IndyWatch Science and Technology News Feed Archiver

Go Back:30 Days | 7 Days | 2 Days | 1 Day

IndyWatch Science and Technology News Feed Today.

Go Forward:1 Day | 2 Days | 7 Days | 30 Days

IndyWatch Science and Technology News Feed was generated at World News IndyWatch.

Wednesday, 28 February


Moon to Get 4G Network "IndyWatch Feed Tech"

Vodafone and Nokia have joined forces to bring 4G to a barren, characterless expanse (no, we don't mean Surrey suburbia). From 2019 LTE will be available on the moon.

The network is intended to support a mission by Berlin company PTScientists, along with Vodafone Germany and Audi, to achieve the first privately funded Moon landing.

Mission to the Moon is due to launch in 2019 from Cape Canaveral on a SpaceX Falcon 9 rocket.

Vodafone's network will be used to set up the Moon's first 4G network, connecting two Audi Lunar Quattro rovers to a base station in the Autonomous Landing and Navigation Module (ALINA).

The base station should be able to broadcast 4G using the 1800 MHz frequency band and send back live HD video feed of the Moon's surface, which will be broadcast to a global audience via a deep space link.

4G found on Moon

Original Submission

Read more of this story at SoylentNews.


Lamps Ghostly Glow Benefits From Happy Mistake "IndyWatch Feed Tech"

[cyborgworkshop]s youngest sister is a fan of a character in a popular video game (Thresh from League of Legends) who wields an iconic lantern with a mystical green glow. He resolved to make a replica of that lantern. Perhaps as a gift for the cherished family member? Certainly not! [cyborgworkshop]s goal was the simple joy of having something to lord over her. Ah, aint siblings grand?

Why the glow powder turned pink in clear varnish is a bit of a mystery.

There were some interesting things learned in the process of making the ghostly green lamp. The first part of the build log is all about post-processing the lantern model, which was 3D printed at a chunky 0.48 mm layer height, but the rest is about getting the ghostly green glow to come out the way it did. [cyborgworkshop] used both glow in the dark paint and glow in the dark powder to really make the object pop, but the process involved some trial and error. Originally he mixed the glow powder into some clear varnish, and despite the mixture turning pink for some mysterious reason, a small sample spot appeared to turn out fine. However, after applying to the lantern and waiting, the varnish remained goopy and the glow powder settled out of the mixture. He ended up having to remove it as best he could and tried a heavy application of the glow paint instead. Th...


HPR2498: Life without Google "IndyWatch Feed Tech"

Zenphone 2 Magic Device Tool F-Droid K-9 Mail Protonmail Signal Syncthing


House Vote on FOSTA is a Win for Censorship "IndyWatch Feed Tech"

The bill passed today 388-25 by the US House of Representatives marks an unprecedented push towards Internet censorship, and does nothing to fight sex traffickers.

H.R. 1865, the Allow States and Victims to Fight Online Sex Trafficking Act (FOSTA), allows for private lawsuits and criminal prosecutions against Internet platforms and websites, based on the actions of their users. Facing huge new liabilities, the law will undoubtedly lead to platforms policing more user speech.

The Internet we know today is possible only because of Section 230, which prevents online platforms from being held liable for their users speech, except in certain circumstances. FOSTA would punch a major hole in Section 230, enabling lawsuits and prosecutions against online platformsincluding ones that arent even aware that sex trafficking is taking place.

If websites can be sued or prosecuted because of user actions, it creates extreme incentives. Some online services might react by pre-screening or filtering user posts. Others might get sued out of existence. New companies, fearing FOSTA liabilities, may not start up in the first place.

The tragedy is that FOSTA isnt needed to prosecute or sue sex traffickers. As weve said before, Section 230 simply isnt broken. Right now, there is nothing preventing federal prosecution of an Internet company that knowingly aids in sex trafficking. That includes anyone hosting advertisements for sex trafficking, which is explicitly a federal crime under 18 U.S.C. 1591, as amended by the 2015 SAVE Act. The website that produced the most discussion around this issue,, is reportedly under federal investigation.

The array of online services protected by Section 230, and thus hurt by FOSTA, is vast. It includes review sites, online marketplaces, discussion boards, ISPs, even news publications with comment sections. Even small websites host thousands or millions of users engaged in around-the-clock discussion and commerce. By attempting to add an additional tool to hold liable the tiny minority of those platforms whose users who do awful things, FOSTA does real harm to the overwhelming majority, who will inevitably be subject to censorship.

Websites ru...


U.S. National Science Foundation Plans to Close Overseas Offices "IndyWatch Feed Tech"

National Science Foundation to close its overseas offices

A plan by the U.S. National Science Foundation (NSF) to close its overseas offices, first reported on the Science | Business website, is getting mixed reviews in the scientific community. Last week, NSF announced it would shutter its outposts in Beijing, Brussels, and Tokyo by summer; two U.S. staff will return to the agency's headquarters in Alexandria, Virginia, and local staff will be reassigned to U.S. embassies. The change reflects a desire for NSF to be "more strategic and focused" in its international affairs, says Rebecca Keiser, head of NSF's international office.

"This is definitely the wrong move," asserts Hitoshi Murayama, a theoretical physicist at University of California (UC), Berkeley, and the Kavli Institute for the Physics and Mathematics of the Universe at the University of Tokyo, who has worked with NSF's Tokyo office on events for graduate students and U.S. scientists in Japan. NSF underestimates "the importance of personal connections [in promoting] critical international collaborations in science," he says. "The U.S. is becoming more inward looking."

NSF set up the Tokyo office in 1960. It established a European office in Paris in 1984 and relocated it to Brussels in 2015. The Beijing office opened in 2006. The office websites claim they were instrumental in fostering international cooperation in ocean drilling, earthquake engineering, studies of gravitational waves, and academic exchange programs.

"The National Science Foundation (NSF) is a United States government agency that supports fundamental research and education in all the non-medical fields of science and engineering."

Original Submission

Read more of this story at SoylentNews.

Go Back:30 Days | 7 Days | 2 Days | 1 Day

IndyWatch Science and Technology News Feed Today.

Go Forward:1 Day | 2 Days | 7 Days | 30 Days

Tuesday, 27 February


X.Org Server 1.20 Release Candidate Due For Release Tomorrow "IndyWatch Feed Tech"

Indeed it turns out that the landing today of RandR leases and deep color / color depth 30 support for GLAMOR/modesetting is because Red Hat's Adam Jackson is finally wrangling the xorg-server 1.20 release together...


Drivers Ed students forced to learn how the government wants you to treat law enforcement "IndyWatch Feed Tech"

image credit: WCHS ABC

Nothing says police state quite like the Feds forcing Drivers Ed students to treat law enforcement the way THEY want you to.

Two years ago, an article in the Chicago Tribune revealed what these driver education bills are really about.

"We want everybody to know what they're supposed to do when they get pulled over by police" state Rep. Frances Ann Hurley said. 

To date, at least seven states have begun forcing drivers to learn how the government wants you to treat law enforcement.

They are:

New Jersey,
North Carolina,

Why do we need these bills, if police are stopping...


Scientists develop new tool for imprinting biochips "IndyWatch Feed Tech"

3D printing has gained popularity in recent years as a means for creating a variety of functional products, from tools to clothing and medical devices. Now, the concept of multi-dimensional printing has helped a team of researchers at the Advanced Science Research Center (ASRC) at the Graduate Cent


The Great Pot Monopoly Mystery "IndyWatch Feed Tech"

Some very powerful people are trying to corner the market on legal weed and turn their company into the Monsanto of marijuana. Who are they? And can they be stopped?


iTunes will no longer work on old PCs & 1st Generation Apple TV "IndyWatch Feed Tech"

By Carolina

iTunes will stop working on millions of devices as of

This is a post from Read the original post: iTunes will no longer work on old PCs & 1st Generation Apple TV


DSHR's Brief Talk at Video Game Preservation Workshop "IndyWatch Feed Tech"

David Rosenthal writes in his blog about his brief talk recently given at a video game preservation workshop.

I was asked to give a brief talk to the Video Game Preservation Workshop: Setting the Stage for Multi-Partner Projects at the Stanford Library, discussing the technical and legal aspects of cooperation on preserving software via emulation. Below the fold is an edited text of the talk with links to the sources.

On the basis of the report I wrote on Emulation and Virtualization as Preservation Strategies two years ago, I was asked to give a brief talk today. That may have been a mistake; I retired almost a year ago and I haven't been following developments in the field closely. But I'll do my best and I'm sure you will let me know where I'm out-of-date. As usual, you don't need to take notes, the text of what follows with links to the sources will go up on my blog at the end of this session.

With a lot of digital resources, games especially, there is a conundrum caused by abandonware, or orphaned works, where the owner neglects it due to lack of income but due to increased interest will not change the licensing or availability. With games and other things depending on their original, physical storage media, time runs out quickly before entropy takes it away forever. However, finding a way to preserve games takes money and the actual preservation takes more money...

Source : Brief Talk at Video Game Preservation Workshop

Original Submission

Read more of this story at SoylentNews.


Definitive Dog Feeding with Arduino "IndyWatch Feed Tech"

Some dogs have no sense of self-preservation. Given the opportunity, they will eat until theyre sick. Its up to us humans to both feed them and remember doing it so they arent accidentally overfed. In a busy household with young children, the tricky part is the remembering.

[Bryan]s family feeds their dog Chloe once a day, in the mornings. She was a rescue who spent a few years scrounging for meals on the street, so some part of her is always interested in finding food, even if she just ate. Each morning, the flurry of activity throughout the house is compounded by Chloes repeated requests for food, so [Bryan] got his kids involved and built a simple circuit that lets everyone knowat a glancewhether Chloe was fed.

Chloes kibble is kept in a touch-top wastebasket that flips open at the press of a button. [Bryan]s dog-fed detector uses a reed switch and an Arduino clone to detect when the lid is opened. When the reed switch goes, low, the Arduino lights up an LED. The light stays on for two hours and then shuts off automatically to get ready for the next day. You dont have to beg for a demo video, because its waiting for you after the break.

Since Chloe devours a bowl of food in about two minutes flat, maybe the next project for [Bryan]s family could teach her to slow down a bit.


Mozilla and the NSF Hand Out $400,000 in Prize Money for First Phase of Wireless Innovation Challenge "IndyWatch Feed Tech"

Keychains that can network themselves for disaster response and wireless broadband relays connecting underserved neighborhoods win top honors Image: Paper & Equator

Last year, Mozilla and the National Science Foundation offered $2 million in prize money for two types of technology: one designed to connect the currently unserved (or underserved) populations to the Internet, and one that can reconnect people should a disaster take out their Internet access.

Weve picked two of the most challenging situations in which people are disconnected from the Internet, Mozilla program manager Mehan Jayasuriya told me at the awards programs launch.

This month, the Wireless Innovation for a Networked Society challenge announced winners for the design phase, awarding them a total of $400,000 in prize money. The next challenge for these 20 teams will be to develop working prototypes by June; the best of those will each receive between $50,000 and $400,000, and will be asked to demonstrate their technologies publicly in August.

The top three technologies aimed at connections during disaster recovery were:

Project Lantern, a keychain-size wireless router that incorporates three radio technologies and includes emergency applications that can run offline. Multiple devices can work together to create a city-wide network, updating maps and other emergency response information. Project Lantern claimed first place and $60,000.

Hermes, an autonomous network infrastructure for local calling and messaging that fits inside two suitcases. Hermes took second place and $40,000.

Emergency LTE, an open-source, solar and battery powered cellular base station and local web server that weighs under 50 pounds. Emergency LTE took third place and $30,000.

The top three technologies aimed at bringing affordable Internet to the underserved or unserved were:



[$] Avoiding license violations in a large organization "IndyWatch Feed Tech"

License violations are generally not done by malice, but simply by mistake. But correcting those mistakes can be messy, so it would be better for large (and small) organizations not to make them in the first place. To try to head off license problems, Andreas Schreiber and his colleagues at Germany's aeronautics and space research center, DLR, have put together educational materials and worked on training. Schreiber spoke about this work at FOSDEM 2018.

Subscribers can read on for a report on the talk by guest author Tom Yates.


Studies Show That Ride-Hailing Companies Increase Traffic Congestion "IndyWatch Feed Tech"

Uber, Lyft worsen city traffic, studies show: report

Despite promises of reducing traffic congestion, ride-hailing companies like Uber and Lyft are doing the opposite as their apps pluck passengers off public transportation and put pedestrians in cars, the Associated Press reported.

According to an AP review of research, studies show the ride-hailing apps are directly competing with mass transit and the increased number of taxis and Uber and Lyft cars on the road contribute to slower traffic. A New York-based study cited "vacant vehicles occupied only by drivers waiting for their next trip request," as a contributing factor for high-volume traffic in Manhattan's central business district, the AP reported.

Original Submission

Read more of this story at SoylentNews.


5G is in Danger of Being Oversold "IndyWatch Feed Tech"

Commercial service is years away, but even then, 5G wont fulfill all of its promises Illustration: Dan Page

5G report logo, link to report landing page
illustration Illustration: Dan Page

Just like graphene or Elon Musks startups, 5G has become a technology savior. Proponents tout the poorly defined wireless technology as the path to virtual reality, telemedicine, and self-driving cars.

But 5G is not a technologyits a buzzword unleashed by marketing departments. As early as 2012, Broadcom was using it to sell Wi-Fi. In reality, 5G is a term that telecommunications investors and executives sling around as the solution to high infrastructure costs, the need for more bandwidth, and a desire to boost margins.

The unifying component behind 5G is faster wireless broadband service. A more stringentand practicaldefinition is the use of high-frequency millimeter waves (in addition to the microwaves that 4G LTE relies on today) to deliver over-the-air broadband to phones or homes.

If youre talking about phones, 5G is still years away. And new services arent really on the menu. Just listen to the heads of several telecommunications companies, who have begun to tamp down investors expectations around what 5G can deliver.

At an industry event last November, Gavin Patterson, CEO of BT Group, which operates British Telecommunications, said commercial service remains a long way off. The transition from 3G networks to 4G networks happened quickly, he said, because there was immediate demand for faster data, driven largely by smartphones. From his perspective, those 4G networks are still humming along just fine.

At the same event, Johan Wibergh, CTO of Vodafone, said the real benefit of 5G is efficiencythe ability to deliver more bits at a lower cost. He claims that 5G will be 10 times more cost efficient than 4G LTE. Thats a...


MPAA Wants Filmmakers to Pay Licenses, Not Rip Blu-rays "IndyWatch Feed Tech"

Technically speaking its not hard to rip a DVD or Blu-ray disc nowadays, and the same is true for ripping content from Netflix or YouTube.

However, in the US people can break the law when they do this. The DMCAs anti-circumvention provisions specifically forbid it.

There are some exemptions, such as educational and other types of fair use, but the line between legal and illegal is not always clear, some argue.

Filmmakers, for example, are allowed to use small pieces of other copyrighted films under some conditions. However, this only applies to the documentary genre.

This is confusing and creates uncertainty, according to the International Documentary Association, Kartemquin Films, Independent Filmmaker Project, University of Film and Video Association, and several other organizations.

Late last year they penned a submission to the Copyright Office, which is currently considering updates to the exemptions, where they argued that all filmmakers should be allowed by break DRM and rip Blu-rays. The documentary exemptions have been in place for years now and havent harmed rightsholders in any way, they said.

There is no reason this would change if the documentary limitation were removed. All filmmakers regularly need access to footage on DVDs and without an exemption to DVDs, many non-infringing uses simply cannot be made, the groups noted.

Not everyone agrees with this assessment though. A group of joint creators and copyright owners which includes Hollywoods MPAA, the RIAA, and ESA informs the Copyright Office that such an exemption is too broad and a threat to the interests of the major movie studios.

The MPAA and the other groups point out that the exemption could be used by filmmakers to avoid paying licensing fees, which can be quite expensive.

Many of the filmmakers who have participated in the rulemaking assert that license fees are often higher than they are willing to pay, the Joint Creators and Copyright Owners write.

While unfortunate, the fact that a copyright owner has chosen to make works available on terms that are not palatable to a particular user does not make that users proposed use fair or justify granting an exemption.

If the filmmakers dont have enough budget to license a video, they should look for alternatives. Simply taking it without paying would hurt the bottom line of movie studios, the filing suggests.



Microgamer Is A Micro:Bit Handheld Console "IndyWatch Feed Tech"

The BBC micro:bit single board ARM computer aimed at education does not feature as often as many of its competitors  in these pages. Its not the cheapest of boards, and interfacing to it in all but the most basic of ways calls for a slightly esoteric edge connector. Were then very pleased to see that edge connector turned from a liability into a feature by [Fabien Chouteau] with his handheld console, he uses micro:bits preprogrammed with different games in the manner of game cartridges in commercial consoles.

The micro:bit sits in its edge connector on the underside of a handheld PCB above a pair of AAA batteries, while on the other side are an OLED display and the usual set of pushbuttons. Its a particularly simple board as the micro:bit contains all the circuitry required to support its peripherals.

If the micro:bit piques your interest, you might like to take a read about its software stack, and have a look at our review.


PayPal, FTC reach settlement over Venmo deception charges "IndyWatch Feed Tech"

PayPal reached a settlement with the Federal Trade Commission Tuesday over charges that its subsidiary Venmo had deceived customers about access to funds, privacy settings and data security.The FTC had alleged that Venmo was misleading consumers by...


Tell Congress to Protect the Open Internet "IndyWatch Feed Tech"

Today, EFF is participating in a national Day of Action to push Congress to preserve the net neutrality rules the FCC repealed in December. With a simple majority, Congress can use the Congressional Review Act (CRA) to overturn the FCCs new rule. Were asking for members of the House and Senate to commit to doing so publicly.

On Thursday, February 22, the FCCs so-called Restoring Internet Freedom Order was published in the Federal Register. Under the CRA, Congress has 60 working days to vote to overturn that Order. Were asking representatives to publicly commit to doing just that. In the House of Representatives, that means supporting Representative Mike Doyles bill, which has 150 co-sponsors. In the Senate, Senator Ed Markeys bill is just one vote away from passing.

Net neutrality means that Internet service providers (ISPs) should treat all data that travels over their networks fairly, without improperly discriminating in favor of particular apps, sites or services. For many years, net neutrality principles in various forms, have forbidden unfair practices like blocking or throttling particular services and sites, as well as paid prioritization, where an ISP charges content providers to get better or faster or more consistent access to the ISP's customer or prioritizes its own content over a competitors. Thanks to the hard work of millions of Internet users, these protections were enshrined in the FCCs 2015 Open Internet Order. The new Order eviscerated those protections; Congress can use the CRA to bring them back.

Because net neutrality is so popular, politicians often say they support it but lip service is not enough.  A vote to restore the net neutrality protections in the 2015 Open Internet Order is a clear, concrete thing that you can ask your representatives to do to support real net neutrality.

For that reason, were launching Check Your Reps, a website that allows you to see whether or not your representatives are voting yes on bringing back the 2015 Open Internet Order, email them voicing your support for net...


How Google implements the Right To Be Forgotten "IndyWatch Feed Tech"

Who is asking Google to delist certain URLs appearing in search results related to their name, and what kind of requests does the search giant honor? The company has been keeping track of them since the Right to be Forgotten privacy ruling has been put into practice by the European Union, and since January 2016 the companys reviewers have been manually annotating each requested URL with additional category data, including category of site, type of More


White House issues guidance to agencies on IT modernization "IndyWatch Feed Tech"

The White House on Tuesday issued formal guidance to federal agencies on implementing part of its push to modernize information technology across the federal government.The guidance released by the Office of Management and Budget (OMB) walks agency...


Bot Roundup: Avalanche, Kronos, NanoCore "IndyWatch Feed Tech"

Its been a busy few weeks in cybercrime news, justifying updates to a couple of cases weve been following closely at KrebsOnSecurity. In Ukraine, the alleged ringleader of the Avalanche malware spam botnet was arrested after eluding authorities in the wake of a global cybercrime crackdown there in 2016. Separately, a case that was hailed as a test of whether programmers can be held accountable for how customers use their product turned out poorly for 27-year-old programmer Taylor Huddleston, who was sentenced to almost three years in prison for making and marketing a complex spyware program.

First, the Ukrainian case. On Nov. 30, 2016, authorities across Europe coordinated the arrest of five individuals thought to be tied to the Avalanche crime gang, in an operation that the FBI and its partners abroad described as an unprecedented global law enforcement response to cybercrime. Hundreds of malicious web servers and hundreds of thousands of domains were blocked in the coordinated action.

The global distribution of servers used in the Avalanche crime machine. Source:

The alleged leader of the Avalanche gang 33-year-old Russian Gennady Kapkanov  did not go quietly at the time. Kapkanov allegedly shot at officers with a Kalashnikov assault rifle through the front door as they prepared to raid his home, and then attempted to escape off of his 4th floor apartment balcony. He was later released, after police allegedly failed to file proper arrest records for him.

But on Monday Agence France-Presse (AFP) reported that Ukrainian authorities had once again collared Kapkanov, who was allegedly living under a phony...


GhostRider: The Self-Driving Motorbike That Launched Anthony Levandowski "IndyWatch Feed Tech"

IEEE Spectrum unearths a 14-year-old press kit revealing the notorious engineers early ambitions Photo: Kim Kulish/Corbis via Getty Images GhostRider, a riderless motorbike built by a team of engineers led by Anthony Levandowski for the DARPA Grand Challenge in 2004.

Just because Waymo settled its high profile lidar trade secrets case against Uber earlier this month, it doesnt mean Anthony Levandowski is out of the spotlight. The U.S. Justice Department could still file criminal charges against the ex-Waymo engineer for the alleged theft of technical documents from his former employer. And then theres the question of what Levandowski is planning to do next: Will he use his vast experience with autonomous vehicles to launch another startupand make a comeback?

During a deposition last April, Levandowski did not want his experience and plans scrutinized. When Waymo lawyers asked him hundreds of questions, mostly about his activities at Waymo and Uber, Levandowski took the Fifth, to avoid answering questions that might incriminate him. There was, however, one project he was eager to talk about: GhostRider.

What was your entry into the [2004] DARPA Challenge? asked one lawyer, referring to the Pentagons famous $1 million self-driving vehicle competition that kickstarted the entire industry. The entry was called GhostRider, and it was a two-wheeled motorcycle, replied Levandowski. It was the first of its kind... [and] frankly, a pretty crazy idea.

Building GhostRider cast Levandowski as a robotics wunderkind, secured his place at a follow-up DARPA Grand Challenge, and ultimately enabled him to build Googles first self-driving cara step that would later make him a multimillionaire. In 2007, Levandowski immortalized his role as an autonomous vehicle pioneer by donating GhostRider to the Smithsonians National Museum of American History in Washington, D.C.



Recently patched CVE-2018-4878 Adobe Flash Player flaw now exploited by cybercriminals "IndyWatch Feed Tech"

Security researchers at Morphisec have uncovered a massive hacking campaign that is exploiting the recently patched CVE-2018-4878 Adobe Flash Player vulnerability.

Threat actors are exploiting the use-after-free flaw to deliver malware.

The CVE-2018-4878 vulnerability was fixed by Adobe on February 6, after security experts discovered it was used by North Korea-linked APT37 group in targeted attacks against South Korea.

The attackers used spam emails containing a link to a document stored on safe-storage[.]biz. Once downloaded and opened, the document tries to trick victims with social engineering. It notifies users that an online preview is not available and instructs them to enable editing mode in order to view the content.

If the user enables the editing mode, the CVE-2018-4878 Adobe vulnerability is exploited and the Windows command prompt is executed. The associated cmd[.]exe file is then injected with malicious shellcode that connects to the attackers domain.

Security researchers at Morphisec have uncovered a massive hacking campaign that is exploiting the recently patched CVE-2018-4878 Adobe Flash Player vulnerability.

Threat actors are exploiting the use-after-free flaw to deliver malware.

The CVE-2018-4878 vulnerability was fixed by Adobe on February 6, after security experts discovered it was used by North Korea-linked APT37 group in targeted attacks against South Korea.

The campaign is attribut...


East Asia Mainland China in Particular Already Becoming a Victim of Its Patent Policy as Software Patent Trolls Prey on Producing Companies "IndyWatch Feed Tech"

Neither bad decisions nor term limits can stop Pooh the Bear

Pooh the Bear

Summary: The highly misguided patent policy (disregarding quality control) has so far led to a saturation of patent trolls and a lot of predation which already drives LG out of China and might soon cause other companies (maybe Samsung) to do the same; the MPEG cartel, whose Western patents are expiring, is going on a fishing expedition in China

As many concerned observers have warned for number of years (us included), China is becoming a haven for patent trolls. It has become friendly towards software patents and mass litigation (the EPO imitates this, whereas the USPTO goes in the opposite direction, which helps explain the surge of patent trolls in Europe even before a UPC-like regime and their demise in the US).

Some hours ago IAM said that large companies are becoming prime targets of Chinese patent trolls (IAM did not use the term patent trolls because its a denialist, paid by the industry that stands to benefit from such denials). To quote:

Last November, IAM reported that Samsung Electronics, already locked in a high-stakes litigation battle with Huawei, was also facing multiple NPE suits in Chinese courts. One of the NPE plaintiffs was Shenzhen Dunjun Technology, and it was asserting a patent originally assigned to none other than Huawei. A search of Chinese court rulings reveals that this suit was not necessarily a one-off connected to the Samsung-Huawei dispute. Dunjuns assertions go back several years, and include very large companies, both foreign and domestic.

According to an article published in the Chinese media, Dunjun is a licensing company set up in 2014, whose executive team includes former employe...


CAFC and PTAB Are Both Being Insulted by the Patent Maximalists, Who Resort to Offensive Cartoons and Lies "IndyWatch Feed Tech"

Judge Reyna

Summary: The plaintiff-hostile patent courts, which have become strict on patent scope, are receiving scorn and abuse from the patent industry; the Court of Appeals for the Federal Circuit (CAFC), for example, sees a judge of Mexican heritage caricaturised as shown above

SOFTWARE patents continue their rapid demise in the United States.

Earlier on the Docket Navigator highlighted this new decision wherein a USPTO-granted patent got invalidated (under 35 U.S.C. 101). The court granted defendants motion for summary judgment that the asserted claims of plaintiffs gaming machine patents encompassed unpatentable subject matter and found that the claims lacked an inventive concept, said the summary.

Unified Patents has also just noted that its PTAB petition was likely successful and the Walker Innovation [sic] patent likely invalidated.One can imagine that the court/trial fees (attorneys etc.) were a lot higher than the cost of PTAB petitions (IPRs).

Unified Patent has also just noted that its PTAB petition was likely successful and the Walker Innovation [sic] patent likely invalidated. To quote:

On February 23, 2018, Unified filed a petition for inter partes review (IPR) against U.S. Patent 8,549,310 owned and asserted by Certified Measurement, a subsidiary of Walker Innovation and well-known NPE. The 310 patent, directed to a method and apparatus for secure measurement certification, has been asserted in multiple cases against such companies as Yokogawa America, ABB, and Alstom.

This has become the norm rather than a rarity. The patent micrososm is just trying to cause a controversy and allege that PTAB does not assess evidence/facts. Its an old and easy-to-debunk lie (typically promoted in sites of patent trolls) which Patently-O...


[ANNOUNCE] Apache Traffic Server vulnerability with TLS handshake - CVE-2017-7671 "IndyWatch Feed Tech"

Posted by Bryan Call on Feb 27

CVE-2017-7671: Apache Traffic Server vulnerability with TLS handshake

The Apache Software Foundation

Version Affected:
ATS 5.2.0 to 5.3.2
ATS 6.0.0 to 6.2.0
ATS 7.0.0

There is a DOS attack vulnerability in ATS with the TLS handshake. This issue can cause the server to coredump.

5.x users should upgrade to 7.1.2 or later versions
6.x users should upgrade to 6.2.2 or later versions
7.x users should upgrade to...


Chinas Web Censors Go into Overdrive as President Xi Jinping Consolidates Power "IndyWatch Feed Tech"


"China's web scrubbers have been busy banning a collection of terms and dropping the hammer on user accounts after the Xi Jinping, the country's premier, got the all-clear to become 'President For Life' after the Communist Party moved to amend the constitution to remove an article that limits Presidential terms to two five-year terms."


"The comments remaining on the popular Sina Weibo microblog are mostly monosyllabic statements from users simply say they "like" or "approve" the amendments.

They are likely to be from China's "50 Cent Party" - a nickname coined for internet commentators who are paid small amounts to post messages supporting the government's position.

Some posts have attracted thousands of comments - but only a few are available to view. This is traditionally indicative of online censorship by government administrators. "

China Digital Times:

"Following state media's announcement, censorship authorities began work to limit online discussion. CDT Chinese editors found the following terms blocked from being posted on Weibo: [...]"


Original Submission

Read more of this story at SoylentNews.


RandR CRTC/Output Leases Lands In X.Org Server "IndyWatch Feed Tech"

One big piece of Keith Packard's work on improving Steam VR for Linux or particularly VR HMD handling is now merged to Git master...


Dems introduce legislation to stop FCC net neutrality repeal "IndyWatch Feed Tech"

Democratic lawmakers on Tuesday introduced legislation in both chambers of Congress to reverse the Federal Communications Commissions (FCC) repeal of net neutrality rules.The Senate legislation has the support of 50 lawmakers, including one...


Chopper And Chopper-Stabilised Amplifiers, What Are They All About Then? "IndyWatch Feed Tech"

One of my first jobs as a freshly minted graduate engineer involved the maintenance of a set of analogue chart recorders. They were museum pieces by the early 1990s: a motorized roll of graph paper across which a pen would traverse in proportion to the voltage on the input terminals. Inside was a simple servo, with a differential amplifier comparing the feedback via a potentiometer from the mechanism with the amplified input.

The recorders dated from the early 1960s, and internally their electronics were from the germanium transistor era: many Mullard OC-series devices, black-painted glass tubes with a red dot, and, unexpectedly, a large electromagnet connected to the 50 Hz AC supply with a reed switch through its middle, something completely new to an overconfident youngster who thought she knew everything.

What Id stumbled upon was a chopper amplifier, a slightly ungainly and long superseded solution to the problem of DC amplification from the days before ubiquitous integrated circuit op-amps. We have become so used to DC amplifiers that just work, that we have forgotten that there was a time when such devices were an impossibility. The close matching of properties between devices on the same wafer allowed integrated circuit op-amps to achieve stable DC amplification in a way that the best attempts at the same circuits with discrete transistors had failed, but before they happened some desperate measures were called for.



Mobile banking Trojans spread confusion worldwide "IndyWatch Feed Tech"

Consumers around the world that use mobile banking apps are at a greater risk of being tricked by cybercriminals and falling victim to mobile banking theft. This is according to new global research from Avast, which asked almost 40,000 consumers in Spain and eleven other countries around the world to compare the authenticity of official and counterfeit banking application interfaces. Fraudulent software sometimes difficult to identify Globally, 58% of respondents identified the official mobile banking More


[ANNOUNCE] Apache Traffic Server host header and line folding - CVE-2017-5660 "IndyWatch Feed Tech"

Posted by Bryan Call on Feb 27

CVE-2017-5660: Apache Traffic Server host header and line folding

The Apache Software Foundation

Version Affected:
ATS 6.2.0 and prior
ATS 7.0.0 and prior

There is a vulnerability in ATS with the Host header and line folding. This can have issues when interacting with
upstream proxies and the wrong host being used.

6.2.x users should upgrade to 6.2.2 or later versions
7.x users should upgrade to 7.1.2 or...


Court grapples with warrant powers for emails stored overseas "IndyWatch Feed Tech"

The Supreme Court wrestled Tuesday with whether the government can search and seize the contents of emails that technology companies store overseas in a potential landmark battle over information stored in the cloud.The case stems from...


Mirai Variant OMG Turns IoT Devices into Proxy Servers for Cryptomining "IndyWatch Feed Tech"

By Waqas

Mirai IoT bot malware is one such piece of malicious

This is a post from Read the original post: Mirai Variant OMG Turns IoT Devices into Proxy Servers for Cryptomining


Trump Announces Re-Election Campaign and Campaign Manager "IndyWatch Feed Tech"

Its a bit like the Christmas shit appearing in stores in October. Hmm. I wonder if Theyll fit Hillary with a powered exoskeleton suit this time? Via: CBS: President Donald Trump announced that hes running for re-election in 2020, and Brad Parscale, who served as the Trump campaigns 2016 digital guru, has been named campaign []


Richard Epstein From a Koch-Funded Think Tank Attacks PTAB Because PTAB Squashes Weak Patents That Only Exist for Protectionism and Offense "IndyWatch Feed Tech"

Under the guise of small government or limited government (the slant used by billionaires to thwart regulations)

Richard Epstein
Richard Epsteins bio above. Basically a serial lobbyist for keeping the government from intervening in the business affairs of plutocrats like the Koch Brothers (serial polluters).

Summary: A think tank of the Koch Brothers, typically known as Fed Soc (a misnomer), is the latest example of corruption/perturbation of the law by billionaires; they are not happy to see patent quality being improved or the threshold/bar raised

EARLIER THIS year we wrote about how and why the Koch Brothers are attacking the Patent Trial and Appeal Board (PTAB). Earlier today we wrote about one of their scholars, who are basically just drinking off billionaires duds in exchange for corrupt (paid-for) research. Right now, for example, their eyes are set on Congress, the Supreme Court, and the USPTO. This isnt normal and it is definitely not acceptable. What we have here is a bunch of billionaires just trying to virtually if not literally buy the law. We also know what they want: more for themselves and less for everyone else. They want protectionism, tax cuts, relaxation of regulations and so on.

Watch how villainous staff of theirs (bio above, showing direct affiliation) fires away another very long rant about PTAB. We know whos paying for this and its not Richard Epsteins pro bono endeavour. MUST READ by Richard Epstein, a patent maximalist called it, latching onto a think tank (or AstroTurfing for billionaires) because that suits his personal agenda. To quote the concluding words:

Oil States gives the Supreme Court the chance to stop a process that has already run off the rails. And if it does not, Congress should take steps to restore the proper constitutional balance.

Epstein also writes for SCOTUS Blog, which...


California to Allow Testing of Self-Driving Cars Without a Driver Present "IndyWatch Feed Tech"

Thinking about the security side of this sends a chill down my spine. Weve all heard of botnets. Were probably not more than a couple of years away from the first botnet consisting of thousands of autonomous vehicles. I have roughly zero confidence that the security around autonomous vehicles will be sufficient to prevent this []


AI Trained to Spot Heart Disease Risks Using Retina Scan "IndyWatch Feed Tech"

The idea behind using a neural network for image recognition is that you don't have to tell it what to look for in an image. You don't even need to care about what it looks for. With enough training, the neural network should be able to pick out details that allow it to make accurate identifications.

For things like figuring out whether there's a cat in an image, neural networks don't provide much, if any, advantages over the actual neurons in our visual system. But where they can potentially shine are cases where we don't know what to look for. There are cases where images may provide subtle information that a human doesn't understand how to read, but a neural network could pick up on with the appropriate training.

Now, researchers have done just that, getting a deep-learning algorithm to identify risks of heart disease using an image of a patient's retina.

The idea isn't quite as nuts as it might sound. The retina has a rich collection of blood vessels, and it's possible to detect issues in those that also effect the circulatory system as a whole; things like high levels of cholesterol or elevated blood pressure leave a mark on the eye. So, a research team consisting of people at Google and Verily Life Sciences decided to see just how well a deep-learning network could do at figuring those out from retinal images.


Original Submission

Read more of this story at SoylentNews.


Researchers Discover How to Supercharge Stem Cells "IndyWatch Feed Tech"

Researchers at the School of Molecular Sciences at Arizona State University have discovered a potential way to supercharge our stem cells and reverse some aspects of cellular aging.

The Hayflick limit

Normal cells cannot divide indefinitely; they have a built-in replicative limit, which is often called the Hayflick limit after its discoverer, Leonard Hayflick. This Hayflick limit means that regular human cells are unable to replicate forever; once they reach their replicative limit, they cease to divide and enter senescence, a nondividing state in which the cell destroys itself.


Cryptographers Urge People to Abandon IOTA After Leaked Emails "IndyWatch Feed Tech"

A dump of private emails pits developers of the cryptocurrency against external security researchers Photo: iStock Photo

This past weekend, multiple prominent security researchers and academic cryptographers took to Twitter to paint a big black mark on the cryptocurrency project, IOTA. The posts implore investors not to hold the currency and researchers not to collaborate on enhancing the security of the system.

An outcry was triggered shortly after a chain of private emails sent among the IOTA team and a group of external security researchers was made public, exposing the developers response to the disclosure of a critical flaw in one of their cryptographic building blocks. The correspondence, which ended with vague threats of legal action by IOTA founder, Sergey Ivancheglo, against a member of the Boston University security group, has prompted many academic researchers to deonunce the entire project.

Among those speaking out against the IOTA team is Matthew Green, an applied cryptographer at Johns Hopkins University, who is himself one of the original architects of a popular cryptocurrency, Zcash.



Creating Driving Tests for Self-Driving Cars "IndyWatch Feed Tech"

Volvo-backed Zenuity wants to prove that autonomous vehicles can drive more safely than humans Illustration: Jude Buffum

illustration Illustration: Jude Buffum

At a test track east of Gothenburg, Sweden, people are ushered into autonomous vehicles for a test drive. But theres a twist: The vehicles arent actually autonomoustheres a hidden driver in the backand the people are participating in an experiment to discover how theyll behave when the car is chauffeuring them around.

At Zenuitya joint venture between Volvo and Autoliv, a Swedish auto-safety companythis test is just one of many ways we make sure not just that autonomous vehicles work but that they can drive more safely than humans ever could. If self-driving cars are ever going to hit the road, theyll need to know the rules and how to follow them safely, regardless of how much they might depend on the human behind the wheel.

Even now your car doesnt need you as much as it once did. Advanced computer vision, radar technology, and computational platforms already intervene to avoid accidents, turning cars into guardian angels for their drivers. Vehicles will continue taking over more driving tasks until theyre capable of driving themselves. This will be the biggest transportation revolution since cars replaced horse-drawn carriages.

But its one thing to build a self-driving vehicle that works, and quite another to prove that its safe. Traffic can be as unpredictable as the weather, and being able to respond to both means navigating countless scenarios. To fully test all those scenarios by simply driving around would take not years but centuries. Therefore, we have to find other ways to assure safetythings like computer simulations and mathematical modeling. Were combining real traffic tests with extensive augmented-reality simulations and test cases on one of the worlds most advanced test tracks to truly understand how to make self-driving cars safe.

Its easy for a self-driving vehicle to cruise down a straightaway in the middle of a sunny day. But what about what we call corner casesscenarios in which several unlikely factors occur together? A road littered with fallen branches during a thunderstorm poses different challenges to a vehicl...



Vodafone to install 4G network on the Moon "IndyWatch Feed Tech"

T he Moon will have a 4G mobile network installed next year, according to plans set out by Vodafone and Nokia.

The mission, organised by space exploration company PTScientists, will be the first ever privately-funded Moon landing.

Nokia masts will be launched on a SpaceX rocket in 2019 from Cape Canaveral Air Force Station in Florida, USA.


Fail of the Week: The Little Ultrasonic Knife That Couldnt "IndyWatch Feed Tech"

We all know the feeling of an idea that sounded great when it was rattling around in our head, only to disappoint when we actually build the thing. Its a natural consequence of trying new stuff, and when it happens, we salvage what we can and move on, hopefully in wisdom.

The thing that at least semi-defeated [This Old Tony] was an attempt to build an ultrasonic cutter, and it didnt go well. Not that any blood was shed in the video below, although there seemed like there would be the way [Old Tony] was handling those X-Acto blades. His basic approach was to harvest the transducer and driver from a cheap ultrasonic cleaner and retask the lot into a tool to vibrate a knife rapidly enough to power it through tough materials with ease.

The video is longish, but its as entertaining as any of [Old Tony]s videos, and packed full of incidental gems, like the details of cavitation. We enjoyed it, even if the results were suboptimal. If you want to see a [This Old Tony] project that really delivers, check out his beautiful boring head build.


The EPOs Appeal Boards Remain Utterly Dependent and Far From Impartial After Battistellis Assault on Their Independence "IndyWatch Feed Tech"

Team Chinchilla is very pleased about the exile/exodus of judges

Boards of Appeal President Carl Josefsson, EPO Vice President Raimund Lutz, Haar Mayor Gabriele Mller, Administrative Council Chairman Christoph Ernst

Summary: In spite of their mass relocation (exile) to Haar, judges of the Boards of Appeal do not feel independent and the recent forced exile (to another country) of their colleague Patrick Corcoran reaffirms this perception, not to mention the Appeal Boards Vice President, who is also oddly chosen (like Carl Josefsson above, on the left)

THE MANAGEMENT of the EPO is having another go at changing perceptions because of the UPC. It wants the public, the stakeholders, German judges etc. to actually believe that all problems at the BoA (Boards of Appeal) have been resolved. The EPO, moreover, tries to interject the perception of public input on BoA. We wrote about this several times before and earlier today too the EPO wrote: Help us improve the efficiency and predictability of proceedings before the EPO Boards of Appeal.

The EPO, moreover, tries to interject the perception of public input on BoA.A good start would be to reinstate Patrick Corcoran in his old role, I told them. Thatll never happen though. They cannot accept the idea of a dissenting judge, i.e. a person who does not speak Battistellis gospel (e.g. about the integrity of Battistellis appointees and patent quality).

As a matter of fact, things are getting worse at BoA, which months ago was sent to Haar as punishment (with the spin that relocation was really an attempt at enhancing independence). A few days ago someone in IP Kat (comments of course, as the posts are worthless propaganda and self-promotion these days) alluded to the Appeal Boards Vice President, i.e. deputy to Battistellis approved pick of President.

Tenures/terms are long enough to outlive Battistellis reign of terror.In Distribution of Business, a source told us cryptically, Vice President of the Appeal Boards is part of some Appeal Board. Can other members of Appeal Boards be independent if he will be deciding appointments of them?

Of course not. Then again, the President too is selected in a sham process and Battistelli put...


Vaclav Smil "IndyWatch Feed Tech"


Vaclav Smil writes Numbers Dont Lie, Spectrums column devoted to the quantitative analysis of the material world. Smil  does interdisciplinary research focused primarily on energy, technical innovation, environmental and population change, food and nutrition and on historical aspects of these developments. He has published 40 books and nearly 500 papers on these topics. He is a Distinguished Professor Emeritus at the University of Manitoba and a Fellow of the Royal Society of Canada (Science Academy). In 2010 he was named by Foreign Policy as one of the top 100 global thinkers, in 2013 he was appointed as a Member of the Order of Canada, and in 2015 he received OPEC Award for  research on energy. He has also worked as a consultant for many US, EU and international institutions, has been an invited speaker in more than 400 conferences and workshops and has lectured at many universities in the North America, Europe and Asia (particularly in Japan).


Hello, I am CIMON! "IndyWatch Feed Tech"

CIMON (Crew Interactive Mobile CompanioN) is a mobile and autonomous assistance system designed to aid astronauts with their everyday tasks on the ISS. This will be the first form of Artificial Intelligence (AI) on an ISS mission. CIMON is an experiment overseen by Space Administration at the German Aerospace Center (DLR) in cooperation with Airbus (Friedrichshafen/Bremen, Germany) as the prime contractor. CIMON is a free flyer fueled with Artificial Intelligence, enhancing human expertise. AI-based technology is about constantly understanding, reasoning and learning, so CIMON is designed to assist and to create a feeling of talking to a crew mate.



GLAMOR & xf86-video-modesetting Get Deep Color Support In X.Org Server 1.20 "IndyWatch Feed Tech"

Independent developer Mario Kleiner has spent the past several months working on plumbing the Linux graphics stack for better "deep color" or 30-bit color depth support. His latest work on the X.Org Server has now been merged to mainline...


Security updates for Tuesday "IndyWatch Feed Tech"

Security updates have been issued by Fedora (exim, irssi, php-phpmyadmin-motranslator, php-phpmyadmin-sql-parser, phpMyAdmin, and seamonkey), Mageia (cups, flatpak, golang, jhead, and qpdf), Oracle (gcab, java-1.7.0-openjdk, and kernel), Red Hat (gcab, java-1.7.0-openjdk, and java-1.8.0-ibm), Scientific Linux (gcab and java-1.7.0-openjdk), and Ubuntu (sensible-utils).


Links 27/2/2018: Linux 4.16 RC3, Wayland 1.15 Alpha, Mesa 17.3.6 "IndyWatch Feed Tech"

GNOME bluefish



  • Getting to Done on the Linux command line

    There is a lot of talk about getting things done at the command line. How many articles are there about using obscure flags with ls, nifty regular expressions with Sed and Awk, and how to parse out lots of text with Perl? That isnt what this is about.

    This is about Getting to Done, making sure that the stuff we have to do actually gets tracked and done using tools that dont require a graphical desktop, a web browser, or an internet connection. To do this, well look at four ways of tracking your to-do list: plaintext files, Todo.txt, TaskWarrior, and Org-mode.

  • Desktop

    • Chrome OS to support running Linux software in virtual machines

      The idea of a fusion of Android and Chrome OS might not be totally dead but is, instead, taking on a different form. And that form comes in Chrome OS ability to run almost any kind of software from any OS, officially or otherwise. A recently spotted change to the Chromium source seems to imply that, in just a few months, Chromebooks might officially support running Linux software, considerably expanding the number of possible uses these cloud machines can have.

    • ...


Some Black Holes Could Erase Your Past "IndyWatch Feed Tech"

In the real world, your past uniquely determines your future. If a physicist knows how the universe starts out, she can calculate its future for all time and all space.

But a UC Berkeley mathematician has found some types of black holes in which this law breaks down. If someone were to venture into one of these relatively benign black holes, they could survive, but their past would be obliterated and they could have an infinite number of possible futures.

Such claims have been made in the past, and physicists have invoked "strong cosmic censorship" to explain it away. That is, something catastrophic -- typically a horrible death -- would prevent observers from actually entering a region of spacetime where their future was not uniquely determined. This principle, first proposed 40 years ago by physicist Roger Penrose, keeps sacrosanct an idea -- determinism -- key to any physical theory. That is, given the past and present, the physical laws of the universe do not allow more than one possible future.

But, says UC Berkeley postdoctoral fellow Peter Hintz, mathematical calculations show that for some specific types of black holes in a universe like ours, which is expanding at an accelerating rate, it is possible to survive the passage from a deterministic world into a non-deterministic black hole.

What life would be like in a space where the future was unpredictable is unclear. But the finding does not mean that Einstein's equations of general relativity, which so far perfectly describe the evolution of the cosmos, are wrong, said Hintz, a Clay Research Fellow.

Vitor Cardoso, Joo L. Costa, Kyriakos Destounis, Peter Hintz, Aron Jansen. Quasinormal Modes and Strong Cosmic Censorship. Physical Review Letters, 2018; 120 (3) DOI: 10.1103/PhysRevLett.120.031103


Original Submission

Read more of this story at SoylentNews.


How to Manage Kubernetes Apps with Helm Charts "IndyWatch Feed Tech"

How to Manage Kubernetes Apps with Helm Charts


New bypass and protection techniques for ASLR on Linux "IndyWatch Feed Tech"

Posted by Ilya Smith on Feb 27

Hello everybody,

New bypass and protection techniques for ASLR on Linux


I. Introduction
II. Problems with current implementation
II.1. Close proximity of memory location
II.2. Fixed method of loading libraries
II.3. Fixed order of execution
II.4. Holes
II.5. TLS and thread stack...


Western Digital Announces Worlds Fastest 400GB SanDisk Extreme microSD card "IndyWatch Feed Tech"

Western Digitals SanDisk Launches Worlds Fastest 400GB Extreme UHS-I microSDXC card

Western Digital Corporation (WDC), a global storage technology and solutions leader, announced the new 400GB SanDisk Extreme microSDXC UHS-I card the fastest UHS-I flash memory card in its class at the Mobile World Congress (MWC) 2018 in Barcelona, Spain.

The companys new 400GB SanDisk Extreme UHS-I microSD card is designed to help consumers move their high-quality content faster than ever. With read speeds of up to160MB/s, the new card is more than 50 percent faster than current SanDisk Extreme UHS-I microSD cards, making it ideal for use in high-end Android smartphones, action cameras and drones. It also offers extreme speeds and fast transfer for 4K Ultra HD video. However, the write performance is less striking at just 90MB/s.

According to the company, these unprecedented speeds are possible due to leveraging of Western Digital proprietary technology. The card will also feature the A2 specification, which demands a minimum random read speeds of 4,000IOPS, a minimum random write of 2,000IOPS, and a minimum sustained read speed of 10MB/s to help launch and load apps at blazing speeds.

Jim Welsh, Senior Vice President and General Manager, Client Solutions, Western Digital, said Consumers expect an increasingly better mobile experience, and with our 3D NAND technology, we are pushing the boundaries of innovation to enable them to create and enjoy more rich content on their devices. Our expertise in flash memory and microSD card electronics enables us to achieve unmatched performance. The breakthrough SanDisk microSD card is evidence of Western Digitals commitment to delivering more advanced solutions that enable data to thrive.

The company says it is ideal for recording outdoor adventures, weekend trips, or sporting events without skipping frames. The 400GB1 SanDisk Extreme microSD UHS-I card lets you capture uninterrupted 4K UHD and Full HD video with its UHS Speed Class 3 (U3) and Video Speed Class 30 (V30) ratings.
Also, a copy of the RescuePRO Deluxe data recovery software is provided to the owner to recover any files that are accidentally deleted. Further, the card is waterproof, dustproof, shockproof, X-ray proof and can function in a wide range of temperatures between -13F and 185F (-25C to 85C).

The new 400GB microSD the fastest SD card, is expected to cost you $300 for its largest capacity.

In addition, Western Digital also showcased its PCIe-enabled SD card at the MWC 2018, which the company is calling the future of flash memory card technology. The company claims that the technology can now be demonstrated to boost the perform...


Cellebrite Hacking Tool Unlocks Any iOS Devices Including iPhone X "IndyWatch Feed Tech"

By Waqas

You must remember the long and tedious battle between Federal

This is a post from Read the original post: Cellebrite Hacking Tool Unlocks Any iOS Devices Including iPhone X


Can Open-source Hardware Be Like Open-source Software? "IndyWatch Feed Tech"

Hardware and software are certainly different beasts. Software is really just information, and the storing, modification, duplication, and transmission of information is essentially free. Hardware is expensive, or so we think, because its made out of physical stuff which is costly to ship or copy. So when we talk about open-source software (OSS) or open-source hardware (OSHW), were talking about different things OSS is itself the end product, while OSHW is just the information to fabricate the end product, or have it fabricated.

The fabrication step makes OSHW essentially different from OSS, at least for now, but I think theres something even more fundamentally different between the current state of OSHW and OSS: the pull request and the community. The success or failure of an OSS project depends on the community of people developing it, and for smaller projects that can hinge on the ease of a motivated individual digging in and contributing. This is the main virtue of OSS in my opinion: open-source software is most interesting when people are reading and writing that source.

With pure information, its essentially free to copy, modify, and push your changes upstream so that others can benefit. The open hardware world is just finding its feet in this respect, but thats changing as we speak, and I have great hopes. Costs of fabrication are falling all around, open and useful tools are being actively developed to facilitate interchange of the design information. I think there are lessons that OSHW can learn from the OSS communitys pull-request culture, and that will help push the hardware hackers art forward.

What would it take to get you to build someone elses OSHW project, improve on it, and contribute back? Thats a question worth a thoughtful deep dive.

The Patch and the Pull Request

Back in the early days of what we now think of as open-source software, there was the patch. Indeed, the UNIX utilities diff and patch are probably the unsung heroes of the OSS movement. They enabled a programmer to easily figure out the difference between two (source code) files and pass those changes on to someone else.



Embedded Apprentice Linux Engineer Courses Coming to a Conference Near You "IndyWatch Feed Tech"

Embedded Apprentice Linux Engineer Courses Coming to a Conference Near You


Comcast offers $31B bid for Sky, vying with Disney and Fox "IndyWatch Feed Tech"

Comcast is offering a $31 billion bid to purchase the European broadcaster Sky, hoping to beat out Disney and 21st Century Fox.The cable company on Tuesday announced the offer, which is a 16 percent increase from Foxs bid to obtain majority control...


Can India's Biometric Identity Program Aadhaar Be Fixed? "IndyWatch Feed Tech"

The Supreme Court of India has commenced final hearings in the long-standing challenge to India's massive biometric identity apparatus, Aadhaar. Following last Augusts ruling in the Puttaswamy case rejecting the Attorney General's contention that privacy was not a fundamental right, a five-judge bench is now weighing in on the privacy concerns raised by the unsanctioned use of Aadhaar.

The stakes in the Aadhaar case are huge, given the central governments ambitions to export the underlying technology to other countries. Russia, Morocco, Algeria, Tunisia, Malaysia, Philippines, and Thailand have expressed interest in implementing biometric identification system inspired by Aadhaar. The Sri Lankan government has already made plans to introduce a biometric digital identity for citizens to access services, despite stiff opposition to the proposal, and similar plans are under consideration in PakistanNepal and Singapore. The outcome of this hearing will impact the acceptance and adoption of biometric identity across the world.

At home in India, the need for biometric identity is staked on claims that it will improve government savings through efficient, targeted delivery of welfare. But in the years since its implementation, there is little evidence to back the government's savings claims. A widely-quoted World Bank's estimate of $11 billion annual savings (or potential savings) due to Aadhaar has been challenged by economists.

The architects of Aadhaar also...


New Alliance Wants to Improve Terrible In-Flight Internet "IndyWatch Feed Tech"

Things may be looking up for internet access on board commercial aircraft in the future.

The frustrations of internet access aboard commercial aircraft may soon be a thing of the past, thanks to the Seamless Air Alliance. Formed by Airbus, Delta, OneWeb, Sprint and Airtel, the group aims to improve the connectivity experience for passengers aboard aircraft by allowing mobile operators to provide internet access directly via satellite tech.

The group aims to reduce the costs and headaches associated with the installation and operation of the infrastructure required to provide connectivity on aircraft. The end goal is to work together to cut costs and provide passengers with fast, reliable internet onboard aircraft. It would combine higher speeds with a better user experience because passengers wouldn't have to pay separately for internet access once on board.

Original Submission

Read more of this story at SoylentNews.


MS Word Maybe Used for Cryptojacking Attacks "IndyWatch Feed Tech"

By David Balaban

Cryptojacking JavaScript can be launched in Word documents New

This is a post from Read the original post: MS Word Maybe Used for Cryptojacking Attacks


All-star team of synthetic biologists raise $53 million for cancer therapy startup Senti "IndyWatch Feed Tech"

A whos-who from the world of synthetic biological research have come together to launch Senti Biosciences with $53 million in funding from a slew of venture capital investors.

Led by Tim Lu, a longtime researcher at the Massachusetts Institute of Technology and one of the founding fathers of synthetic biology, Sentis aim is nothing less than developing therapies that are tailored to an individuals unique biology and their first target is cancer.

Heres how Lu described a potential cancer treatment using Sentis technology to me. We take a cell derived from humans that we can insert our genetic circuits into we insert the DNA and encoding and deliver those cells via an IV infusion. We have engineered the cells to locate where the tumors are What weve been doing is engineering those cells to selectively trigger an immune response against the tumor.


Changes in Apples iCloud Security Policies and Argument of China "IndyWatch Feed Tech"

Changes in Apples iCloud Security Policies Apple announced to relocating the encryption key for users data in China; from the United States of America to some country in Asia!

The latest chaos in the digital world regarding Apple has stricken like a bullet, as the iPhone manufacturer announced to relocating the encryption key for users data in China; from the United States of America to some country in Asia!

Well, some security advocates argue that this is incorrect for the corporation itself as well as a privacy threat for users, but according to Apple Company; the codes are secure.
According to the reports, the users of iCloud in China are confused that in what way Apple will manage the confidentiality of their essential data.

Apple too fears that data protection employees have concerns about changing the privacy of iCloud users in China, as per two reports this week.
The classified data such as online emails, photographs, and messages stay protected from hackers by encryption. And now, Apple will store encryption keys in China instead of the United States of America (Reuters and the Wall Street Journal reports).

It means that the Chinese authorities do not need to go to USA law agencies to force Apple to provide the rights to the data. This step in reaction to newly introduced laws in China, according to which iCloud services offered to the citizens, should secure data within premises of the country and can be used by Chinese organizations.

By the end of the coming month, Apple is going to start transmitting coded information to China and will work closely with a Chinese government. Apple did not say when the encryption data keys would move abroad.

Data protection advocates said, The change can cause problems for political and other dissidents.
Given that Apple is going to work in China, it is unlikely that government can get access to Apples data from the local community, said the professor at the Toronto University, studying the actions of the Chinese government carefully.

Apple says, however, that the data keys stored in a secure place, still Apple will control them. Besides, Apple also claimed that it would provide data only on demand to Chinas current legislative requirements and did not create loopholes for access.
Apples high-level officer said to news agencies that iCloud is a matter of concern for the recently introduced laws.



Automating out of the skill gap sinkhole "IndyWatch Feed Tech"

The cybersecurity skills gap is one of the most daunting challenges facing the industry. We have a vibrant ecosystem of technology vendors developing shiny new tools, but the people who must use these tools to defend our sensitive networks are getting harder and harder to find. Whats more, demand is continuing to increase at a much faster rate than supply. If you have tried to hire cybersecurity professionals recently, you are fully aware security More


Serverless Security: What's Left to Protect? "IndyWatch Feed Tech"

The cost savings Serverless offers greatly accelerated its rate of adoption, and many companies are starting to use it in production, coping with less mature dev and monitoring practices to get the monthly bill down. Such a trade off makes sense when you balance effort vs reward, but one aspect of it is especially scary security.

Key Takeaways


Automated Compliance Testing with InSpec "IndyWatch Feed Tech"

Those who have been involved in converting a home-grown system to one in which strict compliance rules are observed knows the pain involved. Whereas previously a laissez-faire atmosphere ruled the day, all of a sudden, a rigid structure with many requirements and conditions regulate the administrator's work, often with far-reaching consequences. The sheer volume of regulations alone can make moving forward difficult. If a quick fix is needed in an emergency, compliance rules often provide for exceptions, but they do need to be replaced by the right solutions looking forward.


Cryptojacking is the new malware "IndyWatch Feed Tech"

The success of cryptocurrencies such as Bitcoin, is driving the increasing popularity of cryptomining, the process by which thse currencies are earned. At its core, mining for cryptocurrency requires massive computing power. This in turn has led enterprising miners to seek new and sometimes unethical methods of gaining access to computing resources by hijacking them via web browsers, giving rise to a new form of malware called cryptojacking. Each cryptojacked machine may provide a small More


Endless OS Helps Tear Down Linux Wall "IndyWatch Feed Tech"

The Endless OS community's goal is to build a global platform for digital literacy. Its EOS Shell desktop is a big factor in making this universal computing platform work. It eliminates the technology barrier that often inhibits Linux newcomers.

Although it looks and feels a lot like an Android shell running on a PC, Endless OS is a fully functional Linux distro designed to be easy to install and very simple to use.


RADV Now Exposes Async Compute Support For Southern Islands "IndyWatch Feed Tech"

For those of you with a Radeon GCN 1.0 "Southern Islands" GPU, the RADV Vulkan driver support for these first Graphics Core Next graphics processors continues to be improved...


Hacker Who Never Hacked Anyone Gets 33-Month Prison Sentence "IndyWatch Feed Tech"

A hacker who was arrested and pleaded guilty last yearnot because he hacked someone, but for creating and selling a remote access trojan that helped cyber criminalshas finally been sentenced to serve almost three years in prison. Taylor Huddleston, 26, of Hot Springs, Arkansas, pleaded guilty in July 2017 to one charge of aiding and abetting computer intrusions by building and intentionally


Is that smart device secure, and will it protect your privacy? "IndyWatch Feed Tech"

The decision to introduce a new smart device into your home should come only after youve answered these two questions affirmatively: Will the device improve the quality of my life/fill a need I have? and Am I satisfied with the level of security and privacy the manufacturer provides to users? Unfortunately, users needs (and wants) often end up being more important than security and privacy and the answer to that second question is simply ignored. More


SEC says insider trading is not the right response to cyber risk "IndyWatch Feed Tech"

SEC says insider trading is not the right response to cyber risk

The United States Securities and Exchange Commission (SEC) has warned public companies that they not only need to do more to fulfil their obligations to transparency and openness with investors about cybersecurity breaches, but they also must disclose other infosecurity risks.

Read more in my article on the We Live Security blog.


Wine Polyphenols Could Fend Off Bacteria that Cause Cavities and Gum Disease "IndyWatch Feed Tech"

Sipping wine may be good for your colon and heart, possibly because of the beverage's abundant and structurally diverse polyphenols. Now researchers report in ACS' Journal of Agricultural and Food Chemistry that wine polyphenols might also be good for your oral health.

[...] M. Victoria Moreno-Arribas and colleagues wanted to know whether wine and grape polyphenols would also protect teeth and gums, and how this could work on a molecular level.

The researchers checked out the effect of two red wine polyphenols, as well as commercially available grape seed and red wine extracts, on bacteria that stick to teeth and gums and cause dental plaque, cavities and periodontal disease. Working with cells that model gum tissue, they found that the two wine polyphenols in isolation -- caffeic and p-coumaric acids -- were generally better than the total wine extracts at cutting back on the bacteria's ability to stick to the cells. When combined with the Streptococcus dentisani, which is believed to be an oral probiotic, the polyphenols were even better at fending off the pathogenic bacteria. The researchers also showed that metabolites formed when digestion of the polyphenols begins in the mouth might be responsible for some of these effects.


Adelaida Esteban-Fernndez, Irene Zorraqun-Pea, Maria D. Ferrer, Alex Mira, Begoa Bartolom, Dolores Gonzlez de Llano, M. Victoria Moreno-Arribas. Inhibition of Oral Pathogens Adhesion to Human Gingival Fibroblasts by Wine Polyphenols Alone and in Combination with an Oral Probiotic. Journal of Agricultural and Food Chemistry, 2018; DOI: 10.1021/acs.jafc.7b05466

Original Submission

Read more of this story at SoylentNews.


Xen Security Advisory 256 - x86 PVH guest without LAPIC may DoS the host "IndyWatch Feed Tech"

Posted by Xen . org security team on Feb 27

Xen Security Advisory XSA-256

x86 PVH guest without LAPIC may DoS the host


Public release.


So far, x86 PVH guests can be configured with or without Local APICs.
Configurations with Local APICs are identical to x86 HVM guests, and
will use as much hardware acceleration support as possible....


Xen Security Advisory 255 - grant table v2 -> v1 transition may crash Xen "IndyWatch Feed Tech"

Posted by Xen . org security team on Feb 27

Xen Security Advisory XSA-255

grant table v2 -> v1 transition may crash Xen


Public release.


Grant tables come in two flavors (versions), and domains are permitted
to freely change between them (subject to certain constraints). For
the guest to use the facility, both the "normal"...


Xen Security Advisory 252 - DoS via non-preemptable L3/L4 pagetable freeing "IndyWatch Feed Tech"

Posted by Xen . org security team on Feb 27

Xen Security Advisory XSA-252

DoS via non-preemptable L3/L4 pagetable freeing


Public release.


Guests have the ability to request removal of memory from themselves.
This operation is intended to be requested for normal read/write pages,
but is also permitted to be used on other types of pages....


Investigating the Worlds Rarest Game Boy "IndyWatch Feed Tech"

Thanks to one of his viewers, [Colin] was able to get his hands on one of these extremely rare customized handhelds. Clearly a man after our own heart, his first inclination was to tear the thing apart and see how they built it. While he had a fairly good idea of how they managed this hybrid of modern and classic technology, there were a couple of surprises inside.

The device has a completely stock main board, and as such works and plays like a normal GBC. But upon flipping the main board over, [Colin] found a nest of thin magnet wire connecting the new display controller to individual buttons on the front panel. As he later confirmed when he reassembled the system, this allows the user to adjust the displays brightness by...


CVE-2018-7492: Linux kernel: Null pointer dereference in net/rds/rdma.c:__rds_rdma_map() "IndyWatch Feed Tech"

Posted by Vladis Dronov on Feb 27


Best regards,
Vladis Dronov | Red Hat, Inc. | Product Security Engineer


Israeli mobile forensics firm Cellebrite can unlock every iPhone device on the market "IndyWatch Feed Tech"

The Israeli mobile forensics firm Cellebrite has designed a technology that allows it to unlock almost any iPhone, including the latest iPhone X.

We have debated for a long time the legal dispute between Apple and the FBI for unlocking the San Bernardino shooters iPhone 5c.

The tech giant refused to help the US authorities to unlock the mobile device and the FBI paid over a million dollar to a third-party company to access data contained in the San Bernardinos shooters iPhone.

cellebrite ufed-touch

Such kind of dispute would not happen in the future, the Israeli mobile forensics firm Cellebrite has designed a technology that allows it to unlock almost any iPhone, including the latest iPhone X.

The Israeli mobile forensics firm Cellebrite that is one of the leading companies in the world in the field of digital forensics. The company already works with the principal law enforcement and intelligence agencies worldwide.

Cellebrite provides the FBI with decryption technology as part of a contract signed in 2013, its technology allows investigators to extract information from mobile devices.

The companys Advanced Unlocking and Extraction Services could be used to unlock every iPhone running iOS 11 and older versions.

Cellebrite, a Petah Tikva, Israel-based vendor thats become the U.S. governments company of choice when it comes to unlocking mobile devices, is this month telling customers its engineers currently have the ability to get around the security of devices running iOS 11. reads a post published by Forbes.

That includes the iPhone X, a model that Forbes has learned was successfully raided for data by the Department for Homeland Security back in November 2017, most likely with Cellebrite technology.

Cellebrite says it advanced services can hack into Apple iOS devices and operating systems, including iPhone, iPad, iPad mini, iPad Pro and iPod touch, running iOS 5 to iOS 11.

According to Forbes, anonymous sources confirmed...


AMDVLK Vulkan Driver Updated With Better Vega Support, VR Fixes "IndyWatch Feed Tech"

The AMD developers working on their official, cross-platform "AMDVLK" Vulkan driver code have just pushed out another batch of changes to their open-source code repository...


Adrian Cockcroft on the Convergence of Cloud Native Computing and AWS "IndyWatch Feed Tech"

Cloud native computing is transforming cloud architectures and application delivery at organizations of all sizes. Via containers, microservices, and more, it introduces many new efficiencies. One of the worlds leading experts on it, Adrian Cockcroft, Vice President of Cloud Architecture at Amazon Web Services (AWS), focused on cloud native computing within the context of AWS in his keynote address at KubeCon + CloudNativeCon.  


KDE Plasma 5 Should Soon Finally Be Ready For FreeBSD Ports "IndyWatch Feed Tech"

Adriaan de Groot continues working on improving the KDE stack for FreeBSD. The moment is finally near where KDE Plasma 5 along with the modern KDE Applications stack should soon be available via the FreeBSD Ports collection...


Court Rules FTC Data-Throttling Lawsuit Against AT&T Can Proceed "IndyWatch Feed Tech"

AT&T has been involved in a long-running battle with the Federal Trade Commission (FTC). In 2014, the agency sued AT&T for throttling its customers' unlimited mobile data plans while not properly informing them it would be doing so. A few months later, the company claimed that its common carrier status meant it wasn't under the jurisdiction of the FTC and it asked a court to dismiss the agency's suit. In 2015, a judge rejected the carrier's claim, but in 2016, a three-member Ninth Circuit appeals court tossed out that ruling and the FTC's lawsuit saying that AT&T's common carrier status did indeed exempt it from the FTC's regulatory jurisdiction. And that brings us to today. As the Wall Street Journal reports, a federal appeals court has ruled that the FTC can proceed with its lawsuit, rejecting the Ninth Circuit court's earlier decision.

The ruling of the full-panel Ninth Circuit appeals court backs the FTC's original argument, which says that because the services in question weren't part of the those that fall under AT&T's common carrier status, its lawsuit is valid.

[...] FTC Chair Maureen Ohlhausen said in a statement, "I welcome the Ninth Circuit's ruling as good news for consumers. It ensures that the FTC can and will continue to play its vital role in safeguarding consumer interests including privacy protection, as well as stopping anticompetitive market behavior."

[...] An AT&T spokesperson told Reuters, "Today's decision on jurisdiction does not address the merits of the case. We are reviewing the opinion and continue to believe we ultimately will prevail."


Original Submission



GSoC 2018 Could Bring Better Video Decode, Nouveau Vulkan, Wayland Improvements "IndyWatch Feed Tech"

The X.Org Foundation is calling on student developers to consider applying for this year's Google Summer of Code where you could be working on exciting projects for Nouveau, Mesa, Wayland, and more while gaining valuable work experience and earning a nice stipend...


One Week Left for Hackaday Belgrade Proposals "IndyWatch Feed Tech"

Do you have your tickets for Hackaday Belgrade? Our premiere European conference is on 26 May and tickets are on a rapid trajectory to sell out.

Those of you weighing the idea of presenting a talk, you now have less than one week to get your proposal to us. While we have already accepted several exemplary talks, final decisions wont be made until after the submission deadline passes on Sunday, March 4th.

Mike Harrison showing off his demo work on the 2016 Hackaday Belgrade badge. If you have stories of the demoscene, consider sending in a talk proposal.

What kind of talks are we looking for? Wed love to have a few talks about the demoscene. The conference badge this year is a full-blown retrocomputer, and were working on a BASIC for it. If you can push pixels on a Comodore 64, wed love to hear you talk about it. Were also suckers for the lesser known stories of tech history (Mike Harrisons talk on the Eidophor projector tech all but forgotten to history was a delight).

Were always interested in creative design; think circuit boards that arent square and enclosures that go beyond just putting something in a simple box. And of c...


IBM Has Become More of a Patent Broker Rather Than a Genuine Technology Company "IndyWatch Feed Tech"


Summary: IBM is becoming a lot more like Intellectual Ventures, namely a patent hoarder (tens of thousands of patents) looking to monetise these patents using lawsuits, threats of lawsuits, feeding (arming) of patent trolls and so on

IBM likes to think of itself as king of patents because for decades it was pursuing a lot of patents, including software patents, which the USPTO granted by the thousands (per year). What isnt so well known, however, is how IBM uses these patents behind the scenes. Its pretty brutal and it got a lot worse in recent years.

The funny thing is that to people like these the trolls are heroes.Finjan is a very malicious patent troll which was funded by Microsoft and as recently as last year was armed by IBM (IBM gave it patents to help the trolling).

Britton Davis and Max Colice wrote about Finjan yesterday. This troll is still being exploited by Watchtroll, which uses it to make a case for software patents and damages. The funny thing is that to people like these the trolls are heroes. To quote:

Patent damages law is one of the most complex areas in patent law and it is constantly evolving. Attorneys and courts often confuse the principles and get the law wrong. Further, even without the backdrop of constantly evolving and complex damages law, proving damages at trial is one of the hardest aspects of patent litigation. And properly apportioning damages can be one of the most difficult aspects of damages law to get right.


In Finjan, the Federal Circuit reached the opposite conclusion and remanded the case for failure to properly apportion the royalty base. Finjan, slip op. at 18-19. Finjans patent relates to virus detection software and creating a security profile for web addresses. Id. at 18. Finjan accused Blue Coats DRTR or dynamic real-time rating...


SEC Consult SA-20180227-0 :: OS command injection, arbitrary file upload & SQL injection in ClipBucket "IndyWatch Feed Tech"

Posted by SEC Consult Vulnerability Lab on Feb 27

SEC Consult Vulnerability Lab Security Advisory < 20180227-0 >
title: OS command injection, arbitrary file upload & SQL injection
product: ClipBucket
vulnerable version: <4.0.0 - Release 4902
fixed version: 4.0.0 - Release 4902
CVE number: -
impact: critical


Weston 4.0 Alpha Brings Atomic Mode-Setting, New Protocol Support "IndyWatch Feed Tech"

Shortly after announcing the Wayland 1.15 Alpha release on Monday, Samsung's Derek Foreman did the adjoining alpha release of the Weston 4.0 reference compositor...


Norways Global Seed Vault set for multimillion-dollar fortification "IndyWatch Feed Tech"

It has proposed spending a total of US$12.7 million on technical upgrades to the vault to better protect the more than 930,000 seed varieties inside. It has completed a feasibility study and plans to move ahead with the construction of a new concrete access tunnel and a new service building for the emergency power, refrigeration units and electrical equipment.

Global food security is serious business, and when you have water seeping into a doomsday facility built to shore up food supplies for the future, well, thats hardly ideal. But such breaches should be a thing of the past, with Norwegian authorities overseeing the Svalbard Global Seed Vault planning a multi-million dollar overhaul of the structure.


Qt Automotive Suite 2.0 Released "IndyWatch Feed Tech"

Two years after unveiling Qt Automotive Suite 1.0 for designing digital cockpits for the ever increasing number of screens within cars, The Qt Company has today announced Qt Automotive Suite 2.0...


Patent Trolls Like Xperi and Fraunhofer Get Patents and Payments From East Asia "IndyWatch Feed Tech"



Panasonic logo

Summary: Xperi receives some patents from Panasonic whereas Fraunhofer, not quite a patent troll but still a major parasite, receives patent payments from the giant Huawei, a Chinese government-connected firm which uses a lot of Linux

THE demise of software patents in the US is great news (courts typically reject software patents that the USPTO granted), but at the same time software patents are gaining a foothold in China.

Benjamin Henrion correctly said that no one in the software industry checks the patent database before writing code. If you know at least one human who does it, lets schedule an interview, it will be fun!

Not just in software, I replied. Reading patents only makes the reader more liable (for higher damages)

The matter of fact is, in the domain of software which many people use, developers typically browse repositories and code, not patents. That just makes sense. Its common sense. Its better use of time. Its therefore unfortunate that China decided to allow patents on software. Whose clever idea was it?

Based on this new press release, the Chinese government-connected giant Huawei now succumbs to demands from a de facto patent troll like MPEG-LA. Theyre painting that as Fraunhofer, but its that same old patent pool of software patents. That cartel has managed to devour Huawei too. From the announcement:

Global communications equipment provider Huawei has entered into a worldwide patent license agreement with the renowned developer of audio and media technologies, Fraunhofer IIS, for Fraunhofers MPEG-4 Audio patent portfolio. The license agreement addresses past and future use of Fraunhofers MPEG-4 Audio patent portfolio in...


With Android P Google Plans To Prevent Cellphone Spying Through Your Camera and Microphone "IndyWatch Feed Tech"

Android P, is expected to include a neat feature that prevents apps running in the background from spying on you through the camera or microphone on your cell phone.

Do you cover the lens on your webcam to prevent someone from spying on you? You should, and it seems like every security vendor has a branded piece of plastic to take care of that for you just ask.

In 2014, one of the surprising revelations from Edward Snowden was the NSAs ability to spy on targets through cellphone microphones and cameras. By 2017, cellphone specific malware like ChrysaorLipizzan and SonicSpy provide the same capability to hackers. There are even legitimate applications marketed to concerned parents and partners who feel the need to keep tabs on their family members. The techniques and capabilities are now so commonplace, it isnt just the paranoid that should be concerned everyone who is cares about their privacy should consider the threats that exist in their cellphones.

Most often, the malicious software makes its way onto a cellphone under the guise of something the user actually wants. For example, one enterprising hacker started with the popular Telegram messaging application, added the SonicSpy malware and then distributed messaging software under a variety of different names. Users enjoyed the benefits of the messaging software they downloaded, unaware that it was also spying on everythin...


Hollywood Commissioned Tough Jail Sentences for Online Piracy, ISP Says "IndyWatch Feed Tech"

According to local prosecutors who have handled many copyright infringement cases over the past decade, Sweden is nowhere near tough enough on those who commit online infringement.

With this in mind, the government sought advice on how such crimes should be punished, not only more severely, but also in proportion to the damages alleged to have been caused by defendants activities.

The corresponding report was returned to Minister for Justice Helne Fritzon earlier this month by Council of Justice member Dag Mattsson. The paper proposed a new tier of offenses that should receive special punishment when there are convictions for large-scale copyright infringement and serious trademark infringement.

Partitioning the offenses into two broad categories, the report envisions those found guilty of copyright infringement or trademark infringement of a normal grade may be sentenced to fines or imprisonment up to a maximum of two years. For those at the other end of the scale, engaged in cases of gross crimes, the penalty sought is a minimum of six months in prison and not more than six years.

The proposals have been criticized by those who feel that copyright infringement shouldnt be put on a par with more serious and even potentially violent crimes. On the other hand, tools to deter larger instances of infringement have been welcomed by entertainment industry groups, who have long sought more robust sentencing options in order to protect their interests.

In the middle, however, are Internet service providers such as Bahnhof, who are often dragged into the online piracy debate due to the allegedly infringing actions of some of their customers. In a statement on the new proposals, the company is clear on why Sweden is preparing to take such a tough stance against infringement.

Its not a daring guess that media companies are asking for Sweden to tighten the penalty for illegal file sharing and streaming, says Bahnhof lawyer Wilhelm Dahlborn.

It would have been better if the need for legislative change had taken place at EU level and co-ordinated with other similar intellectual property legislation.

Bahnhof chief Jon Karlung, who is never afraid to speak his mind on such matters, goes a step further. He believes the initiative amounts to a gift to the United States.

Its nothing but a commission from the American film industry, Karlung...


Birds Filmed on Racetrack to Simulate Dinosaur Movement "IndyWatch Feed Tech"

In a quest to learn how two-legged dinosaurs moved, scientists watched their descendants birds run around on a race track. After all, chickens were once carnivorous dinosaurs that stalked the Earth on giant drumsticks.

For all the movies that show dinosaurs chasing after humans, we don't actually know much about what a walking or running dinosaur looked like. Footprints and fossils, for example, can't tell us whether a dino strode or strutted. "They're static records of an animal or its movement," says Peter Bishop, a scientist at the Queensland Museum. For movement, he says, "That's when you've got to study animals that are living today."

Only, there aren't any dinosaurs wandering around anymore. So Bishop and his colleagues turned to the next best thing: birds, the only surviving descendants of two-legged dinos called theropods. Bishop and his colleagues rounded up a dozen species from cute little quail and turkeys to long-legged ostriches and emus. Then they sent the birds walking and running down a racetrack.


Original Submission

Read more of this story at SoylentNews.


Reverse Engineering Opens Up the Samsung Gear VR Controller "IndyWatch Feed Tech"

We love a bit of reverse engineering here at Hackaday, figuring out how a device works from the way it communicates with the world. This project from [Jim Yang] is a great example of this: he reverse-engineered the Samsung Gear VR controller that accompanies the Gear VR add-on for their phones. By digging into the APK that links the device to the phone, he was able to figure out the details of the Bluetooth connection that the app uses to connect to the device. Specifically, he was able to find the commands that were used to get the device to send data, and was able to read this data to determine the state of the device. He was then able to use this to create his own web app to use this data.

This fits in with his intention: to be able to use the Gear VR controller without the Samsung app. He did this using Web Bluetooth, which allows a web app to discover and connect to Bluetooth devices without requiring a native app. Its a pretty new standard, so Google Chrome is the only browser that supports it at the moment. His example uses this standard to read and display the orientation of a Gear VR Controller on a web page, and he has published the code that makes this possible.

If you are looking for a cheap way to add a motion controller to a project, this would be a great place to start: you can pick up one of the Gear VR Controllers on Amazon for less than $17, and the code allows you to read button presses, touches on the touchpad and the orientation of the controller itself. Thats a lot easier than building your own controller.


EPO Refuses to Admit that Unified Patent Court (UPC) is Dead, But Its Boosting Others Who Are Lying About It for a Living "IndyWatch Feed Tech"

Can you tell a lie by staying silent? Or by indirection?


Summary: Silence is gold to the EPO, which has not yet said a single word about the UPC constitutional complaint going forward; in fact, the EPO chooses to not say anything about the UPC in general, except indirectly

THE EPO has grown louder again about the UPC, albeit only indirectly, namely by retweeting some other account a few times yesterday. Its quite revealing.

Months ago we published a post titled Belgiums Jrme Debrulle, the EPO and the UPC Connection, noting that Debrulle is Battistellis special friend and ally for UPC lobbying. Theres also a connection to Campinos. Here is what the EPO retweeted yesterday:

Jrme Debrulle, Chairman of the @EPOorg Select Committee, will speak at the upcoming UP&UPC Conference on 3rd July in Munich. For more information: #patent #unitarypatent #IP

The FFIIs President, who is Belgian like Debrulle, said: Items from the Belgian constitutional complaint are still valid, they will just have to be answered after the UPC is running.

Another retweet reveals the role of Margot Frhlinger. Are her days at the EPO numbered? The UPC is dead. She knows it (its her full-time job to lie about it though). What would her purpose at the EPO even be when all hope is gone? Might as well call off these UPC events/charades. Waste of money and effort at times of imminent cuts. The tweet in question said: UP&UPC 2018 Conference on July 3rd: register now to benefit from the early bird rate: only 299 until end of February!

Battistellis friend Yann Mnire will be there also. Battistelli is leaving, so he wont speak there, unlike last year (Debrulle was there last year as well).

Its just hard to understand why they keep pushing this dead thing, like beating a dead horse.

As it turns out, based on...


As PTAB Continues to Squash a Lot of Low-Quality Patents the Koch-Funded Lobbyists Attack Its Very Existence "IndyWatch Feed Tech"

Inside How the Federalist Society & Koch Brothers Are Pushing for Trump to Reshape Federal Judiciary
Reference: Inside How the Federalist Society & Koch Brothers Are Pushing for Trump to Reshape Federal Judiciary

Summary: The proportion of claims canceled in IPRs by the Patent Trial and Appeal Board (PTAB) keeps going up and people whose job is to undermine PTAB and help trolls are up in arms, as usual

HAVING just thwarted a scam, PTAB moves on. On Monday, as per this prolific patent attorney (apparently retired), PTAB affirmed rejection of yet more patents by the USPTO (i.e. the usual).

PTAB Reversed Examiner on 101, 103 and 112, holding claims to a filter monitoring system for an engine to be patentable, according to this new example (link to decision attached). That was the only exception. PTAB Affirms Examiners [Section] 101 Rejection of Rockwell Control Claims, said another example and also PTAB Affirms Examiners [Section] 101 Rejection of Rockwell Search Method Claims

PTAB now invalidates almost 9 out of 10 challenged patents.Then theres this: PTAB Affirms [Section] 101 Rejection of Blueshift IP Patent Application by Examiner

How many of these are software patents being rejected and then rejected again on appeal?

According to these new statistics from a very large law firm (Finnegan), PTAB now invalidates almost 9 out of 10 challenged patents. To quote:

In a difficult month for patent owners, the Patent Trial and Appeal Board issued 33 IPR a...


Alt-Right or jihad? "IndyWatch Feed Tech"

We easily forget the resilience of the human spirit.  Blow a few folks up and we all adjust to the idea of an acceptable risk and responders get more aggressive because it will now be accepted.  The real problem is that this is a slow evolution rather than a full on onslaught with overwhelming numbers.

The problem is the continuing failure of the natuiral community which needs to be revitalized in order to end poverty.  Doing this in concert with the rule of twelve will resolve these nihilist drives in our societies.

Alt-Right or jihad? 

Unleashed by globalisations dark side and the collapse of communities, radical Islam and the alt-Right share a common cause

Scott Atran

is the director of research in anthropology at the CNRS, cole Normale Suprieure, and a senior research fellow at the University of Oxford. He is co-founder of Artis Research, and the author of Talking to the Enemy (2010) and In Gods We Trust (2002).

The last of the shell-shocked were being evacuated as I headed from home toward Las Ramblas, Barcelonas famed tourist-filled walkway in August 2017. Another disgruntled soldier of ISIS had just ploughed his van into the crowd there, killing 14 and wounding more than 100 people from nearly three dozen nations. I had just dropped off my wifes niece to meet friends by the Plaa Catalunya, near where the rampage began. It was dj vu and dread again, evoking the Paris massacre at the Bataclan theatre and the caf La Belle quipe in 2015, next door to where my daughter lived. At a seafront promenade south of the city, a car of five knife-wielding ISIS kamikazes mowed down a woman before police killed them all. One teenage attacker had posted...


population buffalo "IndyWatch Feed Tech"

In fairness, plenty of buildings were also abandoned as well.  All this happened because the affluent left those cities to live in adjacent suburbs because of the car and proper road systems supporting those suburbs.

I am now seeing a reversal of this trend in Vancouver in particular.    There the building of a train subway system has allowed the city to densify around the Stations.  Now at least ten thousand suites are made available at these locations.  All this increased the population in the downtown core while eliminating infrastructure ready to be abandoned.  



Shifting Political Winds "IndyWatch Feed Tech"

So much remains hidden and the MSM narrative remains gravely contrived.  This makes it hard to establish what is actually happening.  Yet the Florida shooting narrative, whatever its genesis has now been firmly turned back as a major fail for the gun control promote.  That is new.

Also new is that the other media is starting to laugh at the MSM.  This must turn into a major attitude shift.  Two years of MSM bunkum and the degenerating Mueller probe has inured all viewers to the fake news phenom.  In fact, i continue to strongly suspect that the output from Mueller was meant to exonerate Trump from day one.  After all the only plausible reason for this last entry of thirteen Russians was to provide cover for Trump's exoneration by Rosenstein and to set the stage for a major investigation of voting irregularities by the Democrats.  The MSM bought it hook line and anchor.

As i have posted, watch the hands.  We now hear the drum of boots on the march all covered by a smoke and mirrors show.  In fact, Trump now is feeding them the smoke and sooner or later, even the MSM must come to their senses.

We can not proclaim victory until the public actually sees it and even then we may need scalps.  What is apparent is that the voices who were part of it all are now going quite silent.  As posted before listen to the silence.   Perpetrators interviewed by the authorities all turn into clams.  Yet we are also on a planned schedule and though concerns exist, it appears to be easily running ahead of schedule.  

At this point Trump has turned the corner on the MSM propaganda program and the Deep State must be seriously diminished as well.  Taking out leadership nodes naturally collapses ninety percent of such influence.  Our frustration has been the need for secrecy, but with...


I Built a Stable Planetary System with 416 Planets in the Habitable Zone - Facts So Romantic "IndyWatch Feed Tech"

This system is completely stableI double-checked with computer simulations. But nature would have a tough time forming this system. If it exists, it could only have been built by a super-advanced civilization.Image by Sean Raymond /

When Frank Drake was a boy, growing up in 1930s Chicago, his parents, observant Baptists, enrolled him in Sunday School. By the time he was 8 years old, he suspected his religion, and others around the world, were, to some extent, environmentally determinedlocal chance events helped shape them. He began to think the same might be true of civilization, for humans and, perhaps, aliens as wellbut he thought it better to keep these thoughts to himself.

But not for long: He would go on to found S.E.T.I., the Search for Extraterrestrial Intelligence, and laid out a simple way to estimate the number of civilizations within our galaxy that we could hope to listen-in on. Its an equation that looks like this:

N (the number of communicable civilizations in the Milky Way)

  = R (the rate at which stars form)

  NEarth (the fraction of stars with Earth-sized planets on Earth-like orbits)

  FLife (the fraction of those planets
Read More

Trump administration wants to transform welfare and food program "IndyWatch Feed Tech"

The low hanging fruit in terms of government spending happens to be in its administration of all redistribution programs which on their own also provide an important economic input.
Right now government has opted to merely transfer money and that is administered by the retail market which is obviously the most expensive possible way to do it.   Just as obviously there is no need whatsoever to do it this way.

To start with there is a huge pool of four hour shift work available for the task of packing and delivering weekly food boxes directly to clients.  In fact computerization allows us to even custom pack.  You are not stocking to support random access buying at all but stocking a short list of supplies and delivering them.  Amazon can figure this out and so can anyone else.
In fact contract Amazon to deliver the infrastructure in the first place.
My point is that we swap out all retail markups at the least and allow clients to optimize the food mix for their specific needs..  Throw in ample nutritional advice and support and we will have something that we can be proud of.

In fact this is a viable business plan and worth a huge IPO.  At the very least it can be used immediately to draw down the huge surplus of cheese and butter and dairy.

Trump administration wants to transform welfare and food program



Reactions to the Collapse of Allergans Scam With the Mohawk Tribe "IndyWatch Feed Tech"

Sham or scam, depending on who one asks


Summary: The patent microcosm is aligning itself with a clear scam/bluff, which says a lot about the patent microcosm and its moral depravity

AS we predicted more than 24 hours ago, Monday was dominated by coverage (at least in patent blogs) of the collapse of a dubious Allergan and Mohawk relationship. PTAB isnt impressed by the scam of these two companies (one is not actually a company, just a tribe pretending to be one), which conspired to shield patents that the USPTO probably shouldnt have granted.

The CCIAs Josh Landau wrote about it early on Monday:

The PTABs answer to this question was a resounding no. First, the PTAB noted that theres neither case law nor statutory reasons to apply tribal sovereign immunity to agency proceedings like IPR. Second, as I noted back in October, tribal sovereign immunity does not apply to federal administrative proceedings like IPR. The PTAB agreed, finding that tribal sovereign immunity does not apply to IPRs, which are of course federal administrative proceedings. And third, the PTAB noted that in an IPR, the ultimate remedy is applied only to the challenged patent, not to the patent owner. This sort of proceeding isnt the type of suit which traditionally triggers sovereign immunity.

This might also have impacts on state sovereign immunity going forward. While there are good case law reasons to consider the applicability of state sovereign immunity, unlike tribal sovereign immunity, state sovereign immunity also doesnt apply to federal administrative proceedings and IPRs structure makes it not the sort of suit which traditionally triggers state sovereign immunity.

Dennis Crouch wrote about that as well. He said that Allergan owned several patents that it granted to the Mohawk Tribe back in 2017. Although the patents are quite valuable, Allergan actually paid the Mohawk Tribe to take the patents. The scheme allowed Allergan to sti...


YouTube Live Adds Automatic Captions and Other Features "IndyWatch Feed Tech"

YouTube Live gains automatic captions, chat replay and more

YouTube today announced several new features designed to improve the live streaming experience for both creators and viewers. The most notable additions include the ability to play back a live chat after the live stream ends, and the launch of live automatic captions on videos.

YouTube began offering automatic captioning back in 2009, and has since added captions to a billion videos, the company says. Live captioning a video in real-time is a bit more complicated, but advancements in speech recognition technology are making features like this possible. (Similarly, a new startup launched an app called Otter today, that live transcribes meeting and conversations also thanks to advancements in voice technologies.)

Also at VentureBeat.

Original Submission

Read more of this story at SoylentNews.

YouTube Live Adds Automatic Captions and Other Features "IndyWatch Feed Tech"

YouTube Live gains automatic captions, chat replay and more

YouTube today announced several new features designed to improve the live streaming experience for both creators and viewers. The most notable additions include the ability to play back a live chat after the live stream ends, and the launch of live automatic captions on videos.

YouTube began offering automatic captioning back in 2009, and has since added captions to a billion videos, the company says. Live captioning a video in real-time is a bit more complicated, but advancements in speech recognition technology are making features like this possible. (Similarly, a new startup launched an app called Otter today, that live transcribes meeting and conversations also thanks to advancements in voice technologies.)

Also at VentureBeat.

Original Submission

Read more of this story at SoylentNews.


Phone-Cracking Firm Found a Way to Unlock Any iPhone Model "IndyWatch Feed Tech"

Remember the infamous encryption fight between Apple and the FBI for unlocking an iPhone belonging to a terrorist behind the San Bernardino mass shooting that took place two years ago? After Apple refused to help the feds access data on the locked iPhone, the FBI eventually paid over a million dollar to a third-party company for unlocking the shooter's iPhone 5c. Now, it appears that the


ES2018-03 Asterisk pjsip sdp invalid media format description segfault "IndyWatch Feed Tech"

Posted by Sandro Gauci on Feb 26

# Segmentation fault occurs in Asterisk with an invalid SDP media format description

- Authors:
- Alfred Farrugia
- Sandro Gauci
- Latest vulnerable version: Asterisk 15.2.0 running `chan_pjsip`
- References: AST-2018-002
- Enable Security Advisory:


ES2018-04 Asterisk pjsip tcp segfault "IndyWatch Feed Tech"

Posted by Sandro Gauci on Feb 26

# Crash occurs when sending a repeated number of INVITE messages over TCP or TLS transport

- Authors:
- Alfred Farrugia
- Sandro Gauci
- Latest vulnerable version: Asterisk 15.2.0 running `chan_pjsip` installed with `--with-pjproject-bundled`
- References: AST-2018-005, CVE-2018-7286
- Enable Security Advisory:


Nokia revives the 8110 slider phone from The Matrix "IndyWatch Feed Tech"

Look whos back? The iconic Nokia 8110 Matrix slider phone

HMD Global, the Finnish manufacturer with exclusive rights to the Nokia brand, created quite a stir in the market last year when it successfully relaunched the iconic Nokia 3310 in a different avatar.

This time around, HMD Global has revived one of the most well-known slider banana phone of the pre-smartphone era Nokia 8110 albeit in a revamped version. Launched in 1996, Nokia 8110 became famous in 1999 when Keanu Reeves who played Neo in the action flick, The Matrix used the slider banana phone in the movie.

Pekka Rantala, EVP, and CMO of HMD Global said: This gives us a responsibility to innovate in this part of the business, to bring something new to consider in feature phones going forward. It was very clear that we needed to be able to deliver and keep the Nokia promise when it comes to quality, reliability and ease of use.

The revamped Nokia 8110 unveiled at the Nokia Mobile launch event at the Mobile World Congress (MWC) 2018 in Barcelona, Spain is essentially a feature phone that is slightly curved and has a slider that allows you to answer and reject calls. It sports a 2.4-inch QVGA display, has a low-end Qualcomm 205 dual core processor, 512MB of RAM, 4GB of internal storage that cannot be expanded. It also features a 2MP rear camera with an LED flash and is powered by a non-removable Li-Ion 1,500mAh battery. The handset has an IP52 rating for dust and water resistance.

Analyst Ben Wood from CCS Insight said: In a sea of smartphone sameness it is little surprise that consumers get excited by a little bit of nostalgia. Its a smart move by HMD Global to add to its retro line with the addition of the new 8110. The 3110 was a huge success last year and helped return the Nokia brand to consumers consciousness in a spectacular manner.

Given the 8110 is another phone that is fondly remembered, particularly because of its appearance in The Matrix films, HMD Global will be hoping it will have a similarly positive effect on the awareness of Nokia branded phones.

The Nokia 8110 will be available in two colors: banana yellow and traditional black. The handset is expected to cost 79 euros ($97) and will be available from May.

The post...


ES2018-02 Asterisk pjsip sdp invalid fmtp segfault "IndyWatch Feed Tech"

Posted by Sandro Gauci on Feb 26

# Segmentation fault occurs in asterisk with an invalid SDP fmtp attribute

- Authors:
- Alfred Farrugia
- Sandro Gauci
- Latest vulnerable version: Asterisk 15.2.0 running `chan_pjsip`
- References: AST-2018-003
- Enable Security Advisory:
<<a href="" rel="nofollow">>
- Vendor...


ES2018-01 Asterisk pjsip subscribe stack corruption "IndyWatch Feed Tech"

Posted by Sandro Gauci on Feb 26

# SUBSCRIBE message with a large Accept value causes stack corruption

- Authors:
- Alfred Farrugia
- Sandro Gauci
- Latest vulnerable version: Asterisk 15.2.0 running `chan_pjsip`
- Tested vulnerable versions: 15.2.0, 13.19.0, 14.7.5, 13.11.2
- References: AST-2018-004, CVE-2018-7284
- Advisory URL:


Evrial: The Latest Malware That Steals Bitcoins Using the Clipboard "IndyWatch Feed Tech"

Evrial is a cryptocoin malware stealer discovered by the researchers at ElevenPaths which takes control of the clipboard to get easy money.

Evrial is a cryptocoin malware stealer which takes control of the clipboard to get easy money.

ElevenPaths has taken a deep technical dive into the malware itself, to show how it technically works, with a quite self-explanatory video. Aside, we have followed the steps of its Russian creator and found that his scam has been targeting other scammers themselves.


By the end of 2017, CryptoShuffle was a malware sample capable of reading the clipboard and modifying cryptocurrency addresses found there. Later, someone realized that there could be some business on providing these features as a service and started to sell the platform itself calling it Evrial. The product was formed by a .NET malware sample capable of stealing passwords from browsers, FTP clients, Pidgin and it could also modify the clipboard on the fly so as to change any copied cryptocurrency address to whatever address he wanted to.

When you want to make a Bitcoin transfer, you usually copy and paste the destination address. In this sense, the attacker waits until the user, trusting in the clipboard action, sends a new transaction to the copied cryptocurrency address, without knowing that the recipients address has been silently modified to one that belongs to the attacker. The malware performs this task in the background for different types of address including Bitcoin, Litecoin, Ethereum and Monero addresses as well as for Steam identifiers and Webmoney WMR and WMZ units.

The author exposes his username in Telegram: @Qutrachka. The account is in the source code in order to be able to c...


New technique allows printing of flexible, stretchable silver nanowire circuits "IndyWatch Feed Tech"

Researchers at North Carolina State University have developed a new technique that allows them to print circuits on flexible, stretchable substrates using silver nanowires. The advance makes it possible to integrate the material into a wide array of electronic devices.

Silver nanowires have drawn significant interest in recent years for use in many applications, ranging from prosthetic devices to wearable health sensors, due to their flexibility, stretchability and conductive properties. While proof-of-concept experiments have been promising, there have been significant challenges to printing highly integrated using silver nanowires.

Silver nanoparticles can be used to print circuits, but the nanoparticles produce circuits that are more brittle and less conductive than silver nanowires. But conventional techniques for printing circuits dont work well with silver nanowires; the nanowires often clog the printing nozzles.


Rydberg Polarons Reportedly Created "IndyWatch Feed Tech"

Scientists have reported the creation of "Rydberg polarons":

What is inside an atom, between the nucleus and the electron? Usually there is nothing, but why could there not be other particles too? If the electron orbits the nucleus at a great distance, there is plenty of space in between for other atoms. A "giant atom" can be created, filled with ordinary atoms. All these atoms form a weak bond, creating a new, exotic state of matter at cold temperatures, referred to as "Rydberg polarons".

A team of researchers has now presented this state of matter in the journal "Physical Review Letters". The theoretical work was done at TU Wien (Vienna) and Harvard University, the experiment was performed at Rice University in Houston (Texas).

Two very special fields of atomic physics, which can only be studied at extreme conditions, have been combined in this research project: Bose-Einstein condensates and Rydberg atoms. A Bose-Einstein condensate is a state of matter created by atoms at ultracold temperatures, close to absolute zero. Rydberg atoms are atoms, in which one single electron is lifted into a highly excited state and orbits the nucleus at a very large distance.

[...] First, a Bose-Einstein condensate was created with strontium atoms. Using a laser, energy was transferred to one of these atoms, turning it into a Rydberg atom with a huge atomic radius. The perplexing thing about this atom: the radius of the orbit, on which the electron moves around the nucleus, is much larger than the typical distance between two atoms in the condensate. Therefore the electron does not only orbit its own atomic nucleus, numerous other atoms lie inside its orbit too. Depending on the radius of the Rydberg atom and the density of the Bose-Einstein condensate, as many as 170 additional strontium atoms may be enclosed by the huge electronic orbit.

Creation of Rydberg Polarons in a Bose Gas (DOI: 10.1103/PhysRevLett.120.083401) (DX)

Original Submission

Read more of this story at SoylentNews.


Old Modem, New Internet. "IndyWatch Feed Tech"

Do you remember the screeching of a dial-up modem as it connected to the internet? Do you miss it? Probably not, but [Erick Truter] inspired by a forum post and a few suggestions later turned a classic modem into a 3G Wi-Fi hotspot with the ubiquitous Raspberry Pi Zero.

Sourcing an old USRobotics USB modem allegedly in working condition he proceeded to strip the modem board of many of its components to make room for the new electronic guts. [Truter] found that for him the Raspberry Pi Zero W struggled to maintain a reliable network, and so went with a standard Pi Zero and a USB  Wi-Fi dongle dongle. He also dismantled a USB hub to compensate for the Zeros single port. Now,  to rebuild the modem better, faster, and for the 21st century.

He was able to with some difficulty tap the original LEDs to act as a boot status display; additionally, the transmit and receive LEDs flash according to the traffic and the more data its handling, the brighter the LED glows. Setting up the Wi-Fi hotspot proved to be easier than anticipated likewise for adding the 3G dongle and its functionality. Adding the sound was almost too much there wasnt enough space for a USB sound card. Instead, [Truter] whipped up a small board that channeled audio though a GPIO pin which would then connect to a speaker good enough to emulate a modems banshee shrieking.

In the same vein, we recently featured a calculator that is more than meets the eye.



Genomes of Living and Extinct Elephant Species Sequenced "IndyWatch Feed Tech"

Complete genomes of extinct and living elephants sequenced

An international team of researchers has produced one of the most comprehensive evolutionary pictures to date by looking at one of the world's most iconic animal families -- namely elephants, and their relatives mammoths and mastodons-spanning millions of years.

The team of scientists-which included researchers from McMaster, the Broad Institute of MIT and Harvard, Harvard Medical School, Uppsala University, and the University of Potsdam-meticulously sequenced 14 genomes from several species: both living and extinct species from Asia and Africa, two American mastodons, a 120,000-year-old straight-tusked elephant, and a Columbian mammoth.

The study, published in the Proceedings of the National Academy of Science, sheds light on what scientists call a very complicated history, characterized by widespread interbreeding. They caution, however, the behaviour has virtually stopped among living elephants, adding to growing fears about the future of the few species that remain on earth.

A comprehensive genomic history of extinct and living elephants (DOI: 10.1073/pnas.1720554115) (DX)

Original Submission

Read more of this story at SoylentNews.


Quantifying Latency in Cheap RC Transmitters "IndyWatch Feed Tech"

For those just starting out in the world of RC, a low cost transmitter like the Flysky FS-i6S can be very compelling. But is buying a cheap transmitter setting yourself up for failure down the line? The general feel in the RC community has been that cheaper transmitters have higher latency or lag on their inputs, which is precisely the kind of thing you want to avoid when flying along at 40+ MPH. As such, the general wisdom has been that your transmitter is one area where you dont want to cheap out.

Wanting to put that theory to the test, [Marek Baczynski] set out to compare the response time between the Flysky FS-i6S and the more established Taranis X9D. In the video after the break, he uses his Saleae logic analyzer to time how long it takes movement on the transmitter sticks to get interpreted as servo commands at the receiver.

[Marek] connects the logic analyzer directly to the gimbals of both transmitters, allowing him to see user input before any processing is done by the electronics. Its particularly interesting to see how the smooth analog curves of the gimbals are converted to a staircase digital output.

The final results of the latency test end up being fairly surprising. To put it simply:...


Jolla Announces Sailfish 3 OS "IndyWatch Feed Tech"

What, it's not Android?

Jolla Announces Sailfish 3 With Feature Phone Support MWC 2018

Finnish mobile OS developer Jolla is attending Mobile World Congress 2018 in Barcelona, Spain, where the company has officially announced Sailfish 3, the next-generation independent mobile OS built on a five-year software legacy. The company also announced a handful of new devices that have joined the Sailfish ecosystem and it revealed its plans for a new branch of its mobile operating system which was designed specifically for 4G-enabled feature phones as it sets out to allow select Android app access on low-spec hardware for consumers who don't need or want a full-fledged smartphone.

One of the biggest changes introduced with the latest Sailfish 3 OS lies in the way the software can be distributed through regional licensing, providing full support for regional infrastructure which should lead to steady upgrade releases and more. As for the mobile operating system itself, Sailfish 3 should provide 30-percent faster performance, improved multitasking with the ability to quickly switch between applications, as well as a redesigned top menu containing actions and settings. The mobile operating system employs a new visual style comprising new ambiances, light themes, and animations, while also offering new security solutions including revised architecture, fingerprint support, encryption, remote locking and wiping capabilities, as well as enablers for blockchain-based services.

Sailfish OS.

Press release. Also at TechCrunch, Engadget, and NDTV.

Related: Jolla Tablet Ship Date Slips
Sailfish OS Maker Jolla: Funding Delay Results in "Temporary Layoffs"
Android is a Dead End
Jolla to Sell OS Image for Sony Phone



Norway Will Spend $13 Million to Upgrade Its Doomsday Seed Vault "IndyWatch Feed Tech"

Via: The Verge: Norway will spend 100 million Norwegian Crowns ($12.7 million) to upgrade the doomsday seed vault it built 10 years ago. The Svalbard Global Seed Vault was constructed in an abandoned Arctic coal mine to store and safeguard the worlds crops and plants from global natural or man-made disaster. If nuclear war or []


U.S. Cattlemen's Association Wants an Official Definition of "Meat" "IndyWatch Feed Tech"

The U.S. Cattlemen's Association has asked the U.S. Department of Agriculture to develop an official definition for terms like "meat" and "beef", as plant-based alternatives to meats continue to grow in popularity and lab-grown/cultured meat may be coming soon:

Companies like Impossible Foods and Beyond Meat are combining plant-based ingredients and science, rather than animals, to create fake-meat burgers and other products that taste like the real thing.

Now U.S. Cattlemen's Association is looking to draw a line in the sand. The association launched what could be the first salvo in a long battle against plant-based foods. Earlier this month, the association filed a 15-page petition with the U.S. Department of Agriculture calling for an official definition for the term "beef," and more broadly, "meat."

"While at this time alternative protein sources are not a direct threat to the beef industry, we do see improper labeling of these products as misleading," said Lia Biondo, the association's policy and outreach director. "Our goal is to head off the problem before it becomes a larger issue."

[...] While these foods are commonly dubbed "fake meat," there's a little more to the meat-substitute market than that. The Good Food Institute, which advocates a sustainable food supply, breaks it down into two categories: clean meat and plant-based meat. Clean meat refers to "meat" grown in a lab from a small amount of animal stem cells. This kind of meat isn't on the market yet, but it's in development. Plant-based meat is anything that mimics traditional meat but is made mainly using plant ingredients.

Here's an idea: define "meat" for the Cattlemen's Association, then tax it with an exemption for "lab-grown meat".

Related: Lab-Grown Pork Closer to Reality
Lab-Grown Chicken (and Duck) Could be on the Menu in 4 Years
Inside the Strange Science of the Fake Meat that 'Bleeds'
Impossible Foods Just Raised $75 Million for Its Plant-based Burgers
Cargill, Bill Gates, Richard Branson Backed Memphis Meats Expects Meat From Cells in Stores by 2021


[$] Habitica: a role-playing game for self improvement "IndyWatch Feed Tech"

What if real-life chores could gain you fake internet points like in an online role-playing game? That's the premise of Habitica, a productivity application disguised as a game. It's a self-improvement application where players can list their daily tasks or to-do items in the game; every time one is checked-off, the game rewards the player with points or game items.


A Technical Deep Dive: Securing the Automation of ACME DNS Challenge Validation "IndyWatch Feed Tech"

Earlier this month, Let's Encrypt (the free, automated, open Certificate Authority EFF helped launch two years ago) passed a huge milestone: issuing over 50 million active certificates. And that number is just going to keep growing, because in a few weeks Let's Encrypt will also start issuing wildcard certificatesa feature many system administrators have been asking for.

What's A Wildcard Certificate?

In order to validate an HTTPS certificate, a users browser checks to make sure that the domain name of the website is actually listed in the certificate. For example, a certificate from has to actually list as a valid domain for that certificate. Certificates can also list multiple domains (e.g.,,,, etc.) if the owner just wants to use one certificate for all of her domains. A wildcard certificate is just a certificate that says I'm valid for all of the subdomains in this domain instead of explicitly listing them all off. (In the certificate, this is indicated by using a wildcard character, indicated by an asterisk. So if you examine the certificate for today, it will say it's valid for * That way, a system administrator can get a certificate for their entire domain, and use it on new subdomains they hadn't even thought of when they got the certificate.

In order to issue wildcard certificates, Let's Encrypt is going to require users to prove their control over a domain by using a challenge based on DNS, the domain name system that translates domain names like into IP addresses like From the perspective of a Certificate Authority (CA) like Let's Encrypt, there's no better way to prove that you control a domain than by modifying its DNS records, as controlling the domain is the very essence of DNS.

But one of the key ideas behind Let's Encrypt is that getting a certificate should be an automatic process. In order to be automatic, though, the software that requests the certificate will also need to be able to modify the DNS records for that domain. In order to modify the DNS records, that software will also need to have access to the credentials for the DNS service (e.g. the login and password, or a cryptographic token), and those credentials will have to be stored wherever the automation takes place. In many cases, this means that if the machine handling the process gets compromised,...


Overnight Tech: Net neutrality advocates plan day of action | FCC chief eyes new spectrum auction for 5G | Court allows FTC data case against AT&T to go forward "IndyWatch Feed Tech"

NET NEUTRALITY ACTIVISTS RALLY TO OVERTURN FCC REPEAL: Net neutrality activists are stepping up their pressure on lawmakers this week to support a bill that would vacate the Federal Communications Commission's (FCC) decision to repeal its net...


Mesa 17.3.6 Released To Fix Intel GPU Hangs "IndyWatch Feed Tech"

It's been just one week since the Mesa 17.3.5 debut while today it's been succeeded by v17.3.6 as what's being advertised as an emergency release...


Godot To Focus On Vulkan Over OpenGL ES 3.0 Now That There's Mac Support "IndyWatch Feed Tech"

The Godot Game Engine is one of the few projects already announcing a change in their plans following this morning's announcement of better and open-source Vulkan support on macOS/iOS...


Receiving Messages from Aliens Could Pose a Security Risk "IndyWatch Feed Tech"

Two astrophysicists warn that passive SETI could be dangerous due to malicious code, blueprints, or ultimatums sent to Earth by aliens or alien AIs:

With all the news stories these days about computer hacking, it probably comes as no surprise that someone is worried about hackers from outer space. Yes, there are now scientists who fret that space aliens might send messages that worm their way into human society not to steal our passwords but to bring down our culture.

How exactly would they do that? Astrophysicists Michael Hippke and John Learned argue in a recent paper that our telescopes might pick up hazardous messages sent our way a virus that shuts down our computers, for example, or something a bit like cosmic blackmail: "Do this for us, or we'll make your sun go supernova and destroy Earth." Or perhaps the cosmic hackers could trick us into building self-replicating nanobots, and then arrange for them to be let loose to chew up our planet or its inhabitants.

But don't worry?

Although it may be rational for us to engage trade with this alien AI, the researchers ponder the consequences if the cure for cancer involves, say, building an army of nanobots from blueprints provided by the AI. In a sort of reverse-Contact scenario, the researchers imagine a scenario in which the machine blueprints turn out to be malicious. Perhaps humans build these cancer-curing nanobots and they are actually programmed to deplete Earth of certain vital resources.

The scenarios offered by the researchers are pretty far out, but are worth taking seriously in the event we ever establish contact with an extraterrestrial intelligence. Still, that's not necessarily a reason to refrain from opening the message. "Our main argument is that a message from ETI cannot be decontaminated with certainty," Hippke and Learned conclude in their paper. "Overall, we believe that the risk is very small (but not zero), and the potential benefit very large, so that we strongly encourage to read an incoming message."



Crankshaft: Open Source Car Computer "IndyWatch Feed Tech"

Modern cars and head units are pretty fancy gadget-wise. But what if your car still has an 8-track? No problem. Just pick up a Raspberry Pi 3 and a seven-inch touchscreen, and use Crankshaft to turn it into an Android Auto setup.

The open source project is based on OpenAuto which, in turn, leverages aasdk. The advantage to Crankshaft is it is a plug-and-play distribution. However, if you prefer, you can build it all yourself from GitHub.

The only limitation we can see stems from the lack of audio input on the Raspberry Pi, though we wonder if a USB sound card would take care of that problem. If you have a spare Pi and a screen hanging around, this is a handy project. A 3D-printed Pi case and some kind of mount for the LCD and you can ditch the 8-track. Not to mention with the Pi under there and all the source code, this should be highly hackable.

Perhaps youll do a little dashboard surgery. If you have a double DIN opening already, it might not be very difficult.


HPR2497: HPR 2017 New Years Eve show part 1 "IndyWatch Feed Tech"

HPR NYE 2017 - 1 Ken and Casper chat about the new year show and space Pirate drops in and Casper gets a new job Amazon's Giant Glass Balls ExplicitNess, and ratings and stuff Ken is tidying his room Microcenter SS Virgina5 - pirate makes the boat go. Do not ride!!!! Built as a passenger ferry in 1922 400hp 200rpm 3cylinder engine Steam mechanics explained 45 manual lubrication points powered by diesel not unlike tar pirate talks through lighting a plant off $150 for a 5 gallon bucket Ken Tweets NetMinter FDroid Copy APKs for your kids Ken replaces battery in OMRON EAR MC 510 - THERMOMETER Cool pcb ruler Linux Sparky - supports 32bit architecture, web browsers, Debian based, one old P4 Bootsteap - sparky command line installer, small package. Will allow you to install a desktop, can bootstrap to whatever you want. GNU - DOS xKlatuu signs on Discuss New Years in New Zealand!!!! Gun Control SHOW NOTES ARE(NOT?) Important xklaatu does not like shownotes Ken encourages them HoneyMagoo REALLY joins Markdown vs. non-markdown HTML5, Heated topic - trigger point discovered xklaatu owes ken a show on Git Why 36 bits? Because all letters were upper case, which only required 6 bits, 6*6 Casper's first graphics card was a rendition vrit Casper gets kicked off due to Van Allen Belt interference Fascism


Online sex trafficking bill clears House rules panel "IndyWatch Feed Tech"

A sex trafficking bill that has divided the tech industry was cleared by the House Rules Committee on Monday, setting it up for a Tuesday floor vote.The panel approved the Allow States and Victims to Fight Online Sex Trafficking Act (FOSTA) to be...


Developer of NanoCore RAT that targeted Canada, US & Steam jailed "IndyWatch Feed Tech"

By Waqas

The developer of NanoCore RAT (remote access Trojan) has been sentenced

This is a post from Read the original post: Developer of NanoCore RAT that targeted Canada, US & Steam jailed

Go Back:30 Days | 7 Days | 2 Days | 1 Day

IndyWatch Science and Technology News Feed Today.

Go Forward:1 Day | 2 Days | 7 Days | 30 Days

Monday, 26 February


$8.5 Billion Expansion Planned at Chicago's O'Hare Airport "IndyWatch Feed Tech"

Source: City Hall close on $8.5 billion O'Hare expansion deal

Chicago is on the verge of striking a historic $8.5 billion deal with airline carriers at O'Hare to give the airport its largest-ever terminal expansion, adding dozens of gates and 3 million square feet to its footprint. Central to the plan to modernize and grow the airport is the construction of a new Global Terminal, which would replace Terminal 2 and serve larger aircraft for international flights, according to a source with knowledge of the deal.

[...] The expansion would be complete by 2026, and the work could potentially create tens of thousands of jobs over the next eight years, the source said. It could also give O'Hare a chance to rise above its routinely dismal ranking for on-time flights.

[...] [The] mayor has said he could deliver on the long-elusive dream of a high-speed rail line between downtown and O'Hare. Four powerhouse firms, including Elon Musk's The Boring Company, have shown interest in designing, building, financing, operating and maintaining an express train.The city is hoping for a travel time of 20 minutes or less, with express trains running every 15 minutes for most of the day at fares cheaper than a taxi or Uber ride.

Also at the Chicago Tribune.

Original Submission

Read more of this story at SoylentNews.


Facebook's Sandberg backs controversial online sex trafficking bill "IndyWatch Feed Tech"

Sheryl Sandberg, Facebooks chief operating officer, voiced her support on Monday for controversial legislation aimed at cracking down on sex trafficking on internet platforms. We all have a responsibility to do our part to fight this. Thats...


Chinese satellite uses quantum cryptography for secure video conference between continents "IndyWatch Feed Tech"

Quantum cryptography has never been possible over long distances. But the first quantum communications satellite is rewriting the record books.


    Quantum Memory Storage is More Efficient and Secure Than Ever "IndyWatch Feed Tech"

    A new technique has raised the success rate of quantum memory storage from 30 to 70 percent. This leap in quantum computing could propel us closer to a future that connects us through ultra-secure quantum networks.


    Speaking a second language slows down aging and makes you smarter "IndyWatch Feed Tech"

    Speaking a second language slows brain aging and makes you smarter.


    Cancer-fighting nanorobots programmed to seek and destroy tumors "IndyWatch Feed Tech"

    In a major advancement in nanomedicine, Arizona State University (ASU) scientists, in collaboration with researchers from the National Center for Nanoscience and Technology (NCNST), of the Chinese Academy of Sciences, have successfully programmed nanorobots to shrink tumors by cutting off their blood supply.


    Nanodrops That Repair Corneas May Ultimately Replace Glasses "IndyWatch Feed Tech"

    Quite a number of people develop nearsightedness or farsightedness during their lifetimes. Nanodrops, a new eye drop developed by Israeli ophthalmologists, has successfully fixed corneas in pig eyes, and could potentially do the same for people.

    New eye drops developed by researchers from the Shaare Zedek Medical Center and Bar-Ilan University in Israel can improve both nearsightedness and farsightedness, the inventors claim. However, so far the nanodrops have only been successfully tested on pigs corneas.


    We Might Finally Know Why The Blood of Young People Can Rejuvenate Old Brains "IndyWatch Feed Tech"

    Scientists have been rejuvenating old mice with infusions of not just the blood of younger mice, but even blood from teenage human beings and we finally have our first clues on why this strange technique works.

    Researchers have discovered an enzyme that helps rescue ageing brains from cognitive decline. So far its only been shown in mice, but if the same mechanisms are found in humans, it could lead to a new class of anti-ageing therapies.

    Four years ago, a team of researchers led by neurobiologist Saul Villeda from the University of California, San Francisco, discovered that giving older mice infusions of blood from younger mice improved their memory and learning by improving connections in the hippocampus.


    A startup that wants to better understand the relationship our gut has to our brain just raised $66 million "IndyWatch Feed Tech"

    A startup working to better understand the relationship our gut has with our brain has raised another $66 million.

    New York-based Kallyope raised its series B round from new investors Two Sigma Ventures and Euclidean Capital. They were joined by Polaris Partners, Illumina Ventures, Lux Capital and others that had invested in Kallyopes $44 million series A round in 2015.

    Kallyope is trying to figure out how exactly the brain interacts with the gut by mapping it out. By collecting sequencing information about cells in the gut, for example, Kallyope can better figure out how theyre connected to neurons in the brain in a series of circuits. Understanding that relationship could lead to pills that could interact with the guts signals and in turn pass that message along to the brain.


    Scientists Use EEG Machine to Create Digital Images From Brain Activity "IndyWatch Feed Tech"

    Neuroscientists have devised a new method of mind-reading technology that recreates images perceived by the human brain based on EEG readings.


    Why Quantum Computers Will Be Exponentially Faster Than Digital Computers "IndyWatch Feed Tech"

    Check out this weeks episode of Singularity Hubs video series, Tech-x-planations, to learn more about what a quantum computer really is.


    AMDGPU DC Gets HDMI Fixes, More Raven/DCN Patches "IndyWatch Feed Tech"

    DC patch wrangler Harry Wentland of AMD has sent out the 33 latest patches for the AMDGPU display code stack...


    Kids Use Tech So Much They Cant Hold A Pencil Anymore, Doctors Say "IndyWatch Feed Tech"

    Swipetarded parents. Swipetarded children. This should be a boon for the public school to private prison gravy train. Via: Guardian: Children are increasingly finding it hard to hold pens and pencils because of an excessive use of technology, senior paediatric doctors have warned. An overuse of touchscreen phones and tablets is preventing childrens finger muscles []


    Court allows FTC to move forward with data-throttling case against AT&T "IndyWatch Feed Tech"

    A federal appeals court ruled on Monday that the Federal Trade Commission (FTC) can move forward with its lawsuit against AT&T over allegations the company deceptively slowed data for some of its customers.The decision also affirms the...


    [$] Shedding old architectures and compilers in the kernel "IndyWatch Feed Tech"

    The kernel development process tends to be focused on addition: each new release supports more drivers, more features, and often new processor architectures. As a result, almost every kernel release has been larger than its predecessor. But occasionally even the kernel needs to slim down a bit. Upcoming kernel releases are likely to see the removal of support for a number of unloved architectures and, in an unrelated move, the removal of support for some older compilers.


    10,000-Year-Clock Being Installed in Texas "IndyWatch Feed Tech"

    Construction begins on Jeff Bezos' $42 million 10,000-year clock

    Installation has finally begun on Jeff Bezos' 10,000-year clock, a project that the Amazon CEO has invested $42 million in (along with a hollowed-out mountain in Texas that Bezos intends for a Blue Origin spaceport), with the goal of building a mechanical clock that will run for 10 millennia.

    It's a monumental undertaking that Bezos and the crew of people designing and building the clock repeatedly compare to the Egyptian pyramids. And as with the pharaohs, it takes a certain amount of ego even hubris to consider building such a monument. But it's also an unparalleled engineering problem, challenging its makers to think about how to keep a machine intact, operational and accurate over a time span longer than most human-made objects have even existed.

    Consider this: 10,000 years ago, our ancestors had barely begun making the transition from hunting and gathering to simple agriculture, and had just figured out how to cultivate gourds to use as bottles. What if those people had built a machine, set it in motion, and it was still running today? Would we understand how to use it? What would it tell us about them?

    Also at CNBC.

    Original Submission

    Read more of this story at SoylentNews.


    PC-XT Emulator On ESP8266 "IndyWatch Feed Tech"

    Do you remember the simpler times when you had a DOS command line, a handful of commands, and you talked to the hardware through a few BIOS and DOS interrupts? Okay, maybe it was a little limited, but nostalgia doesnt care. Now [mcuhacker] is working on bringing some of those memories back by getting a PC-XT emulator running on an ESP8266.

    For the x86 CPU emulator, he ported Fake86 which is written in C, and created an Arduino IDE environment for it. The MS-DOS 3.3 bootdisk image is stored in flash and is accessed as the A: drive. Theres no keyboard yet but he has 640200 CGA working with 8025 characters on a 3.5 TFT display with the help of a low pass filter circuit. In the video below he shows it booting to the point where it asks for the date.

    Emulating other hardware on the ESP8266 seems to be a popular thing to do. Maybe you were an Apple user and would prefer 6502 emulation on the ESP8266 running as an Apple 1. We even have a Z80 emulation running CP/M in case that was more your preference.


    Cybersecurity week Round-Up (2018, Week 8) "IndyWatch Feed Tech"

    Cybersecurity week Round-Up (2018, Week 8) -Lets try to summarize the most important event occurred last week in 3 minutes.

    Last week, the Russian central bank revealed unknown hackers have stolen roughly $6 million from a Russian bank last year via SWIFT system.

    The Indian City Union Bank announced that cyber criminals compromised its systems and transferred a total of US$1.8 million.

    Hackers continue to show a great interest in cryptocurrency.

    • Researchers with Cisco Talos have monitored a bitcoin phishing campaign conducted by a criminal gang tracked as COINHOARDER that made an estimated $50 million by exploiting Google AdWords.
    • A criminal organization has made $3.4 million by compromising Jenkins servers and installing a Monero cryptocurrency miner dubbed JenkinsMiner.
    • Hackers compromised a Tesla Internal Servers with a Cryptocurrency miner.

    Google Project Zero hackers disclosed details of an unpatched vulnerability in the Edge browser because Microsoft failed to address it within a 90-day deadline.

    Google white hackers disclosed also critical vulnerabilities in uTorrent clients that could be easily exploited by the researchers to deliver a malware on the target computer or view the past downloads.

    The former NSA hacker and malware researcher Patrick Wardle spotted a new remote access Trojan dubbed Coldroot RAT. The Coldroot RAT is a cross-platform malware that is targeting MacOS systems and the bad news is that AV software is not able to detect it.

    Intel released a stable microcode update to address the Spectre vulnerability for its Skylake, Kaby Lake, and Coffee Lake processors in all their various variants.

    State-sponsored hackers are often active and are expanding their horizons:

    • North K...


    Laura Montgomery, Proprietor of Ground Based Space Matters, joins our Space Settlement Board. "IndyWatch Feed Tech"

    Laura Montgomery, Proprietor of Ground Based Space Matters, joins our Space Settlement Board. Laura Montgomery, Proprietor of Ground Based Space Matters, joins our Space Settlemen Board.


    Last chance to pre-order your LibrePlanet 2018 T-shirt! "IndyWatch Feed Tech"

    front of LibrePlanet tee

    Your last opportunity to order a LibrePlanet 2018 T-shirt before the conference is fast approaching -- early orders must arrive by February 28. The shirt is a real prize, printed in an eye-popping green-and-yellow color scheme on a high-quality black shirt.

    If you're attending this year's LibrePlanet, we'll have your shirt waiting for you; you can waive the shipping fee by entering the coupon code LPSHIRT18 at checkout. If you're not attending LibrePlanet, we'll mail you your shirt after the conference. Either way, you wind up with a real snazzy piece of clothing made of soft, high-quality cotton. It's a limited edition shirt -- after this year's conference there will never be a second print run -- so this is your only chance!



    Applied Group Theory "IndyWatch Feed Tech"

    I just noticed that Greg Moore has been teaching a wonderful course in recent years with the misleadingly bland title of Applied Group Theory. His choice of the topics he wants to cover given here is an excellent one and a good outline for anyone trying to get themselves a serious education in the modern overlap of math and physics.

    The problem with this outline is that its far too ambitious to cover in a one-semester course, starting just from basics. Moore notes that in 2008 and 2009 versions of the course he only got through roughly half the topics, with students still complaining about the fast pace of the course. In 2013 he only made it through two out 21 topics, but in doing so generated two book-length documents of notes:

    These each contain a wealth of valuable material. I do hope he someday writes up the other 19 topics, but if he does it the way he has been going, the length might turn out to be around 4000 pages, so that might take a while. In the meantime, an account of some of them is available here.

    In addition, theres also a list of suggested topics for term papers, nearly a hundred of them, each with a description of an interesting issue that has been a topic of significant research, with references for where to start learning about the topic.


    Exploding e-Cigarettes Are a Growing Danger to Public Health "IndyWatch Feed Tech"

    Whatever their physiological effects, the most immediate threat of these nicotine-delivery devices comes from a battery problem called thermal runaway Photo: The Voorhes

    img Photo: The Voorhes

    On 23 November 2016, as he stood behind the counter of a wine store in New York City, Otis Gooding felt an explosion on his right thigh. The e-cigarette hed been carrying in his pants pocket had suddenly erupted like a small fireworks display. As a security camera later showed, the 31-year-old Gooding struggled to pull the burning device out of his pants. Gooding would later need a skin graft and 51 staples, and he may never recover the full use of his hand.

    In July 2017, the National Fire Data Center of the U.S. Fire Administration identified 195 separate e-cigarette incidents in the United States between January 2009 and 31 December 2016. Thirty-eight incidents resulted in third-degree burns, facial injuries, or the loss of a body part. The number of fires and explosions has risen in tandem with the rise in e-cigarette sales. The report also notes the lack of regulations, codes, or laws governing the safety of the batteries in e-cigarettes. And theres reason to believe that many cases of injury are never registered with government authorities. An online blog asserts that at least 243 e-cigarette explosions occurred from August 2009 to April 2017, resulting in 158 personal injuries. Other explosions harmed animals or property.

    technical illustration Illustration: Jean-Luc Fortier In Your Face: This cutway illustration of an e-cigarette is technically kno...


    Wayland 1.15 Alpha Released, Pulls In Libwayland-EGL "IndyWatch Feed Tech"

    Derek Foreman of Samsung's Open-Source Group has announced the alpha release of Wayland 1.15...


    Private browsing is not that private, but it can be "IndyWatch Feed Tech"

    Private, Incognito mode browsing sessions are not as foolproof as most users believe them to be. After a private session terminates, the browser is supposed to remove client-side evidence that the session occurred. Unfortunately, implementations of private browsing mode still allow sensitive information to leak into persistent storage, a group of MIT and Harvard University researchers pointed out. Browsers use the file system or an SQLite database to temporarily store information associated with private sessions; More


    FCC chairman wants new spectrum auctions "IndyWatch Feed Tech"

    Federal Communications Commission (FCC) Chairman Ajit Pai on Monday said that he wants to free up more spectrum, the radio bands that telecommunications companies use for their networks.Speaking at the Mobile World Congress event in Barcelona,...


    Swedish PM Does Not Rule Out Use of Army to End Gang Violence "IndyWatch Feed Tech"

    Sweden will do whatever it takes, including sending in the army, to end a wave of violence that has seen a string of deadly shootings, Prime Minister Stefan Lofven said in Wednesday.

    Sweden's murder rate is relatively low in international terms, but gang violence has surged in recent years and Swedes are worried that the police are unable to cope.

    In 2016, the latest year for which official statistics are available, 106 people were murdered in Sweden, a country of 10 million.

    But Swedish TV reported there were over 300 shootings, mostly in turf battles between gangs over drugs, protection rackets and prostitution.

    Original Submission

    Read more of this story at SoylentNews.


    Review of the Moai SLA 3D Printer "IndyWatch Feed Tech"

    It is funny how we always seem to pay the same for a new computer. The price stays the same, but the power of the computer is better each time. It would appear 3D printers may be the same story. After all, it wasnt long ago that sinking a thousand bucks or more on a 3D printer wouldnt raise any eyebrows. Yet today you can better printers for a fraction of that and $1,300 will buy you an open source Moai SLA printer as a kit. [3D Printing Nerd] took a field trip to MatterHackers to check the machine out and you can see the results in the video below.

    The printer uses a 150 mW laser to make parts up to 130 mm by 130 mm by 180 mm. The laser spot size is 70 micron (compare that to the typical 400 micron tip on a conventional printer). The prints require an alcohol bath after they are done followed by a UV curing step that takes a few hours.

    The process for slicing is slightly different, as the video explains how that works. More software will likely incorporate SLA settings as these printers become more common. You also want hollow prints since the resin inside wont cure. Theres also the need for holes to drain resin from the interior.

    The prints look fantastic and the video does a good job of pointing out many of the differences in printing with this technology, including the effect of bed tilting and how that is handled in the Moais software. We wished we had seen more of the actual build process, but we suppose with the working parts locked away to protect eyes from laser beams, there wasnt much to see.

    Weve seen one of these machines printing a lens, by the way. We also saw it at the Midwest RepRap Festival last year.


    USPS Finally Starts Notifying You by Mail If Someone is Scanning Your Snail Mail Online "IndyWatch Feed Tech"

    In October 2017, KrebsOnSecurity warned that neer-do-wells could take advantage of a relatively new service offered by the U.S. Postal Service that provides scanned images of all incoming mail before it is slated to arrive at its destination address. We advised that stalkers or scammers could abuse this service by signing up as anyone in the household, because the USPS wasnt at that point set up to use its own unique communication system the U.S. mail to alert residents when someone had signed up to receive these scanned images.

    Image: USPS

    The USPS recently told this publication that beginning Feb. 16 it started alerting all households by mail whenever anyone signs up to receive these scanned notifications of mail delivered to that address. The notification program, dubbed Informed Delivery, includes a scan of the front of each envelope destined for a specific address each day.

    The Postal Service says consumer feedback on its Informed Delivery service has been overwhelmingly positive, particularly among residents who travel regularly and wish to keep close tabs on any bills or other mail being delivered while theyre on the road. It has been available to select addresses in several states since 2014 under a targeted USPS pilot program, but it has since expanded to include many ZIP codes nationwide. U.S. residents can find out if their address is eligible by visiting

    According to the USPS, some 8.1 million accounts have been created via the service so far (Oct. 7, 2017, the last time I wrote about Informed Delivery, there were 6.3 million subscribers, so the program has grown more than 28 percent in five months).

    Roy Betts, a spokesperson for the USPSs communications team, says post offices handled 50,000 Informed Delivery notifications the week of Feb. 16, and are delivering an additional 100,000 letters to existing Informed Delivery addresses this coming week.

    Currently, the USPS allows address change...


    Net neutrality activists rally to overturn FCC repeal "IndyWatch Feed Tech"

    Net neutrality activists are stepping up their pressure on lawmakers this week to support a bill that would vacate the Federal Communications Commissions (FCC) decision to repeal its net neutrality rules.On Tuesday, supporters are holding a...


    Digestive ability of ancient insects could boost biofuel development "IndyWatch Feed Tech"

    A study of the unusual digestive system of an ancient group of insects has provided new insights into future biofuel production.


    Printed Sensor Monitors Tire Tread in Real Time "IndyWatch Feed Tech"

    A carbon nanotube sensor measures millimeter-scale changes in rubber thickness Photo: Kevin Seifert/Duke University

    A flexible, printed sensor that accurately measures tire wear in real time could warn drivers when the tread on their tires has gotten uneven or precariously thin. The sensor, made with carbon nanotube ink, spots millimeter-level changes in tire tread with 99 percent accuracy.

    Todays cars are laden with sensors that keep tabs on many variables including engine temperature and fuel pressure as well as environmental conditions and approaching obstacles. But there is no technology to monitor tire wear, says Duke University professor of electrical and computer engineering Aaron Franklin, who led the team that reported the new tire sensor in IEEE Sensors Journal last year.

    The researchers spinout Tyrata, Inc. raised US $4.5 million from several investors last week. Franklin says the startup should have a sensor package thats ready to go into cars by mid-2019. The device is so simple and the need is so great since no existing competitor is available, that response from the industry has been astonishing, he says.

    The new tire sensor is simple: it consists of just two millimeter-scale electrodes that the researchers print on a plastic substrate using carbon nanotube ink. The device goes on the inside wall of a tire. An oscillating voltage is applied to one electrode and the other is grounded to create an electric field, part of which arcs over the electrodes and passes through the tire rubber. The sensor system measures the magnitude of the oscillating signal reflecting off the grounded electrode, which changes with slight changes in the rubbers thickness.

    Professor Franklin in his lab with a tire depth sensor and a tire. Photo: Kevin Seifert/Duke University

    Aaron Franklin show off his teams tire sensor in his lab at Duke University.

    In their research paper, the team had focused on measuring capacitance. But, the capacitance changes are very tiny and required expensive electronics to measure, Franklin says. The low-frequency r...


    How Grassroots Activists in Georgia Are Leading the Opposition Against a Dangerous Computer Crime Bill "IndyWatch Feed Tech"

    A misguided bill in Georgia (S.B. 315) threatens to criminalize independent computer security research and punish ordinary technology users who violate fine-print terms of service clauses. S.B. 315 is currently making its way through the states legislature amid uproar and resistance that its sponsors might not have fully anticipated. At the center of this opposition is a group of concerned citizen-advocates who, through their volunteer advocacy, have drawn national attention to the industry-wide implications of this bill.

    Scott M. Jones and David Merrill from Electronic Frontiers Georgiaa group that participates in the Electronic Frontier Alliance network spoke to us about their efforts to inform legislators and the public of the harms this bill would cause.

    You have most recently been organizing around Georgia Senate Bill 315. What is the bill about, and what are your concerns with it?

    Scott: Senate Bill 315 is a computer intrusion bill. Georgia already has on the books some very strong laws against computer intrusion, computer fraud, and the malicious side of hacking. I think this is pretty well covered in state law as it is.

    There was an incident last year at Kennesaw State University. Some of the functions for conducting elections in the state of Georgia were farmed out to KSU and their Election Center, and there was a data breach there. That was very big in the news. What they didnt say in the news at the time was that [it was] a security researcher who found a vulnerability and reported it ethically. As it turns out, the researcher in question was not even targeting KSU election systems, but merely found inappropriate personal information via a Google search, and then tried to get authorities to act quickly to remove it. This person, as we found out later, was investigated by the FBI and they came up clean. [The FBI] didnt have anything to charge them with, so they left.

    The state feels very embarrassed by this, and the attorney generals office has asked for a bill that goes above and beyond the existing statutes that we have against computer crime. Thats where Senate Bill 315 came from. To use the language that the attorney generals office used, they want to build it to criminalize so-called poking around. Basically, if youre looking for vulnerabilities in a non-destructive way, even if youre ethically reporting themespecially if youre ethically...


    The Problems With FISA, Secrecy, and Automatically Classified Information "IndyWatch Feed Tech"

    On January 19, staff for Representative Devin Nunes (R-CA) wrote a classified memo alleging that the FBI and DOJ committed surveillance abuses in its applications for and renewal of a surveillance order against former Trump administration advisor Carter Page. Allegedly, the FBI and DOJs surveillance application included biased, politically-funded information.

    The House Permanent Select Committee on Intelligence, on which Rep. Nunes serves as chairman, later voted to release the memo. What the memo meant, however, depended on who was talking.  Some Republican House members took the memo as fact, claiming it showed abuse and efforts to undermine our country.  But Rep. Adam Schiff (D-CA)who serves as Ranking Member on the House Permanent Select Committee on Intelligence, across from Nunescalled the memo profoundly misleading and, in an opinion for The Washington Post, said it cherry-picks facts.

    Even the FBI entered the debate, slamming the memo and saying the agency had grave concerns about material omissions of fact that fundamentally impact the memo's accuracy." And Assistant Attorney General Stephen Boyd of the DOJ said releasing the memo without review would be extraordinarily reckless. Finally, the president said the memo totally vindicates him from special counsel Robert Muell...


    Successful Experiments In Multicolor Circuit Boards "IndyWatch Feed Tech"

    Printed circuit boards have never been cheaper or easier to make. Were not that far removed from a time where, if you wanted a printed circuit board, your best and cheapest option would be to download some proprietary software from a board house, use their terrible tool, and send your board off to be manufactured. A few copies of a 5x5cm board would cost $200. Now, anyone can use free (as in beer, if not speech) software, whip up a board, and get a beautifully printed circuit board for five dollars. It has never been easier to make a printed circuit board, and with that comes a new medium of artistic expression. Now, we can make art on PCBs.

    PCB as Art

    For the last year or so, Hackaday has been doing a deep-dive into the state of artistic PCBs. By far our biggest triumph is the Tindie Blinky Badge, an artistic representation of a robot dog with blinking LED eyes. [Andrew Sowa] turned some idiot into PCB coinage, and that same idiot experimented with multicolor silkscreen at last years DEF CON.

    Others have far surpassed anything we could ever come up with ourselves; [Trammel Hudson] created an amazing blinky board using the standard OSHPark colors, and [Blake Ramsdell] is crafting full panels of PCB art. The work of Boldport and [Saar Drimer] has been featured in Marie Claire. The world of art on printed circuit boards has never been more alive, there has never been more potential, and the artistic output of the community is, simply, amazing. We are witnessing the evolution of a new artistic medium.

    Printed circuit boards are a limited medium. Unless you want to shell out big bucks for more colors of silkscreen, weird colors of soldermask, or even multiple colors of soldermask, you will be limited to the standard stackup found in every board house. One color, the fiberglass substrate, will be a pale yellow. The copper layer will be silver or gold, depending on the finish. The soldermask will be green, red, yellow, blue, black, white, and of course purple if you go through OSH Park. The silkscreen will be white (or black if you go with a white soldermask). What Im getting at is that the palette of colors available for PCB art is limited or at least it has been.

    For a few months now, Hackaday has been experimenting with a new process for adding colors to printed circuit boards. This is a manufacturing process that translates well into mass product...


    Botanists Around the Globe Floored by a Priceless Collection Gone Up in Smoke "IndyWatch Feed Tech"

    Last year, Australian bureaucrats facilitated the destruction of a priceless, irreplaceable, scientific collection of plant materials on loan to their country's scientists from France. Apparently the actual destruction was carried out by an "external contractor", but that in no way absolves the bureaucracy.

    Jeanson had received a message from the director of the Queensland Herbarium in Australia that was abrupt to the point of being blunt. It told him that a package of 105 botanical specimens of Australian plants owned by the Jardin des Plantes and gathered by an intrepid French botanist more than 200 years earlier had been destroyed by Australian biosecurity officials.

    To this day, Jeanson can't quite believe what happened, and nor can scientists and museum directors from around the world who have followed the story with horror.

    The specimens were both priceless and irreplaceable. How could anyone, let alone government officials, incinerate such artefacts? It was simply beyond Jeanson's comprehension. It remains so, even after post-mortems and investigations conducted in both countries, by scientists and bureaucrats, after diplomats stepped in and compensation negotiations were undertaken.

    The specimens destroyed were part of the catalog of the world's plants and were a part of a base for pharmacy, agriculture, and any kind of science based on plants.

    Source : 'Would you burn the Mona Lisa if it was sent?': Our horror bureaucratic bungle

    Original Submission

    Read more of this story at SoylentNews.


    Caloric Restriction Improves Regeneration in Intestinal Tissue "IndyWatch Feed Tech"

    Caloric restriction has long been known to increase the lifespan and healthspan of most studied animals. Research also shows that animals given a calorie-restricted diet are also generally more able to regenerate tissue damage following injury.

    Caloric restriction improves tissue regeneration

    A new study by the Lengner lab at the University of Pennsylvania has identified the actual cells responsible for this increased regenerative capacity in intestinal tissue[1]. The researchers found that when a mouse given a calorie-restricted diet is exposed to radiation, a specialized type of stem cell known as a reserve stem cell is able to survive and rapidly repair intestinal tissues.


    AI Beats Dermatologists in Diagnosing Nail Fungus "IndyWatch Feed Tech"

    Deep learning algorithms beat 42 dermatology experts at diagnosing nail fungus infections Photo: iStockphoto

    Its still relatively rare for artificial intelligence to deliver a crushing victory over human physicians in a head-to-head test of medical expertise. But a deep neural network approach managed to beat 42 dermatology experts in diagnosing a common nail fungus that affects about 35 million Americans each year.

    The latest successful demonstration of AIs capabilities in the medical field relied heavily upon a team of South Korean researchers putting together a huge dataset of almost 50,000 images of toenails and fingernails. That large amount of data used to train the deep neural networks on recognizing cases of onychomycosisa common fungal infection that can make nails discolored and brittleprovided the crucial edge that enabled deep learning to outperform medical experts.

    This study was the first to show that AI has overwhelmed the specialists, says Seung Seog Han, a dermatologist and clinician at I Dermatology in Seoul, South Korea. Until now, in many studies, AI was similar to that of a specialist in diagnosis of diabetic retinopathy, diagnosis of skin cancer, and chest X-ray readings.

    Past testing involving AI versus doctors in dermatology has typically shown AI to be roughly on par with human expertise. But in this study, just one dermatologist out of 42 experts did slightly better than the deep neural networks in one out of three trials during a specific test scenario. The research appears in the 19 January 2018 online issue of the journal  PLOS One .

    Notably, the deep neural networks performed much better than the dermatology experts on especially difficult cases as opposed to easier cases, Han says. Besides Han, primary researchers in the group included Gyeong Hun Park, a professor of dermatology at Hallym University, and Sung Eun Chang, a professor of dermatology at Ulsan University.

    Hans day job as a physician involves treating a wide variety of skin conditions. But he has also learned a number of computer programming languages such as C++ and Python over the years. And he took an interest in deep learning after seeing news about AlphaGo, DeepMinds self-taught Go-playing AI, defeating the worlds best human players such as South Korea...


    BMG Wants Appeals Court to Rehear Cox Piracy Liability Case "IndyWatch Feed Tech"

    Earlier this month, the Court of Appeals for the Fourth Circuit overturned the $25 million piracy liability verdict against Internet provider Cox.

    The panel of three judges concluded that the district court made an error in its jury instruction and ordered a new trial.

    The erroneous instruction said that the ISP could be found liable for contributory infringement if it knew or should have known of such infringing activity. The Court of Appeals agrees that based on the law, the should have known standard is too low.

    As a result of the ruling, music publisher BMG Rights Management and Cox would have to go head to head again in a new trial. However, according to BMG, the Court of Appeals itself made a mistake.

    A few days ago the copyright holder petitioned the court for a rehearing en banc, asking for a do-over before all the judges of a court.

    The music publisher argues that the appeals court judges mistakenly reached their decision based on a legal principle that applies to inducement of liability, while BMG was pursuing a claim of material contribution.

    The panels unprecedented application of a heightened knowledge standard creates a conflict with decisions and pattern jury instructions from other circuits as well as with the common-law rules underlying contributory infringement.

    All of those recognize that BMGs material-contribution theory requires only constructive knowledge, BMGs brief adds.

    Even if the appeals court persists with its assertion that the liability standard is willful blindness rather than should have known, a new trial would not be warranted, according to the music publisher.

    They point out that plenty of evidence was presented which proved that Cox was wilfully blind to the copyright infringements and describe the erroneous instruction as a harmless error of the most benign kind.

    The music publishers request for a rehearing is supported by the RIAA, which filed an amicus curiae brief together with the National Music Publishers Association.

    Both music industry groups back BMGs arguments and ask the appeals court to consider a rehearing, stating that it would be in the best interests of artists, songwriters, and other rightsholders.

    The level of copyright infringement that takes place over the Internet is staggering, and it is vital that copyright owners have effective mechanisms to address it. It is also critical that copyright owners can adequately address...


    Chrome OS Will Soon Start Supporting Linux Applications "IndyWatch Feed Tech"

    By Uzair Amir

    We do know that there is a deep underlying connection

    This is a post from Read the original post: Chrome OS Will Soon Start Supporting Linux Applications


    Can High-Tech Drones Help Stop Mass Shootings? "IndyWatch Feed Tech"

    Im excited to share a new article of mine via The Daily Dot on the future of so-called gun control, one that promises freedom and protects people from criminals and mass shooters. As usual, the answer is in technology to improve the worldand not in Congress changing or creating laws. This is a policy article of mine, and this is the technology you could expect to see in California if I was elected Governor:

    High-tech drones and surveillance technology can offer a radically new type of gun control, helping detect possible the presence of guns and intervene in mass shootings.


    World Create Day is the Hackaday Event in Your Neighborhood "IndyWatch Feed Tech"

    Hackaday World Create Day is on March 17th and its happening near you. Get together with hackers in your area and create something. Sign up now to host a World Create Day gathering! These are really easy to organize, but we can only do it with your help.

    The Hackaday community from around the world will meetup and spend time building together on Saturday, March 17th. Pick one of those projects youve been meaning to dive into and get together with some old and new friends to hack on your projects together.

    You should make this day your own. As with any hands-on hacking events its a good idea to block out a bit of time at the end for lightning talks to show off the builds everyone has been working on. Make the memories live on past a single day by taking pictures and posting the story of your World Create Day meetup. We enjoyed getting a great look at many of last years meetups this way and want to expand the builds we feature on the front page this year.

    Meetup Organizers Wanted

    Fill out this form to let us know you want to host a meetup.

    Every year we have World Create Day meetups all over the world which are set up by local organizers. Many of those will happen again this year, but we also need you to organize an event in your area. Well help you get things set up and put your event up on the big map so others in your area will plan to join in. Do it now, if we get your shipping info early well send you stickers and other swag to hand out at your gathering.

    Build Something that Matters

    The core of World Create Day is to stop making excuses and just build something. Great builds start with a plan. The Hackaday Prize will begin soon, and since youre already getting together with other people, form a team and dream up your entry.

    This is your take on building something that matters to the world. Come up with a plan that solves a problem facing humanity and publish your work on You may be surprised by the support you get for your idea, but youll never know until you put an idea out there. Join in Hackadays World Create Day on March 17th and lets show the world the kind of hope that blossoms when we decide to build something that matters.


    OpenAI Releases Algorithm That Helps Robots Learn from Hindsight "IndyWatch Feed Tech"

    It's not a failure if you just pretend that you meant to do it all along Image: OpenAI

    Being able to learn from mistakes is a powerful ability that humans (being mistake-prone) take advantage of all the time. Even if we screw something up that were trying to do, we probably got parts of it at least a little bit correct, and we can build off of the things that we did not to do better next time. Eventually, we succeed.

    Robots can use similar trial-and-error techniques to learn new tasks. With reinforcement learning, a robot tries different ways of doing a thing, and gets rewarded whenever an attempt helps it to get closer to the goal. Based on the reinforcement provided by that reward, the robot tries more of those same sorts of things until it succeeds.

    Where humans differ is in how were able to learn from our failures as well as our successes. Its not just that we learn what doesnt work relative to our original goal; we also collect information about how we fail that we may later be able to apply to a goal thats slightly different, making us much more effective at generalizing what we learn than robots tend to be.

    Today, San Francisco-based AI research company OpenAI is releasing an open source algorithm called Hindsight Experience Replay, or HER, which reframes failures as successes in order to help robots learn more like humans.

    The key insight that HER formalizes is what humans do intuitively: Even though you have not succeeded at a specific goal, you have at least achieved a different one. So why not just pretend that you wanted to achieve this goal to begin with, instead of the one that you set out to achieve originally? 

    To understand how HER works, imagine that youre up to bat in a game of baseball. Your goal is to hit a home run. On the first pitch, you hit a ball that goes foul. Its a failure to hit a home run, which sucks, but youve actually learned two things in the process: Youve learned one way of not hitting a home run, and youve also learned exactly how to hit a foul ball. Of course, you didnt know beforehand that you were going to hit a foul ball, but who cares? With hindsight experience replay, you decide to learn from what you just did anyway, essentially by saying, You know, if Id wanted to hit a foul ball, that would have been perfect! You might not have achieved your original goal, but youve still made progress.

    The other nice thing about HER is that it uses what researchers call...


    Blockchain Nears Peak Hype: UK Politicos To Probe Crypto-Coin "IndyWatch Feed Tech"

    Title: Blockchain Nears Peak Hype: UK Politicos To Probe Crypto-Coin

    Hot on the heels of Bitcoin's dramatic rise and fall - and rise, British parliamentarians have decided to launch an inquiry into digital currencies.

    The Treasury Committee, one of the more influential of the House of Commons' talking shops, today confirmed it will investigate the impact of cryptocurrencies and how they can be regulated.

    [...] "Striking the right balance between regulating digital currencies to provide adequate protection for consumers and businesses, whilst not stifling innovation, is crucial."

    [...] Many regulators and government bodies - from the European Commission to the US Securities and Exchange Commission - have made no secret of their disdain for Bitcoin.

    [...] But the committee also plans to investigate the potential benefits of cryptocurrencies and the underlying distributed ledger technology, for instance in boosting security or disrupting the economy or work of the public sector.

    Original Submission

    Read more of this story at SoylentNews.


    A view of the global threat landscape: Cybercrime and intrusion trends "IndyWatch Feed Tech"

    Established and well-resourced cyber operations will continue to innovate, developing new methods of distributing crimeware and incorporating advanced tactics to infiltrate, disrupt and destroy systems, according to a new report by CrowdStrike. Weve already seen cyber adversaries launch massive, destructive attacks that render organizations inoperable for days or weeks. Looking ahead, security teams will be under even more pressure to detect, investigate, and remediate breaches faster, said Dmitri Alperovitch, CrowdStrikes CTO. Key findings Based on More


    Linux 4.16 Receives More Spectre & Meltdown Fixes/Optimizations "IndyWatch Feed Tech"

    The in-development Linux 4.16 kernel has already received a few rounds of updates for the mitigation work on the Spectre and Meltdown CPU vulnerabilities while more is on the way...


    Samsung announces the Galaxy S9 with improved camera, AR features "IndyWatch Feed Tech"

    Samsung launches Galaxy S9 and Galaxy S9+ with advanced camera, super slow-mo, and new 3D emojis

    Samsung Electronics Co. finally announced its highly-anticipated flagship smartphones, S9 and S9+ at the Mobile World Conference in Barcelona on Sunday, which promises improved cameras and augmented reality (AR) features.

    The Galaxy S9 and S9+ smartphones dont stray far from their predecessors, the Galaxy S8 and S8+ and just incremental improvements. The S9 (5.8-inch Quad HD+) and S9+ (6.2-inch Quad HD+) will maintain the same sleek look and feel of the previous models, and come with 18.5:9 aspect ratio screens, curved sides, and glass front and backs. Both the devices come packed with a Snapdragon 845 chipset (or Exynos 9810, depending on your market).

    The Galaxy S9 is said to come with 4GB of RAM, 64GB of internal storage and 3,000mAh battery, whereas the S9+ will be equipped with 6GB of RAM, 128GB of inbuilt storage and 3,500mAh battery. It will also feature a headphone jack, microSD slot, USB-C port, is IP68 dust and water resistant, and supports both fast wired and fast wireless charging.

    However, the new flagship smartphones biggest selling point is its camera, which Samsung claims is the most advanced camera ever that takes smartphone photography to the next level.

    The way we use our smartphones has changed as communication and self-expression has evolved, said DJ Koh, president and Head of IT & Mobile Communications Division, Samsung Electronics. With the Galaxy S9 and S9+, we have reimagined the smartphone camera. Not only does the Galaxy S9 and S9+ enable consumers to shoot the best photos and videos anywhere, its a smartphone thats designed to help them connect to others and express themselves in a way thats unique and personal to them.

    The Samsung Galaxy S9 and Galaxy S9+ handsets have a Super Speed Dual Pixel sensor with dedicated processing power and memory that can combine 12 photos into one amazing, high quality photo. It will have two apertures: f/1.5 and f/2.4, suggesting that the camera could switch apertures depending on lighting conditions. While the S9 has a single-lens camera configuration, the S9+ has dual-lens, which means that the S9+ will support things like depth effect.

    Another feature of the smartphones is the Super Slow-mo that captures video at 960 frames per second (fps) at 720p, and 240 fps at 1080p. The Galaxy S9 and Galaxy S9+ also offers automatic Motion Detection, an intelligent feature that will automatically detect movement in the shot and begin to record. There is also digital zoom up to 8x (Galaxy S9) or up to 10x (Galaxy S9+), a High CRI LED Flash, playback zoom and video tags.

    As expected, Samsung is including AR Emoji in its phones, which uses a 3D-style emoji to capture an image of yo...


    Chipmakers Test Ferroelectrics as a Route to Ultralow-Power Chips "IndyWatch Feed Tech"

    But doubts linger over ferroelectric transistors ability to jump from lab to fab Illustration: Emily Cooper

    Illustration: Emily Cooper Power Down: Chipmakers are adding a thin layer of ferroelectric material to transistors, including fin-shaped field-effect transistors (FinFETs), to reduce the gate voltage required for switching.

    Academics have high hopes for ferroelectric materials. Adding a single layer of these materials, which have unusual electrical properties, to todays transistors could radically decrease the power consumption of chips.

    But as engineers presented the latest research on ferroelectrics at the IEEE International Electron Devices Meeting (IEDM), in San Francisco in December, the mood in the room fluctuated between excitement and doubt.

    Many in industry are skeptical about the benefits of ferroelectrics. Still, the IEDM meeting made it clear that semiconductor companies are now paying attention. Researchers from GlobalFoundries presented data on the performance of ferroelectric-frosted transistors made using their 14-nanometer manufacturing technology.

    The magic of ferroelectrics is their potential to free engineers from the Boltzmann tyranny, named for Ludwig Boltzmann, who did foundational work in thermodynamics, says Aaron Franklin, an electrical engineer at Duke University, in North Carolina. To boost the current through a traditional field-effect transistor by a factor of 10 at room temperature, engineers must apply at least 60 millivolts. This sets a lower limit on transistors power consumption, which engineers dream of limbo-ing under. Getting a strong signal at lower voltages would save power and enable longer battery lives.

    Operating at lower voltages will be necessary for engineers to further shrink transistors. As they get smaller, they do a worse job of shedding heat. Shrink them too much and the overheating transistors will melt. Running transistors at lower voltages keeps temperatures in check.

    Ferroelectric materials are defined by their tendency to experience profound electrical polarization in response to relatively puny electrical fields. Put a voltage across a ferroelectric film and chargessometimes charged atomswithin it will quickly move from one side to the other. You put half a volt on it, and because of the polarization its like applying a whole volt, s...

    Arduino BabyTV is Big Fun at Low Resolution "IndyWatch Feed Tech"

    What kind of TV do you have? An older 720p model, or the now standard 1080p? Perhaps youve made the leap to the next generation, and are rocking a 4K display in the living room. All those are are fine and dandy if you just want to watch the local sportball contest, but wheres the challenge in that? With all the technology and modular components we have access to anymore, nowadays all the real hackers are making their own TVs.

    Of course, when [Nikolai] built his very own LED TV, he did have to make a few concessions. For one thing, theres no tuner on this model. Oh, and theres the small issue of only having a 1616 resolution. It might not be your idea of the perfect display, but its just perfect for his newborn son.

    Thats right, [Nikolai] got his entry for the Hacker Parent of the Year award in early, and built an LED display for his son that hes calling BabyTV.

    Rather than the shows, trash, advertisements that they play on the kid channels, this TV only shows animated characters from retro games. Well concede that this project might be an elaborate Clockwork Orange style a...


    Security updates for Monday "IndyWatch Feed Tech"

    Security updates have been issued by Arch Linux (lib32-wavpack, phpmyadmin, unixodbc, and wavpack), Debian (drupal7, golang, imagemagick, libdatetime-timezone-perl, libvpx, and tzdata), Fedora (exim, irssi, kernel, milkytracker, qt5-qtwebengine, seamonkey, and suricata), Mageia (advancecomp, apache-commons-email, freetype2, ghostscript, glpi, jackson-databind, kernel, mariadb, and postgresql), openSUSE (dhcp, GraphicsMagick, lame, php5, phpMyAdmin, timidity, and wireshark), and Oracle (kernel).


    Gallup poll: Americans split on universal basic income for workers displaced by AI "IndyWatch Feed Tech"

    The American public is split on the prospect of giving a universal basic income to Americans who lose their jobs to artificial intelligence, according to a new poll.In a Gallup and Northeastern University poll released Monday, 48 percent of...


    Teen Exposes T-Mobile Flaw Allowing Mass Hijacking of User Accounts "IndyWatch Feed Tech"

    By Waqas

    Users of popular cell phone carrier T-Mobile could have been

    This is a post from Read the original post: Teen Exposes T-Mobile Flaw Allowing Mass Hijacking of User Accounts


    Apple Confirms It Uses Googles Cloud for iCloud "IndyWatch Feed Tech"

    Via: CNBC: A file that Apple updated on its website last month provides the first acknowledgment that its relying on Googles public cloud for data storage for its iCloud services. The disclosure is fresh evidence that Googles cloud has been picking up usage as it looks to catch up with Amazon and Microsoft in the []


    Lessons in Cyber: Influence Operations "IndyWatch Feed Tech"

    Taking home the gold at Olympic IO

    International, and US, cyber wonks seem to have caught the influence op bug. Starting with the slow dawning awareness that PSYOPS can be conducted using New Media companies (Facebook, Twitter, Instagram, YouTube, etc.) the fascination with information/influence/psychological ops is exploding. Typically this is done with a hyperbolic discussion about the threat to liberal democracy represented by people lying on the Internet. Apparently the events in Ukraine (20142018) and the 2016 US election have finally reached critical mass and now every newly minted cyber expert is an information warfare specialist. Heads firmly stuck in the last lost war, they have just been caught slipping, again.

    Rather than rehash what I wrote about in 2016 and 2017, lets look at an influence operation that is happening in 2018. Russia, having been caught conducting PSYOPS against the US in 2016, is leaning in and now pushing to establish itself as a recognized cyber superpower. Although there is room for debate about how true that is across all dimensions of cyber power, there is little doubt that theyre firmly the masters of mind games.


    NanoCore's author didn't hack anyone, but he was imprisoned anyway "IndyWatch Feed Tech"

    33 months in prison for man found guilty of aiding and abetting online criminals by creating and selling the NanoCore RAT.


    CMS Made Simple 2.1.6 - Remote Code Execution "IndyWatch Feed Tech"

    Posted by displaymyname on Feb 26

    # Exploit Title: CMS Made Simple 2.1.6 - Remote Code Execution
    # Date: 2018-02-26
    # Exploit Author: Keerati T.
    # Vendor Homepage:
    # Software Link:
    # Version: 2.1.6
    # CVE: CVE-2018-7448
    # Tested on: Linux

    Arbitrary PHP code can be injected into configuration file (config.php) after installation has been finished. In order
    to inject...


    Form W-2 data thefts are rocketing, warns FBI "IndyWatch Feed Tech"

    Form W-2 data thefts are rocketing, warns FBI

    Businesses beware! Online criminals have ramped up their attempts to steal W-2 information from the finance and human resources departments of organisations, according to a warning issued by the FBI.

    Read more in my article on the Hot for Security blog.


    Distribution Release: ArchLabs 2018.02 "IndyWatch Feed Tech"

    ArchLabs is a rolling release distribution based on Arch Linux and featuring the Openbox window manager as the primary desktop interface. The project's latest release, ArchLabs 2018.02, features several small changes which streamline and improve the user experience. "Introducing ArchLabs Linux 2018.02. As usual we have a few....


    Asteroid mining: What is it? SpaceX Falcon Heavy could make it a reality "IndyWatch Feed Tech"

    ASTEROID mining may sound like science fiction but one astronomer believes it is getting closer to becoming a reality.


    Image: Hubble finds the calm after the galactic storm "IndyWatch Feed Tech"

    The NASA/ESA Hubble Space Telescope caught sight of a soft, diffuse-looking galaxy that is probably the aftermath of a long-ago galactic collision. Two spiral galaxies, each perhaps much like the Milky Way, swirled together for millions of years.

    In such mergers, the original galaxies are often stretched and pulled apart as they wrap around a common center of gravity. After a few back-and-forths, this starry tempest settles down into a new, round object. The now subdued celestial body, cataloged as SDSS J162702.56+432833.9, is technically known as an elliptical galaxy.

    When galaxies collidea common event in the universea fresh burst of star formation typically takes place as gas clouds mash together. At this point, the galaxy has a blue hue, but the color does not mean it is cold: it is a result of the intense heat of newly formed bluewhite stars. Those stars do not last long, and after a few billion years the reddish hues of aging, smaller stars dominate an s spectrum. Hubble has helped astronomers learn of this sequence by observing at all stages of the process.


    New shark species found in Atlantic Ocean "IndyWatch Feed Tech"

    The Atlantic sixgill shark, is different than its counterparts in the Indian and Pacific Oceans.

    : A team of scientists has identified a new shark species residing in the Atlantic Ocean.

    Using genetic testing, the study confirmed that the new species, named the Atlantic sixgill shark, is different than its counterparts in the Indian and Pacific Oceans.


    Kernel prepatch 4.16-rc3 "IndyWatch Feed Tech"

    The 4.16-rc3 kernel prepatch is out for testing. Linus says: "rc3 is larger than rc2 was, but as mentioned last week, that's expected - rc2 really was tiny. People have started finding things to fix, but there's nothing that really stands out as particularly scary here."


    SpaceX Joins in the Long History of Catching Stuff from Space "IndyWatch Feed Tech"

    On February 22nd, a Falcon 9 rocket lifted off from Vandenberg Air Force Base in California and successfully delivered into orbit an Earth-observation satellite operated by the Spanish company Hisdesat. Compared to the media coverage received by the launch of the Tesla-laden Falcon Heavy earlier in the month, this mission got very little attention. But thats hardly surprising. With respect to Hisdesat, the payload this time around was not terribly exciting, and even the normally dramatic landing of the Falcon 9s first stage was skipped in favor of simply allowing the booster to crash into the ocean.

    As far as SpaceX launches go, this one was about as low-key as they come. It wouldnt be a surprise if this is the first time some readers are even hearing about it. But while it didnt invoke the same media circus as the images of a spacesuit-wearing mannequin traveling into deep space, there was still a historic first performed during this mission.

    In an effort to increase the re-usability of the Falcon 9 booster, SpaceX attempted to catch the payload fairing (essentially a large protective nose cone) with a huge net as it fell from space. The most interesting thing about this new chapter in the quest for a fully reusable rocket system is...


    How to Use WSL Like a Linux Pro "IndyWatch Feed Tech"

    How to Use WSL Like a Linux Pro


    Samsung Proposes Session Management Protocol For Wayland "IndyWatch Feed Tech"

    Samsung OSG developer Mike Blumenkrantz is proposing a new Wayland protocol for dealing with session management behavior...


    U.S. law to Snoop on Citizens' Info Stored Abroad "IndyWatch Feed Tech"

    Original URL: US state legal supremos show lots of love for proposed CLOUD Act (a law to snoop on citizens' info stored abroad)

    The attorneys general of 35 US states on Wednesday signed an open letter calling for the quick passage of the Clarify Lawful Overseas Use of Data (CLOUD) Act with some qualifications.

    [...] In effect, it means the FBI can ask, say, a California court for a subpoena to obtain files from a San Francisco upstart's servers hosted in France, sidestepping French privacy laws and legal system. The act's wording also does not limit the Feds to serving orders for communications on US companies and entities agents would be able to demand information from whomever they wished, if a US judge approved.

    The draft law also allows foreign governments to ask for non-US-citizens' personal data stored in America, under new sharing agreements that would be worked out by the White House.

    The CLOUD Act was drawn up in part as a result of the ongoing court battle between Microsoft and US law enforcement: Uncle Sam wants a Microsoft customer's email messages stored on a Microsoft-run server in Ireland. The Feds went to a judge in New York for the information, but Redmond wants prosecutors to go to Ireland and ask an Irish judge for permission.

    Microsoft, essentially, is arguing that, because the data in question is stored on servers in Ireland, the g-men's request made under the 1986 US Stored Communications Act is invalid. The US Supreme Court will consider the case this year.

    [...] "The Act also creates incentives for our foreign partners to enter into bilateral agreements that will facilitate cross-border criminal investigations, while ensuring that privacy and civil liberties are respected."

    Original Submission

    Read more of this story at SoylentNews.


    Checking in With Alphabet Chair John Hennessy "IndyWatch Feed Tech"

    Heres what the Alphabet/Google chair and Stanford professor says about his new gig, "fake news," and the future of technology Photo: Gabriela Hasbun

    John Hennessy has had a busy month. The former president of Stanford University was just named chairman of the board for Alphabet, Googles parent company. And he just helped name the first class of 49 Knight-Hennessy scholars, his new program aimed at turning graduate students into leaders that will improve the world. (He called all of them personally to give them the newshe was that excited.)

    I caught up with Hennessy to find out a little more about how he plans to juggle his multiple roles, how Google can Do the right thing (as the companys new motto states), and his views on current hot-button issues in technology. Heres what he had to say.

    On taking on the chairmanship of Alphabet, and how it fits with his day job:

    How much time will Alphabet take? Hennessy says: Im planning to be down there once a monthtwice as much as before. [In order to do that] I will probably compress my schedule a little bit, Ill take some things off. Im finishing up a book on leadership that Ive been working on for the past year, so that will free some time. He will continue on as director of the Knight-Hennessy scholars program, and teaching will likely stay in the mix. At the moment, he says, Im teaching a graduate course on advanced multicore computer architectures.

    On not being evil, doing the right thing, and changing things for the positive:

    Google in recent years changed its company motto from Dont be evil to Do the right thing. The Knight-Hennessy scholars will Change things for the positive. Fine differences in meaning, to be sure, but different nonetheless. Hennessy explained his perspective on doing good and avoiding evil: The change from Dont be evil to Do the right thing, he says, was an attempt to push the company in the direction of using technology to do the right thing, thats more than just avoiding evil.

    For Google, sometimes that means the right answer is to change something. Sometimes its to make what you have better, he adds.

    Doing the right thing, Hennessy says, also means thinking about what will be good for both us...


    3D-printed live bacteria creates worlds first living tattoo "IndyWatch Feed Tech"

    This is the worlds first living tattoo made with real bacteria.


    6 Days Left to Submit a Proposal to Speak at LinuxCon + ContainerCon + CloudOpen China "IndyWatch Feed Tech"

    Submit a proposal to speak at LinuxCon + ContainerCon + CloudOpen China (LC3), taking place in Beijing this June 25 - 27, and share your expertise with 3,000+ open source technologists, executives and community members.


    Vulkan Is Now Available On macOS/iOS By MoltenVK Being Open-Sourced, Vulkan SDK for Mac "IndyWatch Feed Tech"

    Two years and a few days since the Vulkan 1.0 release is now marked by a new significant milestone for this cross-platform graphics/compute API... It's not a new Vulkan release today, but Vulkan is now available on Apple's iOS and macOS platforms! Here are the details with the embargo just expiring on Vulkan now on macOS/iOS but still without the official support from Apple.


    Is GDPR-regulated data lurking in unexpected pockets of your organization? "IndyWatch Feed Tech"

    A recent study showed that over 60 percent of corporate data is stored on employee endpoints. And yet, as companies work to ensure compliance with the new General Data Protection Regulation (GDPR), they still may be overlooking a few key areas. The GDPR globally impacts the processing of all personal data on EU residents and takes effect on May 25, 2018. The challenge is personal data doesnt just live in your customer relationship management (CRM) More


    VISA The adoption of chip-and-PIN card technology lead to 70% Drop in Counterfeit Fraud "IndyWatch Feed Tech"

    VISA The cases of counterfeit fraud had dropped by 70% in September 2017 compared to December 2015 thanks to the diffusion of the diffusion in the storefronts of payment systems for EMV cards.

    The introduction of chip-and-PIN card technology in the United States improved in a significant way the security of merchants and has reduced payment card fraud.

    The cases of counterfeit fraud had dropped by 70% in September 2017 compared to December 2015 thanks to the diffusion of the diffusion in the storefronts of payment systems for EMV cards.

    For merchants who have completed the chip upgrade, counterfeit fraud dollars
    EMV chip cards and chip-activated merchants combat counterfeit fraud in the U.S.
    December 2017 Visa Chip Card Update in September 2017 compared to December 2015 states VISA.

    The process started in 2011 with the introduction of EMV (Europay, MasterCard, Visa) card technology in the United States.

    The process was very slow, according to Visa, by September 2015, only roughly 392,000 merchants were accepting payment card using the new technology. at the same period, the number of Visa debit and credit cards using the EMV technology was only at 159 million.

    Now Visa has shared data related to the adoption of the EMV technology by December 2017. The number of storefronts that currently accept payments with chip cars has reached 2.7 million in the U.S. (+570%), representing 59% of the total.


    The number of Visa payment cards using EMV technology increased passed from 159 million to 481 million (202%), with 67% of Visa payment cards having chips.



    Global megatrends that are problematic for the state of cybersecurity "IndyWatch Feed Tech"

    The majority of senior-level IT professionals fully expect their organization will experience a catastrophic data breach that could greatly impact shareholder value, according to a study conducted by the Ponemon Institute. Is cybersecurity a strategic priority? (Yes responses) The 2018 Global Megatrends in Cybersecurity survey of 1,100 senior-level IT and IT security global practitioners also shows that despite growing threats, IT professionals believe cybersecurity is still not considered a strategic priority among senior leadership. Our More


    Scott Pruitt Cited the Bible to Defend his Oil-friendly Policies "IndyWatch Feed Tech"

    In a recent interview with the Christian Broadcasting Network, Scott Pruitt, EPA Chief, said that the Bible tells people to use all the resources available to us, including fossil fuels:
    "The biblical world view with respect to these issues is that we have a responsibility to manage and cultivate, harvest the natural resources that we've been blessed with to truly bless our fellow mankind".

    According to Vox: "But as far as his biblical assertion goes, Pruitt's words reflect a wider trend among American evangelicals, who largely have not embraced scientific thought on environmentalism or global warming."

    The Trump administration has used a variety of excuses to legitimize its record-setting rollbacks on environmental protections: calling global warming a hoax, or arguing that the economic consequences of increased regulation would outweigh their benefit.

    The latest justification? The Bible.

    In an interview with the Christian Broadcasting Network, a media outlet that also seems to double as a propaganda arm of the Trump administration, Environmental Protection Agency chief Scott Pruitt said his Christian convictions led him to conclude that America should use gas and coal freely because natural resources exist purely for man's benefit.

    [...] That's why evangelical groups have, therefore, been historically resistant to environmentalist causes. Creationist lobbying groups frequently fund initiatives like the Louisiana Science Education Act, which mandates a "balanced" (and climate change-denying) approach to teaching environmental issues in public schools.

    Please read the linked article as it explains the connection between contempt for science and protecting the environment and the beliefs of evangelicals.

    Original Submission

    Read more of this story at SoylentNews.


    How to protect Office 365 data from ransomware attacks "IndyWatch Feed Tech"

    Given the broad scope of services Microsoft Office 365 provides, its no surprise it has become one of the companys fastest growing revenue streams. Widespread popularity often breeds malicious activity, however, and Office 365 is no exception. Ransomware is growing at a mind boggling rate Cisco estimated a 350% year over year growth rate in their 2018 Annual Cybersecurity Report. Ransomware, in particular, has introduced significant risks for Office 365 users. Cerber ransomware, for More


    SecOps Spends Its Days Monitoring "IndyWatch Feed Tech"

    Developers, Security and Operations: DevSecOps. The operations part of the term usually refers to IT operations. However, today narrows in on SecOps, that work in security operations centers (SOCs) and cyber incident response teams (CIRTs).


    Re: [ANNOUNCE] CVE-2018-1286 - Apache OpenMeetings - Insufficient Access Controls "IndyWatch Feed Tech"

    Posted by Maxim Solodovnik on Feb 26

    Make sense,
    I'll change it in a moment :)


    Re: [ANNOUNCE] CVE-2018-1286 - Apache OpenMeetings - Insufficient Access Controls "IndyWatch Feed Tech"

    Posted by Sahil Dhar on Feb 26

    Hi Maxim,

    I got your point, however, the description seems to be stating that only

    CVE-2018-1286 - Apache OpenMeetings - Insufficient Access Controls
    Severity: Medium

    Vendor: The Apache Software Foundation

    *Versions Affected: Apache OpenMeetings 3.0.0*

    * Versions Affected: <= 4.0.1 (Corrected)*

    Description: CRUD operations on privileged users are not password protected
    allowing an...


    Re: [ANNOUNCE] CVE-2018-1286 - Apache OpenMeetings - Insufficient Access Controls "IndyWatch Feed Tech"

    Posted by Maxim Solodovnik on Feb 26

    I have analyzed the code
    Wysiwyg editor was introduced in 3.0.0
    and it was vulnerable from the very beginning
    So all versions are affected :(


    Researchers report the creation of Rydberg polarons in a Bose gas "IndyWatch Feed Tech"

    What is inside an atom between the nucleus and the electron? Usually there is nothing, but why could there not be other particles too? If the electron orbits the nucleus at a great distance, there is plenty of space in between for other atoms. A giant atom could be created, filled with ordinary atoms. All these atoms form a weak bond, creating a new, exotic state of matter at cold temperatures, referred to as Rydberg polarons.

    A team of researchers has now presented this state of matter in the journal Physical Review Letters. The theoretical work was done at TU Wien (Vienna) and Harvard University, the experiment was performed at Rice University in Houston (Texas).

    Two special fields of atomic physics, which can only be studied in extreme conditions, have been combined in this research project: Bose-Einstein condensates and Rydberg atoms. A Bose-Einstein condensate is a state of matter created by atoms at ultracold temperatures, close to absolute zero. Rydberg atoms are those in which one single electron is lifted into a highly excited state and orbits the nucleus at a very large distance.


    SpaceXs biggest rival has a genius plan to cut its rocket launch costs more than 70% "IndyWatch Feed Tech"

    United Launch Alliances upcoming Vulcan rocket will parachute its giant engines back to Earth for reuse, lowering launch costs to $100 million per mission.


    Re: [ANNOUNCE] CVE-2018-1286 - Apache OpenMeetings - Insufficient Access Controls "IndyWatch Feed Tech"

    Posted by Sahil Dhar on Feb 26

    Hi Maxim,

    I just noticed that there is a typo in the CVE-2018-1286 description, as it
    reported for 4.0.1 release. Can you please update it?

    ~ Sahil

    On Sun, Feb 25, 2018 at 5:20 PM, Maxim Solodovnik


    Canons newest mirrorless camera shoots 4K video "IndyWatch Feed Tech"

    The new $779 M50 is similar to the M5, but its got a new image processor, new RAW file format, a swivel screen, and more.


    Scientists successfully inverted the circularly propagating optical waves "IndyWatch Feed Tech"

    A new study has revealed that the optical waves or light waves can be turned upside down when they are allowed to propagate through specifically structured surfaces. Normally what happens is that the optical waves emerging out from a point source propagate circularly. That means the optical waves traveling away from a point source characteristically display circular, or convex, wavefronts.

    The scientists compared these circular wavefronts to the waves seen on the water surface when a stone is dropped into the water. But the latest study revealed that these circularly propagating light waves wavefronts can be turned upside down with the help of a special surface. They developed a new material having a hyperbolic metasurface and successfully inverted the optical waves.

    The study was led by Peining Li, an EU Marie Sklodowska-Curie fellow at nanoGUNE. According to him, the reason behind this circular propagation of optical waves is because of the fact that the medium through which light waves propagate is isotropic and homogenous. If the waves are isotropic in nature then their propagation is uniform in all direction and being homogenous means they carry the same characteristics throughout the propagation. But these optical waves can be inverted using specifically structured surfaces like the hyperbolic metasurfaces.


    Multiple vulnerabilities in Jenkins plugins "IndyWatch Feed Tech"

    Posted by Daniel Beck on Feb 26

    Jenkins is an open source automation server which enables developers around
    the world to reliably build, test, and deploy their software. The following
    releases contain fixes for security vulnerabilities:

    * Coverity Plugin 1.11.0
    * CppNCSS Plugin 1.2
    * Environment Injector Plugin 1.91
    * Gerrit Trigger Plugin 2.27.5
    * Git Plugin 3.8.0
    * Google Play Android Publisher Plugin 1.7
    * Job and Node ownership Plugin 0.12.0
    * Mercurial Plugin 2.3


    Moltoduino: Arduinos All the Way Down "IndyWatch Feed Tech"

    It is getting difficult to find a desktop or laptop computer with only a single CPU. Even a typical ARM-based computer now probably has multiple cores. Of course, theres nothing to stop you from using multiple microcontrollers like the Arduino together. To make the process neater, [Dimitris Platis] put together Moltoduino, essentially an Arduino on a shield made to plug into another Arduino. And, yes, they will stack. You can see a video about the open source boards, below.

    The key is how the board brings the pins out to connections that are easy to jumper between boards. There are several obvious use cases, but one that [Dimitris] is particularly interested in is hardware-in-the-loop testing. The idea is that you can use a simulated I/O device in one computer to exchange fake data with the software under test.

    For example, you might be working on a sous vide cooker that reads a temperature and controls a heater. A second computer could stand in for the temperature sensor and heater. You could log outputs and also control the inputs. This is really nice when you want to set up repeatable test cases.

    Of course, you dont have to stack the boards to make that work. In fact, you dont have to use another Arduino. A PC or some other controller could be the surrogate test device. But having it all in a stack is handy. There are several examples of doing testing using simulated hardware on the projects GitHub page. The test subjects are a robot car and an ultrasonic device.

    One neat feature is that each board has a switch to enable the master Arduino to ISP program it. So while you might not need to stack boards to use any of the proposed techniques, it does make for a nice and compact package.

    Usually, when we see a cluster it uses Raspberry Pis. Or, sometimes, PCs.


    Freedreno Is Looking Forward To Mesa SPIR-V/OpenCL Too "IndyWatch Feed Tech"

    There has been some interesting open-source GPU compute happenings in the works this year including SPIR-V support for Gallium3D Clover and Nouveau NIR support along with associated Mesa changes. Rob Clark of Red Hat and lead developer on the Freedreno driver has also jumped on board these recent Mesa compute initiatives...


    A Keen Sense For Molecules "IndyWatch Feed Tech"

    Arthur T Knackerbracket has found the following story:

    Laser physicists from the Laboratory of Attosecond Physics at the Ludwig-Maximilians-Universitt and the Max Planck Institute of Quantum Optics have developed an extremely powerful broadband infrared light source. This light source opens up a whole new range of opportunities in medicine, life science, and material analysis.

    Infrared light has a keen sense for molecules. With the help of this light, researchers are able to go in search of the small particles which shape and determine our lives. The phenomenon, in which infrared light sets molecules in vibration, is pivotal in this search. Scientists are exploiting this phenomenon by using infrared light to analyze the molecular makeup of samples.

    [...] In the hope that this analysis can become even more exact, the laser physicists from the Laboratory of Attosecond Physics (LAP) at the Ludwig-Maximilians-Universitt (LMU) in Munich and the Max Planck Institute of Quantum Optics (MPQ) have developed an infrared light source that has an enormously broad spectrum of wavelengths. This light source is the first of its kind worldwide and can be used to help detect the smallest amounts of molecules in liquids like blood.

    When infrared light encounters molecules, they begin to vibrate. In this process, each particular type of molecule is brought into motion by a very specific set of different wavelengths in the range from 3 to 20 micrometers.

    By examining the wavelengths of the light being emitted after this excitation, researchers are able to derive the molecular composition of the sample. The more powerful the source of infrared light and the more wavelengths utilized, the higher the chance of determining the sample composition, in for example breath or blood.

    Original Submission

    Read more of this story at SoylentNews.


    LLVM 6.0 Release Candidate 3 Arrives As The Official Release Nears "IndyWatch Feed Tech"

    The third release candidate is available today of LLVM 6.0 and its associated components like Clang, Compiler-RT, libc++, LLDB, etc...


    Jolla Working To Ship Sailfish OS 3.0 This Year "IndyWatch Feed Tech"

    Jolla is talking up Sailfish OS 3.0 this week at the Embedded World conference as the "next-generation of the independent mobile operating system" and plans to ship it this calendar year...


    GNU Automake 1.16 Preps For More Changes Ahead Of Automake 2.0 "IndyWatch Feed Tech"

    While Meson+Ninja remains all the hype these days when it comes to open-source build systems, the GNU build system isn't going away any time soon and a key component of that was just updated, Automake 1.16...


    Pyeongchang Russias GRU military intelligence agency hacked Olympics Computers "IndyWatch Feed Tech"

    Pyeongchang Russias GRU military intelligence agency hacked Olympics Computers conducted a false flag operation to make it appear the attack originated in North Korea.

    On February 9, shortly before the Pyeongchang opening ceremonies on Friday, televisions at the main press centre, wifi at the Olympic Stadium and the official website were taken down.

    According to The Washington Post, the incidents were caused by cyber attacks powered by hackers working at Russias GRU military intelligence agency that managed to take control in early February of 300 computers linked to the Olympic organization.

    The cyber attacks were a retaliation against the International Olympic Committee for banning the Russian team from the Winter Games due to doping cases of Russian athletes.

    Analysts surmise the disruption was retaliation against the International Olympic Committee for banning the Russian team from the Winter Games due to doping violations. No officials from Russias Olympic federation were allowed to attend, and while some athletes were permitted to compete under the designation Olympic Athletes from Russia, they were unable to display the Russian flag on their uniforms and, if they won medals, their countrys anthem was not played. reported The Washington Post.

    As of early February, the Russian military agency GRU had access to as many as 300 Olympic-related computers, according to an intelligence report this month.

    The Office of the Director of National Intelligence declined to comment.

    Pyeongchang Olympic Games

    The cyber attacks caused severe problems to the Olympic organization, many attendees were unable to print their tickets for the ceremony and were not...


    How Compilers Work "IndyWatch Feed Tech"

    Compilers translate source code into executable programs and libraries. Inside modern compiler suites, a multistage process analyzes the source code, points out errors, generates intermediate code and tables, rearranges a large amount of data, and adapts the code to the target processor.


    Week ahead: House to vote on controversial online sex trafficking bill "IndyWatch Feed Tech"

    The House is expected to vote in the coming week on legislation aimed at cracking down on sex trafficking online.The bill is sparking concern from the tech industry, which worries that a proposed change could make web companies liable for...


    Linux 4.16-rc3 Released With "Small Changes All Over" "IndyWatch Feed Tech"

    Linus Torvalds released Linux 4.16-rc3 on Sunday night and overall it was another routine update towards stabilizing the Linux 4.16 kernel...


    Conan Package Manager Brings C and C++ to DevOps "IndyWatch Feed Tech"

    Conan, a distributed, open source package and dependency manager, promises to bring C and C++ into devops.

    The multiplatform package manager builds and shares native binaries. Conan lets you quickly create builds, port packages, and run them on different operating systems...

    While intended for C and C++, Conan can manage builds from source, dependencies, and precompiled binaries for any language. 


    Japan Approves Single-Dose Flu Treatment "IndyWatch Feed Tech"

    As Americans suffer through the worst influenza outbreak in almost a decade, a Japanese drugmaker says it has developed a pill that can kill the virus within a day. But even if the experimental drug lives up to the claim, it likely won't be available in the U.S. until next year at the earliest.

    A late-stage trial on Japanese and American flu patients found that for the people who took the Shionogi 4507 1.41% & Co. compound, the median time taken to wipe out the virus was 24 hours. That is much quicker than any other flu drug on the market, including Roche AG's RHHBY -0.34% Tamiflu, which the trial showed took three times longer to achieve the same result. Quickly killing the virus could reduce its contagious effects, Shionogi said.

    Also, Shionogi's experimental drug requires only a single dose, while patients need to take two doses of Tamiflu a day, for five days.

    Both Shionogi's compound and Tamiflu take roughly the same amount of time to entirely contain flu symptoms, but Shionogi says its compound provides immediate relief faster.

    Original Submission

    Read more of this story at SoylentNews.


    2,844 Separate Data Breaches (unverified) - 80,115,532 breached accounts "IndyWatch Feed Tech"

    In February 2018, a massive collection of almost 3,000 alleged data breaches was found online. Whilst some of the data had previously been seen in Have I Been Pwned, 2,844 of the files consisting of more than 80 million unique email addresses had not previously been seen. Each file contained both an email address and plain text password and were consequently loaded as a single "unverified" data breach.


    Why Open Source Could be IBM's Key to Future Success in the Cloud "IndyWatch Feed Tech"

    Ask most developers what they think of IBM and you'll get a blank stare in response. "IB-who?" In our brave new cloud world, IBMonce so imperious with CIO golf calendarsis generally an afterthought for developers looking to deploy to the cloud. And yet there remain good reasons to consider Big Blue, especially for enterprises that have significant investments in IBM.


    Deep learning for biology "IndyWatch Feed Tech"

    Finkbeiners success highlights how deep learning, one of the most promising branches of artificial intelligence (AI), is making inroads in biology. The algorithms are already infiltrating modern life in smartphones, smart speakers and self-driving cars. In biology, deep-learning algorithms dive into data in ways that humans cant, detecting features that might otherwise be impossible to catch. Researchers are using the algorithms to classify cellular images, make genomic connections, advance drug discovery and even find links across different data types, from genomics and imaging to electronic medical records.

    A popular artificial-intelligence method provides a powerful tool for surveying and classifying biological data. But for the uninitiated, the technology poses significant difficulties.


    US Patent Courts Gravitate Towards Patent Justice Rather Than Patent Maximalism "IndyWatch Feed Tech"

    Less focus on the flow of money (between lawyers) and more focus on science and technology

    A gaol

    Summary: The rational approach adopted by the US courts, all the way down from the Supreme Court to Sharon Prost of the Federal Circuit (CAFC), means that technology companies can finally focus on actual work and pay less to a bunch of lawyers

    THE court system in the United States isnt exactly renowned for justice (thats a gaol at the top; the US has actual market demand for prisoners as jails are run like proper, for-profit businesses). The USPTO too has a certain demand, which explains why many low-quality patents have been issued. Its difficult to say the same thing about patent courts however. Theyre not so demand-driven and their success is measured by criteria like the number of times their decisions are overturned.

    The Court of Appeals for the Federal Circuit (CAFC) saw many decisions it had made (under the disgraced chief judge Rader) being overturned by the Supreme Court. It appears to have decided to change that under Sharon Prost. CAFC is now a lot better. Just days ago it once again rebuked the disgraced judge Gilstrap.

    Very good. Another case of Alice thwarting bad patents.

    CAFC has come under attack from patent extremists, such as Watchtroll, who went as far as to call/ask judges to step down after they had ruled against software patents. This is ridiculous, but thats how much respect those people have for judges. Watch what Dennis Crouch did some days ago.

    Here we have a new article from the patent microcosm portraying CAFC as unreasonable just because its efficient. To quote:



    Order Drinks With Your Mind "IndyWatch Feed Tech"

    Barbots are a popular project around these parts. With a few pumps and a microcontroller or two, its possible to build something that can approximate mixing a drink. If youve got the patience and attention to detail, you can probably even get it to the point where it doesnt just end up as a leaking wet mess on your mantlepiece. [Robert] has taken his build a step further by adding mind control.

    To achieve this feat, a Mindflex EEG headset is pressed into service. This picks up brainwaves from the user, and processes them into two output values of concentration and meditation. Through some careful hacking, its possible to retrieve these values. [Robert] sends the values over Bluetooth to the barbot controller for processing. Concentration values over a certain threshold are used to cycle through the drink selection, while meditation values are used to confirm the order. Once its made, a voice command to hit me will see the drink served.

    Its a tidy build that adds a bit of fun to an already cool project. Wed love to see this taken up several levels of complexity to the point where you can directly order the drink you want, just by the power of thought. If your university-grade research project is at that level, be sure to let us know. Else, if youre interested in how the barbot came to be, check out [Robert]s earlier work.



    How Facebook Rewards Provocative Ads "IndyWatch Feed Tech"

    Antonio Garca Martnez at Wired writes about the effects of scaled pricing based on algorithms in Facebook's advertisement auction. Just buying advertisements in the auction does not guarantee that the ads get through to the target audience so the "clickbaitiness" of the ad is estimated by algorithms which adjust the price. Ads estimated to be "clickbaity" by the algorithm get lower prices so more can be purchased with the same money. The more problematic the ad, the more cost effective it is for the buyer.

    A canny marketer with really engaging (or outraging) content can goose their effective purchasing power at the ads auction, piggybacking on Facebook's estimation of their clickbaitiness to win many more auctions (for the same or less money) than an unengaging competitor. That's why, if you've noticed a News Feed ad that's pulling out all the stops (via provocative stock photography or other gimcrackery) to get you to click on it, it's partly because the advertiser is aiming to pump up their engagement levels and increase their exposure, all without paying any more money.

    During the run-up to the election, the Trump and Clinton campaigns bid ruthlessly for the same online real estate in front of the same swing-state voters. But because Trump used provocative content to stoke social media buzz, and he was better able to drive likes, comments, and shares than Clinton, his bids received a boost from Facebook's click model, effectively winning him more media for less money. In essence, Clinton was paying Manhattan prices for the square footage on your smartphone's screen, while Trump was paying Detroit prices. Facebook users in swing states who felt Trump had taken over their news feeds may not have been hallucinating.

    Thus the advertisement auction algorithms themselves were yet another major factor in the results of the 2016 US election.

    See also: Trump and the weird attention economy of Facebook

    Original Submission

    Read more of this story at SoylentNews.


    [SECURITY] [DSA 4123-1] drupal7 security update "IndyWatch Feed Tech"

    Posted by Moritz Muehlenhoff on Feb 26

    Debian Security Advisory DSA-4123-1 security () debian org Moritz Muehlenhoff
    February 24, 2018

    Package : drupal7
    CVE ID : not yet available
    Debian Bug :...


    Android P Will Block Background Apps from Accessing Your Camera, Microphone "IndyWatch Feed Tech"

    Yes, your smartphone is spying on you. But, the real question is, should you care? We have published thousands of articles on The Hacker News, warning how any mobile app can turn your smartphone into a bugging device'Facebook is listening to your conversations', 'Stealing Passwords Using SmartPhone Sensors', 'Your Headphones Can Spy On You' and 'Android Malware Found Spying Military


    Pirate Site Operators Jail Sentences Overturned By Court of Appeal "IndyWatch Feed Tech"

    With The Pirate Bay proving to be somewhat of an elusive and irritating target, in 2014 police took on a site capturing an increasing portion of the Swedish pirate market.

    Unlike The Pirate Bay which uses torrents, Dreamfilm was a portal for streaming content and it quickly grew alongside the now-defunct Swefilmer to dominate the local illicit in-browser viewing sector. But after impressive growth, things came to a sudden halt.

    In January 2015, Dreamfilm announced that the site would be shut down after one of its administrators was detained by the authorities and interrogated. A month later, several more Sweden-based sites went down including the countrys second largest torrent site Tankefetast, torrent site PirateHub, and streaming portal Tankefetast Play (TFPlay).

    Anti-piracy group Rights Alliance described the four-site networks as one of Europes leading players for illegal file sharing and streaming.

    Image published by Dreamfilm after the raiddreamfilm

    After admitting theyd been involved in the sites but insisting theyd committed no crimes, last year four men aged between 21 and 31-years-old appeared in court charged with copyright infringement. It didnt go well.

    The Linkping District Court found them guilty and decided they should all go to prison, with the then 23-year-old founder receiving the harshest sentence of 10 months, a member of the Pirate Party who reportedly handled advertising receiving 8 months, and two others getting six months each. On top, they were ordered to pay damages of SEK 1,000,000 ($122,330) to film industry plaintiffs.

    Like many similar cases in Sweden, the case went to appeal and late last week the court handed down its decision which amends the earlier decision in several ways.

    Firstly, the Hovrtten (Court of Appeals) agreed that with the District Courts ruling that the defendants had used,, and as platforms to deliver movies stored on Russian servers to the public.

    One defendant owned the domains, another worked as a site supervisor, while the other pair worked as a programmer and in server acquisition, the Court said.

    Dagens Juridik reports that the defendants argued that the websites were not a prerequisite for people to access the films, and therefore they had not been...


    Asking Jesus "IndyWatch Feed Tech"

    This is an important insight that I need to share with everyone.

    To start with, those following my efforts, know that we now understand that all life and each of us is operated by a spirit body that is physical and formed from second tier matter scaled at the level of the electron. Thus our subconsious is our in house spirit body having a conversation through our third tier physical body that the spirit body operates like a machine.  The information density of this spirit body is millions of times greater that possible for our chemical systems in our cells.

    The take home though is really simple.  We are all immortal spirit bodies first.  The Soul is our pattern or blueprint to be improved and all that.

    What this means though is that we are part of a community of spirits and that when we wittingly or unwittingly query that community for information,our inablity to identify the informant  is a serious liability.  It is not just dumb old uncle charlie that we can run into but seriously bad twisted actors as well.   Our best defense is careful rational thought and this recognition.

    That is the background to this item and why i am sharing this additional insight.  It is clear that it is difficult to directly communicate with God per se when we are really dealing with GOD more tied to the intent of the universe than our individual needs.  This is where understanding the role of Jesus becomes important. Having been human he can stand in as GOD's will or intent at our level of understanding and most important Jesus can be trusted.

    Thus when we do query the spirit world in prayer or meditation it is safest to pass through Jesus in order to protect from unfreindly intermediaries.  This can surely be extended to his pan...


    Data Keeper Ransomware An unusual and complex Ransom-as-a-Service platform "IndyWatch Feed Tech"

    The Data Keeper Ransomware that infected systems in the wild was generated by a new Ransomware-as-a-Service (RaaS) service that appeared in the underground recently.

    A few days ago a new Ransomware-as-a-Service (RaaS) service appeared in the underground, now samples of the malware, dubbed Data Keeper Ransomware, generated with the platforms are have already been spotted in the wild.

    The Data Keeper ransomware was discovered by researchers at Bleeping Computer last week.

    The service launched on February 12 but didnt actually come online until February 20, and by February 22, security researchers were already reporting seeing the first victims complaining of getting infected. reads the blog post published by Bleeping Computer.

    Anyone can sign up for the RaaS service and activate his account for free and create their samples of the ransomware.

    The ransomware encrypted the files with a dual AES and RSA-4096 algorithm, it also attempts to encrypt all networks shares. Once the files are encrypted, the malicious code will place a ransom note (!!! ##### === ReadMe === ##### !!!.htm) in each folder it will encrypt files.

    The operators behind the Data Keeper RaaS request their users to generate their samples and distribute them, in turn, they offer a share of the ransom fee when victims pay the ransom. It is not clear the percentage of the ransom that is offered to the user.

    Affiliates just need to provide the address of their Bitcoin wallet, generate the encryptor binary, and download the malware along with a sample decrypter.



    With PTABs Growing Role in Assessing Patent Applications, Pursuing Software Patents is a Dangerous Gamble "IndyWatch Feed Tech"

    An unseen Hawaii

    Summary: With 101 increasingly being enforced by PTAB both before and after a patent grant as recent trends serve to suggest the whole strategy of pursuing low-quality software patents in high quantities looks like a misguided one

    THE Patent Trial & Appeal Board (PTAB), which improves patent quality at the USPTO, is loathed by patent maximalists. Low-quality patents mean business to them; more lawsuits, more applications, more threatening letters to dispatch and so on

    Scott McKeown, writing for his firm of patent maximalists, is cherry-picking PTAB cases in an attempt to influence Oil States and sabotage PTAB. Watch his 5 picks and how these relate to Oil States:

    With so much attention being paid to Oil States, it was easy to lose sight of many of the more noteworthy Patent Trial & Appeal Board (PTAB) related decisions of 2017. Last year brought significant feedback from both the Federal Circuit and Board on a number important aspects of administrative trial practice. From important issues of appellate standing, the use of ancillary petition art, to a crack down on follow-on petitions and recycled prior art, both the Board and Federal Circuit delivered a host of critical clarifications.

    The reality of the matter is, the Federal Circuit continues to agree with the Board and almost always rejected software patents last year. 2017 was a nightmare year for patent maximalists, so these people (like Scott McKeown) now pray for Oil States to cause PTAB to collapse. But worry not, that wont happen. Their lobby is losing momentum and Watchtroll, for example, barely managed to squeeze out any anti-PTAB articles this past week. Watchtroll wrote about thwarting PTAB IPRs a few days ago, but thats about it.

    Other PTAB bashers, like those who are connected to literal patent trolls, ranted a little less than usual. Once again,...


    Here Comes The Yield Shock---The Beltway Borrowers Are Going Berserk "IndyWatch Feed Tech"

    This makes for sobering reading.  Worse it is were a miscall can produce real damage.  And I am seeing such miscalls taking place here and there and in Canada in particular, but only because i am watching that closely.  the mind set is the same in the USA. 

    Are we really understanding California and New York?

    The USA needs to desperately unleash  a housing boom and Trump needs to massively reform the USA government which he has thankfully begun, but begun only.  All this needs to be wrapped around ending poverty before our civilization crumbles and starts shedding the living..

    Here Comes The Yield Shock---The Beltway Borrowers Are Going Berserk

    By David Stockman. Posted On Thursday, February 8th, 2018

    You can say this for the swamp creatures: Their gall knows no limits.

    Apparently, the two government lifers running the US Senate----Mitch McConnell and Chuck Schumer (hereafter "Mitchels & Chuckles")----have reached a deal to bust the already red-ink soaked budget by $400 billion over the next two years and by upwards of $3.5 trillion over a decade. 

    Consequently, bond yields have continued their upward march.

    While the above yield surge is surely not surprising, here's the galling part. Mitchels & Chuckles christened their baleful deal: "The Government Shutdown Prevention Act".


    Trump -- Middle American Radical "IndyWatch Feed Tech"

    This is a valid label and certainly one that describes my leanings as well.  The classic labels siply do not apply when they have been hijacked by academics with their own clostured axe to grind.

    We are experincing a full on assault against the progressive vision which is actually Fascism revisited or its twin sister Communism.  That it could even become sufficintly emergent as to be seen is a surprise in itself.  You would think decisive defeat after defeat would cure this follyfrom our body politic, but the problem has been a lack of a considered counter philosophy based on foundational economics which is the real false claim of marxism. 

    It has been my position that the true test of such a theory is its natural ability to end poverty itself.  In that spirit i have worked out a promising protocol that demands both testing and evolution as well in order to roll out globally.  Yet ending poverty secures the  freedom of all citizens while freeing capitalism to exploit opportunity provided by organization without the threat of credit exploitation which we experience through monopoly building. 

    Trump -- Middle American Radical

    By Patrick J. Buchanan
    February 9, 2018

    President Trump is the leader of Americas conservative party.

    Yet not even his allies would describe him as a conservative in the tradition of Robert Taft, Russell Kirk...


    New Tesla Model 3 Battery Line Could Increase Output By Factor Of 4 "IndyWatch Feed Tech"

    However you wish to look at it, the EV will now match the long established ICE in terms of cost.  Thus global expansion has become plausible and can be expected to roll out during the next five years.  Tooling isobviously reasy as well.

    The economic advantage can now be expected to steadily shift in favor of the EV.  Inasmuch as surge oil production is unsustainable, this is actually well timed.

    Thus by 2025, expect to pay a significant premium for an ICE and also expect to see leasing become strictly EV.  Longer life spans alone will  power that as EV's can charge out lower leasising prices.

    New Tesla Model 3 Battery Line Could Increase Output By Factor Of 4

    16 hours ago by Eric Loveday 55

    Gigafactory Cell Production

    It will arrive in March, if everything works out as planned.

    Tesla Model 3 Dash Install

    One of the overlooked takeaways from the recent Tesla earnings call was connected to automation in battery module production.

    Following the call, we stated: 

    Regarding Model 3 production bottlenecks, battery module production is still the focus for near-term improvements. A new automated system for two of the four zones is nearing completion in Germany. It needs to be disassembled, shipped, then reassembled at the Gigafactory (its expected to arrive in March). This one line should be as productive as three to four of the lines they currently have and take up less physical space. They also have a semi-automatic line, which involves people working with the machines. It has been, Musk said, remarkably effective, and is exceeding the purely automatic...


    Rahul Rastogi, Senior Developer at Standard Chartered Bank, joins our New Money Systems Board. "IndyWatch Feed Tech"

    Rahul Rastogi, Senior Developer at Standard Chartered Bank, joins our New Money Systems Board. Rahul Rastogi, Senior Developer at Standard Chartered Bank, joins our New Money Systems Board.


    Top 10 Most Pirated Movies of The Week on BitTorrent 02/26/18 "IndyWatch Feed Tech"

    This week we have two newcomers in our chart.

    Justice League is the most downloaded movie.

    The data for our weekly download chart is estimated by TorrentFreak, and is for informational and educational reference only. All the movies in the list are Web-DL/Webrip/HDRip/BDrip/DVDrip unless stated otherwise.

    RSS feed for the weekly movie download chart.

    This weeks most downloaded movies are:
    Movie Rank Rank last week Movie name IMDb Rating / Trailer
    Most downloaded movies via torrents
    1 (1) Justice League 7.1 / trailer
    2 (2) Thor Ragnarok 8.1 / trailer
    3 () Black Panther (HDTS) 7.9 / trailer
    4 (5) The Shape of Water (DVDScr) 8.0 /...


    Worldwide Smartphone Shipments Slip For First Time Ever "IndyWatch Feed Tech"

    Arthur T Knackerbracket has found the following story:

    The global smartphone market is shrinking for the first time as choosey buyers in emerging markets hang on to their mobiles for longer.

    In Gartner's Q4 sales stats, Samsung maintained a narrow lead in global volume shipments of smartphones but every major (top five) vendor outside of those based in China saw unit shipments slip.

    Some 407.84 million handsets found a new home in the quarter, equating to a 5.6 per cent slide or 24.29 million fewer phones sold than the prior year.

    Several major factors caused the market shrinkage, said Anshul Gupta, research director at Gartner. "First, upgrades from feature phones to smartphones have slowed right down due to a lack of quality 'ultra-low-cost' smartphones and users preferring to buy quality feature phones.

    "Second, replacement smartphone users are choosing quality models and keeping them longer, lengthening the replacement cycle of smartphones. Moreover, while demand for high quality, 4G connectivity and better camera features remained strong, high expectations and few incremental benefits during replacement weakened smartphone sales," Gupta added.

    This is a characteristic of the emerging markets, where all the action is not mature markets like the UK or USA.

    Original Submission

    Read more of this story at SoylentNews.


    Artificial Intelligence is Just Software, So EFF Misses the Point/Reason Why USPTO Should Reject Such Patents "IndyWatch Feed Tech"

    Its about Alice, not just public interest

    20 Buzzwords you have to know in Artificial Intelligence
    Reference: 20 Buzzwords you have to know in Artificial Intelligence

    Summary: The recent hype about Artificial Intelligence (AI) hype that further dominated the media over the past couple of months spurred a response from the Electronic Frontier Foundation (EFF), which could probably make a stronger argument against software patents that are being labeled "AI"

    THE Manual of Patent Examining Procedure (MPEP) at the USPTO is noteworthy. Examiners should no longer grant software patents, no matter how patent attorneys attempt to disguise these. In Europe, for example, EPO examiners see all sorts of software patent applications (or categories) with buzzwords like 4IR.

    No indication yet of anything related to Alice, which remains in tact and in force under Section 101.

    In the meantime, the EFFs Vera Ranieri...


    Marketing and Lobbying Disguised as Articles and Microsoft-Connected Firms That Promote Software Patents and a Microsoft Racket "IndyWatch Feed Tech"

    Stop SPAM

    Summary: More of the usual spam thats tailor-made to look like reporting or advice; the Microsoft connection to some of the latest patent lobbying is also noted

    TECHRIGHTS habitually calls out or exposes sites that are paid to promote an agenda (the EPO does this a lot). It also names and shames companies that participate in this, not to mention so-called news sites that are just posting as news pure PR, shallowly dressed up as articles.

    An app is just a buzzword for software, so this article basically promotes software patents (which is a terrible idea, theyre worthless).Several days ago CBR published this article titled Patenting your app: Everything you need to know (sounds like something introductory, but its not).

    An app is just a buzzword for software, so this article basically promotes software patents (which is a terrible idea, theyre worthless). It uses very basic language (like a marketing brochure with generic language) and watch who wrote it. Pure marketing disguised as news by John Paul Rooney, partner and patent attorney at Withers & Rogers.

    Has CBR sunk this low? Might as well post that under the spam or advertisements section. Its just misinformation intended to spur sales.

    Might as well post that under the spam or advertisements section. Its just misinformation intended to spur sales.Sadly, CBR is far from the only site doing so. Watchtroll, where about a quarter of all posts are press releases (or paid-for marketing), is now posting Microsoft marketing as articles. Truly pathetic. Who next? Monsanto maybe? There are Windows- and Microsoft-aligned sites that glorify Microsoft patents every single day (heres a new example), but seeing Watchtroll participating in it says a lot about Watchtroll.

    Speaking of Microsoft, Aar...


    Mechanical Clocks that Never Need Winding "IndyWatch Feed Tech"

    What is it about mechanical clocks? Maybe its the gears, or the soft tick-tocking that they make? Or maybe its the pursuit of implausible mechanical perfection. Combine mechanical clocks with free energy harvested from daily temperature and pressure variation, and were hooked.

    Both the Beverly Clock, built by Arthur Beverly in 1864, and the Atmos series of clocks built between 1929 and 1939, run exclusively on the expansion and contraction of a volume of air (Beverly) or ethyl chloride (Atmos) over the day to wind up the clock via a ratchet. The Beverly Clock was apparently a one-off, and its still running today. And with over 500,000 Atmos clocks produced, there must be some out there.

    Although we had never heard of it, this basic idea is really old. Clicking through Wikipedia (like you do!) got us to Coxs Timepiece, which is powered by the movement of 68 kg of mecury under atmospheric pressure. It is currently not running, but housed in the Victoria and Albert Museum in London. Even older is a clock that we couldnt find any info on that dates from 1620, invented by Cornelius Drebbel. Anyone know anything?

    Weve had energy harvesting on our mind lately, and the article on the Beverly Clock says that it gets 31 Wh over a day when the temperature swings by 3.3 C. Put into microcontroller perspective, this is 0.39 A at 3.3 V, so youll have to be pretty careful about your sleep modes, and an LED is out of the question. How amazing is it, then, that this can power a mechanical clock?

    Thanks [Luke], [hex4def6], and [Wallace Owen] for tipping us off to these in the comment section!


    Hype and Buzzwords Help Disguise Software Patents in the United States, But PTAB Discards Them Regardless "IndyWatch Feed Tech"

    Trying to make algorithms sound a lot more complicated and sophisticated than they really are

    The hype

    Summary: Using hype and relying on the notion that novelty is implied from fashionable IT trends (like cloud, AI and so on), companies continue to receive software patents, but what happens when closer/stronger scrutiny is applied?

    ANY time the USPTO grants a software patent it makes us curious; such patents are noteworthy because these are almost never described as software patents. They use buzzwords and misleading terms (the EPO does the same, e.g. with words like ICT, CII and 4IR). We have repeatedly named some of the buzzwords that are commonly used in the US. Examiners need to watch out and wise up; dont be taken for fools by attorneys.

    Software patents (per se or as such) are globally shunned, but they are now formally allowed in China. Not only are these patents counterproductive; they actively harm innovation. But in China, like in the US, the blockchain hype is being exploited to patent algorithms. As one article has just put it:

    Apparently, Bank of China, one of the most important commercial banks in the country and the fourth largest, has the intention to work on a solution to scale blockchain systems. The bank has filed a patent application for this process that may help blockchains to scale.

    Software patents. A rose by any other name would smell as sweet

    Heres another new example where software patents are being painted as drones. The key admission:

    Weve effectively made a $1,200 piece of hardware perform like something costing 50 times as much, simply because of our patented software driving the UAS. No one else is doing anything like this, he says.

    So its software. No...


    Allergan/Mohawk Sovereign Immunity Patent Scam (Dodging PTAB) Backfires Spectacularly "IndyWatch Feed Tech"

    What were they thinking anyway?

    Tired man

    Summary: After months of scandals and very negative publicity the so-called scam that the Mohawk tribe participated in falls over, leaving all parties bruised and their reputation tarnished

    THE Allergan/Mohawk scandal is well documented. It has been covered to death all over the Web (even corporate/mainstream media) and we wrote nearly 10 articles about it (heres one among many posts of ours). The USPTO should, in principle, be able to reassess patents it may have wrongly granted, but (mis)using tribal immunity Allergan is attempting to prevent that from happening. A crooked lawyer hired by the Mohawk tribe (speaking at events of Koch-run think tanks) seems to have taken the tribe for a ride and for a few millions in payoff the tribe now suffers a reputation crisis. By extension, this makes tribal immunity seem like a tangent of misuse. What a disaster. What an injustice.

    Right now the patent trolls are talking among themselves about the latest in the case, which is basically late Friday news and thus scarcely covered anywhere.

    A troll wrote: BIG NEWS: PTAB rules against sovereign immunity defense in Allergan Upon consideration of the record, and for the reasons discussed below, we determine the Tribe has not established that the doctrine of tribal sovereign immunity should be applied to these proceedings.

    Very good, I responded, but the Mohawk [tribe] stained its name with this patent scam

    Shortly thereafter his employer, the troll Dominion Harbor, wrote that Sovereign Immunity dead on arrival at the PTAB: proceedings can continue even without the Tribes participation in view of Allergans retained ownership interests in the challenged patents. The Tribes Motion is therefore denied.

    Hours ago the trolls apologists/proponents from Bristows...


    CDC Plans New Atlanta High Containment Lab "IndyWatch Feed Tech"

    A new CDC lab will cost up to $480 million:

    The Atlanta-based Centers for Disease Control and Prevention says it needs to replace its aging high containment lab, which handles some of the world's most dangerous contagions.

    The project would cost $350 million to build. But over three years, the total budget could reach $480 million, also funding campus infrastructure improvements, such as extending utility tunnels to support the new lab. The CDC is in the early stages of asking Congress for the funds.

    In its current "high containment lab" (HCL), the CDC develops and performs diagnostic tests for the deadliest disease threats, including emerging influenza viruses and viral hemorrhagic fevers such as Ebola and Lassa fever.

    [...] Without investment, the CDC's current lab will be left with only a fraction of its current research space and the agency will fall behind in protecting, defending and responding to infectious disease threats. In the next few years, it faces a risk of an unplanned and potentially catastrophic shutdown.

    Meanwhile, a CDC employee has been missing since he called in sick from work.

    Also at Time.

    Original Submission

    Read more of this story at SoylentNews.


    PTAB Continues to Enforce Section 101 and New Paper From Christopher Walker and Melissa Wasserman Has Suggestions for Agency Head Review "IndyWatch Feed Tech"

    The New World of Agency Adjudication

    Summary: Despite endless attempts to undermine PTAB, its work carries on, invalidation of abstract patents continues unabated, and academics who are not patent maximalists (or in bed with the patent industry) offer constructive advice

    The Patent Trial & Appeal Board (PTAB) of the United States Patent and Trademark Office (USPTO) continues to improve patent quality. To say that PTAB has had an impact would an understatement. The EPO is kicking to the curb its equivalent of PTAB, whereas in the US the role of PTAB grows over time (all-time record last year).

    As one might expect, patent maximalists arent happy about it, to say the least.Over the past week weve witnessed many new examples where PTAB and patent examiners squashed applications using Section 101 (here are three new examples with links to the corresponding decisions [1, 2, 3]).

    As one might expect, patent maximalists arent happy about it, to say the least. Recently, when a rejection was affirmed by PTAB citing laws of nature Patently-O decided to make a big deal out of it, writing not one but several posts about it [1, 2]. To quote:

    In its original decision, the PTAB affirmed an examiner rejection finding the claim ineligible as directed toward a natural phenomenon. However, the patentee requested a rehearing arguing that the PTAB had failed to properly identify the natural phenomenon being claimed. On reharing though, the PTAB reaffirmed the decision of no patentable subject matter.

    In its analysis, the Board first noted that the claims are not directed toward any transformation of the isolated DNA, but rather simply detecting its parts. We know from prior cases that isolated DNA remains a product of nature (Myriad) and that detecting DNA sequence is also a phenomenon of nature (Ariosa).




    One Month Later the Patent Industry is Still Promoting the Lie That GUIs Are Software and Thus CAFC Elevated Software Patents "IndyWatch Feed Tech"

    Even courts in China reject GUI patents

    How on Earth are such simple GUIs being patented as though they are inventions?

    Summary: Revisiting (with revisionism) Core Wireless Licensing S.A.R.L. v LG Electronics, Inc. et al., the patent industry is attempting to paint the decision as something that its not (GUIs are designs, not code)

    THE breadth of USPTO patents isnt too encouraging and isnt sufficiently strict. Design patents, for example, have long earned negative publicity for patents [1, 2]. Theyre widely seen as too vague and unoriginal; they have attracted a lot of negative press coverage.

    Theyre widely seen as too vague and unoriginal; they have attracted a lot of negative press coverage.On January 30th Sterne Kessler Goldstein & Fox PLLC published Design Patents Continue to Show Survival Strength at the PTAB: Institution Rates Remain Lowest Among All Technology Categories and Well Below 50%. Its not particularly surprising as many of the patents targeted by PTAB (or the petitioners at PTAB) are software patents. But that still begs for an answer; Why does the US cling onto design patents so hard? Days ago the Docker Navigator said that a court denied plaintiffs motion for summary judgment that defendants auto body part design patents were invalid and rejected plaintiffs argument that the aesthetic-functionality test should apply to design patents.

    They distort outcomes of cases again.For those who arent too familiar with design patents, theyre about layout rather than f...


    Researchers combine metalens with an artificial muscle "IndyWatch Feed Tech"

    Inspired by the human eye, researchers at the Harvard John A. Paulson School of Engineering and Applied Sciences (SEAS) have developed an adaptive metalens, that is essentially a flat, electronically controlled artificial eye. The adaptive metalens simultaneously controls for three of the major contributors to blurry images: focus, astigmatism, and image shift.

    The research is published in Science Advances.

    This research combines breakthroughs in artificial muscle technology with metalens technology to create a tunable metalens that can change its focus in real time, just like the human eye, said Alan She, a graduate student at SEAS and first author of the paper. We go one step further to build the capability of dynamically correcting for aberrations such as astigmatism and image shift, which the human eye cannot naturally do.


    Petitions call on Apple, Amazon to ditch NRA TV channel "IndyWatch Feed Tech"

    Multiple online petitions are calling on Apple, Amazon and other streaming services to cut ties with the National Rifle Association's (NRA) television channel.Petitions from organizations such as Moms Demand Action for Gun Sense in America have...


    Real-Time Audio For The PocketBeagle "IndyWatch Feed Tech"

    The BeagleBone has long been a favorite for real-time I/O, and now with the release of the PocketBone the tiny key fob-sized BeagleBone there are ever increasing uses for this tiny little programmable real-time Linux module. The Bela Mini, just released, is the latest add-on cape to take advantage of the processing power of the micro-sized PocketBone.

    The Bela Mini is a shrinkification of the original Bela, a cape add-on for the BeagleBone. The original breaks out eight analog inputs and eight analog outputs, both sixteen-bits deep. With the addition of powered speaker outputs, the Bela turns the BeagleBone into the perfect tiny audio-Linux-thing, with a special emphasis on Pure Data and other audio wizardry.

    The Bela Mini does away with the powered speaker outputs, and instead replaces those ports with stereo audio in and stereo audio out on a three-pin connector. Compared to the original Bela, the Mini loses the eight sixteen-bit analog outputs, but still keeps the analog inputs.

    There have been many attempts to add real-time audio to microcontrollers and Linux boards, but few examples have lived up to the hype. Most of the time, this comes down to the choice of microcontroller or module; an ATmega-based Arduino doesnt have real analog outputs and instead relies on PWMing a digital signal. A Raspberry Pi-based Pure Data box does not have a real-time I/O. This is where the choice of the PocketBone shows its strength. The PocketBone uses the same chip as the BeagleBone, and with that comes the Programmable Real-Time Units (PRUs). This enables the Bela to interface with signals with a dedicated controller in real-time. Its exactly what you want for audio applications.


    Links 26/2/2018: Chrome OS With Linux Containers/VMs, New Stable Kernels "IndyWatch Feed Tech"

    GNOME bluefish



    • Three essential tools for the GNU/Linux Photographer

      As a Journalist by day, and awesome cave dwelling Linux nerd by night, I take a lot of photographs with my Nikon D3300.

      That said, there are the obvious tools by Adobe that one can use, such as Photoshop, but there are some pretty awesome tools available for free to GNU/Linux users I thought I might share.

      With the three together, Ive got basically everything I have needed.

    • Desktop

      • Chrome OS may soon be able to run Linux applications in a container

        Even though Chrome OS is based on Linux (Gentoo Linux, to be exact), you cant run traditional desktop Linux applications. One solution to this problem is Crouton, a script that sets up a chroot of Ubuntu or Debian Linux on top of Chrome OS. While this does allow many people to use Chrome OS who otherwise couldnt, its a hacky solution and requires enabling Developer Mode (which turns off most of Chrome OS security features).

        A new commit on the Chromium Gerrit has come to light, with the name New device policy to allow Linux VMs on Chrome OS. The specific code adds a Better Together menu in the Chrome...


    Stolen Degas Painting Recovered After French Customs Agents Search Bus "IndyWatch Feed Tech"

    In December 2009, a small painting by Edgar Degas was quietly stolen from the Cantini museum in Marseille, France. Museum staff discovered Les Choristes was missing when they arrived in the morning, and the prosecutor suggested it could be an inside job because the painting had been unscrewed from the wall and there was no evidence of a break-in. An investigation was launched, but nine years went by and the 1877 painting worth an estimated $1 million wasn't seen again.

    That was until last Friday, when French customs agents happened to check a bus parked at a highway stop about 18 miles east of Paris. The officers opened a suitcase in the luggage compartment, and there it was: vibrant pastels in red, orange, and yellow, depicting a chorus from the opera Don Juan. In the lower left hand corner: Degas' signature. The agents asked the bus passengers who owned the suitcase. No one claimed it.

    Original Submission

    Read more of this story at SoylentNews.

    Go Back:30 Days | 7 Days | 2 Days | 1 Day

    IndyWatch Science and Technology News Feed Today.

    Go Forward:1 Day | 2 Days | 7 Days | 30 Days

    Sunday, 25 February


    Shaub presses FCC chief over possible ethics violation with NRA gift "IndyWatch Feed Tech"

    Former White House ethics attorney Walter Shaub over the weekend questioned whether a gun that Federal Communications Commission (FCC) Chairman Ajit Pai received from the National Rifle Association (NRA) violates the FCCs ethics rules.In a number...

    Saturday, 24 February


    ChicagoVPS $6/mo Windows VPS and proud to announce now offered in Los Angeles! "IndyWatch Feed Tech"

    ChicagoVPSNick from ChicagoVPS sent over a sale in honor of launching their Windows VPS line in Los Angeles, USA. We dont expect this to remain in stock for long however we already have new systems in provisioning to help keep these plans in stock as much as possible!

    There are two primary packages to pick from below but if you dont see what you need they also have a site wide sale running, just use coupon code LEBFEB2018 for 25% off anything on their site except for some Windows/Linux VPS plans (like WinVPS 1GB/2GB and a few others), dedicated servers, domains, addons and licenses. If you do not see a template you desire on the linux plan at checkout then no worries, just pop open a ticket after ordering and let us know what you are looking for so we can get that installed for you!

    2GB KVM Windows VPS
    • 2GB Dedicated RAM
    • 1x vCPU
    • 50GB SSD Disk Space
    • 2TB Bandwidth
    • 1Gbps
    • 1 x IPv4
    • Windows Server 2008 R2, 2012 R2 or 2016
    • KVM
    • $6.00/mo OR $60.00/yr
    • [Order Now]
    2GB KVM Linux VPS
    • 2GB RAM
    • 1x vCPU
    • 60GB HDD Space
    • 2TB Bandwidth
    • 1Gbps
    • 1 x IPv4
    • Linux Templates
    • KVM
    • $5/mo OR $50/yr
    • [Order Now]

    Network information is available after the break!


    IndyWatch Science and Technology News Feed Archiver

    Go Back:30 Days | 7 Days | 2 Days | 1 Day

    IndyWatch Science and Technology News Feed Today.

    Go Forward:1 Day | 2 Days | 7 Days | 30 Days

    IndyWatch Science and Technology News Feed was generated at World News IndyWatch.

    Resource generated at IndyWatch using aliasfeed and rawdog