IndyWatch Science and Technology News Feed Archiver

Go Back:30 Days | 7 Days | 2 Days | 1 Day

IndyWatch Science and Technology News Feed Today.

Go Forward:1 Day | 2 Days | 7 Days | 30 Days

IndyWatch Science and Technology News Feed was generated at World News IndyWatch.

Monday, 29 January


British cryptocurrency traders robbed of Bitcoin at gunpoint "IndyWatch Feed Tech"

Cryptocurrency heist are usually covert affairs that leave users with empty wallets, but not fearing for their life. Still, there are always some unlucky individuals who get the worst of everything. Case in point: Bitcoin traders Danny Aston and Amy Jay, who were robbed at gunpoint on January 22 in their home in Moulsford, Oxfordshire (UK). The two are directors of Aston Digital Currencies, and Aston traded cryptocurrency online under the pseudonym Goldiath. He has More


Bevy of Robot Swans Explore Singaporean Reservoirs "IndyWatch Feed Tech"

Swanbots monitor water quality while blending in with their surroundings Photo: NUS

When Singapore decided that they needed a new smart water assessment network to track pollution in their reservoirs, they obviously went with a robot, because otherwise you wouldnt be reading about it here. They also decided that the robot had to be aesthetically pleasing in order to promote urban livability. But how to do that?

The answer came from researchers at the National University of Singapore (NUS), who proposed developing a Smart Water Assessment Network: Yes, thats right, a SWAN.

In the past, water monitoring was done by humans in boats, which was time consuming and expensive. The NUSwan robots can autonomously putter about while measuring water characteristics, including pH, dissolved oxygen, turbidity, and chlorophyll. The data are wirelessly uploaded to the cloud to be analyzed in real time, so that whoever is in charge of whether Singapores water is drinkable or not can immediately be notified if it isnt.

Each robotic swan can do its business for several hours before heading back to home base to recharge, so a small team of them can trade off to monitor a reservoir continuously. In the future, the NUSwan robots could be trained to autonomously employ adaptive sampling techniques, dynamically updating their navigation plans to collect data most efficiently. The researchers also mention something about adding diving capability, which is fun to imagine.

The developers of the robots say that the NUSwans are sturdy enough to survive encounters with kayaks and small boats, which can only mean that the kayaks and small boats do not survive those encounters. In other words, mess with these robots at your peril, and in that respect, theyre just like real swans. And they do look just like real swans, convincingly enough that most people exploring Singapores u...


How to redirect standard error in bash "IndyWatch Feed Tech"

I am trying to redirect bash message into file named output.log. But, it is not getting redirected. How do I redirect both standard output and standard error in bash shell? In Linux, how do I redirect error messages? Standard error (also known as stderr) is the default error output device. Use stderr to write all Continue reading "How to redirect standard error in bash"

The post How to redirect standard error in bash appeared first on nixCraft.


3D Printed Battery Pack Keeps Old Drill Spinning "IndyWatch Feed Tech"

The greatest enemy of proprietary hardware and components is time. Eventually, that little adapter cable or oddball battery pack isnt going to be available anymore, and youre stuck with a device that you cant use. Thats precisely what happened to [Larry G] when the now antiquated 7.2V NiCd batteries used by his cordless drill became too hard to track down. The drill was still in great shape and worked fine, but he couldnt power the thing. Rather than toss a working tool, he decided to 3D print his own battery pack.

The 3D modeling on the battery pack is impeccable

He could have just swapped new cells into his old pack, but if youre going to go through all that trouble, why not improve on things a little? Rather than the NiCd batteries used by the original pack, this new pack is designed around readily available AA NiMH batteries. For the light repairs and craft work he usually gets himself into, he figures these batteries should be fine. Plus he already had them on hand, and as we all kno...


Jailhouse Guest Support To Be Included With Linux 4.16 "IndyWatch Feed Tech"

With Linux 4.16 is initial support for the Jailhouse hypervisor to support native Linux guests in non-root cells...


SpaceX's Falcon Heavy Demo Flight Set for Tuesday 2018-02-06 @ 1830-2130 UTC (1:30-4:30 p.m. EST) "IndyWatch Feed Tech"

Engadget is reporting that the Flacon Heavy demo flight has been scheduled:

It looks as though it's finally happening. SpaceX's Falcon Heavy rocket may have a launch date, according to Chris G. of The rocket will launch no earlier than February 6th, with a window of 1:30 PM ET to 4:30 PM ET. There's a backup window on February 7th, just in case. We've reached out to SpaceX for confirmation.

Update 1/27: Elon Musk has confirmed that SpaceX is "aiming for" a February 6th launch.

Aiming for first flight of Falcon Heavy on Feb 6 from Apollo launchpad 39A at Cape Kennedy. Easy viewing from the public causeway.

Elon Musk (@elonmusk) January 27, 2018

Spaceflight Now has these launch details:

Launch window: 1830-2130 GMT (1:30-4:30 p.m. EST)
Launch site: LC-39A, Kennedy Space Center, Florida
A SpaceX Falcon Heavy rocket will launch on its first demonstration flight. The heavy-lift rocket is formed of three Falcon 9 rocket cores strapped together with 27 Merlin 1D engines firing at liftoff. The first Falcon Heavy rocket will attempt to place a Tesla Roadster on an Earth escape trajectory into a heliocentric orbit.

SpaceX Conducts Successful Static Fire Test of Falcon Heavy
SpaceX Falcon Heavy Testing Delayed by Government Shutdown
Falcon Heavy Readied for Static Fire Test
SpaceX's Falcon Heavy Rocket Sets Up at Cape Canaveral Ahead of Launch

SpaceX Successfully Tests Falcon Heavy First Stage Cores

Original Submission



African countries have taken the first major step towards cheaper continental flights By Yomi Kazeem | Quartz "IndyWatch Feed Tech"

Yesterday (Jan. 28), 23 African countries launched the Single African Air Transport Market (SAATM) initiative by the African Union (AU).

Read more


The OpenBSD Foundation 2018 Fundraising Campaign "IndyWatch Feed Tech"

Details of the 2018 campaign have been added to the Foundation's website. The goal for the year is for $300,000. The total for "smaller" donations has already taken the OpenBSD community to bronze level sponsorship!

Please show your support by contributing.


A Beam-Steering Antenna for 5G Mobile Phones "IndyWatch Feed Tech"

For the first time, a beam-steering antenna is integrated into the metal casing of a mobile phone Photo: Shanghai University/IEEE

5G report logo, link to report landing page

The final architecture of 5G cellular networks has yet to be carved in stone. However, it looks as though millimeter waves, with their ability to obtain wider bandwidths, will play an important role in 5Gthe next generation of mobile phones. The combination of these bands along withdirectional phased-array antennas, in which radio waves can be steered electronically in a desired direction, will constitute one of the key technologies in future 5G cellular systems.

While there have been a number of research efforts that have demonstrated that these phased-array antennas can be added into mobile phones using low-cost substrate boards, no one had demonstrated that its possible to build these antennas into phones with full metallic casings, as can be found in the high-end mobile devices from numerous manufacturers.

Now researchers from the Shanghai Institute for Advanced Communication and Data Science at Shanghai University in China have developed a 28 Gigahertz (GHz) beam-steering antenna array that can be integrated into the metallic casing of 5G mobile phones.

The antenna elements and arrays are easily integrated on the metallic frame or casing of a mobile phone, which is more suitable for industry mobile phone design, said Danny Yu, the lead author of the research in the journal I EEE Transactions on Antennas and Propagation . Compared to all other existing works for mm-Wave 28 GHz band, this work is totally unique in such a sense that it is very close to what th...


Lenovo Fingerprint Manager Pro is full of fail "IndyWatch Feed Tech"

Lenovo Fingerprint Manager Pro, a piece of software that allows users to log into their PCs or authenticate to configured websites using fingerprint recognition, has been found seriously wanting in the security department. The problems are several: the software contains a hard-coded password, and is accessible to all users with local non-administrative access to the system it is installed in. Also, the data it stores users Windows logon credentials and fingerprint data, among other More


Development Release: Q4OS 3.1 Testing "IndyWatch Feed Tech"

Q4OS, a Debian-based distribution featuring the Trinity desktop environment, has launched a new development branch. The project's new testing branch, Q4OS 3.1 Testing, carries the code name "Centaurus" and uses packages from Debian's Testing "Buster" branch. "We introduce the initial development build of the new major Q4OS version....


The Challenges in High Volume Manufacturing of Photonic Devices for Data Center Applications "IndyWatch Feed Tech"

Photonic devices such as optical transceivers play vital roles in modern data centers. Demand for photonic devices is at an unprecedented level. And the technology upgrades are expected to happen at the same time of this volume ramp, e.g. 40G to 100G and to 200G/400G and beyond.

Internet traffic has been growing at an exponential level, continuously driven by video streaming, 3D imaging, IoT, VR/AR, and other emerging data applications. The data generated by internet traffic is enormous and data centers are crucial to support data communications, storage and processing through cloud computing. Photonic devices such as optical transceivers play vital roles in modern data centers. Demand for photonic devices is at an unprecedented level. And the technology upgrades to support this demand are expected to happen at the same time as this volume ramps, e.g. 40G to 100G and to 200G/400G and beyond.

These requirements have posed significant challenges to photonic device manufacturing. To support data center build-up, the photonic device companies need to maintain an elastic capacity model to respond fast to data center customers demands, and at the same time to maintain low manufacturing costs to produce profits. This calls for much higher levels of manufacturing automation than the photonic industry has ever experienced. In addition, the co-existence of many product standards requires that manufacturing automation is flexible to allow multiple products, e.g., single die Fabry-Perot (FP) laser submount and multiple die electro-absorption laser (EML) submount assembly, to go through the same production lines without sacrificing throughput. Furthermore, more and more advanced technologies demand higher and higher precision in assembly automations, again without sacrificing speed and throughput. High speed, high precision, and high flexibility for the high volume manufacturing of photonic devices require closer collaboration than ever between device designers, process developers, manufacturing engineers, and automation equipment suppliers. This webinar will discuss these trends, challenges, and opportunities.



Smaller and Smarter: The Electron Rocket Takes Flight "IndyWatch Feed Tech"

On January 21st, 2018 at 1:43 GMT, Rocket Labs Electron rocket lifted off from New Zealands Mahia Peninsula. Roughly eight minutes later ground control received confirmation that the vehicle entered into a good orbit, followed shortly by the successful deployment of the payload. On only their second attempt, Rocket Lab had become the latest private company to put a payload into orbit. An impressive accomplishment, but even more so when you realize that the Electron is like no other rocket thats ever flown before.

Not that you could tell from the outside. If anything, the external appearance of the Electron might be called boring. Perhaps even derivative, if youre feeling less generous. It has the same fin-less blunted cylinder shape of most modern rockets, a wholly sensible (if visually unexciting) design. The vehicles nine first stage engines would have been noteworthy 15 years ago, but today only serve to draw comparisons with SpaceXs wildly successful Falcon 9.

But while the Electrons outward appearance is about as unassuming as they come, under that jet-black outer skin is some of the most revolutionary rocket technology seen since the V-2 first proved practical liquid fueled rockets were pos...


Browserling has helped Cameroonians restore Internet access "IndyWatch Feed Tech"

Last month Cameroonians discovered that they could use Browserling to easily bypass government censorship and get back online and use social media websites. I did a write-up about it in my previous blog post.

Today I heard from Godwill and my other new Cameroonian friends that the government has lifted the censorship and they have full access to all websites. I'm happy I was able to help Cameroonians at least a little bit to restore their Internet freedom.

Go237 service and Godwill Tetah, local Cameroon tech leader.

Until next time!


After a "Major" Launch Anomaly, Satellites Scrambling to Reach Orbits "IndyWatch Feed Tech"

On Wednesday night, an Ariane 5 booster took off from Kourou, a launch site in French Guiana operated by a European rocket company. The launch proceeded normally until shortly before nine minutes and 26 seconds into the flight, when ground tracking stations lost contact with the rocket. It was feared that the launch vehicle and its two satellites were lost.

But later Wednesday night, and again on Thursday, both of the satellite operators, SES and Eutelsat, separately confirmed that they were in contact with their respective spacecraft, the SES-14 satellite and the Al Yah 3 satellite. They were not in their proper geostationary orbits, but that could be fixed, the satellite companies said.

Just how far off those orbits became clear publicly later on Thursday, when data about them started appearing in satellite trackers. According to one orbital expert, Jonathan McDowell, each of the satellites had reached near the 45,000km heights where they need to be, but the inclinations were way off.

[...] "I characterize this as a major anomaly, but I score it a partial success for launch vehicle statistics," McDowell said. "The orbit is usable but will require several years worth of satellite station-keeping propellant to get the payloads to the right final orbit." This is obviously preferable to losing the satellites entirely.

Source: ArsTechnica

See also:

Previously: NASA's GOLD Makes It Into Orbit After Fears It Was Lost

Original Submission

Read more of this story at SoylentNews.


[$] QUIC as a solution to protocol ossification "IndyWatch Feed Tech"

The TCP protocol has become so ubiquitous that, to many people, the terms "TCP/IP" and "networking" are nearly synonymous. The fact that introducing new protocols (or even modifying existing protocols) has become nearly impossible tends to reinforce that situation. That is not stopping people from trying, though. At 2018, Jana Iyengar, a developer at Google, discussed the current state of the QUIC protocol which, he said, is now used for about 7% of the traffic on the Internet as a whole.


Udemy Targets Pirate Site Giving Away its Paid Courses For Free "IndyWatch Feed Tech"

While theres no shortage of people who advocate free sharing of movies and music, passions are often raised when it comes to the availability of educational information.

Significant numbers of people believe that learning should be open to all and that texts and associated materials shouldnt be locked away by copyright holders trying to monetize knowledge. Of course, people who make a living creating learning materials see the position rather differently.

A clash of these ideals is brewing in the United States where online learning platform Udemy has been trying to have some of its courses taken down from, a site that makes available premium tutorials and other learning materials for free.

Early December 2017, counsel acting for Udemy and a number of its individual and corporate instructors (Maximilian Schwarzmller, Academind GmbH, Peter Dalmaris, Futureshock Enterprises, Jose Marcial Portilla, and Pierian Data) wrote to with DMCA takedown notice.

Pursuant to 17 U.S.C. 512(c)(3)(A) of the Digital Millennium Copyright Act (DMCA), this communication serves as a notice of infringement and request for removal of certain web content available on, the letter reads.

I hereby request that you remove or disable access to the material listed in Exhibit A in as expedient a fashion as possible. This communication does not constitute a waiver of any right to recover damages incurred by virtue of any such unauthorized activities, and such rights as well as claims for other relief are expressly retained.

A small sample of Exhibit A

On January 10, 2018, the same law firm wrote to Cloudflare, which provides services to FreeTutorials. The DMCA notice asked Cloudflare to disable access to the same set of infringing content listed above.

It seems likely that whatever happened next wasnt to Udemys satisfaction. On January 16, an attorney from the same law firm filed a DMCA subpoena...


Bringing the Sharing Economy to the Airwaves Will Boost Your Bandwidth "IndyWatch Feed Tech"

The U.S. is launching an experiment to free up jealously guarded radio spectrum Illustration: James Provost

5G report logo, link to report landing page

People routinely share houses through Airbnb and cars through Uber. Now the sharing economy is expanding to include another scarce resource: radio spectrum.

Spectrum is scarce because we cant make any more of it and our appetite for it just keeps growing. By 2020, 20 billion devices will be onlineup from 8 billion today. To handle this explosive growth, the capacity of wireless networks must triple over the next four years.

Meanwhile there are entire frequency bands reserved for the U.S. Department of Defense, which uses them for secure military communications, including the air-traffic-control radar systems on Navy aircraft carriers and assault ships. When in use, this spectrum serves an important purpose. But outside of coastal regions this military spectrum is essentially never used.

Early this year the U.S. government will start sharing that Navy spectrum, the 3.5-gigahertz band, under a new three-tiered spectrum-sharing framework called the Citizens Broadband Radio Service. This framework is the first of its kind; in fact, when the idea was initially proposed in 2012, the technology to pull it off didnt yet exist, and no one knew quite how to build it.

Since then, advances in machine learning algorithms and cloud computing have allowed us to create scalable software that makes real-time decisions about who gets access to what portion of the spectrum. The idea is for unlicensed, licensed, and federal users all to be able to use the 3.5-GHz band (found between 3.5 and 3.7 GHz) at the same time.

In December 2016, the FCC awarded provisional certification to seven vendors, including Virginia-based Federated Wireless, where I am chief technology officer, to operate a system, based on these advances and others, that could allow three types of users [see below] to peacefully share the same frequency band. That technology is now ready to boost the capacity of wireless networks at 3.5 GHz. And if its rolled out across more frequencies, it c...

NVIDIA 390.25 Linux Driver Released With GTX 1060 5GB & Quadro P620 Support "IndyWatch Feed Tech"

After rolling out the 390.12 beta Linux driver in early January as the first public driver in the 390 series, NVIDIA is ending January by the first 390 stable release: 390.25...


Strava user heatmap reveals patterns of life in western military bases "IndyWatch Feed Tech"

In November 2017, online fitness tracker Strava published a heatmap of the activity many of its users around the world engage in (and track) daily. But what might have seemed as a harmless sharing of anonymized, aggregated data turned out to reveal potentially sensitive information about (mostly western) military bases and secret sites. The revelation was made and shared over the weekend by Nathan Ruser, an Australian university student and founding member of Institute for More


Phishing Scam: Hackers Steal $150,000 in Ethereum from Experty ICO "IndyWatch Feed Tech"

By Waqas

Just a week after the biggest hack in the history of

This is a post from Read the original post: Phishing Scam: Hackers Steal $150,000 in Ethereum from Experty ICO


Security updates for Monday "IndyWatch Feed Tech"

Security updates have been issued by Arch Linux (glibc, lib32-glibc, and zziplib), Debian (clamav, ffmpeg, thunderbird, tiff, tiff3, and wireshark), Fedora (firefox, mingw-libtasn1, and webkitgtk4), Gentoo (fossil), Mageia (webkit2), openSUSE (chromium, clamav, and thunderbird), and SUSE (clamav and kernel).


Free Software Directory meeting recap, January 2018 "IndyWatch Feed Tech"

Every week free software activists from around the world come together in #fsf on to help improve the Free Software Directory. We had an exciting month working on the Directory with our wonderful stable of volunteers. These folks show up week in and week out to improve the Directory. It's also important to note the valiant efforts of those volunteers who can't make an appearance at the meeting proper, but still plug away at Directory entries during the week.

The new year kicked off to a great start, with the Directory finally crossing over 16,000 packages! This past year, we focused a lot on cleaning up and updating already existing entries. The Directory is much better for the effort. But it's great to see that we were able to continue growing the Directory even while we focused on fixing it up.

We followed that up with some big plans for the future, creating Project Teams to focus and lead the effort on particular issues on the Directory. Some projects have been ongoing, such as cataloging IceCat Plugins. Other projects are just kicking off, or still in need of team captains. Adding this little bit of structure should help get these projects up and running.

The month rounded out with more new additions to the Directory, as well as working on software projects related to radio. All in all, a great start to the new year, and we have much more to look forward to in the months to come.

If you would like to help update the directory, meet with us every Friday in #fsf on from 12 p.m. to 3 p.m. EST (16:00 to 19:00 UTC).


RADV Reworking Pipeline Emitting To Improve CPU Usage "IndyWatch Feed Tech"

While using Vulkan lowers the CPU utilization compared to OpenGL, in our testing of NVIDIA versus the open-source Radeon drivers we generally have found the red team's drivers to consume more CPU resources. Thus it's good to hear that RADV co-conspirator Bas Nieuwenhuizen is working on reworking how this Radeon Vulkan driver handles pipeline emitting...


Re: CVE-2017-18078: systemd-tmpfiles root privilege escalation with fs.protected_hardlinks=0 "IndyWatch Feed Tech"

Posted by Michael Orlitzky on Jan 29

They look pretty similar. The symlink issue was fixed as far as I can
tell -- I tried to exploit them, and failed. The tmpfiles code is using
a clever trick:

xsprintf(fn, "/proc/self/fd/%i", fd);
if (chown(fn, ...

On Linux, the proc stuff is magic, and that just does the right thing,
even though a priori it looks like "chown" will follow symlinks.

Hard links were a different story, and there was no attempt made to...


Spiral Laser Cut Buttons Make A Super-Slim USB MIDI Board "IndyWatch Feed Tech"

We see a huge variety of human-computer interface devices here at Hackaday, and among them are some exceptionally elegant designs. Of those that use key switches though, the vast majority employ off the shelf components made for commercial keyboards or similar. It makes sense to do this, there are some extremely high quality ones to be had.

Sometimes though we are shown designs that go all the way in creating their key switches from the ground up. Such an example comes from [Brandon Rice], and it a particularly clever button design because of its use of laser cutting to achieve a super-slim result. Hes made a sandwich of plywood with the key mechanisms formed in a spiral cut on the top layer. Hes a little sketchy on the exact details of the next layer, but underneath appears to be a plywood spacer surrounding a silicone membrane with conductive rubber taken from a commercial keyboard. Beneath that is copper tape on the bottom layer cut to an interweaving finger design for the contacts. An Adafruit Trinket Pro provides the brains and a USB interface, and the whole device makes for an attractive and professional looking peripheral.

You can see the results in action as hes posted a video, which weve included below the break.

Weve shown you spiral structures for flexibility in the past, with flexible materials made via 3D printing.


Revolutionary gene edited T cell therapy to treat lymphoma shows promise and little toxicity "IndyWatch Feed Tech"

This revolutionary gene modified T cell therapy is bearing fruit in treating a type of lymphoma, a resistant form of cancer.

Summary: After years of effort, this revolutionary gene-modified T cell therapy is bearing fruit in treating a type of lymphoma, a resistant form of cancer. [This article first appeared on the website Author: Brady Hartman. ]

Thirty-seven-year-old Nick Asoian of Denver unsuccessfully fought Hodgkins Lymphoma using conventional cancer treatments for two years. In 2008, while in New Zealand for a ski race, Nick was diagnosed with Hodgkins Lymphoma. Two bone marrow transplants and two years of chemotherapy combined with radiation therapy didnt bring his cancer to heel.

Then, a few years ago the avid skier got wind of clinical trial using T cell therapy at the Center for Cell and Gene Therapy at the Baylor College of Medicine in Texas. After speaking with Dr. Bollard and Vicky Torrano, the physicians conducting the trial, Asoian decided to give it a shot.


BYU researchers create Star Wars inspired 3D images "IndyWatch Feed Tech"

Researchers create true Star Wars like 3D holograms with tiny particles, lasers

Do you remember the scene from the sci-fi film Star Wars where the R2-D2 beams a hologram of Princess Leia into thin air? Looks like it might not take long before the true Princess Leia hologram experience becomes a reality.

Apparently, researchers at Utahs Brigham Young University (BYU) uses the method dubbed as optical trap display that is capable of projecting 3D volumetric images into thin air. According to a study published in Natures journal, the technology can be used to project small floating 3D volumetric images that can be viewed and interacted from all angles. Viewers can walk around the projections and even place a finger below them.

Often, when we think of an image thats floating in space thats 3D, we think of a hologram, explains the lead researcher, Daniel Smalley, the studys lead author and a BYU electrical and computer engineering professor and holography expert. But really, a hologram cannot make the Princess Leia image, or the Avatar table, or the Iron Man display. A 3D image that floats in [the air], that you can walk all around and see from every angle, this image is called a volumetric image.'

The Optical Trap Display uses colorful lasers to capture physical particles, which are then moved around to create the 3D image. You capture a particle in an invisible, or almost invisible tractor beam, explains the lead researcher, Daniel Smalley, the studys lead author and a BYU electrical and computer engineering professor and holography expert, then you drag that around to every point of an image. When its in the right place, you shoot it with red, green and blue lasers to make it illuminate, and build up an image point by point, dragging this cellulose particle around as you go.

Smalley compares the technology to a 3D printer for light because it works through a combination of multi-color laser beams and tiny plant fiber particles called cellulose. A scientific phenomenon known as Photophoresis allows you to push a particle in the air by blasting it with a beam of light.

Were using a laser beam to trap a particle, and then we can steer the laser beam around to move the particle and create the image, said Erich Nygaard, a researcher on the team in a statement.

Several tiny images have been 3D-light-printed by Smalley and his team, such as a butterfly, a prism, the stretch-Y BYU logo, animated rings and an individual in a lab coat bent in a position similar to Princess Leia as she begins her projected message.



Initial Tests of NASA's Kilopower Nuclear System Successful "IndyWatch Feed Tech"

Initial tests of NASA's Kilopower nuclear power system have been successful, and full-power testing will be done in March. Each Kilopower unit is expected to provide between 1 kW to 10 kW of electric power:

Months-long testing began in November at the energy department's Nevada National Security Site, with an eye toward providing energy for future astronaut and robotic missions in space and on the surface of Mars, the moon or other solar system destinations.

A key hurdle for any long-term colony on the surface of a planet or moon, as opposed to NASA's six short lunar surface visits from 1969 to 1972, is possessing a power source strong enough to sustain a base but small and light enough to allow for transport through space. "Mars is a very difficult environment for power systems, with less sunlight than Earth or the moon, very cold nighttime temperatures, very interesting dust storms that can last weeks and months that engulf the entire planet," said Steve Jurczyk, associate administrator of NASA's Space Technology Mission Directorate. "So Kilopower's compact size and robustness allows us to deliver multiple units on a single lander to the surface that provides tens of kilowatts of power," Jurczyk added.

[...] Lee Mason, NASA's principal technologist for power and energy storage, said Mars has been the project's main focus, noting that a human mission likely would require 40 to 50 kilowatts of power. The technology could power habitats and life-support systems, enable astronauts to mine resources, recharge rovers and run processing equipment to transform resources such as ice on the planet into oxygen, water and fuel. It could also potentially augment electrically powered spacecraft propulsion systems on missions to the outer planets.

NASA's next Mars mission is InSight, a stationary lander scheduled to launch in May. It will use two MegaFlex solar arrays from Orbital ATK. NASA's Mars 2020 rover is scheduled to launch in July 2020. It will use 4.8 kg of plutonium dioxide to provide no more than 110 Watts of power.

The Juno mission is the first mission to Jupiter to use solar panels. Juno uses...


Re: CVE-2017-18078: systemd-tmpfiles root privilege escalation with fs.protected_hardlinks=0 "IndyWatch Feed Tech"

Posted by Florian Weimer on Jan 29

Isn't it a duplicate of CVE-2013-4392?



Re: CVE-2017-18078: systemd-tmpfiles root privilege escalation with fs.protected_hardlinks=0 "IndyWatch Feed Tech"

Posted by Michael Orlitzky on Jan 29

Correction to the CVE-ID: it's 2017, not 2018. So CVE-2017-18078.


CVE-2018-18078: systemd-tmpfiles root privilege escalation with fs.protected_hardlinks=0 "IndyWatch Feed Tech"

Posted by Michael Orlitzky on Jan 29

Product: systemd (systemd-tmpfiles)
Versions-affected: 236 and earlier
Author: Michael Orlitzky
Acknowledgments: Lennart Poettering who, instead of calling me an idiot
for not realizing that systemd enables fs.protected_hardlinks by
default, went out of his way to harden the non-default configuration.

== Summary ==


Magnetic Hammer Drives Tiny Medical Robot Through Brain Tissue "IndyWatch Feed Tech"

This millirobot has already probed a goat brain, and may someday maneuver through a human Photo: University of Houston

Photo: University of Houston Hammer Away: A prototype containing a steel bead rests in front of two magnetic coils.

A tiny robot that jackhammers its way through the body sounds like the stuff of science fiction nightmares. But such a robot exists, and it could play an important role in the future of medicine.

A new study on the concept shows that millimeter-scale robots (known as millirobots) can penetrate lamb and goat brain tissue by responding to changes in the magnetic field generated by hospital medical scanners. That achievement could pave the way for fantastic voyages of biomedical discovery.

Many medical researchers have experimented with magnetic fields that push and pull tiny robots to move them around inside the human body. In this case, University of Houston researchers also created a magnetic hammer inside a bullet-shaped robot that would produce enough force to drive it into animal brains.

The robot contains a stainless-steel bead that is pulled back and forth inside the robots transparent acrylic body by directional changes in the magnetic field produced by a magnetic resonance imaging (MRI) scanner. When pulled in one direction, the bead compresses a mechanical spring at the back of the robot, which propels the bead forward when released to strike the robots front end, hammering it deeper into bodily tissue.

The robot is the combination of the MRI system and this relatively simple component that could be mass produced, says Aaron Becker, an assistant professor in electrical and computer engineering at the University of Houston.

Such a robot could leverage standard MRI scanners in hospitals, which means physicians could simultaneously perform MRI imaging of patients and move millirobots around inside their bodies. The research by Becker and his colleagues was published in January in IEEE Robotics and Automation Letters .




Waterfall Security and HCNC collaborate to provide OSIsoft PI offerings to the Korean market "IndyWatch Feed Tech"

Waterfall Security Solutions, a global leader in cybersecurity technologies for critical infrastructure and industrial control systems, announced a partnership with HCNC Co., a systems integrator based in Korea, to further extend Waterfalls and HCNCs OSIsoft product offering within the region. HCNC specializes in integrating OSIsoft PI solutions throughout a wide spectrum of industries including power, oil and gas, utilities and transportation. HCNCs combination of strong, local support coupled with extensive knowledge of and services for More


Heat Map Released by Fitness Tracker Reveals Location of Secret Military Bases "IndyWatch Feed Tech"

Every one of us now has at least one internet-connected smart device, which makes this question even more prominent how much does your smart device know about you? Over the weekend, the popular fitness tracking app Strava proudly published a "2017 heat map" showing activities from its users around the world, but unfortunately, the map revealed what it shouldn'tlocations of the United States


Learning From First Principles Demis Hassabis "IndyWatch Feed Tech"

Between 0409 December 2017, thousands of researchers and experts gathered for at the largest and most influential AI and Thirty-first Annual Conference on Neural Information Processing Systems (NIPS) in Long Beach, California. This is the conferences 40th year, and its most-attended, at 7,229 registrations.

Demis Hassabis, the founder and CEO of DeepMind and an expert chess player himself, presented further details of the system, called Alpha Zero, at an Artificial Intelligence Conference in California. The program often made moves that would seem unthinkable to a human chess player.

It doesnt play like a human, and it doesnt play like a program, Hassabis said at the Neural Information Processing Systems (NIPS) conference in Long Beach. It plays in a third, almost alien, way.


Artificial brains could soon be reality: Superconducting switch, which can learn like human brain, developed "IndyWatch Feed Tech"

Researchers have developed a superconducting switch that can make future computers think like the human brain.


[SECURITY] [DSA 4097-1] poppler security update "IndyWatch Feed Tech"

Posted by Moritz Muehlenhoff on Jan 29

Debian Security Advisory DSA-4097-1 security () debian org Moritz Muehlenhoff
January 25, 2018

Package : poppler
CVE ID : CVE-2017-14929 CVE-2017-1000456...


GNU Linux-libre 4.15-gnu Deblobs Two New Drivers, Drops More Upstream References "IndyWatch Feed Tech"

Once again being punctual with their releases, the GNU Linux-libre volunteers managed to release the GNU Linux-libre 4.15-gnu kernel a short time after Linus Torvalds on Sunday released the official Linux 4.15 kernel...


Stravas Global Heat Map Exposes User Locations Including Military Bases "IndyWatch Feed Tech"

By Waqas

Strava is a GPS tracking and fitness-tracker app manufacturer that

This is a post from Read the original post: Stravas Global Heat Map Exposes User Locations Including Military Bases


Fitness Tracker Strava's Geolocation "Lights Up" U.S. Military Bases "IndyWatch Feed Tech"

Strava, a smartphone app that tracks "athletic activity" using GPS, published an interactive heatmap of user activity around the world. That heatmap included some U.S. military bases:

Military personnel around the world have been publicly sharing their exercise routes online - including those inside or near military bases.

Online fitness tracker Strava has published a "heatmap" showing the paths its users log as they run or cycle. It appears to show the structure of foreign military bases in countries like Syria and Afghanistan, as soldiers move around inside.

The US military is examining the heatmap, a spokesman said. Air Force Colonel John Thomas, a spokesman for US Central Command, told the Washington Post that the US military was reviewing the implications.

Strava said it had excluded activities marked as private from the map. Users who record their exercise data on Strava have the option of making their movements public or private. Private data, the company said, has never been included.

The "private" option is for people who like to track their step count during sexual activity, not protecting the operational security of the military base you're stationed at.

Also at The Guardian, which contains more examples than the BBC for those who don't want to enable JavaScript to view the interactive one linked to above.

Original Submission

Read more of this story at SoylentNews.


Military personnel improperly used Fitness Strava Tracker exposed their bases "IndyWatch Feed Tech"

Military worldwide have publicly shared online their exercise routes recorded through the fitness tracker Strava revealing the fitness sessions conducted inside or near military bases

We discussed many times privacy risks related to IoT devices, here we are to discuss an alarming case, fitness tracker Strava revealed details of Military Bases.

American and allied military worldwide have publicly shared their exercise routes online revealing the fitness sessions conducted inside or near military bases, including Afghanistan, Iraq, and Syria.

This leak of information has happened because military personnel turned on their fitness Strava tracker while making exercises at the bases.

A map showing exercise routes recorded by users of a tracking app reveals sensitive information about military personnel in locations around the world, including Afghanistan, Iraq, and Syria.

Such kind of information could be used by enemies and terrorists to plan an attack.

Obviously while in some regions of the globe it is impossible to distinguish the activity of the military personnel, in other locations the routes immediately stand out.

For example, examining the map of Iraq you can notice that the entire region is dark, except for a series of well-known military bases used by the American military and its allies.

The list of the bases easy to locate thank to the map associated to the fitness tracker Strava includes Taji north of Baghdad, Qayyarah south of Mosul, Speicher near Tikrit and Al-Asad in Anbar Province and a number of minor sites highlighted in northern and western Iraq.

Searching for bases in Afghanistan, it is easy to locate the Bagram Air Field in the north of Kabul along with other smaller sites south of the country.

Strava Tracking app military bases

The movements of soldiers within Bagram air base the largest US military facility in Afghanistan Source BBC

Similarly, in Syria it is  Qamishli in the northwest, a stronghold of US-allied Kurdish forces, is clearly visible.

Tobias Schneider, one of the secur...


Inventing The Microprocessor: The Intel 4004 "IndyWatch Feed Tech"

We recently looked at the origins of the integrated circuit (IC) and the calculator, which was the ICs first killer app, but a surprise twist is that the calculator played a big part in the invention of the next world-changing marvel, the microprocessor.

There is some dispute as to which company invented the microprocessor, and well talk about that further down. But who invented the first commercially available microprocessor? That honor goes to Intel for the 4004.

Path To The 4004

Busicom calculator motherboard based on 4004 (center) and the calculator (right)Busicom calculator motherboard based on 4004 (center) and the calculator (right)

We pick up the tale with Robert Noyce, who had co-invented the IC while at Fairchild Semiconductor. In July 1968 he left Fairchild to co-found Intel for the purpose of manufacturing semiconductor memory chips.

While Intel was still a new startup living off of their initial $3 million in financing, and before they had a semiconductor...


Spectre / Meltdown Code Gets Cleaned Up, Improvements For Linux 4.16 "IndyWatch Feed Tech"

After the page table isolation (K)PTI support was added late in the Linux 4.15 kernel cycle in light of the Meltdown CPU vulnerability, improvements to this code are on the way with Linux 4.16...


How to Use DockerHub "IndyWatch Feed Tech"

How to Use DockerHub


Silicon Valleys Secret Test Track for Self-Driving Cars "IndyWatch Feed Tech"

Crows Landing hosts some of the worlds stealthiest autonomous vehicle startups Cars: IEEE Spectrum; Background: Getty Images

Youve probably heard of Mcity, the fake city built by the University of Michigan to test self-driving cars in Ann Arbor. GoMentum Station in the Bay Area has also been in the news, with Apple and Otto looking for a secure location to put highly automated vehicles through their paces.

But there is a facility in rural California where companies have quietly tested autonomous vehicles for decades without anyone noticing. Crows Landing Air Facility is a 1,500-acre former air base near Modesto with two vast concrete runways, surrounded by farmland.

According to documents sourced by IEEE Spectrum through public records requests, some of Silicon Valleys hottest automotive startups have used Crows Landing for secret self-driving tests. In the past 18 months, Faraday Future, Lucid, Torc, Rivian, and Zoox have all tested prototype cars there, along with automated semi-trucks from Peloton and Embark. Mercedes Benz and Bosch also carry out regular automotive experiments at the facility.

We have multiple year-over-year relationships with several car companies and vehicle testing firms, confirmed Keith Boggs, Assistant Executive Officer for Stanislaus County, which owns Crows Landing. The reason why these firms are so attracted to Crows Landing is because its so remote.

Crows Landings nearest neighbours are empty fields, but it is just one mile from Interstate 5, and only about 90 minutes by car from San Jose. And it has other advantages. Unlike GoMentum Station, which is still partly controlled by the military, Crows Landing has no restrictions on foreign nationals, who make up a significant part of many autonomous technology engineering teams. Crows Landing is also cheap, costing as little as $600 a day to rent the entire facility, accordin...


Dutch Agencies Provide Crucial Intel About Russias Interference In US Elections "IndyWatch Feed Tech"

Arthur T Knackerbracket has found the following story:

Hackers from the Dutch intelligence service AIVD have provided the FBI with crucial information about Russian interference with the American elections. For years, AIVD had access to the infamous Russian hacker group Cozy Bear. That's what de Volkskrant and Nieuwsuur have uncovered in their investigation.

It's the summer of 2014. A hacker from the Dutch intelligence agency AIVD has penetrated the computer network of a university building next to the Red Square in Moscow, oblivious to the implications. One year later, from the AIVD headquarters in Zoetermeer, he and his colleagues witness Russian hackers launching an attack on the Democratic Party in the United States. The AIVD hackers had not infiltrated just any building; they were in the computer network of the infamous Russian hacker group Cozy Bear. And unbeknownst to the Russians, they could see everything.

That's how the AIVD becomes witness to the Russian hackers harassing and penetrating the leaders of the Democratic Party, transferring thousands of emails and documents. It won't be the last time they alert their American counterparts. And yet, it will be months before the United States realize what this warning means: that with these hacks the Russians have interfered with the American elections. And the AIVD hackers have seen it happening before their very eyes.

The Dutch access provides crucial evidence of the Russian involvement in the hacking of the Democratic Party, according to six American and Dutch sources who are familiar with the material, but wish to remain anonymous. It's also grounds for the FBI to start an investigation into the influence of the Russian interference on the election race between the Democratic candidate Hillary Clinton and the Republican candidate Donald Trump.

Translated by: Lisa Negrijn

It's quite an interesting read.

Original Submission

Read more of this story at SoylentNews.


File Your Taxes Before Scammers Do It For You "IndyWatch Feed Tech"

Today, Jan. 29, is officially the first day of the 2018 tax-filing season, also known as the day fraudsters start requesting phony tax refunds in the names of identity theft victims. Want to minimize the chances of getting hit by tax refund fraud this year? File your taxes before the bad guys can!

Tax refund fraud affects hundreds of thousands, if not millions, of U.S. citizens annually. Victims usually first learn of the crime after having their returns rejected because scammers beat them to it. Even those who are not required to file a return can be victims of refund fraud, as can those who are not actually due a refund from the IRS.

According to the IRS, consumer complaints over tax refund fraud have been declining steadily over the years as the IRS and states enact more stringent measures for screening potentially fraudulent applications.

If you file your taxes electronically and the return is rejected, and if you were the victim of identity theft (e.g., if your Social Security number and other information was leaked in the Equifax breach last year), you should submit an Identity Theft Affidavit (Form 14039). The IRS advises that if you suspect you are a victim of identity theft, continue to pay your taxes and file your tax return, even if you must do so by paper.

If the IRS believes you were likely the victim of tax refund fraud in the previous tax year they will likely send you a special filing PIN that needs to be entered along with this years return before the filing will be accepted by the IRS electronically. This year marks the third out of the last five that Ive received one of these PINs from the IRS.

Of course, filing your taxes early to beat the fraudsters requires one to have all of the tax forms needed to do so. As a sole proprietor, this is a great challenge because many companies take their sweet time sending out 1099 forms and such (even though theyre required to do so by Jan. 31).

A great many companies are now turning to online services to deliver tax forms to contractors, employees and others. For example, I have received several notices via email regarding the availability of 1099 forms online; most say they are sending the forms in snail mail, but that if I need them sooner I can get them online if I just create an account or enter some personal information at some third-party site.

Having seen how so m...


6 Ways to Improve Your Relationship Marketing Strategy "IndyWatch Feed Tech"

Businesses spend a lot of time, effort and money building their brand and chasing down leads.

For many years, traditional marketing strategies have been used to build and grow customer relationships. However, the desire to do better has pushed businesses to seek marketing strategies that focus on building long-term relationships and customer loyalty.

6 Ways to Improve Your Relationship Marketing Strategy

This is where relationship marketing comes in.

As more and more businesses realize the need to improve their customer relationships with a goal of engaging them for longer, getting to buy more products, and recommend their brand to friends and family were set to see more businesses embracing relationship marketing in a big way.

Here are six ways how to improve your relationship marketing strategy.

Invest in Customer Relationship Management (CRM) Solutions

Customer relationship management is all about recording and storing important details about your customers, specifically their personal information, how often they visit your website, their purchases and other details.

Having a standardized way of collecting and sharing customer data, and also cataloging customer interactions with your business through CRM software is key to implementing an effective relationship marketing strategy.

Consumer Targeted Campaigns and Referrals

Some of the worlds biggest brands hold consumer targeted campaigns to get in touch with their customers directly. For instance, an electronic appliance company may opt to hold free service campaigns, so that they can encourage their customers to bring defective products that will be repaired free of charge and spare parts provided at a subsidized price.

Another great strategy is referral campaigns, and while its a relatively new concept, referral marketing is being used successfully by some of your favorite brands to generate more business.

Referral marketing helps empower your customers to share your services and products with their networks, therefore, generating more business leads. If done properly, a strong referral campaign can amplify 1 sale, turning a single customer, into many customers through trusted referrals and recommendations. A great example of software to launch a campaign like this is Ambassador Referral Software.



Ncurses 6.1 Released With A Variety Of Improvements & Other Changes "IndyWatch Feed Tech"

It has been more than two years since the release of Ncurses 6.0 as the GNU project for developing terminal-independent text-based user-interfaces while this weekend marked the availability of the big Ncurses 6.1 update...


Generations of Philly Families Are Incarcerated Together "IndyWatch Feed Tech"

Via: The Inquirer: Since that day in 2011, Cintron Jr., 38, has lived on the same cell block as his father, who is 58. Recently, the cell next door to his dads became available, so he moved in. Each evening, by 9 p.m., they lock themselves into cells 86 and 87 of A Block for []


All living organisms on Earth owe a debt to these protein-based Legos of life "IndyWatch Feed Tech"

As an added bonus, these tiny building blocks could even be used to split water, creating a clean-burning and near infinite source of energy.


Stockton Gets Ready to Experiment With Universal Basic Income "IndyWatch Feed Tech"

Via: KQED: Wage stagnation. Rising housing prices. Loss of middle-class jobs. The looming threat of automation. These are some of the problems facing Stockton and its residents, but the citys mayor, Michael Tubbs, says his city is far from unique. I think Stockton is absolutely ground zero for a lot of the issues we are []


How to Convert and Copy a DVD to Your PC, iOS and Android Gadgets? "IndyWatch Feed Tech"

Sometimes, you may want a copy of your DVD collection on your computer. Therefore you can watch it at any time, and dont have to necessarily have the DVD disc on hand every time. Or perhaps, you need to make a backup of DVD just in case of losing the DVD content when its damaged.

To meet the demands, we highly recommend a program that allows you to copy protected DVDs on your PC and convert the content into one of common formats. That is WonderFox DVD Ripper Pro, which is excellent and can accomplish copying a DVD to your computer with just a few steps.

Note: WonderFox DVD Ripper Pro can be used to keep backups of your purchased DVDs for personal use. Please dont use it for illegal sale.

Now, lets start to learn more about the program. And also, here below is how to copy and convert a protected DVD to your PC with WonderFox DVD Ripper Pro.

WonderFox DVD Ripper Pro is one of the best Windows 10 DVD Ripper programs which help you create copies of DVDs and save them to your computer and portable devices. It is an alternative to HandBrake and DVD Shrink, giving the user the possibility to enjoy safe DVD movie backup without difficulty.

The software is full-featured. And after installing the program, you can see that it has an intuitive interface. There are 3 source options: DVD Disc, ISO Image, and DVD Folder. That means it can also convert and copy video_ts to MP4, MOV, and more common formats.

How to Convert and Copy a DVD to Your PC, iOS and Android Gadgets?

We press the DVD Disc button. And the program begins to analyze and decrypts the DVD. The time for analyzing depends on DVD data amount, your hard drive, etc. After a little while, well see a new interface. See the image below. The program has already selected the right main movie of the DVD. Well, you can also choose the other content, such as A...


CNCF to Host the Rook Project to Further Cloud-Native Storage Capabilities "IndyWatch Feed Tech"

Today, the Cloud Native Computing Foundation (CNCF) Technical Oversight Committee (TOC) voted to accept Rook as the 15th hosted project alongside Kubernetes, Prometheus, OpenTracing, Fluentd, Linkerd, gRPC, CoreDNS, containerd, rkt, CNI, Envoy, Jaeger, Notary and TUF.


Simple, Energy-Efficient Recycling Process for Lithium-Ion Batteries "IndyWatch Feed Tech"

A new recycling process requires half the energy of conventional techniques and produces ready-to-use cathode materials Photo: David Baillot/UC San Diego Jacobs School of Engineering

A simple new recycling process restores old lithium battery cathodes to mint condition using half the energy of current processes. Unlike todays recycling methods, which break down cathodes into separate elements that have to be put together again, the new technique spits out compounds that are ready to go into a new battery.

The method works on the lithium cobalt oxide batteries used in laptops and smartphones, and also on the complex lithium-nickel-manganese-cobalt batteries found in electric cars.

Lithium batteries have anodes made of graphite and cathodes made of lithium metal oxides, where the metal is some combination of cobalt, nickel, manganese, and iron. Less than five percent of old lithium batteries are recycled today. As millions of large EV batteries retire in the next decade, were going to send even bigger mountains of flammable, toxic battery waste to landfills. Plus, that waste contains valuable metals. There is serious concern that supplies of critical metals like cobalt and lithium are dwindling. Recycling is going to be key if were to keep up with battery demand.

Several companies, mostly in China, already reprocess batteries. The standard procedure requires crushing batteries, and then either melting them or dissolving them in acid. What comes out at the end is separate metals like cobalt, lithium, nickel, and manganese. In addition to using intense amounts of energy, the methods destroy whats most valuable about battery cathodes, says Zheng Chen, a professor of nanoengineering at the University of California, San Diego.

The material is in the form of beautiful, well-designed particles with a specific microscopic structure that determines the performance of the battery, he says. A lot of engineering, energy, and time go into making these structures.

The simple method Chen and his colleagues developed preserves that microstructure. The researchers first cycled commercial lithium cells until they had lost half...


U.S. Government Owned 5G Network? "IndyWatch Feed Tech"

Via: Reuters: President Donald Trumps national security team is looking at options to counter the threat of China spying on U.S. phone calls that include the government building a super-fast 5G wireless network, a senior administration official said on Sunday. The official, confirming the gist of a report from, said the option was being []


Facebook releases privacy principles "IndyWatch Feed Tech"

Facebook released a set of privacy principles Monday aimed at helping users understand how the social media giant handles their data and what they can do to shield their information from other users.The principles include giving users control of...


Hard-coded Password Lets Attackers Bypass Lenovo's Fingerprint Scanner "IndyWatch Feed Tech"

Lenovo has recently rolled out security patches for a severe vulnerability in its Fingerprint Manager Pro software that could allow leak sensitive data stored by the users. Fingerprint Manager Pro is a utility for Microsoft Windows 7, 8 and 8.1 operating systems that allows users to log into their fingerprint-enabled Lenovo PCs using their fingers. The software could also be configured to


Artificial Intelligence Is Going to Supercharge Surveillance "IndyWatch Feed Tech"

Via: The Verge: Artificial intelligence is giving surveillance cameras digital brains to match their eyes, letting them analyze live video with no humans necessary. This could be good news for public safety, helping police and first responders more easily spot crimes and accidents and have a range of scientific and industrial applications. But it also []


F-35s Continue to Have Problems, Acquisition Costs Increase "IndyWatch Feed Tech"

Testing Director says the expensive F-35s are not combat-ready, unreliable, and components need redesign

Overall fleet-wide monthly availability rates remain around 50 percent, a condition that has existed with no significant improvement since October 2014, despite the increasing number of new aircraft. One notable trend is an increase in the percentage of the fleet that cannot fly while awaiting replacement parts indicated by the Not Mission Capable due to Supply rate.

[...] Total acquisition costs for Lockheed Martin Corp.'s next-generation fighter may rise about 7 percent to $406.5 billion, according to figures in a document known as a Selected Acquisition Report. That's a reversal after several years of estimates that had declined to $379 billion recently from a previous high of $398.5 billion in early 2014.

$122 billion has been spent on the F35 program up until the end of 2017. $10-15 billion will be spent each year through 2022. This is detailed in a 100 page F-35 spending summary report.

FY17 DOD PROGRAMS: F-35 Joint Strike Fighter (JSF)

Related: The F-35 Fighter Plane Is Even More of a Mess Than You Thought
The F-35: A Gold-Plated Turkey
Flawed and Potentially Deadly F-35 Fighters Won't be Ready Before 2019
Lockheed Martin Negotiating $37 Billion F-35 Deal
Does China's J-20 Rival Other Stealth Fighters?

Original Submission

Read more of this story at SoylentNews.


Its time to get serious about email security "IndyWatch Feed Tech"

In todays hyper-connected world, email is the foundation of every organizations collaboration, productivity, and character. And despite annual rumors of its demise, theres no reason to believe well be writing its eulogy anytime soon. With its ubiquity and universal appeal, email is a treasure trove of sensitive business information. Thats why emails leaks arent just data loss events. Theyre direct attacks on your brand and reputation. Despite team collaboration and communication tools like Slack and More


Authentication today: Moving beyond passwords "IndyWatch Feed Tech"

A new global study from IBM Security examining consumer perspectives around digital identity and authentication, found that people now prioritize security over convenience when logging into applications and devices. Authentication methods perceived as most secure (global perspective) Generational differences also emerged showing that younger adults are putting less care into traditional password hygiene, yet are more likely to use biometrics, multifactor authentication and password managers to improve their personal security. With millennials quickly becoming the More


Mesa 18.0-RC3 Released With 50+ Changes "IndyWatch Feed Tech"

Emil Velikov announced the release today of Mesa 18.0-RC3 with 50+ changes comprising of many Intel ANV and Radeon RADV Vulkan driver fixes...


How can we avoid another record year for breaches and ransomware? "IndyWatch Feed Tech"

More than 14.5 billion emails laced with malware were sent in 2017 according to the annual Global Security Report issued by AppRiver. The majority of cyber threats were initiated in the US and persisted throughout the year, with significant peaks in August, September and October. In the first half of 2017, 1.9 billion data records were lost or stolen as a result of cyberattacks. This followed a tough year in 2016, when losses totaled $16 More


Nearly 2000 WordPress Websites Infected with a Keylogger "IndyWatch Feed Tech"

More than 2,000 WordPress websites have once again been found infected with a piece of crypto-mining malware that not only steals the resources of visitors' computers to mine digital currencies but also logs visitors' every keystroke. Security researchers at Sucuri discovered a malicious campaign that infects WordPress websites with a malicious script that delivers an in-browser


Chasing the Electron Beam at 380,000 FPS "IndyWatch Feed Tech"

Analog TV is dead, but that doesnt make it any less awesome. [Gavin and Dan], aka The Slow Mo Guys recently posted a video about television screens. Since they have some incredible high-speed cameras at their disposal, we get to see the screens being drawn, both on CRT and more modern LCD televisions.

Now we all know that CRTs draw one pixel at a time, drawing from left to right, top to bottom. You can capture this with a regular still camera at a high shutter speed. The light from a TV screen comes from a phosphor coating pained on the inside of the glass screen. Phosphor glows for some time after it is excited, but how long exactly? [Gavin and Dans] high framerate camera let them observe the phosphor staying illuminated for only about 6 lines before it started to fade away. You can see this effect at a relatively mundane 2500 FPS.

Cranking things up to 380,117 FPS, the highest speed ever recorded by the duo, we see even more amazing results. Even at this speed, quite a few pixels are drawn each frame. [Gavin] illustrates that by showing how Super Marios mustache is drawn in less than one frame of slow-mo footage. You would have to go several times faster to actually freeze the electron beam. We think its amazing that such high-speed analog electronics were invented and perfected decades ago.

Switching from CRT to LCD, the guys show us how the entire screen stays lit, while refresh runs top to bottom. Experimenting on an iPhone 7+ showed that the screen refresh is always from the top of the screen down, toward the home button. If you change the phone to landscape orientation, it will appear to be refreshing from left to right. All pretty intere...


Over the weekend Microsoft rolled out out-of-band updates to disable mitigations for Spectre v2 attacks "IndyWatch Feed Tech"

Over the weekend, Microsoft rolled out out-of-band updates to disable mitigations for one of the Spectre attack variants because they can cause systems to become unstable.

The situation is becoming embarrassing! Just after the release of the Meltdown and Spectre security updates Intel excluded any problems for their deployments citing testing activities of conducted by other tech giants.

At the same time, some companies were claiming severe issued, including performance degradation and in some cases crashes.

Last week, Intel changed its position on the security patches, it first published the results of the test conducted on the Meltdown and Spectre patches and confirmed that the impact on performance could be serious, then it recommended to stop deploying the current versions of Spectre/Meltdown patches.

Over the weekend, Microsoft rolled out out-of-band updates to disable mitigations for one of the Spectre attack variants because they can cause systems to become unstable.

Our own experience is that system instability can in some circumstances cause data loss or corruption. states the security advisory published by Microsoft.

While Intel tests, updates and deploys new microcode, we are making available an out of band update today, KB4078130, that specifically disables only the mitigation against CVE-2017-5715 Branch target injection vulnerability. In our testing this update has been found to prevent the behavior described. 

Microsoft was among the first companies that provided security updates for Meltdown and Spectre vulnerabilities, anyway, the patches caused severe issues to AMD architectures.

The decision follows the similar actions adopted by other tech giants like Red HatHP, Dell, Lenovo, VMware.



Linux 4.16 Getting Tweak For Smarter Task Migration, Yielding Better Scalability "IndyWatch Feed Tech"

Ingo Molnar began sending in his various Git pull requests this morning for targeting the Linux 4.16 kernel merge window, including the scheduler updates...


Fully Electric Tesla of the Canals Set to Make Maiden Voyage This Summer "IndyWatch Feed Tech"

The battery-powered autonomous ships will move goods across Belgium and the Netherlands, helping pull up to 23,000 polluting trucks off the road.


NASA tests light, foldable plane wings for supersonic flights "IndyWatch Feed Tech"

The foldable wings will give typical planes like commercial airliners a way to adapt to different flight conditions. They can give pilots more control over their aircraft and could even lead to more fuel efficient flights. Planes designed to fly at supersonic speeds (faster than the speed of sound), however, will get more out of this technology.


Chinese scientists just cloned two monkeys, moving one step closer to cloning humans "IndyWatch Feed Tech"

By Ben Hirschler

LONDON (Reuters) Chinese scientists have cloned monkeys using the same technique that produced Dolly the sheep two decades ago, breaking a technical barrier that could open the door to copying humans.

Zhong Zhong and Hua Hua, two identical long-tailed macaques, were born eight and six weeks ago, making them the first primates the order of mammals that includes monkeys, apes and humans to be cloned from a non-embryonic cell.


10 New VM Escape Vulnerabilities Discovered in VirtualBox "IndyWatch Feed Tech"

10 new VM escape vulnerabilities discovered in VirtualBox

Oracle has released patches for ten vulnerabilities in VirtualBox which allow attackers to break out of guest operating systems and attack the host operating system that VirtualBox runs on. Exploits using this method, known as a "virtual machine escape," have been the subject of intense interest among security researchers following the disclosure of the Venom vulnerability in 2015.

The vulnerabilities are collectively published as CVE-2018-2676, CVE-2018-2685, CVE-2018-2686, CVE-2018-2687, CVE-2018-2688, CVE-2018-2689, CVE-2018-2690, CVE-2018-2693, CVE-2018-2694, and CVE-2018-2698. While they all share the same resultant effect, the method involvedand subsequently the ease with which attackers can leverage the vulnerabilityvaries.

Original Submission

Read more of this story at SoylentNews.


Week ahead in tech: Lawmakers push to improve broadband access "IndyWatch Feed Tech"

A House panel will look into ways to build out the nation's broadband infrastructure in the coming week.The issue is getting added attention as President Trump is set to discuss his long-promised $1.7 trillion infrastructure proposal during Tuesday'...


It's Going To Take More Time To Get Vega Compute Support With The Mainline Kernel "IndyWatch Feed Tech"

This weekend I wrote how the AMDKFD discrete GPU support should be in place for the next kernel cycle, Linux 4.17. This is going to allow discrete Radeon GPUs to have ROCm working off the mainline kernel for OpenCL/compute support, but for 4.17 it's unlikely RX Vega GPUs will have compute working...


L2 CDP Added To Linux 4.16 For L2 Cache Partitioning On Intel CPUs "IndyWatch Feed Tech"

L2 Code and Data Prioritization (L2 CDP) is a feature of Intel's Resource Director Technology (RDT) that will now be supported with the Linux 4.16 kernel...


Scientists Just Created Rain and Snow on Demand in Idaho With Cloud Seeding "IndyWatch Feed Tech"

The ability to modify the weather has long belonged in the realm of science fiction, but now a team of scientists in Idaho think theyve figured out how to make it happen outside a lab.


Never-Before-Seen Viruses With Weird DNA Were Just Discovered in The Ocean "IndyWatch Feed Tech"

The ocean is crowded. As many as 10 million viruses can be found squirming in a single millilitre of its water, and it turns out they have friends we never even knew about.

Scientists have discovered a previously unknown family of viruses that dominate the ocean and cant be detected by standard lab tests. Researchers suspect this viral multitude may already exist outside the water maybe even inside us.

We dont think its ocean-specific at all, says environmental microbiologist Martin Polz from MIT.


Tesla Semi Spotted on California Street "IndyWatch Feed Tech"

Tesla has managed to ship several high-end electric vehicles to consumers, but commercial trucking is the companys next big move. After showing off its design for an electric semi truck, the company has been working on an aggressive release schedule. However, the vehicle hasnt been spotted in real life until now. A video uploaded to YouTube shows Teslas sleek electric semi cruising down a road in California.

There are few details to glean from this short clip (below). The original prototype trucks Tesla unveiled several months back did not have side mirrors, leading some to suspect Tesla had some fancy alternative in mind. The truck just spotted in the wild does have mirrors, though. Thats necessary for it to be street-legal, so Tesla probably just omitted the mirrors for the announcement to make the truck look cooler.

As you can see in the video, the front of the semi is narrower than standard diesel trucks. It doesnt need a giant engine, and the cab is slightly smaller with a centered drivers seat. Its vastly quieter than a regular semi as well. The truck doesnt even drown out other road noise as it passes the camera. Theres someone behind the wheel of the truck, but Tesla is touting the autopilot features of the vehicle. Although, many have pointed out Teslas self-driving tech is far behind the curve.


How to Optimize Your Home for Robot Servants "IndyWatch Feed Tech"

Robots can walk, talk, run a hotel and are entirely stumped by a doorknob. Or a mailbox. Or a dirty bathtubzzzzt, dead. Sure, the SpotMini, a doglike domestic helper from Boston Dynamics, can climb stairs, but it struggles to reliably hand over a can of soda. Thats why some roboticists think the field needs to flip its perspective. There are two approaches to building robots, says Maya Cakmak, a researcher at the University of Washington. Make the robot more humanlike to handle the environment, or design the environment to make it a better fit for the robot. Cakmak pursues the latter, and to do that, she studies so-called universal designthe ways in which buildings and products are constructed for older people or those with disabilities. Robot cant handle the twisting staircase? Put in a ramp. As for that pesky doorknob? Make entryways motion-activated. If you want droids at your beck and call someday, start thinking about robo-fitting your digs now.

1. Wide-Open Floor Plan Any serious sans-human housekeeping needs a wheeled robotic butler with arms, Cakmak says. That means fewer steps, plus hallways wide enough for U-turns. Oh, and hardwood floors. Thick carpeting slows a bots roll.

2. Visual Waypoints Factory robots work so fast in part because their world is highly structuredconveyor belt here, truck over there. So for your robo-home, create landmarks that anchor the bots in spacea prominent light fixture, say, that tells them, Youre in the dining room. (RFID tags will help bots locate smaller objects, like cleaning supplies.)


7 Ways to Automate Kubernetes at Scale in Production "IndyWatch Feed Tech"

The Kubernetes open source container orchestration engine is not a management platform, nor should it be mistaken for one. The whole point of orchestration is to reliably enable an automated system to facilitate the deployment and management of applications at scale, without the need for human intervention at each and every step. If the tools you use with and for Kubernetes dont enable automation, then youre not truly taking advantage of the benefits of orchestration.


Linux 4.16 Is Tightening Up Access To /dev/mem By Default "IndyWatch Feed Tech"

One of the security improvements to Linux 4.16 is improving the default behavior for restricted access to /dev/mem for x86/x86_64 and ARM64 systems...


New Memristor Design Can Hold Up to 128 Memory States Per Switch "IndyWatch Feed Tech"

Scientists develop new technology standard that could shape the future of electronics design

In a study published in the journal Scientific Reports [open, DOI: 10.1038/s41598-017-17785-1] [DX], researchers show how they have pushed the memristor a simpler and smaller alternative to the transistor, with the capability of altering its resistance and storing multiple memory states to a new level of performance after experimenting with its component materials.

[...] The University of Southampton team has demonstrated a new memristor technology that can store up to 128 discernible memory states per switch, almost four times more than previously reported.

In the study, they describe how they reached this level of performance by evaluating several configurations of functional oxide materials the core component that gives the memristor its ability to alter its resistance.

[...] Professor Prodromakis and his colleagues will be showcasing the technology, and presenting seven original research papers, at ISCAS 2018, an international circuits and systems conference, in Florence, Italy, in May.

"Almost four times more"?

Original Submission

Read more of this story at SoylentNews.


Researchers Use a Blockchain to Boost Anonymous Torrent Sharing "IndyWatch Feed Tech"

The Tribler client has been around for over a decade. We first covered it in 2006 and since then its developed into a truly decentralized BitTorrent client.

Even if all torrent sites were shut down today, Tribler users would still be able to find and add new content.

The project is not run by regular software developers but by a team of quality researchers at Delft University of Technology. There are currently more than 45 masters students, various thesis students, five dedicated scientific developers, and several professors involved.

Simply put, Triber aims to make the torrent ecosystem truly decentralized and anonymous. A social network of peers that can survive even if all torrent sites ceased to exist.

Search and download torrents with less worries or censorship, Tribers tagline reads.

Like many other BitTorrent clients, Tribler has a search box at the top of the application. However, the search results that appear when users type in a keyword dont come from a central index. Instead, they come directly from other peers.

Thribers search results

With the latest release, Tribler 7.0, the project adds another element to the mix, its very own blockchain. This blockchain keeps track of how much people are sharing and rewards them accordingly.

Tribler is a torrent client for social people, who help each other. You can now earn tokens by helping others. It is specifically designed to prevent freeriding and detect hit-and-run peers. Tribler leader Dr. Johan Pouwelse tells TF.

You help other Tribler users by seeding and by enhancing their privacy. In return, you get faster downloads, as your tokens show you contribute to the community.

Pouwelse, who aims to transform BitTorrent into an ethical Darknet, just presented the latest release at Stanford University. In addition, the Internet Engineering Task Force is also considering the blockchain implementation as an...


A Step-by-Step Guide to Git "IndyWatch Feed Tech"

If you've never used Git, you may be nervous about it. There's nothing to worry aboutjust follow along with this step-by-step getting-started guide, and you will soon have a new Git repository hosted on GitHub.


On Saturday Malwarebytes delivered a buggy update that caused excessive memory usage and crashes. "IndyWatch Feed Tech"

On Saturday Malwarebytes issued a buggy update to its home and enterprise products that caused serious problems for the users, including excessive memory usage, connectivity issues, and in some cases system crashes.

A buggy update rolled out over the weekend by Malwarebytes to its home and enterprise products caused serious problem for the users, including excessive memory usage, connectivity issues, and in some cases system crashes.

Malwarebytes issued the buggy update on Saturday morning (PST) and according to the security firm the software was only available only for 16 minutes before it removed it.

On the morning of Saturday, January 27th, 2018 protection update v1.0.3798 was released for all versions of Malwarebytes for Windows. As endpoints updated to this release, customers noticed their machines were reporting many Internet block notifications, and a sudden large increase in RAM usage reads the Root Cause Analysis published by Malwarebytes.

There are detection syntax controls in place to prevent such events as the one experienced in this incident. Recently we have been improving our products so that we can show the reason for a block, i.e. the detection category for the web protection blocks. In order to support this new feature, we added enhanced detection syntaxes to include the block category in the definitions. The unfortunate oversight was that one of the syntax controls was not implemented in the new detection syntax, which cause the malformed detection to be pushed into production.

malwarebytes buggy update

Some users reported problems to their connections that were blocked by the security software after the installation of the buggy update. Another displeasing problems reported by the users is the abnormal memory usage, the process associated with the application had used up more than 10 Gb of the (RAM), in some cases were also observed system crashes.



The Effects of the Spectre and Meltdown Vulnerabilities "IndyWatch Feed Tech"

Spectre and Meltdown aren't anomalies. They represent a new area to look for vulnerabilities and a new avenue of attack. They're the future of security -- and it doesn't look good for the defenders.


Distortion of the Patent System Masked Behind Acronyms Like CAFC/PTAB and Foreign-Sounding Jargon Like Estoppel or Inter Partes Review (IPR) "IndyWatch Feed Tech"

Its no secret, some argue, that lawyers make it difficult to understand the law so that youll always need them to help

Reference: Estoppel at Wikipedia

Summary: A quick look at some recent decisions/developments from the higher/highest patent courts in the US and PTABs judgments that help improve patent quality (and are therefore hated by the patent industry)

CAN one patent a GUI at the USPTO? The Court of Appeals for the Federal Circuit (CAFC) does not understand GUIs/software development [1, 2], so it recently defended a patent on a GUI, contrary to common sense. As somebody from Texas put it (Jonathan Szarzynski): Nice Precedential win for Core Wireless at the CAFC. A precedential opinion that discusses 101 and eligibility, and finds that a user interface that speeds a users navigation through various views and windows is patentable subject matter.

The case involves Synopsys, which now owns the nefarious, Microsoft-connected Black Duck.This is a potentially dangerous decision. Cascading menus are nothing new and to uphold a patent on those would open the floodgates to all sorts of trivial lawsuits (like Apples slide to unlock).

Recently, CAFC also looked at the case of patent assignor Hsiun (mentioned here before). The case involves Synopsys, which now owns the nefarious, Microsoft-connected Black Duck. The case is...


The Doomsday Clock Just Moved Closer to Midnight. Heres What You Need to Know "IndyWatch Feed Tech"

The Bulletin of the Atomic Scientists moved the doomsday clock closer to midnight on Thursday morning, warning the world that it is as close to catastrophe in 2018 as it has ever been.

They say the world is as close to catastrophe as it has been in the nuclear age.


Employers Want JavaScript, but Developers Want Python "IndyWatch Feed Tech"

When it comes to which programming languages are in demand by employers, JavaScript, Java, Python, C++, and Cin that ordercame out on top in a recent developer survey. Developers, however, want to learn languages like PythonGo, and Kotlin.


The Noisiest Seven-Segment Display Ever "IndyWatch Feed Tech"

Few mechanical clocks are silent, and many find the sounds they make pleasant. But the stately ticking of an old grandfather clock or the soothing sound of a wind-up alarm clock on the nightstand are nothing compared to the clattering cacophony that awaits [ProtoG] when he finishes the clock that this electromechanical decimal to binary to hex converter and display will be part of.

Undertaken as proof of concept before committing to a full six digit clock build, wed say [ProtoG] is hitting the mark. Yes, its loud, but the sound is glorious. The video below shows the display being put through its paces, and when the clock rate ramps up, the rhythmic pulsations of the relays driving the seven-segment flip displays is hypnotizing. The relays, one per segment of the Alfa Zeta flip displays, have DPDT contacts wired to flip a segment by reversing polarity. As a work in progress, [ProtoG] hasnt shared many more details yet, but he promises to keep us up to date on the converter aspect of the circuit. Right now it just seems like a simple but noisy driver. Well be following this one with interest.

If you prefer your clocks quieter but still like funky displays, check out this mixed media circus-themed clock.


A new report from MALWAREBYTES reveals a rise of 90% on ransomware detection in business "IndyWatch Feed Tech"

A new report from MALWAREBYTES titled Malwarebytes Annual State of Malware Report reveals a rise of 90% on ransomware detection in business.

The report brings to light new trends on hackers activities and threats especially the rise of ransomware as a tool of choice.

Researchers from MALWAREBYTES had gathered an enormous amount of data from the telemetry of their products, intel teams, and data science from January to November 2016 and to January to November 2017 to consolidate the evolution of the threat landscape of malware.

It is taken into account the tactics of infection, attack methods, development and distribution techniques used by hackers to target and compromise business and customers alike. There was a surge of 90% in ransomware detection for business customers in such way that it had become the fifth most detected threat. Regarding its modus operandi, the researchers found out a change in the distribution of malicious payloads, which includes banker Trojans and cryptocurrency miners.

Ransomware was on the rise, but it was not the only method employed by hackers. The report reveals that hackers had used banking trojans, spyware and hijackers to steal data, login credentials, contact lists, credit card data and spy on the user as an alternative way to compromise system security. The report discovered that hijackers detection grew 40% and spyware detection grew 30%. The report lists the Top 10 business threat detections with the five most significant threats being: Hijacker, Adware, Riskware Tool, Backdoor, and Ransomware respectively.


While the report covers a variety of threats, it emphasizes how malware outbreak had evolved. A game changer to the ransomware outbreak like WannaCry was the government exploit tool EternalBlue that was leaked and has been employed to compromise update processes and increased geo-targeting att...


Cloud Seeding For Snow: Does It Work? Scientists Report First Quantifiable Observations "IndyWatch Feed Tech"

Cloud Seeding For Snow: Does It Work? Scientists Report First Quantifiable Observations

Arthur T Knackerbracket has found the following story:

For the first time, scientists have obtained direct, quantifiable observations of cloud seeding for increased snowfall -- from the growth of ice crystals, through the processes that occur in clouds, to the eventual snowfall.

[...] Throughout the Western U.S. and in other semi-arid mountain regions across the globe, water supplies are maintained primarily through snowmelt. Growing human populations place a higher demand on water, while warmer winters and earlier springs reduce snowpack and water supplies. Water managers see cloud seeding as a potential way of increasing winter snowfall.

"But no one has had a comprehensive set of observations of what really happens after you seed a cloud," says Jeff French, an atmospheric scientist at the University of Wyoming (UW) and SNOWIE principal investigator. "There have only been hypotheses. There have never been observations that show all the steps in cloud seeding."

French is the lead author of a paper reporting the results, published in today's issue of the journal Proceedings of the National Academy of Sciences. Co-authors of the paper are affiliated with the University of Colorado- Boulder, University of Illinois at Urbana-Champaign, the National Center for Atmospheric Research, and the Idaho Power Company.

[...] "This research shows that modern tools can be applied to longstanding scientific questions," says Nick Anderson, a program director in NSF's Division of Atmospheric and Geospace Sciences, which funded the study. "We now have direct observations that seeding of certain clouds follows a pathway first theorized in the mid-20th century."

[...] "In the long-term, we will be able to answer questions about how effective cloud seeding is, and what conditions may be needed," says French. "Water managers and state and federal agencies can make decisions about whether cloud seeding is a viable option to add additional water to supplies from snowpack in the mountains."

Original Submission

Read more of this story at Soy...


Cybersecurity week Round-Up (2018, Week 4) "IndyWatch Feed Tech"

Cybersecurity week Round-Up (2018, Week 4) -Lets try to summarize the most important event occurred last week in 3 minutes.

The threats that most of all characterized this week are IoT botnets and malvertising.

Security experts at NewSkys believe the operators of the recently discovered Satori botnet are launching a new massive hacking campaign against routers to infect and recruit them in the botnet dubbed Masuta. The Masuta botnet targets routers using default credentials, one of the versions analyzed dubbed PureMasuta relies on the old network administration EDB 38722 D-Link exploit.

A new botnet called Hide N Seek (HNS botnet) appeared in the threat landscape, the malware is rapidly spreading infecting unsecured IoT devices, mainly IP cameras. The number of infected systems grew up from 12 at the time of the discovery up to over 20,000 bots.

Malware experts at CSE Cybsec uncovered a massive malvertising campaign dubbed EvilTraffic leveraging tens of thousands compromised websites. Crooks exploited some CMS vulnerabilities to upload and execute arbitrary PHP pages used to generate revenues via advertising.

The problems with Meltdown and Spectre security patches continue, Intel recommended to stop deploying the current versions of Spectre/Meltdown patches, while the Linux father Linus Torvalds defined the Spectre updates utter garbage.

Bell Canada suffers a data breach for the second time in less than a year.

Crooks continue to focus their interest on cryptocurrencies, researchers at PaloAlto Networks uncovered Monero Crypto-Currency Mining Operation impacted 30 Million users worldwide.

Maersk chair revealed its company reinstalled 45,000 PCs and 4,000 Servers after NotPetya Attack.

The week ended with a clamorous incident, the Japan-based digital exchange...


Top 10 Most Pirated Movies of The Week on BitTorrent 01/29/18 "IndyWatch Feed Tech"

This week we have three newcomers in our chart.

Thor Ragnarok is the most downloaded movie.

The data for our weekly download chart is estimated by TorrentFreak, and is for informational and educational reference only. All the movies in the list are Web-DL/Webrip/HDRip/BDrip/DVDrip unless stated otherwise.

RSS feed for the weekly movie download chart.

This weeks most downloaded movies are:
Movie Rank Rank last week Movie name IMDb Rating / Trailer
Most downloaded movies via torrents
1 (2) Thor Ragnarok 8.1 / trailer
2 (1) The Shape of Water (DVDScr) 8.0 / trailer
3 (3) Jumanji: Welcome to the Jungle (HDTS) 7.3 / trailer
4 () Bright 6.5 /...

08:50 - 181,871 breached accounts "IndyWatch Feed Tech"

In November 2017, the open television database known as suffered a data breach. The breached data was posted to a hacking forum and included 182k records with usernames, email addresses and MySQL password hashes.


The problematic Wannacry North Korea attribution "IndyWatch Feed Tech"

Last month, the US government officially "attributed" the Wannacry ransomware worm to North Korea. This attribution has three flaws, which are a good lesson for attribution in general.

It was an accident

The most important fact about Wannacry is that it was an accident. We've had 30 years of experience with Internet worms teaching us that worms are always accidents. While launching worms may be intentional, their effects cannot be predicted. While they appear to have targets, like Slammer against South Korea, or Witty against the Pentagon, further analysis shows this was just a random effect that was impossible to predict ahead of time. Only in hindsight are these effects explainable.

We should hold those causing accidents accountable, too, but it's a different accountability. The U.S. has caused more civilian deaths in its War on Terror than the terrorists caused triggering that war. But we hold these to be morally different: the terrorists targeted the innocent, whereas the U.S. takes great pains to avoid civilian casualties. 

Since we are talking about blaming those responsible for accidents, we also must include the NSA in that mix. The NSA created, then allowed the release of, weaponized exploits. That's like accidentally dropping a load of unexploded bombs near a village. When those bombs are then used, those having lost the weapons are held guilty along with those using them. Yes, while we should blame the hacker who added ETERNAL BLUE to their ransomware, we should also blame the NSA for losing control of ETERNAL BLUE.

A country and its assets are different

Was it North Korea, or hackers affilliated with North Korea? These aren't the same.

It's hard for North Korea to have hackers of its own. It doesn't have citizens who grow up with computers to pick from. Moreover, an internal hacking corps would create tainted citizens exposed to dangerous outside ideas. Update: Some people have pointed out that Kim Il-sung University in the capital does have some contact with the outside world, with academics granted limited Internet access, so I guess some tainting is allowed. Still, what we know of North Korea hacking efforts largley comes from hackers they employ outside North Korea.

Instead, North Korea develops external hacking "assets", supporting several external hackin...


PCI DSS 3.2 will unveil compliance cramming culture "IndyWatch Feed Tech"

February 1, 2018 marks the deadline for businesses to adopt the new industry standard, PCI DSS 3.2, aimed at reducing and better responding to cyber attacks resulting in payment data breaches. Originally announced in 2016, the industry has had almost two years to prepare for these increased requirements but a significant percentage of businesses are still not prepared, secure payment solutions provider, PCI Pal, warns. The industry has developed a culture of compliance cramming, treating More


10,000-Year-Old "Crayon" Found "IndyWatch Feed Tech"

Archaeologists find 10,000-year-old crayon in Scarborough

An ochre crayon thought to have been used to draw on animal skins 10,000 years ago has been found by archaeologists. The crayon, which is just 22mm long, was discovered near the site of an ancient lake which is now covered in peat near Scarborough, North Yorkshire.

An ochre pebble was found at another site on what would have been the opposite side of the lake. The area is near one of the most famous Mesolithic sites in Europe, Star Carr. [...] The ochre - a pigment made from clay and sand - pebble has a heavily striated surface that is likely to have been scraped to produce a red pigment powder.

[...] Lead author of the study Dr Andy Needham said the latest discoveries help further our understanding of Mesolithic life. [...] He added: "One of the latest objects we have found looks exactly like a crayon, the tip is faceted and has gone from a rounded end to a really sharpened end, suggesting it has been used."

Also at University of York.

The application of micro-Raman for the analysis of ochre artefacts from Mesolithic palaeo-lake Flixton (DOI: 10.1016/j.jasrep.2017.12.002) (DX)

Original Submission

Read more of this story at SoylentNews.


Opt-Out Fitness Data Sharing Leads to Massive Military Locations Leak "IndyWatch Feed Tech"

People who exercise with fitness trackers have a digital record of their workouts. They do it for a wide range of reasons, from gathering serious medical data to simply satisfying curiosity. When fitness data includes GPS coordinates, it raises personal privacy concerns. But even with individual data removed, such data was still informative enough to spill the beans on secretive facilities around the world.

Strava is a fitness tracking service that gathers data from several different brands of fitness tracker think Fitbit. It gives athletes a social media experience built around their fitness data: track progress against personal goals and challenge friends to keep each other fit. As expected of companies with personal data, their privacy policy promised to keep personal data secret. In the same privacy policy, they also reserved the right to use the data shared by users in an aggregated and de-identified form, a common practice for social media companies. One such use was to plot the GPS data of all their users in a global heatmap. These visualizations use over 6 trillion data points and can be compiled into a fascinating gallery, but theres a downside.

This past weekend, [Nathan Ruser] announced on Twitter that Stravas heatmap also managed to highlight exercise activity by military/intelligence personnel around the world, including some suspected but unannounced facilities. More worryingly, some of the mapped paths imply patrol and supply routes, knowledge security officers would prefer not to be shared with the entire world.

This is an extraordinary blunder which very succinctly illustrates a folly of Internet of Things. Stravas anonymized data sharing obsfucated individuals, but didnt manage to do the same for groups of individuals like the fitness-minded active duty military personnel whose workout habits are clearly defined on these heat maps. The biggest contributor (besides wearing a tracking device in general) to this situation is that the data sharing is enabled by default and must be opted-out:

You can opt-out of contributing your anonymized public activity data to Strava Metro and the Heatmap by unchecking the box in this section. Strava Blog, July 2017

Weve seen individual fitness trackers hacked and weve seen...


Google Launches Chronicle, Combining Cybersecurity With Machine Learning "IndyWatch Feed Tech"

Alphabet/Google has launched "Chronicle", a company that combines cybersecurity with machine learning. It was started under Google's X "moonshot"-producing group:

Alphabetthe parent company of Google, Nest, Waymo, and a million other companiesis launching a new company under the Alphabet umbrella. It's called "Chronicle," and the new company wants to apply the usual Google tenets of machine learning and cloud computing to cybersecurity.

The company is already up and running with an absolutely awesome URL, "," along with two introductory blog posts (1, 2), a logo, a Twitter account, and a vague sales pitch for some kind of security analysis product. The Chronicle team started in February 2016 under Alphabet's "Moonshot factory" X group and, before now, had been in stealth mode.

Stephen Gillett, the new CEO of Chronicle, explained the company best by writing:

We want to 10x the speed and impact of security teams' work by making it much easier, faster and more cost-effective for them to capture and analyze security signals that have previously been too difficult and expensive to find. We are building our intelligence and analytics platform to solve this problem.

10x? We verbed that. Google that fact.

Original Submission

Read more of this story at SoylentNews.


Over 60 years ago, Albert Einsteins brain was stolen, dissected and sent in pieces all around the world "IndyWatch Feed Tech"

Einsteins secret to an incredibly intelligent brain may be in part to how well his brain aged

Samples of his brain revealed he was missing a protein Lipofuscin, a not so well understood compound which contains lipid residues of lysosomal digestion that accumulates in the brain liver kidney, heart muscle, retina, adrenals, nerve cells, and ganglion cells.

Lipofuscin busting drugs could have a lot of potential for anti-aging therapies for the future.


AMD AOCC Compiler 1.1 Released For Zen CPUs "IndyWatch Feed Tech"

AOCC 1.1 is the second public release of the AMD Optimizing C/C++ Compiler designed for Ryzen/Threadripper/EPYC processors...


The Court of Appeals for the Federal Circuit (CAFC) Revisits Divided Infringement "IndyWatch Feed Tech"

Judge OMalley on Travel Sentry v Tropp

Divided infringement
Reference: Divided infringement

Summary: Alluding again to the Akamai case (a famous GNU/Linux user), the Federal Circuit debates the practice of working around patents in creative ways

IN a recent case which is not about patent scope, the Court of Appeals for the Federal Circuit (CAFC) ruled on divided infringement.

While more radical sites such as Watchtroll wrote about it, so did more moderate sites. This recent interpretation of the Akamai test may at the very least make it more difficult for accused infringers to have divided infringement cases dismissed at the summary judgement stage, said a blog a couple of weeks ago.

Divided infringement is explained below:

Enforcing a patent with claims that raise the specter of divided infringement can be a difficult plight for patent owners. Even under the more liberal standard set forth in the Federal Circuits en banc decision in Akamai v. Limelight, it has proven difficult for patent owners to establish the necessary levels of control or cooperation between two or more parties who together perform the steps of a method claim. However, the Federal Circuit decision in Travel Sentry, Inc. v. Tropp suggests that the requisite level of cooperation or control should be considered broadly. This recent interpretation of the Akamai test may at the very least make it more difficult for accused infringers to have divided infringement cases dismissed at the summary judgement stage.


The Federal Circuit was authored by Judge OMalley and joined by Judges Lourie and Taranto.

Divided infringem...


Re: SQUID-2018:2 Denial of Service issue in HTTP Message processing "IndyWatch Feed Tech"

Posted by Amos Jeffries on Jan 28


Amos Jeffries
The Squid Software Foundation


Re: SQUID-2018:1 Denial of Service issue in ESI Response processing "IndyWatch Feed Tech"

Posted by Amos Jeffries on Jan 28


Amos Jeffries
The Squid Software Foundation


The Anti-PTAB (Patent Trial and Appeal Board) Lobby is Partly Funded by the Koch Brothers and the Right Wing "IndyWatch Feed Tech"

All fees ought to be paid/accommodated for by the party that pursued bogus patents

Inside How the Federalist Society & Koch Brothers Are Pushing for Trump to Reshape Federal Judiciary
Reference: Inside How the Federalist Society & Koch Brothers Are Pushing for Trump to Reshape Federal Judiciary

Summary: The Conservative effort to bypass the legal process (e.g. by exploiting Native Americans for their immunity) and defend terrible patents; more examples of awful attempts to simply dodge justice like those defended by the blowhards of the patent microcosm (Watchtroll et al)

THE Patent Trial and Appeal Board (PTAB) is a wonderful thing. To oppose PTAB is to oppose patent quality itself.

Who would oppose PTAB? Check out this upcoming event from a right-wing think tank. In it, Microsofts front group the Business Software Alliance (BSA) is trying to change policy so as to enable a scam around PTAB (Michael Shore the "scammer" is there also, not just the Vice President of Global Policy at BSA). Its a stacked panel.

Who promotes this thing? Mr. Mossoff, a Koch-funded scholar best known for defending patent trolls and other predatory behaviour. He speaks of abuses of PTAB as if PTAB itself is abusive. Its like these people come from another planet.

Patently-O, which has engaged in endless PTAB bashing for a very long time, spoke about patent games the other day. A patent was deemed unpatentable, whereupon came not an objection but games:



"Blockchain" Stocks Collapse by 40% to 90% "IndyWatch Feed Tech"

Short sellers are in Nirvana with these creatures that had surged by hundreds or even thousands of percent in days after they announced a switch to "blockchain" in their business model or added "Blockchain" to their name. Their shares are now crashing.

I have written about a number of these outfits and their crazy share-price moves and their silly stock manipulation schemes on the way up. Now, not much later, here's an update on how they're doing on the way down.

This is a true gem. On January 9, the SEC halted trading in UBIA shares, citing two reasons: "accuracy" in UBI's disclosures and very funny trading activity. This froze the share price at $22. The trading halt came 11 days after I'd lambasted the shenanigans by the company and its executives. On Tuesday (January 23), shares trading resumed and have since plunged to $8.25.

What caused the surge was the December 15 announcement a mix of gobbledygook, hype, and silliness, as I called it that it had acquired a "Blockchain-empowered solutions provider," etc. etc. What was not in the announcement was that the acquired "assets" belonged to a Singapore corporation that is 95% owned by Longfin's CEO and chairman. This was disclosed in the SEC filings, but no one betting on this crazy stuff reads SEC filings.

[...] For speculators that were able to get into and out of these scams in time, it worked. A 1,000% gain obtained in a few days by hook or crook is nothing to sneeze at. But it's ending in tears for those who got into these scams too late and whose despised fiat currency just ended up providing the exit grease for early speculators. And short sellers, the lucky ones that got the timing right, are laughing all the way to the hated legacy banks.

But not all will get the timing right. Short sellers, when they want to take profits, have to buy their shares back in order to cover their short position, and many of the stocks are thinly traded, and covering a big short position can cause shares to bounce violently. So there will be some serious snap-backs, which might take the fun out of shorting these stocks.



Does our telomere length play a role in our health? (a look back) "IndyWatch Feed Tech"

The debate over telomeres length is now back in the spotlight Here is a brief review of the top articles on telomere length, telomerase and human diseases such as cancer

A review of the top articles on telomerase and telomere length which play a role in the chronic diseases of aging, such as cancer.


Its No Longer Simply About Patent Quantity. Its About Quality. "IndyWatch Feed Tech"

Says the patent microcosm

Writing a check

Summary: Quality assessment of US patents is becoming a hotter topic now that PTAB cleans up the mess and courts oftentimes reject asserted patents (which are, on average, considered to be better)

THE truth of the matter is, many patents are of low quality, but those that end up in court are typically the better ones. A few days ago we stumbled upon this post from Finnegan, Henderson, Farabow, Garrett & Dunner LLP. It tracks PTABs progress reassessing particularly bad US patents:

The Patent Trial and Appeal Board issued 61 IPR and CBM Final Written Decisions in December, including decisions following remands from the Federal Circuit, cancelling 852 (73.83%) instituted claims while declining to cancel 301 (26.08%) instituted claims. Patent owners conceded only 1 claim (0.09%) through motions to amend or disclaimer in cases reaching a final decision. For comparison, the cumulative average rate of instituted claims cancelled in IPR and CBM Final Written Decisions is about 75%.

investors have become much more sophisticated. Its no longer simply about patent quantity. Its about quality, Finnegan wrote in another new article. Heres the relevant part:

Not so long ago, during investment rounds, the IP due diligence typically conducted by a VC or CVC involved little more than asking, How many patents does your company have? A satisfactory number provided in response often ended the inquiry.

Today however, investors have become much more sophisticated. Its no longer simply about patent quantity. Its about quality. Now, investors often spend the time between the term sheet and the closing carefully assessing the blocking power of the investments patent portfolio. They examine the IP with a magnifying glass. If investors are not satisfied with the strength of a patent portfolio, they walk away from the deal or lower the valuation.



Week in review: Intel testing new Spectre fixes, ICO protection, cybercrooks abusing travel industry "IndyWatch Feed Tech"

Heres an overview of some of last weeks most interesting news, articles, and whitepapers: British teenager hacked top ranking US officials using social engineering How did British teenager Kane Gamble, who at the time was only 15 years old, manage to break into email accounts of the CIA and DNI chiefs, as well as gain access to a number of sensitive databases and plans for intelligence operations in Afghanistan and Iran? The answer is social More


More Than Just An Atari Look-Alike "IndyWatch Feed Tech"

The Raspberry Pi has been a boon for hackers with a penchant for retro gaming. Redditor [KaptinBadkruk] Wanted to get on board the game train and so built himself an Atari 2600-inspired Raspberry Pi 3 console!

A key goal was the option to play Nintendo 64 titles, so [KaptinBadkruk] had to overclock the Pi and then implement a cooling system. A heatsink, some copper pads, and a fan from an old 3D printer all secured by a 3D printed mount worked perfectly after giving the heatsink a quick trim. An old speaker and a mono amp from Adafruit and a few snags later had the sound set up, with the official RPi touchscreen as a display.

After settling on an Atari 2600-inspired look, [KaptinBadkruk] laboured through a few more obstacles in finishing it off namely, power. He originally intended for this  project to be portable, but power issues meant that idea had to be sidelined until the next version. However that is arguably offset by [KaptinBadkruk]s favourite part: a slick 3D Printed item box from Mario Kart front and center completes the visual styling in an appropriately old-meets-new way.

That item block isnt the first time a lightshow has accompanied an Atari console, but dont let that sto...


What to Do When Your Brain Insists Youre Always on a Boat - Facts So Romantic "IndyWatch Feed Tech"

Chris Perry had felt the world bobbing beneath her feet for nearly four months, suffering from a disorder rather poetically dubbed Mal de Debarquement syndrome.Photograph by Zvonimir Orec / Shutterstock

A few years ago, Chris Perry went on an Alaskan cruise with her family to celebrate her parents 50th wedding anniversary. When she boarded the massive Norwegian Sun cruise ship, she felt a little woozy and weird from the boats gentle rocking, she remembers, but the sensation quickly faded. Perry didnt feel seasick at all during the rest of the cruise, and spent a happy week marveling at the glaciers. But while standing in the Anchorage airport to catch her flight home to San Francisco, she suddenly felt the ground moving under her, undulating with the gentle rhythm of waves.

Many people have experienced this sensation after getting off a boat; they may sway or stagger until their vestibular system re-adapts to stationary ground and they get their land legs back. For most people, the feeling vanishes within minutes or hours. But in rare cases, and for mysterious reasons, the illusion persists for months or even years. Perry is one of those unlucky ones, a sufferer from the disorder rather poetically dubbed
Read More


Washington State Bill Would Make Hard-to-Repair Electronics Illegal "IndyWatch Feed Tech"

A number of states are considering right to repair bills, legislation which if passed would make it easier for individuals and repair shops to replace or repair electronics parts. reports that 17 states have already introduced bills this year and while most aim to make repair parts and manuals accessible, Washington's proposed legislation would straight up ban electronics that prevent easy repair. "Original manufacturers of digital electronic products sold on or after January 1, 2019, in Washington state are prohibited from designing or manufacturing digital electronic products in such a way as to prevent reasonable diagnostic or repair functions by an independent repair provider," says the bill. "Preventing reasonable diagnostic or repair functions includes permanently affixing a battery in a manner that makes it difficult or impossible to remove."

[...] Naturally, tech groups have jumped to make their opposition clear. In a letter to Morris, groups such as the Consumer Technology Association, the Telecommunications Industry Association and the Computer Technology Industry Association said the bill was "unwarranted" and added, "With access to technical information, criminals can more easily circumvent security protections, harming not only the product owner but also everyone who shares their network."

Source: Engadget

Original Submission

Read more of this story at SoylentNews.


How the (Likely) Next NSA/CyberCom Chief Wants to Enlist AI "IndyWatch Feed Tech"

A look at Lt. Gen. Paul Nakasones public statements about artificial intelligence, offense, and defense.

The Army general likely to be tapped to head U.S. Cyber Command and the NSA has some big plans for deploying cyber forces and using artificial intelligence in information attacks.

Lt. Gen. Paul Nakasone, who currently leads U.S. Army Cyber Command, is expected to nominated in the next few months to replace Adm. Michael Rogers, as first reported by The Cipher Brief (and confirmed by the Washington Post and a Pentagon source of our own). But caution is in order: the rumor mill says several other contenders are in the running, including Army Lt. Gen. William Mayville. Neither Cyber Command nor the Pentagon would comment about the potential nomination.


R600 Gallium3D Now Effectively At OpenGL 4.4, A Nudge Away From GL 4.5 "IndyWatch Feed Tech"

As a follow-up to the article a few days ago about nearly complete OpenGL 4.4~4.5 support for R600g, this pre-GCN older Radeon Gallium3D driver has landed in Mesa 18.1-dev Git support for its final OpenGL 4.4 extension...


NASA's Long-Lost IMAGE Satellite Found to be Still Transmitting "IndyWatch Feed Tech"

NASA's Imager for Magnetopause-to-Aurora Global Exploration, which was launched in 2000 and unexpectedly ceased operations in 2005, may still be operational and transmitting data:

After years in darkness, a NASA satellite is phoning home. Some 12 years since it was thought lost because of a systems failure, NASA's Imager for Magnetopause-to-Aurora Global Exploration (IMAGE) has been discovered, still broadcasting, by an amateur astronomer. The find, which he reported in a blog post this week, presents the possibility that NASA could revive the mission, which once provided unparalleled views of Earth's magnetosphere.

The astronomer, Scott Tilley, spends his free time following the radio signals from spy satellites. On this occasion, he was searching in high-Earth orbit for evidence of Zuma, a classified U.S. satellite that's believed to have failed after launch. But rather than discovering Zuma, Tilley picked up a signal from a satellite labeled "2000-017A," which he knew corresponded to NASA's IMAGE satellite. Launched in 2000 and then left for dead in December 2005, the $150 million mission was back broadcasting. It just needed someone to listen.

After Tilley revealed the discovery, word rocketed around to former members of IMAGE's science team, says Patricia Reiff, a space plasma physicist at Rice University in Houston, Texas, who was a co-investigator on the mission. "The odds are extremely good that it's alive," Reiff says. There also appears to be data beyond telemetry in the signal, perhaps indicating some of the satellite's suite of six instruments are working.

Original Submission

Read more of this story at SoylentNews.


DistroWatch Weekly, Issue 748 "IndyWatch Feed Tech"

This week in DistroWatch Weekly: Review: siduction 2018.1.0News: openSUSE 42.2 reaches EOL, SolydXK releases 32-bit community editions, building an Ubuntu robot, Ubuntu 18.04 to use Xorg by default, Mint improves testing processQuestions and answers: Desktop-friendly Debian and systemd boot timesReleased last week: Proxmox 5.0 "Mail Gateway", Netrunner 2018.01....


Ryzen Threadripper 1900X Should Report The Correct Temperature With Linux 4.16 "IndyWatch Feed Tech"

While the just-released Linux 4.15 kernel brings AMD Zen CPU temperature reporting support for Ryzen/Threadripper/EPYC processors, an oversight in the k10temp driver code is yielding an incorrect temperature for the Threadripper 1900X...


The Future Is Automated And Every Job Is At Risk [Automation, Pt. 1] "IndyWatch Feed Tech"

Robots are already changing jobs as an endless array of robots enter our everyday lives. From trucking to service work to high-end jobs like doctors and lawyers, this documentary explores how robotics and artificial intelligence are changing the workplace.

AJ+s documentary series on automation explores how advancements in artificial intelligence, robotics, machine learning and automated vehicles will affect jobs, cities and inequality. From trucking to radiology, new technology is already changing white collar and blue collar occupations, reshaping cities and concentrating wealth in the hands of the few. Robots are taking over the world as companies like Tesla, Amazon, Uber and Google are using robots to automate.

Subscribe for more videos:

Like us on Facebook:

Download the AJ+ app at

Follow us on Twitter:


Hackaday Links: January 28, 2018 "IndyWatch Feed Tech"

In case you havent heard, we have a 3D printing contest going on right now. Its the Repairs You Can Print Contest. The idea is simple: show off how you repaired something with a 3D printer. Prizes include $100 in Tindie credit, and as a special prize for students and organizations (think hackerspaces), were giving away a few Prusa i3 MK3 printers.

[Drygol] has made a name for himself repairing various home computers over the years, and this time hes back showing off the mods and refurbishments hes made to a pile of Amiga 500s. This time, hes installing some new RAM chips, fixing some Guru Meditations by fiddling with the pins on a PLCC, adding a built-in modulator, installing a dual Kickstart ROM, and installing a Gotek floppy adapter. Its awesome work that puts all the modern conveniences into this classic computer.

Heres an FPGA IoT Controller. Its a Cyclone IV and a WiFi module stuffed into something resembling an Arduino Mega. Heres the question: what is this for? There are two reasons you would use an FPGA, either doing something really fast, or doing something so weird normal microcontrollers just wont cut it. I dont know if there is any application of IoT that overlaps with FPGAs. Can you think of something? I cant.

Tide pods are flammable.

You know whats cool? Sparklecon. Its a party filled with a hundred pounds of LEGO, a computer recycling company, a plasmatorium, and a hackerspace, tucked away in an industrial park in Fullerton, California. Its completely chill, and a party for our type of people those who like bonfires, hammer Jenga, beer, and disassembling fluorescent lamps for high voltage transformers.



HPR2476: Gnu Awk - Part 9 "IndyWatch Feed Tech"

Awk Series Part 9 - printf The printf function allows for greater control over the output, in comparison to print. To follow along, you can either use these show notes or refer to the gawk manual. There are 3 main areas to cover: Basic printf syntax Format Control letters Format modifiers Syntax printf format, item1, item2, The big difference in the syntax of printf statements is the format argument. It allows you to use complex formatting and layouts for outputs. Unlike print, printf does not automatically start a new line after the function. This can be useful when you want to print all of the items in a column on a single line. For example, remember the example file, file1.csv: name,color,amount apple,red,4 banana,yellow,6 strawberry,red,3 grape,purple,10 apple,green,8 plum,purple,2 kiwi,brown,4 potato,brown,9 pineapple,yellow,5 Look at the difference between the following outputs: awk -F, 'NR!=1{print "Color", $2, "has", $3}' file1.csv and awk -F, 'NR!=1{printf "Color %s has %s. ", $2, $3}' file1.csv Control Letters Control letters control or cast the output to specific types. Use it as a way to convert ints to floats, ints to chars, etc. %c = to char. printf "%c", 65 prints a %i, %d = to int. printf "%i", 3.4 prints 3 %f = to float. printf "%c", 65 prints 65.000000 %e, %E = to scientific notation. printf "%e", 65 prints 6.500000e+01. If you use %E will use a capital E instead of e. %g = to either scientific notation or int. printf "%.2g", 65 prints 65, while printf "%.1g", 65 prints 6e+01 %s = to string. printf "%s", 65 prints 65 %u = to unsigned int. printf "%u", -6 prints 18446744073709551610 There are others. See documentation. Formatting N$ = positional specifier. printf "%2$s %1$s", "second", "first" n = spaces to the left of the string. -n = spaces to the right of string. space = prefix positive numbers with a space, negative numbers with a - + = prefix all numbers with a sign (either + or -) 0n = leading 0's before input. printf "%03i", 65 prints 065. ' = comma place holder for thousands. printf "%'i", 6500 prints 6,500 Below is an (crude) illustration of how I like to think when formatting output: 7 2 Color: RedXXXX Sum: X6 18 3 Total Sum:XXXXXXXX X34 See the following awk file BEGIN { FS=","; } NR != 1 { a[$2]+=$3; c+=$3; d+=1; } END { for (b in a) { printf "Color: %-7s Sum: %2in", b, a[b]; } print "----------------------" printf "%-18s %3in", "Total Sum:", c; printf "%-18s %3in&quot...


With Teen Mental Health Deteriorating Over Five Years, Theres a Likely Culprit "IndyWatch Feed Tech"

All signs point to the screen. Via: The Conversation: Around 2012, something started going wrong in the lives of teens. In just the five years between 2010 and 2015, the number of U.S. teens who felt useless and joyless classic symptoms of depression surged 33 percent in large national surveys. Teen suicide attempts []


Amazons New Supermarket Could Be Grim News for Human Workers "IndyWatch Feed Tech"

Sheelah Kolhatkar on whether the technology in Amazons new automated grocery store, Amazon Go, in Seattle, could eventually eliminate millions of retail jobs.



Distribution Release: Parrot Security OS 3.11 "IndyWatch Feed Tech"

Parrot Security OS is a Debian-based, security-oriented distribution featuring a collection of utilities designed for penetration testing and computer forensics. The project's latest release, Parrot Security OS 3.11, includes fixes for Metasploit and PostgreSQL as well as a new automobile hacking menu which includes tools for testing real....


Nissan Made Self-Parking Slippers Based on ProPilot Tech "IndyWatch Feed Tech"

Submitted via IRC for AndyTheAbsurd

It's even wackier than that autonomous chair Nissan made last year.

[...] Nissan this week unveiled its ProPilot Park Ryokan. Based on a traditional Japanese inn, or ryokan, the automaker added its tech to a number of items, including slippers, tables and floor cushions.

Each item is capable of moving back to a specified location after being moved, similar to how Nissan's ProPilot Park system is capable of using the steering, brakes and throttle to maneuver a vehicle into a parking space without human input. That means everything at the ryokan is always in the correct spot, and I imagine anyone staying there would get a kick out of watching slippers and tables move about without help.

But can they escape getting chewed on by the dog?


Original Submission

Read more of this story at SoylentNews.


CrossRAT keylogging malware targets Linux, macOS & Windows PCs "IndyWatch Feed Tech"

By Waqas

Another day, another malware This time, it is CrossRAT malware

This is a post from Read the original post: CrossRAT keylogging malware targets Linux, macOS & Windows PCs

Go Back:30 Days | 7 Days | 2 Days | 1 Day

IndyWatch Science and Technology News Feed Today.

Go Forward:1 Day | 2 Days | 7 Days | 30 Days

Sunday, 28 January


The 4.15 kernel is out "IndyWatch Feed Tech"

Linus has released the 4.15 kernel. "After a release cycle that was unusual in so many (bad) ways, this last week was really pleasant. Quiet and small, and no last-minute panics, just small fixes for various issues. I never got a feeling that I'd need to extend things by yet another week, and 4.15 looks fine to me." Some of the more significant features in this release include: the long-awaited CPU controller for the version-2 control-group interface, significant live-patching improvements, initial support for the RISC-V architecture, support for AMD's secure encrypted virtualization feature, and the MAP_SYNC mechanism for working with nonvolatile memory. This release also, of course, includes mitigations for the Meltdown and Spectre variant-2 vulnerabilities though, as Linus points out in the announcement, the work of dealing with these issues is not yet done.


Supersonic air travel just took another big step toward rebirth "IndyWatch Feed Tech"


We are one step closer to an affordable reboot of supersonic flight. Japan Airlines (JAL) has invested $10 million in the Denver-based aerospace company, Boom Supersonic, thats planning to resurrect the method of travel. In exchange for their funding, JAL will be able to pre-order 20 of the new aircraft. The airlines president, Yoshiharu Ueki, said in a press release from December 5: Through this partnership, we hope to contribute to the future of supersonic flight with the intent of providing more time to our valued passengers while emphasizing flight safety.

Its been 14 years since British Airways and Air France grounded their Concorde fleets, and commercial air travel hasnt hit supersonic speeds since. Fourteen of these planes ferried first-class passengers from New York to London at speeds of 1,353 mph (2177.44 kph) twice as fast as the speed of sound making the jaunt across the pond in only 3.5 hours. Thats about half the time it takes a normal passenger plane to cross the Atlantic Ocean.


Social media giants pressed on foreign bots after memo campaign "IndyWatch Feed Tech"

An internet campaign pushing for the release of a classified memo produced by Republicans on the House Intelligence Committee has brought new scrutiny to how foreign groups can use social media to manipulate U.S. politics.Social media giants Twitter...


Linux 4.15 Kernel Released, Time For The Linux 4.16 Merge Window "IndyWatch Feed Tech"

Linus Torvalds has released the Linux 4.15.0 kernel after nine release candidates...


ESP32 Makes for Worlds Worst Radio Station "IndyWatch Feed Tech"

We can say one thing for [bitluni]: the BOMs for his projects, like this ESP32 AM radio transmitter, are always on the low side. Thats because he leverages software to do jobs traditionally accomplished with hardware, always with instructive results.

In this case, the job at hand is creating an RF oscillator in the broadcast AM band and modulating some audio onto it. From his previous experience using an ESP32 to watch video on an oscilloscope, [bitluni] knew that the microcontrollers DACs were up to the task of producing an 800-kHz signal, and he managed to produce a more-or-less sine wave carrier with some clever code. His sketch takes data from a header file, modulates it onto the carrier, and sends it out over the ether using a short stub of wire for an antenna. The range is severely limited, but for what it is, it gets the job done and shows the basics. And as a bonus, [bitluni] included a bit of JavaScript that turns an audio file into a header file thats ready to go out over the airwaves for all your trolling needs.

If youre looking for a little more range for your low power transmitter and youre a licensed amateur operator, you might want to explore the world of QRP radio.


Distribution Release: Redcore Linux 1801 "IndyWatch Feed Tech"

Redcore Linux is a Gentoo-based distribution designed to be run on desktop and laptop computers. The Redcore project has announced the release of Redcore Linux 1801 which reduces memory requirements for installation and includes fixes for the Meltdown and Spectre CPU bugs. "It is my pleasure to announce....


Justify Your Alpha: A Response to "Redefine Statistical Significance" "IndyWatch Feed Tech"

Psychologist Danil Lakens disagrees with a proposal to redefine statistical significance to require a 0.005 p-value, and has crowdsourced an alternative set of recommendations with 87 co-authors:

Psychologist Danil Lakens of Eindhoven University of Technology in the Netherlands is known for speaking his mind, and after he read an article titled "Redefine Statistical Significance" on 22 July 2017, Lakens didn't pull any punches: "Very disappointed such a large group of smart people would give such horribly bad advice," he tweeted.

In the paper, posted on the preprint server PsyArXiv, 70 prominent scientists argued in favor of lowering a widely used threshold for statistical significance in experimental studies: The so-called p-value should be below 0.005 instead of the accepted 0.05, as a way to reduce the rate of false positive findings and improve the reproducibility of science. Lakens, 37, thought it was a disastrous idea. A lower , or significance level, would require much bigger sample sizes, making many studies impossible. Besides. he says, "Why prescribe a single p-value, when science is so diverse?"

Lakens and others will soon publish their own paper to propose an alternative; it was accepted on Monday by Nature Human Behaviour, which published the original paper proposing a lower threshold in September 2017. The content won't come as a big surprisea preprint has been up on PsyArXiv for 4 monthsbut the paper is unique for the way it came about: from 100 scientists around the world, from big names to Ph.D. students, and even a few nonacademics writing and editing in a Google document for 2 months.

Lakens says he wanted to make the initiative as democratic as possible: "I just allowed anyone who wanted to join and did not approach any famous scientists."

Original Submission

Read more of this story at SoylentNews.


28jan2018 "IndyWatch Feed Tech"


GTK+ 4.0 Might Be Ready To Ship This Year With Its Many Toolkit Improvements "IndyWatch Feed Tech"

Famed GNOME developer Matthias Clasen of Red Hat provided an update on the state of the GTK4 tool-kit during this week's event in Brno...


Piracy Can Help Music Sales of Many Artists, Research Shows "IndyWatch Feed Tech"

The debate over whether online piracy helps or hurts music sales has been dragging on for several decades now.

The issue has been researched extensively with both positive and negative effects being reported, often varying based on the type of artist, music genre and media, among other variables.

One of the more extensive studies was published this month in the peer-reviewed Information Economics and Policy journal, by Queens University economics researcher Jonathan Lee.

In a paper titled Purchase, pirate, publicize: Private-network music sharing and market album sales he examined the effect of BitTorrent-based piracy on both digital and physical music sales.

The file-sharing data was obtained from an unnamed private BitTorrent tracker and covers a data set of 250,000 albums and more than five million downloads. These were matched to US sales data for thousands of albums provided by Nielsen SoundScan.

Based on the torrent tracker data, Lee finds that piracy can boost sales of mid-tier artists, both for physical CDs and digital downloads. For the most popular artists, this effect is reversed. In both cases, the impact is the largest for digital sales.

I now find that top artists are harmed and mid-tier artists may be helped in both markets, but that these effects are larger for digital sales, Lee tells TorrentFreak. This is consistent with the idea that people are more willing to switch between digital piracy and digital sales than between digital piracy and physical CDs.

The findings lead to the conclusion that there is no ideal one-size-fits-all response to piracy. In fact, some unauthorized sharing may be a good thing.

This is in line with observations from musicians themselves over the past years. Several top artists have admitted the positive effects of piracy, including Ed Sheeran, who recently said that he owes his career to it.

I know thats a bad thing to say, because Im part of a music industry that doesnt like illegal file sharing, Sheeran said in an...


Dave Davies, Ambassador and Advisor at Iron & Earth, joins our Sustainability Board. "IndyWatch Feed Tech"

Dave Davies, Ambassador and Advisor at Iron and Earth, joins our Sustainability Board.


How to add network bridge with nmcli (NetworkManager) on Linux "IndyWatch Feed Tech"

I am using Debian Linux 9 stretch on the desktop. I would like to create network bridge with NetworkManager. But, I am unable to find the option to add br0. How can I create or add network bridge with nmcli for NetworkManager on Linux? A bridge is nothing but a device which joins two local Continue reading "How to add network bridge with nmcli (NetworkManager) on Linux"

The post How to add network bridge with nmcli (NetworkManager) on Linux appeared first on nixCraft.


GM Takes An Unexpected Lead In The Race To Develop Autonomous Vehicles "IndyWatch Feed Tech"

[...] The most important reason for GM's comeback, though, is its success in convincing investors that it is a leader not just among established carmakers, but among tech firms, too. It has rapidly accelerated from the position of an also-ran in the field of autonomous vehicles to apparent leader. A scorecard issued annually by Navigant, a consultancy, puts GM ahead of the AV pack of carmakers and tech firms, with Alphabet's Waymo in second place.

That GM is ahead of Silicon Valley's risk-takers may seem surprising. But earlier investments, which were once looked on with scepticism, seem to be paying off. Alan Batey, GM's president for North America, points to the manufacturing of mass-market long-range EVs, where the firm has a lead. The Chevy Bolt, the world's first such vehicle, has been on sale for over a year, beating Tesla's Model 3 and the new Nissan LEAF to market.

Read more of this story at SoylentNews.


Distribution Release: DietPi 6.0 "IndyWatch Feed Tech"

DietPi is a Debian-based Linux distribution, primarily developed for single board computers such as the Raspberry Pi. DietPi also runs on other architectures, including x86 computers and Odroid machines. The project's latest release, DietPi 6.0, is based on Debian 9 "Stretch". "All DietPi images have been re-created. Existing....


Arcade Style Computer Hotkeys "IndyWatch Feed Tech"

Prolific maker [Sean Hodgins] has taken the wraps off of his latest one-day build, and as usual, it takes the kind of spare parts most people reading Hackaday will have in their parts bins and turns it into something fun and useful. This time around, he takes a bunch of spare arcade-style buttons he had from a previous project and combines them with an Adafruit Trinket (SAMD21 flavor) to make a USB input device for his computer.

[Sean] uses 1/4 inch acrylic to make the case, though he does mention that it could just as easily be 3D printed. But using the acrylic is easy and gives a nice glossy look to the final hardware. With a saw and a drill press you can make some very professional cases out of acrylic, which goes to show that you dont necessarily need to have a high end 3D printer to create great looking enclosures.

As explained in the video, the Adafruit Trinket is not strictly necessary for this build, its just what [Sean] had lying around. Any microcontroller that can present itself to the operating system as a USB Human Interface Device (HID) will work fine for a project like this.

Software wise, a modified Arduino demo program is used to equate the states of the digital pins to pre-defined key combinations to be sent to the computer....


Melissa Mahler, General Counsel at The Mahler Group, joins our Futurists Board. "IndyWatch Feed Tech"

Melissa Mahler, General Counsel at The Mahler Group, joins our Futurists Board.


Systemd 237 Released With WireGuard Support, Keyboard See-Saw/Rocker Changes "IndyWatch Feed Tech"

Not only is Linux 4.15 coming today but the first systemd stable release of 2018 is also now available...


In the United States, Software Patents Are Still Consistently Invalidated Under 35 U.S.C. 101 "IndyWatch Feed Tech"

No entry sign

Summary: A look at some of the latest decisions, rants, and frustration expressed by the patent microcosm over the elimination of many software patents in the United States (US)

PATENT certainty matters. Consistency across judgments matters. Predictability matters. If all those software patents perish in courts, will their holders bother asserting anymore (i.e. suing)? The patent litigation numbers are already down and they go down every year. Ever since Alice we are seeing an encouraging pattern; the US Supreme Court objects to revisiting the matter and the Court of Appeals for the Federal Circuit (CAFC) gets more hostile towards software patents each year. This shapes so-called caselaw in a favourable fashion because software patents are ebbing away.

Most of the articles and tweets we find are rants about Alice and/or promotion of software patents, courtesy of people who never developed any software in their entire lifetime. Its almost amusing to watch their agony; they try to attribute this loss to software, but in reality people who actually develop software are pleased to see the demise of software patents.

Challenges to patent eligibility under 35 U.S.C. 101 have become so routine in patent litigation, says the patent microcosm, expressing the usual concern over Alice Corp. Pty. Ltd. v CLS Bank Intl. To quote this new example:

Challenges to patent eligibility under 35 U.S.C. 101 have become so routine in patent litigation that it is easy to overlook the opinions that seem to issue almost daily from the district courts and, less frequently, from the Federal Circuit. If one were to judge solely by the tenor of recent cert petitions filed with the Supreme Court, however, one would likely conclude that the lower courts are still fundamentally confused as to how to properly apply the Supreme Courts two-step analysis for ineligible abstract ideas set forth in Alice Corp. Pty. Ltd. v. CLS Bank Intl, 134 S. Ct. 2347 (2014). For example, an amicus brief in support of a cert petition in Recognicorp, LLC v. Nintendo, No. 17-645 (denied, Jan. 8, 2018) argues that, at least in the context of data processing patents, [t]he lower courts and the PTO hav...


GIMP Picks Up Better Debugging Support, Backtrace GUI "IndyWatch Feed Tech"

Adding to the list of features for the long overdue GIMP 2.10 release is better debugging support...


Senate Investigators Google Their Way to $766 Million of Fentanyl "IndyWatch Feed Tech"

With Google, Bitcoins, and USPS, Feds realize it's stupid easy to buy fentanyl

A congressional report released Wednesday lays out just how easy it is for Americans to buy the deadly opioid fentanyl from Chinese suppliers online and have it shipped to them via the government's own postal service. The report also lays out just how difficult the practice will be to stop.

After Googling phrases such as "fentanyl for sale," Senate investigators followed up with just six of the online sellers they found. This eventually led them to 500 financial transaction records, accounting for about $766 million worth of fentanyl entering the country and at least seven traceable overdose deaths.

[...] "Thanks to our bipartisan investigation, we now know the depth to which drug traffickers exploit our mail system to ship fentanyl and other synthetic drugs into the United States," Republican Senator Rob Portman of Ohio said in a statement. "The federal government can, and must, act to shore up our defenses against this deadly drug and help save lives."

Related: Opioid Addiction is Big Business
Heroin, Fentanyl? Meh: Carfentanil is the Latest Killer Opioid
Tip for Darknet Drug Lords: Don't Wear Latex Gloves to the Post Office
Cop Brushes Fentanyl Off Uniform, Overdoses
Congress Reacts to Reports that a 2016 Law Hindered DEA's Ability to go after Opioid Distributors
Opioid Crisis Official; Insys Therapeutics Billionaire Founder Charged; Walgreens Stocks Narcan

Original Submission

Read more of this story at SoylentNews.


Googles AI-powered Clips camera is now on sale "IndyWatch Feed Tech"

Clips camera now available for pre-order in the Google Play Store

Back in October 2017 at the Made by Google hardware event, Google had announced an AI (artificial intelligence) powered camera called Clips that captures images and video on your behalf. The tech giant has now quietly put the Clips camera on sale.

This year, people will take about a trillion photos, and for many of us, that means a digital photo gallery filled with images that we wont actually look at, Google writes. This is especially true with new parents, whose day-to-day experience is full of firsts.

During moments that can feel precious and fleeting, users are drawn to their smartphone cameras in hopes of capturing and preserving memories for their future selves. As a result, they often end up viewing the world through a tiny screen instead of interacting using all their senses.

It measures just 2.0 x 2.0 x 0.8 and weighs a mere 1.5 ounces. The lightweight, autonomous, hands-free camera that is tiny in size comes with Moment IQ, a machine learning algorithm that lets it figure out whos important and the right time to capture images based on expressions, lighting and framing.

Google Clips is smart enough to recognize great expressions, lighting and framing. So the camera captures beautiful, spontaneous images. And it gets smarter over time, Googles website reads.

Google Clips camera has a low-light mode and automatically adjusts its resolution according to the situation. Further, the camera comes with a 130-degree lens to fit more of the scene in the frame and is protected with Gorilla Glass. It can capture up to 15 frames per second and later use machine intelligence to automatically select the best shots from that burst mode.

The square-shaped camera, which measures about 2-inch, comes with a 12-megapixel sensor and automatically shoots images and small video loops. There is also a manual shutter button and power can be controlled via twisting the lens. The most interesting part is that the camera comes with a clip stand, so that it can stand on its own. On the other hand, the camera can stand upright on its flat base even without the clip.

The camera comes with 16GB of internal storage, and a battery which can function for up to three hours of capture with a Wi-Fi Direct for transferring photos to the smartphone. Currently, the apps smartphone compatibility is limited and is compatible with the Google Pixel, the Samsung Galaxy S7 and S8 running on Android 7.0 or greater, as well as iPhones 6 and up running on iOS 10 and greater. The device includes Bluetooth LE and a USB-C port, wherein the latter is used to recharge the camera.

What is intere...


Linux 4.15 Is Set To Sail Today With AMDGPU DC, Zen Temperature Monitoring, RISC-V "IndyWatch Feed Tech"

After going through nine weekly release candidates, the Linux 4.15 kernel is set to be released today as the first major stable update of 2018...


Japan-based digital exchange Coincheck to refund to customers after cyberheist "IndyWatch Feed Tech"

Coincheck announced it will refund about $400 million to 260,000 customers after the hack, the company will use its own funds.

On Friday the news of the hack of the Japan-based digital exchange Coincheck caused the drop in the value of the major cryptocurrencies, the incident had a significant impact on the NEM value that dropped more than 16 percent in 24 hours.

The company suspended the operations of deposits and withdrawals for all the virtual currencies except Bitcoin, the exchange announced it was investigating an unauthorised access to the exchange.

According to the company, the hackers stole worth half a billion US dollars of NEM, the 10th biggest cryptocurrency by market capitalization.

The hackers stole 58 billion yen ($530 million), an amount of money that is greater than the value of bitcoins which disappeared from MtGox in 2014.

Coincheck was founded in 2012, it is one of the most important cryptocurrency exchange in Asia.

The company announced it will refund about $400 million to customers after the hack. 

Coincheck will use its own funds to reimburse about 46.3 billion yen to its 260,000 customers who were impacted by the cyberheist.

At 3 am (1800 GMT) today, 523 million NEMs were sent from the NEM address of Coincheck. Its worth 58 billion yen based on the calculation at the rate when detected, said Coincheck COO Yusuke Otsuka.

Were still examining how many of our customers are affected,

Experts believe that the Financial Services Agency will to take disciplinary measures against Coincheck.

It has been estimated that as many as 10,000 businesses in Japan accept bitcoin and bitFlyer, nearly one-third of global Bitcoin transactions in December were denominated in yen.The Cryptocurrencies, and in particular Bitcoin, are very popular in Japan, in April, the Bitcoin was proclaimed by the local authorities as legal tender.

According to Japanese bitcoin monitoring site, in November, yen-denominated bitcoin trades reached a record 4....


Is Torrenting Legal? "IndyWatch Feed Tech"

Imagine this: You have a file that you wish to download to your computer. But it is so heavy it requires a high bandwidth. If you proceed to do it, it may take you hours or even days to complete the process.

How do you speed it up? This is where the idea of torrent comes in.

Torrenting (or using torrent) has been around for a couple of years, but because not many understand how it truly works, it has also been a favorite subject of controversy. Is it illegal to download files from the system? Before we answer the question, lets discuss its process.

How Torrents Work?

Torrents have been compared with the peer-to-peer system because they both involve sharing files. But they are two different methods.

In the peer-to-peer system, all the users make use of a program or a software to download the files. If you wish to download a file, you, therefore, reach out to other users who are hosting them.

The big problem with this setup is you can be on the losing end. If a person suddenly turns off his computer, for example, after he downloaded the file, you cannot complete the process. For this reason, the peer-to-peer software or program often penalizes the behavior usually by booting you out.

Torrenting came later. The objective is to hasten the downloading of what could have been a much heavier file by breaking it down, putting it in different places, and then piecing it all together simultaneously once you want to download it.

As an illustration, lets say you have file A, which is about 3 GB. In the torrent system, it becomes file A-1, A-2, A-3, etc. Different users host this file. Now you want to download it, the system then picks A-1, A-2, A-3, and all the others, putting them all together to complete the file. Because the process is simultaneous, it doesnt hurt the bandwidth, and it doesnt corrupt the file.

Torrent also has other advantages against the peer-to-peer system. It doesnt rely on a program, so it doesnt take eat a space in your memory. Rather, it is web-based. Second, it doesnt allow people to drop out once they already have the files through a rewards system: the more files you host and share, the faster the download process is.

Is Torrenting Legal?

Is Torrenting Illegal?

There are many ways to use torrent, but many of the users tend to depend on torrent for one reason: downloading of heavy content such as TV shows and movies....


Cool Cousin to Implement Blockchain in Order to Become World First P2P Travel Agency "IndyWatch Feed Tech"

Tourism is an industry whose size and value creation can compete with any other industry in the world. People move around the world for different reasons and at different times, however, the unique cultures of travel locations remain peculiar and best understood by the locals.

The tourism industry is a combination of various other fields in smaller bits that determine the outcome of travel experiences, especially for people traveling to unfamiliar destinations.

People travel for different reasons such as work, vacation, exploration, e.t.c. Hence, depending on their specific reasons, individuals arriving to new destinations normally need some level of guidance either for their entire trip or at least the initial stages before they settle.

The impact of online agencies

Mainstream travel agencies have played significant roles in enabling tourists achieve convenience in their trips. However, the innovation introduced by online based platforms has taken the industry to new heights, placing it among the worlds largest industries with a market turnover of over $2.3 trillion in 2016 alone. A growth which saw the industrys user base experience an unprecedented growth of 220% in six months.

Cool Cousin to Implement Blockchain in Order to Become World First P2P Travel Agency

Online booking platforms have registered staggering figures that make the mainstream outlets look like childs play. Examples include, Priceline ($85B), Airbnb ($30B), Yelp ($3.5), TripAdvisor ($5B) among others. These platforms thrive on the globalized nature of the internet which affords the option of public reviews and opinions, thereby presenting the semblance of fairness in terms of ratings. However, the possibility of foul play puts the reliability of these platforms in question. The actions of centralized platforms that influence reviews to make their services attractive in a competitive market is a weakness that is currently hurting the industry.

Information overload and biased content in the centralized travel market, makes it impossible for travelers to find relevant info. No matter how hard they try to avoid dubious recommendations, much of their vacation time (and dime) is wasted on mediocre places that dont fit their vibe, says Itai Nagler, CEO and founder of Cool Cousin

Localized participation



The Tiniest Working 68K System "IndyWatch Feed Tech"

68000 microprocessors appeared in the earliest Apple Macintoshes, the Commodore Amiga and Atari ST, and the Sega Genesis/Mega Drive among other familiar systems. If you were alive during the 16-bit era, there is a good chance that you will have owned a Motorola 68000 or one of its derivatives in a computer or game console. By the end of the 1990s it was clear that the 68K line had had its day on the desktop, but a new life for it at the consumer level was found in the PDA market. The first Motorola Dragonball was a 68000 series system-on-chip, and it was a few of these in a BGA package that [Plasmode] had in stock after ordering them in error believing them to be in a different package.

The Dragonball 68328 has an interesting bootstrap mode allowing it to run with no external ROM or RAM, and with only a serial connection to the outside world. Recognising this as having the potential for the smallest possible 68K system, he proceeded to make it happen with some impressive soldering direct to the solder balls of an upturned BGA package.

On a piece of PCB material are simply the 68328, a 32.768kHz crystal and capacitors, a MAX232 circuit for an RS232 serial connection, a reset button, and a power regulator. Using the Motorola DOS debug software which is still available for download after all these years, he was able to connect to his tiny 68K computer and run code. Its not entirely useful, but of all the possible 68K configurations it has to be the smallest.

This isnt the first minimal computer using only a processor chip and serial link, in the past weve shown you a PDP-11 in the same vein.


Counting Patents is Not Measuring Innovation and Checking Patents is Often Assessing Vapourware "IndyWatch Feed Tech"

More patents mean patent maximalism, not necessarily innovation (an old myth like griffins)

Mythological creature

Summary: The tough reality about patents, which are basically pieces of paper with some text and drawings, not what corporate media wants us to think of them (innovation)

FIVE DAYS AGO we saw the headline South Dakotans got more patents in 2017 than any previous year (sounds great, doesnt it?).

As patent numbers generally increase at a growing pace (now at an all-time high at the USPTO), this is a pretty meaningless thing to note; its probably true in most US states, not just South Dakota. The subtle implication is a corny assertion that more patents directly lead to more innovation however one actually defines the term (some have made it synonymous with patents).

The subtle implication is a corny assertion that more patents directly lead to more innovation however one actually defines the term (some have made it synonymous with patents).Theres still this tendency in local media to glorify newly-granted patents in the area (here are a couple of new examples [1, 2]). Theres also the assumption that patents imply ongoing/imminent implementation of some product (here is a new example of Samsung [1, 2] and of Sony). In practice, as latest news from China serves to show [...


Mesa 18.0 Features Include Many OpenGL/Vulkan Improvements, Intel Shader Cache & Extras "IndyWatch Feed Tech"

Mesa 18.0 is currently being prepared for release by mid-February and is yet another feature-packaged, quarterly update to this open-source 3D graphics driver stack with significant improvements for OpenGL and Vulkan support and performance.


AI Potentially Deciphers Voynich Manuscript "IndyWatch Feed Tech"

Arthur T Knackerbracket has found the following story:

Greg Kondrak, a computer scientist from University of Alberta's AI lab, claims to have begun decoding the mystery behind the unknown text with his novel algorithm, CTVNews reported.

[...] It is believed that the manuscript is somehow related to women's health but there is no solid clue, according to the report. People have made wild guesses regarding the code, with at least eight making firm claims only to be debunked later on.

Kondark, however, took a different approach towards solving the problem artificial intelligence. "Once you see it, once you find out the mystery, this is a natural human tendency to solve the puzzle," the computer scientist told CTVNews. "I was intrigued and thought I could contribute something new."

He and his co-author Bradley Hauer combined novel AI algorithms with statistical procedures to identify and translate the language. The approach, which had been used to translate United Nations Universal Declaration of Human Rights in 380 languages, came in handy and suggested the language was Hebrew, albeit with critical tweaks.

They found that the letters in every word had been reordered and the vowels were dropped in the code. The first complete sentence which the AI decrypted read, "She made recommendations to the priest, man of the house and me and people." One section of the text carries words that translate into "farmer", "light", "air", and "fire".

The translated line could be the starting of something big but it is a long way to go for Kondark, who stresses on the need of complementary human assistance. However, it is not clear how accurate the translation really is.

"Somebody with very good knowledge of Hebrew and who's a historian at the same time could take this evidence and follow this kind of clue," he said while highlighting the need of someone who could make sense of the translated text.

For those who may not be familiar with the manuscript, see Voynich Manuscript at Wikipedia, or read it yourself at (Javascript required).

Original Submission



Open-Source Project Trying To Map Vulkan Onto Direct3D 12 & Metal "IndyWatch Feed Tech"

While we are seeing exciting projects at the moment about mapping Direct3D 11 over Vulkan (as well as D3D9 and D3D12 over Vulkan projects too), there are new open-source projects for mapping Vulkan over Direct3D 12 and Metal...


Links 28/1/2018: New Fedora 27 ISO, New Release of Netrunner Rolling "IndyWatch Feed Tech"

GNOME bluefish



  • Desktop

    • Maxim Burgerhout: User-friendly Windows

      So for some app my kids want to use, I needed to setup Windows. And a printer. I have a Samsung M2070W, and I have had it for years. It has not always been easy to use (hell no!), but it generally works after a few kicks in the groin.

      Ive used it with my iPad, with various Android devices, and various Linux distributions. And now, I needed to set it up in Windows.


      I guess. Unless you count the fact that many devices need vendor drivers to begin with, because Windows doesnt ship with them.

      Well anyway, luckily, Linux seems to identify and use my printer just fine.

    • The Best Apps and Tools for Chromebooks

      Were going to break this down into different categories to help make it easier to find what youre looking for. The one thing to note here is that Android apps are placed throughout the various categories where they make the most sense, but we also include a section at the end for Android apps that dont fall into any one specific category. Pretty simple, really....


Allwinner SUNIV Old ARM9-Based SoCs Worked On For Upstream Linux Kernel Support "IndyWatch Feed Tech"

From the mid-2000's to 2011 Allwinner was marketing their F-Series processors with ARM9 32-bit RISC processors while finally in 2018 these SoCs might have upstream Linux kernel support...


Solus Releases Linux Driver Management 1.0 "IndyWatch Feed Tech"

The Solus Project this week released Linux Driver Management 1.0, a library created by this innovative Linux distribution for enumerating system components and detecting matches between said components and packages/drivers providing additional functionality...


OpenSUSE Rolling Out Retpoline Support, Xen Spectre/Meltdown Mitigation "IndyWatch Feed Tech"

SUSE's Richard Brown has issued a status update around openSUSE's ongoing mitigation of the Meltdown and Spectre vulnerabilities...


Biologic Additive May Lead to Self-Healing Concrete "IndyWatch Feed Tech"

If you get a cut or break a bone, your body heals itself. This everyday miracle is what inspired [Congrui Jin] to try to find a way to make concrete self-healing. The answer she and her colleagues are working on might surprise you. They are adding fungus to concrete to enable self-repair.

It isnt just any fungus. The conditions in concrete are very harsh, and after testing twenty different kinds, they found that one kind  trichoderma reesei could survive inside concrete as spores. This fungus is widespread in tropical soil and doesnt pose any threat to humans or the ecology. Mixing nutrients and spores into concrete is easy enough. When cracks form in the concrete, water and oxygen get in and the spores grow. The spores act as a catalyst for calcium carbonate crystals which fill the cracks. When the water is gone, the fungi go back to spores, ready to repair future cracking.

It isnt clear to us why the fungi dont grow on the outside, but we can imagine several solutions. The research is in early stages, so perhaps they dont fully know yet, either. Earlier work proposed using bacteria in some sort of encapsulation to do this same trick (see the second video, below). However, the fungus creating its own hardy spore that can survive inside the concrete would simplify that greatly.

You might wonder why small cracks in concrete are a big deal. Concrete isnt that strong, so we build steel inside it to produce stronger structures. However, water and oxygen dont agree with steel, so cracks in the concrete eventually damage the interior steel and cause failures. If the cracks self-seal, it would limit the exposure of the steel to the elements.

Adding biological material to building material is an interesting idea and something that probably isnt outside the realm of the common garage or basement lab. Weve seen 3D printing filament made from algae, for example. Fungus might even help make better batteries. Not to mention, weve seen people experimenting with bioprinting. This could be an area where hackers get in on the action early and make real contributions. This might even help you get comfortable with the idea of starships running on mushrooms.



Arrr: Top Tips to Spot The Differences Between Pirate and Legal Sites "IndyWatch Feed Tech"

Theres a persistent theory that people exist who are using pirate sites but dont realize that theyre unauthorized and/or illegal. While that seems likely, its hard to believe the volumes are particularly significant.

Nevertheless, numerous campaigns have attempted to enlighten consumers as to what is and isnt legal and this week the Federation Against Copyright Theft raised the issue once again.

Tagging onto UK anti-fraud awareness campaign Take Five, the anti-piracy outfit asked people to take five minutes to consider the legality of the site or service theyre currently consuming.

FACTs advice above is basically sound. They ask people to do their research on the sites FindAnyFilm and GetItRight, both of which should give consumers an idea of where content can be obtained legally. Trouble is, neither resource is comprehensive, so five minutes of research could turn into ten or fifteen, by which time people could get bored of trying to do the right thing.

So, with this in mind, here are a few light-hearted tips to help people spot whether the site theyre using is authorized by the movie industry or a product of a swashbuckling mind.

Does the site want your name, address and life history?

If the site youre accessing looks really polished, has a positive Wikipedia page, but wont give you anything more than a trailer without handing over your full identity and credit card details, this is probably a legal platform.

Since they have to license movies from Hollywood and other filmmakers, sites like these cost a lot of money to run. As a result, they want your money to pay the bills and they like to make sure you can pay up front.

When you think about it, it makes perfect sense. No money, no access capiche?

Does the site look polished but doesnt ask for a dime?

If the site youre looking at seems like the one mentioned above but doesnt seem to care who you are, this is starting to look...


Death Notice: Moore's Law. 19 April 1965 2 January 2018 "IndyWatch Feed Tech"

Submitted via IRC for AndyTheAbsurd

Hammered by the finance of physics and the weaponisation of optimisation, Moore's Law has hit the wall, bounced off - and reversed direction. We're driving backwards now: all things IT will become slower, harder and more expensive.

That doesn't mean there won't some rare wins - GPUs and other dedicated hardware have a bit more life left in them. But for the mainstay of IT, general purpose computing, last month may be as good as it ever gets.

Going forward, the game changes from "cheaper and faster" to "sleeker and wiser". Software optimisations - despite their Spectre-like risks - will take the lead over the next decades, as Moore's Law fades into a dimly remembered age when the cornucopia of process engineering gave us everything we ever wanted.

From here on in, we're going to have to work for it.

It's well past the time that we move from improving performance by increasing clock speeds and transistor counts; it's been time to move on to increasing performance wherever possible by writing better parallel processing code.


Original Submission

Read more of this story at SoylentNews.


Iran-linked APT OilRig target IIS Web Servers with new RGDoor Backdoor "IndyWatch Feed Tech"

The Iran-linked cyber-espionage group tracked as OilRig started using a backdoor subbed RGDoor to target Internet Information Services (IIS) Web servers.

The Iran-linked cyber-espionage group tracked as OilRig started using a backdoor subbed RGDoor to target Internet Information Services (IIS) Web servers.

The OilRig hacker group is an Iran-linked APT that has been around since at least 2015, when targeted mainly organizations in the financial and government sectors, in the United States and Middle Eastern countries.

The hackers used the RGDoor backdoor to target Middle Eastern government organizations and financial and educational institutions.

According to the researchers, RGDoor is a secondary backdoor that allows the hackers to regain access to a compromised Web server when primary TwoFace webshell is discovered and removed.

OilRig hackers are using the TwoFace webshell since at least June 2016, the backdoor

Unlike TwoFace, the actors did not develop RGDoor in C# to be interacted with at specific URLs hosted by the targeted IIS web server. Instead, the developer created RGDoor using C++, which results in a compiled dynamic link library (DLL). states the analysis from PaloAlto Networks.

The DLL has an exported function named RegisterModule, which is important as it led us to believe that this DLL was used as a custom native-code HTTP module that the threat actor would load into IIS. 

The attackers exploited the IIS 7 functionality that allows developers to create modules in C++ to extend IIS capabilities, in this way they could carry out custom actions on requests

The native-code modules can be installed either in the IIS Manager GUI or via the command-line using the appcmd application, Palo Alto has explains.



Naked mole rats defy the biological law of aging "IndyWatch Feed Tech"

The first study to analyze the life histories of thousands of naked mole rats has found that their risk of death doesnt go up as they grow older, as it does for every other known mammalian species. Although some scientists caution against any sweeping conclusions, many say the new data are important and striking.

New study suggests that death rates dont rise with age, as they do for most animals.


$400+ Million Stolen From Coincheck Cryptocurrency Exchange "IndyWatch Feed Tech"

There's a new contender for the largest theft of cryptocurrency ever:

A Japanese cryptocurrency exchange announced the theft Friday of $400 million in digital currency. Some estimates put the loss at the Coincheck exchange at over $520 million.

The stolen assets were stored in the cryptocurrency NEM, one of hundreds of digital currencies created in recent years. Bitcoin, the most well-known cryptocurrency, dropped precipitously on news of the hack but has since regained much of its value.

The incident could be one of the largest single losses of cryptocurrency ever, rivaling only the 2014 hack of online exchange Mt. Gox. Reports at the time put Mt. Gox's losses at over $400 million.

Coincheck says 500 million digital coins were lost. According to Cointelgraph, hackers stole the private key protecting access to Coincheck's accounts.

Does it matter that it was a $400 million theft if the value is going to collapse anyway?

Meanwhile, a stock trading app called Robinhood plans to allow users to buy and sell Bitcoin and Ethereum without any transaction fees.

Original Submission

Read more of this story at SoylentNews.


Optical Tach Addresses the Need for Spindle Speed Control "IndyWatch Feed Tech"

With CNC machines, getting the best results depends on knowing how fast your tool is moving relative to the workpiece. But entry-level CNC routers dont often include a spindle tachometer, forcing the operator to basically guess at the speed. This DIY optical spindle tach aims to fix that, and has a few nice construction tips to boot.

The CNC router in question is the popular Sienci, and the 3D-printed brackets for the photodiode and LED are somewhat specific for that machine. But [tmbarbour] has included STL files in his exhaustively detailed write-up, so modifying them to fit another machine should be easy. The sensor hangs down just far enough to watch a reflector on one of the flats of the collet nut; wed worry about the reflector surviving tool changes, but its just a piece of shiny tape thats easily replaced.  The sensor feeds into a DIO pin on a Nano, and a small OLED display shows a digital readout along with an analog gauge. The display update speed is decent not too laggy. Impressive build overall, and we like the idea of using a piece of PLA filament as a rivet to hold the diodes into the sensor arm.

Want to measure machine speed but dont have a 3D printer? No worries ...


The Patent Microcosm Maintains the Illusion That Relative US Demise (e.g. in Innovation) is Due to Patent Reform "IndyWatch Feed Tech"

China had been rising for quite some time, long before it embraced patent maximalism

A Chinese man in Singapore

Summary: With the emergence of high-tech in Korea, China and Singapore (among other Asian states) its simply unreasonable to blame US demise on patent reform; yet this is exactly what the patent maximalists are dishonestly doing this month

THERE is a strand of articles about number of patents, number of scientific papers and general indices that claim to have accurately ranked countries based on innovation, science and technology etc. In pretty much all of them the major takeaway is that the US is down and China is up. That in itself makes a good (selling lots of ads through hits) headline.

We mentioned this last week because the patent microcosm is exploiting such reports to its own advantage; the patent extremists want policymakers to think that all this is attributable to changes in patent policy. That is of course nonsense, but it carries on unabated. Ive already challenged or personally confronted such claims, but patent extremists still see this is a lobbying opportunity. They want politicians to believe that making trolls great again will magically restore US leadership.

But they have an agenda to sell. Theyre therefore interjecting their own cause-and-effect or false correlations into figures.Perhaps a little belatedly, Watchtroll continues its ritualistic attacks on patent reform. It now piggybacks the above delusion, claiming that all US problems are due to or reducible to patent policy. Its amplified by other patent extremists, who love using China! as their excuse for anything bad and somehow believe that all the US has to offer is a pile of patents.

Thankfully, the CCIAs Josh Landau already wrote a quick rebuttal to that. To quote:

During 2017 we saw the 5 year anniversary of the America Invents Act and 7 years of post-Bilski jurisprudence (including Mayo, Myriad, and Alice). And there are also reports that innovation in the U.S. is falling. That makes it a good time to look at the real world impacts of these cha...


On Patent Trolls or Bullies Such as the CAO Group and WiLAN "IndyWatch Feed Tech"

CAO Group

Summary: CAO Group starts nuisance litigation against BIOLASE and WiLAN, which is the most famous Canadian patent troll, is looking for more victims to extract protection money from

The USPTO grants many patents, probably far too many in fact (well write more about that later). It leaves a lot more companies vulnerable to nuisance litigation, often without any merit.

In a defensive press release a few days ago, BIOLASE complained about patent bullying, alleging that the latest attempt by CAO Group, Inc. to use patent litigation is Frivolous and Abusive (those two words were used in the headline). From the opening paragraph:

BIOLASE, Inc. (NASDAQ: BIOL), the worlds leading dental laser company, today released the following statement in response to the latest attempt by CAO Group, Inc. to use patent litigation to try to improve its competitive position in the marketplace.

Without knowing the pertinent details of the underlying patents it is hard to judge the merit of the lawsuit, but what CAO Group hopes to accomplish is removal of products/services from the market (or passage of bucket-loads of money). Who would be served by that other than lawyers?

Speaking of lawyers, WiLAN (sometimes known as Wi-LAN) is effectively a patent troll. Its just a litigation firm. Patent Troll Tracker wrote about these people moving to Texas more than a decade ago and they sued a lot in the following few years under Chief Executive Jim Skippen (he is just a lawyer who had worked for other patent trolls and he still there, based on Wikipedia, in the same position)....


Attackers behind Cloudflare_solutions Keylogger are back, 2000 WordPress sites already infected "IndyWatch Feed Tech"

More than 2,000 WordPress sites have been infected with a malicious script that can deliver both a keylogger and the cryptocurrency miner CoinHive.

More than 2,000 sites running the WordPress CMS have been infected with a malicious script that can deliver both a keylogger and the in-browser cryptocurrency miner CoinHive.

This new hacking campaign was spotted by experts from the security firm Sucuri, the experts believe the attackers are the same that launched a campaign that infected 5,500 WordPress sites in December.

In both campaigns, the threat actors used a keylogger dubbed cloudflare[.]solutions, but be careful, there is no link to security firm Cloudflare.

After the discovery in December of campaign, the cloudflare[.]solutions domain was taken down, but this new discovery confirms that threat actors are still active and are using a new set of recently registers domains to host the malicious scripts that are injected into WordPress sites.

By querying the search engine PublicWWW,  researchers discovered that the number of infected sites includes 129 from the domain cdns[.]ws and 103 websites for cdjs[.]online.

A few days after our keylogger post was released on Dec 8th, 2017, the Cloudflare[.]solutions domain was taken down. This was not the end of the malware campaign, however; attackers immediately registered a number of new domains including cdjs[.]online on Dec 8th, cdns[.]ws on Dec 9th, and msdns[.]online on Dec 16th. reads the analysis published by Sucuri.

PublicWWW has already identified relatively few infected sites: 129 websites for cdns[.]ws and 103 websites for cdjs[.]online, but its likely that the majority of the websites have not been indexed yet. Since mid-December, msdns[.]online has infected over a thousand websites, though the majority are reinfections from sites that have already been compromised.

Most of the infected domains are tied to msdns[.]online, with over a thousand reported infections. In many cases, threat actors re-infected WordPress sites compromised in the previous campaign.



An Uphill Battle for Software Patents in the United States, Except When Catchphrases and Buzzwords Are Used "IndyWatch Feed Tech"

20 Buzzwords you have to know in Artificial Intelligence
Reference: 20 Buzzwords you have to know in Artificial Intelligence

Summary: Barring or excepting misuse of buzzwords such as Artificial Intelligence, software patents have become incredibly hard to assert in the United States, albeit theyre possible to sneak past examiners and then license without any legal challenge

THIS summer, i.e. several months from now, Alice will turn four. The USPTO is still granting some software patents (that ought to have stopped), but the courts as well as PTAB barely tolerate any of that.

The USPTO is still granting some software patents (that ought to have stopped), but the courts as well as PTAB barely tolerate any of that.Watchtroll is still overtly promoting software patents, even in a so-called webiner. Its like a front group. But worry not, theyre not getting their way.

One way remains to get software patents past examiners and sometimes judges too. It boils down to semantics; they just try to make software patents sound like something theyre not. They use all sorts of catchphrases and buzzwords many of which we have named here before. That includes, more recently, artificial intelligence (AI).

They use all sorts of catchphrases and buzzwords many of which we have named here before. That includes, more recently, artificial intelligence (AI).It has been particularly hard to overlook or ignore the AI buzzword (and media hype) this month. Everywhere one looks in the news not just science news its AI, AI, AI its not even a new concept.

Wayne Ramsay, Chief Strategy Officer at Exigent, wrote about AI some days ago in relation to law firms. Its time for law firms which neither understand AI nor care about AI to just say AI all the time:



Discovery Offers New Genetic Pathway For Injured Nerve Regeneration "IndyWatch Feed Tech"

On the hunt for genes involved in regenerating critical nerve fibers called axons, biologists at the University of California San Diego came away with a surprise: The discovery of a new genetic pathway that carries hope for victims of traumatic injuries -- from stroke to spinal cord damage.

UC San Diego Biological Sciences Assistant Project Scientist Kyung Won Kim, Professor Yishi Jin and their colleagues conducted a large-scale genetic screening in the roundworm C. elegans seeking ultimately to understand genetic influences that might limit nerve regrowth in humans. Unexpectedly, the researchers found the PIWI-interacting small RNA (piRNA) pathway -- long believed to be restricted to function in the germline -- plays an active role in neuron damage regeneration.

The discovery is published online Jan. 25, 2018 in the journal Neuron.

"This came as a total surprise," said Jin, Chair of the Section of Neurobiology, Division of Biological Sciences, and a member of the Department of Cellular and Molecular Medicine in UC San Diego's School of Medicine. "piRNA wasn't anywhere on our radar, but now we are convinced that it is a new pathway that functions in neurons and, with some work, could offer therapeutic targets for helping neurons do better against injury."

Original Submission

Read more of this story at SoylentNews.


Tesla built its largest Supercharger station in Chinafor the third time "IndyWatch Feed Tech"

Chinas charging stations will likely be the template for the world.


Hackers are making U.S. ATMs spit out cash like slot machines, report warns "IndyWatch Feed Tech"

Hackers in other countries have hit dozens of ATMs in one case making off with $13 million in cash in three hours.


Tesla Powerwalls will power 50 homes in a community, its like putting around $50,000 in your pocket, says contractor "IndyWatch Feed Tech"

Home builders are starting to see the advantage of incorporating solar and energy storage products directly as part of their offerings. One home builder in Australia decided to make solar arrays and Tesla Powerwalls standard in 50 knockdown rebuild homes and claims that its like putting around $50,000 in your pocket. Earlier this week, we reported on how Teslas giant Powerpack system in Australia made around $1 million in just a few days through the countrys wholesale electricity market. Homeowners can do the same on a smaller scale if they have a home solar array and a Powerwall, Te


Alexa Controls This Projector Thanks to ESP8266 "IndyWatch Feed Tech"

[jfessard] doesnt have extra-sensory perception, but does have an ESP8266. The little board seems to pop up in every hack these days. Inspired by not wanting to get up from the bean-bag chair or leave the electronics-housing cabinet wide open to use an HDMI switcher, [jfessard] hacked together an Alexa-compatible projector control via the ESP8266!

The core functionality here is the ability to turn the projector on and off, and to switch the HDMI source. [jfessard] connected the Panasonic PT-AE3000U projector to a Monoprice HDX-401TA 41 HDMI switcher. Tucked away in the cabinet below the projector, it is controlled using a IR LED transmitter breakout board sitting at the end of a fairly long set of jumper wire. The projector control itself is through a RS232 interface.

To make this easy to use with Amazons Alexa, [jfessard] turned to some libraries for the ESP8266 D1 Mini. The fauxmoesp library makes it look like a WeMo device, and the IRemoteESP8266 library made remote control code cloning a sna...


The European Commission and the Failure to Stop the FRAND/SEP Lobby "IndyWatch Feed Tech"

Bristows and IAM: working together to help patent trolls in Europe

Bristows and IAM

Summary: The European Commission rather than show strength in the face of patent parasites shows considerable weakness by allowing controversial mergers/takeovers and issuing token fines

THE European Commission has succumbed and surrendered to pressure fom Microsoft front groups again. As this article put it the other day, obligatory patents one cant work around are becoming more institutionalised:

In November The European Commission issued a communication setting out its vision on standard essential patents (SEPs) and outlining its expectations from stakeholders involved in the declaration, exploitation and enforcement of SEPs. Stakeholders include SEP holders, SEP implementers, standard developing organisations (SDOs) and national courts of the member states.

The communication draws on a number of points arising from various judicial decisions, such as the U.K. courts decision in Unwired Planet v. Huawei on what constitutes fair, reasonable and non-discriminatory (FRAND) licensing terms and the Court of Justice of the European Unions (CJEU) decision in Huawei v. ZTE. The communication also provides principles of general applicability and sets out specific recommendations and guidance.

This also indirectly relates to companies such as Qualcomm, which was brought up the other day in the context of its battles with Apple:

The high-stakes FRAND licensing dispute between Apple and Qualcomm took another turn last week when the chipmaker filed a subpoena against Philips Electronics North America demanding that the Dutch company produce information on its licensing practices deemed relevant to the litigation that is currently gripping the patent world.

According to the subpoena, w...


Download URLs for two packages of the phpBB forum software were compromised "IndyWatch Feed Tech"

Hacker compromised the download URLs of the popular phpBB forum software, for around three hours they were delivering infected versions of legitimate files.

The popular phpBB free and open source forum software has been compromised by an unknown hacker. According to a security advisory released by the phpBB maintainers, the attacker has compromised download URLs for two phpBB packages.

The downloads URLs compromised were related to the phpBB 3.2.2 full package and the phpBB 3.2.1 -> 3.2.2 automatic updater.

Earlier today, we identified that the download URLs for two phpBB packages available on were redirecting to a server that did not belong to us. We immediately took down the links and launched an investigation. reads the announcement published by the development team.

The point of entry was a third-party site. Neither nor the phpBB software were exploited in this attack.
If you downloaded either the 3.2.2 full package or the 3.2.1 -> 3.2.2 automatic updater package between the hours of 12:02 PM UTC and 15:03 PM UTC on January 26th, you received an archive modified with a malicious payload. 

The compromised download links were online for around three hours, between 12:02 PM UTC and 15:03 PM UTC on January 26, those who used them received a malware.

Users who downloaded phpBB 3.2.2 packages on January 26 must verify the SHA256 file hash of the file they downloaded with the one reported on the phpBB official downloads page.

phpBB forum software



With the Heritage Foundation Getting Involved and Andrei Iancu Potentially Appointed on Monday, the Road Ahead Looks Troubling for Patents "IndyWatch Feed Tech"


Summary: Signs that the patent microcosm and right-wing oligarchs can made headway with withdrawal of patent reforms in the United States

Trump antitrust team sets sights on standard setting organisations as #IP policy continues marked shift from Obama White House, IAM wrote the other day, adding that guiding Trump policy principle of doing the exact opposite of the Obama admin is having its effect on #IP (they mean patents).

Given the notorious GOP tax scam (passed at 2 AM on a weekend), anything is possible with Trump.So IAM sees this President as an opportunity for withdrawal of progress a regression that can help patent aggressors and trolls? In an event of Conservative lobby groups (like those who have produced papers advocating software patents and trolls), IAM has claimed, they try to call the shots on patent policy in the US:

In a series of comments at an antitrust event held by the Heritage Foundation earlier this week in Washington DC, Andrew Finch, principal deputy assistant attorney general for antitrust at the DOJ, revealed that the division is investigating whether SSOs balance the interests of both patent owners and the users of IP.

Later on IAM wrote about Iancu, the patent maximalist who might become USPTO Director quite soon (there is still time to stop this). Looks like Senate vote on Andrei Iancu for @uspto director may happen Monday (see p.9 of link), IAM wrote, later adding: Theres no guarantee a vote will happen Monday one Hill observer says it means it could happen but does mean confirmation is inching close

They call these reform or boxes, but its just an excuse to cut tax for the super...


Boris Johnson "is Descendant" of Mummified Basel Woman "IndyWatch Feed Tech"

BBC News writes:

Scientists in the Swiss city of Basel have solved a decades-old mystery over the identity of a mummified woman.

Their research revealed a surprise: the woman is the great-great-great-great-great-great-great grandmother of UK Foreign Secretary Boris Johnson.

The body was uncovered in 1975 while renovations were being done on Basel's Barfsser Church.

[...] There was no gravestone to indicate her identity, but initial testing of her wooden coffin suggested it dated from the 16th Century.

Another clue: her body was riddled with mercury - a standard treatment for syphilis from the late 15th to the 19th Century. Highly toxic mercury treatment was more often a kill than a cure and it was this that preserved her body.

The story continues to explain how scientists using historical records and DNA testing have managed to ascertain (with 99.8% probability) that the mummy was "none other than Anna Catharina Bischoff. Born in Basel in 1719, she died there in 1787." The Bischoffs are a well-established and prominent family in the Basel region.

Original Submission

Read more of this story at SoylentNews.


A Talking Clock For The 21st Century "IndyWatch Feed Tech"

The Talking Clock service is disappearing, and its quite possible that few of you will be aware of its passing. One of the staples of twentieth-century technology, the Talking Clock service was the only universally consumer-available source of accurate time information away from hourly radio time signals in the days before cheap radio-controlled clocks, or GPS. Youd dial (on a real dial, naturally!) a telephone number, to be greeted with a recorded voice telling you what the time would be at the following beep. Clocks were set, phone companies made a packet, and everybody was happy with their high-tech audio horology.

[Nick Sayer] used the USNO Master Clock telephone feed to see in the New Year, but had to make do with a voice from another time zone. It seems that there are no services remaining that provide one in Pacific time. His solution to the problem for a future year? Make his own Talking Clock, one that derives its time reference from GPS.

At its heart is a SkyTraq Venus838LPx miniature GPS module coupled to an ATMega32E5 microcontroller. The speech comes in the form of pre-recorded samples stored on an SD card. There is a small on-board amplifier to drive a single speaker. For extreme authenticity perhaps it could be attached to a GSM mobile phone module to provide a dial-up service, but hes got everything he needs for a New Years Eve.

Want to hear what that that bit of nostalgia sounded like? Check out the quick clip below. As for modern replacements, weve had at least one talking clock here in the past, but not one using GPS.

GPS satellite image: NASA [Public domain].


How to Get Evangelicals to Care About Climate Change - Facts So Romantic "IndyWatch Feed Tech"

Its not that evangelicals dont care about the environment. Its that they care about people more.Wikicommons

Last year was among the three warmest years ever recorded, 1.51 degrees Fahrenheit above the 20th century average, scientists from NASA and the National Oceanic and Atmospheric Administration recently reported. The two years prior were warmer (2016 the warmest), but they had a boost from El Nino2017 didnt. The six warmest years on record for the planet have all occurred since 2010, the NOAA states on its website.

Among those who accept that the cause of this is climate change, and that human actions play a major role, such reports tend to lead to finger pointing at climate change deniers and skeptics, who are seen as obstacles to progress on important policy decisions for improving the climate. Such finger pointing is sometimes directed at religious people, especially evangelical Christians who, either because of their theology or political conservatism, are taken to make up much of these deniers and skeptics.

But after five years of surveying, interviewing, and analyzing data on what religious people think about science, we have come to understand that evangelicals views about climate change, and the environment more broadly, are
Read More


Rupert Murdoch Begs Facebook to Just Give Him Money "IndyWatch Feed Tech"

There's no denying that Rupert Murdoch built up quite a media empire over the decades -- but that was almost all entirely focused on newspaper and pay TV. While he's spent the past few decades trying to do stuff on the internet, he has an impressively long list of failures over the years. There are many stories of him buying internet properties (Delphi, MySpace, Photobucket) or starting them himself (iGuide, Fox Interactive, The Daily) and driving them into the ground (or just flopping right out of the gate). While his willingness to embrace the internet early and to try things is to be commended, his regular failures to make his internet ventures successful has pretty clearly soured him on the internet entirely over the years.

Indeed, over the past few years, Murdoch or Murdoch surrogates (frequently News Corp's CEO Robert Thomson) have bashed the internet at every opportunity, no matter how ridiculous. Almost all of these complaints can be summed up simply: big internet companies are making money and News Corp. isn't -- and therefore the problem is with those other companies which should be forced to give News Corp. money.

[...] Rupert is thinking along similar lines, and earlier this week released a bizarre and silly statement saying Facebook should start paying news sites "carriage fees" a la cable companies:

The time has come to consider a different route. If Facebook wants to recognize 'trusted' publishers then it should pay those publishers a carriage fee similar to the model adopted by cable companies. The publishers are obviously enhancing the value and integrity of Facebook through their news and content but are not being adequately rewarded for those services. Carriage payments would have a minor impact on Facebook's profits but a major impact on the prospects for publishers and journalists.



Plug Wars: The Battle for Electric Car Supremacy "IndyWatch Feed Tech"

Via: Reuters: German carmakers hope a network of high-power charging stations they are rolling out with Ford will set an industry standard for plugs and protocols that will give them an edge over electric car rivals. At the moment, Tesla and carmakers in Japan and Germany use different plugs and communication protocols to link batteries []


Phishing Scam: Hackers Steal $900,000 from County Office "IndyWatch Feed Tech"

By Waqas

Another day, another phishing scam This time Harris County, Texas

This is a post from Read the original post: Phishing Scam: Hackers Steal $900,000 from County Office


Why does Browserling's comic have 10 different formats? "IndyWatch Feed Tech"

Browserling's comic is getting millions of views. How did I make it so popular?

Quick answer: Smart image search SEO.

Long answer: Some people search for JPEGs only, some people search for GIFs only, some people search for ICOs only, some people search for Webps only, some people search for PDFs, some search for Word Documents, etc. I'm in all the search results. I made 10+ different formats for every comic.

Every comic is available as: PNG, JPG, GIF, BMP, ICO, WebP, TIFF, PDF, PS, RTF, CHM, and XLS.

Here's how it looks in Google's image search results:

Browserling's comic is available in all formats that can be searched.

Get your SEO right, get all that traffic, outsmart your competitors, and succeed. See you next time!


Apple Expands Self-Driving Fleet From 3 to 27 Cars "IndyWatch Feed Tech"

Apple has an order of magnitude more cars in its self-driving fleet:

Apple has expanded its fleet of self-driving cars in California, registering an additional two dozen vehicles with the state's Department of Motor Vehicles. It's a significant expansion for a company that has been seen as lagging in the race to build self-driving cars.

Apple originally registered three Lexus Rx450h SUVs under its permit to test autonomous vehicles in April 2017. Since then, it has acquired an additional 24 Lexus SUVs, according to the DMV: two in July, seven in October, two in November, six in December, and seven in January. The news was first reported by Bloomberg.

Apple has scaled back its self-driving car plans from creating a vehicle to creating software for them.

Original Submission

Read more of this story at SoylentNews.


Make Your Own Current Clamp Probe "IndyWatch Feed Tech"

If you want to measure AC or DC current with an oscilloscope, a current clamp is a great way to do it. The clamp surrounds the wire, so you dont need to break the connection to take your measurements. These used to be expensive, although weve seen some under $100, if you shop. We dont know if it was cost or principle that motivated [Electronoobs] to build his own current clamp, but he did.

This probe design is little more than a 3D printed case, an old power supply toroid, and a conventional alligator clamp to make the business end. The sensor uses a ferrite core and a hall effect sensor. The ferrite toroid is split in half, one half in each side of the clamp. An opamp circuit provides a gain of 100 to boost the hall effect sensors output.

In addition to building a homebrew probe, the video also shows a teardown of a Hantek current probe and explains the theory behind the different kinds of current probes, including some tricks like using a compensation winding to prevent core magnetization.

Does it work? You bet. After calibration, it did just fine. Its not as pretty as a $100 unit, but beauty is in the eye of the beholder, and we are suckers for homebrew gear so we will say it is certainly more interesting. If you have a fair junk box (and a 3D printer), this probe could be made very inexpensively. The hall effect and a BNC connector are likely to be the most expensive parts. Even if you bought everything and used a non-printed case, we would be hard-pressed to think youd spend more than $25.

If you want to see how the big boys do it, Keysight had a good break down last year. Weve seen other homebrew builds for current probes and some of them are very accurate.

Saturday, 27 January


US Immigration Agency Granted Access to a Nationwide License Plate Recognition Database "IndyWatch Feed Tech"

The Immigration and Customs Enforcement (ICE) agency has officially gained agency-wide access to a nationwide license plate recognition database, according to a contract finalized earlier this month. The system gives the agency access to billions of license plate records and new powers of real-time location tracking, raising significant concerns from civil libertarians.

For civil liberties groups, the implications go far beyond immigration. "There are people circulating in our society who are undocumented," says senior policy analyst Jay Stanley, who studies license plate readers with the ACLU. "Are we as a society, out of our desire to find those people, willing to let our government create an infrastructure that will track all of us?"

Meanwhile, countermeasures are already deployed, and obfuscated:

Known as "Bienvenidos," the Spanish word for "Welcome," the app purports to help navigate the treacherous U.S.-Mexico border by alerting users to a range of obstacles and threats.

The anonymous creators of Bienvenidos attempted to pitch their app this month to numerous media outlets before suddenly reversing their announcement. A YouTube video explaining the technology was inexplicably deleted while the Bienvenidos website became password-protected.

Original Submission

Read more of this story at SoylentNews.


Twitter: Russian bots retweeted Trump nearly 500,000 times in last months of election "IndyWatch Feed Tech"

Russian bots on Twitter retweeted President Trump hundreds of thousands of times during the last months of his presidential campaign, Twitter told Congress.The company revealed to lawmakers on Thursday that the Russian-linked accounts had retweeted...


Tor Exit Node Operator Denies Piracy Allegations and Hits Back "IndyWatch Feed Tech"

The copyright holders of Dallas Buyers Club have sued thousands of BitTorrent users over the past few years.

The film company first obtains the identity of the Internet account holder believed to have pirated the movie, after which most cases are settled behind closed doors.

It doesnt always go this easily though. A lawsuit in an Oregon federal court has been ongoing for nearly three years but in this case the defendant was running a Tor exit node, which complicates matters.

Tor is an anonymity tool and operating a relay or exit point basically means that the traffic of hundreds or thousands of users hit the Internet from your IP-address. When pirates use Tor, it will then appear as if the traffic comes from this connection.

The defendant in this lawsuit, John Huszar, has repeatedly denied that he personally downloaded a pirated copy of the film. However, he is now facing substantial damages because he failed to respond to a request for admissions, which stated that he distributed the film.

Not responding to such an admission means that the court can assume the statement is true.

An admission, even an admission deemed admitted because of a failure to respond, is binding on the party at trial, Dallas Buyers Club noted in a recent filing, demanding a summary judgment.

The unanswered admissions

Huszar was represented by various attorneys over the course of the lawsuit, but when the admissions were deemed admitted he was unrepresented and in poor health.

According to his lawyer, Ballas Buyers Club is using this to obtain a ruling in its favor. The film company argues that the Tor exit node operator admitted willful infringement, which could cost him up to $150,000 in damages.

The admissions present a serious problem. However, even if theyre taken as truth, they are not solid proof, according to the defense. For example, the portion of the film could have just been a trailer.

In addition, the defense responds with several damaging accusations of its own.

According to Huszars lawyer, it is unclear whether Dallas Buyers Club LLC has the proper copyrights to sue his client. In previous court cases in Australia and Texas, this ownership was put in doubt.

In the case at bar, because of facts established in other courts, there is a genuine issue as to whether or not DBC owns the right to sue for copyright infringement, the...


IoT Doorman: Eye-Controlled Door for a Girl with Cerebral Palsy "IndyWatch Feed Tech"

Kyleigh has an eye-controlled computer on her wheelchair but something as simple as her bedroom door was still beyond her reach until now! [Bill Binko], recently filmed a demo of an automatic, IoT door opener built for the young girl with cerebral palsy. [Bill] is a co-founder of ATMakers, an organization that enables makers interested in assistive technologies to collaborate with users to improve quality of life.

Using her eye tracking tablet (PRC Device), Kyleigh has two new icons that make the relevant call to a website, pushing a simple command to either open or close her bedroom door. The device attached to the door uses an Adafruit M0 WiFi Feather board, a DC stepper motor and wheel, a UBEC buck converter, and a potentiometer.

Since other family members are also going to be opening and closing the door, theres potentiometer which measures the door position for proper operation next time Kyleigh wishes to use the door. The installation also maintains a fairly inconspicuous profile for the assistance it gives the brain is enclosed in a small box on the door, with the motor only slightly larger on the doors base.

[Bill] believes the project has a few quibbles and wants to work out a smaller wait before the open/close process is executed and optimizing the open/close speed. You have to check out the video below to see that it works really really. Were also excited to see Kyleigh using her gaze control to talk to an Amazon Echo. [Bill] foresee a door control improvement that links it to Alexa. And how much did it cost to improve the quality of life for this young girl? $70.

We love seeing makers help people, and cannot wait to see what 2018 will bring! If youre looking for more inspiration, dont miss the eye-controlled wheelchair project called Eyedrivomatic which won the 2015 Hackaday Prize. Theres also the top Assistive Technology projects from the Hackaday Prize.

[Thanks for the tip, jme!]


Quick Links "IndyWatch Feed Tech"

Various things that may be of interest, ordered from abstract math to concrete physics:

  • Jacob Lurie is teaching a course this semester on Categorical Logic. Way back when I was a student at Harvard this is the kind of thing I would have found very exciting, much less convinced of that now.
  • Talks from a workshop earlier this month on representation theory are available here.
  • The Harvard Gazette has an article about a project to develop a pictorial mathematical language first proposed by Arthur Jaffe. The project has a website here. It is being funded by an offshoot of the Templeton Foundation I didnt know about, the Templeton Religion Trust, with one of their grants, TRT0080: Concerning the Mathematical Nature of the Universe, described as exploring whether or not the universe admits of a consistent description, or more generally, whether our universe [can] be described by mathematics?. Theyre advertising a postdoc position here.
  • Adam Marsh has a wonderful book on Mathematics for Physics, especially from the geometrical point of view, with lots of detailed illustrations. Its available from World Scientific here, or as a website here (there are also articles on the arXiv, here and here).
  • Theres a new Leinweber Center for Theoretical Physics at the University of Michigan, funded by an $8 million grant from the Leinweber Foundation. Inaugural talk was Arkani-Hamed on The Future of Fundamental Physics.
  • Each year recently there has been a Physics of the Universe Summit, described by some as involving one of those glitterati Hollywood banquets. Some years ago, the glitterati evidently were interested in particle physics, recently instead it is quantum computing and AI (see...


GNU Binutils 2.30 Released "IndyWatch Feed Tech"

Released this weekend is Binutils 2.30 as the latest collection of these GNU utilities important to the open-source ecosystem...


Some Google employees say tech giant doing little to address harassment: report "IndyWatch Feed Tech"

Some Google employees say that top executives at the company have failed to respond aggressively to complaints about harassment from co-workers and outsiders amid an internal fight over diversity at the tech giant.According to a Wired report,...

IndyWatch Science and Technology News Feed Archiver

Go Back:30 Days | 7 Days | 2 Days | 1 Day

IndyWatch Science and Technology News Feed Today.

Go Forward:1 Day | 2 Days | 7 Days | 30 Days

IndyWatch Science and Technology News Feed was generated at World News IndyWatch.

Resource generated at IndyWatch using aliasfeed and rawdog