IndyWatch Science and Technology News Feed Archiver

Go Back:30 Days | 7 Days | 2 Days | 1 Day

IndyWatch Science and Technology News Feed Today.

Go Forward:1 Day | 2 Days | 7 Days | 30 Days

IndyWatch Science and Technology News Feed was generated at World News IndyWatch.

Sunday, 21 January


Color Organ Dress, A Wearable With Audio Feedback "IndyWatch Feed Tech"

There is a huge amount of interest among our community in wearable electronics, but it is fair to say that it is a technology that has a way to go at our level in terms of its application. Some twinkly LEDs are all very well, but unless you have the arrived-on-a-spaceship-from-the-future aesthetic of someone like [Naomi Wu] to carry them off they get old rather quickly.

What the sew-on LED sector of wearable electronics is waiting for are some applications, wearable lights that do something rather than just look pretty. And [Moko] has a project that takes them in that direction, with her color organ dress, a garment whose LEDs react to ambient sound with the aid of a MEMS microphone and an Adafruit Gemma M0 microcontroller board. The LEDs form a color wheel which rotates, and stops at a point proportional to the sound level at the time.

The write-up is an interesting one, going into a little detail as it does in the images on the construction of an electronically-enhanced piece of clothing. Wiring everything up is one thing, but there are other considerations such as the incorporation of extra panels to protect them from mechanical stress, and from sweat. From a dressmakers perspective its a well constructed garment in its own right with an attractive PCB-style pattern (Where did she get that fabric? Or did she print it herself?) and it appears that shes the fortunate owner of a serger (overlocker).




Our proxy service offers you a solution to Internet anonymity problem:quality HTTP/SOCKS 5 proxies!
Service price
Here are the main advantages of using our proxy service:
Full proxy server support for protocols like HTTP, HTTPS and SOCKS5.
Clear paypal with
Instant access after a payment has been made.
Option to choose a proxy server with IP-address of a...



[] Service Seller Socks Good "IndyWatch Feed Tech" - Service Seller Socks Good - Socks 5 VIP - Pass Paypal Blacklist



- Auto update socks new 24/24

- Auto payment Perfect Money - PM

- Auto payment WebMoney - WMZ

- How to get socks5?

-> After buy a package -> Click login -> Click VIEWSOCK -> Click...

[] Service Seller Socks Good


[] FREE SOCKS4&5 UPDATE DAILY! "IndyWatch Feed Tech"

[][New Shop Socks5] Service Socks5 Cheap
Our proxy service offers you a solution to Internet anonymity problem:Best Quality SOCKS5 PROXIES!
Service Price
For example, Daily 60: It is allowed to get maximium 60 socks for a day.
If you don't use, you will lose 60 socks in a day ( no incremental socks). An account will be expired after 30 days...



These High-Speed Nano-Cranes Could Form Molecular Assembly Lines "IndyWatch Feed Tech"

Tiny nano-scale machines formed from DNA could be the future of manufacturing things at small scale but great volume: drugs, tiny chip components, and of course more nanomachines. But moving simple, reusable machines like a little arm half a micrometer long is more difficult than at human scale. Wires for signals aren't possible at that scale, and if you want to move it with a second arm, how do you move that arm?

For a while chemical signals have been used; wash a certain solution over a nanobot and it changes its orientation, closes its grasping tip, or what have you. But that's slow and inexact.

Researchers at the Technical University of Munich were looking at ways to improve this situation of controlling machines at the molecular scale. They were working with "nano-cranes," which are essentially a custom 400-nanometer strand of DNA sticking up out of a substrate, with a flexible base (literally it's made of unpaired bases) that lets it rotate in any direction. It's more like a tiny robotic finger, but let's not split hairs (or base pairs).

What Friedrich Simmel and his team found, or rather realized the potential of, was that DNA molecules and therefore these nano-cranes have a negative charge. So theoretically, they should move in response to electric fields. And that's just what they did.

[...] The team's work, which like most great research seems obvious in retrospect, earned them the coveted cover story in Science.

Source: TechCrunch

Original Submission

Read more of this story at SoylentNews.


Microsofts new drawing bot is an AI artist "IndyWatch Feed Tech"

Microsoft today is unveiling new artificial intelligence technology thats something of an artist a drawing bot. The bot is capable of creating images from text descriptions of an object, but it also adds details to those images that werent included the text, indicating that the AI has a little imagination of its own, says Microsoft.

If you go to Bing and you search for a bird, you get a bird picture. But here, the pictures are created by the computer, pixel by pixel, from scratch, explained Xiaodong He, a principal researcher and research manager in the Deep Learning Technology Center at Microsofts research lab in Redmond, Washington, in Microsofts announcement. These birds may not exist in the real world they are just an aspect of our computers imagination of birds.

The bot is able to generate a variety of images, researchers say, including everything from ordinary pastoral scenes, like those with grazing livestock, to the absurd like a floating double-decker bus.


Joe Rogan Experience #1066 "IndyWatch Feed Tech"

Mel Gibson and Joe Rogan, talk on Stem Cells:

Mel Gibson is an actor and filmmaker. Neil Riordan, PA, PhD is one of the early pioneers and experts in applied stem cell researc


Tomu: A Microcontroller for Your USB Port "IndyWatch Feed Tech"

Looking for a ultra tiny development board? Tomu is an ARM Cortex M0+ device that fits inside your USB port. Weve seen these in person, and theyre tiny.

Theres a few commercial devices in this form factor on the market. For example, the Yubikey Nano emulates a keyboard to provide codes for two-factor authentication. The Yubikeys tiny hardware does this job well, but the closed-source device isnt something you can modify.

Tomu is a new device for your USB port. It sports a Silicon Labs EFM32 microcontroller, two buttons, and two LEDs. This particular microcontroller is well suited to the task. It can talk USB without a crystal for timing, and has an internal regulator to generate the core voltage from a 5 V USB supply. Since it supports DFU firmware updates, it can be reprogrammed without any special tools.

Unfortunately, the EFM32 device lacks secure storage options, so the Tomu might not be the best device to keep your secrets on. That being said, it will be interesting to see what applications people come up with. The creators have suggested using the device for media buttons, sleeping and waking a computer, and as a U2F key.

The project is currently available on CrowdSupply, and all design files and source is available on their Github. If you like soldering tiny things, the twelve-part bill of materials should be fairly easy to assemble at home.


Wire for Beginners "IndyWatch Feed Tech"

In the crowded world of encrypted messaging apps, few tools stand out.

Wire gives you encrypted voice calls, video calls, and messaging. It uses wireless data (through a mobile plan or wi-fi), which can help save money on phone calls and SMS charges. This is great for those of us who want to call or text our friends without eating up an expensive phone plan. It also supports most major operating systems.

On Wire, conversations are end-to-end encrypted, meaning that no one except the conversational participants can read the messages. Its open source, meaning that its code is publicly viewable. This also means it can be examined for security holes. After responding to security audits, the team has developed a fairly hardened, yet simple messenger that continues to improve.

Competitive messaging apps with similar encryption, such as Signal and WhatsApp, require users to register for the service with a phone number. And while there are workarounds, this move has serious privacy implications for those who prefer not to give away a personal number before you can chat. On Wire, you can simply register with an email.

While Wire has strong encryption and robust features, the service collects and retains a lot of metadatainformation about your conversations, such as your contacts, and who spoke to whom. Compare this to the more conservative Signal app. And because it has a web interface, we should take extra precautions to make sure no one else can log in.

Getting started with Wire

First, find Wire for iPhone or Android here, or search for it in the App Store or Google Play store.

When you first launch the app on your phone, it will ask you to register a...

Go Back:30 Days | 7 Days | 2 Days | 1 Day

IndyWatch Science and Technology News Feed Today.

Go Forward:1 Day | 2 Days | 7 Days | 30 Days

Saturday, 20 January


You may know me from such performances as my life. "IndyWatch Feed Tech"

(woman at bar) Everyone confuses Sarah Dorfmann, the real me, with Sarah Dorfmann, the character I play at work, at home and in all of my relationships.

We treat authenticity like its a binary: Shes authentic. Hes inauthentic. But really its a spectrum and Im guessing you, like me, occupy pretty big swaths of it over the course of any given day. We have to, just to survive the contradictions and minefields the world has in store for us.

But I hope that, although my narrative arc may meander like hell, it still bends toward authenticity. The past year has seen an unrelenting assault on truth and honesty (coming, weirdly enough, in large part from someone whose level of personal authenticity may be unparallelled among presidents: he may really be as much of a lying dick as he seems).

Maybe its no coincidence that the word truthiness was coined by Stephen Colbert, who was the first person I saw regularly play a character with the same name as theirs and very little else in common.

These days, the truth needs all the allies it can get. Maybe for most of us, that starts, not with letting it all hang out in unfiltered, damaging Twitter rants, but in recognizing the moments when were being less than completely authentic and understanding why. Being ruthlessly honest with ourselves may let us be more compassionately honest with everyone else.

See more cartoons about social media, business and the way we live and work online at Noise to Signal Cartoon...


Project Davos: What's the Single Best Way to Close the World's Wealth Gap? "IndyWatch Feed Tech"

Donald Trump and Angela Merkel will join 2,500 world leaders, business executives and charity bosses at the World Economic Forum (WEF) in Davos, Switzerland which kicks off on 23 January. High on the agenda once again will be the topic of inequality, and how to reduce the widening gap between the rich and the rest around the world.

The WEF recently warned that the global economy is at risk of another crisis, and that automation and digitalisation are likely to suppress employment and wages for most while boosting wealth at the very top.

But what ideas should the great and good gathered in the Swiss Alps be putting into action? We'd like to know what single step you think governments should prioritise in order to best address the problem of rising inequality. Below we've outlined seven proposals that are most often championed as necessary to tackle the issue but which of them is most important to you?

  • Provide free and high quality education
  • Raise the minimum wage
  • Raise taxes on the rich
  • Fight corruption
  • Provide more social protection for the poor
  • Stop the influence of the rich on politicians
  • Provide jobs for the unemployed

Do you think these ideas are enough, or are there any better ideas to close this wealth gap ? You too can participate and vote for the idea that, you think, works best.

Original Submission

Read more of this story at SoylentNews.


Spectre Variant One Mitigations Will Be Sent In For Linux 4.16 "IndyWatch Feed Tech"

The Linux 4.16 kernel will feature Spectre Variant One "Bounds Check Bypass" mitigations...


Blockchain Patents Are a Catastrophe in the Making as Trolls and Aggressors Accumulate Them "IndyWatch Feed Tech"

Related: Blockstream Has No Patents, But Pledges Not to Sue Using Patents

Marathon Patent Group: Massively Overvalued
Reference: Marathon Patent Group: Massively Overvalued

Summary: As patents pertaining to blockchains continue to be granted even in defiance of Alice/Section 101 it seems likely that patent wars will sooner or later erupt, involving some large banks, IBM, and patent trolls associated with the notorious Erich Spangenberg

THE emergence of digital currencies (also known as cryptocurrencies) brought rise to blockchains a concept whose explanation ought to quickly reveal to anyone that it boils down to software and is thus not eligible for patents (except maybe in China).

There is a growing threat now; that threat isnt FUD or hacks or collapse or whatever; patent parasites are like hawks waiting to attack digital currencies. See Patent Strategies for Cryptocurrencies and Blockchain Technology [PDF] and all sorts of articles from media of patent maximalists. Theyre waiting to initiate something similar to and barely distinguishable from patent wars in mobile phones. Jon Calvert of ClearViewIP, for example, is quoted alongside a bunch of patent law firms. They all defend the screwing of blockchains with a vast thicket of software patents. To quote:

The bigger tech companies, the IBMs of this world, are trying to create blockchain infrastructure that can be used by corporate enterprises or financial institutions. They want to charge for software as a service. By having patent protected technology, they can argue that theirs is the best, the most valuable, or the most valid, which makes them more credible. These are also the people who are more likely to use their patents aggressively later, when theyve got a strong portfolio. If you look at Microsoft, they w...


Vacuum Tubes: Shipping Through EBay Now Challenging? "IndyWatch Feed Tech"

There is disquiet in the world of vacuum electronics, that something as simple as shipping a vacuum tube could now be very difficult to achieve. Its a concern expressed among other places in a video by [Guitologist] that weve included below, and includes tales of vacuum tubes being impounded as either dangerous to ship, or not allowed to be shipped across international borders.

Upon investigation it appears that the common thread in all the stories lies with eBays Global Shipping Program, the centralised shipping service operated by the online auction giant. We reached out to eBays press office on the subject but have yet to receive a reply. Its best to ask someone who ships a lot of tubes for comment when you have a tube shipping story, so we also had a conversation with TC Tubes. Theyre a small company dealing in tubes, and as you might imagine they ship a lot of them (Their website is likely to detain you for a while if you are a tube-head). [Chelsea] from TC Tubes told us that they have encountered no regulatory barriers to tube shipping, and that their only bad experience has been yet again with eBays Global Shipping Program.

So it seems there is no cause for panic if you ship tubes, CE marking or RoHS rules havent come for your EL34s and your 6550s. Ebay have evidently got some kind of issue with tubes in their shipping operation, and perhaps you should ship by other means if you wish to avoid your tubes going astray. The consensus here among the Hackaday crew is that it could be as simple as uninformed employees not being aware of what tubes are because they arent as common as they used to be. After all, with over a hundred years of history behind them its not as though any potential issues with their shipping havent been comprehensively explored.

Wed still be interested to hear from eBay on the matter though, if they would care to comment.

Thanks [Killergeek] for the tip.

Tube image: Hannes Grobe  [CC BY 3.0].


Qualcomm/Broadcom/NXP Combination Would Become a Disastrous Patent Thicket Which Benefits Nobody "IndyWatch Feed Tech"

Monopoly power merely harms the entire market where resources (e.g. pipes) cannot be shared

Monopoly power

Summary: Worried by the prospect of mega-mergers and takeovers which would put far too much market power (and monopoly through patents) in one place, governments and corporations speak out

THE CHIPSET/SILICON giants are becoming fewer and bigger. This means that centralisation of respective patents (with patent thickets which prevent fair competition) carries on. This is further exacerbated by some recent industry moves.

As promoter of software patents and a patent bully with a long track record, Qualcomm wants an even broader or thicker patent thicket.China, for a change, is standing up to evil patent bullies like Broadcom and Qualcomm; this was soon spun by IAM, which noted that [w]hen Broadcom first went public with its audacious plan to buy-out Qualcomm, Microsoft and Google were reportedly among the first tech titans to object to the deal in private, citing concerns about a potential loss of innovation.

Qualcomm has little to do with innovation; its all about taxation. As promoter of software patents and a patent bully with a long track record, Qualcomm wants an even broader or thicker patent thicket. According to Korean media, the trade watchdog sets conditions for Qualcomms NXP takeover another takeover possibly in the making. To quote:

South Koreas corporate watchdog said Thursday that United States-based chipmaker Qualcomm must make several commitments to get approval for its takeover of the global Dutch company NXP here, including the sale of NXPs standard essential patents.

Qualcomm is infesting and driving up the price of almost everything. As...


Re: How to deal with reporters who don't want their bugs fixed? "IndyWatch Feed Tech"

Posted by Florian Weimer on Jan 20

I would prefer to be flexible in case something truly awful happens.

Your perspective is skewed because people know that you have a
preference for short embargoes, so at least I tell people to make sure
that they have a final patch before contacting the distros list. Then a
week or two is probably enough in most cases. Without a patch, not so much.

On the other hand, it is near impossible to develop quality solutions
under long embargoes....


China Seriously Doubts Objectivity of US Pirate Site List "IndyWatch Feed Tech"

The overview is largely based on input from major copyright holders and related industry groups. While the US Government admits that it doesnt make any judgments, the list carries a lot of weight and can hurt the image of companies that are singled out.

For some of the classic pirate sites such as The Pirate Bay, this doesnt really matter. On the contrary, they may see it as a badge of honor. However, for billion-dollar businesses such as Alibaba and VK, its a different story.

They are not at risk of being the target of a criminal prosecution, as some classic pirate sites are, but the listing will make them a hot topic on the political agenda.

Interestingly, it seems that not all countries are happy with seeing some of their top companies being singled out. When Chinas commerce ministry spokesman Gao Feng was confronted with the fact that Alibaba and its site were listed, he made some noteworthy observations.

In the report, the U.S. frequently discusses the relevant Chinese businesses with the words like reportedly, according to authoritative sources and the like, Feng told the local press.

In its report, the US Government stressed that Alibaba should do more to combat counterfeiting and piracy on and other platforms, but Chinas officials dont seem convinced.

It lacked conclusive evidence and had no relevant figures to back up its points. We have no choice but to express our doubts about the objectivity and reliability of the department that issued the report, Feng added.

Chinas commerce ministry has a point. The USTR report is compiled from comments that are provided by copyright holders. These are not thoroughly vetted, as far as we know, which doesnt seem very objective.

Even more concerning, copyright holders often cite the USTRs notorious markets list in legal and lobbying efforts, even though they are in essence their own findings in a rewritten form. While that may be very convenient, it can also be misleading.

Alibaba itself went a step further than the commerce ministry and noted that the company is being used as a scapegoat in a geopolitical game. In a detailed...


Facebook is a 'Living, Breathing Crime Scene' "IndyWatch Feed Tech"

While there are still lessons to be learned from how the Russians used the social platform to sow discord ahead of America's 2016 presidential election, critics say Facebook and Zuckerberg aren't acting quickly enough to prevent meddling in the upcoming midterm elections.

"Facebook is a living, breathing crime scene for what happened in the 2016 election and only they have full access to what happened," said Tristan Harris, a former design ethicist at Google. His work centers on how technology can ethically steer the thoughts and actions of the masses on social media and he's been called "the closest thing Silicon Valley has to a conscience" by The Atlantic magazine.

Source : Facebook is a 'living, breathing crime scene,' says one former tech insider

Original Submission

Read more of this story at SoylentNews.


Patent Litigation in East Asia: Huawei, Samsung, HTC, Nintendo and COLOPL "IndyWatch Feed Tech"

A street

Summary: A quick look at some high-profile cases in which large Asian firms are embroiled; it seems clear that litigation activities have shifted eastwards (where actual production is done)

THE patent trolls are down for the count in the US. Litigation is down, especially in their favourite venue (where cases fell by more than half). This impacts not only trolls but any company which relies mostly/only on litigation rather than production.

The media which cheers for patent trolls (usually funded by patent trolls too) has begun looking eastwards. Sometimes its even moving eastwards and hiring there. They attempt to adapt in order to survive.

Watchtroll, as usual, tries to malign defendants; in this one post it claims that Samsung was in the context of the Chinese legal system Maliciously Delaying Negotiations. We wrote about this earlier this month and did not see such an accusation. Observers believe a case in which Samsung was found to infringe Huaweis SEP patents is helpful in determining what is misconduct in FRAND negotiations and a sign the Chinese judicial system is resolving increasingly more complicated and new IP disputes, Karry Lai wrote from Hong Kong (for Managing IP). Well, FRAND itself can be viewed as a form of misconduct or at least injustice. Perhaps Samsung has a legitimate explanation/side/role in this story.

Staying around Asia (although in US courts such as CAFC), in Taiwan we have HTC coming under attack again (from a rather obscure entity called Advanced Video Technologies). In the words of Patent Docs:



Crackas with Attitude hacker posed as CIA Chief to access secret data "IndyWatch Feed Tech"

By Carolina

Remember the infamous Crackas with Attitude (CWA) hacking group? If

This is a post from Read the original post: Crackas with Attitude hacker posed as CIA Chief to access secret data


Re: How to deal with reporters who don't want their bugs fixed? "IndyWatch Feed Tech"

Posted by Tavis Ormandy on Jan 20

A better example would be shellshock, a patch was developed in private
under embargo, but as soon as the details were public it was obvious
the patch was incomplete. When it was finally public, we were able to
analyze the problem and develop a real solution - the embargo did
nothing but needlessly delay that process.



Patent Litigation in the US is Down Sharply and Patent Trolls Demise Has Much to Do With It "IndyWatch Feed Tech"

Summary: Docket Navigator and Lex Machina both show a significant decline in litigation a trend which is likely to carry on now that TC Heartland is in tact (not for just half a year but a whole year) and PTAB completes another record year

THE TREND is undeniable. The numbers speak for themselves. The sample set is large enough (thousands), it is complete, and several independent trackers are showing the same thing (independently).

Patents were not designed for litigation, which is merely a last resort. So decline in litigation may be bad news for patent lawyers, but not necessarily for inventors.

Michael Loney, in his latest roundup (primarily shut behind a paywall), shows that patent litigation is in its lowest level in recent history (in the US). Its the same thing other data sources show. Managing IP, he wrote, analyses 2017 data pulled from Docket Navigator to reveal: the overall patent cases filed in US district courts by half, quarter and month; the top 50 plaintiffs, defendants and law firms; and the breakdown of filing by district overall and pre- and post-TC Heartland (which we've just mentioned and also mentioned several times last year in relation to cases in the Eastern District of Texas collapsing post-TC Heartland).

Last year, Loney continued, 4,522 patent cases were filed in US district courts, according to a search of the Docket Navigator database conducted by Managing IP on January 7.

So patent litigation (the lawsuits industry) in the US continues to perish. Scientists can sigh in relief.

Similar data comes from Lex Machina. It wrote the following summary:

In the final quarter of 2017, a total of 981 patent cases were filed in U.S. District Courts, a 1.3% decrease over the previous quarters total of 994 cases. Cases filed in the calendar year 2017 (4,057 cases) represent a decline of 10.3% over 2016 (with 4,529 cases).

Much of it was from patent trolls a sector which is declining (all it ever does is threats and litigation, nothing else).



The (Unnecessary?) Art of Connector Crimping "IndyWatch Feed Tech"

The Completion Backwards Principle is a method of reasoning through a problem by visualizing the end result and then working your way backwards from that point. The blog post that [Alan Hawse] has recently written about the intricacies of crimping wires for plug connectors is a perfect example of this principle. The end result of his work is the realization that you probably shouldnt bother crimping your own connectors, but watching him work backwards from that point is still fascinating. Its also the name of a rock album from the 80s by The Tubes, but this is not a useful piece of information in regards to electrical wiring.

Of course, sometimes people do silly things. Even though there are pre-crimped wires available online for a pittance, you might still want to do your own. With this in mind, [Alan] has put together an exceptionally detailed and well-research post that gives you all the information you could possibly want to know about crimping what is often erroneously referred to as the JST connector.

He starts by showing off some common examples of this connector, which if youve ever opened a piece of consumer electronics will be like looking through a Hig...


Genode OS Framework Making Plans For 2018 "IndyWatch Feed Tech"

The Genode open-source operating system framework project has shared some of their planned goals for 2018...


Ask Soylent: Best Bang for Buck Television Purchase "IndyWatch Feed Tech"

So one of my three year old kids smashed my 65" LED flatscreen with a die-cast model of the Atlantis shuttle. I was fine with this and was not planning on buying a replacement in any haste but my wife keeps complaining. Would prefer at least 65"+ and absolutely not a smart tv. What suggestions do you have, companies to avoid, etc. Help me SN, you are probably my only hope of not just buying another spysung.

Original Submission

Read more of this story at SoylentNews.


Cheating the US Patent System is a Lot Harder After TC Heartland "IndyWatch Feed Tech"

Some gambling dice

Summary: Some new examples of tricks (and sometimes cheats) attempted by patent claimants and their representatives; it does not go as well as they hoped

THE level of mischief at the USPTO is occasionally noted here; its typically about law firms and patent trolls who are attempting to game the system.

Over the past week we have gathered numerous new examples. We dont mean to bash the USPTO (we are actually very encouraged to see its improvements in recent years) but merely to take stock of areas of improvement for the patent system (including courts and law firms).

TC Heartland or another case of Cray are often mentioned in relation to venue shifting or forum shopping or whatever one calls it (its about filing ones patent lawsuit in a district which is perceived to be plaintiff-friendly, troll-friendly, or friendly towards particular types of patents).

Many lawyers are patently just liars (what theyre paid for) and would lie about where businesses are based. Some days ago we saw this docket report about a case in which claimed damages are insubstantial:

The court denied plaintiffs motion for a preliminary injunction to preclude the sales of the accused fracking system because plaintiff failed to establish irreparable harm through loss of market share or reputation.

More interesting, however, was this docket report. Its a case in which venue shifting is attempted. The court granted defendants alternative motion to transfer for improper venue because defendant did not have a regular and established place of business through its provision of equipment to customers in the district, it says. Rightly so. Is this another TC Heartland-type case (only at a far lower court)?

A story which received a lot more attention concerned the filing date and...


Microsofts new AI bot creates drawings based on text descriptions "IndyWatch Feed Tech"

Microsofts new AI tool draws beautiful images from text

The Artificial Intelligence (AI) technology has incredibly evolved over the last few years and is touted to be the next big thing of the future.

Making more headway in that direction is Microsoft Corp. who has been investing in multiple projects relating to AI. The tech giant has created a new AI tool which it calls a drawing bot using a Generative Adversarial Network (GAN) running on two machine learning models. The bot uses the GAN to generate images based merely on a descriptive caption.

One machine learning model generates images from text descriptions, while the other model known as a discriminator uses descriptions of text to judge the authenticity of generated images, so that it cannot be tricked. Working together, the discriminator pushes the generator toward perfection. By using the GAN technique, AI pays close attention to individual words when generating images from caption-like text descriptions, thereby achieving a three-fold uplift in image quality compared to previous text-to-image method.

According to Microsoft, the bot is even capable of imagining details while drawing that are not specifically mentioned in the text, which indicates that the AI contains an artificial imagination.

For instance, the below image was created by the drawing bot simply from the description of a bird with a yellow body, black wings and a short beak. Although it is not specified in the text given, the AI elected to place the bird on a branch using its artificial imagination. Not just birds, the AI tool can draw anything from ordinary countryside scenes, such as grazing livestock, to the bizarre, like a floating double-decker bus.

If you go to Bing and you search for a bird, you get a bird picture. But here, the pictures are created by the computer, pixel by pixel, from scratch, Xiaodong He, a principal researcher and research manager in the Deep Learning Technology Center at Microsofts research lab in Redmond, Washington, said in a report on the project. These birds may not exist in the real world they are just an aspect of our computers imagination of birds.

Microsoft researcher Pengchuan Zhang said of the research, You need your machine learning algorithms running your artificial intelligence to imagine some missing parts of the images. From the data, the machine learning algorithm learns this commonsense where the bird should belong.

The research report, which has yet to undergo scientific review, could act as a sketch assistant to painters and interior designers, says Microsoft. Mr. H...


EXT4 vs. XFS vs. Btrfs vs. F2FS With Linux 4.15 Comparing KPTI/Retpoline "IndyWatch Feed Tech"

The latest in our benchmarking with KPTI and Retpoline for Meltdown and Spectre mitigation is comparing the performance of the EXT4, XFS, Btrfs and F2FS file-systems with and without these features enabled while using the Linux 4.15 development kernel.


RPX Might Soon be Owned by Patent Troll Erich Spangenberg "IndyWatch Feed Tech"

RPXSummary: RPX, whose top executives are leaving and business is gradually dying, might end up as another asset of patent trolls

TECHRIGHTS has been writing many articles about RPX, which marketed itself as against trolls even though its members were often troll feeders.

Last night IAM was exited to say that a patent troll might buy RPX; Big news on RPX, IAM said, management talking to interested parties in early stages of process that could lead to sale. Microsoft opts not to renew membership #IP #patents

We wrote about Microsoft joining RPX a very long time ago and now it exits. From IAMs blog post about it: (obviously not mentioning the T word)

The management of RPX is meeting with a number of interested parties in a process that might lead to an eventual sale of the business, IAM understands. It is believed that an investment consortium led by IP monetisation specialist Erich Spangenberg is among those eyeing the defensive aggregator. Others to have been linked with a possible deal include Vector Capital, the private equity fund that owns IPValue and arguably knows the space as well as any buyout shop. Its not clear if former CEO John Amster is involved in the process (he, Vector and Erich Spangenberg declined to comment for this article). RPX is being advised by GCA, which bills itself as an independent investment bank focused on the growth sectors of the global economy.

If RPX ends up in the hands of these notorious patent trolls, IAM will love it even more. IAM is, after all, the loudest proponent of trolls (along with Watchtroll) bar trolls themselves. IAM is their platform of choice. Years ago we took note of MOSAID/Conversant (classic patent troll) paying IAM and yesterday IAM produced an article which basically amplifies Conversant (...


Distribution Release: KaOS 2018.01 "IndyWatch Feed Tech"

KaOS is an independent, rolling Linux distribution featuring a polished KDE Plasma desktop and the Pacman package manager. The KaOS project has released a new snapshot, KaOS 2018.01, which features fixes for the Meltdown and Spectre CPU bugs. "It is with great pleasure to present to you a....


Film Crew Arrested After Attempting to Sneak Fake Bomb Through Airport Security "IndyWatch Feed Tech"

A film crew linked to cable business news channel CNBC was arrested at Newark Liberty International Airport in New Jersey on Thursday after attempting to sneak a fake bomb through airport security.

Seven members of a cable TV crew working for the Endemol Shine Group, which contracts with CNBC, were arrested for the attempt, which the Transportation Security Administration determined was not a threat. According to CBS's New York City local affiliate, the seven suspects told investigators they were part of the "Staten Island Hustle" show.

The prop "had all the markings of an improvised explosive device," according to a TSA spokeswoman.

"At the same time, others in the group covertly filmed the encounter," she added.

Port Authority police said it has charged the seven crew members with conspiracy to create a public alarm, among other charges.

Source: TheHill

Original Submission

Read more of this story at SoylentNews.


Apple Will Allow Users To Disable Intentional Battery Slowdowns, says CEO Tim Cook "IndyWatch Feed Tech"

Apple to soon release software update that will let iPhone users to turn off power management feature

Last month, Apple was accused of intentionally throttling processing speeds on the iPhone 6 and later models. Later, Apple acknowledged that it is slowing down older iPhones as a part of power management plan to prevent them from shutting down when degraded batteries in older phones tried to run the latest iOS features.

In an exclusive interview with ABC News this Wednesday, Apples CEO Tim Cook said that iPhone users will soon be able to turn off the power management feature on their devices that slows down iPhones when batteries are low on charge.

According to Cook, the upcoming update will shows users the health of their batteries and how much they are reducing the performance. Users will also be able to decide whether they would like their iPhones to slow down and save battery life.

Released last year, the phone-slowing software was intended to ensure that iPhone users did not get disconnected in the middle of an important text message or call because of an old battery, Cook said.

In a developer release thats gonna happen next month, were gonna give people the visibility of the health of the battery, so its very, very transparent. We will tell somebody we are reducing your performance by some amount in order to not have an unexpected restart, and if you dont want it, you can turn it off, Cook added. We dont recommend it because we think that peoples iPhones are really important to them and you can never tell when something is so urgent. Our actions were all in service of the user.

Adding further, Cook said that Apple should have possibly been clearer while introducing these software changes, as it caused people to question companys intentions. He said, And so we deeply apologise for anybody that thinks we had some other kind of motivation. Our motivation is always the user. The user is at the center of everything that we do.

The new iOS update is expected to be rolled in a developer build of iOS next month that will give users visibility of the health of their battery. The idea is to keep things transparent with their customers and this is something that has not been done before, Cook added.

Following the accusation of battery-related iPhone performance problems, Apple has started offering battery replacements for affect...


Tips for an Information Security Analyst/Pentester career - Ep. 54: (Humble) recommendations to land a job in info sec "IndyWatch Feed Tech"

As some of you who follow me closely might know, I recently got a new job as an IT Security Associate, all of a sudden.

I'm very excited for this new opportunity and for being able to find a job in my metropolitan area, where info sec positions aren't really all over the place.

Regardless of what's round the corner in my professional future, I'll always be grateful to my new employer for giving me a chance after being far from the industry for so long.

Jeez, I had almost forgotten that feeling.

The monitors, the SIEM, the logs, the tickets, the challenges I'm back home, baby.

Back where I belong.

But this post isn't about myself.

I don't care for self celebrations, even though I'm very glad right now.

I want to talk about my experience to help others land a job in information security because it's way harder than you could think, or rather it's very hard if you do what everybody else does.


I talked about some of these issues in the episode 1 of this series: Tips for an Information Security Analyst/Pentester career -Episode 1:General and technical hints (could you guys believe I started out writing this stuff in July?), so please check out my older post for some useful references.

I'm adding here a series of additional insights based on the experience I had in over 6 months dealing with recruiters, job interviews that led me nowhere, missed promises, setbacks and disappointments, until I finally saw the light at the end of the tunnel.



Nintendo Switch Gets Making with Labo "IndyWatch Feed Tech"

Over the years, Nintendo has had little trouble printing money with their various gaming systems. While theyve had the odd misstep here and there since the original Nintendo Entertainment System was released in 1983, overall business has been good. But even for the company that essentially brought home video games to the mainstream, this last year has been pretty huge. The release of the Nintendo Switch has rocketed the Japanese gaming giant back into the limelight in a way they havent enjoyed in a number of years, and now theyre looking to keep that momentum going into 2018 with a killer new gaming accessory: a cardboard box.

Some of the contraptions feature surprisingly complex internal mechanisms.

Well, it doesnt have to be a box, necessarily. But no matter which way you fold it, its definitely a piece of cardboard. Maybe a few bits of string here and there. This is the world of Nintendo Labo, a recently announced program which promises to let Switch owners create physical objects which they can interact with via specially designed software for the console.

The Labo creations demonstrated in the bombastic announcement video make clever use of the very...


Crackas leader (15) gained access to data of intel operations in Afghanistan and Iran by posing as the CIA chief "IndyWatch Feed Tech"

British teenager Kane Gamble (15), leader of the Crackas With Attitude hacking group gained access to intel operations in Afghanistan and Iran by posing as the CIA chief.

Do you remember Crackas With Attitude?

You remember for sure the Crackas With Attitude, a hacking crew that claimed clamorous actions in support of the Palestine cause.

The notorious group is responsible for clamorous attacks against US intelligence officials, the list of targeted victims is long and includes James Clapper, the Director of National Intelligence under President Obamas administration and the deputy director of the FBI Jeh Johnson, CIA director John Brennan.

Cracka is also responsible for the disclosure of personal information of 31,000 government agents, including data of FBI agents, Department of Homeland Security (DHS) officers and DoJ employees.

crackas Kane Gamble

Cracka used the account @DotGovz on Twitter to publish online the sensitive data.

The Cracka with Attitude team always expressed its support to Palestine, they hacked US Government entities due to its support to the Israeli politics.

The group was lead by a British teenager, Kane Gamble, that was 15-years-old at the time of the hack of CIA director.

According to prosecutors, Kane Gamble accessed secret data related to intelligence operations in Afghanistan and Iran by pretending to be head of CIA.

He accessed some extremely sensitive accounts referring to, among other things, military operations and intelligence operations in Afghanistan and Iran. said John Lloyd-Jones QC prosecutor.



Patent Quality (Not Numbers) as an Asset: Oppositions, Appeals and Rejections at the EPO "IndyWatch Feed Tech"

If patent information is the goal, then overload is a threat

Information overload
Reference: Information overload

Summary: Benot Battistelli wants a rubber-stamping operation (like INPI) rather than a functional patent office, but oppositions at the Office prove to be fruitful and many erroneously-granted patents are by extrapolation already being revoked (affecting, in retrospect, Battistellis so-called results)

THIS WEEK has been historic at the EPO not because of scandals or conflicts but because of a decision we covered here several times*. It was a major blow to patent maximalists.

The patent microcosm never really cared about patent quality; the quality of patents has little to do with the business model. All they care about, based on this upcoming event (advertised yesterday), is how to double the number of patents by throwing the same texts at multiple piles of applications at multiple offices. EPO and USPTO approaches to rejections is one among the topics covered. As we pointed out here before, the USPTO barely tolerates patents on genetics. There are few ultra-wealthy companies aspiring to own everything, including life itself (Monsanto/Bayer for example) and they crush ordinary people, such as farmers, in the process.

The EPO has lost touch; The discrimination against SMEs at the EPO is not accidental but a planned/intentional policy. According to this, the EPO keeps lying about and supposedly on behalf of SMEs. Where does that end? Even EPO staff is being crushed nowadays. Nobody is being served but billionaires.



OpenSWR Rasterizer Improvements Land Ahead Of Mesa 18.0 "IndyWatch Feed Tech"

Besides Intel and Radeon OpenGL/Vulkan driver improvements squeezing into Mesa Git ahead of the imminent Mesa 18.0 code branching, the Intel-developed OpenSWR has landed its latest improvements...


Ted Nelson on What Modern Programmers Can Learn From the Past "IndyWatch Feed Tech"

The inventor of hypertext talks about the birth of personal computing, the web, and how to think beyond the currently possible Stephen Cass

Ted Nelson is one of the original prophets of the information age. In the 1960s he invented the word hypertext , and created project Xanadu, which prefigured many of the elements of the World Wide Web.

Nelson was part of personal computing at a time when it saw itself as an outgrowth of the countercultural movement that flourished in the 1960s. This computing was done either via a terminal to minicomputers, or on microprocessors with transistor counts measuring only in thousands. Back in the summer of 2016, Nelson was a keynote speaker at Vintage Computing Festival East in New Jersey and IEEE Spectrum had the chance to interview him off-stage.

We thought this was a good time to dust off that interview. Were entering a period when the possibilities and dangers of computing are looming large in our minds, thanks to the explosion of machine learning, debates over the governance of the Internet, the impacts of automation, and unexpected weaknesses revealed by the Spectre and Meltdown hardware bugs. Nelson talks about how he and his fellow pioneers thought the future would be a world of citizen programmers, how the Web omits much of the architecture underlying Xanadu, and his advice for breaking through the current limits to new conceptual ground.


GNOME Rolls Out The GTK Text Input Protocol For Wayland "IndyWatch Feed Tech"

GNOME developers have been working on a new Wayland protocol, the "gtk_text_input" protocol, which now is implemented in their Mutter compositor...


FESCo Approves A Big Round Of Fedora 28 Features "IndyWatch Feed Tech"

The Fedora Engineering and Steering Committee (FESCo) approved of a number of feature requests for the Fedora 28 release due out in May...


Intel Exploring Cgroups Support For DRM Driver Management "IndyWatch Feed Tech"

An Intel open-source driver developer has posted preliminary patches taking Cgroups v2 to DRM driver management...


FCC Report Keeps Faster Definition of Broadband and Separates Mobile From Fixed Connections "IndyWatch Feed Tech"

The FCC's yearly report of broadband deployment keeps some crucial definitions in place that some feared would be changed or eliminated to ease the responsibilities of internet service providers. The threat of a lowered speed standard and the merging of mobile and fixed broadband services will not be carried out, it seems.

Broadband will continue to be defined as a connection with speeds of 25 megabits down and 3 megabits up. Another proposed definition of 10 down and 1 up was decried by critics as unrealistic for several reasons; not only is it insufficient for many ordinary internet applications, but it would let providers off the hook, because they would be counted as having deployed broadband if it met this lowered standard.

Fortunately, that isn't the case, and the 25/3 standard remains in place.

The other worry was the potential decision to merge mobile with fixed broadband when measuring the quality of internet connections available to people throughout the country.

Had the two been merged, an area might have been considered well-served if it was, for example, in range of an LTE tower (giving decent mobile speeds) but only served by sub-1-megabit DSL. Since it was being considered that only one was required, that underserved area would be considered adequately connected.

But the FCC clearly saw the lack of logic in equating mobile connections and fixed broadband: they're used, tracked, billed and deployed very differently.

[...] The full draft report, when it becomes public, will no doubt contain more interesting information ripe for interpretation, and other commissioners may also weigh in on its successes and shortcomings. In the meantime, it's reassuring that the main worries leading up to it have been addressed.

Source: TechCrunch

Original Submission

Read more of this story at SoylentNews.


Italian companies and Ministry of the Interior under attack, experts spotted a huge botnet "IndyWatch Feed Tech"

Threat actors with a deep knowledge of the Fiscal Italian ecosystem are using a huge botnet to target Italian companies and Ministry of the Interior.

On Januaty 18 a colleague of mine (Luca) called me telling a malicious email was targeting Italian companies. This is the beginning of our new analysis adventure that Luca and I run together.

The email pretended to be sent by Ministero dell Economia e delle Finanze the Italian Department of Treasury  and it had smart subjects such as:

  • Codici Tributo Acconti
  • F24 Acconti-Codice Tributo 4034

The attacker knows very well the Italian Fiscal Year since those modules are very popular from company administration employees at that time. The attacker would probably exploit this attack path reaching out as many companies as possible. The email address was not coming from the Ministero dell economia e delle Finanze at all, it was coming from the following addresses:


The email looks like :

 Huge Botnet Attacking Italian Companies
Malicious eMail

A simple link pointing to a high reputation domain was popping out the default browser and downloading the following Javascript file. The high level of obfuscation and the way the content was provided was so suspicious to be worth to follow the analysis.



Tricked-out Barbecue Will Make You Do a Spit Take "IndyWatch Feed Tech"

[Strn] and his friends love to barbecue no matter what its like outside. But something always seems to interrupt the fun: either its time to get up and turn the meat, or the music stops because somebodys phone ran out of juice, or darkness falls and there arent enough flashlights or charged-up phones. He had the idea to build the Swiss Army knife of barbecues, a portable powerhouse that solves all of these problems and more (translated).

Most importantly, the E-Mangal rotates the skewers for even cooking. It does this with a 3D-printed worm gear system driven by the heater flap actuator from a car. After 25 minutes of slow rotation, a voice announces that its time to eat. [Strn] and friends will never hurt for music options between the pre-loaded tracks, Bluetooth audio, FM antenna, USB, and SD options running through a 3W amp. Two USB lights illuminate nighttime barbecuing, and the 10 Ah battery can do it all and keep everyones phone charged. For safetys sake, [Strn] included a half-liter water tank to extinguish the coals via jet stream. Everything is run by a PIC18F, and it can be controlled at the box or through a simple web interface.

We love the look of this barbecue controller almost as much as the functionality. The sturdy stance of those short, angled legs give it a mid-century appliance feel, and seeing all the guts on display is always a plus. Grab a turkey leg and take the tour after the break.

The E-Mangal has a thermocouple in the coal box to measure the temperature, but theres no direct control. If youre more interested in temperature options than entertainment, heres a project that micromanages everything on the grill.



Police Shut Down Pirate Streaming TV Provider, Three Men Arrested "IndyWatch Feed Tech"

As prices for official multi-channel cable and satellite packages continue to increase, unauthorized streaming TV providers are providing an interesting alternative for those who demand the greatest variety of channels at a cut-down price.

Of course, none of this is legal and as such, authorities are clamping down. Today brings news of yet another pirate raid, this time in the city of Lublin, Poland.

A statement from the Provincial Police Headquarters reveals that officers from the Cybercrime and Economic Crime units conducted an investigation under the supervision of the District Prosecutors Office in Lublin. Locations in three provinces Dolnolskie, Zachodniopomorskie and Wielkopolskie were searched.

According to prosecutors, the operators of the website illegally streamed the majority of all television channels available locally, including digital TV and state television. More than 160 channels were supplied via the site without permission. Users were initially given free access to the currently unnamed service but were then encouraged to subscribe to a premium package.

Pirate Streaming TV service (Credit: Polish police)

The funds obtained from this procedure were invested in the further development of criminal activity and in foreign and Polish companies, of which [the suspects] were owners, a police statement notes.

Local reports indicate three men, aged 30, 42 and 57, were arrested and brought to the prosecutors office. There they faced allegations of illegally distributing pay television and using the revenue as a permanent source of income.

We estimate that the suspects could have benefited to the tune of nearly 3.5 million zlotys [840,663 euros] via their illegal practices, police add.

Pirate Streaming TV service (Credit: Polish police)

In addition to the arrests, police also seized equipment including 12 computers, nine servers, tablets, decoders, telephones, more than 60 hard drives and similar devices, plus documentation.

The news of these raids in Poland follows on the heels of a Europol led operation to...


Red Hat reverts Spectre (CVE-2017-5715) security updates due to boot issues reported by customers "IndyWatch Feed Tech"

Red Hat is going to release updates that are reverting previous patches for the Spectre vulnerability (Variant 2, aka CVE-2017-5715).

Just after the release of Spectre and Meltdown patches many experts argued a significative impact on performance and stability of systems running them.

While Meltdown and Spectre Variant 1 could be theoretically being addressed by patching the OS, Spectre Variant 2 require a firmware/microcode update to address the issue.

Now Red Hat joint to the list of companies that observed problems after the installation of the patches, it is releasing updates that are reverting previous patches for the Spectre vulnerability (Variant 2, aka CVE-2017-5715).

The company decided to revert the initial security updates because it received from some customers complaints about booting failure for their systems.

Red Hat is recommending its customers to contact their OEM hardware provider to receive the latest release of firmware to mitigate the CVE-2017-5715.

Red Hat Security is currently recommending that subscribers contact their CPU OEM vendor to download the latest microcode/firmware for their processor. reads the advisory published by Red Hat.

The latest microcode_ctl and linux-firmware packages from Red Hat do not include resolutions to the CVE-2017-5715 (variant 2) exploit. Red Hat is no longer providing microcode to address Spectre, variant 2, due to instabilities introduced that are causing customer systems to not boot. The latest microcode_ctl and linux-firmware packages are reverting these unstable microprocessor firmware changes to versions that were known to be stable and well tested, released prior to the Spectre/Meltdown embargo lift date on Jan 3rd. Customers are advised to contact their silicon vendor to get the latest microcode for their particular processor.



Scientists just uncovered the cause of a massive epidemic using 500-year-old teeth "IndyWatch Feed Tech"

Nearly 500 years ago in what we now call Mexico, a disease started rippling through the population. Red spots appeared on the skin, accompanied by wretched vomiting, bleeding from multiple orifices, and eventually, death. Combined with an invasion from Europe and horrific droughts, it was generally not a pleasant time or place to be alive.

It bore the name cocoliztli, meaning pestilence, and it killed between five and 15 million people in just three years. As many plagues were at the time, it proved deadly and mysterious, burning through entire populations. Occurring centuries before John Snows work on cholera gave rise to epidemiology, data on the diseases devastation was sparse. Over the years, researchers and historians attempted to pin the blame for the illness on measles, plague, viral hemorrhagic fevers like Ebola, and typhoid fevera disease caused by a variation of the bacteria Salmonella enterica.

In a paper published this week in Nature Ecology & Evolution, researchers present evidence that the latter was the most likely candidate in this cast of microbial miscreants. The study was pre-printed in biorxiv last year. The researchers detected the genome of a different variety of Salmonella enterica (the specific variety is Paratyphi C) in teeth of individuals buried in a cemetery historically linked to the deadly outbreak.


I met with the President of Chile, Michelle Bachele, last night "IndyWatch Feed Tech"

We talked a bit, and I had dinner at the presidential palace. Heres a quick snapshot I got of us chatting! There are some professional pictures coming too. #transhumanism


15-Year-Old Schoolboy Posed as CIA Chief to Hack Highly Sensitive Information "IndyWatch Feed Tech"

Remember "Crackas With Attitude"? A notorious pro-Palestinian hacking group behind a series of embarrassing hacks against United States intelligence officials and leaked the personal details of 20,000 FBI agents, 9,000 Department of Homeland Security officers, and some number of DoJ staffers in 2015. Believe or not, the leader of this hacking group was just 15-years-old when he used "social


Farewell, Unpaid Blogger: HuffPost Drops Free Contributor Platform That Drove its Growth "IndyWatch Feed Tech"

[...] HuffPost in the US today announced that it is sunsetting its contributors platform also known as its unpaid blogger platform.

The news was broken by HuffPost itself (which, like TechCrunch, is part of Oath, owned by gigantic carrier Verizon), which directly tied the move to the changing tides (not Tide Pods, although I personally think there is a connection) in the world of news media and how technology is used to distribute it.

"Now, there are many places where people can share and exchange ideas," HuffPost editor in chief Lydia Polgreen writes in a post on the site.

"Perhaps a few too many: One of the biggest challenges we all face, in an era where everyone has a platform, is figuring out whom to listen to. Open platforms that once seemed radically democratizing now threaten, with the tsunami of false information we all face daily, to undermine democracy. When everyone has a megaphone, no one can be heard. Our hope is that by listening carefully through all the noise, we can find the voices that need to be heard and elevate them for all of you."

[...] I'll be interested to see if HuffPost's move signals more of these unpaid blogger platforms (ahem, Forbes) changing tack, and just as significantly whether these sites can find the magic formula to replace it in their revenue streams if and when they do.

Source: TechCrunch

Original Submission

Read more of this story at SoylentNews.


The Nissan Xmotion SUV is more screen than car "IndyWatch Feed Tech"

Seven (!) digital touchscreens, and a virtual personal assistant thats a fish.


You could soon be manufacturing your own drugsthanks to 3D printing "IndyWatch Feed Tech"

But it remains to be seen whether drug regulators will go along with a new way of making medicines. To do so, agencies like the U.S. Food and Drug Administration will need to rewrite their rules for validating the safety of medicines. Instead of signing off on the production facility and manufactured drug samples, regulators would have to validate that reactionware produces the desired medication. Cronin agrees its a hurdle. But he argues that future printed reactors could simply include a final module containing standard validation tests that produce a visual readout, much like a pregnancy test. I think its manageable.

Digitized chemistry on demand could also undermine drug counterfeiters.


Macromolecular Damage Ages Us Prematurely "IndyWatch Feed Tech"

Macromolecular damage contributes to the chronic diseases of aging. Geroscientists hope to repair the damage by inducing autophagy.


First FDA-Approved Clinical Trial of Rapamycin the Anti-Aging Drug in Healthy Seniors "IndyWatch Feed Tech"

Looking back at best of 2017)

A clinical trial of rapamycin on healthy seniors. The anti-aging drug extends the lifespan of mice and reduces inflammation markers.


Can We Slow Aging in our Bodies with Intermittent Rapamycin Therapy? "IndyWatch Feed Tech"

Looking back at best of 2017)

The finding was a milestone in the field of anti-aging science. Professor Judith Campisi, Ph.D., a celebrity in the anti-aging field, and lead author of the study remarked

Imagine the possibility of taking a pill [rapamycin] for a few days or weeks every few years, as opposed to taking something with side effects every day for the rest of your life. Its a new way of looking at how we could deal with age-related maladies. Judith Campisi, PhD

Campisis discovery suggests that a person could take rapamycin intermittently, say, once a week, shutting down the chronic inflammation. Because the zombie cells havent gone away, they will eventually find their footing and start the inflammatory ball rolling once again. A person on this regimen would repeat the dosage intermittently and substantially reduce inflammation.


Revolutionary CRISPR Gene Editing with Nanoparticles "IndyWatch Feed Tech"

Looking back at best of 2017)

Summary: Nanotechnology meets gene editing. MIT researchers use nanoparticles instead of viruses to deliver the CRISPR gene editing system. This article first appeared on LongevityFacts. Author: Brady Hartman]

In a new study, MIT scientists have developed nanoparticles that deliver the CRISPR gene editing system, eliminating the need to use viruses for delivery.

Using the new delivery technique, the gene editors were able to cut out genes in about 80 percent of liver cells, the best success rate ever achieved with CRISPR in adult animals. Speaking about the success of the project, Daniel Anderson, senior author of the study and an associate professor in MITs Department of Chemical Engineering, said.


Incredibly Rare Super Blue Blood Moon Is About to Appear For The First Time in 150 Years "IndyWatch Feed Tech"

If you were awestruck by the New Years Day super moon, hold onto your pants.

On January 31, around midnight, the full moon will not only be super, it will be a blue moon and a blood moon.

The blue moon comes as it will be the second full moon in a month. That happens every two and a half years, hence the saying once in a blue moon.


The US Global surveillance bill has been signed by President Trump "IndyWatch Feed Tech"

The U.S. legal framework related to the domestic surveillance has been signed by President Trump one day after the Senate approved it with 65 votes against 34. The bill will be effective for other six years, below the Edward Snowdens comment:

Privacy advocates and civil rights have a long criticized the Section 702 of the Foreign Intelligence Surveillance Act (FISA) that allows US intelligence agencies to conduct domestic surveillance under certain conditions without a warrant.

The Section 702 allows the NSA to conduct warrantless spying of foreigners located abroad, including any communications with US citizens.

NSA surveillance activities

Section 702 was revealed by NSA whistleblower Edward Snowden in 2012. Civil rights and privacy advocates consider it as unconstitutional under the Fourth Amendment.

The bill increases spying powers of intelligence agencies and block safeguards, curiously it was passed by Republicans who always criticized the corruption of the Government.



Trump Revolution "IndyWatch Feed Tech"

We also had significant drops from q anon last night.  However i have no way to grab them in text form.  So i added another report covering it.

First though i do want everyone to listen to Steve.  He is a critical informant and has previously revealed the existence of an extensive White Hat counter insurgency within the intelligence community consisting of elements of mil intel and the CIA and other agencies.  This movement has crystallized around President Trump and is working to undo the damage inflicted by what can best be described as the Bush Clinton Cabal who have worked through self interest and in association with the Fsacist NWO conspiracy.

As such was clearly in opposition to the military ethos in particular, it is no surprise that a counter movement would establish itself and wait its opportunity.  That came a year ago with the rise of Trump.  Steve makes the clear point that they won a year ago and what we are now dealing with is the mopping up.   This is a fresh perspective that is welcome.  It saves us from getting too nervous.

What we seem to be building for now is the disclosure phase and it is been handled gingerly.  As Steve makes clear is that a revolution has taken place and it has been fought mostly in secrecy.

Yesterday a four page report regarding those amazing FISA requests were made available to congress.  As i had fully suspected, the situation has turned out to be far worse than Watergate and must mean jail time for a lot of people.  Q anon notes the eight folks have already been fired and i suspect the DWS or Debbie Wassermann Schultz was apprehended attempting to flee.  We do know that several events have taken place regarding returned aircraft.



Bitcoin Wallet Maker Ledger Raises $75 Million for Security Push "IndyWatch Feed Tech"

Ledger SAS, a startup that makes electronic wallets for Bitcoin and other cryptocurrencies, has raised 61 million euros ($75 million) from investors including Draper Esprit Plc.


Space mining is going to seriously disrupt Earths economy. And were nowhere near ready for the shock "IndyWatch Feed Tech"

In the coming decades, the mining of precious minerals in space is likely to have a major impact on the global economy. And existing laws are nowhere near ready for the shift.


Microsoft Gets Hacker Friendly "IndyWatch Feed Tech"

You dont often hear hackers say a lot of good things about Microsoft. Sure, you might use Windows, especially if you have one of those embarrassing day jobs. But at night in a hackers secret lab, you are likely to find something that looks more like Unix, even if it has a penguin, a piece of fruit, or even a green robot on the label. But well give Microsoft credit. Their new MakeCode site will be a great boon for educators, students, and anyone who wants to learn how to code. Whats more is they are joined by a lot of familiar hacker faces including AdaFruit, Sparkfun, and Seeed Studios.

The idea is to have tutorials and if that was all there was to it, this would be a short post. But what is really entertaining about the site is that there are web-based emulators for all the hardware so you can actually do the projects in your browser with no extra hardware. You can also do your own projects from scratch.

It will dismay some, but the default interface is for a blocks language where you drag items around. But if that bothers you, you can click the Javascript button at any time. You can even switch back and forth. For example, heres a little fake radar servo, complete with a blinking light and a beep tone:

And heres the same thing in Javascript:

let state = false
loops.forever(function () {
 music.playTone(494, music.beat(BeatFraction.Eighth))


Army Grapples With Cyber Age Battles In Megacities "IndyWatch Feed Tech"

High-tech warfare at knife-fight ranges: thats the ugly future of urban combat. If you thought Baghdad was bad, with its roughly six million people, imagine a megacity of 10 or 20 million, where the slums have more inhabitants than some countries. Imagine a city of the very near future where suspicious locals post every US military movement on Twitter with digital photos and GPS-precise coordinates. Imagine roadside bombs that fly because the bad guys downloaded blueprints for a kamikaze mini-drone and built it with their 3D printer.

As the US pulls out of the mountains and deserts of Afghanistan, the Navy and Air Force may be looking to the wide-open Pacific, but the Army is increasingly concerned about the cramped alleyways of Third World cities. (The Marines, as usual, have a foot in both worlds). Chief of Staff Ray Odiernos personal Strategic Studies Group now led by hybrid warfare expert David Johnson is working on the subject, as is the Armys think tank and teaching institution, Training and Doctrine Command (TRADOC). This August, after months of seminars, simulations, and study, the Army War College will host a deep future wargame set in a megacity, probably a coastal one, circa 2035.

We talk about the danger of failed states: Imagine a failed megacity, offers Col. Kevin Felix of TRADOCs Army Capability Integration Center (ARCIC), which plays a leading role in organizing the wargame. Even a partial breakdown of security and public services could put thousands of people in peril or under the rule of drug gangs, as in Brazils infamous favelas; or of terrorist groups, like Hezbollah in parts of Lebanon. In those parts of the city, Felix told me, there...


Futuristic Living Electronic Clothes and Walls Unveiled "IndyWatch Feed Tech"

The future of clothing unfolds at this years Consumer Electronics Show with the unveiling of an e-ink dress and much more!


Lockheed Exoskeleton Gives Troops A Leg Up, Literally "IndyWatch Feed Tech"

It is not Iron Man. It isnt even Iron Fist. Lockheed Martins newest exoskeleton is more like Iron Leg. But for a soldier humping his weapons, ammo and body armor up a mountain in Afghanistan or a high-rise building in a future urban battle, a device to take the load off would be welcome. And, unlike science fiction supersuits, we can build it now.

Exoskeletons are part of the Pentagons Third Offset Strategy, which seeks to use robotics and artificial intelligence to enhance humans on the battlefield, rather than to replace them. Theres no area where the need is more acute than in the infantry, which takes the vast majority of casualties.


Citrix To Unify Product Suite, Kill Off Today's Product Names By May "IndyWatch Feed Tech"

Arthur T Knackerbracket has found the following story:

An internal staff memo, obtained by The Register and which we understand has been shared with industry analysts under non-disclosure agreements, explains that Citrix's developers have started "working across teams to unify all our offerings into innovative and holistic solutions" and "moved beyond the old way of thinking solely about individual products."

Citrix's marketing execs have decided that those efforts mean "we need to simplify our portfolio naming so that it's easy to understand, buy, and use." The biz will therefore "reframe the way we market and sell products to amplify a focused Citrix brand with simplified and descriptive names that are easily understood."

The result will be a "Citrix + function" product naming scheme that will supersede established brands, such as Netscaler and Xen, and pave the way for things like Citrix SD-WAN and Citrix Desktops. Individual products will be filed under categories like Citrix Networking or Citrix Analytics.

The names are set to be finalized in February and launched in May 2018, when the corp will stage its Synergy user conference in Los Angeles, California.

[...] That Citrix has switched up its products and plans a relaunch, of sorts, is welcome news, given that when incoming CEO David Henshall took the big chair in July 2017, after predecessor Kirill Tatarinov spent just 18 months in the job, he promised to deliver a vision and "strategic initiatives" to advance his organization's fortunes.

[...] Henshall has an opportunity to do more than promise action on January 31, 2018, when the company will report its next quarterly results. Perhaps we'll learn more then.

For now, we are left to ponder the fact that the memo we've glimpsed ends with thanks to "all Citrites" for their help remaking the company. We mention this as perhaps Henshall needs his branding team to come up with a better collective noun for his employees if he wants to hit those best workplace lists. Just saying.

Original Submission

Read more of this story at SoylentNews.


Nanoparticle gel could make mass-market low-cost Holography, LIDAR "IndyWatch Feed Tech"

Why arent holograms or related optical devices part of our everyday lives yet? The technologies can be created by using magnetic fields to alter the path of light, but the materials that can do that are expensive, brittle and opaque. Some only work in temperatures as cold as the vacuum of space.

Minjeong Cha, MSE PhD Student, applies a gel made up of chiromagnetic nanoparticles that are a conduit for modulating light to a laser apparatus. Image credit: Joseph Xu, Michigan Engineering

Now, researchers from the University of Michigan and the Federal University of Sao Carlos in Brazil have demonstrated that inexpensive nanoparticles in a gel can replace traditional materials at a drastically reduced cost. And their approach works at room temperature.


Eyes of an Angel with Paul elder "IndyWatch Feed Tech"

Eyes of Angel by Paul Elder
If you read no other book about what we are learning about the other side, please make it this one.  He has read the literature through and then participated in the best available training at the Monroe Institute.  I found the work both complete and comprehensives as well in exploring his own reactions to all this.

The spirit body we all have is physically real but formed from second tier matter.  Thus on death we return perceptionally to this second tier world and participate in eternal life there.  The constructs there are formed by shared imagination although Paul does not make this distinction.

In the spirit world we all become Hobbits.  My own Lucid Dream returned me to a cottage similar to the farm house of my youth to meet my mother.  The affinity was there.  Was Tolkien imagining the After Life?

Eyes of an Angel 



From Bitcoin To Hashgraph: Mike Maloney On The Crypto Revolution "IndyWatch Feed Tech"

This may help you understand what it happening out there.  What is happening is that crypto currency is wresting currency control out of the hands of government who have yet to truly wake up to their danger.

Add in the rule of twelve to operate lending generally and our whole civilization is organically re-engineering itself.  It is awesome to watch..

Or future will be tied tightly to our natural communities and all this is prologue to a fully operational New Terra.

From Bitcoin To Hashgraph: Mike Maloney On The Crypto Revolution

Today, mankind stands at a crossroads,...


Update: 'Bat-Winged Man' Hit By Delivery Truck "IndyWatch Feed Tech"

This is really as good as it gets short of convincing one to walk into a lab for a physical.  We have many eye witness reports, even up close, but all lack physicality.  This is as physical as it gets.  I am impressed that it survived a 40 mile per hour impact at all.  However a tough animal certainly can do just that.  That it was able to shake of the shock and fly off is impressive.

This is our Mothman and it is certainly our gargoyle as well.  It is also the primary source for cattle mutilations as well.  The creature feeds on blood and occasional soft tissue.  And yes, you want to be scared of it, although it knows well enough to be wary of us.

It is one more nocturnal predator in our curious inventory of nocturnal cryptids.. 

Update: 'Bat-Winged Man' Hit By Delivery Truck

I recently received further information on the following account:

'Bat-Winged Man' Hit By Delivery Truck
Wednesday, January 10, 2018
Summer 2016 - Chesterland, Ohio, USA: I had a very similar encounter with the winged creature myself and even posted the story of what happened to a group on Facebook that talks about things. Im 32 years old and had never seen anything supernatural or alien in my life until last summer. I had always been and still am very much a skeptic, and to this day I try to convince myself that what I saw was actually a really big hawk or something...but I know I'm lying to myself.

It was around 3:45 AM, I'm driving west on 322 towards Chesterland, Ohio. I'm driving a Freight-liner box truck with a load of newspapers. In the summer tim...


Trump Signs Bill Renewing NSAs Internet Surveillance Program "IndyWatch Feed Tech"

Via: Reuters: U.S. President Donald Trump on Friday said he signed into law a bill renewing the National Security Agencys warrantless internet surveillance program, sealing a defeat for digital privacy advocates.


Using electric fields to manipulate droplets on a surface could enable high-volume, low-cost biology experiments "IndyWatch Feed Tech"

MIT researchers have developed hardware that uses electric fields to move droplets of chemical or biological solutions around a surface, mixing them in ways that could be used to test thousands of reactions in parallel.

The researchers view their system as an alternative to the microfluidic devices now commonly used in biological research, in which biological solutions are pumped through microscopic channels connected by mechanical valves. The new approach, which moves solutions around in computationally prescribed patterns, could enable experiments to be conducted more efficiently, cost-effectively, and at larger scales.

Traditional microfluidic systems use tubes, valves, and pumps, says Udayan Umapathi, a researcher at the MIT Media Lab, who led the development of the new system. What this means is that they are mechanical, and they break down all the time. I noticed this problem three years ago, when I was at a synthetic biology company where I built some of these microfluidic systems and mechanical machines that interact with them. I had to babysit these machines to make sure they didnt explode.


Graphene Could Be a Source of Endless, Clean Energy "IndyWatch Feed Tech"

Scientists have discovered an endless energy supply in the naturally occurring Brownian motion of graphene.


A robotic arm made of DNA moves at dizzying speed "IndyWatch Feed Tech"

A DNA machine with a high-speed arm could pave the way for nanoscale factories.


Samsung starts producing GDDR6 RAM for next-gen graphics cards "IndyWatch Feed Tech"

You can start getting pumped about the next generation of graphics cards, as Samsung has announced that its building the first-ever 16-gigabit GDDR6 chips using its 10-nanometer class technology. The news isnt a complete surprise, as Samsung previously said that GDDR6 was coming when it unveiled 8-gigabit DDR4 RAM chips last month and won a CES 2018 Innovation Award in November.

Beginning with this early production of the industrys first 16Gb GDDR6, we will offer a comprehensive graphics DRAM line-up, with the highest performance and densities, in a very timely manner, said Samsungs Senior VP Jinman Han. The company also did a minor tease, saying the chips will play a critical role in early launches of next-generation graphics cards and systems.

The voracious demand from bitcoin mining has pushed the GeForce GTX 1070 from a $380 suggested retail price to $890.


BMW now says that its Tesla Model 3 competitor iNext will have an insane 435-mile range "IndyWatch Feed Tech"

BMW is promising a series of new all-electric cars starting next with the first all-electric Mini, but the most anticipated one is the 2021 iNext electric vehicle, which the German automaker has been positioning as a Tesla Model 3 competitor.

They are now hinting at a major range increase for the upcoming vehicle.


Mitsubishi Will Sell Cars With No Mirrors Next Year "IndyWatch Feed Tech"

You know that warning on your cars side view mirror that says objects may be closer than they appear? You wont see that on this new Mitsubishi prototype. You wont even see mirrors on it.

Thats because Mitsubishi has ditched the mirrors and replaced them with cameras: one each on the drivers and passengers side and another to handle rear-view duties. Theres more to the system than just cameras, of course.

As is the case with almost everything tech-related in the news these days, Mitsubishis mirrorless system will utilize an advanced AI to help keep drivers safe. The cameras can detect objects as far away as 100 meters, and the AI can distinguish between pedestrians and vehicles and even figure out what kind of vehicle is approaching.


Roll Your Own Raspberry Pi OS "IndyWatch Feed Tech"

Writing an operating system is no small task, but like everything else it is easier than it used to be. [JSandler] has a tutorial on how to create a simple operating system for the Raspberry Pi. One thing that makes it easier is the development environment used. QEMU emulates a Raspberry Pi so you can do the development on a desktop PC and test in the virtual environment. When you are ready, you can set up a bootable SD card and try your work on a real device.

The operating system isnt very complex, but it does boot, organize memory, displays on the screen, handles interrupts, and manages processes. What else do you need?

Theres quite a bit of ancillary information about the Pi, also, which is great. Want to know about the Pis configuration? The organization of the framebuffer? Which interrupts are available? All that information is there.

This isnt the first OS tutorial for the Pi that weve seen. Even if you dont want to build a general-purpose operating system, you might want to try your hand programming the Pi at the bare metal level.

Raspberry Pi image: Evan-Amos [Public domain].


A380 Saved As Emirates Orders Another Twenty Planes "IndyWatch Feed Tech"

Arthur T Knackerbracket has found the following story:

Three days after warning the A380 might not have a future, Airbus says it will likely keep making the plane into the 2030s.

The turnaround came after Dubai-based Emirates placed an order for 20 more of the behemoths, with options for another 16. The carrier already has 101 A380s in its fleet and had already ordered another 41. The airline therefore has plans to acquire 178 of the planes, but won't ever operate that many as some of the newly-ordered machines will replace older models.

Airbus said the deal will "will provide stability to the A380 production line" and let it keep making the superjumbo for years. Which is great news for the thousands of people around the world who make the plane or parts of it, and for Airbus itself.

[...] The company still hopes that carriers other than Emirates will pick up the plane, which it positions as ideal for routes to popular destinations where landing slots are at a premium. Airbus expects more cities will acquire that status as airline traffic grows.

Original Submission

Read more of this story at SoylentNews.


U.S. Government Shutdown Starting on January 20, 2018 "IndyWatch Feed Tech"

After 10 PM EST on Friday, The U.S. Senate rejected a deal that would fund the U.S. government for another month:

Only five Democrats voted to advance the bill Sens. Joe Manchin (W.Va.), Joe Donnelly (Ind.), Heidi Heitkamp (N.D.) and Claire McCaskill (Mo.), who are all up for reelection this year in states carried by President Trump in 2016 election, and newly-elected Sen. Doug Jones (D-Ala.).

Republicans were also not united, as Sens. Rand Paul (Ky.), Lindsey Graham (S.C.), Mike Lee (Utah) and Jeff Flake (Ariz.) also voted against advancing the legislation. Sen. John McCain (R-Ariz.), who is battling brain cancer, was absent.

The procedural vote remained open late Friday, though it needed 60 votes to pass and was well short of that number with 48 senators voting against it.

Senate Majority Leader Mitch McConnell and Senate Minority Leader Charles Schumer continued to negotiate after the vote opened (archive), but no deal has been reached yet. As of midnight (5 minutes before this story went live), the government shutdown was in effect.

At Wikipedia: Deferred Action for Childhood Arrivals (DACA) and Children's Health Insurance Program (CHIP). Government shutdowns in the United States.


China publishes more scientific articles than the U.S. "IndyWatch Feed Tech"

A new analysis of global science and engineering competence shows that the United States is struggling to fight off an increasingly competitive China.

The numbers: According to the National Science Foundation, China published over 426,000 research papers in 2016. America pumped out almost 409,000. If you consider the number of citations for those papers, a measure of the influence they have in the scientific community, America does betterit placed third internationally, while China comes in fifth (Sweden and Switzerland took the top spots).

Strengths elsewhere: The report does, however, note that America invests the most in R&D, attracts the most venture capital, and awards the most advanced degrees compared with every other nation in the world.


OpenSSL development policy changes "IndyWatch Feed Tech"

The OpenSSL project has announced a number of changes to how the project is developed. These include shutting down the openssl-dev mailing list in favor of discussing all patches on GitHub and the addition of a new, read-only (for the world) openssl-project list. "We are changing our release schedule so that unless there are extenuating circumstances, security releases will go out on a Tuesday, with the pre-notification being the previous Tuesday. We dont see a need to have people ready to sacrifice their weekend every time a new CVE comes out."


The Man from Earth Sequel "Pirated" on The Pirate Bay - By Its Creators "IndyWatch Feed Tech"

Submitted via IRC for TheMightyBuzzard

With the file-sharing wars in full swing, 2007 saw the movie The Man From Earth being pirated all over the Internet, but its creators didn't fight the movement. Instead, they embraced pirates and thanked them for their attention. More than a decade on its sequel, The Man From Earth: Holocene, is again being shared on The Pirate Bay. But this time its creators put it there themselves.


Original Submission

Read more of this story at SoylentNews.


Getting to Know an 18th Century Hacker "IndyWatch Feed Tech"

Here at Hackaday we tend to stay pretty close to the bleeding edge in tech, not by any conscious effort, but simply because thats what most hackers are interested in. Sure we see the occasional vintage computer rebuild, or reverse engineering of some component that was put into service before most of us were born; but on the whole youre way more likely to see projects involving the latest and greatest microcontroller to hit AliExpress than ones involving the once ubiquitous vacuum tube.

Bill Maddox

But occasionally its nice to take a step back from the latest and greatest, to really look at what makes the hacker spirit without the all modern trappings of blinking LEDs and Wi-Fi connectivity. We make and explore because its something we are passionate about, and while today most of us are doing that with a soldering iron or a compiler, that hasnt always been the case. In the video below, historic interpreter and woodworker [Bill Maddox] talks about what draws him to 18th century technology. His tools may look foreign to us, but the passion he shows while talking about his creations will be familiar to anyone whos ever set foot in a hackerspace.



Tips for an Information Security Analyst/Pentester career - Ep. 53: Meterpreter detection (pt. 3) "IndyWatch Feed Tech"

Let's now continue our analysis of a system compromised by a Meterpreter payload.

Forensic tools

I created a memory dump with OS Forensics and I analyzed it in combination with Volatility.

By copying the Windows standalone executable, available here, to the OS Forensics folder, it is possible to use Volatility inside OS Forensics, as explained in this tutorial.

However, an analysis with Volatility didn't reveal anything suspicious going on (more details in the embedded video)

Detection tools

As explained in the previous part, neither MS Security Essentials nor other tools had detected anything suspicious, even though I knew there was a payload in memory (I created it!!).

Therefore, I used a different detection tool, along with ESET Online Antivirus Scanner.

I had migrated to a system process, after my previous exploit, so I was stealthy.

I wanted to see, though, what happened with these two tools when I first hacked into the system,...


Tips for an Information Security Analyst/Pentester career - An overview of the series "IndyWatch Feed Tech"

My good buddy Claus Cramon Houmann with Peerlyst asked me to list all the posts I've published so far in this series.

I've pusblished this post on Peerlyst first and then I thought it would be a good idea  to do the same for my blog, as I republished the same posts on peerlyst.

This way, my readers can, if they like to, follow this series on both platforms.
Of course, I'll keep this list updated and add links to newer posts, as I keep publishing them.
I knew I had a bunch of things to say when I started this series of posts (that's what I decided to start a series, by the way) but I didn't expect I'd be on a roll like that, though my plate is always full (3 months' study for Security+, in addition to my work as a translator and to other side projects)
I want to thank each and every one of you for the invaluable , contribution and recognition I had from the community so far, which allowed me to constantly improve the of these posts.
They wouldn't be any good without this type of support I had from you guys, which kept me on my toes and forced me to constantly keep tabs on my work.


Bioengineered Soft Microfibers Improve T-Cell Production "IndyWatch Feed Tech"

Arthur T Knackerbracket has found the following story:

T cells play a key role in the body's immune response against pathogens. As a new class of therapeutic approaches, T cells are being harnessed to fight cancer, promising more precise, longer-lasting mitigation than traditional, chemical-based approaches. These "living drugs" are poised to transform medicine, with a growing number of cellular therapies receiving FDA-approval.

A current bottleneck in these approaches and other Adoptive T-cell Therapies (ACTs) is the production of sufficient numbers of high quality T cells. As a starting material, cells are isolated from the patient and then modified and grown outside the body in a bioreactor.

[...] A Columbia Engineering team has developed a new method for improving T-cell manufacture by focusing on the materials involved in this process. The team is a collaboration between Biomedical Engineering faculty Lance C. Kam and Helen H. Lu, whose research programs include immune engineering and smart biomaterial design. Their study, which is published today in Advanced Biosystems, uses a polymer mesh to activate the T cells, a critical step for their production. This approach simplifies processing compared to systems in use today. In addition, making the fibers out of a mechanically soft material improved T-cell growth, outperforming the current gold standard on several fronts.

"Our report shows that this soft mesh material increases the number of functional cells that can be produced in a single step," Kam says. "In fact, our system provided nearly an order of magnitude more cells in a single process. What's especially exciting is that we've been able to expand cells isolated from patients undergoing treatment for leukemia. These cells are often very difficult to activate and expand, and this has been a barrier to using cellular immunotherapy for the people who need it."

[...] Beyond simplifying the process of cell expansion and improving T-cells expansion, Kam and Lu envision that the mesh platform will have applications beyond immunotherapy. They are refining their platform and exploring how T cells from cancer patients respond to their materials. Says Lu, "It is truly exciting to see how these bioinspired matrices can direct cell function and be successfully used for T-cell therapy."

Original Submission



Real-world intercontinental quantum communications enabled by the Micius satellite "IndyWatch Feed Tech"

A joint China-Austria team has performed quantum key distribution between the quantum-science satellite Micius and multiple ground stations located in Xinglong (near Beijing), Nanshan (near Urumqi), and Graz (near Vienna). Such experiments demonstrate the secure satellite-to-ground exchange of cryptographic keys during the passage of the satellite Micius over a ground station. Using Micius as a trusted relay, a secret key was created between China and Europe at locations separated up to 7,600 km on the Earth.

Private and secure communications are fundamental for Internet use and e-commerce, and it is important to establish a secure network with global protection of data. Traditional public key cryptography usually relies on the computational intractability of certain mathematical functions. In contrast, quantum key distribution (QKD) uses individual light quanta (single photons) in quantum superposition states to guarantee unconditional security between distant parties. Previously, the quantum communication distance has been limited to a few hundred kilometers due to optical channel losses of fibers or terrestrial free space. A promising solution to this problem exploits satellite and space-based links, which can conveniently connect two remote points on the Earth with greatly reduced channel loss, as most of the photons propagation path is through empty space with negligible loss and decoherence.

A cross-disciplinary multi-institutional team of scientists from the Chinese Academy of Sciences, led by Professor Jian-Wei Pan, has spent more than 10 years developing a sophisticated satellite, Micius, dedicated to quantum science experiments, which was launched on August 2016 and orbits at an altitude of ~500 km. Five ground stations in China coordinate with the Micius satellite. These are located in Xinglong (near Beijing), Nanshan (near Urumqi), Delingha (372244.43N, 974337.01 E), Lijiang (264138.15N, 100145.55E), and Ngari in Tibet (321930.07N, 80134.18E).


A Modern Take on the Crystal Radio "IndyWatch Feed Tech"

Well admit that [3DSage] has a pretty standard design for a crystal radio. What we liked, though, was the 3D printed chassis with solderless connections. Of course, the working pieces arent 3D printed you need an earphone, a diode, and some wire too. You can see the build and the finished product in the video below.

Winding the coil is going to take awhile, and the tuning is done with the coil and capacitance built into the tuning arrangement so you wont have to find a variable capacitor for this build. There is a picture of the radio using a razor blade point contact with a pencil lead, so if you want to really scrimp on the diode, that works too, and you can see how at the end of the video.

We did like the use of cord ends from a sewing and craft supply store to serve as solderless springs. This would be a great item to print off a few dozen copies and use it for a school or youth group activity. You might want to pair it with an AM transmitter, though so the kids wont be dismayed at what is playing on AM in most markets. [3DSage] uses a sink for ground literally a kitchen sink. However, if you try this, make sure all the pipes are metal or you wont get a good ground and you probably wont pick up any stations.

Wed like to get some of those springs and make some other kind of starter projects with them like the kits many of us had as kids. This reminded us of the old foxhole radios, found during World War II.


Aubrey de Grey "IndyWatch Feed Tech"


SENS Research Foundation is a 501(3) public charity that is transforming the way the world researches and treats age-related disease.

At SENS Research Foundation, we believe that a world free of age-related disease is possible. Thats why were funding work at universities across the world and at our own Research Center in Mountain View, CA.

Our research emphasizes the application of regenerative medicine to age-related disease, with the intent of repairing underlying damage to the bodys tissues, cells, and molecules. Our goal is to help build the industry that will cure the diseases of aging.

Aubrey de Grey

Aubrey David Nicholas Jasper de Grey is an English author and theoretician in the field of gerontology and the Chief Science Officer of the SENS Research Foundation. He is editor-in-chief of the academic journal Rejuvenation Research, author of The Mitochondrial Free Radical Theory of Aging (1999) and co-author of Ending Aging (2007). He is known for his view that medical technology may enable human beings alive today to live to lifespans far in excess of any existing authenticated cases.


EFF Asks Ninth Circuit Appeals Court To Strengthen Privacy Protections Of Smart Phones At The Border "IndyWatch Feed Tech"

Warrantless Border Searches of Phones, Laptops, Are Unconstitutional

San Diego, CaliforniaThe Electronic Frontier Foundation (EFF) urged the U.S. Ninth Circuit Court of Appeals to require federal agents to obtain a warrant before conducting highly intrusive searches of electronic devices at the border by requiring federal agents to obtain a warrant if they want to access the contents of travelers phones.

The Ninth Circuit four years ago issued an important ruling requiring officials to show they have reasonable suspicion of criminal activity to forensically search digital devices. While that was an improvement over the governments prior practice of conducting suspicionless searches, the court didnt go far enough, said EFF Staff Attorney Sophia Cope. We are now asking the Ninth Circuit to bar warrantless device searches at the border.

Our electronic devices contain texts, emails, photos, contact lists, work documents, and other communications that reveal intimate details of our private lives. Our privacy interests in this material is tremendous. Requiring a warrant is a critical step in making sure our Fourth Amendment protections survive into the digital age, said Cope.

The Ninth Circuit is being asked to throw out evidence obtained through a warrantless forensic search of the defendants cell phone at the U.S.-Mexico border in southern California. The case, U.S. v. Cano, is a drug prosecution and the first before the Ninth Circuit since the U.S. Supreme Court ruled that because devices hold the privacies of life, police need a warrant to search the phones of people who are arrested.

In an amicus brief filed today in U.S. v. Cano, EFF urged the court to recognize that people traveling through our international borders deserve the same privacy protections that the Supreme Court has extended to arrestees. The Ninth Circuits rulings apply to states in the west and southwest, several of whom share borders with...

Friday, 19 January


New Botnet Infects Cryptocurrency Mining Computers, Replaces Wallet Address "IndyWatch Feed Tech"

Satorithe malware family that wrangles routers, security cameras, and other Internet-connected devices into potent botnetsis crashing the cryptocurrency party with a new variant that surreptitiously infects computers dedicated to the mining of digital coins.

Records show that the attacker-controlled wallet has already cashed out slightly more than 1 Etherium coin. The coin was valued at as much as $1,300 when the transaction was made. At the time this post was being prepared, the records also showed that the attacker had a current balance of slightly more than 1 Etherium coin and was actively mining more, with a calculation power of about 2,100 million hashes per second.

Story at ArsTechnica

Original Submission

Read more of this story at SoylentNews.


Activating a single gene is sufficient to change skin cells into stem cells "IndyWatch Feed Tech"

In a scientific first, researchers have turned skin cells from mice into stem cells by activating a specific gene in the cells using CRISPR technology. The innovative approach offers a potentially simpler technique to produce the valuable cell type and provides important insights into the cellular r


Twitter finds over 1,000 new Russian-linked accounts "IndyWatch Feed Tech"

Twitter said Friday that it has suspended 1,062 new accounts it has found to be linked to the Internet Research Agency, a Russian "troll farm" which disseminated content intended to interfere in the U.S. political process.In total, the company has...


Triton Malware exploited a Zero-Day flaw in Schneider Triconex SIS controllers "IndyWatch Feed Tech"

The industrial giant Schneider discovered that the Triton malware exploited a zero-day vulnerability in Triconex Safety Instrumented System (SIS) controllers in an attack aimed at a critical infrastructure organization.

In December 2017, a new malicious code dubbed Triton malware  (aka Trisis) was discovered by researchers at FireEye, it was specifically designed to target industrial control systems (ICS) system.

Security experts at CyberX who analyzed samples of the malware provided further details on the attack, revealing that Triton was likely developed by Iran and used to target an organization in Saudi Arabia.


Triton malware

The Triton malware is designed to target Schneider Electrics Triconex Safety Instrumented System (SIS) controllers that are used in industrial environments to monitor the state of a process and restore it to a safe state or safely shut it down if parameters indicate a potentially hazardous situation.

TRITON is designed to communicate using the proprietary TriStation protocol which is not publicly documented, this implies that the attackers reverse engineered the protocol to carry out the attack.

Initial analysis conducted by Schneider excluded that hackers may have leveraged any vulnerabilities in the target products, but now the vendor has discovered that Triton malware exploited a flaw in older versions of the Triconex Tricon system.

Schneider confirmed the presence of a flaw only in a small number of older versions and plans to release security updates that address it in the next weeks.

Schneider also announced that it is developing an application to detects the presence of the malware on a controller and removes it.

Anyway, Schneider pointed out that the root cause of the success of the Triton malware is that victims failed in implementing best practices and security procedures.

Just after the disclosure of the attack, Schneider published a security advisory to warn its customers and recommended to avoid leaving the front panel key p...


Video Friday: Crawling Baby Robot, Tethered Drone, and New Intel RealSense "IndyWatch Feed Tech"

Your weekly selection of awesome robot videos Image: Purdue University

Video Friday is your weekly selection of awesome robotics videos, collected by your Automaton bloggers. Well also be posting a weekly calendar of upcoming robotics events for the next few months; heres what we have so far (send us your events!):

IEEE IRC 2018  January 31-February 2, 2018  Laguna Hills, Calif., USA
International Symposium on Medical Robotics  March 1-3, 2018  Atlanta, Ga., USA
HRI 2018  March 5-8, 2018  Chicago, Ill., USA
RoboSoft 2018  April 24-28, 2018  Livorno, Italy
ICARSC 2018  April 25-27, 2018  Torres Vedras, Portugal

Let us know if you have suggestions for next week, and enjoy todays videos.

When babies crawl on the floor, especially in carpeted areas, their movement kicks up lots of dirt and dust, including things like skin cells, bacteria, and fungal spores. Researchers at Purdue University wanted to find out if that could be bad for the babies. So they built a robotic crawling baby (which is much less adorable than the real thing) and tested it crawling on actual carpet samples they had removed from homes.

The researchers found that a concentrated cloud of resuspended particles forms around the Pig-Pen wannabes, and that the concentrations around them can be as much as 20 times greater than the levels of material higher in the room.Moreover, infants bodies arent as good at blocking this dust storm, Boor says. "For an adult, a significant portion of the biological particles are removed in the upper respiratory system, in the nostrils and throat. But for very young children, they more often breathe through their mouths, and a significant fraction is deposited in the lower airwaysthe tracheobronchial and pulmonary regions. The particles make it to the deepest regions of their lungs."

Counterintuitively, perhaps, this may be just what nature intended. "Exposure to certain bacterial and fungal species ca......


Intel Management Engine Take Action "IndyWatch Feed Tech"

The Intel Management Engine (ME) is a grave threat to the freedom, privacy, and security of computer users. The Spectre and Meltdown vulnerabilities discovered in early 2018 have drawn a great deal of unwanted attention to Intel, and this provides us with an opportunity to educate others about the dangers of the Intel ME, as well as other ongoing injustices imposed by proprietary software.

If there is an event at your university or in your community addressing the Intel chip bugs, we urge you to distribute printed copies of our report on the Intel ME by Denis GNUtoo Carikli, with the following foreword by Free Software Foundation president Richard Stallman:

Meltdown and Spectre are errors. Grave errors, to be sure, but not evidently malicious. Everyone makes mistakes.

Intel has done far worse with its CPUs than make a mistake. It has built in an intentional back door called the Management Engine.

Important as these bugs are, don't let Intel's mistakes distract you from Intel's deliberate attack!

Download a printable PDF of the article here.

These events provide an excellent chance to inform our friends and neighbors about why free software matters. Please let us know if you bring this article to an event, and let us know how it turned out.


How to Setup Your Own Web Server "IndyWatch Feed Tech"

An Anonymous Coward asks:

I'm putting this under security because i'd like to keep this a private server for family:

that said, I'm wondering if you fine people can help me with the best way to set up a web server in my house to host the files on my external hard drives for family members in other cities/countries while, again, keeping it private and secure over the internet.

I'm looking into ngrok for url handling, but am not sure exactly if this is the best way to go.

Can anyone save me time and possible heartache and failure and provide me (and possibly others) with a walk-through of which software to use. Would love to do something like free, but may have to get a paid unique domain from, say, ngrok, to make it easier for family members to connect up.

Help me, Obi Wan Kenobi... you're my only hope!

Original Submission

Read more of this story at SoylentNews.


Facebook to start ranking news outlets on community trust "IndyWatch Feed Tech"

Facebook announced on Friday that it will start ranking news outlets based on how widely theyre trusted by the platform's users.Publishers with higher ratings will get priority in users news feeds, a move that the company says will cut down...


Build a Sandblasting Rig for $6 "IndyWatch Feed Tech"

Lets get something out of the way: yes, this assumes you already own or have access to a compressor. So if you do, and know what youre getting into, why not build a cheap sandblasting rig? Thats what [adamf135] did after seeing someone do it on YouTube. He seriously doubted it would work, but the results are pretty impressive.

This one doesnt require much more than an empty 20oz bottle, a cheap air gun/nozzle, and an adapter. The hardest part of this hack seems to be cutting a groove in the nozzle for the blasting material without severing it completely. [Adam] cut a 1/2 section out of his, but that large of an opening really uses up the blasting material. He recommends going smaller. After snipping off the sealing ring, he runs the nozzle through a 3/16 hole drilled through the strongest part of the bottle and seals it off with hot glue. Watch it power through rust and paint with crushed glass after the break.

If you do any open sandblasting like this, be sure to at least wear a mask. If you dont want to spray fine particles all over the shop, you could build a wet media blasting cabinet instead, or go even lower-tech and build a drill-powered parts tumbler.


OnePlus website hacked; credit card data of 40,000 users stolen "IndyWatch Feed Tech"

By Waqas

If you are a OnePlus customer and bought their products

This is a post from Read the original post: OnePlus website hacked; credit card data of 40,000 users stolen


Russian Twitter accounts pushing for release of 'shocking' surveillance memo "IndyWatch Feed Tech"

Russian-linked bots on Twitter are pushing for the House Intelligence Committee to release a classified report written by committee Chairman Devin Nunes (R-Calif.).Some Republicans believe the report shows political bias in the FBI and the...


Harvard Student Helps Crack Mystery of Inca Code "IndyWatch Feed Tech"

He made graphs and compared the knots on the khipu to an old Spanish census document from the region when something clicked.

"Something looked out of the ordinary in that moment," Medrano said. "It seemed there was a coincidence that was too strong to be random."

He realized that, like a kind of textile abacus, the number of unique colors on the strings nearly matched with the number of first names on the Spanish census.

Source: Harvard student helps crack mystery of Inca code

Original Submission

Read more of this story at SoylentNews.


Linux Gaming For Older/Lower-End Graphics Cards In 2018 "IndyWatch Feed Tech"

A request came in this week to look at how low-end and older graphics cards are performing with current generation Linux games on OpenGL and Vulkan. With ten older/lower-end NVIDIA GeForce and AMD Radeon graphics cards, here is a look at their performance with a variety of native Linux games atop Ubuntu using the latest Radeon and NVIDIA drivers.


A Keyboard To Stomp On "IndyWatch Feed Tech"

Macros are useful things. They allow one to execute a series of commands with a single keypress. There exists a wide variety of hardware and software solutions to create and use macros to improve your workflow, and now [Evan] has brought the open-source ManyKey into the fray, along with a build tutorial to boot.

The tutorial acts as a great introduction to ManyKey, as [Evan] walks through the construction of a macro keyboard designed to be operated by the feet. Based around the Arduino Leonardo and using off-the-shelf footswitches commonly used in guitar effects, its accessible while still hinting at the flexibility of the system. Macros are programmed into the keyboard through a Python app which communicates over serial, and configurations are saved into the Arduinos onboard EEPROM. The ManyKey source is naturally available over at GitHub.

[Evan] tells us he uses his setup to run DJ software with his feet while his hands are busy on the turntables. That said, theres all manner of other applications this could be used for. Efficiency is everything, and we love to see keyboard projects that aim to improve workflow with new ideas and custom builds this shortcut keyboard makes a great example.



Dark Caracal: Good News and Bad News "IndyWatch Feed Tech"

Yesterday, EFF and Lookout announced a new report, Dark Caracal, that uncovers a new, global malware espionage campaign. One aspect of that campaign was the use of malicious, fake apps to impersonate legitimate popular apps like Signal and WhatsApp. Some readers had questions about what this means for them. This blog post is here to answer those questions and dive further into the Dark Caracal report.

First, the good news: Dark Caracal does not mean that Signal or WhatsApp themselves are compromised in any way. It only means that attackers found new, insidious ways to create and distribute fake Android versions of them. (iOS is not affected.) If you downloaded your apps from Googles official app store, Google Play, then you are almost certainly in the clear. The threat uncovered in the Dark Caracal report referred to trojanized apps, which are fake apps that pretend to look like real, trusted ones. These malicious spoofs often ask for excessive permissions and carry malware. Such spoofed versions of Signal and WhatsApp were involved in the Dark Caracal campaign.

The malicious actors behind Dark Caracal got these fake, malicious apps onto peoples phones by spearphishing. Several types of phishing emails directed peopleincluding military personnel, activists, journalists, and lawyersto go to a fake app store-like page, where fake Android apps waited. There is even evidence that, in some cases, Dark Caracal used physical access to peoples phones to install the fake apps. Again, if you downloaded your apps from the official app store, you can rest easy that this has likely not affected you.

And now the bad news: Dark Caracal has wide-reaching implications for how state-sponsored surveillance and malware works. Most people do not have to worry about this very specific threat. But for the small minority of users who may be directly targeted by nation-states or other skilled, motivated adversariesand for the malware researchers who try to track those adversaries downthe Dark Caracal report uncovers a new infrastructure that makes it even harder to attribute attacks and malware campaigns to a particular nation or actor. More details are available in the report.

Dark Car...


What has the Necurs botnet been up to? "IndyWatch Feed Tech"

The Necurs botnet has been slowly growing since late 2012 and still tops the list of largest spam botnets in the world. Since then, the botnet has occasionally stopped or temporarily minimized the sending out of spam but has returned in full force. How big is the Necurs botnet? Its difficult to say precisely, but the latest information provided by the Cisco Talos team can give a general idea. The researchers analyzed 32 distinct spam More


Kroah-Hartman: Meltdown and Spectre Linux Kernel Status - Update "IndyWatch Feed Tech"

Here's a brief update from Greg Kroah-Hartman on the kernel's handling of the Meltdown and Spectre vulnerabilities. "This shows that my kernel is properly mitigating the Meltdown problem by implementing PTI (Page Table Isolation), and that my system is still vulnerable to the Spectre variant 1, but is trying really hard to resolve the variant 2, but is not quite there (because I did not build my kernel with a compiler to properly support the retpoline feature)."


E-Skin Lets You Manipulate Objects in Real and Virtual Worlds "IndyWatch Feed Tech"

Researchers integrate magnetoelectronic sensors into electronic skin that tracks motion Illustration: Helmholtz-Zentrum Dresden-Rossendorf/AAAS

When it comes to virtual reality systems, sensors that fit like a glove arent good enough anymore. Now, we want such sensors to fit more like skin. Thats what researchers have accomplished in a paper published today in Science Advances.

Denys Makarov at Helmholtz-Zentrum Dresden-Rossendorf, in Germany, and his colleagues, have engineered a magnetosensitive electronic skin, or e-skin, with directional perception. The device can track the  subtle motions of the human hand, and is so thin and flexible that is tangibly imperceptible.

The e-skin could be a substitute for  the bulky, often motion-restraining gloves of virtual reality environments, the researchers say. It could also enable a user to interact, using mere gestures, with everyday objects in the physical world and in augmented reality applications. 

Makarov and his PhD student Gilbert Santiago Can Bermdez say that in addition to gaming, they envision applying the technology to software design, business, physical therapy and security.

Imagine that you want to press a button that is located in a restricted environment that you cant touch. You would have to use some touchless means of interacting with this button, says Makarov. A combination of magnetic field sensors and permanent magnets can do this job. 

When placed on a users hand, the e-skin tracks its position and turning motion in relation to the angle of an external magnetic field. The information is sent to a computer where the motions are digitally reconstructed and translated into a function or command.

The team demonstrated the e-skins capability by having a user dim an image on a computer screen and type keyboard characters, all without touching anything. In the light dimming demo, a plastic ring with a permanent magnet in the middle represents a dial for dimming a light bulb. The user places a sensor on her palm, holds her hand above the dial, and rotates her hand as if she were turning thea knob, but without touching it. A computer connected to the sensor translates that information, and dims a light source image on a screen. 

In the virtual keypad demonstration, the sensor is placed on a wristband and a tiny magnet is placed on the fingertip of the opposite hand. The user can choose on...


FCC plans to stay open for a week in the event of a shutdown "IndyWatch Feed Tech"

The Federal Communications Commission (FCC) said Friday it plans to stay open for a week if the government shuts down at the end of the day.In the event of a partial government shutdown, because of available funding, the Federal Communications...


The Fall of Uber CEO Travis Kalanick "IndyWatch Feed Tech"

The Fall of Travis Kalanick Was a Lot Weirder and Darker Than You Thought

A year ago, before the investor lawsuits and the federal investigations, before the mass resignations, and before the connotation of the word "Uber" shifted from "world's most valuable startup" to "world's most dysfunctional," Uber's executives sat around a hotel conference room table in San Francisco, trying to convince their chief executive officer, Travis Kalanick, that the company had a major problem: him.

[...] [A] top executive excused herself to answer a phone call. A minute later, she reappeared and asked Kalanick to step into the hallway. Another executive joined them. They hunched over a laptop to watch a video that had just been posted online by Bloomberg News: grainy, black-and-white dashcam footage of Kalanick in the back seat of an UberBlack on Super Bowl weekend, heatedly arguing over fares with a driver named Fawzi Kamel. "Some people don't like to take responsibility for their own shit!" Kalanick can be heard yelling at Kamel. "They blame everything in their life on somebody else!"

As the clip ended, the three stood in stunned silence. Kalanick seemed to understand that his behavior required some form of contrition. According to a person who was there, he literally got down on his hands and knees and began squirming on the floor. "This is bad," he muttered. "I'm terrible." Then, contrition period over, he got up, called a board member, demanded a new PR strategy, and embarked on a yearlong starring role as the villain who gets his comeuppance in the most gripping startup drama since the dot-com bubble. It's a story that, until now, has never been fully told.

The article discusses a number of Uber and Kalanick scandals/events, including:

  • The #DeleteUber movement following Uber being accused of breaking up an airport taxi strike (which was in protest of President Trump's executive order restricting travel from Muslim countries), as well as Kalanick's decision to join President Trump's business advisory council (and later leave it).
  • Susan Fowler's blog post recounting...


Linking Is Not Copyright Infringement, Boing Boing Tells Court "IndyWatch Feed Tech"

Late last year Playboy sued the popular blog Boing Boing for publishing an article that linked to an archive of every playmate centerfold till then.

Kind of amazing to see how our standards of hotness, and the art of commercial erotic photography, have changed over time, Boing Boings Xena Jardin commented.

Playboy, instead, was amazed that infringing copies of their work were being shared in public. While Boing Boing didnt upload or store the images in question, the publisher took the case to court.

The blogs parent company Happy Mutants was accused of various counts of copyright infringement, with Playboy claiming that it exploited their playmates images for commercial purposes.

Boing Boing sees things differently. With help from the Electronic Frontier Foundation, it has filed a motion to dismiss the case, arguing that hyperlinking is not copyright infringement.

This lawsuit is frankly mystifying. Playboys theory of liability seems to be that it is illegal to link to material posted by others on the web an act performed daily by hundreds of millions of users of Facebook and Twitter, and by journalists like the ones in Playboys crosshairs here, they write.

The article in question

The defense points out that Playboys complaint fails to state a claim for direct or contributory copyright infringement. In addition, it argues that this type of reporting should be seen as fair use.

Boing Boings reporting and commenting on the Playboy photos is protected by copyrights fair use doctrine, EFF Senior Staff Attorney Daniel Nazer says, commenting on the case.

Were asking the court to dismiss this deeply flawed lawsuit. Journalists, scientists, researchers, and everyday people on the web have the right to link to material, even copyrighted material, without having to worry about getting sued.

The lawsuit shares a lot of similarities with the case between Dutch blog GeenStijl and local Playboy publisher Sanoma. That high-profile case went all the way to the European Court of Justice.

The highest European court eventually decided that hyperlinks to infringing works are to be considered a communication to the public,...


Space Escape: Flying A Chair To Lunar Orbit "IndyWatch Feed Tech"

In the coming decades, mankind will walk on the moon once again. Right now, plans are being formulated for space stations orbiting around Lagrange points, surveys of lava tubes are being conducted, and slowly but surely plans are being formed to build the hardware that will become a small scientific outpost on our closest celestial neighbor.

This has all happened before, of course. In the early days of the Apollo program, there were plans to launch two Saturn V rockets for every moon landing, one topped with a command module and three astronauts, the other one containing an unmanned LM Truck. This second vehicle would land on the moon with all the supplies and shelter for a 14-day mission. There would be a pressurized lunar rover weighing thousands of pounds. This wouldnt exactly be a Lunar colony, instead, it would be more like a small cabin in the Arctic used as a scientific outpost. Astronauts and scientists would land, spend two weeks researching and exploring, and return to Earth with hundreds of pounds of samples.

With this, as with all Apollo landings, came a risk. What would happen if the ascent engine didnt light? Apart from a beautiful speech written by William Safire, there was nothing concrete for astronauts consigned to the deepest of the deep. Later in the Apollo program, there was a plan for real hardware to bring stranded astronauts home. This was the Lunar Escape System (LESS), basically two chairs mounted to a rocket engine.

While the LESS was never built, several studies were completed in late 1970 by North American Rockwell detailing the hardware that would return two astronauts from the surface of the moon. It involved siphoning fuel from a stricken Lunar Module, flying to orbit with no computer or really any instrumentation at all, and performing a rendezvous with an orbiting Command Module in less than one Lunar orbit.

A 370 Pound Plan B...


CFTC files charges in two cryptocurrency fraud cases "IndyWatch Feed Tech"

The Commodity Futures Trading Commission (CFTC) filed charges against two companies for fraud involving the sale of and advice on cryptocurrency investments, the agency said Friday.The CFTC charged Dillon Michael Dean and his company, The...


Researchers uncover mobile, PC surveillance platform tied to different nation-state actors "IndyWatch Feed Tech"

The Electronic Frontier Foundation (EFF) and mobile security company Lookout have uncovered a new malware espionage campaign that has targeted activists, journalists, lawyers, military personnel, and enterprises in more than 20 countries in North America, Europe, the Middle East, and Asia. They have dubbed the threat Dark Caracal, and have traced its activities to as far back as 2012. The malware used by Dark Caracal The attackers went after information stored on targets Android devices More


OnePlus confirms up to 40,000 customers affected by Credit Card Breach "IndyWatch Feed Tech"

OnePlus has finally confirmed that its online payment system was breached, following several complaints of fraudulent credit card transactions from its customers who made purchases on the company's official website. In a statement released today, Chinese smartphone manufacturer admitted that credit card information belonging to up to 40,000 customers was stolen by an unknown hacker between


Zach Aysan, author of "Terrorists Could Use Teslas to Kill Us", joins our Cybercrime/Malcode Board. "IndyWatch Feed Tech"

Zach Aysan, author of "Terrorists Could Use Teslas to Kill Us", joins our Cybercrime/Malcode Board.


Pelosi pushes for House vote on preserving net neutrality "IndyWatch Feed Tech"

House Minority Leader Nancy Pelosi (D-Calif.) is pushing for a floor vote on a bill that would stop the Federal Communications Commission (FCC) from repealing net neutrality.Decembers radical FCC vote to dismantle net neutrality has endangered the...


New Sound Drivers Coming In Linux 4.16 Kernel "IndyWatch Feed Tech"

Due to longtime SUSE developer Takashi Iwai going on holiday the next few weeks, he has already sent in the sound driver feature updates targeting the upcoming Linux 4.16 kernel cycle...


K2-138: Multi-Planet System via Crowdsourcing "IndyWatch Feed Tech"

As Centauri Dreams readers know, I always keep an eye on the K2 mission, the rejuvenated Kepler effort to find exoplanets with a spacecraft that had originally examined 145,000 stars in Cygnus and Lyra. Now working with different fields of view, K2 has examined a surprisingly large number of stars, some 287,309, according to this Caltech news release. Digging around a bit, I discovered that each 80-day campaign brings in data on anywhere from 13,000 to 28,000 targets, all released to the public within three months of the end of the campaign. In the paper well discuss today, this influx is referred to as a deluge of data.

Our datasets just continue to grow in a time of exploration that seems unprecedented in scientific history. Ive heard it compared to the explosion in knowledge of microorganisms after their detection by van Leeuwenhoek in the 17th Century, though of course it also conjures up thoughts of early exploratory voyages as humans pushed into hitherto unknown terrain. But given that we are finding exoplanets in huge variety and by the thousands, this era surely has an edge because of the speed with which it is happening and its related search for life.

No wonder that public interest is high, and its gratifying to see projects like Exoplanet Explorers available (through the Zooniverse site) to serve as a platform for crowdsourced research. Exoplanet Explorers sifts through K2 data to look for transiting planets, with calibrated data files up through Campaign 14 (C14) and the uncalibrated data from Campaign 15 now available. The project, which went online for the first time last April, has already snagged, among other things, a highly interesting multi-planet system dubbed K2-138, and in a highly visible way.

Image: Artists visualization of the K2-138 system, the first multi-planet system discovered by citizen scientists. The central star is slightly smaller and cooler than our sun. The five known planets are all between the size of Earth and Neptune; planet b may potentially be rocky, but planets c, d, e, and f likely contain large amounts of ice and gas. All five planets have orbital periods shorter than 13 days and all are incredibly hot, ranging from 425 to 980 degrees Celsius. Credit: NASA/JPL-Caltech/R. Hurt (IPAC).

Potential transit signals can be spotted by computers using signal-processing algorithms, but detections can be iffy. Many features tha...


Scientists Zoom in to Watch DNA Code Being Read "IndyWatch Feed Tech"

The mechanism for reading DNA and decoding it to build proteins for their needs is common to all animals and plants, and is often hijacked by cancer.

Researchers used an advanced form of electron microscopy called Cryo-EM, for which the Nobel Prize in Chemistry was awarded in 2017, to zoom in and capture images of the reading mechanism in unprecedented detail.

The discovery of exactly how the molecular mechanism works -- published in the journal Nature -- could open up new approaches to cancer treatment.

Scientists at The Institute of Cancer Research, London, captured images of molecular machinery called RNA Polymerase III in the act of transcribing a gene in exquisite and unprecedented detail.

[...] Cryo-EM is so powerful that it can take pictures of tiny molecules -- approximately 5 nanometers or 20000th of the width of a human hair -- at almost an atomic level.

It allowed researchers to see for the first time how components of the RNA polymerase III complex and accessory molecules interact and communicate with each other, suggesting how drugs might be employed to split the complex up.

The new study captured the molecular machinery in the act of binding to DNA, separating the two strands and getting ready to transcribe the DNA code.


Original Submission

Read more of this story at SoylentNews.


Facebook Hacking Android Malware GhostTeam Found in 53 Play Store Apps "IndyWatch Feed Tech"

By Waqas

Another day, another Android malware targeting those who download apps

This is a post from Read the original post: Facebook Hacking Android Malware GhostTeam Found in 53 Play Store Apps


CVE-2018-1049: systemd: automount: access to automounted volumes can lock up "IndyWatch Feed Tech"

Posted by Vladis Dronov on Jan 19


In systemd prior to v234 a race exists between .mount and .automount units such
that automount requests from kernel may not be serviced by systemd resulting in
kernel holding the mountpoint and any processes that try to use said mount will
hang. A race like this may lead to denial of service, until mount points are
unmounted. This race is easily reproducible.



Make A Better, Spring-Loaded SMT Tape Strip Holder "IndyWatch Feed Tech"

Every so often, a project is worth some extra work to see if the idea can go any further. [JohnSL] has been busy doing exactly that with his spring-loaded SMT tape holder project. Having done the original with 3D printing, he has been working on designing for injection molding. This isnt a motorized feeder, its still a manual tool but it is an improvement over the usual workshop expedient method of just sticking segments of tape down to the desktop. Tape is fed into the holders from one end and spring tension holds the tape firm while a small slot allows the cover tape to be guided backward after peeling. As anyone who has used cut segments of tape to manually deal with SMT parts knows, small vibrations like those that come from peeling off the clear cover can cause the smaller components to jump around and out of their pockets, and any length of peeled cover gets awkward quickly.

The design allows for multiple holders to mount side-by-side.

In [JohnSL]s design, all SMT tapes sit at an even height regardless of size or tape thickness. A central support pushes up from the bottom with tension coming from a spring pulling sideways; the central support is forced upward by cams and presses against the bottom surface of the tape. As a result, the SM...


Wine 3.0 Development By The Numbers "IndyWatch Feed Tech"

With yesterday's successful launch of Wine 3.0 I was curious how the past year of development on Wine compared to years prior, etc. Here are some Wine development statistics...


5G New Radio and What Comes Next "IndyWatch Feed Tech"

The 3rd Generation Partnership Project has taken a big step toward future 5G networks Photo: Vadimir Prizemlin/Alamy

Wireless engineers and telecommunications executives are making more promises about the possibilities of 5G, but behind the scenes, theyre still working out what exactly 5G will look like. The 3rd Generation Partnership Project (3GPP), a global collaboration between several telecommunications organizations, has now begun to outline the extensive specifications required to build and deploy functioning 5G networks.

With a steady stream of news trickling outSouth Korea will deploy a 5G test network during the Winter Olympics, and AT&T will provide mobile 5G service in a dozen cities by the end of the yearit falls to 3GPP to deliver the technical blueprints that will make those promises a reality.

3GPP definitely felt the pressure to deliver standards in the wake of such announcements. The fear was that so many countries would want to develop 5G, they would develop regional standards, says Balazs Bertenyi, the chairman of 3GPPs Radio Access Network Technical Specifications Groups. That would be two steps back. Countries including Korea and Japanand companies like Verizonare so eager to bring 5G to market that the 3GPP work groups accelerated their plan and brought their first specifications to the world in December.

The first set, completed just days before Christmas, outlines the specifications for building non-standalone versions of 5G New Radio (NR). NR is the backbone wireless standard for 5G, in the same way LTE is for 4G. As 5G service is rolled out by countries and companies, NR will first build upon todays LTE networks, expanding and improving existing coverage. The primary goal is to enable enhanced mobile broadband by using 5G small cells to boost the data rates of an LTE anchor.

This was an important first step for 3GPP, says Bertenyi, because manufacturers will want to dip into 5G by initially selling technologies that rely on existing LTE networks. Then, everyone including chipmakers and small cell developers can begin building their physical components while 3GPP sorts out the software specifications and,...


[$] Deadline scheduler part 2 details and usage "IndyWatch Feed Tech"

Linuxs deadline scheduler is a global early deadline first scheduler for sporadic tasks with constrained deadlines. These terms were defined in the first part of this series. In this installment, the details of the Linux deadline scheduler and how it can be used will be examined.


Come and Get the Best Blu-ray/DVD Decryption Tool for Free "IndyWatch Feed Tech"

Blu-ray has been famous and popular for its high definition display ability and large storage capacity. However, along with science and technology advancement, playing Blu-ray discs via Blu-ray drive makes people feel troublesome and burdensome. Meanwhile, hard disks can save much more videos than discs and features exceptional damage resistance to the scratches, drops, and bumps of everyday use.

Therefore, more and more people have been looking for a way to transform the Blu-ray or DVD to other digital formats for watching and permanent preservation. But there exists a big problem, Blu-ray/DVD producers from all over the world implement encryption to the discs to prevent others from ripping. Is there a way to work it out? Of course, using Leawo Blu-ray Ripper is a good choice.

Being the best Blu-ray/DVD decryption tool, Leawo Blu-ray Ripper is good at decrypting the encrypted Blu-ray/DVD discs. Discs from all over the world and all the studios can be decrypted with one click. Apart from its strong encryption ability, the software itself is quite powerful. First of all, the input source are diverse. You can insert Blu-ray disc (BD25/BD50) or DVD disc (DVD-5/DVD9) into your CD drive. You can also select a folder (BDMV, BDAV, DVD video only) from your computer or hard disk. You can even use ISO image file. Secondly, this amazing weapon enables you to personalize Blu-ray/DVD videos before the final converting process, you are allowed to merge file, edit media, create 3D movie, adjust parameters, etc. Its really far more than you can imagine. With it, users can perform their own creativity rather than simply using a tool to cope with a bunch of data which seems kind of boring. Finally, the output format range is really wide. For video, you can output the imported material to MP4, MKV, AVI, WMV, etc. For audio, it can be extracted off into MP3, AAC, FLAC, etc. More than 180 video and audio formats are supported which means you can watch the converted BD content on Windows Media Player, QuickTime, iTunes, iOS devices, Android, Surface, Xbox, etc.

All in all, Leawo Blu-ray Ripper is really a powerful software program. Dont worry, the operation steps to decrypt Blu-ray/DVD discs are incredibly simple. Follow me to have a look at how to unlock the BD content. You can also go to to search for more detailed tutorial about how to make full use of this wonderful weapon.

Step1: First at all, you need to download and install Leawo Prof. Media from Then click the Blu-ray Ripper module.



Experts uncovered a new campaign abusing FTP servers to deliver Dridex Banking Trojan "IndyWatch Feed Tech"

Security researchers at Forcepoint have spotted a new spam campaign that is abusing compromised FTP servers as a repository for malicious documents and infecting users with the Dridex banking Trojan.

The Dridex banking Trojan is a long-running malware that has been continuously improved across the years.

The malicious email campaign was first noticed by Forcepoint on January 17, 2018, the messages were primarily sent to .com top level domains (TDLs) most of them in France, the UK, and Australia.

The sender domains used are observed to be compromised accounts. The sender names rotated around the following names, perhaps to make the emails look more convincing to unsuspecting recipients: admin@, billing@, help@, info@, mail@, no-reply@, sale@, support@, ticket@. reads the analysis published by Forcepoint.

Attackers used at least two types of weaponized documents, one of them is a Word document abusing DDE protocol for malware execution, and an XLS file with macro code that download the Dridex banking Trojan from a compromised server.

Dridex banking Trojan

According to the experts, the attackers obtained in some way the login credentials to compromise the servers used in this campaign.

The compromised servers do not appear to be running the same FTP software; as such, it seems likely that the credentials were compromised in some o...


[H]ardOCP: Hawaii Emergency Management Password Found In Press Photo "IndyWatch Feed Tech"

Submitted via IRC for TheMightyBuzzard

After a false alert about an inbound missile, Hawaii's Emergency Management Agency has said a worker clicked the wrong item in a drop-down menu and sent it, and that its system was not hacked. But Hawaii News Now is reporting an AP photo from July has resurfaced, showing the agency's operations officer in front of monitors, attached to one of them is a Post-it note with a password on it.

Just.... wow. I'm nearly at a loss for words on how big of a screw up this is. And from the response of the spokesman sounds like this was a shared password, therefore no way to link it to a specific careless employee.

Richard Rapoza, emergency management agency spokesman, confirmed that the password is authentic and was actually used for an "internal application." He said he didn't believe that application is any longer in use, but declined to say what application the password was for.


Original Submission

Read more of this story at SoylentNews.


Linux Fu: Custom Bash Command Completion "IndyWatch Feed Tech"

If you arent a Linux user and you watch someone who knows what they are doing use Bash the popular command line interpreter you might get the impression they type much faster than they actually do. Thats because experienced Linux users know that pressing the tab key will tend to complete what they are typing, so you can type just a few characters and get a much longer line of text. The feature is very smart so you may not have realized it, but it knows a good bit about what you could type. For example, if you try to unzip a file, it knows the expected file name probably has a .zip extension.

How does that happen? At first, you might think, who cares how it happens? The problem is when you write a shell script or a program that runs on Linux, the completion gets dumb. Someone has to make Bash smart about each command line program and if you are the author then that someone is you.

Anatomy of Command Completion

Turns out completion depends on a particular GNU library known as readline. It reads text for lots of different programs, including Bash and you can configure it using the .inputrc file in your home directory. For example, heres my .inputrc:

"\e[A": history-search-backward
"\e[B": history-search-forward
$if Bash
Space: magic-space
set match-hidden-files off
set completion-ignore-case on
set visible-stats on
set show-all-if-ambiguous on

That doesnt look like much, but there is a system-wide configuration at /etc/inputrc which is much more substantial. You can also issue cert...


The 5 Best Linux Distributions for Development "IndyWatch Feed Tech"

The 5 Best Linux Distributions for Development


FBI Investigating Millions Of Mishandled Dollars Funneled From Australian Govt To Clinton Foundation "IndyWatch Feed Tech"

Via: ZeroHedge: The FBI has asked retired Australian policeman-turned investigative journalist, Michael Smith, to provide information he has gathered detailing multiple allegations of the Clinton Foundation receiving tens of millions of mishandled taxpayer funds, according to LifeZette. I have been asked to provide the FBI with further and better particulars about allegations regarding improper donations []


CVE-2017-15713: Apache Hadoop MapReduce job history server vulnerability "IndyWatch Feed Tech"

Posted by Jason Lowe on Jan 19

CVE-2017-15713: Apache Hadoop MapReduce job history server vulnerability

Severity: Severe

Vendor: The Apache Software Foundation

Versions Affected:
Hadoop 0.23.0 to 0.23.11
Hadoop 2.0.0-alpha to 2.8.2
Hadoop 3.0.0-alpha to 3.0.0-beta1

Users affected: Users running the MapReduce job history server daemon

Impact: Vulnerability allows a cluster user to expose private files
owned by the user running the MapReduce job history server...


Security updates for Friday "IndyWatch Feed Tech"

Security updates have been issued by Arch Linux (bind, irssi, nrpe, perl-xml-libxml, and transmission-cli), CentOS (java-1.8.0-openjdk), Debian (awstats, libgd2, mysql-5.5, rsync, smarty3, and transmission), Fedora (keycloak-httpd-client-install and rootsh), and Red Hat (java-1.7.0-oracle and java-1.8.0-oracle).


Making offline backups of a Linux machine using Backblaze. "IndyWatch Feed Tech"

As frequent readers may or may not remember, I rebuilt my primary server last year, and in the process set up a fairly hefty RAID-5 array (24 terabytes) to store data.  As one might reasonably expect, backing all of that stuff up is fairly difficult.  I'd need to buy enough external hard drives to fit a copy of everything on there, plus extra space to store incremental backups for some length of time.  Another problem is that both Leandra and the backup drives would be in the same place at the same time, so if anything happened at the house I'd not only not have access to Leandra anymore, but there's an excellent chance that the backups would be wrecked, leaving me doubly screwed.

Here are the requirements I had for making offsite backups:

  • Backups of Leandra had to be offsite, i.e., not in the same state, ideally not on the same coast.
  • Reasonably low cost.  I ran the numbers on a couple of providers and paying a couple of hundred dollars a month to back up one server was just too expensive.
  • Linux friendly.
  • My data gets encrypted with a key only I know before it gets sent to the backup provider.
  • A number of different backup applications had to support the provider, in case one was no longer supported.
  • Easy to restore data from backup.

After a week or two of research and experimentation, as well as pinging various people to get their informed opinions, I decided to go with Backblaze as my offsite backup provider, and Duplicity as my backup software.  Here's how I went about it, as well as a few gotchas I ran into along the way.

First of all, I signed up for a personal account at Backblaze.  If you want to give them a try, here's my referral link.  Full disclosure: For every month someone pays for if they sign up using that link, I get a free month.  Just to be safe I also set up two-factor authentication on my account for additional protection (and if you don't do this often, you really should).

Next, I installed Duplicity from the Arch Linux package repository:

drwho@leandra:(9) ~$ sudo pacman -S duplicity

I also had to install the Backblaze B2 package from the AUR to enable B2 support.  I used...


Re: How to deal with reporters who don't want their bugs fixed? "IndyWatch Feed Tech"

Posted by Igor Seletskiy on Jan 19

Hi Greg,

I am sure you are right, as you were in the epicenter of it and saw things
happening. More than that -- I am really thankful to a group of people who
worked on fixing it for months to get us where we are. Don't get me wrong -
in no way, I am blaming anyone.

Yet, KAISER patch & especially patch from AMD to the mailing list created a
lot of rumors, that I believe forced earlier disclosure -- because things
got into...


This Week in Open Source News: Barcelona Chooses Linux, Open Source 3D Printing Majorly Cuts Costs & More "IndyWatch Feed Tech"

This Week in Open Source News: Barcelona Chooses Linux, Open Source 3D Printing Majorly Cuts Costs & More


Infosec expert viewpoint: Google Play malware "IndyWatch Feed Tech"

Researchers routinely discover a variety of malicious apps on Google Play, some of which have been downloaded and installed on millions of devices worldwide. Heres what infosec experts think about the security of Google Play, what they think Google should do better, and what users can do in order to protect themselves from malicious apps on the official Android app store. Chris Boyd, Lead Malware Intelligence Analyst, Malwarebytes Google Play continues to have issues where More


Hollywood Asks New UK Culture Secretary To Fight Online Piracy "IndyWatch Feed Tech"

Following Prime Minister Theresa Mays cabinet reshuffle earlier this month, Matt Hancock replaced Karen Bradley as Secretary of State for Digital, Culture, Media and Sport.

Hancock, the 39-year-old MP for West Suffolk, was promoted from his role as Minister for Digital and Culture, a position hed held since July 2016.

Thrilled to become DCMS Secretary. Such an exciting agenda, so much to do, and great people. Cant wait to get stuck in, he tweeted.

Of course, the influence held by the Culture Secretary means that the entertainment industries will soon come calling, seeking help and support in a number of vital areas. No surprise then that Stan McCoy, president and managing director at the Motion Picture Associations EMEA division, has just jumped in with some advice for Hancock.

In an open letter published on Screen Daily, McCoy begins by reminding Hancock that the movie industry contributes considerable sums to the UK economy.

We are one of the countrys most valuable economic and cultural assets worth almost 92bn, growing at twice the rate of the economy, and making a positive contribution to the UKs balance of payments, McCoy writes.

Britains status as a center of excellence for the audiovisual sector in particular is no accident: It results from the hard work and genius of our creative workforce, complemented by the support of governments that have guided their policies toward enabling continued excellence and growth.

McCoy goes on to put anti-piracy initiatives at the very top of his wishlist and Hancocks to-do list.

A joined-up strategy to curb proliferation of illegal, often age-inappropriate and malware-laden content online must include addressing the websites, environments and apps that host and facilitate piracy, McCoy says.

In addition to hurting one of Britains most important industries, they are overwhelmingly likely to harm children and adult consumers through nasty ads, links to adult content with no age verification, scams, fraud and other unpleasantness.

That McCoy begins with the piracy is dangerous approach is definitely not a surprise. This Hollywood and wider video industry strategy is now an open secret. However, it fe...


AMD Secure Encrypted Virtualization Is Ready To Roll With Linux 4.16 "IndyWatch Feed Tech"

With the Linux 4.16 kernel cycle that is expected to begin immediately following the Linux 4.15 kernel debut on Sunday, AMD's Secure Encrypted Virtualization (SEV) technology supported by their new EPYC processors will be mainline...


Its Time for Electric Companies to Pivot "IndyWatch Feed Tech"

U.S. demand for electricity has slumped; utilities should shift their focus to renewables and efficiency consulting Illustration: iStockphoto

Renewable energy is rapidly changing the electric grid, and utilities need to adapt or face still greater disruption in their industry, according to a new report. Two directions now appear likely to offer opportunities for growth, the report says.

One is to move toward electric infrastructure as a platform for new applications that other companies can develop, such as renewable energy storage. The other direction is for the utility itself to expand into new growth areas like electric vehicle charging stations.

Either way, says report co-author Dan Cross-Call of the Rocky Mountain Institute, utilities that sit back and continue with business as usual could fall behind. Traditional utility growth models, he says, are not future-proof. Demand for electricity has become flat or declining in many places, he says. So the historical expectation that sales increase is no longer the case.

Cross-Call says renewables such as solar photovoltaicswhose explosive growth has put it 40 years ahead of the U.S. Energy Information Administrations forecasts from earlier this centurycontinue to eat into the old centrally-generated electric utility business model. Meanwhile, the efficiencies of LED lighting and other improvements have reduced demand for electricity in the U.S. compared to the age of the incandescent bulb.

The good news for utilities, he says, is a number of innovative players have already shown the way. For instance, Cross-Call lauds the Vermont utility Green Mountain Power (which IEEE Spectrum profiled in 2014) as one of the most innovative utilities in the U.S. He says Green Mountain represents a hybrid approach, offering both platform development and some expanded offerings as well.

On the latter front, for instance, Green Mountain Power offers home energy audits and efficiency consulting as part of its services. And as a platform developer, theyve partnered with Tesla to...


Re: How to deal with reporters who don't want their bugs fixed? "IndyWatch Feed Tech"

Posted by Greg KH on Jan 19

Meltdown was not semi-public, it was private and siloed and a whole
bunch of other horrible things. If it were semi-public, we would have
had it fixed sooner :)

And yes, a number of us involved are probably going to be writing up a
post-mortum of that whole horrid affair, feel free to let me know if
anyone wants to help out with it. I think it's a great example of what
not to ever do in the future...


greg k-h


New infosec products of the week: January 19, 2018 "IndyWatch Feed Tech"

Continuous vulnerability management for ICS cybersecurity PAS Cyber Integrity 6.0 now includes continuous vulnerability management providing visibility into vulnerability risk within industrial process control networks. Cyber Integrity moves beyond traditional IT vulnerability management by also addressing the proprietary industrial control systems that comprise 80 percent of a facility environment. BlackBerry releases cloud-based static binary code scanning solution BlackBerry Jarvis is a cloud-based static binary code scanning solution that identifies vulnerabilities in software used in automobiles. More


The Gravity of Kubernetes "IndyWatch Feed Tech"

Most new internet businesses started in the foreseeable future will leverage Kubernetes (whether they realize it or not). Many old applications are migrating to Kubernetes too.

Before Kubernetes, there was no standardization around a specific distributed systems platform. Just like Linux became the standard server-side operating system for a single node, Kubernetes has become the standard way to orchestrate all of the nodes in your application.


State-Sponsored Malware Campaign Hits Users Across 21 Countries "IndyWatch Feed Tech"

By Waqas

Spyware and malware campaigns are on a rise currently. In

This is a post from Read the original post: State-Sponsored Malware Campaign Hits Users Across 21 Countries


What Impact Has Meltdown/Spectre Had on YOUR Systems? "IndyWatch Feed Tech"

SoylentNews first reported the vulnerabilities on January 3. Since then, we have had a few stories addressing different reports about these vulnerabilities. Now that it is over two weeks later and we are *still* dealing with reboots, I am curious as to what our community's experience has been.

What steps have you taken, if any, to deal with these reports? Be utterly proactive and install every next thing that comes along? Do a constrained roll out to test a system or two before pushing out to other systems? Wait for the dust to settle before taking any steps?

What providers (system/os/motherboard/chip) have been especially helpful... or non-helpful? How has their response affected your view of that company?

What resources have you been using to check on the status of fixes for your systems? Have you found a site that stands above the others in timeliness and accuracy?

How has this affected your purchasing plans... and your expectations on what you could get for selling your old system? Are you now holding off on purchasing something new?

Original Submission

Read more of this story at SoylentNews.


Re: How to deal with reporters who don't want their bugs fixed? "IndyWatch Feed Tech"

Posted by i on Jan 19

We have seen "semi-public" with Meltdown -- I think it was dreadful. I
would prefer private to "semi-public" any day.


Blockchain Technology: From Davos to Daily Life, Its Impact is Here "IndyWatch Feed Tech"

Headlines frequently herald how blockchain technology will revolutionize financial services markets, but blockchain will also have a transformative impact on everything from the food industry to healthcare. While some companies are looking at blockchains future impact, the technology is changing our world right now.


chaiOS Bug can crash iMessage App on any iPhone and macOS with a simple link "IndyWatch Feed Tech"

The software developer Abraham Masri has discovered a new bug, dubbed chaiOS that could be exploited to crash a targets iMessage application.

The researcher and software developer Abraham Masri has discovered a new bug, dubbed chaiOS  Text Bomb that could be exploited to crash recipients iMessage application in a continuous loop.

The flaw exploited by the chaiOS  Text Bomb affects both iOS and macOS, according to researchers at Yalu Jailbreak, the bug is currently compatible up till iOS 11.1.2 firmware, this means that it affects iMessage apps on macOS High Sierra, iOS 10 to 10.3.3, and iOS 11 to 11.2.1.

The exploitation of the issue is very simple, an attacker just needs to send a link to a web page hosting a JavaScript code that attempts to send an SMS message. The iMessage application fails to properly handle the code triggering the crash of the app. In some cases, it has been observed that the iMessage app enters a continuous reboot loop.

A proof-of-concept page has been put together by Masri and shared on Twitter yesterday, but the page has been removed from GitHub due to potential abuses, anyway, a new mirror has been already added.

chaiOS is a malicious iOS bug that can cause the target device to freeze, respring, drain the battery, and possibly kernel panic. It is developed by the eminent jailbreak developer, Abraham Masri.

Here are the known after-effects once someone opens the malicious link.

  • The stock Messages app goes completely blank.
  • Messages app...


IT infrastructure spending for cloud environments to reach $46.5 billion in 2017 "IndyWatch Feed Tech"

Total spending on IT infrastructure products (server, enterprise storage, and Ethernet switches) for deployment in cloud environments is expected to total $46.5 billion in 2017 with year-over-year growth of 20.9%, according to a new forecast from IDC. Public cloud datacenters will account for the majority of this spending, 65.3%, growing at the fastest annual rate of 26.2%. Off-premises private cloud environments will represent 13% of cloud IT infrastructure spending, growing at 12.7% year over year. More


Experimental KPTI Support For x86 32-bit Linux "IndyWatch Feed Tech"

For the Kernel Page Table Isolation (KPTI) support currently within the Linux kernel for addressing the Meltdown CPU vulnerability it's currently limited to 64-bit on the x86 side, but for the unfortunate souls still running x86 32-bit operating systems, SUSE is working on such support...


Long-Range RFID Leaflets "IndyWatch Feed Tech"

Pick a card, any card. [Andrew Quitmeyer] and [Madeline Schwartzman] make sure that any card you pick will match their NYC art installation. Replantment is an interactive art installation which invites guests to view full-size leaf molds casts from around the world.

A receipt file with leaf images is kept out of range in this art installation. When a viewer selects one, and carries it to the viewing area, an RFID reader tells an Arduino which tag has been detected. Solid-state relays control two recycled clothing conveyors draped with clear curtains. The simple units used to be back-and-forth control but through dead-reckoning, they can present any leaf mold cast front-and-center.

Clothing conveyors from the last century werent this smart before, and it begs the question about inventory automation in small businesses or businesses with limited space.

We havent seen much long-range RFID, probably because of cost. Ordinary tags have been read at a distance with this portable reader though, and NFC has been transmitted across a room, sort of.


CVE-2017-15105 Unbound: NSEC processing vulnerability (DNSSEC) "IndyWatch Feed Tech"

Posted by Ralph Dolmans on Jan 19


Below is a copy of Unbound's CVE description that can be found at



The CVE number for this vulnerability is CVE-2017-15105.

== Summary
We discovered a vulnerability in the processing of wildcard synthesized
NSEC records. While synthesis of NSEC records is allowed by RFC4592,
these synthesized owner names should not be used in the NSEC processing.
This does, however,...


Re: How to deal with reporters who don't want their bugs fixed? "IndyWatch Feed Tech"

Posted by Nicholas Luedtke on Jan 19

In my extremely humble opinion, a patched "semi-public" issue is better
than a unpatched private issue that is known to unknown number of people
with unknown intentions.


Apologies for sending this off list Alexander.


AMDGPU Firmware Blobs Updated For Video Encode/Decode "IndyWatch Feed Tech"

There are updated AMDGPU microcode/firmware files now available for recent Radeon GPUs...


First Impressions: Asus Tinkerboard and Docker "IndyWatch Feed Tech"

I've spent many hours playing with both 32-bit and 64-bit ARM System-on-Chip (SoC) boards, so you may be wondering why I ordered another - the Asus Tinkerboard. Well here are my first impressions with the board as I try to get Docker and Kubernetes up and running.


The Asus Tinkerboard looks like a Raspberry Pi and has a similar form-factor, but it's a much more powerful board than the Raspberry Pi with double the RAM and potentially 10x more Ethernet bandwidth available. You also get a heat-sink included and a warning that the board can run quite hot.


AI is continuing its assault on radiologists "IndyWatch Feed Tech"

A new model can detect abnormalities in x-rays better than radiologistsin some parts of the body, anyway.

The results: Stanford researchers trained a convolutional neural network on a data set of 40,895 images from 14,982 studies. The paper documents how the algorithm detected abnormalities (like fractures, or bone degeneration) better than radiologists in finger and wrist radiographs. However, radiologists were still better at spotting issues in elbows, forearms, hands, upper arms, and shoulders.

The background: Radiologists keep getting put up against AI, and they usually dont fare even as well as this. Geoffrey Hinton, a prominent AI researcher, told the New Yorker that advances in AI mean that medical schools should stop training radiologists now.


Is aging natural or a pathological disease that we can treat? "IndyWatch Feed Tech"

Treating the diseases of ageing requires rethinking of our approach to treating disease. Rather than a whack-a-mole strategy going after individual conditions, a concerted medical effort against ageing as a whole is in order.

Aging is something that we all share, rich or poor; it is something that happens to us all, and we are taught from a young age that it is inevitable. However, some scientists believe that aging is amenable to medical intervention and that such interventions could be the solution to preventing or reversing age-related diseases.

Academics are currently debating whether aging is natural or a pathological disease that we can treat.

In fact, there is now pressure from many academics to classify aging itself as a disease; indeed, doing so could potentially improve funding for aging research and help to speed up progress in finding solutions to age-related diseases.[1] The debate continues, but does it really matter if aging is classified as a disease, or is it largely a matter of semantics?


Upcoming Free Webinars From The Linux Foundation "IndyWatch Feed Tech"

Upcoming Free Webinars From The Linux Foundation


Health South East RHF data breach exposed health records for half of Norways Population "IndyWatch Feed Tech"

On January 8, the Health South East RHF, that is the healthcare organization that manages hospitals in Norways southeast region disclosed a major security breach.

On January 8, the Health South East RHF, that is the healthcare organization that manages hospitals in Norways southeast region (countries of stfold, Akershus, Oslo, Hedmark, Oppland, Buskerud, Vestfold, Telemark, Aust-Agder and Vest-Agder), disclosed a security breach that may have exposed sensitive data belonging to more than half of the population.

The incident was announced by the national healthcare security centre HelseCERT that detected an abnormal activity against computer systems in the region. HelseCERT notified the incident to local authorities as well as NorCERT.

We are in a phase where we try to get an overview. Its far too early to say how big the attack is. We are working to acquire knowledge of all aspects, Kjetil Nilsen, director of NorCERT, the National Security Authority (NSM) told Norwegian media outlet VG.

Everything indicates that it is an advanced player who has the tools and ability to perform such an attack. It can be advanced criminals. There is a wide range of possibilities,

According to the HelseCert, the security breach is the result of an attack conducted by advanced and professional hackers.

Authorities announced important measures to limit the damage caused by the security breach.

A number of measures have been implemented to remove the threat, and further measures will be implemented in the future, announced Norways Ministry of Health and Care in a statement.

This is a serious situation and measures have been taken to limit the damage caused by the incident, reads a joint statement published by Health South East RHF and Sykehuspartner HF

The hospitals in the region currently serve 2.9 million inhabitants, that correspond to 56 percent of the overall population composed of 5.2 million citizens....


American Pay May be Low Because There Are Too Few Employers "IndyWatch Feed Tech"

Found this interesting, you may too.

A new research paper that may help unlock the mystery of why Americans can't seem to get a decent raise. Economists have struggled over that question for years now, as wage growth has stagnated and more of the nation's income has shifted from the pockets of workers into the bank accounts of business owners. Since 1979, inflation-adjusted hourly pay is up just 3.41 percent for the middle 20 percent of Americans while labor's overall share of national income has declined sharply since the early 2000s. There are lots of possible explanations for why this is, from long-term factors like the rise of automation and decline of organized labor, to short-term ones, such as the lingering weakness in the job market left over from the great recession. But a recent study by a group of labor economists introduces an interesting theory into the mix: Workers' pay may be lagging because the U.S. is suffering from a shortage of employers.

[...] argues that, across different cities and different fields, hiring is concentrated among a relatively small number of businesses, which may have given managers the ability to keep wages lower than if there were more companies vying for talent. This is not the same as saying there are simply too many job hunters chasing too few openingsthe paper, which is still in an early draft form, is designed to rule out that possibility. Instead, its authors argue that the labor market may be plagued by what economists call a monopsony problem, where a lack of competition among employers gives businesses outsize power over workers, including the ability to tamp down on pay. If the researchers are right, it could have important implications for how we think about antitrust, unions, and the minimum wage.

Read more of this story at SoylentNews.


Theres a new sex robot in town: Say hello to Solana "IndyWatch Feed Tech"

Still looks kind of cartoony. But, i would really like to see a head like this put on the body of the ATLAS robot, just to see where we are at with the best android we could possibly make right now. Oh, and put clothes on it, have it walk down the street. The next Turing test will be can it dupe people into thinking it is a person, in person.


This USB Drive Will Self-Destruct After Ruining Your Computer "IndyWatch Feed Tech"

Who would have thought that you could light up pyrotechnics on USB power? This USB keystroke injector that blows up after its used proves the concept.

Fully aware that this is one of those just because you can doesnt mean you should projects, [MG] takes pains to point out that his danger dongle is just for dramatic effect, like a prop for a movie or the stage. In fact, he purposely withholds details on the pyrotechnics and concentrates on the keystroke injection aspect, potentially nasty enough by itself, as well as the dongles universal payload launching features. Were a little bummed, because the confetti explosion (spoiler!) was pretty neat.

The device is just an ATtiny85 and a few passives stuffed into an old USB drive shell, along with a MOSFET to trigger the payload. If you eschew the explosives, the payload could be anything that will fit in the case. [MG] suggests that if you want to prank someone, an obnoxious siren might be a better way to teach your mark a lesson about plugging in strange USB drives.

While this isnt the most dangerous thing you can do with a USB port, it could be right up there with that rash of USB killer dongles from a year or so ago. All of these devices are fun what ifs, but using them on anything but your own computers is not cool and possibly dangerous. Watching the smoke pour out of a USB socket definitely drives home the point that you shouldnt plug in that thumbdrive that you found in the bathroom at work, though.

[Yuu], thanks for the tip.


Strong Incident Response Starts with Careful Preparation "IndyWatch Feed Tech"

Through working every day with organizations incident response (IR) teams, I am confronted with the entire spectrum of operational maturity. However, even in the companies with robust IR functions, the rapidly evolving threat landscape, constantly changing best practices, and surplus of available tools make it easy to overlook important steps during planning. As a result, by the time an incident occurs, its too late to improve their foundational procedures. 


Wealthy Exodus to Escape New Tax Rules Worries California Democrats "IndyWatch Feed Tech"

Via: Sacramento Bee: The states wealthiest 1 percent, for instance, pay 48 percent of its income tax, and the departure of just a few families could lead to a noticeable hit to state general fund revenue. It is a genuine concern and thats why the legislatures in high-tax states are swinging into action immediately, said []


Why Some African Americans Are Moving to Africa "IndyWatch Feed Tech"

Via: Al Jazeera: You might not have electricity, but you wont get killed by the police either. I think more will come when they begin to see it as a viable alternative. But its not easy and its not cheap. I cant say whats happening in America today is any worse than whats been []


openSUSE Tumbleweed Rolls To Mesa 17.3, Linux 4.14.13 "IndyWatch Feed Tech"

OpenSUSE has continued rolling in the new year with several key package updates in January...


AMDGPU DC Gets More Raven Ridge Improvements, Audio Fixes "IndyWatch Feed Tech"

Harry Wentland of AMD has sent out the latest batch of patches for the AMDGPU DC display code stack. Fortunately it lightens up the DRM driver by about six thousand lines thanks to removing some unused code...


Researchers Uncover Government-Sponsored Mobile Hacking Group Operating Since 2012 "IndyWatch Feed Tech"

A global mobile espionage campaign collecting a trove of sensitive personal information from victims since at least 2012 has accidentally revealed itselfthanks to an exposed server on the open internet. It's one of the first known examples of a successful large-scale hacking operation of mobile phones rather than computers. The advanced persistent threat (APT) group, dubbed Dark Caracal,


R600g "Soft" FP64 Shows Signs Of Life, Enabling Older GPUs To Have OpenGL 4 In 2018 "IndyWatch Feed Tech"

Most pre-GCN AMD graphics cards are still limited to OpenGL 3.3 support at this time due to not supporting FP64. Only the HD 5800/6900 series on R600g currently have real double-precision floating-point support working right now so at present they are on OpenGL 4.3 rather than 3.3, but those other generations may be catching up soon thanks to the "soft" FP64 code...


Volumetric Photogrammetry Big Words, Bigger Impact on VR "IndyWatch Feed Tech"

Although VR is still in its infancy, "traditional" methods of capturing and transforming footage have emerged. Typically, to shoot 360-degree VR content, a cameraperson employs several cameras rigged in a spherical formation to capture the scene. According to Alicia Millane's blog entry on The Primacy, "Each camera is mounted at a specific angle so the camera's field of view will overlap portions of the surrounding cameras' field of view." With the overlap, editors should be able to get more seamless footage, without any gaps.

[...] Enter volumetric photogrammetry. A mouthful, for sure, but this method of creating virtual environments could possibly hold the key to the future of VR. Unlike the method mentioned above, there are no takes or shots in volumetric VR that are later edited in post-production. This allows for a much more fluid experience, as the consumer frames the scene and chooses his or her own perspective. Using the volumetric capture method, footage of a real person is recorded from various viewpoints, after which software analyzes, compresses and recreates all the viewpoints of a fully volumetric 3D human.

With volumetric VR explained, photogrammetry's defining characteristic is the principle of triangulation. As explained in a blog post on Viar360, triangulation involves taking photographs from at least two locations to form lines of sight. "These lines of sight are then mathematically intersected to produce the 3-dimensional coordinates of the points of interest."

[...] Immersive experiences utilizing volumetric photogrammetry may convey a much more authentic and realistic environment to the end user. Per VRt Ventures founder, Jacob Koo, "If virtual reality has the chance to reach its full potential, then consumers must feel like they are actually somewhere they cannot be physically. That perception takes VR technology out of the novelty category and makes it something actually useful."

Source: TechCrunch

Original Submission

Read more of this story at SoylentNews.


Linux Fu: Custom Bash Command Completion "IndyWatch Feed Tech"

If you arent a Linux user and you watch someone who knows what they are doing use Bash the popular command line interpreter you might get the impression they type much faster than they actually do. Thats because experienced Linux users know that pressing the tab key will tend to complete what they are typing, so you can type just a few characters and get a much longer line of text. The feature is very smart so you may not have realized it, but it knows a good bit about what you could type.


CVE-2017-18043 Qemu: integer overflow in ROUND_UP macro could result in DoS "IndyWatch Feed Tech"

Posted by P J P on Jan 19


Quick Emulator(Qemu) built with a macro ROUND_UP(n, d), used to promote number
'n' to the nearest multiple of 'd', is vulnerable to an integer overflow
issue. It could occur if 'd' is unsigned and smaller in type from 'n'.

A user could use this flaw to crash the Qemu process resulting in DoS.

Upstream patch:


Mesa 17.3.3 Released With RADV & ANV Vulkan Driver Fixes "IndyWatch Feed Tech"

Mesa 17.3.3 is now available as the latest point release for the Mesa 17.3 stable series...


Dark Caracal APT Lebanese intelligence is spying on targets for years "IndyWatch Feed Tech"

A new long-running player emerged in the cyber arena, it is the Dark Caracal APT, a hacking crew associated with to the Lebanese General Directorate of General Security that already conducted many stealth hacking campaigns.

Cyber spies belonging to Lebanese General Directorate of General Security are behind a number of stealth hacking campaigns that in the last six years, aimed to steal text messages, call logs, and files from journalists, military staff, corporations, and other targets in 21 countries worldwide.

New nation-state actors continue to improve offensive cyber capabilities and almost any state-sponsored group is able to conduct widespread multi-platform cyber-espionage campaigns.

This discovery confirms that the barrier to entry in the cyber-warfare arena has continued to
decrease and new players are becoming even more dangerous.

The news was reported in a detailed joint report published by security firm Lookout and digital civil rights group the Electronic Frontier Foundation.

The APT group was tracked as Dark Caracal by the researchers, its campaigns leverage a custom Android malware included in fake versions of secure messaging apps like Signal and WhatsApp.
Lookout and Electronic Frontier Foundation (EFF) have discovered Dark Caracal2, a persistent and prolific actor, who at the time of writing is believed to be administered out of a building belonging to the Lebanese General Security Directorate in Beirut. At present, we have knowledge of hundreds of gigabytes of exfiltrated data, in 21+ countries, across thousands of victims. Stolen
data includes enterprise intellectual property and personally identifiable information. states the report.

The attack chain implemented by Dark Caracal relies primarily on social engineering, the hackers used messages sent to the victims via Facebook group and WhatsApp messages. At a high-level, the hackers have designed three different kinds of phishing messages to trick victims into visiting a compromised website, a typical watering hole attack.



[SECURITY] [DSA 4092-1] awstats security update "IndyWatch Feed Tech"

Posted by Sebastien Delafond on Jan 19

Debian Security Advisory DSA-4092-1 security () debian org Sebastien Delafond
January 19, 2018

Package : awstats
CVE ID : CVE-2017-1000501
Debian Bug :...


Links 19/1/2018: Linux Journalism Fund, Grsecurity is SLAPPing Again "IndyWatch Feed Tech"

GNOME bluefish




Chinas ambitions in space are growing "IndyWatch Feed Tech"

That failure, and another one last year involving another type of Long March rocket, slowed Chinas space efforts. Officials had hoped to launch around 30 rockets of one type or another in 2017 but only managed 18 (there were 29 launches in America and another 20 of Russian onessee chart). But they promise to bounce back in 2018, with 40-or-so lift-offs planned this year. These will probably include a third outing for the Long March 5assuming its flaws can be fixed in timeand missions that will greatly expand the number of satellites serving BeiDou, Chinas home-grown satellite navigation system.

NATTY yellow carts whizz tourists around Wenchang space port, a sprawling launch site on the tropical island of Hainan. The brisk tour passes beneath an enormous poster of Xi Jinping, Chinas president, then disgorges passengers for photographs not far from a skeletal launch tower. Back at the visitor centre there is a small exhibition featuring space suits, a model moon-rover and the charred husk of a re-entry capsule that brought Chinese astronauts back from orbit. A gift shop at the exit sells plastic rockets, branded bottle openers and cuddly alien mascots.

The base in a township of Wenchang city is the newest of Chinas four space-launch facilities. It is also by far the easiest to visitthanks in part to the enthusiasm of officials in Hainan, a haven for tourists and rich retirees. Wenchangs local government has adopted a logo for the city reminiscent of Starfleet badges in Star Trek. It is building a space-themed tourist village near the launch site, with attractions that include a field of vegetables grown from seeds that have been carried in spaceships.

Upgrade your inbox.


How to install Spotify application on Linux "IndyWatch Feed Tech"

How do I install Spotify app on Ubuntu Linux desktop to stream music? Spotify is a digital music stream service that provides you access to tons of songs. You can stream for free or buy a subscription. Creating a playlist is possible. A subscriber can listen music ad-free. You get better sound quality. This page Continue reading "How to install Spotify application on Linux"

The post How to install Spotify application on Linux appeared first on nixCraft.


DIY Spray Booth is Both Light and Lit "IndyWatch Feed Tech"

Industrial designer [Eric Strebel] has access to big, walk-in spray booths, but bigger isnt always better. For small jobs, its overkill, and he wanted his own spray booth anyway. If youre ready to upgrade from that ratty old cardboard box in the garage, look no further than [Eric]s spray booth how-to after the break.

If you dont already know, [Eric] is something of a foam core legend. He has several videos about model building techniques that produce really slick results, so its no surprise to see these skills transfer to a larger build. The booth is built from a single 40 x 60 sheet of 1/2 foam core board, a furnace filter, and a vent fan modified to fit his shops system. The whole thing cost less than $200, most of which goes toward the fan.

[Eric] modified an existing spray booth plan to fit his needs and added some really nice touches along the way. All the edges are beveled and the unfinished faces are taped, so at first glance it looks like its made out of painted wood or melamine board. The furnace filter slides out one side for easy replacement and is braced with foam scraps so it wont fall forward. The best part of this booth is the LED stripsthey make for way better working conditions than the dim recesses of a cardboard box.

If youd rather build a walk-in spray booth, why not make your own sliding barn doors, too?

FTC Investigating Broadcom for Antitrust Practices "IndyWatch Feed Tech"

The Federal Trade Commission (FTC) is investigating whether chipmaker Broadcom Ltd engaged in anticompetitive tactics in negotiations with customers, the company said on Wednesday.

The investigation comes as Broadcom pursues a hostile takeover of Qualcomm in a $103 billion deal. Since the FTC would likely review any merger for anticompetitive practices, the current probe could make regulatory approval more challenging.

Broadcom was recently issued subpoenas that seek an extensive amount of information, according to The Wall Street Journal, which was the first to report the probe on Wednesday.

The focus of the concern has been that Broadcom has changed some contracts to require customers to buy a percentage of its production of items rather than a certain number, the paper reported.

"This FTC review is immaterial to our business, does not relate to wireless and has no impact on our proposal to acquire Qualcomm," Broadcom said in a statement.

Source: Reuters

Original Submission

Read more of this story at SoylentNews.


MPAA Wins $19.8 Million From Pirate Site Pubfilm "IndyWatch Feed Tech"

In recent years the MPAA has pursued legal action against several pirate sites and the streaming service Pubfilm is one of their latest targets.

Hollywoods industry group initially kept the lawsuit secret. This was done to prevent Pubfilms operator from moving to a new domain preemptively. While this strategy worked, Pubfilm didnt throw in the towel.

Soon after the domain name was suspended, the site moved to And that wasnt all. Pubfilm also started to actively advertise its new domain through Google Adsense to regain its lost traffic.

Today, close to a year has passed and Pubfilm is still around. The site moved from domain to domain and currently resides at and a few other domains that are advertised on the site.

All this time the company failed to responded in court, so the case saw little movement. This week, however, the MPAA made its demands clear and soon after the court issued a default against the site and its unknown operators.

Defendants are Internet pirates who own, operate, and promote a ring of interconnected websites under the name PubFilm and variants thereof whose purpose is to profit from the infringement of copyrighted works, the group wrote in its request.

Because of this continued infringement, the MPAA demanded the maximum amount of statutory copyright infringement damages. With 132 titles listed in the complaint, this totals nearly $20 million.

Given the egregious circumstances of this case, Plaintiffs should be awarded the full amount of statutory damages of $150,000 for each of the 132 Works identified in the Complaint, for a total of $19,800,000, the MPAA writes in its memorandum.

In addition, the Hollywood studios requested a permanent injunction that will require domain registries to put associated domain names on hold and sign them over to the MPAA.

Both requests were granted by the court on Thursday.

Pubfilm domain hopping

Previously, several domain names were aready seized through a preliminary injunction that resulted in Pubfilm moving from domain to domain in...


Feed RSS Last fetched Next fetched after
"IndyWatch Feed Tech" XML 01:04, Saturday, 27 January 02:04, Saturday, 27 January
"IndyWatch Feed Tech" XML 01:03, Saturday, 27 January 02:03, Saturday, 27 January

IndyWatch Science and Technology News Feed Archiver

Go Back:30 Days | 7 Days | 2 Days | 1 Day

IndyWatch Science and Technology News Feed Today.

Go Forward:1 Day | 2 Days | 7 Days | 30 Days

IndyWatch Science and Technology News Feed was generated at World News IndyWatch.

Resource generated at IndyWatch using aliasfeed and rawdog