IndyWatch Science and Technology News Feed Archiver

Go Back:30 Days | 7 Days | 2 Days | 1 Day

IndyWatch Science and Technology News Feed Today.

Go Forward:1 Day | 2 Days | 7 Days | 30 Days

IndyWatch Science and Technology News Feed was generated at World News IndyWatch.

Sunday, 21 January


Color Organ Dress, A Wearable With Audio Feedback "IndyWatch Feed Tech"

There is a huge amount of interest among our community in wearable electronics, but it is fair to say that it is a technology that has a way to go at our level in terms of its application. Some twinkly LEDs are all very well, but unless you have the arrived-on-a-spaceship-from-the-future aesthetic of someone like [Naomi Wu] to carry them off they get old rather quickly.

What the sew-on LED sector of wearable electronics is waiting for are some applications, wearable lights that do something rather than just look pretty. And [Moko] has a project that takes them in that direction, with her color organ dress, a garment whose LEDs react to ambient sound with the aid of a MEMS microphone and an Adafruit Gemma M0 microcontroller board. The LEDs form a color wheel which rotates, and stops at a point proportional to the sound level at the time.

The write-up is an interesting one, going into a little detail as it does in the images on the construction of an electronically-enhanced piece of clothing. Wiring everything up is one thing, but there are other considerations such as the incorporation of extra panels to protect them from mechanical stress, and from sweat. From a dressmakers perspective its a well constructed garment in its own right with an attractive PCB-style pattern (Where did she get that fabric? Or did she print it herself?) and it appears that shes the fortunate owner of a serger (overlocker).



These High-Speed Nano-Cranes Could Form Molecular Assembly Lines "IndyWatch Feed Tech"

Tiny nano-scale machines formed from DNA could be the future of manufacturing things at small scale but great volume: drugs, tiny chip components, and of course more nanomachines. But moving simple, reusable machines like a little arm half a micrometer long is more difficult than at human scale. Wires for signals aren't possible at that scale, and if you want to move it with a second arm, how do you move that arm?

For a while chemical signals have been used; wash a certain solution over a nanobot and it changes its orientation, closes its grasping tip, or what have you. But that's slow and inexact.

Researchers at the Technical University of Munich were looking at ways to improve this situation of controlling machines at the molecular scale. They were working with "nano-cranes," which are essentially a custom 400-nanometer strand of DNA sticking up out of a substrate, with a flexible base (literally it's made of unpaired bases) that lets it rotate in any direction. It's more like a tiny robotic finger, but let's not split hairs (or base pairs).

What Friedrich Simmel and his team found, or rather realized the potential of, was that DNA molecules and therefore these nano-cranes have a negative charge. So theoretically, they should move in response to electric fields. And that's just what they did.

[...] The team's work, which like most great research seems obvious in retrospect, earned them the coveted cover story in Science.

Source: TechCrunch

Original Submission

Read more of this story at SoylentNews.


Microsofts new drawing bot is an AI artist "IndyWatch Feed Tech"

Microsoft today is unveiling new artificial intelligence technology thats something of an artist a drawing bot. The bot is capable of creating images from text descriptions of an object, but it also adds details to those images that werent included the text, indicating that the AI has a little imagination of its own, says Microsoft.

If you go to Bing and you search for a bird, you get a bird picture. But here, the pictures are created by the computer, pixel by pixel, from scratch, explained Xiaodong He, a principal researcher and research manager in the Deep Learning Technology Center at Microsofts research lab in Redmond, Washington, in Microsofts announcement. These birds may not exist in the real world they are just an aspect of our computers imagination of birds.

The bot is able to generate a variety of images, researchers say, including everything from ordinary pastoral scenes, like those with grazing livestock, to the absurd like a floating double-decker bus.


Joe Rogan Experience #1066 "IndyWatch Feed Tech"

Mel Gibson and Joe Rogan, talk on Stem Cells:

Mel Gibson is an actor and filmmaker. Neil Riordan, PA, PhD is one of the early pioneers and experts in applied stem cell researc


Tomu: A Microcontroller for Your USB Port "IndyWatch Feed Tech"

Looking for a ultra tiny development board? Tomu is an ARM Cortex M0+ device that fits inside your USB port. Weve seen these in person, and theyre tiny.

Theres a few commercial devices in this form factor on the market. For example, the Yubikey Nano emulates a keyboard to provide codes for two-factor authentication. The Yubikeys tiny hardware does this job well, but the closed-source device isnt something you can modify.

Tomu is a new device for your USB port. It sports a Silicon Labs EFM32 microcontroller, two buttons, and two LEDs. This particular microcontroller is well suited to the task. It can talk USB without a crystal for timing, and has an internal regulator to generate the core voltage from a 5 V USB supply. Since it supports DFU firmware updates, it can be reprogrammed without any special tools.

Unfortunately, the EFM32 device lacks secure storage options, so the Tomu might not be the best device to keep your secrets on. That being said, it will be interesting to see what applications people come up with. The creators have suggested using the device for media buttons, sleeping and waking a computer, and as a U2F key.

The project is currently available on CrowdSupply, and all design files and source is available on their Github. If you like soldering tiny things, the twelve-part bill of materials should be fairly easy to assemble at home.

Go Back:30 Days | 7 Days | 2 Days | 1 Day

IndyWatch Science and Technology News Feed Today.

Go Forward:1 Day | 2 Days | 7 Days | 30 Days

Saturday, 20 January


You may know me from such performances as my life. "IndyWatch Feed Tech"

(woman at bar) Everyone confuses Sarah Dorfmann, the real me, with Sarah Dorfmann, the character I play at work, at home and in all of my relationships.

We treat authenticity like its a binary: Shes authentic. Hes inauthentic. But really its a spectrum and Im guessing you, like me, occupy pretty big swaths of it over the course of any given day. We have to, just to survive the contradictions and minefields the world has in store for us.

But I hope that, although my narrative arc may meander like hell, it still bends toward authenticity. The past year has seen an unrelenting assault on truth and honesty (coming, weirdly enough, in large part from someone whose level of personal authenticity may be unparallelled among presidents: he may really be as much of a lying dick as he seems).

Maybe its no coincidence that the word truthiness was coined by Stephen Colbert, who was the first person I saw regularly play a character with the same name as theirs and very little else in common.

These days, the truth needs all the allies it can get. Maybe for most of us, that starts, not with letting it all hang out in unfiltered, damaging Twitter rants, but in recognizing the moments when were being less than completely authentic and understanding why. Being ruthlessly honest with ourselves may let us be more compassionately honest with everyone else.

See more cartoons about social media, business and the way we live and work online at Noise to Signal Cartoon...


Project Davos: What's the Single Best Way to Close the World's Wealth Gap? "IndyWatch Feed Tech"

Donald Trump and Angela Merkel will join 2,500 world leaders, business executives and charity bosses at the World Economic Forum (WEF) in Davos, Switzerland which kicks off on 23 January. High on the agenda once again will be the topic of inequality, and how to reduce the widening gap between the rich and the rest around the world.

The WEF recently warned that the global economy is at risk of another crisis, and that automation and digitalisation are likely to suppress employment and wages for most while boosting wealth at the very top.

But what ideas should the great and good gathered in the Swiss Alps be putting into action? We'd like to know what single step you think governments should prioritise in order to best address the problem of rising inequality. Below we've outlined seven proposals that are most often championed as necessary to tackle the issue but which of them is most important to you?

  • Provide free and high quality education
  • Raise the minimum wage
  • Raise taxes on the rich
  • Fight corruption
  • Provide more social protection for the poor
  • Stop the influence of the rich on politicians
  • Provide jobs for the unemployed

Do you think these ideas are enough, or are there any better ideas to close this wealth gap ? You too can participate and vote for the idea that, you think, works best.

Original Submission

Read more of this story at SoylentNews.


Spectre Variant One Mitigations Will Be Sent In For Linux 4.16 "IndyWatch Feed Tech"

The Linux 4.16 kernel will feature Spectre Variant One "Bounds Check Bypass" mitigations...


Blockchain Patents Are a Catastrophe in the Making as Trolls and Aggressors Accumulate Them "IndyWatch Feed Tech"

Related: Blockstream Has No Patents, But Pledges Not to Sue Using Patents

Marathon Patent Group: Massively Overvalued
Reference: Marathon Patent Group: Massively Overvalued

Summary: As patents pertaining to blockchains continue to be granted even in defiance of Alice/Section 101 it seems likely that patent wars will sooner or later erupt, involving some large banks, IBM, and patent trolls associated with the notorious Erich Spangenberg

THE emergence of digital currencies (also known as cryptocurrencies) brought rise to blockchains a concept whose explanation ought to quickly reveal to anyone that it boils down to software and is thus not eligible for patents (except maybe in China).

There is a growing threat now; that threat isnt FUD or hacks or collapse or whatever; patent parasites are like hawks waiting to attack digital currencies. See Patent Strategies for Cryptocurrencies and Blockchain Technology [PDF] and all sorts of articles from media of patent maximalists. Theyre waiting to initiate something similar to and barely distinguishable from patent wars in mobile phones. Jon Calvert of ClearViewIP, for example, is quoted alongside a bunch of patent law firms. They all defend the screwing of blockchains with a vast thicket of software patents. To quote:

The bigger tech companies, the IBMs of this world, are trying to create blockchain infrastructure that can be used by corporate enterprises or financial institutions. They want to charge for software as a service. By having patent protected technology, they can argue that theirs is the best, the most valuable, or the most valid, which makes them more credible. These are also the people who are more likely to use their patents aggressively later, when theyve got a strong portfolio. If you look at Microsoft, they w...


Vacuum Tubes: Shipping Through EBay Now Challenging? "IndyWatch Feed Tech"

There is disquiet in the world of vacuum electronics, that something as simple as shipping a vacuum tube could now be very difficult to achieve. Its a concern expressed among other places in a video by [Guitologist] that weve included below, and includes tales of vacuum tubes being impounded as either dangerous to ship, or not allowed to be shipped across international borders.

Upon investigation it appears that the common thread in all the stories lies with eBays Global Shipping Program, the centralised shipping service operated by the online auction giant. We reached out to eBays press office on the subject but have yet to receive a reply. Its best to ask someone who ships a lot of tubes for comment when you have a tube shipping story, so we also had a conversation with TC Tubes. Theyre a small company dealing in tubes, and as you might imagine they ship a lot of them (Their website is likely to detain you for a while if you are a tube-head). [Chelsea] from TC Tubes told us that they have encountered no regulatory barriers to tube shipping, and that their only bad experience has been yet again with eBays Global Shipping Program.

So it seems there is no cause for panic if you ship tubes, CE marking or RoHS rules havent come for your EL34s and your 6550s. Ebay have evidently got some kind of issue with tubes in their shipping operation, and perhaps you should ship by other means if you wish to avoid your tubes going astray. The consensus here among the Hackaday crew is that it could be as simple as uninformed employees not being aware of what tubes are because they arent as common as they used to be. After all, with over a hundred years of history behind them its not as though any potential issues with their shipping havent been comprehensively explored.

Wed still be interested to hear from eBay on the matter though, if they would care to comment.

Thanks [Killergeek] for the tip.

Tube image: Hannes Grobe  [CC BY 3.0].


Qualcomm/Broadcom/NXP Combination Would Become a Disastrous Patent Thicket Which Benefits Nobody "IndyWatch Feed Tech"

Monopoly power merely harms the entire market where resources (e.g. pipes) cannot be shared

Monopoly power

Summary: Worried by the prospect of mega-mergers and takeovers which would put far too much market power (and monopoly through patents) in one place, governments and corporations speak out

THE CHIPSET/SILICON giants are becoming fewer and bigger. This means that centralisation of respective patents (with patent thickets which prevent fair competition) carries on. This is further exacerbated by some recent industry moves.

As promoter of software patents and a patent bully with a long track record, Qualcomm wants an even broader or thicker patent thicket.China, for a change, is standing up to evil patent bullies like Broadcom and Qualcomm; this was soon spun by IAM, which noted that [w]hen Broadcom first went public with its audacious plan to buy-out Qualcomm, Microsoft and Google were reportedly among the first tech titans to object to the deal in private, citing concerns about a potential loss of innovation.

Qualcomm has little to do with innovation; its all about taxation. As promoter of software patents and a patent bully with a long track record, Qualcomm wants an even broader or thicker patent thicket. According to Korean media, the trade watchdog sets conditions for Qualcomms NXP takeover another takeover possibly in the making. To quote:

South Koreas corporate watchdog said Thursday that United States-based chipmaker Qualcomm must make several commitments to get approval for its takeover of the global Dutch company NXP here, including the sale of NXPs standard essential patents.

Qualcomm is infesting and driving up the price of almost everything. As...


Re: How to deal with reporters who don't want their bugs fixed? "IndyWatch Feed Tech"

Posted by Florian Weimer on Jan 20

I would prefer to be flexible in case something truly awful happens.

Your perspective is skewed because people know that you have a
preference for short embargoes, so at least I tell people to make sure
that they have a final patch before contacting the distros list. Then a
week or two is probably enough in most cases. Without a patch, not so much.

On the other hand, it is near impossible to develop quality solutions
under long embargoes....


China Seriously Doubts Objectivity of US Pirate Site List "IndyWatch Feed Tech"

The overview is largely based on input from major copyright holders and related industry groups. While the US Government admits that it doesnt make any judgments, the list carries a lot of weight and can hurt the image of companies that are singled out.

For some of the classic pirate sites such as The Pirate Bay, this doesnt really matter. On the contrary, they may see it as a badge of honor. However, for billion-dollar businesses such as Alibaba and VK, its a different story.

They are not at risk of being the target of a criminal prosecution, as some classic pirate sites are, but the listing will make them a hot topic on the political agenda.

Interestingly, it seems that not all countries are happy with seeing some of their top companies being singled out. When Chinas commerce ministry spokesman Gao Feng was confronted with the fact that Alibaba and its site were listed, he made some noteworthy observations.

In the report, the U.S. frequently discusses the relevant Chinese businesses with the words like reportedly, according to authoritative sources and the like, Feng told the local press.

In its report, the US Government stressed that Alibaba should do more to combat counterfeiting and piracy on and other platforms, but Chinas officials dont seem convinced.

It lacked conclusive evidence and had no relevant figures to back up its points. We have no choice but to express our doubts about the objectivity and reliability of the department that issued the report, Feng added.

Chinas commerce ministry has a point. The USTR report is compiled from comments that are provided by copyright holders. These are not thoroughly vetted, as far as we know, which doesnt seem very objective.

Even more concerning, copyright holders often cite the USTRs notorious markets list in legal and lobbying efforts, even though they are in essence their own findings in a rewritten form. While that may be very convenient, it can also be misleading.

Alibaba itself went a step further than the commerce ministry and noted that the company is being used as a scapegoat in a geopolitical game. In a detailed...


Facebook is a 'Living, Breathing Crime Scene' "IndyWatch Feed Tech"

While there are still lessons to be learned from how the Russians used the social platform to sow discord ahead of America's 2016 presidential election, critics say Facebook and Zuckerberg aren't acting quickly enough to prevent meddling in the upcoming midterm elections.

"Facebook is a living, breathing crime scene for what happened in the 2016 election and only they have full access to what happened," said Tristan Harris, a former design ethicist at Google. His work centers on how technology can ethically steer the thoughts and actions of the masses on social media and he's been called "the closest thing Silicon Valley has to a conscience" by The Atlantic magazine.

Source : Facebook is a 'living, breathing crime scene,' says one former tech insider

Original Submission

Read more of this story at SoylentNews.


Patent Litigation in East Asia: Huawei, Samsung, HTC, Nintendo and COLOPL "IndyWatch Feed Tech"

A street

Summary: A quick look at some high-profile cases in which large Asian firms are embroiled; it seems clear that litigation activities have shifted eastwards (where actual production is done)

THE patent trolls are down for the count in the US. Litigation is down, especially in their favourite venue (where cases fell by more than half). This impacts not only trolls but any company which relies mostly/only on litigation rather than production.

The media which cheers for patent trolls (usually funded by patent trolls too) has begun looking eastwards. Sometimes its even moving eastwards and hiring there. They attempt to adapt in order to survive.

Watchtroll, as usual, tries to malign defendants; in this one post it claims that Samsung was in the context of the Chinese legal system Maliciously Delaying Negotiations. We wrote about this earlier this month and did not see such an accusation. Observers believe a case in which Samsung was found to infringe Huaweis SEP patents is helpful in determining what is misconduct in FRAND negotiations and a sign the Chinese judicial system is resolving increasingly more complicated and new IP disputes, Karry Lai wrote from Hong Kong (for Managing IP). Well, FRAND itself can be viewed as a form of misconduct or at least injustice. Perhaps Samsung has a legitimate explanation/side/role in this story.

Staying around Asia (although in US courts such as CAFC), in Taiwan we have HTC coming under attack again (from a rather obscure entity called Advanced Video Technologies). In the words of Patent Docs:



Crackas with Attitude hacker posed as CIA Chief to access secret data "IndyWatch Feed Tech"

By Carolina

Remember the infamous Crackas with Attitude (CWA) hacking group? If

This is a post from Read the original post: Crackas with Attitude hacker posed as CIA Chief to access secret data


Re: How to deal with reporters who don't want their bugs fixed? "IndyWatch Feed Tech"

Posted by Tavis Ormandy on Jan 20

A better example would be shellshock, a patch was developed in private
under embargo, but as soon as the details were public it was obvious
the patch was incomplete. When it was finally public, we were able to
analyze the problem and develop a real solution - the embargo did
nothing but needlessly delay that process.



Patent Litigation in the US is Down Sharply and Patent Trolls Demise Has Much to Do With It "IndyWatch Feed Tech"

Summary: Docket Navigator and Lex Machina both show a significant decline in litigation a trend which is likely to carry on now that TC Heartland is in tact (not for just half a year but a whole year) and PTAB completes another record year

THE TREND is undeniable. The numbers speak for themselves. The sample set is large enough (thousands), it is complete, and several independent trackers are showing the same thing (independently).

Patents were not designed for litigation, which is merely a last resort. So decline in litigation may be bad news for patent lawyers, but not necessarily for inventors.

Michael Loney, in his latest roundup (primarily shut behind a paywall), shows that patent litigation is in its lowest level in recent history (in the US). Its the same thing other data sources show. Managing IP, he wrote, analyses 2017 data pulled from Docket Navigator to reveal: the overall patent cases filed in US district courts by half, quarter and month; the top 50 plaintiffs, defendants and law firms; and the breakdown of filing by district overall and pre- and post-TC Heartland (which we've just mentioned and also mentioned several times last year in relation to cases in the Eastern District of Texas collapsing post-TC Heartland).

Last year, Loney continued, 4,522 patent cases were filed in US district courts, according to a search of the Docket Navigator database conducted by Managing IP on January 7.

So patent litigation (the lawsuits industry) in the US continues to perish. Scientists can sigh in relief.

Similar data comes from Lex Machina. It wrote the following summary:

In the final quarter of 2017, a total of 981 patent cases were filed in U.S. District Courts, a 1.3% decrease over the previous quarters total of 994 cases. Cases filed in the calendar year 2017 (4,057 cases) represent a decline of 10.3% over 2016 (with 4,529 cases).

Much of it was from patent trolls a sector which is declining (all it ever does is threats and litigation, nothing else).



The (Unnecessary?) Art of Connector Crimping "IndyWatch Feed Tech"

The Completion Backwards Principle is a method of reasoning through a problem by visualizing the end result and then working your way backwards from that point. The blog post that [Alan Hawse] has recently written about the intricacies of crimping wires for plug connectors is a perfect example of this principle. The end result of his work is the realization that you probably shouldnt bother crimping your own connectors, but watching him work backwards from that point is still fascinating. Its also the name of a rock album from the 80s by The Tubes, but this is not a useful piece of information in regards to electrical wiring.

Of course, sometimes people do silly things. Even though there are pre-crimped wires available online for a pittance, you might still want to do your own. With this in mind, [Alan] has put together an exceptionally detailed and well-research post that gives you all the information you could possibly want to know about crimping what is often erroneously referred to as the JST connector.

He starts by showing off some common examples of this connector, which if youve ever opened a piece of consumer electronics will be like looking through a Hig...


Genode OS Framework Making Plans For 2018 "IndyWatch Feed Tech"

The Genode open-source operating system framework project has shared some of their planned goals for 2018...


Ask Soylent: Best Bang for Buck Television Purchase "IndyWatch Feed Tech"

So one of my three year old kids smashed my 65" LED flatscreen with a die-cast model of the Atlantis shuttle. I was fine with this and was not planning on buying a replacement in any haste but my wife keeps complaining. Would prefer at least 65"+ and absolutely not a smart tv. What suggestions do you have, companies to avoid, etc. Help me SN, you are probably my only hope of not just buying another spysung.

Original Submission

Read more of this story at SoylentNews.


Cheating the US Patent System is a Lot Harder After TC Heartland "IndyWatch Feed Tech"

Some gambling dice

Summary: Some new examples of tricks (and sometimes cheats) attempted by patent claimants and their representatives; it does not go as well as they hoped

THE level of mischief at the USPTO is occasionally noted here; its typically about law firms and patent trolls who are attempting to game the system.

Over the past week we have gathered numerous new examples. We dont mean to bash the USPTO (we are actually very encouraged to see its improvements in recent years) but merely to take stock of areas of improvement for the patent system (including courts and law firms).

TC Heartland or another case of Cray are often mentioned in relation to venue shifting or forum shopping or whatever one calls it (its about filing ones patent lawsuit in a district which is perceived to be plaintiff-friendly, troll-friendly, or friendly towards particular types of patents).

Many lawyers are patently just liars (what theyre paid for) and would lie about where businesses are based. Some days ago we saw this docket report about a case in which claimed damages are insubstantial:

The court denied plaintiffs motion for a preliminary injunction to preclude the sales of the accused fracking system because plaintiff failed to establish irreparable harm through loss of market share or reputation.

More interesting, however, was this docket report. Its a case in which venue shifting is attempted. The court granted defendants alternative motion to transfer for improper venue because defendant did not have a regular and established place of business through its provision of equipment to customers in the district, it says. Rightly so. Is this another TC Heartland-type case (only at a far lower court)?

A story which received a lot more attention concerned the filing date and...


Microsofts new AI bot creates drawings based on text descriptions "IndyWatch Feed Tech"

Microsofts new AI tool draws beautiful images from text

The Artificial Intelligence (AI) technology has incredibly evolved over the last few years and is touted to be the next big thing of the future.

Making more headway in that direction is Microsoft Corp. who has been investing in multiple projects relating to AI. The tech giant has created a new AI tool which it calls a drawing bot using a Generative Adversarial Network (GAN) running on two machine learning models. The bot uses the GAN to generate images based merely on a descriptive caption.

One machine learning model generates images from text descriptions, while the other model known as a discriminator uses descriptions of text to judge the authenticity of generated images, so that it cannot be tricked. Working together, the discriminator pushes the generator toward perfection. By using the GAN technique, AI pays close attention to individual words when generating images from caption-like text descriptions, thereby achieving a three-fold uplift in image quality compared to previous text-to-image method.

According to Microsoft, the bot is even capable of imagining details while drawing that are not specifically mentioned in the text, which indicates that the AI contains an artificial imagination.

For instance, the below image was created by the drawing bot simply from the description of a bird with a yellow body, black wings and a short beak. Although it is not specified in the text given, the AI elected to place the bird on a branch using its artificial imagination. Not just birds, the AI tool can draw anything from ordinary countryside scenes, such as grazing livestock, to the bizarre, like a floating double-decker bus.

If you go to Bing and you search for a bird, you get a bird picture. But here, the pictures are created by the computer, pixel by pixel, from scratch, Xiaodong He, a principal researcher and research manager in the Deep Learning Technology Center at Microsofts research lab in Redmond, Washington, said in a report on the project. These birds may not exist in the real world they are just an aspect of our computers imagination of birds.

Microsoft researcher Pengchuan Zhang said of the research, You need your machine learning algorithms running your artificial intelligence to imagine some missing parts of the images. From the data, the machine learning algorithm learns this commonsense where the bird should belong.

The research report, which has yet to undergo scientific review, could act as a sketch assistant to painters and interior designers, says Microsoft. Mr. H...


EXT4 vs. XFS vs. Btrfs vs. F2FS With Linux 4.15 Comparing KPTI/Retpoline "IndyWatch Feed Tech"

The latest in our benchmarking with KPTI and Retpoline for Meltdown and Spectre mitigation is comparing the performance of the EXT4, XFS, Btrfs and F2FS file-systems with and without these features enabled while using the Linux 4.15 development kernel.


RPX Might Soon be Owned by Patent Troll Erich Spangenberg "IndyWatch Feed Tech"

RPXSummary: RPX, whose top executives are leaving and business is gradually dying, might end up as another asset of patent trolls

TECHRIGHTS has been writing many articles about RPX, which marketed itself as against trolls even though its members were often troll feeders.

Last night IAM was exited to say that a patent troll might buy RPX; Big news on RPX, IAM said, management talking to interested parties in early stages of process that could lead to sale. Microsoft opts not to renew membership #IP #patents

We wrote about Microsoft joining RPX a very long time ago and now it exits. From IAMs blog post about it: (obviously not mentioning the T word)

The management of RPX is meeting with a number of interested parties in a process that might lead to an eventual sale of the business, IAM understands. It is believed that an investment consortium led by IP monetisation specialist Erich Spangenberg is among those eyeing the defensive aggregator. Others to have been linked with a possible deal include Vector Capital, the private equity fund that owns IPValue and arguably knows the space as well as any buyout shop. Its not clear if former CEO John Amster is involved in the process (he, Vector and Erich Spangenberg declined to comment for this article). RPX is being advised by GCA, which bills itself as an independent investment bank focused on the growth sectors of the global economy.

If RPX ends up in the hands of these notorious patent trolls, IAM will love it even more. IAM is, after all, the loudest proponent of trolls (along with Watchtroll) bar trolls themselves. IAM is their platform of choice. Years ago we took note of MOSAID/Conversant (classic patent troll) paying IAM and yesterday IAM produced an article which basically amplifies Conversant (...


Distribution Release: KaOS 2018.01 "IndyWatch Feed Tech"

KaOS is an independent, rolling Linux distribution featuring a polished KDE Plasma desktop and the Pacman package manager. The KaOS project has released a new snapshot, KaOS 2018.01, which features fixes for the Meltdown and Spectre CPU bugs. "It is with great pleasure to present to you a....


Film Crew Arrested After Attempting to Sneak Fake Bomb Through Airport Security "IndyWatch Feed Tech"

A film crew linked to cable business news channel CNBC was arrested at Newark Liberty International Airport in New Jersey on Thursday after attempting to sneak a fake bomb through airport security.

Seven members of a cable TV crew working for the Endemol Shine Group, which contracts with CNBC, were arrested for the attempt, which the Transportation Security Administration determined was not a threat. According to CBS's New York City local affiliate, the seven suspects told investigators they were part of the "Staten Island Hustle" show.

The prop "had all the markings of an improvised explosive device," according to a TSA spokeswoman.

"At the same time, others in the group covertly filmed the encounter," she added.

Port Authority police said it has charged the seven crew members with conspiracy to create a public alarm, among other charges.

Source: TheHill

Original Submission

Read more of this story at SoylentNews.


Apple Will Allow Users To Disable Intentional Battery Slowdowns, says CEO Tim Cook "IndyWatch Feed Tech"

Apple to soon release software update that will let iPhone users to turn off power management feature

Last month, Apple was accused of intentionally throttling processing speeds on the iPhone 6 and later models. Later, Apple acknowledged that it is slowing down older iPhones as a part of power management plan to prevent them from shutting down when degraded batteries in older phones tried to run the latest iOS features.

In an exclusive interview with ABC News this Wednesday, Apples CEO Tim Cook said that iPhone users will soon be able to turn off the power management feature on their devices that slows down iPhones when batteries are low on charge.

According to Cook, the upcoming update will shows users the health of their batteries and how much they are reducing the performance. Users will also be able to decide whether they would like their iPhones to slow down and save battery life.

Released last year, the phone-slowing software was intended to ensure that iPhone users did not get disconnected in the middle of an important text message or call because of an old battery, Cook said.

In a developer release thats gonna happen next month, were gonna give people the visibility of the health of the battery, so its very, very transparent. We will tell somebody we are reducing your performance by some amount in order to not have an unexpected restart, and if you dont want it, you can turn it off, Cook added. We dont recommend it because we think that peoples iPhones are really important to them and you can never tell when something is so urgent. Our actions were all in service of the user.

Adding further, Cook said that Apple should have possibly been clearer while introducing these software changes, as it caused people to question companys intentions. He said, And so we deeply apologise for anybody that thinks we had some other kind of motivation. Our motivation is always the user. The user is at the center of everything that we do.

The new iOS update is expected to be rolled in a developer build of iOS next month that will give users visibility of the health of their battery. The idea is to keep things transparent with their customers and this is something that has not been done before, Cook added.

Following the accusation of battery-related iPhone performance problems, Apple has started offering battery replacements for affect...


Tips for an Information Security Analyst/Pentester career - Ep. 54: (Humble) recommendations to land a job in info sec "IndyWatch Feed Tech"

As some of you who follow me closely might know, I recently got a new job as an IT Security Associate, all of a sudden.

I'm very excited for this new opportunity and for being able to find a job in my metropolitan area, where info sec positions aren't really all over the place.

Regardless of what's round the corner in my professional future, I'll always be grateful to my new employer for giving me a chance after being far from the industry for so long.

Jeez, I had almost forgotten that feeling.

The monitors, the SIEM, the logs, the tickets, the challenges I'm back home, baby.

Back where I belong.

But this post isn't about myself.

I don't care for self celebrations, even though I'm very glad right now.

I want to talk about my experience to help others land a job in information security because it's way harder than you could think, or rather it's very hard if you do what everybody else does.


I talked about some of these issues in the episode 1 of this series: Tips for an Information Security Analyst/Pentester career -Episode 1:General and technical hints (could you guys believe I started out writing this stuff in July?), so please check out my older post for some useful references.

I'm adding here a series of additional insights based on the experience I had in over 6 months dealing with recruiters, job interviews that led me nowhere, missed promises, setbacks and disappointments, until I finally saw the light at the end of the tunnel.



Nintendo Switch Gets Making with Labo "IndyWatch Feed Tech"

Over the years, Nintendo has had little trouble printing money with their various gaming systems. While theyve had the odd misstep here and there since the original Nintendo Entertainment System was released in 1983, overall business has been good. But even for the company that essentially brought home video games to the mainstream, this last year has been pretty huge. The release of the Nintendo Switch has rocketed the Japanese gaming giant back into the limelight in a way they havent enjoyed in a number of years, and now theyre looking to keep that momentum going into 2018 with a killer new gaming accessory: a cardboard box.

Some of the contraptions feature surprisingly complex internal mechanisms.

Well, it doesnt have to be a box, necessarily. But no matter which way you fold it, its definitely a piece of cardboard. Maybe a few bits of string here and there. This is the world of Nintendo Labo, a recently announced program which promises to let Switch owners create physical objects which they can interact with via specially designed software for the console.

The Labo creations demonstrated in the bombastic announcement video make clever use of the very...


Crackas leader (15) gained access to data of intel operations in Afghanistan and Iran by posing as the CIA chief "IndyWatch Feed Tech"

British teenager Kane Gamble (15), leader of the Crackas With Attitude hacking group gained access to intel operations in Afghanistan and Iran by posing as the CIA chief.

Do you remember Crackas With Attitude?

You remember for sure the Crackas With Attitude, a hacking crew that claimed clamorous actions in support of the Palestine cause.

The notorious group is responsible for clamorous attacks against US intelligence officials, the list of targeted victims is long and includes James Clapper, the Director of National Intelligence under President Obamas administration and the deputy director of the FBI Jeh Johnson, CIA director John Brennan.

Cracka is also responsible for the disclosure of personal information of 31,000 government agents, including data of FBI agents, Department of Homeland Security (DHS) officers and DoJ employees.

crackas Kane Gamble

Cracka used the account @DotGovz on Twitter to publish online the sensitive data.

The Cracka with Attitude team always expressed its support to Palestine, they hacked US Government entities due to its support to the Israeli politics.

The group was lead by a British teenager, Kane Gamble, that was 15-years-old at the time of the hack of CIA director.

According to prosecutors, Kane Gamble accessed secret data related to intelligence operations in Afghanistan and Iran by pretending to be head of CIA.

He accessed some extremely sensitive accounts referring to, among other things, military operations and intelligence operations in Afghanistan and Iran. said John Lloyd-Jones QC prosecutor.



Patent Quality (Not Numbers) as an Asset: Oppositions, Appeals and Rejections at the EPO "IndyWatch Feed Tech"

If patent information is the goal, then overload is a threat

Information overload
Reference: Information overload

Summary: Benot Battistelli wants a rubber-stamping operation (like INPI) rather than a functional patent office, but oppositions at the Office prove to be fruitful and many erroneously-granted patents are by extrapolation already being revoked (affecting, in retrospect, Battistellis so-called results)

THIS WEEK has been historic at the EPO not because of scandals or conflicts but because of a decision we covered here several times*. It was a major blow to patent maximalists.

The patent microcosm never really cared about patent quality; the quality of patents has little to do with the business model. All they care about, based on this upcoming event (advertised yesterday), is how to double the number of patents by throwing the same texts at multiple piles of applications at multiple offices. EPO and USPTO approaches to rejections is one among the topics covered. As we pointed out here before, the USPTO barely tolerates patents on genetics. There are few ultra-wealthy companies aspiring to own everything, including life itself (Monsanto/Bayer for example) and they crush ordinary people, such as farmers, in the process.

The EPO has lost touch; The discrimination against SMEs at the EPO is not accidental but a planned/intentional policy. According to this, the EPO keeps lying about and supposedly on behalf of SMEs. Where does that end? Even EPO staff is being crushed nowadays. Nobody is being served but billionaires.



OpenSWR Rasterizer Improvements Land Ahead Of Mesa 18.0 "IndyWatch Feed Tech"

Besides Intel and Radeon OpenGL/Vulkan driver improvements squeezing into Mesa Git ahead of the imminent Mesa 18.0 code branching, the Intel-developed OpenSWR has landed its latest improvements...


Ted Nelson on What Modern Programmers Can Learn From the Past "IndyWatch Feed Tech"

The inventor of hypertext talks about the birth of personal computing, the web, and how to think beyond the currently possible Stephen Cass

Ted Nelson is one of the original prophets of the information age. In the 1960s he invented the word hypertext , and created project Xanadu, which prefigured many of the elements of the World Wide Web.

Nelson was part of personal computing at a time when it saw itself as an outgrowth of the countercultural movement that flourished in the 1960s. This computing was done either via a terminal to minicomputers, or on microprocessors with transistor counts measuring only in thousands. Back in the summer of 2016, Nelson was a keynote speaker at Vintage Computing Festival East in New Jersey and IEEE Spectrum had the chance to interview him off-stage.

We thought this was a good time to dust off that interview. Were entering a period when the possibilities and dangers of computing are looming large in our minds, thanks to the explosion of machine learning, debates over the governance of the Internet, the impacts of automation, and unexpected weaknesses revealed by the Spectre and Meltdown hardware bugs. Nelson talks about how he and his fellow pioneers thought the future would be a world of citizen programmers, how the Web omits much of the architecture underlying Xanadu, and his advice for breaking through the current limits to new conceptual ground.


GNOME Rolls Out The GTK Text Input Protocol For Wayland "IndyWatch Feed Tech"

GNOME developers have been working on a new Wayland protocol, the "gtk_text_input" protocol, which now is implemented in their Mutter compositor...


FESCo Approves A Big Round Of Fedora 28 Features "IndyWatch Feed Tech"

The Fedora Engineering and Steering Committee (FESCo) approved of a number of feature requests for the Fedora 28 release due out in May...


Intel Exploring Cgroups Support For DRM Driver Management "IndyWatch Feed Tech"

An Intel open-source driver developer has posted preliminary patches taking Cgroups v2 to DRM driver management...


FCC Report Keeps Faster Definition of Broadband and Separates Mobile From Fixed Connections "IndyWatch Feed Tech"

The FCC's yearly report of broadband deployment keeps some crucial definitions in place that some feared would be changed or eliminated to ease the responsibilities of internet service providers. The threat of a lowered speed standard and the merging of mobile and fixed broadband services will not be carried out, it seems.

Broadband will continue to be defined as a connection with speeds of 25 megabits down and 3 megabits up. Another proposed definition of 10 down and 1 up was decried by critics as unrealistic for several reasons; not only is it insufficient for many ordinary internet applications, but it would let providers off the hook, because they would be counted as having deployed broadband if it met this lowered standard.

Fortunately, that isn't the case, and the 25/3 standard remains in place.

The other worry was the potential decision to merge mobile with fixed broadband when measuring the quality of internet connections available to people throughout the country.

Had the two been merged, an area might have been considered well-served if it was, for example, in range of an LTE tower (giving decent mobile speeds) but only served by sub-1-megabit DSL. Since it was being considered that only one was required, that underserved area would be considered adequately connected.

But the FCC clearly saw the lack of logic in equating mobile connections and fixed broadband: they're used, tracked, billed and deployed very differently.

[...] The full draft report, when it becomes public, will no doubt contain more interesting information ripe for interpretation, and other commissioners may also weigh in on its successes and shortcomings. In the meantime, it's reassuring that the main worries leading up to it have been addressed.

Source: TechCrunch

Original Submission

Read more of this story at SoylentNews.


Italian companies and Ministry of the Interior under attack, experts spotted a huge botnet "IndyWatch Feed Tech"

Threat actors with a deep knowledge of the Fiscal Italian ecosystem are using a huge botnet to target Italian companies and Ministry of the Interior.

On Januaty 18 a colleague of mine (Luca) called me telling a malicious email was targeting Italian companies. This is the beginning of our new analysis adventure that Luca and I run together.

The email pretended to be sent by Ministero dell Economia e delle Finanze the Italian Department of Treasury  and it had smart subjects such as:

  • Codici Tributo Acconti
  • F24 Acconti-Codice Tributo 4034

The attacker knows very well the Italian Fiscal Year since those modules are very popular from company administration employees at that time. The attacker would probably exploit this attack path reaching out as many companies as possible. The email address was not coming from the Ministero dell economia e delle Finanze at all, it was coming from the following addresses:


The email looks like :

 Huge Botnet Attacking Italian Companies
Malicious eMail

A simple link pointing to a high reputation domain was popping out the default browser and downloading the following Javascript file. The high level of obfuscation and the way the content was provided was so suspicious to be worth to follow the analysis.



Tricked-out Barbecue Will Make You Do a Spit Take "IndyWatch Feed Tech"

[Strn] and his friends love to barbecue no matter what its like outside. But something always seems to interrupt the fun: either its time to get up and turn the meat, or the music stops because somebodys phone ran out of juice, or darkness falls and there arent enough flashlights or charged-up phones. He had the idea to build the Swiss Army knife of barbecues, a portable powerhouse that solves all of these problems and more (translated).

Most importantly, the E-Mangal rotates the skewers for even cooking. It does this with a 3D-printed worm gear system driven by the heater flap actuator from a car. After 25 minutes of slow rotation, a voice announces that its time to eat. [Strn] and friends will never hurt for music options between the pre-loaded tracks, Bluetooth audio, FM antenna, USB, and SD options running through a 3W amp. Two USB lights illuminate nighttime barbecuing, and the 10 Ah battery can do it all and keep everyones phone charged. For safetys sake, [Strn] included a half-liter water tank to extinguish the coals via jet stream. Everything is run by a PIC18F, and it can be controlled at the box or through a simple web interface.

We love the look of this barbecue controller almost as much as the functionality. The sturdy stance of those short, angled legs give it a mid-century appliance feel, and seeing all the guts on display is always a plus. Grab a turkey leg and take the tour after the break.

The E-Mangal has a thermocouple in the coal box to measure the temperature, but theres no direct control. If youre more interested in temperature options than entertainment, heres a project that micromanages everything on the grill.



Police Shut Down Pirate Streaming TV Provider, Three Men Arrested "IndyWatch Feed Tech"

As prices for official multi-channel cable and satellite packages continue to increase, unauthorized streaming TV providers are providing an interesting alternative for those who demand the greatest variety of channels at a cut-down price.

Of course, none of this is legal and as such, authorities are clamping down. Today brings news of yet another pirate raid, this time in the city of Lublin, Poland.

A statement from the Provincial Police Headquarters reveals that officers from the Cybercrime and Economic Crime units conducted an investigation under the supervision of the District Prosecutors Office in Lublin. Locations in three provinces Dolnolskie, Zachodniopomorskie and Wielkopolskie were searched.

According to prosecutors, the operators of the website illegally streamed the majority of all television channels available locally, including digital TV and state television. More than 160 channels were supplied via the site without permission. Users were initially given free access to the currently unnamed service but were then encouraged to subscribe to a premium package.

Pirate Streaming TV service (Credit: Polish police)

The funds obtained from this procedure were invested in the further development of criminal activity and in foreign and Polish companies, of which [the suspects] were owners, a police statement notes.

Local reports indicate three men, aged 30, 42 and 57, were arrested and brought to the prosecutors office. There they faced allegations of illegally distributing pay television and using the revenue as a permanent source of income.

We estimate that the suspects could have benefited to the tune of nearly 3.5 million zlotys [840,663 euros] via their illegal practices, police add.

Pirate Streaming TV service (Credit: Polish police)

In addition to the arrests, police also seized equipment including 12 computers, nine servers, tablets, decoders, telephones, more than 60 hard drives and similar devices, plus documentation.

The news of these raids in Poland follows on the heels of a Europol led operation to...


Red Hat reverts Spectre (CVE-2017-5715) security updates due to boot issues reported by customers "IndyWatch Feed Tech"

Red Hat is going to release updates that are reverting previous patches for the Spectre vulnerability (Variant 2, aka CVE-2017-5715).

Just after the release of Spectre and Meltdown patches many experts argued a significative impact on performance and stability of systems running them.

While Meltdown and Spectre Variant 1 could be theoretically being addressed by patching the OS, Spectre Variant 2 require a firmware/microcode update to address the issue.

Now Red Hat joint to the list of companies that observed problems after the installation of the patches, it is releasing updates that are reverting previous patches for the Spectre vulnerability (Variant 2, aka CVE-2017-5715).

The company decided to revert the initial security updates because it received from some customers complaints about booting failure for their systems.

Red Hat is recommending its customers to contact their OEM hardware provider to receive the latest release of firmware to mitigate the CVE-2017-5715.

Red Hat Security is currently recommending that subscribers contact their CPU OEM vendor to download the latest microcode/firmware for their processor. reads the advisory published by Red Hat.

The latest microcode_ctl and linux-firmware packages from Red Hat do not include resolutions to the CVE-2017-5715 (variant 2) exploit. Red Hat is no longer providing microcode to address Spectre, variant 2, due to instabilities introduced that are causing customer systems to not boot. The latest microcode_ctl and linux-firmware packages are reverting these unstable microprocessor firmware changes to versions that were known to be stable and well tested, released prior to the Spectre/Meltdown embargo lift date on Jan 3rd. Customers are advised to contact their silicon vendor to get the latest microcode for their particular processor.



Scientists just uncovered the cause of a massive epidemic using 500-year-old teeth "IndyWatch Feed Tech"

Nearly 500 years ago in what we now call Mexico, a disease started rippling through the population. Red spots appeared on the skin, accompanied by wretched vomiting, bleeding from multiple orifices, and eventually, death. Combined with an invasion from Europe and horrific droughts, it was generally not a pleasant time or place to be alive.

It bore the name cocoliztli, meaning pestilence, and it killed between five and 15 million people in just three years. As many plagues were at the time, it proved deadly and mysterious, burning through entire populations. Occurring centuries before John Snows work on cholera gave rise to epidemiology, data on the diseases devastation was sparse. Over the years, researchers and historians attempted to pin the blame for the illness on measles, plague, viral hemorrhagic fevers like Ebola, and typhoid fevera disease caused by a variation of the bacteria Salmonella enterica.

In a paper published this week in Nature Ecology & Evolution, researchers present evidence that the latter was the most likely candidate in this cast of microbial miscreants. The study was pre-printed in biorxiv last year. The researchers detected the genome of a different variety of Salmonella enterica (the specific variety is Paratyphi C) in teeth of individuals buried in a cemetery historically linked to the deadly outbreak.


I met with the President of Chile, Michelle Bachele, last night "IndyWatch Feed Tech"

We talked a bit, and I had dinner at the presidential palace. Heres a quick snapshot I got of us chatting! There are some professional pictures coming too. #transhumanism


15-Year-Old Schoolboy Posed as CIA Chief to Hack Highly Sensitive Information "IndyWatch Feed Tech"

Remember "Crackas With Attitude"? A notorious pro-Palestinian hacking group behind a series of embarrassing hacks against United States intelligence officials and leaked the personal details of 20,000 FBI agents, 9,000 Department of Homeland Security officers, and some number of DoJ staffers in 2015. Believe or not, the leader of this hacking group was just 15-years-old when he used "social


Farewell, Unpaid Blogger: HuffPost Drops Free Contributor Platform That Drove its Growth "IndyWatch Feed Tech"

[...] HuffPost in the US today announced that it is sunsetting its contributors platform also known as its unpaid blogger platform.

The news was broken by HuffPost itself (which, like TechCrunch, is part of Oath, owned by gigantic carrier Verizon), which directly tied the move to the changing tides (not Tide Pods, although I personally think there is a connection) in the world of news media and how technology is used to distribute it.

"Now, there are many places where people can share and exchange ideas," HuffPost editor in chief Lydia Polgreen writes in a post on the site.

"Perhaps a few too many: One of the biggest challenges we all face, in an era where everyone has a platform, is figuring out whom to listen to. Open platforms that once seemed radically democratizing now threaten, with the tsunami of false information we all face daily, to undermine democracy. When everyone has a megaphone, no one can be heard. Our hope is that by listening carefully through all the noise, we can find the voices that need to be heard and elevate them for all of you."

[...] I'll be interested to see if HuffPost's move signals more of these unpaid blogger platforms (ahem, Forbes) changing tack, and just as significantly whether these sites can find the magic formula to replace it in their revenue streams if and when they do.

Source: TechCrunch

Original Submission

Read more of this story at SoylentNews.


The Nissan Xmotion SUV is more screen than car "IndyWatch Feed Tech"

Seven (!) digital touchscreens, and a virtual personal assistant thats a fish.


You could soon be manufacturing your own drugsthanks to 3D printing "IndyWatch Feed Tech"

But it remains to be seen whether drug regulators will go along with a new way of making medicines. To do so, agencies like the U.S. Food and Drug Administration will need to rewrite their rules for validating the safety of medicines. Instead of signing off on the production facility and manufactured drug samples, regulators would have to validate that reactionware produces the desired medication. Cronin agrees its a hurdle. But he argues that future printed reactors could simply include a final module containing standard validation tests that produce a visual readout, much like a pregnancy test. I think its manageable.

Digitized chemistry on demand could also undermine drug counterfeiters.


Macromolecular Damage Ages Us Prematurely "IndyWatch Feed Tech"

Macromolecular damage contributes to the chronic diseases of aging. Geroscientists hope to repair the damage by inducing autophagy.


First FDA-Approved Clinical Trial of Rapamycin the Anti-Aging Drug in Healthy Seniors "IndyWatch Feed Tech"

Looking back at best of 2017)

A clinical trial of rapamycin on healthy seniors. The anti-aging drug extends the lifespan of mice and reduces inflammation markers.


Can We Slow Aging in our Bodies with Intermittent Rapamycin Therapy? "IndyWatch Feed Tech"

Looking back at best of 2017)

The finding was a milestone in the field of anti-aging science. Professor Judith Campisi, Ph.D., a celebrity in the anti-aging field, and lead author of the study remarked

Imagine the possibility of taking a pill [rapamycin] for a few days or weeks every few years, as opposed to taking something with side effects every day for the rest of your life. Its a new way of looking at how we could deal with age-related maladies. Judith Campisi, PhD

Campisis discovery suggests that a person could take rapamycin intermittently, say, once a week, shutting down the chronic inflammation. Because the zombie cells havent gone away, they will eventually find their footing and start the inflammatory ball rolling once again. A person on this regimen would repeat the dosage intermittently and substantially reduce inflammation.


Revolutionary CRISPR Gene Editing with Nanoparticles "IndyWatch Feed Tech"

Looking back at best of 2017)

Summary: Nanotechnology meets gene editing. MIT researchers use nanoparticles instead of viruses to deliver the CRISPR gene editing system. This article first appeared on LongevityFacts. Author: Brady Hartman]

In a new study, MIT scientists have developed nanoparticles that deliver the CRISPR gene editing system, eliminating the need to use viruses for delivery.

Using the new delivery technique, the gene editors were able to cut out genes in about 80 percent of liver cells, the best success rate ever achieved with CRISPR in adult animals. Speaking about the success of the project, Daniel Anderson, senior author of the study and an associate professor in MITs Department of Chemical Engineering, said.


Incredibly Rare Super Blue Blood Moon Is About to Appear For The First Time in 150 Years "IndyWatch Feed Tech"

If you were awestruck by the New Years Day super moon, hold onto your pants.

On January 31, around midnight, the full moon will not only be super, it will be a blue moon and a blood moon.

The blue moon comes as it will be the second full moon in a month. That happens every two and a half years, hence the saying once in a blue moon.


The US Global surveillance bill has been signed by President Trump "IndyWatch Feed Tech"

The U.S. legal framework related to the domestic surveillance has been signed by President Trump one day after the Senate approved it with 65 votes against 34. The bill will be effective for other six years, below the Edward Snowdens comment:

Privacy advocates and civil rights have a long criticized the Section 702 of the Foreign Intelligence Surveillance Act (FISA) that allows US intelligence agencies to conduct domestic surveillance under certain conditions without a warrant.

The Section 702 allows the NSA to conduct warrantless spying of foreigners located abroad, including any communications with US citizens.

NSA surveillance activities

Section 702 was revealed by NSA whistleblower Edward Snowden in 2012. Civil rights and privacy advocates consider it as unconstitutional under the Fourth Amendment.

The bill increases spying powers of intelligence agencies and block safeguards, curiously it was passed by Republicans who always criticized the corruption of the Government.



Trump Revolution "IndyWatch Feed Tech"

We also had significant drops from q anon last night.  However i have no way to grab them in text form.  So i added another report covering it.

First though i do want everyone to listen to Steve.  He is a critical informant and has previously revealed the existence of an extensive White Hat counter insurgency within the intelligence community consisting of elements of mil intel and the CIA and other agencies.  This movement has crystallized around President Trump and is working to undo the damage inflicted by what can best be described as the Bush Clinton Cabal who have worked through self interest and in association with the Fsacist NWO conspiracy.

As such was clearly in opposition to the military ethos in particular, it is no surprise that a counter movement would establish itself and wait its opportunity.  That came a year ago with the rise of Trump.  Steve makes the clear point that they won a year ago and what we are now dealing with is the mopping up.   This is a fresh perspective that is welcome.  It saves us from getting too nervous.

What we seem to be building for now is the disclosure phase and it is been handled gingerly.  As Steve makes clear is that a revolution has taken place and it has been fought mostly in secrecy.

Yesterday a four page report regarding those amazing FISA requests were made available to congress.  As i had fully suspected, the situation has turned out to be far worse than Watergate and must mean jail time for a lot of people.  Q anon notes the eight folks have already been fired and i suspect the DWS or Debbie Wassermann Schultz was apprehended attempting to flee.  We do know that several events have taken place regarding returned aircraft.



Bitcoin Wallet Maker Ledger Raises $75 Million for Security Push "IndyWatch Feed Tech"

Ledger SAS, a startup that makes electronic wallets for Bitcoin and other cryptocurrencies, has raised 61 million euros ($75 million) from investors including Draper Esprit Plc.


Space mining is going to seriously disrupt Earths economy. And were nowhere near ready for the shock "IndyWatch Feed Tech"

In the coming decades, the mining of precious minerals in space is likely to have a major impact on the global economy. And existing laws are nowhere near ready for the shift.


Microsoft Gets Hacker Friendly "IndyWatch Feed Tech"

You dont often hear hackers say a lot of good things about Microsoft. Sure, you might use Windows, especially if you have one of those embarrassing day jobs. But at night in a hackers secret lab, you are likely to find something that looks more like Unix, even if it has a penguin, a piece of fruit, or even a green robot on the label. But well give Microsoft credit. Their new MakeCode site will be a great boon for educators, students, and anyone who wants to learn how to code. Whats more is they are joined by a lot of familiar hacker faces including AdaFruit, Sparkfun, and Seeed Studios.

The idea is to have tutorials and if that was all there was to it, this would be a short post. But what is really entertaining about the site is that there are web-based emulators for all the hardware so you can actually do the projects in your browser with no extra hardware. You can also do your own projects from scratch.

It will dismay some, but the default interface is for a blocks language where you drag items around. But if that bothers you, you can click the Javascript button at any time. You can even switch back and forth. For example, heres a little fake radar servo, complete with a blinking light and a beep tone:

And heres the same thing in Javascript:

let state = false
loops.forever(function () {
 music.playTone(494, music.beat(BeatFraction.Eighth))


Army Grapples With Cyber Age Battles In Megacities "IndyWatch Feed Tech"

High-tech warfare at knife-fight ranges: thats the ugly future of urban combat. If you thought Baghdad was bad, with its roughly six million people, imagine a megacity of 10 or 20 million, where the slums have more inhabitants than some countries. Imagine a city of the very near future where suspicious locals post every US military movement on Twitter with digital photos and GPS-precise coordinates. Imagine roadside bombs that fly because the bad guys downloaded blueprints for a kamikaze mini-drone and built it with their 3D printer.

As the US pulls out of the mountains and deserts of Afghanistan, the Navy and Air Force may be looking to the wide-open Pacific, but the Army is increasingly concerned about the cramped alleyways of Third World cities. (The Marines, as usual, have a foot in both worlds). Chief of Staff Ray Odiernos personal Strategic Studies Group now led by hybrid warfare expert David Johnson is working on the subject, as is the Armys think tank and teaching institution, Training and Doctrine Command (TRADOC). This August, after months of seminars, simulations, and study, the Army War College will host a deep future wargame set in a megacity, probably a coastal one, circa 2035.

We talk about the danger of failed states: Imagine a failed megacity, offers Col. Kevin Felix of TRADOCs Army Capability Integration Center (ARCIC), which plays a leading role in organizing the wargame. Even a partial breakdown of security and public services could put thousands of people in peril or under the rule of drug gangs, as in Brazils infamous favelas; or of terrorist groups, like Hezbollah in parts of Lebanon. In those parts of the city, Felix told me, there...


Futuristic Living Electronic Clothes and Walls Unveiled "IndyWatch Feed Tech"

The future of clothing unfolds at this years Consumer Electronics Show with the unveiling of an e-ink dress and much more!


Lockheed Exoskeleton Gives Troops A Leg Up, Literally "IndyWatch Feed Tech"

It is not Iron Man. It isnt even Iron Fist. Lockheed Martins newest exoskeleton is more like Iron Leg. But for a soldier humping his weapons, ammo and body armor up a mountain in Afghanistan or a high-rise building in a future urban battle, a device to take the load off would be welcome. And, unlike science fiction supersuits, we can build it now.

Exoskeletons are part of the Pentagons Third Offset Strategy, which seeks to use robotics and artificial intelligence to enhance humans on the battlefield, rather than to replace them. Theres no area where the need is more acute than in the infantry, which takes the vast majority of casualties.


Citrix To Unify Product Suite, Kill Off Today's Product Names By May "IndyWatch Feed Tech"

Arthur T Knackerbracket has found the following story:

An internal staff memo, obtained by The Register and which we understand has been shared with industry analysts under non-disclosure agreements, explains that Citrix's developers have started "working across teams to unify all our offerings into innovative and holistic solutions" and "moved beyond the old way of thinking solely about individual products."

Citrix's marketing execs have decided that those efforts mean "we need to simplify our portfolio naming so that it's easy to understand, buy, and use." The biz will therefore "reframe the way we market and sell products to amplify a focused Citrix brand with simplified and descriptive names that are easily understood."

The result will be a "Citrix + function" product naming scheme that will supersede established brands, such as Netscaler and Xen, and pave the way for things like Citrix SD-WAN and Citrix Desktops. Individual products will be filed under categories like Citrix Networking or Citrix Analytics.

The names are set to be finalized in February and launched in May 2018, when the corp will stage its Synergy user conference in Los Angeles, California.

[...] That Citrix has switched up its products and plans a relaunch, of sorts, is welcome news, given that when incoming CEO David Henshall took the big chair in July 2017, after predecessor Kirill Tatarinov spent just 18 months in the job, he promised to deliver a vision and "strategic initiatives" to advance his organization's fortunes.

[...] Henshall has an opportunity to do more than promise action on January 31, 2018, when the company will report its next quarterly results. Perhaps we'll learn more then.

For now, we are left to ponder the fact that the memo we've glimpsed ends with thanks to "all Citrites" for their help remaking the company. We mention this as perhaps Henshall needs his branding team to come up with a better collective noun for his employees if he wants to hit those best workplace lists. Just saying.

Original Submission

Read more of this story at SoylentNews.


Nanoparticle gel could make mass-market low-cost Holography, LIDAR "IndyWatch Feed Tech"

Why arent holograms or related optical devices part of our everyday lives yet? The technologies can be created by using magnetic fields to alter the path of light, but the materials that can do that are expensive, brittle and opaque. Some only work in temperatures as cold as the vacuum of space.

Minjeong Cha, MSE PhD Student, applies a gel made up of chiromagnetic nanoparticles that are a conduit for modulating light to a laser apparatus. Image credit: Joseph Xu, Michigan Engineering

Now, researchers from the University of Michigan and the Federal University of Sao Carlos in Brazil have demonstrated that inexpensive nanoparticles in a gel can replace traditional materials at a drastically reduced cost. And their approach works at room temperature.


Eyes of an Angel with Paul elder "IndyWatch Feed Tech"

Eyes of Angel by Paul Elder
If you read no other book about what we are learning about the other side, please make it this one.  He has read the literature through and then participated in the best available training at the Monroe Institute.  I found the work both complete and comprehensives as well in exploring his own reactions to all this.

The spirit body we all have is physically real but formed from second tier matter.  Thus on death we return perceptionally to this second tier world and participate in eternal life there.  The constructs there are formed by shared imagination although Paul does not make this distinction.

In the spirit world we all become Hobbits.  My own Lucid Dream returned me to a cottage similar to the farm house of my youth to meet my mother.  The affinity was there.  Was Tolkien imagining the After Life?

Eyes of an Angel 



From Bitcoin To Hashgraph: Mike Maloney On The Crypto Revolution "IndyWatch Feed Tech"

This may help you understand what it happening out there.  What is happening is that crypto currency is wresting currency control out of the hands of government who have yet to truly wake up to their danger.

Add in the rule of twelve to operate lending generally and our whole civilization is organically re-engineering itself.  It is awesome to watch..

Or future will be tied tightly to our natural communities and all this is prologue to a fully operational New Terra.

From Bitcoin To Hashgraph: Mike Maloney On The Crypto Revolution

Today, mankind stands at a crossroads,...


Update: 'Bat-Winged Man' Hit By Delivery Truck "IndyWatch Feed Tech"

This is really as good as it gets short of convincing one to walk into a lab for a physical.  We have many eye witness reports, even up close, but all lack physicality.  This is as physical as it gets.  I am impressed that it survived a 40 mile per hour impact at all.  However a tough animal certainly can do just that.  That it was able to shake of the shock and fly off is impressive.

This is our Mothman and it is certainly our gargoyle as well.  It is also the primary source for cattle mutilations as well.  The creature feeds on blood and occasional soft tissue.  And yes, you want to be scared of it, although it knows well enough to be wary of us.

It is one more nocturnal predator in our curious inventory of nocturnal cryptids.. 

Update: 'Bat-Winged Man' Hit By Delivery Truck

I recently received further information on the following account:

'Bat-Winged Man' Hit By Delivery Truck
Wednesday, January 10, 2018
Summer 2016 - Chesterland, Ohio, USA: I had a very similar encounter with the winged creature myself and even posted the story of what happened to a group on Facebook that talks about things. Im 32 years old and had never seen anything supernatural or alien in my life until last summer. I had always been and still am very much a skeptic, and to this day I try to convince myself that what I saw was actually a really big hawk or something...but I know I'm lying to myself.

It was around 3:45 AM, I'm driving west on 322 towards Chesterland, Ohio. I'm driving a Freight-liner box truck with a load of newspapers. In the summer tim...


Trump Signs Bill Renewing NSAs Internet Surveillance Program "IndyWatch Feed Tech"

Via: Reuters: U.S. President Donald Trump on Friday said he signed into law a bill renewing the National Security Agencys warrantless internet surveillance program, sealing a defeat for digital privacy advocates.


Using electric fields to manipulate droplets on a surface could enable high-volume, low-cost biology experiments "IndyWatch Feed Tech"

MIT researchers have developed hardware that uses electric fields to move droplets of chemical or biological solutions around a surface, mixing them in ways that could be used to test thousands of reactions in parallel.

The researchers view their system as an alternative to the microfluidic devices now commonly used in biological research, in which biological solutions are pumped through microscopic channels connected by mechanical valves. The new approach, which moves solutions around in computationally prescribed patterns, could enable experiments to be conducted more efficiently, cost-effectively, and at larger scales.

Traditional microfluidic systems use tubes, valves, and pumps, says Udayan Umapathi, a researcher at the MIT Media Lab, who led the development of the new system. What this means is that they are mechanical, and they break down all the time. I noticed this problem three years ago, when I was at a synthetic biology company where I built some of these microfluidic systems and mechanical machines that interact with them. I had to babysit these machines to make sure they didnt explode.


Graphene Could Be a Source of Endless, Clean Energy "IndyWatch Feed Tech"

Scientists have discovered an endless energy supply in the naturally occurring Brownian motion of graphene.


A robotic arm made of DNA moves at dizzying speed "IndyWatch Feed Tech"

A DNA machine with a high-speed arm could pave the way for nanoscale factories.


Samsung starts producing GDDR6 RAM for next-gen graphics cards "IndyWatch Feed Tech"

You can start getting pumped about the next generation of graphics cards, as Samsung has announced that its building the first-ever 16-gigabit GDDR6 chips using its 10-nanometer class technology. The news isnt a complete surprise, as Samsung previously said that GDDR6 was coming when it unveiled 8-gigabit DDR4 RAM chips last month and won a CES 2018 Innovation Award in November.

Beginning with this early production of the industrys first 16Gb GDDR6, we will offer a comprehensive graphics DRAM line-up, with the highest performance and densities, in a very timely manner, said Samsungs Senior VP Jinman Han. The company also did a minor tease, saying the chips will play a critical role in early launches of next-generation graphics cards and systems.

The voracious demand from bitcoin mining has pushed the GeForce GTX 1070 from a $380 suggested retail price to $890.


BMW now says that its Tesla Model 3 competitor iNext will have an insane 435-mile range "IndyWatch Feed Tech"

BMW is promising a series of new all-electric cars starting next with the first all-electric Mini, but the most anticipated one is the 2021 iNext electric vehicle, which the German automaker has been positioning as a Tesla Model 3 competitor.

They are now hinting at a major range increase for the upcoming vehicle.


Mitsubishi Will Sell Cars With No Mirrors Next Year "IndyWatch Feed Tech"

You know that warning on your cars side view mirror that says objects may be closer than they appear? You wont see that on this new Mitsubishi prototype. You wont even see mirrors on it.

Thats because Mitsubishi has ditched the mirrors and replaced them with cameras: one each on the drivers and passengers side and another to handle rear-view duties. Theres more to the system than just cameras, of course.

As is the case with almost everything tech-related in the news these days, Mitsubishis mirrorless system will utilize an advanced AI to help keep drivers safe. The cameras can detect objects as far away as 100 meters, and the AI can distinguish between pedestrians and vehicles and even figure out what kind of vehicle is approaching.


Roll Your Own Raspberry Pi OS "IndyWatch Feed Tech"

Writing an operating system is no small task, but like everything else it is easier than it used to be. [JSandler] has a tutorial on how to create a simple operating system for the Raspberry Pi. One thing that makes it easier is the development environment used. QEMU emulates a Raspberry Pi so you can do the development on a desktop PC and test in the virtual environment. When you are ready, you can set up a bootable SD card and try your work on a real device.

The operating system isnt very complex, but it does boot, organize memory, displays on the screen, handles interrupts, and manages processes. What else do you need?

Theres quite a bit of ancillary information about the Pi, also, which is great. Want to know about the Pis configuration? The organization of the framebuffer? Which interrupts are available? All that information is there.

This isnt the first OS tutorial for the Pi that weve seen. Even if you dont want to build a general-purpose operating system, you might want to try your hand programming the Pi at the bare metal level.

Raspberry Pi image: Evan-Amos [Public domain].


A380 Saved As Emirates Orders Another Twenty Planes "IndyWatch Feed Tech"

Arthur T Knackerbracket has found the following story:

Three days after warning the A380 might not have a future, Airbus says it will likely keep making the plane into the 2030s.

The turnaround came after Dubai-based Emirates placed an order for 20 more of the behemoths, with options for another 16. The carrier already has 101 A380s in its fleet and had already ordered another 41. The airline therefore has plans to acquire 178 of the planes, but won't ever operate that many as some of the newly-ordered machines will replace older models.

Airbus said the deal will "will provide stability to the A380 production line" and let it keep making the superjumbo for years. Which is great news for the thousands of people around the world who make the plane or parts of it, and for Airbus itself.

[...] The company still hopes that carriers other than Emirates will pick up the plane, which it positions as ideal for routes to popular destinations where landing slots are at a premium. Airbus expects more cities will acquire that status as airline traffic grows.

Original Submission

Read more of this story at SoylentNews.


U.S. Government Shutdown Starting on January 20, 2018 "IndyWatch Feed Tech"

After 10 PM EST on Friday, The U.S. Senate rejected a deal that would fund the U.S. government for another month:

Only five Democrats voted to advance the bill Sens. Joe Manchin (W.Va.), Joe Donnelly (Ind.), Heidi Heitkamp (N.D.) and Claire McCaskill (Mo.), who are all up for reelection this year in states carried by President Trump in 2016 election, and newly-elected Sen. Doug Jones (D-Ala.).

Republicans were also not united, as Sens. Rand Paul (Ky.), Lindsey Graham (S.C.), Mike Lee (Utah) and Jeff Flake (Ariz.) also voted against advancing the legislation. Sen. John McCain (R-Ariz.), who is battling brain cancer, was absent.

The procedural vote remained open late Friday, though it needed 60 votes to pass and was well short of that number with 48 senators voting against it.

Senate Majority Leader Mitch McConnell and Senate Minority Leader Charles Schumer continued to negotiate after the vote opened (archive), but no deal has been reached yet. As of midnight (5 minutes before this story went live), the government shutdown was in effect.

At Wikipedia: Deferred Action for Childhood Arrivals (DACA) and Children's Health Insurance Program (CHIP). Government shutdowns in the United States.


China publishes more scientific articles than the U.S. "IndyWatch Feed Tech"

A new analysis of global science and engineering competence shows that the United States is struggling to fight off an increasingly competitive China.

The numbers: According to the National Science Foundation, China published over 426,000 research papers in 2016. America pumped out almost 409,000. If you consider the number of citations for those papers, a measure of the influence they have in the scientific community, America does betterit placed third internationally, while China comes in fifth (Sweden and Switzerland took the top spots).

Strengths elsewhere: The report does, however, note that America invests the most in R&D, attracts the most venture capital, and awards the most advanced degrees compared with every other nation in the world.


OpenSSL development policy changes "IndyWatch Feed Tech"

The OpenSSL project has announced a number of changes to how the project is developed. These include shutting down the openssl-dev mailing list in favor of discussing all patches on GitHub and the addition of a new, read-only (for the world) openssl-project list. "We are changing our release schedule so that unless there are extenuating circumstances, security releases will go out on a Tuesday, with the pre-notification being the previous Tuesday. We dont see a need to have people ready to sacrifice their weekend every time a new CVE comes out."


The Man from Earth Sequel "Pirated" on The Pirate Bay - By Its Creators "IndyWatch Feed Tech"

Submitted via IRC for TheMightyBuzzard

With the file-sharing wars in full swing, 2007 saw the movie The Man From Earth being pirated all over the Internet, but its creators didn't fight the movement. Instead, they embraced pirates and thanked them for their attention. More than a decade on its sequel, The Man From Earth: Holocene, is again being shared on The Pirate Bay. But this time its creators put it there themselves.


Original Submission

Read more of this story at SoylentNews.


Getting to Know an 18th Century Hacker "IndyWatch Feed Tech"

Here at Hackaday we tend to stay pretty close to the bleeding edge in tech, not by any conscious effort, but simply because thats what most hackers are interested in. Sure we see the occasional vintage computer rebuild, or reverse engineering of some component that was put into service before most of us were born; but on the whole youre way more likely to see projects involving the latest and greatest microcontroller to hit AliExpress than ones involving the once ubiquitous vacuum tube.

Bill Maddox

But occasionally its nice to take a step back from the latest and greatest, to really look at what makes the hacker spirit without the all modern trappings of blinking LEDs and Wi-Fi connectivity. We make and explore because its something we are passionate about, and while today most of us are doing that with a soldering iron or a compiler, that hasnt always been the case. In the video below, historic interpreter and woodworker [Bill Maddox] talks about what draws him to 18th century technology. His tools may look foreign to us, but the passion he shows while talking about his creations will be familiar to anyone whos ever set foot in a hackerspace.



Tips for an Information Security Analyst/Pentester career - Ep. 53: Meterpreter detection (pt. 3) "IndyWatch Feed Tech"

Let's now continue our analysis of a system compromised by a Meterpreter payload.

Forensic tools

I created a memory dump with OS Forensics and I analyzed it in combination with Volatility.

By copying the Windows standalone executable, available here, to the OS Forensics folder, it is possible to use Volatility inside OS Forensics, as explained in this tutorial.

However, an analysis with Volatility didn't reveal anything suspicious going on (more details in the embedded video)

Detection tools

As explained in the previous part, neither MS Security Essentials nor other tools had detected anything suspicious, even though I knew there was a payload in memory (I created it!!).

Therefore, I used a different detection tool, along with ESET Online Antivirus Scanner.

I had migrated to a system process, after my previous exploit, so I was stealthy.

I wanted to see, though, what happened with these two tools when I first hacked into the system,...


Tips for an Information Security Analyst/Pentester career - An overview of the series "IndyWatch Feed Tech"

My good buddy Claus Cramon Houmann with Peerlyst asked me to list all the posts I've published so far in this series.

I've pusblished this post on Peerlyst first and then I thought it would be a good idea  to do the same for my blog, as I republished the same posts on peerlyst.

This way, my readers can, if they like to, follow this series on both platforms.
Of course, I'll keep this list updated and add links to newer posts, as I keep publishing them.
I knew I had a bunch of things to say when I started this series of posts (that's what I decided to start a series, by the way) but I didn't expect I'd be on a roll like that, though my plate is always full (3 months' study for Security+, in addition to my work as a translator and to other side projects)
I want to thank each and every one of you for the invaluable , contribution and recognition I had from the community so far, which allowed me to constantly improve the of these posts.
They wouldn't be any good without this type of support I had from you guys, which kept me on my toes and forced me to constantly keep tabs on my work.


Bioengineered Soft Microfibers Improve T-Cell Production "IndyWatch Feed Tech"

Arthur T Knackerbracket has found the following story:

T cells play a key role in the body's immune response against pathogens. As a new class of therapeutic approaches, T cells are being harnessed to fight cancer, promising more precise, longer-lasting mitigation than traditional, chemical-based approaches. These "living drugs" are poised to transform medicine, with a growing number of cellular therapies receiving FDA-approval.

A current bottleneck in these approaches and other Adoptive T-cell Therapies (ACTs) is the production of sufficient numbers of high quality T cells. As a starting material, cells are isolated from the patient and then modified and grown outside the body in a bioreactor.

[...] A Columbia Engineering team has developed a new method for improving T-cell manufacture by focusing on the materials involved in this process. The team is a collaboration between Biomedical Engineering faculty Lance C. Kam and Helen H. Lu, whose research programs include immune engineering and smart biomaterial design. Their study, which is published today in Advanced Biosystems, uses a polymer mesh to activate the T cells, a critical step for their production. This approach simplifies processing compared to systems in use today. In addition, making the fibers out of a mechanically soft material improved T-cell growth, outperforming the current gold standard on several fronts.

"Our report shows that this soft mesh material increases the number of functional cells that can be produced in a single step," Kam says. "In fact, our system provided nearly an order of magnitude more cells in a single process. What's especially exciting is that we've been able to expand cells isolated from patients undergoing treatment for leukemia. These cells are often very difficult to activate and expand, and this has been a barrier to using cellular immunotherapy for the people who need it."

[...] Beyond simplifying the process of cell expansion and improving T-cells expansion, Kam and Lu envision that the mesh platform will have applications beyond immunotherapy. They are refining their platform and exploring how T cells from cancer patients respond to their materials. Says Lu, "It is truly exciting to see how these bioinspired matrices can direct cell function and be successfully used for T-cell therapy."

Original Submission



Real-world intercontinental quantum communications enabled by the Micius satellite "IndyWatch Feed Tech"

A joint China-Austria team has performed quantum key distribution between the quantum-science satellite Micius and multiple ground stations located in Xinglong (near Beijing), Nanshan (near Urumqi), and Graz (near Vienna). Such experiments demonstrate the secure satellite-to-ground exchange of cryptographic keys during the passage of the satellite Micius over a ground station. Using Micius as a trusted relay, a secret key was created between China and Europe at locations separated up to 7,600 km on the Earth.

Private and secure communications are fundamental for Internet use and e-commerce, and it is important to establish a secure network with global protection of data. Traditional public key cryptography usually relies on the computational intractability of certain mathematical functions. In contrast, quantum key distribution (QKD) uses individual light quanta (single photons) in quantum superposition states to guarantee unconditional security between distant parties. Previously, the quantum communication distance has been limited to a few hundred kilometers due to optical channel losses of fibers or terrestrial free space. A promising solution to this problem exploits satellite and space-based links, which can conveniently connect two remote points on the Earth with greatly reduced channel loss, as most of the photons propagation path is through empty space with negligible loss and decoherence.

A cross-disciplinary multi-institutional team of scientists from the Chinese Academy of Sciences, led by Professor Jian-Wei Pan, has spent more than 10 years developing a sophisticated satellite, Micius, dedicated to quantum science experiments, which was launched on August 2016 and orbits at an altitude of ~500 km. Five ground stations in China coordinate with the Micius satellite. These are located in Xinglong (near Beijing), Nanshan (near Urumqi), Delingha (372244.43N, 974337.01 E), Lijiang (264138.15N, 100145.55E), and Ngari in Tibet (321930.07N, 80134.18E).


A Modern Take on the Crystal Radio "IndyWatch Feed Tech"

Well admit that [3DSage] has a pretty standard design for a crystal radio. What we liked, though, was the 3D printed chassis with solderless connections. Of course, the working pieces arent 3D printed you need an earphone, a diode, and some wire too. You can see the build and the finished product in the video below.

Winding the coil is going to take awhile, and the tuning is done with the coil and capacitance built into the tuning arrangement so you wont have to find a variable capacitor for this build. There is a picture of the radio using a razor blade point contact with a pencil lead, so if you want to really scrimp on the diode, that works too, and you can see how at the end of the video.

We did like the use of cord ends from a sewing and craft supply store to serve as solderless springs. This would be a great item to print off a few dozen copies and use it for a school or youth group activity. You might want to pair it with an AM transmitter, though so the kids wont be dismayed at what is playing on AM in most markets. [3DSage] uses a sink for ground literally a kitchen sink. However, if you try this, make sure all the pipes are metal or you wont get a good ground and you probably wont pick up any stations.

Wed like to get some of those springs and make some other kind of starter projects with them like the kits many of us had as kids. This reminded us of the old foxhole radios, found during World War II.


Aubrey de Grey "IndyWatch Feed Tech"


SENS Research Foundation is a 501(3) public charity that is transforming the way the world researches and treats age-related disease.

At SENS Research Foundation, we believe that a world free of age-related disease is possible. Thats why were funding work at universities across the world and at our own Research Center in Mountain View, CA.

Our research emphasizes the application of regenerative medicine to age-related disease, with the intent of repairing underlying damage to the bodys tissues, cells, and molecules. Our goal is to help build the industry that will cure the diseases of aging.

Aubrey de Grey

Aubrey David Nicholas Jasper de Grey is an English author and theoretician in the field of gerontology and the Chief Science Officer of the SENS Research Foundation. He is editor-in-chief of the academic journal Rejuvenation Research, author of The Mitochondrial Free Radical Theory of Aging (1999) and co-author of Ending Aging (2007). He is known for his view that medical technology may enable human beings alive today to live to lifespans far in excess of any existing authenticated cases.


EFF Asks Ninth Circuit Appeals Court To Strengthen Privacy Protections Of Smart Phones At The Border "IndyWatch Feed Tech"

Warrantless Border Searches of Phones, Laptops, Are Unconstitutional

San Diego, CaliforniaThe Electronic Frontier Foundation (EFF) urged the U.S. Ninth Circuit Court of Appeals to require federal agents to obtain a warrant before conducting highly intrusive searches of electronic devices at the border by requiring federal agents to obtain a warrant if they want to access the contents of travelers phones.

The Ninth Circuit four years ago issued an important ruling requiring officials to show they have reasonable suspicion of criminal activity to forensically search digital devices. While that was an improvement over the governments prior practice of conducting suspicionless searches, the court didnt go far enough, said EFF Staff Attorney Sophia Cope. We are now asking the Ninth Circuit to bar warrantless device searches at the border.

Our electronic devices contain texts, emails, photos, contact lists, work documents, and other communications that reveal intimate details of our private lives. Our privacy interests in this material is tremendous. Requiring a warrant is a critical step in making sure our Fourth Amendment protections survive into the digital age, said Cope.

The Ninth Circuit is being asked to throw out evidence obtained through a warrantless forensic search of the defendants cell phone at the U.S.-Mexico border in southern California. The case, U.S. v. Cano, is a drug prosecution and the first before the Ninth Circuit since the U.S. Supreme Court ruled that because devices hold the privacies of life, police need a warrant to search the phones of people who are arrested.

In an amicus brief filed today in U.S. v. Cano, EFF urged the court to recognize that people traveling through our international borders deserve the same privacy protections that the Supreme Court has extended to arrestees. The Ninth Circuits rulings apply to states in the west and southwest, several of whom share borders with...

Friday, 19 January


New Botnet Infects Cryptocurrency Mining Computers, Replaces Wallet Address "IndyWatch Feed Tech"

Satorithe malware family that wrangles routers, security cameras, and other Internet-connected devices into potent botnetsis crashing the cryptocurrency party with a new variant that surreptitiously infects computers dedicated to the mining of digital coins.

Records show that the attacker-controlled wallet has already cashed out slightly more than 1 Etherium coin. The coin was valued at as much as $1,300 when the transaction was made. At the time this post was being prepared, the records also showed that the attacker had a current balance of slightly more than 1 Etherium coin and was actively mining more, with a calculation power of about 2,100 million hashes per second.

Story at ArsTechnica

Original Submission

Read more of this story at SoylentNews.


Activating a single gene is sufficient to change skin cells into stem cells "IndyWatch Feed Tech"

In a scientific first, researchers have turned skin cells from mice into stem cells by activating a specific gene in the cells using CRISPR technology. The innovative approach offers a potentially simpler technique to produce the valuable cell type and provides important insights into the cellular r


Twitter finds over 1,000 new Russian-linked accounts "IndyWatch Feed Tech"

Twitter said Friday that it has suspended 1,062 new accounts it has found to be linked to the Internet Research Agency, a Russian "troll farm" which disseminated content intended to interfere in the U.S. political process.In total, the company has...


Triton Malware exploited a Zero-Day flaw in Schneider Triconex SIS controllers "IndyWatch Feed Tech"

The industrial giant Schneider discovered that the Triton malware exploited a zero-day vulnerability in Triconex Safety Instrumented System (SIS) controllers in an attack aimed at a critical infrastructure organization.

In December 2017, a new malicious code dubbed Triton malware  (aka Trisis) was discovered by researchers at FireEye, it was specifically designed to target industrial control systems (ICS) system.

Security experts at CyberX who analyzed samples of the malware provided further details on the attack, revealing that Triton was likely developed by Iran and used to target an organization in Saudi Arabia.


Triton malware

The Triton malware is designed to target Schneider Electrics Triconex Safety Instrumented System (SIS) controllers that are used in industrial environments to monitor the state of a process and restore it to a safe state or safely shut it down if parameters indicate a potentially hazardous situation.

TRITON is designed to communicate using the proprietary TriStation protocol which is not publicly documented, this implies that the attackers reverse engineered the protocol to carry out the attack.

Initial analysis conducted by Schneider excluded that hackers may have leveraged any vulnerabilities in the target products, but now the vendor has discovered that Triton malware exploited a flaw in older versions of the Triconex Tricon system.

Schneider confirmed the presence of a flaw only in a small number of older versions and plans to release security updates that address it in the next weeks.

Schneider also announced that it is developing an application to detects the presence of the malware on a controller and removes it.

Anyway, Schneider pointed out that the root cause of the success of the Triton malware is that victims failed in implementing best practices and security procedures.

Just after the disclosure of the attack, Schneider published a security advisory to warn its customers and recommended to avoid leaving the front panel key p...


Video Friday: Crawling Baby Robot, Tethered Drone, and New Intel RealSense "IndyWatch Feed Tech"

Your weekly selection of awesome robot videos Image: Purdue University

Video Friday is your weekly selection of awesome robotics videos, collected by your Automaton bloggers. Well also be posting a weekly calendar of upcoming robotics events for the next few months; heres what we have so far (send us your events!):

IEEE IRC 2018  January 31-February 2, 2018  Laguna Hills, Calif., USA
International Symposium on Medical Robotics  March 1-3, 2018  Atlanta, Ga., USA
HRI 2018  March 5-8, 2018  Chicago, Ill., USA
RoboSoft 2018  April 24-28, 2018  Livorno, Italy
ICARSC 2018  April 25-27, 2018  Torres Vedras, Portugal

Let us know if you have suggestions for next week, and enjoy todays videos.

When babies crawl on the floor, especially in carpeted areas, their movement kicks up lots of dirt and dust, including things like skin cells, bacteria, and fungal spores. Researchers at Purdue University wanted to find out if that could be bad for the babies. So they built a robotic crawling baby (which is much less adorable than the real thing) and tested it crawling on actual carpet samples they had removed from homes.

The researchers found that a concentrated cloud of resuspended particles forms around the Pig-Pen wannabes, and that the concentrations around them can be as much as 20 times greater than the levels of material higher in the room.Moreover, infants bodies arent as good at blocking this dust storm, Boor says. "For an adult, a significant portion of the biological particles are removed in the upper respiratory system, in the nostrils and throat. But for very young children, they more often breathe through their mouths, and a significant fraction is deposited in the lower airwaysthe tracheobronchial and pulmonary regions. The particles make it to the deepest regions of their lungs."

Counterintuitively, perhaps, this may be just what nature intended. "Exposure to certain bacterial and fungal species ca......


Intel Management Engine Take Action "IndyWatch Feed Tech"

The Intel Management Engine (ME) is a grave threat to the freedom, privacy, and security of computer users. The Spectre and Meltdown vulnerabilities discovered in early 2018 have drawn a great deal of unwanted attention to Intel, and this provides us with an opportunity to educate others about the dangers of the Intel ME, as well as other ongoing injustices imposed by proprietary software.

If there is an event at your university or in your community addressing the Intel chip bugs, we urge you to distribute printed copies of our report on the Intel ME by Denis GNUtoo Carikli, with the following foreword by Free Software Foundation president Richard Stallman:

Meltdown and Spectre are errors. Grave errors, to be sure, but not evidently malicious. Everyone makes mistakes.

Intel has done far worse with its CPUs than make a mistake. It has built in an intentional back door called the Management Engine.

Important as these bugs are, don't let Intel's mistakes distract you from Intel's deliberate attack!

Download a printable PDF of the article here.

These events provide an excellent chance to inform our friends and neighbors about why free software matters. Please let us know if you bring this article to an event, and let us know how it turned out.


Facebook to start ranking news outlets on community trust "IndyWatch Feed Tech"

Facebook announced on Friday that it will start ranking news outlets based on how widely theyre trusted by the platform's users.Publishers with higher ratings will get priority in users news feeds, a move that the company says will cut down...

IndyWatch Science and Technology News Feed Archiver

Go Back:30 Days | 7 Days | 2 Days | 1 Day

IndyWatch Science and Technology News Feed Today.

Go Forward:1 Day | 2 Days | 7 Days | 30 Days

IndyWatch Science and Technology News Feed was generated at World News IndyWatch.

Resource generated at IndyWatch using aliasfeed and rawdog