally lost interest in the UPC and recognise the UPCs dangers, not just the unlikely event of it becoming a reality (soon or ever). WIPR wrote about it the other day. But theres something more interesting in this blogs comments.

Its quite revealing and increasingly evident that even the patent industry has shifted or changed its tune.A comments thread which we mentioned more than 2 weeks ago (...


Coasty The Coaster Toaster "IndyWatch Feed Tech"

Whether or not you feel the need to laser cut custom drink coasters, you have to be impressed by the amount of thought that went into Coasty.

They say that justice is blind, and while we cant promise you anything at your next court date, we can at least say with confidence that were not the kind of people who will turn down a good hack just because its held together with rubber bands and positive vibes. If it works it works, and it doesnt matter what it looks like. Having said that, were blown away by how incredibly finished this particular project is.

Coasty, designed and built by [Bart Dring] is one of those projects that elevate a hack into something that looks like it could be a commercial product. It takes in a common pulpboard coaster and laser cuts any design you want. Its just the right size, with just the right components because this is Coastys purpose. It has a slot to feed in the coaster, and uses this as one of the axes during the laser cutting process, with the lasers left to right movement as the other. This method makes for a smaller overall footprint and means you never need to open the protective enclosure for normal operation.

Glasses and mustache cut out of a pulpboard coaster...


Police Shoot a Lot More People Than Previously Known "IndyWatch Feed Tech"

That we do not know the exact number is already a huge problem and unacceptable.  However the real problem is that an ill trained officer with a gun is a poor answer to an untrained thug with a gun and the reports we do get speak poorly to police practice.

Worse we have swat teams that act like they are invading hostile territory in the face of no intelligence.   This is nonsense.

I think that we need to simply disarm all first contact police forces.  There is no point in them actually going into harms way and there is less point in citizens assuming armed force is at the door.  Yet the moment a threat is observed, they can back of and call for that underused swat team.

This also meant to change the overall dynamic which today insists we have half the population potentially running around packing a gun.


Insurrection Arrested - listen to the silence "IndyWatch Feed Tech"

Insurrection Arrested - listen to the silence

It has been clear for the past month that something huge is underway.  It is managed by the military and military secrecy applies.  Last Friday, Trump signed an executive order declaring a national emergency enacting special powers.  My interpretation was that all the preparation work was complete as per the approximately 10,000 sealed indictments and this executive order added certain powers needed for certain cases not covered through normal justice system powers.

That meant that arrests should be underway during the Christmas  long weekend as per those sealed indictments.  Confirmation elements have been trickling in.

1    The most telling so far is that a number of key figures have all gone silent on their twitter accounts.  I will not list them but this would be the central group and it makes sense that they will be already in custody.  

2    The number of  'foot casts'  has also been increasing as well.  Do recall that every sealed indictment involved at least one significant interview that assured the target that the gig was truly up and thus a flight risk.

3     We have also seen an extraordinary number of CEO's resign their positions.  This is always the first step in protecting your business assets from RICO charges and in this case must be considered as such.  This includes George Soros suddenly giving up control of his financial empire as well over a month ago.  That was my first real clue that the game was on.

4     It is possible that a Marine Regiment has been sent to Guantanamo in preparation for the arrival of a large number of new guests. This also means that the promise of waterboarding is on the table...


Trump Warns of Sickness Inside Americas Institutions "IndyWatch Feed Tech"

You just read a clear declaration of war regarding the future of the 'Deep State' which has profoundly corrupted everything.
We already know that a massive purge is underway regarding the Pedophilia subculture central to this internal  conspiracy to essentially farm American Freedom.  This sub culture has given us a creeping internal socialism steadily choking the whole government apparatus.

Trump has been systematically dismantling what he can and has actually done wonders.  Yet we are still a long ways from the tipping point.  Whole departments will demand proactive leadership and that has been difficult to get.
What is shaping up though is  a steady increase in momentum shrouded by ample misdirection from Trump.  As i have already posted, you must watch his hands and remember that he understands secrecy in ways few do.

In one year he has confounded both allies and enemies and this is deliberately so.

Trump Warns of Sickness Inside Americas Institutions

By Jasper Fakkert

December 11, 2017 3:30 pm

President Donald Trump leaves the White House to board Marine One en route to Pensacola, Fla., on Dec. 8, 2017. (Samira Bouaou/The Epoch Times)

President Donald Trump said that Americas institutions have been made sick from the inside, and warned against powerful forces and bad and evil people in Washington who have benefited from the situation for years.



"Mind-blowing results" from gene therapy trial point to a cure for haemophilia "IndyWatch Feed Tech"

This effectively heals Hemophilia and considering the lifetime cost incurred, the price makes complete sense and will be gladly paid by governments.
Even more important, the true gene therapy gold rush has begun.  A whole range of genetic disorders will now be resolved.  Most are simply rare but their cure will release significant resources back to the medical industry.
Truly good news. .
"Mind-blowing results" from gene therapy trial point to a cure for haemophilia

A new trial has produced extraordinarily positive results for treating the devastating genetic condition haemophilia A(Credit: magann/Depositphotos)

The results from the first human trials for a gene therapy to treat patients with haemophilia A have just been published, and they are truly remarkable. The treatment has essentially cured almost all the participants, suggesting a transformative change is on the horizon in how this previously incurable genetic disease is treated.

2017 has been a landmark year in the field of gene therapy. In August the FDA approved the first gene therapy for public use in the United States, while other treatments race through various stages of clinical trials, targeting everything from...


Skilled Manufacturing Workers in Demand in the U.S. "IndyWatch Feed Tech"

Robot growing pains: Two U.S. factories show tensions of going digital

President Donald Trump has put bringing manufacturing jobs back to the United States at the center of his economic and trade agenda. But when jobs actually come - as they have here in southern Indiana - many factory workers are not prepared for them, and employers are having trouble hiring people with the needed skills.

U.S. manufacturing job openings stand near a 15 year high and factories are hiring workers at the fastest clip since 2014, with many employers saying the hardest-to-fill jobs are those that involve technical skills that command top pay.

In 2000, over half of U.S. manufacturing workers had only high school degrees or less, according to the Bureau of Labor Statistics. Today, 57 percent of manufacturing workers have technical school training, some college or full college degrees, and nearly a third of workers have bachelors or advanced degrees, up from 22 percent in 2000.

Mark Muro, a senior fellow at the Brookings Institution, said the digitalization sweeping the economy is forcing employers to hunt for a different mix of workers - and pay more in some cases for workers with technical skills. A new study by Muro found those with the highest digital skills saw average wage growth of 2 percent a year since 2010, while wages for those with medium skills grew by 1.4 percent and those at the bottom by 1.6 percent.

Original Submission

Read more of this story at SoylentNews.


Microsoft and Amazon employees caught in sex trafficking scandal "IndyWatch Feed Tech"

Microsoft and Amazon employees involved in obtaining sex-services from trafficked sex-workers

In a shocking revelation, tech giant Microsoft and e-commerce giant Amazon have been accused of being patrons of sex trafficking victims in the Silicon Valley, according to a report published recently by Newsweek.

To obtain the emails, the publication made public records request to the Prosecutors Office in King County. The publication got its hands on a slew of filthy emails sent to prostitution houses and pimps between 2014 and 2016 that document the industrys middle and upper echelons patronage of brothels and purchasing of services from trafficked sex workers.

Of all the emails, 67 emails were sent by Microsoft employees, 63 sent by Amazon workers and dozens more from other tech giants like Oracle, T-Mobile, Boeing and local tech firms.

The emails from the employees are all quite alike and most of them are hidden as responses to wrong email addresses.

I think you might have the wrong email address, wrote one man with an Amazon work address.

Think you might have the wrong guy, wrote another to a pimp from his Microsoft account.

These two emails are just examples from among hundreds of emails sent by tech workers at major companies in the hope of obtaining services of trafficked Asian women. The emails were sent on work accounts of first time buyers in order to verify their identity to pimps and prove that they werent cops by sending an employee badge or email.

The law enforcement authorities have been collecting these records from the computers of brothels and illicit sex massage parlor over the past few years.

Some of the emails were collected during a 2015 sting operation that targeted sex worker review boards and resulted in the arrest of 18 individuals, including high-level Amazon and Microsoft directors, the report said.

Two of the arrested executives opted for a trial, which is expected to begin in March.

In the meantime, in a statement issued to Newsweek, Microsoft said, Microsoft has a long history of cooperating with law enforcement and other agencies on combating sex trafficking and related topics, and we have employees who volunteer their time and money specifically to combat this issue as well. The personal conduct of a tiny fracti...


Nintendo Sells at Least 10 Million Switch Consoles in 2017, 64 GB Game Cards Delayed to 2019 "IndyWatch Feed Tech"

As of mid-December, Nintendo sold 10 million Switch consoles worldwide, after around 9 months of availability. The Switch outpaced sales of most other consoles in their initial months, except for the PS4.

Some big titles like The Elder Scrolls V: Skyrim (an influence on Zelda: Breath of the Wild) have been ported to Nintendo Switch. But the ability to port certain games may be hindered by the delayed release of 64 GB "game cards" (proprietary ROM cartridges) for the system:

Those wishing for 64GB Nintendo Switch game cards will have to keep waiting. According to a Wall Street Journal report, Nintendo pushed back the rollout of 64GB game cards until 2019, citing "technical issues" as the problem. Game developers get Switch cards from Nintendo, so this means that they'll have to wait to get game cards that can support big titles.

[...] Nintendo initially attempted to alleviate the storage issue with the Switch's microSD card slot, which can hold an extra 2TB of space. However, 2TB microSD cards aren't available yet, and not every microSD card is the same. Some big titles require high-speed microSD cards to run properly.

While many mobile devices and the Nintendo Switch can support up to 2 TB of microSD storage, the largest currently in production is SanDisk's 400 GB card, which currently retails for $250.

CNET: Nintendo Switch was 2017's best gadget. What does it mean for 2018?

The Verge 2017 tech report card: Nintendo

Previously: Nintendo to More Than Double Production of Switch; Success Rooted in Wii U's Failu...


Environmentally Aware Jewelry Gets Attention "IndyWatch Feed Tech"

We didnt include a Most Ornate category in this years Coin Cell Challenge, but if we had, the environmentally reactive jewelry created by [Maxim Krentovskiy] would certainly be the one to beat. Combining traditional jewelry materials with an Arduino-compatible microcontroller, RGB LEDs, and environmental sensors; the pieces are able to glow and change color based on environmental factors. Sort of like a mood ring for the microcontroller generation.

[Maxim] originally looked for a turn-key solution for his reactive jewelry project, but found that everything out there wasnt quite what he was looking for. It was all either too big or too complicated. His list of requirements was relatively short and existing MCU boards were simply designed for more than what he needed.

On his 30 x 30 mm PCB [Maxim] has included the bare essentials to get an environmentally aware wearable up and running. Alongside the ATtiny85 MCU is a handful of RGB LEDs (with expansion capability to add more), as well as analog light and temperature sensors. With data from the sensors, the ATtiny85 can come up with different colors and blink frequencies for the LEDs, ranging from a randomized light show to a useful interpretation of the local environment.

Its not much of a stretch to imagine practical applications for this technology. Consider a bracelet that starts flashing red when the wearers body temperature gets too high. Making assistive technology visually appealing is always a challenge, and there&...


Elon Musk Vows to Build Tesla Pickup Truck 'Right After' Model Y "IndyWatch Feed Tech"

Tesla has been hyping up the prospect of an electric pickup truck for a long time (you're looking at an artist's rendering above), but when can you expect to see it? You might have a clearer idea. As part of a call for feedback, Elon Musk has promised that the pickup will be made "right after" the Model Y crossover arrives between 2019 and 2020. We'd take that commitment with a grain of salt (remember how Tesla expected widescale Model 3 deliveries to start in 2017?), but it at least gives you an idea of what the EV maker is shooting for.


Original Submission

Read more of this story at SoylentNews.


Whats Love got to do with Education? "IndyWatch Feed Tech"

[This article is drawn from Ch. 8: Pedagogical Love: An Evolutionary Force in Postformal Education: A Philosophy for Complex Futures.]

There is nothing more important in this world than radical love as Paolo Freire told Joe Kincheloe over dinner.

- Joe Kincheloe. Reading, Writing and Cognition. 2006.

And yet, we live in a world of high-stakes testing, league tables for primary schools as well as universities, funding cuts, teacher shortages, mass shootings in schools, and rising rates of depression and suicide among young people.

The most important value missing from education today is pedagogical love.

In Pedagogical Love: An Evolutionary Force (Ch. 8 of Postformal Education: A Philosophy for Complex Futures) I explain why love should be at centre-stage in education. I introduce contemporary educational approaches that support a caring pedagogy, and some experiences and examples from my own and others practice, ending with some personal reflections on the theme.

Why do we want to educate with and for love? We live in a cynical global world with a dominant culture that does not value care and empathy. We live under the blanket of a dominant worldview that promotes values that are clearly damaging to human and environmental wellbeing. In many ways our world, with its dominance of economic values over practically all other concerns, is a world of callous values. And recently weve embarked on a flight from truth.

In the search for truth, the only passion that must not be discarded is love. Truth [must] become the object of increasing love and care and devotion.

- Rudolf Steiner. Metamorphoses of the Soul, Vol. I. 1909.

What a contrast Steiners early 20th century statement is to the lack of a love for truth that abounds in fake news in our post-Truth world. Canadian holistic educator, John Miller points to the subjugation of words like love in contemporary educational literature in the following quote:

The word love is rarely mentioned in educational circles. The word seems out of place in a world of outcomes, accountability, and standardised tests.

- John Miller. Education and the Soul. 2000.



What We Get Wrong About Dying - Issue 55: Trust "IndyWatch Feed Tech"

My first exposure to the death of a patient came during my third year of medical school, in Israel. It was my first clinical rotation, which happened to be in internal medicine. Tagging along with my mentor, a senior physician to whom I had been assigned, on his morning rounds, we entered the room of an elderly woman who was critically ill with an antibiotic-resistant bacteria in her urinary system. The infection had spread throughout her frail body and was now wreaking havoc on most of her vital organs. Observing her for a few moments as she lay there unconscious, he said, Shes almost at the end.

I scrutinized the womans face, her breathing, the digital readouts of the instruments, trying to understand what signs he was so brilliantly interpreting. To me it seemed like voodoo, as though through some dark art he was able to peer into her very soul.

kali9 / Getty Images

Assuming that with nothing more to do here we would move on, I began to back away toward the door. But he surprised me by pulling a chair up to the bedside, sitting down, and taking one of the womans limp hands in his own. I
Read More

Would Twitter Ruin Bee Democracy? - Issue 55: Trust "IndyWatch Feed Tech"

Did the ancient Athenians invent democracy? Or did bugs have it way earlier than the Greeks? Cornell entomologist Tom Seeley knows which option hes voting for.

Honeybees regularly split from their mother colony. Seeley wondered, with tens of thousands of bees in a swarm, how do they reach agreement? His answer: simple-majority democracy.

In his 2010 book Honeybee Democracy, Seeley described how bees intending to strike out on their own first send scouts in all directions to collect information. On their return, these early scouts buzz and twirl to recruit more scouts. Some gain fans whereas others lose them. Newly deciding scouts go out to look for themselves. After the majority of scouts (which number in the hundreds) have converged on one opinion, the entire swarm takes off for its promised land.

Bees are not alone in using simple-majority ruleTibetan macaques do it too.1 In 2014, my colleagues and I were studying how a group of 12 adult macaques coordinated their collective movements. We noticed that once three or more of them ganged up together, the entire group would often follow suit. The success rate in getting the group into action increased with the number of initiatorsthose who started the process.
Read More

The Data That Threatened to Break Physics - Issue 55: Trust "IndyWatch Feed Tech"

Antonio Ereditato insists that our interview be carried out through Skype with both cameras on. Just the other side of middle age, his salt-and-pepper hair frames wide open eyes and a chiseled chin. He smiles easily and his gaze captures your attention like a spotlight. An Italian accent adds extra vowels to the end of his words.

We talk for 15 minutes before he agrees to an on-the-record interview. He tells me he has no desire to engage journalists who might subvert his words into a sensational, insincere story. The reason he agreed to Skype with me is because I am not a journalist, but a physicist and writer who spent 13 years in the trenches of experimental particle physics. And he has no tolerance for entering another debate about behavior rather than science. But finally, he says, Okay. Ive looked in your eyes. I trust you. Maybe that is my problem. Maybe I trust too easily, but I trust you. He laughs and leans back in his chair with his arms out and open.

Ereditato is the former leader of the 160 physicists from 13 countries that compose the OPERA collaboration, whose goal is to study neutrino physics. It
Read More


Organic Material Set to Make Solar Energy Truly Green "IndyWatch Feed Tech"

Research on solar cells has been going on at a breakneck pace. However, with the advent of organics based cells, solar energy will be greener than ever.


FCC Approves "WattUp" Wireless Power Transmission "IndyWatch Feed Tech"

FCC approves first wireless 'power-at-a-distance' charging system

Charging your mobile device wirelessly is certainly less of a hassle than plugging it in, but still requires the device be in physical contact with its station to actually work. That's about to change now that the Federal Communications Commission has approved the first wireless charger that works from up to three feet away.

San Jose-based startup, Energous, announced on Tuesday that it has received the first such FCC certification for power-at-a-distance wireless charging with its WattUp Mid Field transmitter. The transmitter converts electricity into radio frequencies, then beams the energy to nearby devices outfitted with a corresponding receiver. This differs from the resonant induction method that the Pi wireless charging system relies upon and offers a greater range than the Belkin and Mophie chargers that require physical contact with the device.

Also at Ubergizmo.

Original Submission

Read more of this story at SoylentNews.


NEW 'Off The Hook' ONLINE "IndyWatch Feed Tech"

NEW 'Off The Hook' ONLINE

Posted 28 Dec, 2017 2:26:31 UTC

The new edition of Off The Hook from 27/12/2017 has been archived and is now available online.


A Guidebook to the World of Counterfeit Parts "IndyWatch Feed Tech"

Weve all experienced it: that sinking feeling you get when youve powered up your latest circuit and nothing happens. Maybe you made a mistake in your design or you shorted something while soldering. Its even possible that ESD damaged one of your chips. All of these issues and more are possible, maybe even inevitable, when designing your own hardware.

But what if your design is perfect and your soldering skills beyond reproach? What if your shiny new device is DOA but youve done everything right? A fascinating report by [Yahya Tawil] makes the case that its increasingly possible that youve run across a counterfeit component. While its still relatively unlikely the hobby hacker is going to get bit by the counterfeit bug, the figures and examples referenced in his report may surprise you.

One of these is an ATmega328, the other is literal garbage.

[Yahya] points to a number of government studies on the rising scourge of counterfeit components, and the numbers are rather surprising. For example, the U.S D...


Redbox Deal With Universal Eliminates Rental Window Delay "IndyWatch Feed Tech"

Redbox reached a new distribution deal with Universal Pictures to make the studio's Blu-ray Disc and DVD titles available for rental at Redbox kiosks the same day as retail sell-through dates.

The deal also makes Universal's movies available digitally through Redbox On Demand, which the company launched last week, via transactional video-on-demand rentals and electronic sell-through.

Under Redbox's previous pact with Universal, the kiosk operator had agreed to a 28-day window after home-video release to rent the studio's movies at its DVD kiosks.

The revised deal starts with January titles, which will include Tom Cruise-starrer "American Made" and comedy "Brad's Status," written and directed by Mike White and starring Ben Stiller, on Jan. 2, 2018.


Original Submission

Read more of this story at SoylentNews.


HPR2454: The Alien Brothers Podcast - S01E02 - Strictly Hacking "IndyWatch Feed Tech"

Casper and Rutiger attempt to STAY ON TARGET by discussing hacking which when you think about it is an utterly pretentious and vague goal for a podcast presented by Hacker Public Radio, especially when considering the end result. Shame on us! Other topics include Friendsgiving and giving thanks; probably the greatest gaming console of the 1970s; early hackings (sic) committed by the hosts; << >> References: The link to the first chapter of Dief Minuskys seminal the Nature of Systems is freely available here. Although we referred to the Chapter 8 material on system network security during the show, Rutiger decided it was better to release chapters, incrementally, in order let listeners gain a fuller appreciation for the work. Rutiger is also attempting to track down the original author, who never publicly released the work, to gain retroactive permission for this link, but for the moment Alien Brothers Podcast takes full responsibility for allowing access to this non-copyrighted work and well just go ahead, you know, feel good about the possibility it will all turn out OK. Uber Data Breach (2017; How to Disable the Intel Management Engine Backdoor


Btrfs Gets A RAID1/10 Speed Patch, Helping Out SSDs "IndyWatch Feed Tech"

A new Btrfs file-system kernel driver patch is now available to improve its RAID1/RAID10 read performance, particularly for SSDs...


Snapchat to push content outside of app "IndyWatch Feed Tech"

Snapchat will reportedly begin to push content outside of its own platform in an attempt to address its stagnant user growth.The new product, reported by Cheddar, is called Stories Everywhere and will display Snapchats content on the web and...


How T-Cells Navigate The Rough-And-Tumble Environment Of The Bloodstream "IndyWatch Feed Tech"

To eradicate pathogens or counteract inflammation, cells of the immune system move through often rapid blood flow toward peripheral disease sites, such as skin, gut or lung. Thus a goal of immunologists has been to define the repertoire of molecules that not only keep fast-moving immune cells on course but allow them to access inflamed tissues.

Now, a team led by La Jolla Institute for Allergy and Immunology (LJI) researcher Klaus Ley, M.D., reports that helper T cells move toward inflamed tissue using membrane protrusions that stabilize them and provide traction on the vasculature. Using high-resolution microscopy and global molecular analysis, the team shows that immature T cells lack these protrusions but that maturing T-cells switch on a gene expression program to create material to construct them.

That work, published in the Dec. 26. , 2017, issue of Cell Reports, provides a brand new collection of factors potentially useful to modulate immune responses in conditions as diverse as cancer and autoimmune disease.

"Immature T cells remain in lymphoid organs and can't move into sites of infection," says Ley, a professor and head of in LJI's Division of Inflammation Biology. "To reach their targets, T cells must first acquire biomechanical properties necessary for migratory behavior. We now know they do that in part by deploying strategies similar to those we previously discovered in cells called neutrophils."

Specifically, in a 2012 Ley's group reported in Nature that white blood cells called neutrophils throw out tube-like protrusions to anchor themselves and avoid being swept away by blood rushing by at high speed. As neutrophils gently roll along, tether after tether is peeled loose and slung forward like a lasso to gain new traction and slow them down. The new work shows multiple types of mature T cells, which unlike neutrophils are part of the adaptive immune system, also sprout tethers and slings to help them migrate to targets. Those T cells include so-called Th1 and Th17 T helper cells, which "help" other cells mount an immune response, and regulatory cells called Tregs.

Michael Abadier, Akula Bala Pramod, Sara McArdle, Alex Marki, Zhichao Fan, Edgar Gutierrez, Alex Groisman, Klaus Ley. Effector and Regulatory T Cells Roll at High Shear Stress by Inducible Tether and Sling Formation. Cell Reports, 2017; 21 (13): 3885 DOI: 10.1016/j....

Go Back:30 Days | 7 Days | 2 Days | 1 Day

IndyWatch Science and Technology News Feed Today.

Go Forward:1 Day | 2 Days | 7 Days | 30 Days

Wednesday, 27 December


Peloton Cycle Review "IndyWatch Feed Tech"

I review the Peloton cycle, talk about its specs, compare it to the alternative stationary bikes and more


Measuring And Disrupting Anti-Adblockers Using Differential Execution Analysis "IndyWatch Feed Tech"

The PDF contains the full paper (14 pages), but also includes the following abstract:

AbstractMillions of people use adblockers to remove intrusive and malicious ads as well as protect themselves against tracking and pervasive surveillance. Online publishers consider adblockers a major threat to the ad-powered "free" Web. They have started to retaliate against adblockers by employing anti- adblockers which can detect and stop adblock users. To counter this retaliation, adblockers in turn try to detect and filter anti-adblocking scripts. This back and forth has prompted an escalating arms race between adblockers and anti-adblockers.

We want to develop a comprehensive understanding of anti- adblockers, with the ultimate aim of enabling adblockers to bypass state-of-the-art anti-adblockers. In this paper, we present a differential execution analysis to automatically detect and analyze anti-adblockers. At a high level, we collect execution traces by visiting a website with and without adblockers. Through differ- ential execution analysis, we are able to pinpoint the conditions that lead to the differences caused by anti-adblocking code. Using our system, we detect anti-adblockers on 30.5% of the Alexa top- 10K websites which is 5-52 times more than reported in prior literature. Unlike prior work which is limited to detecting visible reactions (e.g., warning messages) by anti-adblockers, our system can discover attempts to detect adblockers even when there is no visible reaction. From manually checking one third of the detected websites, we find that the websites that have no visible reactions constitute over 90% of the cases, completely dominating the ones that have visible warning messages. Finally, based on our findings, we further develop JavaScript rewriting and API hooking based solutions (the latter implemented as a Chrome extension) to help adblockers bypass state-of-the-art anti-adblockers.

Read more of this story at SoylentNews.


Ten Questions (and Answers) about Teaching Evolution "IndyWatch Feed Tech"

1. What do you think are the main factors that influence how effective a biology teacher is at teaching evolution?

Its all about content knowledge. A teacher should know the definition of a scientific theory, current examples of evolution, and, as a result, have confidence when teaching the subject.

2. How does evolution education differ from country to country?

Our teachers [in the United States] have to constantly defend evolution. Thats not the case in most first-world countries. Like Richard says in The Greatest Show on Earth, its like a professor of Roman history having to defend the existence of the Roman Empire every year, year after year. Im not as familiar with other countries, but as far as the United States is concerned, I am getting published soon in a journal titled Evolution: Education and Outreach. I did a comprehensive state-by-state comparison of our nations middle school science standards.

3. Why is it important for students to understand evolution?

Evolution is cool! Its a beautiful web that underlies biology, making everything connected. It explains the history and diversity of all of the amazing life on Earth. And, in a practical sense, it helps us develop new medications and plays a key role in conservation of ecosystems.

4. What type of evidence is important for students to view in a biology classroom?

It is important that they understand that there are multiple lines of evidence for evolution all leading to the same conclusion. Evidence for evolution comes from many areas, including the fossil record, the law of superposition, biogeography, artificial selection, homologous structures, vestigial organs, and genetics. Teachers should definitely cover phylogenetics.

5. What techniques should be used for teaching evolution?

Make sure students understand scientific inquiry first and how science finds answers through observation, experiments, data collection, and sharing results. Try hands-on activities and its very important to use modern-day examples of evolution, not just Darwin and his finches.

6. What is your opinion of biology teachers who dont accept evolution?

They do not understand how science finds its answers and are doing a terrible disservice to their students.

7. At what point do you think students should be exposed to evolution?

Students should be exposed to evolution in Kindergarten, though New Hampshire, Massachusetts, and a few other st...

Critical Thinking and Parenting: How Skepticism Saved My Special Needs Kid From Certain Death "IndyWatch Feed Tech"

As a skeptic, I try to view the world in a rational way, but Im also a parent, which means Im insane.

In April 1995, I became very ill. My doctor performed tests and found a parasite dwelling in my abdomen. I was overjoyed. During the infestation, I experienced nausea, exhaustion, and frequent urination. Finally, I endured hours of excruciating pain, culminating in surgical extraction. Afterward, I hugged the parasite and named it after a dead poet. I brought it home, cuddled it, and bought it many nice toys. The parasite emitted piercing screams and soiled itself. I found this encouraging and took many photographs.

Twenty-two years have gone by since the infestation. The parasite lives in my house and downloads music from iTunes without my permission. Im a rational person, but Im smitten. Id do anything for her.

She is my daughter, Emily. Shes disabled, and shes anything but a parasite to me.

Meet the Parents

When it comes to skepticism, parents of children with disabilities are a special case. Special-needs parents are particularly vulnerable to fraudulent claims and quack medicine and are often shamed for not trying alternative cures. Imagine: your child has been diagnosed with a chronic condition that cannot be cured. Everything youd hoped for your childto grow up to be a happy, healthy, independent individualhas been taken away. You mourn the child you expected to have while still trying to be the best parent you can be for the child you do have. Special-needs parenting requires extraordinary commitments, among them:

Time. Parenthood demands taking time for your kids, obviously. Special-needs parenting demands more. Time for therapy, doctors appointments, time off work. If you have other, healthy children, you have to balance the time you spend with your special needs kid with time spent with their siblings.

Money. Insurance never covers everything. You still pay for medication, adaptive equipment, after-school care. Even if your child receives social security, it doesnt go far. You may have legal fees, for example having to set up a special-needs trust. Save all you can so when your child becomes an adult, she or he will be well cared-for. Try not to think what will happen when youre not there anymore.

Energy. You probably work a forty-hour week. Your spouse (if you have one) probably also works. And you have a home. And children. So you come home from work to deal with your kids needs, cooking, cleaning, and homework. Youre probably dealing with all this as a single parent; 80 percent of marriages with special-needs kids end in divorce (Thorpe N.d.; Anderson et al. 2007). Extended family can ease the burden, but the stress is still phenomenal.

Theres joy, too. You get excited over every milestone and bond ove...


Keeping Copyright Site-Blocking At Bay: 2017 In Review "IndyWatch Feed Tech"

In 2017, major entertainment companies continued their quest for power to edit the Internet by blocking entire websites for copyright enforcementand weve continued to push back.

Website blocking is a particularly worrisome form of enforcement because its a blunt instrument, always likely to censor more speech than necessary. Co-opting the Internets domain name system (DNS) as a tool for website blocking also threatens the stability of the Internet by inviting ever more special interests and governments to use the system for censorship.

This year, weve kept pressure on ICANN, the nonprofit body that makes domain name policy, to keep copyright enforcement out of their governing documents. And weve called out domain name registry companies who bypassed ICANN policy to create (or propose) their own private copyright enforcement machines. Public Interest Registry (PIR), the organization that manages the .org and .ngo top-level domains, announced in February that it intended to create a system of private arbitrators who would hear complaints of copyright infringement on websites. The arbitrators would wield the power to take away a websites domain name, and possibly transfer it to the party who complained of infringement. The Domain Name Association (DNA), an industry trade association, also endorsed the plan.

EFF pointed out that this plan was developed in secret, without input from Internet users, and that it would bypass many of the legal protections for website owners and users that U.S. courts have developed over the years. Within weeks, PIR and DNA shelved this plan, apparently for good.

Unfortunately, some domain registries continue to suspend domain names based on accusations from major motion picture distributors (whom they call trusted notifiers) in a process that also bypasses the courts. Along with giving special privileges to luxury brands and other major trademark holders, and to U.S....


FCC approves first 'power-at-a-distance' wireless charging device "IndyWatch Feed Tech"

The Federal Communications Commission (FCC) on Wednesday for the first time approved a device that can recharge electronics up to three feet away.The Energous Corporations Watt Up device lets users charge their electronics, regardless of the...


Google extends commitments from antitrust case with FTC "IndyWatch Feed Tech"

Google says that it will extend commitments it made to the Federal Trade Commission (FTC) in 2012, keeping in place an agreement it struck to quell the agency's antitrust concerns.The search giant says it will continue to let third-party search...


Best crypto blog posts of 2017 "IndyWatch Feed Tech"

Hello hello,

Merry christmas and happy new year. We're done for the year and so it is time for me to write this blog post (I did the same last year by the way).

I'll copy verbatim what I wrote last year about what makes a good blog post:

  • Interesting. I need to learn something out of it, whatever the topic is. If it's only about results I'm generally not interested.
  • Pedagogical. Don't dump your unfiltered knowledge on me, I'm dumb. Help me with diagrams and explain it to me like I'm 5.
  • Well written. I can't read boring. Bonus point if it's funny :)

Without further adue, here is the list!

Best crypto blog posts of 2017 "IndyWatch Feed Tech"

Hello hello,

Merry christmas and happy new year. We're done for the year and so it is time for me to write this blog post (I did the same last year by the way).

I'll copy verbatim what I wrote last year about what makes a good blog post:

  • Interesting. I need to learn something out of it, whatever the topic is. If it's only about results I'm generally not interested.
  • Pedagogical. Don't dump your unfiltered knowledge on me, I'm dumb. Help me with diagrams and explain it to me like I'm 5.
  • Well written. I can't read boring. Bonus point if it's funny :)

Without further adue, here is the list!

Best crypto blog posts of 2017 "IndyWatch Feed Tech"

Hello hello,

Merry christmas and happy new year. We're done for the year and so it is time for me to write this blog post (I did the same last year by the way).

I'll copy verbatim what I wrote last year about what makes a good blog post:

  • Interesting. I need to learn something out of it, whatever the topic is. If it's only about results I'm generally not interested.
  • Pedagogical. Don't dump your unfiltered knowledge on me, I'm dumb. Help me with diagrams and explain it to me like I'm 5.
  • Well written. I can't read boring. Bonus point if it's funny :)

Without further adue, here is the list!

Tuesday, 26 December


Squinting at ASCII on Linux "IndyWatch Feed Tech"

ASCII plays a much more important role on our systems than generating techno-art. Let's explore the commands that allow you to see how it works.

IndyWatch Science and Technology News Feed Archiver

Go Back:30 Days | 7 Days | 2 Days | 1 Day

IndyWatch Science and Technology News Feed Today.

Go Forward:1 Day | 2 Days | 7 Days | 30 Days

IndyWatch Science and Technology News Feed was generated at World News IndyWatch.

Resource generated at IndyWatch using aliasfeed and rawdog