IndyWatch Science and Technology News Feed Archiver

Go Back:30 Days | 7 Days | 2 Days | 1 Day

IndyWatch Science and Technology News Feed Today.

Go Forward:1 Day | 2 Days | 7 Days | 30 Days

IndyWatch Science and Technology News Feed was generated at World News IndyWatch.

Monday, 18 June


Harvard Rewinds the Biological Clock of Time Lifeboat News: The Blog

Investigators at Harvard Medical School have identified the key cellular mechanisms behind vascular aging and its effects on muscle health, and they have successfully reversed the process in animals.

The scientists used a chemical compound thats an NAD+ booster called NMN which plays a critical role in repairing cellular DNA as well as maintaining cell vitality to test what would happen.

Could reversing the aging of blood vessels hold the key to restoring youthful vitality? If the old adage you are as old as your arteries reigns true then the answer is yes, at least in mice.

According to a new study by Harvard Medical School researchers, they have identified the cellular mechanisms that cause the aging of vascular arteries as well as the effects of such aging on the health of muscles. The Medical team was also able to successfully reverse this aging process.

What these findings seem to indicate is that theres a glitch in the normal crosswalk between both muscles and blood vessels and keeping both tissues healthy. The scientists were also able reverse the demise of blood vessels and muscle atrophy in the aging mice by using the synthetic precursors of two molecules naturally present in the body. This boosted their exercise endurance in the process.

The Medical team is excited because such a breakthrough will now pave the way to identifying new therapies for humans.

Study senior investigator David Sinclair, professor in the Department of Genetics at Harvard Medical School and co-director of the Paul F. Glenn Center for the Biology of Aging at Harvard Medical School stated weve discovered a way to reverse vascular aging by boosting the presence of naturally occurring molecules in the body that augment the physiological response to exercise.

Because there are some very important differences in biology between humans and mice theres a possibility that this treatment may not have the same effect in humans. Nonetheless, the research team plans to follow through with human clinical trials because the results of this experiment were important enough to prompt the research team in doing so.

Sinclair, wh...


Dust Clouds Can Explain Puzzling Features of Active Galactic Nuclei SoylentNews

Submitted via IRC for BoyceMagooglyMonkey

[...] A new analysis by researchers at UC Santa Cruz, published June 14 in Monthly Notices of the Royal Astronomical Society, explains these and other puzzling features of active galactic nuclei as the result of small clouds of dust that can partially obscure the innermost regions of AGNs.

[...] The findings have important implications because researchers use the optical emissions from the broad-line region to make inferences about the behavior of the gases in the inner regions around a supermassive black hole.

[...] "Once the dust crosses a certain threshold it is subjected to the strong radiation from the accretion disk," said Harrington. "This radiation is so intense that it blows the dust away from the disk, resulting in a clumpy outflow of dust clouds starting at the outer edge of the broad-line region."

The effect of the dust clouds on the light emitted is to make the light coming from behind them look fainter and redder, just as Earth's atmosphere makes the sun look fainter and redder at sunset. In their paper, Gaskell and Harrington present several lines of observational evidence supporting the existence of such dust clouds in the inner regions of active galactic nuclei. They developed a computer code to model the effects of dust clouds on observations of the broad-line region.


Original Submission

Read more of this story at SoylentNews.


DSLWP-B first JT4G test Daniel Estvez

Yesterday, between 9:00 and 11:00, DSLWP-B made its first JT4G 70cm transmissions from lunar orbit. Several stations such as Cees Bassa and the rest of the PI9CAM team at Dwingeloo, the Netherlands, Fer IW1DTU in Italy, Tetsu JA0CAW and Yasuo JA5BLZ in Japan, Mike DK3WN in Germany, Jiang Lei BG6LQV in China, Dave G4RGK in the UK, and others exchanged reception reports on Twitter. Some of them have also shared their recordings of the signals.

Last week I presented a JT4G detection algorithm intended to detect very weak signals from DSLWP-B, down to -25dB SNR in 2500Hz. I have now processed the recordings of yesterdays transmissions with this algorithm and here I look at the results. I have also made a Python script with the algorithm so that people can process their recordings easily. Instructions are included in this post.

The JT4G transmissions are made just after the end of each GMSK telemetry packet, as illustrated by the following figure made by Cees Bassa using the signals he received at Dwingeloo. Also note that the JT4G signal starts at an UTC minute, as it is common with WSJT-X modes. The frequency of the lowest JT4G tone seems to be 1kHz higher than the GMSK carrier.

GMSK and JT4G signals from DSLWP-B recorded by Cees Bassa at PI9CAM

As far as I know, the following stations have shared recordings of the JT4G signals:...


17jun2018 Trivium


The Affairs of the USPTO Have Turned Into Somewhat of a Battle Against the Courts, Which Are Simply Applying the Law to Invalidate US Patents Techrights

Poor assessment of patent applications can now be stopped or compensated for by the Patent Trial and Appeal Board (PTAB) and, failing that, the Court of Appeals for the Federal Circuit (CAFC)

A death squad
A death squad is what patent maximalists nowadays call a court (where the only casualty is a piece of paper, or a low-quality patent which US law renders invalid)

Summary: The struggle between law, public interest, and the Cult of Patents (which only ever celebrates more patents and lawsuits) as observed in the midst of recent events in the United States

THE ideology of patent maximalism is a toxic one and it is infectious only within circles that sell, trade, and exploit patents for litigation, not innovation. Its all about financial motivations and those motivated to spread patent maximalism typically profit from mass litigation. Its their most expensive product or service as it can last several years (appeals, discovery, so-called damages with a cut for respective law firms).

They dont seem to care about facts, only mythology and beliefs.Earlier this year we started habitually referring to patent maximalism (of the patent microcosm) as Cult of Patents because it has become almost like a religion to these people. They dont seem to care about facts, only mythology and beliefs.

A reader suggested this chart as we approach U.S. Patent No. 10,000,000, Patently-O wrote on Friday. As we said before, its a pretty meaningless milestone from this Cult of Patents (the patent maximalists). Half a decade or so after Alice and nearly a decade after the Bilski case the Office just granted far too many patents far too fast. Look at the rate of expansion of grants; do people invent twice as many things today as they did about a decade ago? Or a hundred times more than a century ago? Or maybe its just patent maximalism taking over, dubbing just about anything an invention and justifying/ permitting a monopoly on it?

Earlier this year we started habitually referring to patent maximalism (of the patent microcosm) as Cult of Patents because it has become almost like a religion to these people. They dont seem to care about f...


Tips for for an Information Security Analyst/Pentester career - Episode 62: Forensic Challenge (pt 2) The S@vvy_Geek Tips Tech Blog

This post resumes from my previous one Tips for an Information Security Analyst/Pentester career - Ep. 57: Forensic challenge (pt. 1), where I analyzed interesting artifacts and event IDs from Event Viewer with reference to a clean system configuration.

This time, I'll analyze a hacked Windows 7 Professional system and I'll show you what those artifacts and event IDs look like in that specific context.

Also, I'll show you how to use a PowerShell script to save the most relevant event IDs to a csv file, that you can then filter by using Excel or parse through PowerShell or other programming languages.

With that being done, I'll show you how certain event IDs may be reflected in AlienVault Cloud Central alarms, even though the online demo looks quite different from the configuration I use at work.

My work configuration reflects much more closely the same hex codes you find in Event Viewer.

For this reason, after showing some examples in the online demo, I'll display a real-world example taken from my job, of course duly redacted in order to protect corporate data.

Stage 1: System Exploitation

I used an msfvenom custom payload to hack a Windows 7 Professional VM configured for use with Georgia Weidman's pentesting class and attached a reverse meterpreter shell payload to it.

Then I moved the malicious file to the web root directory and started Apache, so it could be accessed from the victim machine through the web browser.

Before exploiting our victim VM, I enabled some specific auditing policies, in order to have an audit trail for our attack.

From ...


How to turn tutoring from a part-time job into a successful business TechWorm

Tutoring is a fantastic way to earn some cash on the side. Whether youre a full time student doing some tutoring after classes or on weekends, or just trying to help your friendly neighbors get their GEDs, it can be a very satisfying and fulfilling experience.

But is there a way you could turn that part time job into a successful business and start earning serious cash while doing something that you love?

Were here to tell you that there is a way and that its much simpler than you think. You can use your tutoring skills to create something long lasting and meaningful and were here to show you how.

Create a website

Nothing is better at showcasing you and your business than a well made website. SITE123 is a free website builder that allows its users to create beautifully designed, fully responsive websites for free.

Use SITE123 to create a personal website that will make you look more professional and dedicated. Add your biography and your educational background to the About me page, and include testimonials from your former or current students.

Add a booking widget

Youll need a powerful calendar/booking tool to keep track of all of your students and classes, and luckily SITE123 has a few amazing ones to offer.

SITE123 currently offers Zapla, SimplyBookMe and Tockify, some of the best online booking apps available today. It fits seamlessly into your website and simplifies your scheduling and record keeping.

It even sends out confirmation and reminder emails to your students when their appointment is due.

Add a pricing chart

Being transparent with your fees will make you look more professional and trustworthy. Browsing SITE123s App Market, youll come across a few Ninja apps like Pricer Ninja and Charts Ninja. Add them to your website to make your pricing clear and visible. Add a short description of each class you teach and a price per hour per course.

Add videos

Having additional teaching material on your website will help your students learn more about your classes. Create a video and upload it via Huzzaz, a video gallery app you can add to your website. The player fits perfectly into any design and is incredibly fast and responsive.


Having an online base for your tutoring business will help it grow. Your students will have a quick and easy way to book appointments and share your website with their friends and family. Spending a lazy afternoon on your website can definitely bring more opportunities in the future.

Ready to grow your tutoring business? Create a website now.

The pos...


Patent Marketing Disguised as Patent Advice Techrights

Sheep and wolf

Summary: The meta-industry which profits from patents and lawsuits claims that its guiding us and pursuing innovation, but in reality its sole goal is enriching itself, even if that means holding science back

WED LIKE to take a moment aside from the usual EPO and USPTO focus. Something ought to be said which was said here many times before but merits extra emphasis.

The problem is, such patent consultants or practitioners or whatever they call themselves are rarely independent and impartial observers.When it comes to patent advisors, their motivation is usually to get more business or returning customers. This means that advice would likely gravitate towards lawsuits, even futile ones that cannot be won. The problem is, such patent consultants or practitioners or whatever they call themselves are rarely independent and impartial observers. Theyre personally involved and theyre immersed in a particular industry that relies on certain activities a subject we shall cover separately in our next post.

Patent attorneys and lawyers are typically in the business of advising on how to manage the mess which they themselves create (or at least perpetuate); we say so with no intention of offending anyone in particular. Its just putting the simple truth out there. Sure, there are some attorneys and lawyers who are honest and with great integrity (some of them send us information and material); some are willing to express the occasional dissent towards patent maximalism at great risk of being framed traitors to their profession. But theyre the exception rather than the norm. They wont be the ones to become abundantly wealthy.

The latter prior art is very important as it helps document the history of science and credit/attribute the correct people for their contribution to the sciences.To give a couple of examples from several hours ago, over at Patent Docs they now market or promote some upcoming webinars (Patent Portfolio Management and...


FPV-Rover 2.0 Has 3D Printed Treads and Plenty of Zip Hackaday

[Markus_p] has already finished one really successful 3D printed tracked robot build. Now hes finished a second one using standard motors and incorporating what he learned from the first. The results are pretty impressive and you can see a video demo of the beast, below.

Most of the robot is PLA, although there are some parts that use PETG and flex plastic. There is an infrared-capable camera up front and another regular camera on the rear. All the electronics are pretty much off the shelf modules like an FPV transmitter and an electronic controller for the motors. Theres a servo to tilt the camera, as you can see in the second video.

The body fits together using nuts and magnets. The robot in the video takes a good beating and doesnt seem to fall apart so it must be sufficient. What appealed to us was the size of the thing. It looks like it would be trivially easy to mount some processing power inside or on top of the rover and it could make a great motion base for a more sophisticated robot.

Weve seen some similar projects, of course. This tracked robot uses mind control. And OpenWheel is a great place to get treads and other locomotion designs.

Looking for a tracked rover you can drive around on the desktop? [Markus_p] has one of those too!

Go Back:30 Days | 7 Days | 2 Days | 1 Day

IndyWatch Science and Technology News Feed Today.

Go Forward:1 Day | 2 Days | 7 Days | 30 Days

Sunday, 17 June


Two Critical flaws affect Schneider Electric U.motion Builder. Patch them now! Security Affairs


Short Gamma-Ray Bursts Do Follow Binary Neutron Star Mergers SoylentNews

Researchers at Oregon State University have confirmed that last fall's union of two neutron stars did in fact cause a short gamma-ray burst. The findings, published today [14 June] in Physical Review Letters, represent a key step forward in astrophysicists' understanding of the relationship between binary neutron star mergers, gravitational waves and short gamma-ray bursts.

Commonly abbreviated as GRBs, gamma-ray bursts are narrow beams of electromagnetic waves of the shortest wavelengths in the electromagnetic spectrum. GRBs are the universe's most powerful electromagnetic events, occurring billions of light years from Earth and able to release as much energy in a few seconds as the sun will in its lifetime. GRBs fall into two categories, long duration and short duration. Long GRBs are associated with the death of a massive star as its core becomes a black hole and can last from a couple of seconds to several minutes.

Short GRBs had been suspected to originate from the merger of two neutron stars, which also results in a new black hole -- a place where the pull of gravity from super-dense matter is so strong that not even light can escape. Up to 2 seconds is the time frame of a short GRB.

Read more of this story at SoylentNews.


Zapcc Caching C++ Compiler Open-Sourced Phoronix

Remember the Zapcc compiler that focused on lightning fast compiler times? It's now been open-sourced...


How Human Hibernation Will Soon Get Us to Mars Lifeboat News: The Blog

Itll be like that movie Passengers, but less creepy. #til


Features That Didn't Make It For The Mainline Linux 4.18 Kernel Phoronix

There are many changes and new features for Linux 4.18 with the merge window having just closed on this next kernel version, but still there are some prominent features that have yet to work their way to the mainline tree...


ClipboardWalletHijacker malware replaces address to steal cryptocurrency HackRead

By Waqas

The IT security researchers at Qihoo 360 Total Security have discovered

This is a post from Read the original post: ClipboardWalletHijacker malware replaces address to steal cryptocurrency


All Box, no Boom : The Technics Sitman Techmoan

The Co-Deck was Technics (rushed?) response to the runaway success of the Sony Walkman.

After the Sony Walkman arrived on the scene in 1979 at a price of 33,000 Yen the Technics Co-Deck M1 turned up in 1980 at a price of 29,800 Yen.  Whilst also being a portable cassette player, this was a very different machine in a form-factor that was never to be repeated. A look inside reveals a tell tale mystery button that gives away its simple origins.

FAQs including an update on the operation of the Rewind Auto-play function can be found in the youtube comments.


Satori botnet is back again, experts observed a surge in port scan activity associated with it Security Affairs

This week, security experts observed a surge in port 8000 scan activity, researchers at  Qihoo 360 Netlab determined that the unusual activity was associated with Satori IoT botnet.

Experts from Qihoo 360 Netlab discovered that the author of the Satori botnet have integrated a the proof-of-concept (PoC) code for the XionMai web server software package after it was published on June 8.

The code recently included in the Satori botnet exploits a buffer overflow vulnerability, tracked as CVE-2018-10088, in XionMai uc-httpd 1.0.0. The exploit could be used by remote attackers to execute arbitrary code by sending a malformed package via ports 80 or 8000.

Two days ago, on 2018-06-14, we noticed that an updated Satori botnet began to perform network wide scan looking for uchttpd 1.0.0 devices. reads the report published by Qihoo 360 Netlab.

Most likely for the vulnerability of XiongMai uchttpd 1.0.0 (CVE-2018-10088). The scanning activities led to a surge in scanning traffic on ports 80 and 8000.

Satori botnet scan-on-port-80



FBI Recovers WhatsApp, Signal Data Stored on Michael Cohen's BlackBerry SoylentNews

Submitted via IRC for BoyceMagooglyMonkey

Letter to judge reveals 731 pages of messages, call logs uncovered on one of two phones.

[...] The letter to Judge Kimba Wood stated that "the Government was advised that the FBI's original electronic extraction of data from telephones did not capture content related to encrypted messaging applications, such as WhatsApp and Signal... The FBI has now obtained this material."

In a letter to the presiding judge in the case against Michael Cohen, President Donald Trump's long-time personal attorney, the US Attorney's Office for the Southern District of New York revealed today that it had obtained additional evidence for reviewincluding a trove of messages and call logs from WhatsApp and Signal on one of two BlackBerry phones belonging to Cohen. The messages and call logs together constitute 731 pages of potential evidence. The FBI also recovered 16 pages of documents that had been shredded, but it has not yet been able to complete the extraction of data from the second phone.

This change is likely because of the way the messages are stored by the applications, not because the FBI had to break any sort of encryption on them. WhatsApp and Signal store their messages in encrypted databases on the device, so an initial dump of the phone would have only provided a cryptographic blob. The key is required to decrypt the contents of such a database, and there are tools readily available to access the WhatsApp database on a PC.


Original Submission

Read more of this story at SoylentNews.


Cheap Front Panels with Dibond Aluminium Hackaday

The production capability available to the individual hacker today is really quite incredible. Even a low-end laser engraver can etch your PCBs, and it doesnt take a top of the line 3D printer to knock out a nice looking enclosure. With the wide availability of these (relatively) cheap machines, the home builder can churn out a very impressive one-off device on a fairly meager budget. Even low volume production isnt entirely out of the question. But theres still one element to a professional looking device that remains frustratingly difficult: a good looking front panel.

Now if your laser is strong enough to engrave (and ideally cut) aluminum sheets, then youve largely solved this problem. But for those of us who are plodding along with a cheap imported diode laser, getting text and images onto a piece of metal can be rather tricky. On, [oaox] has demonstrated a cost effective way to create metal front panels for your devices using a print service that offers Dibond aluminum. Consisting of two thin layers of aluminum with a solid polyethylene core, this composite material was designed specifically for signage. Through various online services, you can have whatever you wish printed on a sheet of pre-cut Dibond without spending...


A Complete Look At Spectre V1/V2/V4 & Meltdown Phoronix

Canonical's Engineering Tech Lead, Gavin Guo, has passed along a big slide deck on a presentation he is preparing about the Spectre and Meltdown CPU vulnerabilities...


Fun with DBM-type databases... Open Source Security

Posted by Lionel Debroux on Jun 17


Many crashes upon offline data corruption in multiple database systems.
Only two of these DB systems patched after 4+ months. Much work needed
to backport fixes and move away from insecure & unmaintained DB systems.

In January, February and May 2018, I spent some of my free time fuzzing
a set of DBs more or less loosely from the DBM family, which are
packaged by Debian: LMDB, GDBM, freecdb, QDBM,...


Local User Tails Linux IP Leak SoylentNews

A compromised local user can leak your IP by using a script to start unsafe-browser hidden in the background and use X11 trickery to leak your real IP without privilege escalation. Most applications exploited on Tails would be capable of this.

deleting /etc/sudoers.d/zzz_unsafe-browser after booting will fix this issue until Tails fixes it themselves

Bug #15635

Feature #7072: Research potential for deanonymization by a compromised "amnesia" user

The Unsafe Browser allows to retrieve the public IP address by a compromised amnesia user with no user interaction

Original Submission

Read more of this story at SoylentNews.


Foxconn looks to AI after maker of Apple and Amazon products celebrates 30 years in China Lifeboat News: The Blog

That growth in factory worker salaries has been a double-edged sword for China. On one hand, it has increased the purchasing power of Chinese which in turn has powered consumer-led economic growth, but on the other it has made China less competitive on wages and forced companies like Foxconn to introduce more automation.

With 1 million employees and half a dozen factories contributing 4 per cent of the countrys export value, Foxconns expansion symbolises Chinas role as tech manufacturing powerhouse.


Sceper Set to Return After Attempted Sale Turned Into a Scam TorrentFreak

Earlier this year, TorrentFreak received a steady stream of emails from users of, one of the most popular release blog sites.

After about eight years of serving up links to large volumes of mainstream content, the site had apparently disappeared. There was no warning or indication of what may have transpired, but several weeks ago a message appeared on its homepage, indicating the platform was up for sale.

Intrigued as to why its operators had decided to throw in the towel, TF made contact seeking information. This week we received a response from part owner and long-standing editor Error but it wasnt what we were expecting.

The problems started when we stopped paying attention to our website due to real-life issues, Error explained.

Once we forgot to renew our domain which caused a few days of down time and more recently we switched to a new server and the payment renewal was not automated, so it expired. In the end, I decided it would be better to sell the site to a person who can actually take care of it and run it as we used to years back.

Error says that after putting the site up for sale they had a lot of responses from people with bids, but one individual stood out as a reasonable person with a decent offer.

In the world of warez, however, not many things are straightforward. Few people want to make their identities known and meeting people face to face is mostly out of the question. Error says he asked the prospective buyer to nominate an intermediary, such as a trusted and well-known person within the warez scene. The offer was declined.

[The buyer] said that he didnt trust anyone and was fine sending the money in two payments, half before he received the database and half after he was satisfied that he can work with the old database. Then the domain transfer could happen, Error explains.

The buyer identified himself as a former editor of a Sceper rival which had shut down under legal pressure back in 2012.

Additional proof came in the form of a panel screenshot which showed the buyer had access to a current scene release blog and other related domains. An email address used in correspondence with Error also belonged to the same blog, confirming the buyers identity.

Error says he hadnt heard of the release blog until that moment, bu...


Microsoft is Still Cybermobbing Its Competition Using Patent Trolls Such as Finjan Techrights

Protection offered only to those who pay Microsoft for Azure IP Advantage [1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13,...


ClipboardWalletHijacker miner hijacks your Ether and Bitcoin transaction, over 300,000 computers have been infected Security Affairs

Researchers uncovered a new malware campaign spreading a clipboard hijacker dubbed ClipboardWalletHijacker that has already infected over 300,000 computers.

Security researchers from Qihoo 360 Total Security have spotted a new malware campaign spreading a clipboard hijacker, tracked as ClipboardWalletHijacker, that has already infected over 300,000 computers. Most of the victims are located in Asia, mainly China.

Recently, 360 Security Center discovered a new type of actively spreading CryptoMiner, ClipboardWalletHijacker. The Trojan monitors clipboard activity to detect if it contains the account address of Bitcoin and Ethereum. reads the analysis published by the company.

It tampers with the receiving address to its own address to redirect the cryptocurrency to its own wallet. This kind of Trojans has been detected on more than 300 thousand computers within a week.

Modus operandi for ClipboardWalletHijacker is not a novelty, the malware is able to monitor the Windows clipboard looking for Bitcoin and Ethereum addresses and replace them with the address managed by the malwares authors.

In March 2018, researchers at Palo Alto Networks discovered a malware dubbed ComboJack that is able of detecting when users copy a cryptocurrency address and alter clipboards to steal cryptocurrencies and payments.

In a similar way, ClipboardWalletHijacker aims at hijacking BTC and ETH transactions.

Experts observed the malware using the following addresses when replacing legitimate ones detected in users clipboards:

  • BTC: 1FoSfmjZJFqFSsD2cGXuccM9QMMa28Wrn1
  • BTC: 19gdjoWaE8i9XPbWoDbixev99MvvXUSNZL
  • ETH: 0x004D3416DA40338fAf9E772388A93fAF5059bFd5
below the function the replace the legitimate Ethereum wallet address with the attackers one:


Frozen Rat Kidney Shipping Container Hackaday

The biggest allure of 3D printing, to us at least, is the ability to make hyper-personalized objects that would otherwise fall through the cracks of our mass-market economy. Take, for instance, the Frozen Rat Kidney Shipping Container, or maybe some of the less bizarro applications in the US National Institute of Healths 3D Print Exchange.

The Exchange is dominated, at least in terms of sheer numbers, by 3D models of proteins and other biochemical structures. But there are two sections that will appeal to the hacker in you: prosthetics and lab equipment. Indeed, we were sent there after finding a nice model of a tray-agitator that we wanted to use for PCB etching. We havent printed one yet, but check out this flexible micropositioner.

While its nowhere near as comprehensive a resource as some other 3D printing model sites, the focus on 3D printing for science labs should really help those who have that particular itch to find exactly the right scratcher. Or a tailor-made flexible container for slicing frozen rat kidneys. Whatever youre into. We dont judge.

Man with skull image: [jaqtikkun]


Genode-Based Sculpt OS Now Available With Easy-To-Use Disk Image Phoronix

Sculpt OS is striving to become a general purpose operating system built off the Genode OS framework. The second release of Sculpt OS is now available and it's much easier now to try out...


SpinLaunch Gets $40 Million in Funding to Catapult Payloads Into Space SoylentNews

Startup SpinLaunch Inc. has received $40 million in funding. The company intends to use a centrifuge to catapult small payloads to the edge of space:

The company remains tight-lipped about exactly how this contraption will work, although its name gives away the basic idea. Rather than using propellants like kerosene and liquid oxygen to ignite a fire under a rocket, SpinLaunch plans to get a rocket spinning in a circle at up to 5,000 miles per hour and then let it gomore or less throwing the rocket to the edge of space, at which point it can light up and deliver objects like satellites into orbit.

[...] Over the past few years, the rocket industry has become quite crowded. Following in the footsteps of Elon Musk's Space Exploration Technologies Corp., dozens of companies have appeared, trying to make small, cheap rockets that can be launched every week or perhaps even every day. These smaller rockets have been built to carry a new breed of shoebox-sized satellitesdubbed smallsatsthat are packed full of imaging, telecommunications and scientific equipment. The small rockets, though, are really just miniaturized versions of the large, traditional rockets that have flown for decades. SpinLaunch is an entirely new take on the rocket-launch concept itself.

[...] SpinLaunch has a working prototype of its launcher, although the company has declined to provide details on exactly how the machine operates or will compare to its final system. The startup plans to begin launching by 2022. It will charge less than $500,000 per launch and be able to send up multiple rockets per day. The world's top rocket companies usually launch about once a month, and most of SpinLaunch's rivals have been aiming for $2 million to $10 million per launch for small rockets. If the startup were able to reach its goals, it would easily be the cheapest and most prolific small launcher on the market.

NextBigFuture puts the velocity at up to 4,800 km/h (3,000 mph) instead.

See also: Spinlaunch is using large centrifuges to accelerate to payloads into space target $500,000 per launch

Original Submission

Read more of this story at SoylentNews.


The incredible career of NASAs Peggy Whitson, who applied to become an astronaut 10 times before she broke the American record for space travel Lifeboat News: The Blog

She retired from NASA on Friday after blazing a trail for countless female astronauts.

NASA astronaut Peggy Whitson, the 58-year-old from Iowa farm country who spent a record-breaking 665 days in space, retired from the space agency on Friday.

I have hit my radiation limit, Whitson told Business Insider during a recent interview. So not going into space with NASA anymore.

That realization is both melancholic and exciting for the biochemist, who only half-jokingly admits shes still not sure what shes going to do when I grow up.


A Black Hole Ate A Star And Left Crumbs Of Light For Astronomers To Discover Lifeboat News: The Blog

Black holes are notoriously messy eaters.

Using more than ten years of data, astronomers discovered traces of an unlucky star that got too close to a black hole. Because this event was partly hidden from us by dust, this discovery shows how we might find other cases of star-eating black holes.


Probiotics may help boost mood and cognitive function Lifeboat News: The Blog

Probiotics can do more than improve your gut health. They also may indirectly enhance your brain, too.

Research shows that the gut and brain are connected, a partnership called the gut-brain axis. The two are linked through biochemical signaling between the nervous system in the digestive tract, called the enteric nervous system, and the central nervous system, which includes the brain. The primary information connection between the brain and gut is the vagus nerve, the longest nerve in the body.

The gut has been called a second brain because it produces many of the same neurotransmitters as the brain does, like serotonin, dopamine, and gamma-aminobutyric acid, all of which play a key role in regulating mood. In fact, it is estimated that 90% of serotonin is made in the digestive tract.


Notes on "The President is Missing" Errata Security

Former president Bill Clinton has contributed to a cyberthriller "The President is Missing", the plot of which is that the president stops a cybervirus from destroying the country. This is scary, because people in Washington D.C. are going to read this book, believe the hacking portrayed has some basis in reality, and base policy on it. This "news analysis" piece in the New York Times is a good example, coming up with policy recommendations based on fictional cliches rather than a reality of what hackers do.

The cybervirus in the book is some all powerful thing, able to infect everything everywhere without being detected. This is fantasy no more real than magic and faeries. Sure, magical faeries is a popular basis for fiction, but in this case, it's lazy fantasy, a cliche. In fiction, viruses are rarely portrayed as anything other than all powerful.

But in the real world, viruses have important limitations. If you knew anything about computer viruses, rather than being impressed by what they can do, you'd be disappointed by what they can't.

Go look at your home router. See the blinky lights. The light flashes every time a packet of data goes across the network. Packets can't be sent without a light blinking. Likewise, viruses cannot spread themselves over a network, or communicate with each other, without somebody noticing -- especially a virus that's supposedly infected a billion devices as in the book.

The same is true of data on the disk. All the data is accounted for. It's rather easy for professionals to see when data (consisting of the virus) has been added. The difficulty of anti-virus software is not in detecting when something new has been added to a system, but automatically determining whether it's benign or malicious. When viruses are able to evade anti-virus detection, it's because they've been classified as non-hostile, not because they are invisible.

Such evasion only works when hackers have a focused target. As soon as a virus spreads too far, anti-virus companies will get a sample, classify as malicious, and spread the "signatures" out to the world. That's what happened with Stuxnet, a focused attack on Iran's nuclear enrichment program that eventually spread too far and got detected. It's implausible that anything can spread to a billion systems without anti-virus companies getting a sample and correctly classifying it.

In the book, the president creates a team of the 30 brightest cybersecurity minds the country has, from government, the private sector, and even convicted hackers on parole from jail -- each more brilliant than the last. This is yet another lazy cliche about genius hackers.

The cliche comes from the fact that it's rather easy to impress muggles with magic tricks. As soon as somebody shows an ability to do something...


US Painkiller Restriction Linked to 'Significant' Increase in Illicit Online Drug Trading SoylentNews

The US Drug Enforcement Administration's decision to restrict prescription drugs containing hydrocodone (a popular opioid painkiller) was associated with a 'significant' increase in illicit trading of opioids through online markets, finds a study published by The BMJ today.

In this study, the term opioids refers to drugs that are usually available by prescription but here are sourced illegally through the dark net and are not prescribed by anyone.

The findings show that the proportion of sales of opioids through illicit markets doubled over the study period and sales of more potent opioids also increased. Overdose death rates have quadrupled in the US since 1999, and 40% of all deaths involve prescription opioids, which are primarily used for pain relief.

Read more of this story at SoylentNews.


Howard Roark, John Galt, and The Transhumanist Wager Lifeboat News: The Blog

Heres a full chapter out exploring my novel The Transhumanist Wager as part of a new book out called Ayn Rand and the Posthuman: #transhumanism

In his novel The Transhumanist Wager, Zoltan Istvan recreates certain elements of Ayn Rands work, in order to advance an argument for transhumanism. Istvan sees the transhuman


DIY Coil Winding Machine Counts The Hacky Way Hackaday

Wait, was that 423 or 424? When youre stuck winding a transformer or coil that has more than a few hundred turns, youre going to want to spend some time on a winding jig. This video, embedded below, displays a simple but sufficient machine with a few twists.

The first elaboration is the addition of a shuttle that moves back and forth in sync with the main spindle to lay the windings down nice and smooth. Here, its tremendously simple a piece of threaded rod and a set of interchangeable wheels that are driven by a big o-ring belt. We love the low-tech solution of simply adding a twist into the belt to swap directions. We would have way overthought the mechanism.

But then the hack is the digital counter made out of an old calculator. Weve seen this before, of course, but heres a great real-world application.

Thanks [Jnis] for the tip!



Xfdesktop 4.13.2 Released As Another Step Towards Xfce 4.14 Phoronix

As another step towards the long-awaited Xfce 4.14 desktop environment release, Xfdesktop 4.13.2 is now available as the latest development release for this important piece of the Xfce desktop stack...


YouTube Download Sites Throw in the Towel Under Legal Pressure SoylentNews

Submitted via IRC for BoyceMagooglyMonkey

The music industry sees stream ripping as one of the largest piracy threats, worse than torrent sites or direct download portals.

The RIAA, IFPI, and BPI showed that they're serious about the issue when they filed legal action against YouTube-MP3, the largest stream ripping site at the time.

This case eventually resulted in a settlement where the site, once good for over a million daily visitors, agreed to shut down voluntarily last year.

YouTube-MP3's demise was a clear victory for the music groups, which swiftly identified their next targets, putting them under pressure, both in public and behind the scenes.

This week this appears to have taken its toll on several 'stream ripping' sites, which allowed users to download videos from YouTube and other platforms, with the option to convert files to MP3s.


Original Submission

Read more of this story at SoylentNews.


A set of weekend stable kernel updates

The stable update machine continues to crank out releases: 4.17.2, 4.16.16, 4.14.50, 4.9.109, and 4.4.138 are all available with another set of important fixes.


Most Deepfake Videos Have One Glaring Flaw: A Lack of Blinking SoylentNews

Submitted via IRC for SoyCow8093

The rate at which deepfake videos are advancing is both impressive and deeply unsettling. But researchers have described a new method for detecting a "telltale sign" of these manipulated videos, which map one person's face onto the body of another. It's a flaw even the average person would notice: a lack of blinking.

Researchers from the University at Albany, SUNY's computer science department recently published a paper titled "In Ictu Oculi: Exposing AI Generated Fake Face Videos by Detecting Eye Blinking." The paper details how they combined two neural networks to more effectively expose synthesized face videos, which often overlook "spontaneous and involuntary physiological activities such as breathing, pulse and eye movement."


Original Submission

Read more of this story at SoylentNews.


Kernel prepatch 4.18-rc1

The first 4.18 prepatch is out, and the merge window has closed for this development cycle. "You may think it's still Saturday for me, and that I should give you one more day of merge window to send in some last-minute pull requests, but I know better. I'm in Japan, and it's Sunday here."


3D Printer Tech Cuts Paper Hackaday

While 3D printing has been a great thing all by itself, it has also made electromechanical hardware a commodity item. Instead of raiding an old printer for motors and rods of unknown provenance, you can now buy everything very inexpensively due to the economy of scale and offshore manufacturing.

[Mr. Innovation] proves this point with his recent paper cutting machine which feeds and slices paper strips with user-selected width and quantity. He did steal one roller assembly from an old printer, but most of it is straight out of a 3D printer build. Theres NEMA stepper motors, modular motor driver boards, smooth rods, belts, and pulleys.

The blade of the cutter is just a standard snap off box cutter blade. It is angled so it doesnt drag when the motor pulls it back to the home position after a cut. Honestly, we might have made the paper mechanism retract the paper a bit at that point, but that would be simple to add to the devices firmware.

You might think an automated paper cutter is a bit lazy, but we could see if you were cutting up flyers for a hackerspace event, or cutting paper insulators to fit in an enclosure for a kit you were selling in small quantities.

The biggest issue we saw was that the machine is open loop. It would have been interesting to put an optical sensor between the roller and the blade. When the paper covered the sensor youd know the position of the edge and could then move the paper a precise amount, assuming it didnt slip. Another idea would be to put the sensor after the blade in such a way that it could be moved so that the cut would happen once the paper covered the sensor. You could probably do the same thing with a microswitch or some other sensor.

Still, this looks like a simple but useful project for some leftover 3D printer parts. Just be careful with the open blade.

We couldnt help but think about building this with a floppy disk blade for cutting plastic. Or you could mount a laser (but use a different power supply, please).


Heres whos going to win the World Cup, according to A.I. Lifeboat News: The Blog

Robots arent playing professional soccer just yet, but they can certainly help predict it! With the FIFA World Cup kicking off, San Francisco-based tech firm Unanimous A.I. has used its considerable artificial intelligence expertise to predict the outcome of the 32-team mens soccer tournament. Given that the startup has previously predicted the Super Bowl results successfully right down to the exact final score, we totally think this is worth taking seriously.

These predictions were generated using swarm A.I. technology, Louis Rosenberg, founder and CEO of Unanimous A.I., told Digital Trends. This means it uses a unique combination of human insights and artificial intelligence algorithms, resulting in a system that is smarter than the humans or the machines could be on their own. It works by connecting a group of people over the internet using A.I. algorithms, enabling them to think together as a system, and converge upon predictions that are the optimized combination of their individual knowledge, wisdom, instincts, and intuitions.

The technology is modeled on the remarkable abilities of swarms in nature, such as swarms of bees, schools of fish, or flocks of birds. These natural swarms combine the insights of large groups in optimized ways. Unanimous swarms utilize this same principle to answer complex questions such as giving precise probability-based outcomes on each game in the World Cup.


UK Prime Minister Theresa May "Disappointed" at Upskirting Law Block SoylentNews

May 'disappointed' at upskirting law block

Theresa May says she is "disappointed" an attempt to make upskirting a criminal offence in England and Wales did not progress through Parliament after one of her own MPs blocked it. Conservatives have criticised Sir Christopher Chope for objecting to the private member's bill.

If passed, it could see someone who has secretly taken a photo under a victim's skirt face up to two years in prison. The PM said she wanted to see it pass soon "with government support". Minister for Women, Victoria Atkins, said the government will allocate time for the bill in Parliament to ensure it does not get pushed down the list of private members' bills, which would mean it could some time to return to the Commons.

[...] Sir Christopher has yet to speak out about why he blocked the bill but upskirting victim Gina Martin - who started the campaign for the new law - said he had told her he objected to it "on principle" because it "wasn't debated". She also told the BBC that he said he "wasn't really sure" what upskirting was. "I said, 'well, I can help you with that'," Ms Martin added.

The bill was expected to sail through the Commons on Friday, but parliamentary rules mean it only required one MP to shout "object" to block its progress. Sir Christopher's intervention was met with shouts of "shame" from other MPs.

Original Submission

Read more of this story at SoylentNews.


A New Study Details Everything That Would Be Needed For An Interstellar Journey To Proxima Centauri Lifeboat News: The Blog

Scientists have determined the minimum amount of crew members needed for a 6,300-year journey to Proxima b.

A team of French scientists have recently published a new study detailing everything that would be needed if humans were to one day make the long interstellar journey to Proxima Centauri to start a new life and civilization. The research went to great lengths to determine the correct amount of people that would ensure a successful voyage to Proxima b.

The study was conducted by particle physicist Dr. Camille Beluffi and Dr. Frederic Marin from the Astronomical Observatory of Strasbourg and marks the second study conducted on such an interstellar journey to Proxima b, as ScienceAlert reported.


The Changes & New Features For Linux 4.18 Phoronix

With the early release of Linux 4.18-rc1, feature development on Linux 4.18 is over and it's onto roughly eight weeks worth of testing and bug fixes. For those that are behind in their Phoronix reading with our extensive and original reporting on the Linux 4.18 merge window happenings, here is our recap of the big changes that made it into Linux 4.18. We are also in the process of firing off the start of our Linux 4.18 kernel benchmarks.


Frogs Found Trapped in Amber After 99 Million Years SoylentNews

Prehistoric frogs in amber surface after 99 million years

Frogs trapped in amber for 99 million years are giving a glimpse of a lost world. The tiny creatures have been preserved in sticky tree resin since the end of the Age of the Dinosaurs.

The four fossils give a window into a world when frogs and toads were evolving in the rainforests. Amber from Myanmar, containing skin, scales, fur, feathers or even whole creatures, is regarded as a treasure trove by palaeontologists.

Dr Lida Xing of China University of Geosciences in Beijing said it was a "miracle" find. "In China, frogs, lizards and scorpions are called three treasures of amber," he told BBC News. "These amber fossils provide direct evidence that frogs inhabited wet tropical forests before the mass extinction event at the end of the Cretaceous."

The fossil record of the earliest amphibians is sparse, which makes the discovery particularly valuable for science.

The earliest direct evidence of frogs in wet tropical forests from Cretaceous Burmese amber (open, DOI: 10.1038/s41598-018-26848-w) (DX)

Original Submission

Read more of this story at SoylentNews.


Linux 4.18-rc1 Kernel Released Phoronix

Coming out one day ahead of schedule is the Linux 4.18-rc1 kernel...


AppArmor In Linux 4.18 Supports Audit Rule Filtering Phoronix

Sent out earlier this week were the AppArmor feature updates for the Linux 4.18 kernel merge window...


Definitely-Not-Neopixel Rings, From Scratch! Hackaday

The WS2812 addressable LED is a marvellous component. Any colour light you want, all under the control of your favourite microcontroller, and daisy-chainable to your hearts content. Unsurprisingly they have become extremely popular, and can be found in a significant number of the project s you might read about in these pages.

A host of products have appeared containing WS2812s, among which Adafruits Neopixel rings are one of the more memorable. But they arent quite as cheap as [Hyperlon] would like, so the ever-resourceful hacker has created an alternative for the constructor of more limited means. It takes the form of a circular PCB that apes the Adafruit original, and it claims to deliver a Bill of Materials cost that is 85% cheaper.

In reality the Instructables tutorial linked above is as much about how to create a PCB and surface-mount solder as it is specific to the pixel ring, and many readers will already be familiar with those procedures. But we wont rest until everyone out there has tried their hands at spinning their own PCB project, and this certainly proves that such an endeavour is not out of reach. Whether or not you pay for the convenience of the original or follow this lead is your own choice.

The real thing has been in so many projects its difficult to pick just one to link to. This Christmas tree is rather nice.


Study Finds Evidence of More Organic Material on Ceres SoylentNews

Organic Matter on Dwarf Planet Ceres More Abundant than Thought

A new analysis of data collected by NASA's Dawn orbiter suggests that organic molecules may exist in surprisingly high concentrations on the surface of Ceres. The study [DOI: 10.1029/2018GL077913] [DX] appears in the journal Geophysical Research Letters.

[...] To get an initial idea of how abundant those compounds might be, researchers compared the [Visible and Infrared Spectrometer] data from Ceres with lab reflectance spectra of organic material formed on Earth. Based on that standard, they concluded that 6-10% of the spectral signature they detected on Ceres could be explained by organic matter.

But for this the new study, Southwest Research Institute researcher Hannah Kaplan and co-authors wanted to re-examine those data using a different standard. Instead of relying on Earth rocks to interpret the data, they turned to an extraterrestrial source: meteorites. Some meteorites have been shown to contain organic material that's slightly different from what's commonly found on our own planet. And the new analysis shows that the spectral reflectance of the extraterrestrial organics is distinct from that of terrestrial counterparts. [...] "We estimate that as much as 40-50% of the spectral signal we see on Ceres is explained by organics. That's a huge difference compared to the 6-10% previously reported based on terrestrial organic compounds."

[...] There are two competing possibilities for where Ceres' organics may have come from. They could have been produced internally on Ceres and then exposed on the surface, or they could have been delivered to the surface by an impact from an organic-rich comet or asteroid.

Previously: Organic Molecules Found on Ceres

Related: Dawn Spies Magnesium Sulphate and Possible Geological Activity on Ceres
Ceres May Have Had a Global Surface Ocean in the Past

Original Submission

Read more of this story at SoylentNews.


A 3D-Printed Robot Actuator Hackaday

Somehow, walking robots at our level never really seem to deliver on the promise that should be delivered by all those legs. Articulation using hobby servos is simple enough to achieve, but cumbersome, slow, and not very powerful. [Paul Gould] has a plan to make a better, 3D-printed articulated robot actuator.

His solution is both novel and elegant, a fairly conventional arm geometry that has at its joints a set of brushless motors similar to but a little larger than the kind you might be more familiar with on multirotors, paired with 3D-printed cycloidal gearboxes. Magnetic encoders provide the necessary positional feedback, and the result is a unit that is both compact and powerful.

With such a range of small brushless motor controllers on the market, its at first sight unexpected that hes designed his own controller board. But this gives him complete control over his software, plus the CAN bus that ties everything together. Hes given us a video which weve placed below the break, showing the build process, the impressive capabilities of his system, and a selection of builds including a robot dog complete with tail. This is definitely a project to watch.

The HackadayPrize2018 is Sponsored by:


Chandra Space Telescope: Revealing the Invisible Universe Lifeboat News: The Blog

The Chandra X-Ray Observatory is a NASA telescope that looks at black holes, quasars, supernovas, and the like all sources of high energy in the universe. It shows a side of the cosmos that is invisible to the human eye.

After more than a decade in service, the observatory has helped scientists glimpse the universe in action. It has watched galaxies collide, observed a black hole with cosmic hurricane winds, and glimpsed a supernova turning itself inside out after an explosion.

The telescope billed as one of NASAs Great Observatories along with the Hubble Space Telescope, Spitzer Space Telescope and the Compton Gamma Ray Observatory has been a public relations tool for the agency, as well. Its pictures are frequently used by NASA in press releases.


Distribution Release: deepin 15.6 News

deepin is a Debian-based Linux distribution which strives to provide an attractive and user-friendly experience via the Deepin Desktop Environment (DDE). The project's latest release, deepin 15.6, features a new welcome window and a quick settings navigation bar. There is also a new launcher window, designed to use....


FreeBSD 11.2-RC3 Released, Enables Eager FPU Context Switching For Latest CPU Bug Phoronix

The newest weekly release candidate of the upcoming FreeBSD 11.2 is now available for testing...


Lentils Significantly Reduce Blood Glucose Levels SoylentNews

Submitted via IRC for BoyceMagooglyMonkey

Replacing potatoes or rice with pulses can lower your blood glucose levels by more than 20 per cent, according to a first-ever University of Guelph study.

Prof. Alison Duncan, Department of Human Health and Nutritional Sciences, and Dan Ramdath of Agriculture and Agri-Food Canada, found that swapping out half of a portion of these starchy side dishes for lentils can significantly improve your body's response to the carbohydrates.

Replacing half a serving of rice with lentils caused blood glucose to drop by up to 20 per cent. Replacing potatoes with lentils led to a 35-per-cent drop.

"Pulses are extremely nutrient-dense food that have the potential to reduce chronic diseases associated with mismanaged glucose levels," said Duncan, who worked on the study with PhD student Dita Moravek and M.Sc. students Erica Rogers, Sarah Turkstra and Jessica Wilson.


Dita Moravek, Alison M Duncan, Laura B VanderSluis, Sarah J Turkstra, Erica J Rogers, Jessica M Wilson, Aileen Hawke, D Dan Ramdath. Carbohydrate Replacement of Rice or Potato with Lentils Reduces the Postprandial Glycemic Response in Healthy Adults in an Acute, Randomized, Crossover Trial. The Journal of Nutrition, 2018; 148 (4): 535 DOI: 10.1093/jn/nxy018

Original Submission

Read more of this story at SoylentNews.


Inside the Former Texas Walmart Where 1,400 Immigrant Children Are Held

Via: WGN: The strangeness of the largest migrant childrens center in the United States, near the border with Mexico, shows up in the details. Here, there are 1,469 boys, ages 10 to 17, housed inside the 250,000-square-foot shell of a former Walmart superstore. None of the 313 bedrooms have doors. Or ceilings, so that children []


U.S. Drops Indictment Against Alleged Operator of Pirate App Store TorrentFreak

applanetAssisted by police in France and the Netherlands, the FBI took down the pirate Android stores Appbucket, Applanet, and SnappzMarket during the summer of 2012.

During the years that followed several people connected to the Android app sites were arrested and indicted, resulting in prison sentences for some.

SnappzMarkets Scott Walton was handed a 46-month prison sentence for conspiracy to commit copyright infringement, and his colleague Joshua Taylor was sentenced to a 16-month term.

While some defendants pleaded guilty in order to get a reduced sentence, not all did. David Lee, a California man linked to Applanet, decided to fight the case instead, and not without success.

The US Government had charged Lee with aiding and abetting criminal copyright infringement (pdf). In addition, he was charged with conspiring to infringe copyrights and violating the DMCAs anti-circumvention provision.

As the case progressed, it became clear that the U.S. Governments evidence wasnt as strong as initially thought. Before the trial even started, the prosecution voluntarily dropped the criminal copyright infringement charge.

What remained was the conspiracy charge, but after hearing evidence and testimony from both sides of the case, the jury was unable to issue a unanimous decision. As a result, the case ended in a mistrial two years ago.

The Department of Justice did not let the case go though. Soon after the mistrial, it informed the court that it would re-try Lee. This second trial was delayed a few times but never took place.

Instead, the US Government asked the court to dismiss the indictment against the alleged pirate app store operator, without providing any context. This request was granted earlier this week, which means that Lee is relieved of all charges.

It is not clear what moved the US to dismiss the case. TorrentFreak contacted both Lees lawyers and the US Department of Justice for comment, but at the time of publication, we have yet to hear back.

However, with the indictment dismissed, Lee can close this chapter of his life after nearly six years.

Indictment dismissed


For The First Time, Scientists Have Caught Bacteria Fishing For DNA From Their Dead Friends Lifeboat News: The Blog

Horizontal gene transfer is an important way that antibiotic resistance moves between bacterial species, but the process has never been observed before, since the structures involved are so incredibly small, said biologist Ankur Dalia of Indiana University Bloomington.

Bacteria are slippery little suckers. They evolve rapidly, developing resistance to antibiotics and therefore becoming increasingly difficult to deal with. Now, for the first time, researchers have caught on film one of the mechanisms the microbes use for this speedy evolution.

Two Vibrio cholerae bacteria the pathogen responsible for cholera sit under a microscope, glowing a vivid green. As we watch, a tendril snakes forth from one of the bacterium, harpooning a piece of DNA and carrying it back to its body.

That appendage is called a pili, and the process whereby the bacteria incorporates the new genetic material from a different organism into its own DNA to expedite its evolution is called horizontal gene transfer.


Building An Ultralight In A Basement is Just So Beautiful to See Hackaday

[Peter] is at it again. Not content with being one of the best RC confabulators on YouTube, and certainly not content with the first airplane he built in his basement, [Peter Sripol] is building another airplane in his basement.

The first airplane he built was documented on YouTube over a month and a half. It was an all-electric biplane, built from insulation foam covered in fiberglass, and powered by a pair of ludicrously oversized motors usually meant for large-scale RC aircraft. This was built under Part 103 regulations an ultralight which means there were in effect no regulations. Anyone could climb inside one of these without a license and fly it. The plane flew, but there were a few problems. It was too fast, and the battery life wasnt really what [Peter] wanted.

Now [Peter] is onto his next adventure. Compared to the previous plane, this has a more simplified,...


Pebble Smartwatch Services to Live on Through Rebble SoylentNews

Pebble smartwatches could be kept alive by an unofficial developer group called Rebble

Pebble's online services will officially die at the end of this month, but some could live on through Rebble, an unofficial group of Pebble users who are trying to keep their watches alive.

Rebble initially popped up after Pebble said in 2016 that it would cease operations and be acquired by Fitbit. Now that Fitbit is weeks away from shutting down Pebble's remaining services, Rebble is promoting an unofficial replacement system that's meant to keep the majority of Pebble's internet-connected functions alive. Former Pebble employee Katharine Berry is spearheading the effort, and it's received an endorsement from Pebble founder Eric Migicovsky.

Also at Engadget.

Previously: Pebble Dead, Assets Sold to Fitbit

Original Submission

Read more of this story at SoylentNews.


First results of DSLWP-B Amateur VLBI Daniel Estvez

In March this year I spoke about the Amateur VLBI with LilacSat-2 experiment. This experiment consisted of a GPS-synchronized recording of LilacSat-2 at groundstations in Harbin and Chongqing, China, which are 2500km apart. The experiment was a preparation for the Amateur VLBI project with the DSLWP lunar orbiting satellites, and I contributed with some signal processing techniques for VLBI.

As you may know, the DSLWP-B satellite is now orbiting the Moon since May 25 and the first Amateur VLBI session was performed last Sunday. The groundstations at Shahe in Beijing, China, and Dwingeloo in the Netherlands performed a GPS-synchronized recording of the 70cm signals from DSLWP-B from 04:20 to 5:40 UTC on 2018-06-10. I have adapted my VLBI correlation algorithms and processed these recordings. Here are my first results.

The baseline for these VLBI recordings (i.e., the distance between the groundstations) is roughly 7250km. The signals transmitted by DSLWP-B are 250bps GMSK using an \(r=1/2\) turbo code. Two transmit frequencies are used: 435.4MHz and 436.4MHz. Each transmit frequency uses a different antenna. The antenna marked below as UV Antenna A is used for 435.4MHz, while the UV Antenna B is used for 436.4MHz.

DSLWP diagram

The transmissions are done in packets. A packet lasts about 15 seconds and is transmitted roughly every 5 minutes. Packets are transmitted simultaneously in both frequencies, but the data transmitted in each of the frequencies is different.

The format of the recordings is as follows. Each recording is 20 seconds long (or 19 seconds in some cases) and contains a single packet. It is formed by two files, one for 435.4MHz and the other for 436.4MHz. Each of these files is an IQ file at 40ksps centred at 435.4MHz or 436.4MHz. The format of the files is the GNURadio metadata format. The file metadata can be read with gr_read_file_metadata and contains the UTC timestamps for the IQ stream. These timest...


What Is Quantum Computing (Future of AI Computing) Lifeboat News: The Blog

Recommended Books

Life 3.0
The Master Algorithm

This video is the ninth in a multi-part series discussing computing and the second discussing non-classical computing. In this video, well be discussing what quantum computing is, how it works and the impact it will have on the field of computing.

[0:286:14] Starting off well discuss, what quantum computing is, more specifically the basics of quantum mechanics and how quantum algorithms will run on quantum computers.

[6:149:42] Following that well look at, the impact quantum computing will bring over classical computers in terms of the P vs NP problem and optimization problems and how this is correlated with AI.

[9:4214:00] To conclude well discuss, current quantum computing initiatives to reach quantum supremacy and ways you can access the power of quantum computers now!


Senolytics for Age-Related Muscle Loss and Frailty Lifeboat News: The Blog

Today, we want to draw your attention to an open-access review that focuses on the role of senescent cells in sarcopenia, the age-related loss of muscle mass and strength that leads to frailty.


Ocean Waves Following Sea Ice Loss Trigger Antarctic Ice Shelf Collapse SoylentNews

Arthur T Knackerbracket has found the following story:

Storm-driven ocean swells have triggered the catastrophic disintegration of Antarctic ice shelves in recent decades, according to new research published in Nature today.

Lead author Dr Rob Massom, of the Australian Antarctic Division and the Antarctic Climate and Ecosystems Cooperative Research Centre, said that reduced sea ice coverage since the late 1980s led to increased exposure of ice shelves on the Antarctic Peninsula to ocean swells, causing them to flex and break. "Sea ice acts as a protective buffer to ice shelves, by dampening destructive ocean swells before they reach the ice shelf edge," Dr Massom said. "But where there is loss of sea ice, storm-generated ocean swells can easily reach the exposed ice shelf, causing the first few kilometres of its outer margin to flex."

"Over time, this flexing enlarges pre-existing fractures until long thin 'sliver' icebergs break away or 'calve' from the shelf front. This is like the 'straw that broke the camel's back', triggering the runaway collapse of large areas of ice shelves weakened by pre-existing fracturing and decades of surface flooding."

Study co-author Dr Luke Bennetts, from the University of Adelaide's School of Mathematical Sciences, said the finding highlights the need for sea ice and ocean waves to be included in ice sheet modelling. This will allow scientists to more accurately forecast the fate of the remaining ice shelves and better predict the contribution of Antarctica's ice sheet to sea level rise, as climate changes. "The contribution of the Antarctic Ice Sheet is currently the greatest source of uncertainty in projections of global mean sea level rise," Dr Bennetts said.

-- submitted from IRC

Original Submission

Read more of this story at SoylentNews.


Delta Printer Morphs into CNC Flat Coil Winder Hackaday

Anyone who has ever wound a coil by hand has probably idly wondered How do they do this with a machine? at some point in the tedious process. Thats about when your attention wanders and the wire does what physics wants it to do, with the rats nest and cursing as a predictable result.

Theres got to be a better way, and [Russ Gries] is on his way to finding it with this proof-of-concept CNC flat coil winder. The video below is a brief overview of what came out of an intensive rapid prototyping session. [Russ] originally thought that moving the coil would be the way to go, but a friend put him onto the idea of using his delta-style 3D-printer to dispense the wire. An attachment somewhat like a drag knife was built, but with a wire feed tube and a metal roller to press the wire down onto an adhesive surface. The wire feed assembly went through a few design iterations before he discovered that a silicone cover was needed for the roller for the wire to properly track, and that the wire spool needed to be fed with as little friction as possible. Fusion 360s CAM features were used to design the tool paths that describe the coils. It seems quite effective, and watching it lay down neat lines of magnet wire is pretty mesmerizing.

Weve seen a couple of cylindrical coil winding rigs before, but it looks like this is the first flat coil winder weve featured. We cant help but wonder about the applications. Wireless power transfer comes to mind, as do antennas and coils for RF applications. We also wonder if there are ways to use this to make printed circuit boards.

Thanks to [smerrett79] for the tip.

Go Back:30 Days | 7 Days | 2 Days | 1 Day

IndyWatch Science and Technology News Feed Today.

Go Forward:1 Day | 2 Days | 7 Days | 30 Days

Saturday, 16 June


AMDGPU Performance Tests With New WattMan-Like Settings, Power Capping Phoronix

With the recent stable debut of the Linux 4.17 kernel, one of the most common performance test requests coming in has been for checking out the Radeon WattMan-like support that was introduced with the Linux 4.17 AMDGPU code for recent generations of Radeon graphics card. Here are some benchmarks of that and on a somewhat related note also some Linux gaming benchmark results when carrying out some power capping tests to restrict the graphics card to a given Wattage...


Westworld science adviser shares his vision of robots and the future of AI Lifeboat News: The Blog

David Eagleman, the science adviser for HBOs TV series Westworld, shares his thoughts on the future of AI and whether robots will ever become conscious.


Europol dismantled the Rex Mundi hacker crew, it arrested another member of the gang Security Affairs

The Europol announced that several French nationals were arrested in the past year on suspicion of being involved with notorious Rex Mundi crime gang.

Another success of the Europol made the headlines, the European police announced that several French nationals were arrested in the past year on suspicion of being involved with notorious hacker group known as Rex Mundi (King of the World).

The Rex Mundi crime group has been active since at least 2012. it hacked into the systems of several organizations worldwide and attempted to blackmail them.

The list of the victims is long and includes AmeriCash Advance, Webassur, Drake International, Buy Way, Hoststar,, Numericable, Habeas, AlfaNet, Dominos Pizza, and the Swiss bank Banque Cantonale de Geneve (BCGE).

The hackers used to steal sensitive information from the victims, then they demanded fees for not disclosing the stolen data.

The operation coordinated by the Europol was launched in May 2017 after the group targeted a UK-based company. Crooks stole significant amounts of customer data from the company, then attempted to blackmail it by demanding the payment of a bitcoin ransom of nearly 580,000 ($670,000) for not disclosing the incident. The group also requested more than 825,000 ($776,000) for details on the hack.

The hackers also asked the victim additional 210,000 ($240,000) for each day the payment was delayed.

A 25-year-old coder was arrested on 18 May by the Royal Thai Police based on a French international arrest warrant. The arrest of this young cybercriminal was the eight in an international operation supported by Europol and the Joint Cybercrime Action Taskforce (J-CAT)  that started exactly one year ago. reads the announcement published by the Europol.

In May 2017 a British-based company was the victim of a cyber-attack during which a large amount of customer data was compromised. The a...


More Mitigations for (potential) CPU Vulnerabilities OpenBSD Journal

There have been more developments in the continuing work mitigating against (Intel, and potentially other) CPU vulnerabilities

Philip Guenther (guenther@) committed the following:

Read more


LDAP client added to -current OpenBSD Journal

Reyk Floeter (reyk@) has committed a simple LDAP client to -current:

CVSROOT:   /cvs
Module name:    src
Changes by:    2018/06/13 09:45:58

Log message:
    Import ldap(1), a simple ldap search client.

Read more


To put a quantum computer on your desk, Intel has a plan unlike any other Lifeboat News: The Blog

Quantum computers, once they become common, will complete difficult tasks thousands of times more quickly than current PCs. That could obviously threaten a classic chipmaker like Intel, but it plans to use its knowledge of silicon production to build quantum chips more quickly than its peers.


Introducing Graphene-ng: Running Arbitrary Payloads in Intel SGX Enclaves SoylentNews

A few months ago, during my keynote at Black Hat Europe, I was discussing how we should be limiting the amount of trust when building computer systems. Recently, a new technology from Intel has been gaining popularity among both developers and researchers, a technology which promises a big step towards such trust-minimizing systems. I'm talking about Intel SGX, of course.

Intel SGX caught my attention for the first time about 5 years ago, a little while before Intel has officially added information about it to the official Software Developer's Manual. I've written two posts about my thoughts on this (then-upcoming) technology, which were a superposition of both positive and negative feelings.

Over the last 2 years or so, together with my team at ITL, we've been investigating this fascinating technology a bit closer. Today I'd like to share some introductory information on this interesting project we've been working on together with our friends at Golem for several months now.

Original Submission

Read more of this story at SoylentNews.


Links 16/6/2018: LiMux Story, Okta Openwashing and More Techrights

GNOME bluefish



  • Desktop

    • The LiMux desktop and the City of Munich

      There has been a lot of back and forth around the use of Free Software in public administration. One of the latest initiatives in this area was started by the Free Software Foundation Europe, FSFE. It focuses on the slogan: Public Money Public Code. There are various usage scenarios for Free Software in public administration. The span ranges from the use of backend technology over user-facing software, e.g. LibreOffice, up to providing a whole free desktop for the administrative staff in a public service entity such as a city council. In this article we will focus on the latter.

      When the desktops in an administration are migrated to Linux, the administration becomes a distribution provider. An example for this is the LiMux desktop, that powers the administration of the city of Munich since 2012.

      LiMux is a distribution, maintained by the central IT department of the City of Munich. Technically, it builds upon Kubuntu. It provides specific patches, a modified user experience and an automatic distribution system, so all desktops in all departments of the city can be easily administered and offer a consistent user experience.

      Distributions in the Free Software ecosystem have different roles, one of them surely being the provider of the finishing touches, especially to important software for its own users. Obviously public administration has special demands. Workflows and documents for example have a totally different importance than for the average Kubuntu user.

      In Munich for example, architects in one department complained that Okular, the LiMux and KDE pdf reader, would freeze when they tried to open large construction plans. When the city investigated this issue further, they found out that actually Okular wouldnt freeze, but loading these large maps would simply occupy Okular for quite a while, making the user think it crashed.

    • The 10 Most Beautiful Linux Icon Themes of 2018

      You might...


Titanium Knob Doesnt Grind Our Gears Hackaday

Manual transmissions! Those blessed things that car enthusiasts swear by and everyone else pretends no longer exists. Theyre usually shifted by using the gearstick, mounted in the centre console of the car. Swapping out the knob on the gearstick is a popular customization; you can have everything from 8-balls to skulls, to redback spiders mounted in epoxy, sitting proud atop your gearstick. Its rare to see anything new under the sun, but [John Allwine] came up with something wed never seen before.

[John]s design leans heavily on the unique ability of additive manufacturing to produce complex hollow geometries that are incredibly difficult or impossible to produce with traditional subtractive methods. The part was designed in CAD software, and originally printed on a Makerbot in plastic. After this broke, it was decided to instead produce the part in stainless steel using Shapeways custom order process. You can even buy one yourself. This is a much smarter choice for a part such as a gearknob which undergoes heavy use in an automotive application. The part is printed with threads, but due to the imperfect printing process, these should be chased with a proper tap to ensure good fitment.

The design was eyecatching enough to grab the attention of a professional engineer from a 3D printing company, who worked with [John] to make the part out of titanium. Its a very tough and hardy material, though [John] notes it was an arduous task to go about tapping the threads because of this.

Its a great example of what can now be achieved with 3D printing technology. No longer must we settle for plastic through services like Shapeways, its now possible to 3D print attractive metal parts in complex designs! And, if youve got the right friends, you can even step it up to titanium, too.

Weve seen other takes on the 3D shifter handle, too like this head.



Re: CVE-2018-12356 Breaking signature verification in pass (Simple Password Store) Open Source Security

Posted by Marcus Brinkmann on Jun 16


I didn't take it that way!

Hehe, everybody does. Luckily, we found some hackers in Mauritius taking
care of it!

First results:





Fedora 29 Will Cater i686 Package Builds For x86_64, Hide GRUB On Boot Phoronix

The Fedora Engineering and Steering Committee (FESCo) approved on Friday more of the proposed features for this fall's release of Fedora 29, including two of the more controversial proposals...


Sweden Mobilizes Home Guard for First Time Since 1975

Via: The Local: Swedens 22,000 volunteer soldiers were on Tuesday evening grabbing their guns and uniform, cancelling social engagements, and rushing to their stations, as the Swedish Armed Forces launched its biggest surprise exercise since 1975. The idea behind this exercise is that we are now strengthening our military defence of the country, Swedens Supreme []


Syscoin Github has been breached, hacker replaced Syscoin Windows client with tainted version Security Affairs

The GitHub account of the Syscoin cryptocurrency was compromised by hackers that replaced the official Syscoin Windows client with a tainted version.

The Syscoin clients allow users to mine Syscoin cryptocurrency or manage Syscoin funds.

Syscoin Windows client

The other versions in the v3.0.4.1 release were not replaced, this means that Mac and Linux clients were not replaced by the hackers.

The Syscoin developers found that a malicious, unsigned copy of the Windows Syscoin installer was made available via the Syscoin Github release page on June 9th, 2018 due to a compromised GitHub account. This installer contained malicious code. (Trojan:Win32/Feury.B!cl) reads the security notice published by the development team.

The virustotal scan of the malicious file named re.exe that is saved to the local temp folder (C:\Users\user\AppData\Local\Temp) upon running the fake installer:

The Syscoin team discovered the security breach after receiving a warning from users that Windows Defender SmartScreen, AVG and Kaspersky was marking downloads of the Syscoin Windows client as a virus.

The affected executabl...


Solaris 11.3 SRU 33 Better Deals With ZFS Sending Of Compressed Data & More Phoronix

Oracle Solaris 11.4 is still being prepared for release but in the meantime there is now the thirty-third stable release update for Solaris 11.3...


The Next Plague Is Coming. Is America Ready? Lifeboat News: The Blog

Yet even the U.S. is disturbingly vulnerableand in some respects is becoming quickly more so. It depends on a just-in-time medical economy, in which stockpiles are limited and even key items are made to order. Most of the intravenous bags used in the country are manufactured in Puerto Rico, so when Hurricane Maria devastated the island last September, the bags fell in short supply. Some hospitals were forced to inject saline with syringesand so syringe supplies started running low too. The most common lifesaving drugs all depend on long supply chains that include India and Chinachains that would likely break in a severe pandemic. Each year, the system gets leaner and leaner, says Michael Osterholm, the director of the Center for Infectious Disease Research and Policy at the University of Minnesota. It doesnt take much of a hiccup anymore to challenge it.

The epidemics of the early 21st century revealed a world unprepared, even as the risks continue to multiply. Much worse is coming.

Image above: Workers at the University of Nebraska Medical Centers biocontainment unit practicing safe procedure on a mannequin.


Lithium Battery Advancements SoylentNews

Two soylentils have submitted stories about improvements in lithium battery storage capacity. The first focuses on the cathode while the second features improvements in the anode.

Tripling the Energy Storage of Lithium-Ion Batteries

Submitted via IRC for BoyceMagooglyMonkey

A collaboration led by scientists at the University of Maryland (UMD), the U.S. Department of Energy's (DOE) Brookhaven National Laboratory, and the U.S. Army Research Lab have developed and studied a new cathode material that could triple the energy density of lithium-ion battery electrodes. Their research was published on June 13 in Nature Communications.

"Lithium-ion batteries consist of an anode and a cathode," said Xiulin Fan, a scientist at UMD and one of the lead authors of the paper. "Compared to the large capacity of the commercial graphite anodes used in lithium-ion batteries, the capacity of the cathodes is far more limited. Cathode materials are always the bottleneck for further improving the energy density of lithium-ion batteries."

Scientists at UMD synthesized a new cathode material, a modified and engineered form of iron trifluoride (FeF3), which is composed of cost-effective and environmentally benign elementsiron and fluorine. Researchers have been interested in using chemical compounds like FeF3 in lithium-ion batteries because they offer inherently higher capacities than traditional cathode materials.


Read more of this story at SoylentNews.


Scientists have captured the elusive cell that can regenerate an entire flatworm Lifeboat News: The Blog

KANSAS CITY, MO Researchers at the Stowers Institute for Medical Research have captured the one cell that is capable of regenerating an entire organism. For over a century, scientists have witnessed the effects of this cellular marvel, which enables creatures such as the planarian flatworm to perform death-defying feats like regrowing a severed head. But until recently, they lacked the tools necessary to target and track this cell, so they could watch it in action and discover its secrets.

Now, by pioneering a technique that combines genomics, single-cell analysis, flow cytometry and imaging, scientists have isolated this amazing regenerative cell a subtype of the long-studied adult pluripotent stem cell before it performs its remarkable act. The findings, published in the June 14, 2018, issue of the journal Cell, will likely propel biological studies on highly regenerative organisms like planarians and also inform regenerative medicine efforts for other organisms like humans that have less regenerative capacity.

This is the first time that an adult pluripotent stem cell has been isolated prospectively, says Alejandro Snchez Alvarado, Ph.D., an investigator at the Stowers Institute and Howard Hughes Medical Institute and senior author of the study. Our finding essentially says that this is no longer an abstraction, that there truly is a cellular entity that can restore regenerative capacities to animals that have lost it and that such entity can now be purified alive and studied in detail.


Singapore was hit by an unprecedented number of attacks during the Trump-Kim Summit Security Affairs

Researchers observed a spike in the number of cyber-attacks targeting Singapore during the Trump-Kim Summit, from June 11 to June 12.

Researchers at F5 Labs have observed a spike in the number of cyber-attacks targeting Singapore from June 11 to June 12, in the wake of the meeting between U.S. President Donald Trump and North Korean President Kim Jong-un in a Singapore hotel.

Experts remarked that typically Singapore is not a top attack destination, and the skipe of the number of attacks coincides with Trump-Kim Jong-un meeting.

Most of the attacks originated from Russia (88% of overall attacks) and frankly speaking, Im not surprised due to the importance of the Trump-Kim summit.

According to F5 Labs and Loryka, 97% of all the attacks that originated from Russian from June 11 to June 12 targeted Singapore.

From June 11 to June 12, 2018, F5 Labs, in concert with our data partner, Loryka, found that cyber-attacks targeting Singapore skyrocketed, 88% of which originated from Russia. Whats more, 97% of all attacks coming from Russia during this time period targeted Singapore. reads the analysis published by F5 Labs. We cannot prove they were nation-state sponsored attacks, however the attacks coincide with the day President Donald Trump met with North Korean President Kim Jong-un in a Singapore hotel.

The cyber attacks hit almost any computer system, from VoIP phones to IoT devices. The attacks began out of Brazil targeting port SIP 5060 of IP phones where communications are transmitted in clear text.

After an initial attack that lasted for a couple of hours, researchers observed a reconnaissance activity originated from the Russian IP address that is owned by ASN 49505, operated by Selectel; the scans targeted a variety of ports.

None of the attacks was carried out to spread malware.

The number two attacked port was Telnet, consistent with IoT device attacks that could be leveraged to gain access to or listen in on targets of interest. continues the analysis.

Other ports attacked include the SQL database port 1433, web traffic ports 81 and 8080, port 7541, which was used by Mirai and Annie to target ISP-managed routers, and port 8291, which was targeted by Hajime to PDoS MikroTik routers.

Singapore was hit by 40,000 attacks in just 21 hours, starting at 11:00 p.m. on June 11 through 8:00 p.m. June 12, local time.

The experts highlighted that only 8% were exploit attacks, while 92% were reconnaissance scans for potential targets.

34% of the attacks originated from Russia, the list of top attackers includes China, the US, France, and Italy.



Portable Ham Radio Design Fosters Experiments Hackaday

[Charlie Morris] has been busy building a portable ham radio rig and documenting his progress in a series of videos. You can see the first one below. Theres four parts (more if you count things like part 4 and part 4a as two parts) so far and it is always interesting to see inside a build like this, where the choices and tradeoffs are explained.

The first part covers the Si5351 VFO and the associated display. Theres very little to the VFO other than off-the-shelf modules including an Arduino. You can also see the portable Morse code key which is actually a micro switch. The second part experiments with audio amplifiers. [Charlie] looked at the NE5534 vs discrete amplifiers. He was shooting for lowest current draw that was usable. Other parts discuss the RF amplifier and the receiver. Despite the VFO, there is quite a bit of non-module parts by the time things start shaping up.

Theres a lot of good information about why he selected particular devices and component values. Theres doubtless more videos to come, but theres enough there now to get started. You can not only pick up some design ideas, but looking at the neat prototype construction can give you some thoughts too.

We arent sure what the final project will look like, but we are sure it will be interesting to follow along. [Charlie] has done other homebrew radio design videos and they are always educational.

If you want to look more into the audio amplifier part, you might enjoy our take on the common emitter amplifier. If you want some more to watch about RF design, we like [Michael Ossmanns] workshop.


Some Of The Early Ideas For Intel's New FreeBSD Improvement Effort Phoronix

Two weeks back we shared the news that one of Intel's open-source Linux graphics driver veterans decided to change roles and is now focused on improving FreeBSD for Intel hardware. Ben Widawsky is working on FreeBSD improvements that can at least relate to Intel and it turns out the company has a new team of developers on the task...


Paul Manafort accused of foldering to hide communications Graham Cluley

Paul Manafort accused of 'foldering' to hide communications

Foldering is a way of communicating without sending a message.


DOJ refusing to give Grassley access to agent who interviewed Flynn Terra Forming Terra

Why is our attention been brought to bear on this interview and the related notes?  could there be something impacting someone else?  just how would an FBI agent cover himself if ordered to do something?  
If you are aware, you understand that the MSM has chosen to ignore masses of direct evidence relating to the past administration that is seriously damaging and criminal as well.   This fact is only possible through a monopolistic censorship which we are all now seeing.

The Alt media has run with this mountain of direct evidence and has used it to build their audience by obviously showing their followers how to confirm the evidence.
Countering this explicit censorship we have the administration and elected officials slowly forcing points of friction in order to inform the American public of the grave nature of what was been attempted.  The good news is that those forces are at least in retreat but are not yet defeated.
That is why this is important.  Why this now?.
DOJ refusing to give Grassley access to agent who interviewed Flynn

By Alex Pappas | Fox News

Special counsel Mueller ordered to turn over Flynn evidence. Judge Napolitano offers his legal expertise.

Senate Judiciary Committee Chairman Chuck Grassley isn't backing down as the Justice Department rebuffs his repeated attempts to speak with the FBI agent whose interview with Michael Flynn was used to indict the ex-national security adviser in the Russia probe.

This is no ordinary criminal case, Grassley, R-Iowa, wrote...


NK Qanon Terra Forming Terra

The intel feed from Q has been fast and furious the last three days. You need to know this.

1 all the Q posts are archived at
2 New today - all proofs at  This is important because public demand for information is about to hugely expand and though some have been tracking this most have not.

Iranian freedom fighters are tagging Qanon on their tweets.  This is huge. That means mil intel is able to support efforts to remove the Mullahs inside Iran directly with actionable Intel. This is a completely new type of warfare.  The potentiality is scary.

Let us now talk about NK. We saw a publicity event that clearly brought NK back into the community of nations with regularizing of communication between the Hermit Kingdom.  Obviously, this is extremely important.

I expected more in the declaration but then I am hardly privy to the thinking behind it.  I certainly think that there is a working group establishing a unification plan that makes all concerns moot.  Truth is, that this is NK and SK business and it is clearly in full swing.

Thus this summit was a coming out party and a major effort to rehabilitate Kim's reputation and stop the demonizing.  It went wonderfully.  Kim really wants to see Disney land and so do his government...

Jun 13 20181489
Q !CbboFOtcZs ID: 4d9abd No.1730584 NEW
Jun 13 2018 12:23:17 (EST)8fdJ30HUSlN4r0ul9TZFwSUIWF3TxUw1DygFctjRw_A.jpg
Busy day.
Q !CbboFOtcZs ID: 4d9abd No.1730618 NEW
Jun 13 2018 12:26:27 (EST)
Why are...


Deputy Attorney General Rod J. Rosenstein Delivers Remarks at the International Economic Forum of the Americas Conference of Montreal Terra Forming Terra

 RR  is very much at the center of Comey's attempt to damage the incoming Trump presidency and is now in charge of the 'Mueller' investigation.   I suspect both he and Mueller are playing a double game in support of the clean up of the FBI in particular or alternately they are the principals of a horrendous plot. 

Sessions recused himself to allow them to run their game without compromising himself which would have been a desired outcome for the DEEP STATE.  He in the meantime has launched serious investigations aimed at rolling up that DEEP STATE.

This speech is a worthy read and worthy of his position.  I hope in the end he is remembered for this and goes on to successfully lead a cleansed FBI.  .


Deputy Attorney General Rod J. Rosenstein Delivers Remarks at the International Economic Forum of the Americas Conference of Montreal


GOOGLE Has Those Emails Terra Forming Terra

Holy Crap Sunshine!!!

The idiots all had active gmail accounts and all did their skullduggery there off the government system.  ES resigned the moment Trump issued his EO in December.  What this tells me is that Google is cooperating or soon will be and is recovering all those emails that Hilary and others chose to lose.
It says something that they had things to say to each other that posterity was not allowed to know.  This is called a working conspiracy and is certainly in need of detailed investigation. 

They really were this stupid, even knowing the data was been collected somewhere.  Yet we are likely looking at historical methods from pre super surveillance days that simply may have ran out of time.

The true irony is that Big Brother is actually here and that it will be used to surveil any potential DEEP STATE from now on.  After all the citizen has surrendered his power to the STATE.

Jun 15 2018 1503
Anonymous ID: 9d2b15 No.1763093 NEW
Jun 15 2018 17:43:25 (EST)
Another Q proof!


Flawed Randomization of Clinical Trials Leads to Retraction, Replacement of Mediterranean Diet Paper SoylentNews

Errors Trigger Retraction Of Study On Mediterranean Diet's Heart Benefits

Ask just about anybody, and you'll probably hear that a healthy diet is one full of fruits and vegetables, olive oil, nuts and fish what's called Mediterranean diet. A lot of research has suggested people who eat this way tend to be healthier, but it's been harder to prove whether that is because of the diet or some other factor. So in 2013, many took notice of a study in the New England Journal of Medicine that seemed to provide some proof. The study found that people eating the Mediterranean diet supplemented with olive oil were 30 percent less likely to experience a heart attack, stroke, or death from cardiovascular causes than people assigned to a low-fat diet. People who stuck with a Mediterranean diet supplemented with mixed nuts had a 28 percent lower risk than those asked to follow a low-fat diet.

Anesthesiologist Dr. John Carlisle published an analysis of clinical studies in 2012 that led to the retraction of over 160 papers by Dr. Yoshitaka Fujii due to improper randomization of study participants. He began applying his method to thousands of other studies, including 934 in the New England Journal of Medicine. He flagged 11 of them, including the 2013 Mediterranean diet paper. The lead author of the paper confirmed that there were problems with randomization in the study:

It turns out approximately 14 percent of the more than 7,400 study participants hadn't been assigned randomly to either the Mediterranean diet or a low-fat one. When couples join...


Yandex and Google Put on Notice Over Pirate Search Results TorrentFreak

With the online piracy wars about to enter their third decade, theres an increasing emphasis on pressurizing influential third-parties to tackle the problem.

As a result, much blame is laid at the feet of companies like Google, who are regularly blamed for not doing more to tackle infringements carried out by individuals and entities outside of their control.

Search results are a particularly sticky subject. Google, Bing, and Yahoo, for example, wish to provide the most comprehensive indexes possible. On the flip side, entertainment industry companies insist that those indexes shouldnt help people find pirated content. If they do, its argued that these companies act as piracy facilitators.

This familiar battle is now underway in Russia, where Yandex is in receipt of a strongly-worded letter which accuses the search giant of being a big part of the piracy problem.

According to local publication Vedomosti, the letter is signed by Leonid Agronov, general director of the National Federation of the Music Industry, Alexei Byrdin, general director of the Internet Video Association, Sergei Selyanov, director of the Association of Film and Television Producers, and Pavel Stepanov, president of the Media Communication Union.

The entertainment giants explain that due to pirate search results appearing in its indexes, Yandex is contributing to the growth of online piracy. They want the company to show responsibility by adopting measures to both find and remove infringing links from search and related products.

We urge Yandex to use all available methods to detect illegal content and eliminate it both from search results and from the applications and services of Yandex, the letter reads.

Its suggested that Yandex should take a similar path to that taken by search companies in the UK, via the signing of a Memorandum of Understanding which declares common interests in fighting piracy.

Yandex wont be alone, however.

A spokesman for the Media and Communications Union, which is one of the groups behind the letter, told Vedomosti that a similar letter would be sent to Google in the near future. Needless to say, Google is no stranger to these kinds of allegations, whether in Europe or the United States.

In the letter, search engines like Yandex are accused of promoting illegal resources over legal content, resulting in revenue being siphoned away from legitimate players and into the hands of criminals. The search engine is also accused of taking down material in response to demands under the DMCA, but not doing enough in Russia.

Yandex active...


U.S. Prosecutors Pull Encrypted Messages from Phones Seized in Cohen Raids

With regard to any application that claims to provide privacy: The simple fact is that the platforms on which it runs are compromised from the operating systems down to the silicon. Im not saying to not encrypt. Encryption can prevent your data from falling into the hands of thieves, Google and maybe the local police. []


Chinese satellite snags new views of Earth from lunar orbit Lifeboat News: The Blog

On May 20, China launched Queqiao, a lunar communications relay satellite for the upcoming Change 4 lander and rover mission. On the way out to the Moon, it dropped off a pair of small satellites bound for lunar orbit called Longjiang-1 and Longjiang-2. The satellites weigh just 45 kilograms each and measure 50-by-50-by-40 centimeters. Their purpose is testing out future radio astronomy and interferometry techniques, and one also has a camera built by Saudi Arabia.

Unfortunately, Longjiang-1 had a problem and didnt make it into lunar orbit. Longjiang-2, however, was successful, and sent home a few pictures! Check them out:


NVIDIA Contributes EGLStreams Improvements For GNOME's Mutter Wayland Support Phoronix

GNOME's Mutter Wayland compositor support is among the few Wayland implementations offering support for EGLStreams so it can play along with the approach used by the NVIDIA proprietary driver as an alternative to the GBM API used by the open-source graphics drivers. One of the NVIDIA engineers has just furthered along Mutter's EGLStreams support...


MRI to 3D Print Gets Much Faster Hackaday

A surprising use of 3D printing has been in creating life-like models of human body parts using MRI or CT scans. Surgeons and other medical professionals can use models to plan procedures or assist in research. However, there has been a problem. The body is a messy complex thing and there is a lot of data that comes out of a typical scan. Historically, someone had to manually identify structures on each slice a very time-consuming process or set a threshold value and hope for the best. A recent paper by a number of researchers around the globe shows how dithering scans can vastly improve results while also allowing for much faster processing times.

As an example, a traditional workflow to create a 3D printed foot model from scan data took over 30 hours to complete including a great deal of manual intervention. The new method produced a great model in less than an hour.

One thing the researchers note is that the technique should be easy to adopt since it uses all open source software and existing image processing algorithms. There are some limitations, though. There are several things that limit the resolution and can introduce inaccuracies. For example, MRI intensity versus actual tissue appearance is highly variable based on the scanning machines settings and operator.

The researchers also note that advances in scanning technology will make even better 3D printed models possible. Naturally though, these prints arent coming off a $150 hobby-grade printer. The Connex500 printer used costs a cool quarter of a million dollars. It can print up to 14 different materials in the same job and has a reasonably large build volume (500x400x200 mm). That price, however, doesnt include the water station to wash away support material, so budget accordingly.

We couldnt help but wonder if you will one day have a bad part of your body scanned, printed, and then youll get the new part to replace the old. It seems like if you have a model of a body part, it would be just a little math to print a perfect cast, brace, or splint, too. But, then again, we arent doctors.

Photo Credit: Steven Keating and Ahmed Hosny/Wyss Institute at Harvard University


Why the Music Industry Should Treasure its Vinyl and CD Superfans SoylentNews

Kim Bayley breaks down UK spending statistics to show that superfans buying old school physical media are providing for 15% of the UK's total retail music market, even when streaming is counted. She asserts that curtailing the availability of these physical storage media will damage not just retailers, but the overall health of the music industry itself. In doing so, she presents a strong economic case for why the music industry should treasure its vinyl and CD superfans.

Naturally it would have a clear financial cost: according to ERA's research those 157,000 vinyl Superfans spent between them 63m on vinyl in 2017, equivalent to more than half a million 525,000 premium music subscriptions.

In other words, lose a town's worth of vinyl buyers the size of Chelmsford and you need a city's worth of premium music subscribers the size of Manchester to make up the loss.

When it comes to CD, the impact is even greater. ERA's researches show that in 2017 an incredible 292,000 Britons spent 400 or more on the format. That's equivalent to buying a CD virtually every week.

Original Submission

Read more of this story at SoylentNews.


White House Announces 25 Percent Tariff on Chinese Tech Goods

Via: The Verge: Today, President Trump announced an aggressive new set of tariffs against China, setting a 25 percent import tax on $50 billion worth of industrially significant technologies imported from China. In previous discussions, China has threatened to retaliate against such tariffs, stoking fears of a far-reaching and unpredictable trade war between the countries. []


RISC-V Changes Merged For Linux 4.18, Early Perf Subsystem Work Phoronix

Initial RISC-V architecture support was added to the Linux 4.15 kernel and in succeeding kernel releases have been mostly modest updates. With Linux 4.18 the RISC-V changes are on the small side still, but with a few notable additions for this open-source, royalty-free processor ISA...


Rampant Spam, Falling Registrations Show New gTLDs Have Limited Business Value SoylentNews

New gTLDs are becoming less popular, as registrations have fallen precipitously over the last year. Verisign's recently released Q1 2018 Domain Name Industry Brief indicates that new gTLDs represent only 6%, or 20.2 million, of the total of registered TLDs.

The report indicates that active registrations of new gTLDs "decreased by approximately 5.3 million domain name registrations, or 20.7 percent, year over year." Of the top 10 most used new gTLDs, four were listed in Symantec's Top 20 list. Meanwhile, registrations overall increased by 3.2 million, year over year.

[...] Last year, a group of researchers at the Delft University of Technology and SIDN Labs in The Netherlands found (PDF link) that there are "higher concentrations of compromised domains in legacy gTLDs" but that "miscreants frequently choose to maliciously register domain names using one of the new gTLDs." The number of spam domains per 10,000 for new gTLDs was nearly 10 times that of standard gTLDs like .com. However, not all new gTLDs are a problem, as approximately one-third of new gTLDs had zero reported incidents of spam. But, according to the researchers, "Spamhaus blacklisted at least 10% of all 24 registered domains in as many as 15 new gTLDs at the end of 2016."

Original Submission

Read more of this story at SoylentNews.


Changing Color Under Pressure Hackaday

When you saw the picture for this article, did you think of a peacocks feather? These fibers are not harvested from birds, and in fact, the colors come from transparent rubber. As with peacock feathers, they come from the way light reflects off layers of differing materials, this is known as optical interference, and it is the same effect seen on oil slicks. The benefit to using transparent rubber is that the final product is flexible and when drawn, the interference shifts. In short, they change color when stretched.

Most of the sensors we see and feature are electromechanical, which has the drawback that we cannot read them without some form of interface. Something like a microcontroller, gauge, or a slew of 555 timers. Reading a single strain gauge on a torque wrench is not too tricky, but simultaneously reading a dozen gauges spread across a more complex machine such as a quadcopter will probably require graphing software to generate a heat map. With this innovation it could now be done with an on-board camera in real-time. Couple that with machine learning and perhaps you could launch Skynet. Or build a better copter.

The current proof-of-concept weaves the fibers into next-generation bandages to give an intuitive sense of how tightly a dressing should be applied. For the average first-aid responder, the rule is being able to slide a finger between the fabric and skin. Thats an easy indicator, but it only works after the fact whereas saying that the dressing should be orange while wrapping gives constant feedback.


Depression Strongly Correlated with Taking Three or More Common Drugs Simultaneously SoylentNews

1 in 3 Adults In The U.S. Take Medications That Can Cause Depression. These drugs already list depression as a possible symptom:

If you take Prilosec or Zantac for acid reflux, a beta blocker for high blood pressure, or Xanax for anxiety, you may be increasing your risk of depression.

More than 200 common medications sold in the U.S. include depression as a potential side effect. Sometimes, the risk stems from taking several drugs at the same time. Now, a new study finds people who take these medicines are, in fact, more likely to be depressed.

The list includes a wide range of commonly taken medications. Among them are certain types of proton pump inhibitors (PPIs) (used to treat acid reflux), beta blockers, anxiety drugs, painkillers including ibuprofen, ACE inhibitors (used to treat high blood pressure), and anti-convulsant drugs.

I often take Zantac or Rantab for acid reflux. I used to take the beta blocker propanolol for the hand tremor caused by the anti-convulsant Depakote.

About 15 percent of participants who simultaneously used three or more of these drugs were depressed. By comparison, among participants who didn't use any of the medications, just 5 percent were depressed. Even those who used just one of these medications were at slightly higher risk of depression: About 7 percent were depressed.

See also:

Original Submission

Read more of this story at SoylentNews.


Chinese hackers attack National Data Center using watering hole attack HackRead

By Waqas

The IT security researchers at Kaspersky Lab have published a

This is a post from Read the original post: Chinese hackers attack National Data Center using watering hole attack


Facebook Won't Commit to Not Listening to Your Conversations SoylentNews

Submitted via IRC for Runaway1956

Facebook has consistently denied allegations that it listens to its users' conversations through their phone's microphone, but a new document suggests the tech giant has not ruled out doing so in the future.

Facebook users have been sharing circumstantial evidence for several years that suggests Facebook snoops on their private conversations in order to deliver more personalised ads. In April, US lawmakers finally brought the concerns to CEO Mark Zuckerberg in a hearing about data misuse on the firm's platform.

The social media firm released a 454-page document this week to follow up with questions posed to Mr Zuckerberg, after he was criticised for evading some of the most important ones.


Documents can be found here:
Zuckerberg Testimony
Responses to Commerce Committee
Responses to Judiciary Committee

[Editor's Note: the two response documents are 229 and 225 pages, respectively for a total of 454 pages.]

Original Submission

Read more of this story at SoylentNews.


Mesa 18.1.2 Released With Several RADV & Intel Driver Fixes Phoronix

New Mesa release manager Dylan Baker has issued the second point release of the Mesa 18.1 series...


Homebrew Calibration For Test Equipment Hackaday

If you work for a large company, you probably have test equipment that is routinely calibrated. Some companies have their own metrology labs and others send out to an external lab. In a garage lab, you are less likely to do calibrations and in our experience that isnt usually a problem. Still, it is nice to be able to do at least a sanity check on your gear. Also, if you buy old test gear and repair it, it would be nice to be able to check it, as well. [IMSAI guy] built his own little calibration setup, adding to it over the years, and he shares the details in a recent video, which you can see below.

The board started out simply as one voltage regulator and some 0.01% resistors. Over time, though, he added a few more bells and whistles. The setup isnt going to rival a NIST-traceable lab setup, but for your garage it is perfectly fine.

The regulators are really precision voltage reference ICs that are readily available, so they should be better than your old bench supply. However, we didnt think youd really want to slavishly copy this design, but the idea of having a single calibration kit on a board is something you can grow organically out of your junk box and hamfest finds.

Among the additions to the board are a precision oscillator module from an old GPS and a second voltage reference. The initial reference was a 10V device that is specified to have a maximum error at room temperature of +/- 0.05%. He might have wanted to put some diode protection on the device, though, since reverse wiring it destroyed it. On the plus side, it caused him to look to see if any new better devices.

So when he replaced the reference he also added an AD587 as a second 10V reference which is just as accurate and has an ability to trim the output (although he doesnt use that capability).

Of course, if you get obsessed with calibration, you might want to get a rubidium standard in fact, one shows up in the video. There are also a variety of precision resistors weve looked inside of in the past.


Scientists Discover Biomarker for Flu Susceptibility SoylentNews

Researchers at the Stanford University School of Medicine have found a way to predict whether someone exposed to the flu virus is likely to become ill.

Purvesh Khatri, PhD, associate professor of medicine and of biomedical data science, and his team used a computational approach to pinpoint a blood-based genetic biomarker to determine an individual's susceptibility to the disease.

"We've been after this for about four years," Khatri said. "To our knowledge, it's the first biomarker that shows susceptibility to influenza, across multiple strains."

The biomarker is a gene called KLRD1, and it essentially acts as a proxy for the presence of a special type of immune cell that may be a key to stamping out nascent flu infection. Put simply: the more of this cell type found in a person's blood, the lower their flu susceptibility. The research even hints at new avenues for pursuing a broadly applicable flu vaccine.

A paper describing the work will be published online June 14 in Genome Medicine. Khatri is the senior author. Graduate student Erika Bongen is the lead author.

[...] Khatri said his findings could help health professionals understand who's at the highest risk for flu infection. "If, for example, there's a flu epidemic going on, and Tamiflu supplies are limited, this data could help identify who should be prophylactically treated first," Khatri said.

Khatri emphasizes that for now, the link between KLRD1 levels and influenza susceptibility is only an association. The next step, he said, is to find the mechanism.

Original Submission

Read more of this story at SoylentNews.


PayPal Bans Soulseek Over Piracy Concerns, Again TorrentFreak

Founded around the turn of the last century, Soulseek is a small dinosaur in the file-sharing world.

Created by former Napster programmer Nir Arbel, the application swiftly turned into a tight community of music fans, which is still active today.

Over the years Soulseek operators Nir and Roz Arbel have seen other file-sharing tools come and go, but all this time they remained dedicated to their principles. Despite its name, Soulseek had long found its purpose.

While it kept a relatively low profile, Soulseek is not immune to the stigma that comes with being a file-sharing tool. In 2015, PayPal cut off its ability to collect donations, claiming that sharing tools required pre-approval, even though that policy didnt exist when it signed up.

Soulseek is not a profit-oriented platform but donations are welcomed. Without PayPal, this became a challenge, but luckily for the developers, the Electonic Frontier Foundation (EFF) was able to intervene.

February 2016 everything returned to normal when the PayPal account was restored, for a while at least. Earlier his year, PayPal apparently changed its mind and booted the application once again.

Soulseek operator Roz Arbel was told that the application violated the payment services acceptable use policy and that pre-approval was required for file-sharing tools. It was pretty much the same recycled argument from years before.

Faced with this deja-vu, Soulseek turned to EFF for help once again, but this time PayPal wouldnt budge.

PayPal made it clear that theyre not willing to offer Soulseek financial services any longer. The company did give the Arbels access to their funds and tax documentation, after a request from EFF, the digital rights group writes.

EFF asked whether PayPals latest ban was linked to a concrete copyright complaint, but the payment processor didnt provide any further information. It just confirmed that Soulseek was banned, apparently for good.

This stance doesnt come as a complete surprise. PayPal is widely known for its aggressive stance towards BitTorrent sites, Usenet providers and file-host...


Theranos founder Elizabeth Holmes charged with fraud The Hill: Technology Policy

Elizabeth Holmes, the founder of the embattled health startup Theranos, on Friday was charged in federal court with wire fraud with prosecutors alleging that the company was a multi-million dollar scheme to defraud investors.Holmes and Ramesh ...


The EPOs Response to the Open Letter About Decline in Patent Quality as the Latest Example of Arrogance and Resistance to Facts, Truth Techrights

Sums up the attitude of the Office under Battistelli, who uses (or wastes) the EPOs savings on media puff pieces and so-called studies, commissioned (i.e. funded) by the EPO to invert reality

Slick man

Summary: Sidestepping the existential crisis of the EPO (running out of work and issuing many questionable patents with expectation of impending layoffs), the PR people at the Office choose a facts-denying, face-saving damage control strategy while staff speaks out, wholeheartedly agreeing with concerned stakeholders

THE WORLDS patent offices/systems, with the exception of Chinas (SIPO), are doing reasonably OK. The USPTO is nowadays in the process of improving patent quality and we commend US courts for that, notably SCOTUS and the Federal Circuit below it.

The EPO isnt just above the law; it actively exploits that to break the law, so it has no credibility talking about courts.The EPO, by contrast, is quite a monster. The EPO repeatedly disobeyed court orders. Corruption at the EPO is just outstanding, not to mention violations of the law, constitutions, and the EPC. The EPO isnt just above the law; it actively exploits that to break the law, so it has no credibility talking about courts. It seems incapable of grasping the notion of justice. It also assaulted a judge, who is now rumoured to be hospitalised. Several hours ago the EPO wrote: Next week we&#8217...


New Gene Therapy Could Stitch Together Damaged Spinal Cords Lifeboat News: The Blog

A preclinical trial demonstrated that gene therapy could dissolve the nerve-blocking scars that form after spinal cord damage in lab rats.


Mozilla Reportedly Working on a Voice-Controlled Web Browser SoylentNews

Mozilla may be working on a voice-controlled browser

Mozilla may be working on a voice-controlled platform of its own. A listing for an all-hands internal meeting appeared about what seems like a new project: Scout. "With the Scout app, we start to explore browsing and consuming content with voice," it read. It's very unclear what the platform may or may not end up doing, as the meeting is focused on technical requirements for a "voice browser" that would, as a stated example, be able to read users an article about polar bears.

[...] CNET interpreted Scout to be a new voice-controlled web browser. With Google, Apple, Amazon and Microsoft falling over themselves refining their voice assistant technology (with Facebook not far behind), it's unsurprising that Mozilla would join the fray. Given the company's decades of web platform experience, a browser is surely simpler to implement than a new proprietary speaker. Plus, vocal navigation through a browser setup is probably easier for the average person to grasp.

So that's why they needed Common Voice.

Related: Mozilla's Common Voice Collecting French, German, and Welsh Samples, Prepping 40 More Languages

Original Submission

Read more of this story at SoylentNews.


A new MuddyWater Campaign spreads Powershell-based PRB-Backdoor Security Affairs

Trend Micro spotted a new attack relying on weaponized Word documents and PowerShell scripts that appears related to the MuddyWater APT.

Security experts at Trend Micro have spotted a new attack relying on weaponized Word documents and PowerShell scripts that appears related to the MuddyWater cyber-espionage campaign.

The first MuddyWater campaign was observed in late 2017, then researchers from Palo Alto Networks were investigating a mysterious wave of attacks in the Middle East.

The experts called the campaign MuddyWater due to the confusion in attributing these attacks that took place between February and October 2017 targeting entities in Saudi Arabia, Iraq, Israel, United Arab Emirates, Georgia, India, Pakistan, Turkey, and the United States to date.

Threat actors used PowerShell-based first stage backdoor named POWERSTATS, across the time the hackers changed tools and techniques.

In March 2018, experts at FireEye uncovered a massive phishing campaign conducted by TEMP.Zagros group (another name used by the experts to track the MuddyWater), targeting Asia and Middle East regions from January 2018 to March 2018.

Attackers used weaponized documents typically having geopolitical themes, such as documents purporting to be from the National Assembly of Pakistan or the Institute for Development and Research in Banking Technology.

The attacks have been mistakenly associated with the FIN7 group, when Palo Alto discovered the first campaign reported that a C&C server delivering the FIN7-linked DNSMessenger tool was involved in MuddyWater attacks as well.

The new campaign discovered by the experts presents many similarities with previous ones conducted by the same threat actor, attackers attempted to distribute a backdoor through weaponized Word documents that execute PowerShell scripts.

In May 2018, we found a new sample (Detected as W2KM_DLOADR.UHAOEEN) that may be related to this campaign. Like the previous campaigns, these samples again involve a Microsoft Word document embedded with a malicious macro that is capable of executing PowerShell (PS) scripts leading to a backdoor payload. reads the analysis published by Trend Micro.

One notable difference in the analyzed samples is that they do not directly download the Visual Basic Script(VBS) and PowerShell component files, and instead encode all the scripts on the document itself. The scr...


Making Electronics Just Got 25% More Expensive In The US Hackaday

As reported by the BBC, the United States is set to impose a 25% tariff on over 800 categories of Chinese goods. The tariffs are due to come into effect in three weeks, on July 6th. Thousands of different products are covered under this new tariff, and by every account, electronic designers will be hit hard. Your BOM cost just increased by 25%.

The reason for this tariff is laid out in a report (PDF) from the Office of the United States Trade Representative. In short, this tariff is retaliation for the Chinese government subsidizing businesses to steal market share and as punishment for stealing IP. As for what products will now receive the 25% tariff, a partial list is available here (PDF). The most interesting product, by far, is nuclear reactors. This is a very specific list; one line item is, multiphase AC motors, with an output exceeding 746 Watts but not exceeding 750 Watts.

Of importance to Hackaday readers is the list of electronic components covered by the new tariff. Tantalum capacitors are covered, as are ceramic caps. Metal oxide resistors are covered. LEDs, integrated circuits including processors, controllers, and memories, and printed circuit assemblies are covered under this tariff. In short, nearly every bit that goes into anything electronic is covered.

This will hurt all electronics manufacturers in the United States. For a quick example, Im working on a project using half a million LEDs. I bought these LEDs (120 reels) two months ago for a few thousand dollars. This was a fantastic buy; half a million of the cheapest LEDs I could find on Mouser would cost seventeen thousand dollars. Sourcing from China saved thousands, and if I were to do this again, I may be hit with a 25% tariff. Of course; the price on the parts from Mouser will also go up Kingbright LEDs are also made in China. Right now, I have $3000 worth of ESP-12e modules sitting on my desk. If I bought these three weeks from now, these reels of WiFi modules would cost $3750.

There are stories of a few low-volume manufacturers based in the United States getting around customs and import duties. One of these stories involves the inexplicable use of the boxes Beats headphones come in. But (proper) electronics manufacturing isnt usually done by simply throwing money at random people in China or committing customs fraud. These tariffs will hit US-based electronics manufacturers hard, and the margins on electronics may not be high enough to absorb a 25% increase in the cost of materials.

Electronics made in America just got 25% more expensive to produ...


Re: CVE-2018-3665 Lazy FPU Context Switching Information Leak Open Source Security

Posted by Anthony Liguori on Jun 15

Alan Coopersmith <alan.coopersmith () oracle com> writes:

I should have scrubbed that language. We won't be sending that until
later this month.


Anthony Liguori


A GCC Compiler Port For TI's PRU Processor Phoronix

Patches exist for taking the GNU Compiler Collection (GCC) to yet another processor...


74 arrested after FBI disrupts International gang of BEC scammers HackRead

By Waqas

In a joint operation, the FBI (Federal Bureau of Investigation),

This is a post from Read the original post: 74 arrested after FBI disrupts International gang of BEC scammers


Re: CVE-2018-3665 Lazy FPU Context Switching Information Leak Open Source Security

Posted by Alan Coopersmith on Jun 15

Did the attachment get lost on the way to the list? I didn't see any.


Scientists have found a single cell that can be used to regenerate an entire animal Lifeboat News: The Blog

Some worms that inhabit lakes and rivers are capable of almost limitless regeneration.

Some worms that inhabit lakes and rivers are capable of almost limitless regeneration, and scientists have isolated the cell that allows them to perform their death-defying feats.

The ability of planarian flatworms to regrow severed heads and other body parts has been known for over a century, but new techniques have allowed a research team to discover how they do it.

From a single building block known as an adult pluripotent stem cells, an entire worm can be rebuilt.


Hillicon Valley: Trump hits China with massive tech tariffs | Facebook meets with GOP leaders over bias allegations | Judge sends Manafort to jail ahead of trial | AT&T completes Time Warner purchase The Hill: Technology Policy

The Cyber and Tech overnights have joined forces to give you Hillicon Valley, The Hill's new comprehensive newsletter detailing all you need to know about the tech and cyber news from Capitol Hill to Silicon Valley.Welcome! Follow the cyber team,...


Video Friday: Kuka's Home Robot, Nao Upgrade, and Bionic Cuttlefish IEEE Spectrum Recent Content full text

Your weekly selection of awesome robot videos Photo: Festo

Video Friday is your weekly selection of awesome robotics videos, collected by your Automaton bloggers. Well also be posting a weekly calendar of upcoming robotics events for the next few months; heres what we have so far (send us your events!):

RoboCup 2018  June 18-22, 2018  Montreal, Canada
RSS 2018  June 26-30, 2018  Pittsburgh, Pa., USA
Ubiquitous Robots 2018  June 27-30, 2018  Honolulu, Hawaii
MARSS 2018  July 4-8, 2018  Nagoya, Japan
AIM 2018  July 9-12, 2018  Auckland, New Zealand
ICARM 2018  July 18-20, 2018  Singapore
ICMA 2018  August 5-8, 2018  Changchun, China
SSRR 2018  August 6-8, 2018  Philadelphia, Pa., USA
ISR 2018  August 24-27, 2018  Shenyang, China
BioRob 2018  August 26-29, 2018  University of Twente, Netherlands
RO-MAN 2018  August 27-30, 2018  Nanjing, China

Let us know if you have suggestions for next week, and enjoy todays videos.

Kuka, who has a near monopoly on industrial robots that are painted orange, is now getting into consumer robots. Or, theyre thinking about it, at least.

Our i-do concept study, that we presented at Hannover Fair 2018, goes a considerable step further, however. I-do is a home robot platform that already hints at how we expect our homes to be in the future. Our home assistant is designed to assume all types of duties and makes our homes safer, achieving all this equipped with the requisite modular features and controlled by voice commands.




AP: Trump campaign working with former Cambridge Analytica employees The Hill: Technology Policy

President Trump's 2020 reelection campaign is working either directly or indirectly with former staffers from the shuttered consulting firm Cambridge Analytica, according to an Associated Press report. The AP reported on Friday that...


Two Awesome Enders Achievements Hackaday

The Hackaday Prize is all about empowering you with the tools you need to create the next great hardware device. To that end, weve set up seed funding for your projects, weve given you a project hosting site, and most importantly, Hackaday gives you the opportunity to connect with tens of thousands of like-minded hardware hackers across the globe.

Not all hackers are out tinkering in their garage after work. Some are pulling the night shift in their dorm rooms, balancing classes, homework, hacking, and life. Student hackers, we salute you with the Enders Achievement!

This robotic gripper is the solution to robotic gripping

The Modular Universal Jamming Gripper by [cole b.] and a group of students at the Arizona Makers Collective is something every robot needs. Its a device that allows a robot to pick up just about anything. The old way of doing this is by fancy robotic fingers, maybe an Armatron, or if youre of a sufficient vintage or radioactive, a Waldo. This is not anything like that. Instead of robotic fingers, this is basically a balloon filled with grains of sand. To use it, the robot jams this squishy ball over an object and sucks the air out of the balloon. The result is an end effector that latches onto any small object.

Devices like this have been...


When Healthcare ignores Mental Health: 200 common prescription medications increase depression risk Lifeboat News: The Blog

Why is no one talking about this? More than one-third of U.S. adults are taking prescription medications that may lead to depression, new research finds. The study, published in the Journal of the American Medical Association, warns that depression is a potential side effect of more than 200 commonly prescribed medications, including beta blockers for blood pressure, birth control pills, antacids, and painkillers.

___ Many Americans taking common meds that may cause depression, study finds (CBS News): More than one-third of U.S. adults are taking prescription medications that may lead to depression, new research finds. The study, published in the Journal of the American Medical Association, warns that depression is a potential.


DOJ Seizes Reporter's Telephone Records SoylentNews

Trump's targeting of a New York Times journalist, explained by experts

The Trump administration took its war with the media to the next level this week when federal authorities seized years of phone records from New York Times reporter Ali Watkins as part of a federal investigation into leaks of classified information.

Watkins, who previously worked for BuzzFeed News and Politico, had a three-year relationship with James Wolfe, a former Senate Intelligence Committee aide who was arrested on Thursday and charged with lying to federal agents investigating the classified leaks.

The seizure set off alarm bells about the relationship between the administration and the media. The Department of Justice under Obama took phone records from Associated Press reporters and editors, named a Fox News reporter an unindicted "co-conspirator" in a leak case, and prosecuted multiple cases involving whistleblowers and leakers. So is what Trump doing more of the same? Or is a president who routinely bashes the media and threatens to jail leakers finally turning his rhetoric into reality?

"It's deeply alarming that the Trump administration has decided to build off of the worst of the Obama legacy on leak investigations and reporter-source protection," said Alexandra Ellerbeck, the North America program coordinator for the Committee to Protect Journalists.

See also: The Justice Department Deleted Language About Press Freedom And Racial Gerrymandering From Its Internal Manual

Also at The Philadelphia Inquirer, Emptywheel, and...


Re: CVE-2018-12356 Breaking signature verification in pass (Simple Password Store) Open Source Security

Posted by Jakub Wilk on Jun 15

* Marcus Brinkmann <marcus.brinkmann () ruhr-uni-bochum de>, 2018-06-15, 16:43:

Thanks for doing this. I didn't mean to imply that you were not diligent

I was hoping somebody else would take care of this.

Please do! :-)


Senators press Amazon for answers on improper Echo recording incident The Hill: Technology Policy

Two senators are demanding answers from Amazon following an incident where an Echo device reportedly recorded a couples conversation and sent it to an acquaintance.While Amazon has stated that the company is evaluating options to make this series...


Mir 0.32 Is Inching Close To Release With Many Improvements Phoronix

Canonical's developers working on the Mir display server are putting the finishing touches on the Mir 0.32 release...


US Navy to Bring Back the Warrant Officer-1 Rank for "Cyber Sailors" SoylentNews

In a short article, the US Naval Institute reports that the Navy will bring back the Warrant Officer-1 rank for certain specialists:

After a 44-year absence, the rank of warrant officer-1 will return to the Navy in 2019 for cyber specialists, a move signifying the great lengths the service must take to retain talent and fill leadership roles in an increasingly tight labor market.

The return of warrant officer-1 (W-1) discontinued by the Navy in 1975 is both a Navy bid to keep highly sought-after computer technicians and is indicative of the greater challenge facing the service as it seeks to meet growing recruiting and retention targets.

[...] Only a small number of enlisted personnel will qualify for W-1, the pay still will not match what the private sector offers, and the Navy will still face tough recruiting and retention challenges. However, those sailors who do qualify for W-1 will be the ones the Navy hopes will consider remaining in the service longer because [the] rank offers something the private sector can't as easily match a quicker path to management positions.

Original Submission

Read more of this story at SoylentNews.


Books You Should Read: Sunburst and Luminary, an Apollo Memoir Hackaday

The most computationally intense part of an Apollo mission was the moon landing itself, requiring both real-time control and navigation of the Lunar Module (LM) through a sequence of programs known as the P60s. Data from radar, inertial navigation, and optical data sighted-off by the LM commander himself were fed into the computer in what wed call today data fusion.

The guy who wrote that code is Don Eyles and the next best thing to actually hanging out with Don is to read his book. Dons book reads as if you are at a bar sitting across the table listening to his incredible life story. Its personal, hilarious, stressful, fascinating, and more importantly for those of us who are fans of Hackaday, its relatable.

Don epitomizes 1960s counter-culture. He has been featured in Rolling Stone magazine, credited with saving Apollo 14 by a creative software hack to bypass the faulty abort switch on the LM, in the article entitled Don Eyles: Extra! Weird-Looking Freak Saves Apollo 14!.  Don is also a well known photographer in Boston area. If you want to meet him show up to one of his exhibits.

I met up with Don recently at a talk he presented at the MIT Museum on his book: Sunburst and Luminary; An Apollo Memoir.



Debian Is Looking For Help Coming Up With The Artwork For 10.0 Buster Phoronix

If you are more the artistic type than a software developer, Debian is looking for your help. They are soliciting proposals for the artwork/theme for next year's Debian 10 "Buster" release...


NASA is about to launch astronauts into space again and a massive business for big companies Lifeboat News: The Blog

Its been seven years since astronauts launched into space from U.S. soil.

From idolized to anonymous, what it means to be an American astronaut is changing once more.


Perceptin's Under-$10K Self-Driving Vehicle IEEE Spectrum Recent Content full text

It's a slow-driving pod, but that should be good enough for corporate campuses Photo: Perceptin

A self-driving vehicle can avoid a lot of problems by just going slowly. A slow bot hurts a lot less when it hits you, and cheap sensors are good enough when you dont have to see far to avoid a collision.

And cheap is more than a feature, its a strategy. Make a costly product cheaply, and its not the same productjust look to the supercomputer in your pocket that calls itself a phone. 

Thats the idea behind Perceptin, a little startup founded in 2016 by Shaoshan Liu, who got a Ph.D. from the University of California at Irvine and then worked for a decade at the U.S. branch of Baidu. Liu asked himself just how much robocar he could build on a shoestring, and made the task easier by specifying a top speed of 20 kilometers per hour (12 mph). 

Our manufacturer in China can make these EV cars for under US $5,000, says Liu. Throw in the software and other necessities, he adds, and the total manufacturing cost should stay below $10,000.

And what do you do with slow bots that cant manage street traffic, let alone highway speeds? You fence them within the sheltered parks of university and industrial campuses, where nobody minds if you brake for squirrels. Its a narrow market niche, but big enough for a startup.

Look through China and theres thousands of campuses, for universities and companiesprobably a million-unit market, Liu says. 

Perceptin now has five bots serving its first customer, ZTE. Yep, thats the Chinese telecom company thats lately been at the center of U.S.-China trade disputes. ZTE has an enormous campus in Shenzhen. 

Each bot packs four high-definition cameras, four midrange radar sets, and 10 ultrasound sensors, as well as GPS and sensors for wheel autometry. Thats a fancy name for counting how many times the wheels go round, and by itself it can locate the vehicle to within about 20 centimeters. The radar can see up to 50 meters ahead, and the ultrasound is good out to five meters. Those capabilities wouldnt be nearly good enough for the likes of Waymo, but theyre fine at campus speeds.

The cameras work in stereoscopic pairs to provide a three-dimensional point clou...


720m Large Hadron Collider upgrade could upend particle physics Lifeboat News: The Blog

Collider will be far more sensitive to anomalies that could lead to entirely new theories of the universe.


Smart Robots Are the Secret to Spaceflights Future Lifeboat News: The Blog

A spacecraft, spinning in Earths orbit, reaches inside itself. One of its four arms pulls out a length of polymer pipe that has been 3D-printed inside the body of the machines. All four of the spacecrafts arms are securing pieces together as it builds a new space station right there in orbit.

This surreal project, called Archinaut, is the future vision of space manufacturing company Made In Space. The company promises a future of large imaging arrays, kilometer-scale communications tools, and big space stations all built off-planet by smart robots.


Brain Aging Correlates with Aortic Stiffness and Low Fitness Lifeboat News: The Blog

In case we needed more evidence that staying fit is good for you

A study to be published in the Journal of Alzheimers Disease shows a correlation between low fitness, aortic stiffness, and the cognitive decline typically observed during brain aging [1].

Study abstract


Smoothing PLA with Two Paints Hackaday

There was a time when most 3D printers used ABS plastic. It stinks, is probably bad for you, and tends to warp unless printed in a heated enclosure. So most people have gone to something else, mostly PLA. But ABS also dissolves in a readily-available solvent, acetone, and this is useful for smoothing the layer artifacts from a 3D print. [3DSage] has a technique that works for PLA or he says probably any filament. You can see what hes doing in the video below.

The video starts out with a recap of things most Hackaday readers will already know. But hang in there because at about 1:20, he reveals his method.

The technique involves using plastic-compatible paint and fast-drying polyurethane. He quickly sprays a thin coat of paint and then a thin coat of polyurethane on the part and uses a fan to rapidly dry the mixture before it can run. The two sprays merge to form a coating. He does apply several coats, leaving half an hour to dry between layers, and waits overnight before applying the final coat.

The results look pretty good. This is more like a coating than truly smoothing, but it does fill in the gaps and ridges nicely. As [3DSage] points out, you can print with a larger layer height, and you can change the final color by just changing paint colors.

It certainly looks easy enough to try out. A trip to a big box store and a fiver should put you in business. Our own [Donald Papp] has done something similar with UV resin. The paint method does seem safer than torching your prints.


Re: CVE-2018-12356 Breaking signature verification in pass (Simple Password Store) Open Source Security

Posted by Marcus Brinkmann on Jun 15

Thanks, fixed.

Yes. I did two weeks of due diligence on the important package managers,
Git, and anything I could think of that is critical. But I am not saying
what I looked at, because there might be something I missed, and I want
everybody to join in and have a fresh look. It is too much for a single

I didn't know about Debian code search, so thanks for the tip.

You reporting these? If not, I can do it.


Re: Intel FP security issue Open Source Security

Posted by Anthony Liguori on Jun 15

Hrm, I'll check with the reporter but I just sent it myself. Should
appear shortly.

Yes, phone email client :-/


Anthony Liguori


CVE-2018-3665 Lazy FPU Context Switching Information Leak Open Source Security

Posted by Anthony Liguori on Jun 15

Affected Software / Hardware:
All operating system kernels / hypervisors using Lazy FPU context switching
running on Intel CPUs
(more details below)

The FPU register state (legacy/MMX/SSE/AVX/AVX-512 registers) can be
leaked across process or virtual machine boundaries using speculative execution
on Intel CPUs when the hypervisor or operating system kernel uses lazy FPU
context switching.

Any information in the above registers...


Traumatic Memory Study Reveals How Our Darkest Fears Can Be Rewritten Lifeboat News: The Blog

Deep-seated fears, like the memory of a death or war-time trauma, can be crippling. Theyre also notoriously hard to study and treat, says neuroscientist Ossama Khalaf, Ph.D. But finally, were making progress: In a Science paper published Thursday, Khalaf and his team show new evidence suggesting that fearful memories that dwell deep in the brains neural circuitry dont have to be a burden forever. Its possible, the paper suggests, that they can be rewired.

The paper is rooted in the science of engrams the idea that memories leave a physical trace in the brain. In this case, Khalaf, a researcher at cole Polytechnique Fdrale de Lausanne, and his team traced deep-seated fear memories in rats back to the activity of specific neurons. They found that the way those neurons fire and thus the fearful memory they encode can be reprogrammed.

In our study, we are providing the first experimental evidence that fear memory attenuation is mediated by the re-engagement of the original fear re-writing it towards safety, Khalaf tells Inverse via email.


Stephen Hawkings Voice Will Be Broadcast Into Space Lifeboat News: The Blog

Hawking is being interred at Westminster Abbey on Friday, with a thousand members of the public (selected through a lottery system) present for the ceremony. The physicists remains will be placed between those of Isaac Newton and Charles Darwin.

His voice will be broadcast into space after the service honoring his life.

Hawkings words have been set to an original score by composer Vangelis, most famous for his Chariots of Fire film theme, the BBC reports.


Spinlaunch has $40 million to fund development to first centrifuge space launch by 2022 Lifeboat News: The Blog

SpinLaunch Inc. has closed a $35 million Series A funding round with a powerhouse syndicate of investors. Investors include Airbus Ventures, GV (formerly Google Ventures), and Kleiner Perkins. This syndicate joins institutional investors including Lauder Partners, ATW Partners, Bolt, and Starlight Ventures to total $40 million. Investment funds will be used to scale the team and technology, through first launch by 2022.

SpinLaunch is revolutionizing access to space by developing a kinetic energy launch system designed to provide the worlds lowest-cost orbital launch service for the rapidly growing small satellite industry. Their environmentally responsible approach is unmatched in the industry. SpinLaunch is currently considering four different states for potential launch sites within the United States.

Spinlaunch use large centrifuges to store energy and will then rapidly transfer that momentum into a catapult to send a payload to space at up to 4,800 kilometers per hour (3,000 mph). If successful, the acceleration architecture is projected to be both lower cost and use much less power, with the price of a single space launch reduced to under US$500,000.


Starts Testing Smallest Spin Qubit Chip for Quantum Computing Lifeboat News: The Blog

Intel researchers are taking new steps toward quantum computers by testing a tiny new spin qubit chip. The new chip was created in Intels D1D Fab in Oregon using the same silicon manufacturing techniques that the company has perfected for creating billions of traditional computer chips. Smaller than a pencils eraser, it is the tiniest quantum computing chip Intel has made.

The new spin qubit chip runs at the extremely low temperatures required for quantum computing: roughly 460 degrees below zero Fahrenheit 250 times colder than space.

The spin qubit chip does not contain transistors the on/off switches that form the basis of todays computing devices but qubits (short for quantum bits) that can hold a single electron. The behavior of that single electron, which can be in multiple spin states simultaneously, offers vastly greater computing power than todays transistors, and is the basis of quantum computing.


Two Critical U.S. Dams at High Risk From Insider Cyber Threats IEEE Spectrum Recent Content full text

A new report by the Interior Department's Inspector General highlights several basic cybersecurity issues Photo: iStockphoto

The U.S. Bureau of Reclamation, a part of the Interior Department, operates more than 600 of the some 100,000 dams in the United States, five of which are considered part of the national critical infrastructure. This means that the incapacitation or destruction of either the Glen Canyon Dam in Arizona, the Shasta or Folsom Dams in California, the Hoover Dam in Nevada, or the Grand Coulee Dam in Washington State would, in the Department of Homeland Securitys words, have a debilitating effect on security, national economic security, national public health or safety, or any combination thereof.

The Interior Departments Inspector General released a report (pdf) this week stating that two of the dams industrial control systems, while seeming secure from being attacked remotely, operate at high risk from insider threats. The report, which does not identify the two dams in question due to security concerns, lists a number of rudimentary cybersecurity practices that were not being followed. These included limiting system administrator access to the control systems and conducting rigorous background checks on individuals granted system privileges.

Dams have been a national security concern (pdf) for years. The importance of the cybersecurity aspect was highlighted in 2016 when the Justice Department indicted seven Iranians for not only conducting cyberattacks against American banks, but trying to compromise the small Bowman Dam north of New York City in 2013. A successful cyberattack on a major dam like the Hoover Dam could be devastating to tens of millions of people.



Russias HIV/AIDS epidemic is getting worse, not better Lifeboat News: The Blog

Almost anywhere in the world, an HIV-infected woman who has an uninfected partner and wants to have a baby would be first in line to receive ARVs. The challenges Katia faced in getting treatment amid Russias epidemic highlight the countrys faltering response, which critics have blasted as misguided, lackadaisical, and downright dismissive. Some federal health officials even question the term epidemic. This is a very large and very serious epidemic, and certainly one of the few epidemics in the world that continues to get worse rather than get better, says Vinay Saldanha, the Moscow-based regional director for the Joint United Nations Programme on HIV/AIDS (UNAIDS) in Eastern Europe and Central Asia. This is a public health crisis.

The government has begun to confront its shortcomings, but critics want more aggressive change.


Science Reveals The Face Of God And It Looks Like Elon Musk Lifeboat News: The Blog

Be prepared to freak out.

Once you see them side by side, the resemblance is so obvious. Put an aggregated vision of what God looks like next to a head shot of Elon Musk and prepare to be freaked out.


Do People Really Get Promoted to Their Level of Incompetence? SoylentNews

Three authors at the Harvard Business Review briefly discuss the Peter Principle by dealing with a quantifiable data set. That principle is the one which states that people are promoted to rise to their particular level of their incompetence. At the end they propose several possible solutions or work-arounds.

The Peter Principle problem arises when the skills that make someone successful at one job level dont translate to success in the next level. In these cases, organizations must choose whether to reward the top performer with a promotion or to instead promote the worker that has the best skill match with a managerial position. When organizations reward success in one role with a promotion to another, the usual grumbles ensue; the best engineer doesnt make the best engineering manager, and the best professor doesnt make the best dean. The same problem may apply to scientists, physicians, lawyers, or in any other profession where technical aptitude doesnt necessarily translate into managerial skill.

[...] While the Peter Principle may sound intuitively plausible, it has never been empirically tested using data from many firms. To test whether firms really are passing over the best potential managers by promoting the top performers in their old roles, we examined data on the performance of salespeople and their managers at 214 firms. Sales is an ideal setting to test for the Peter Principle because, unlike other professional settings, its easy to identify high performing salespeople and managers for salespeople, we know their sales records, and for the sales managers, we can measure their managerial ability as the extent to which they help improve the performance of their subordinates. The data, which come from a company that administers sales performance management software over the cloud, allow us to track the sales performance of a large number of salespeople and managers in a large number of firms. Armed with these data, we asked: Do organizations really pass over the best potential managers by promoting the best individual contributors? And if so, how do organizations manage around the Peter Principle?

Read more of this story at SoylentNews.


[$] Toward a fully reproducible Debian

It's been a little over one year since we last covered Debian's reproducible builds project. The effort has not stopped in the interim; progress continues to be made, the message has sharpened up, and word is spreading. Chris Lamb, speaking about this at FLOSS UK in a talk called "You may think you're not a target: a tale of three developers", hinted that the end may be starting to come into sight.


Security updates for Friday

Security updates have been issued by CentOS (plexus-archiver), Fedora (chromium, kernel, and plexus-archiver), Mageia (firefox, gifsicle, jasper, leptonica, patch, perl-DBD-mysql, qt3, and scummvm), openSUSE (opencv), Oracle (kernel), Red Hat (kernel), Scientific Linux (kernel), SUSE (gpg2, nautilus, and postgresql96), and Ubuntu (gnupg2 and linux-raspi2).


5 Commands for Checking Memory Usage in Linux

5 Commands for Checking Memory Usage in Linux


Epics Fortnite Copyright Infringement Claims Need Work, Court Says TorrentFreak

Frustrated by thousands of cheaters who wreak havoc in Fortnites Battle Royale, game publisher Epic Games decided to take several to court.

The game developer isnt trying to bankrupt these people financially. It is mainly interested in preventing them from cheating in the future.

The main strategy thus far has been to settle the cases. Several accused cheaters have signed consent judgments, promising not to cheat or engage in any copyright infringing activity going forward.

This tactic doesnt work in all cases. One of the accused, a man from Russia going by the name of Konstantin Vladimirovich Rak, has failed to respond to the allegations in court.

This failure prompted Epic Games to file for a default judgment, requesting an injunction that would prevent the defendant from using Epics copyrighted works to develop cheats, as well as other infringing activity.

Without Rak being able to put up a defense, one might expect an easy win for Fortnites developer, but thats certainly not the case.

In an order published this week, United States Magistrate Judge Laurel Beeler notes that the balance currently weighs against granting the default judgment.

Judge Beeler is specifically concerned with the merits of Epics claims and the sufficiency of the complaint. This includes the copyright infringement accusations, which need work.

One of the claims is that Mr. Rak engaged in direct copyright infringement. This requires Epic to show that the alleged infringer violates its exclusive rights, but thats not the case here,

Epic alleges that users can download Mr. Raks cheat and then inject the cheat into Fortnite code, but it does not allege that Mr. Rak himself injected the cheat into Fortnite code or created an unauthorized derivative work, Judge Beeler notes.

In addition, the defendant allegedly displayed the cheat in action by posting gameplay on YouTube, thereby violating its exclusive right to perform the copyrighted work publicly. However, without further details, the court is not convinced that this is copyright infringement.

Epic does not allege what exactly Mr. Rak publicly performed or address whether its copyright extends to that performance. On this issue, Epics complaint says only that the Rak Video showed full-screen gameplay using the cheat, without more, Judge Beeler writes.

Then, there is the issue of whether posting gameplay material on YouTube is, in fact, copyright infringement. The court doesnt want to draw an...


How Area 51 became the center of alien conspiracy theories Lifeboat News: The Blog

The history of Area 51 stretches back to the 1950s.

Area 51 has been the focal point of alien conspiracy theories in America for decades. The remote military base in the Nevada desert has a lot of history, and has been associated with aliens almost since its inception. Heres why. Following is a transcript of the video:

In the early 1950s, US planes were conducting low-flying recon missions over the USSR. But there were constant worries of them being spotted and shot down.

So in 1954, President Eisenhower authorized the development of a top secret, high-altitude recon aircraft Dubbed Project Aquatone. The program required a remote location that wasnt easily accessible to civilians or spies. Area 51 fit the bill perfectly.


Re: Intel FP security issue Open Source Security

Posted by Solar Designer on Jun 15

There's nothing like this in the moderation queue. Also not in the spam
filter. Please repost right away.

BTW, the above message of yours lacks an In-Reply-To header, even though
it appears to be a reply to Marcus' message. So technically it started
a new thread. There's probably something broken on your end.



Re: Re: Intel FP security issue Open Source Security

Posted by Liguori, Anthony on Jun 15

The discover sent a post here but I suspect it's stuck in the moderation queue. I'll repost later today.


Anthony Liguori


Space catapult startup gets $40 MILLION investment Lifeboat News: The Blog

A Silicon Valley startup has devised an ingenious way of sending rockets into space.

Dubbed SpinLaunch, the firm wants to blast tiny payloads into orbit atop miniature rockets.

But instead of using propellants like a typical launch would, SpinLaunch would slingshot them into space using a novel catapult technology.


Retrotechtacular: Voice Controlled Robot from 1961 Hackaday

We like to think that all these new voice-controlled gadgets like our cell phones, Google Home, Amazon Echo, and all that is the pinnacle of new technology. Enabled by the latest deep learning algorithms, voice-controlled hardware was the stuff of science fiction back in the 1961s, right? Not really. Turns out in around 1960, Ideal sold Robot Commando, a kids toy robot that featured voice control.

Well, sort of. If you look at the ad in the video below, youll see that a kid is causing the robot to move and fire missiles by issuing commands into a microphone. How did some toy company pull this off in 1961?

Watch the video below carefully. The eyes are on their own motor and just move on their own. The drive train and the missile launchers are subject to the voice control. If you cant get the scale from the video, the robot stood an impressive 19 inches tall.

The remote has a rotary switch (marked arrow knob in the instruction booklet) and a thick cable (control wire) coming out of it and connecting to the robot. Turns out the wire isnt a wire at all. It was a Bowden cable. This is the original kind of Bowden cable like you find on a bicycle, not a 3D printing feed me...


A new Meltdown-like flaw tracked as LazyFP affects Intel CPUs Security Affairs

A new vulnerability involving side channel speculative execution on Intel chips, known as LazyFP, has been announced and assigned CVE-2018-3665.

A new vulnerability tracked as LazyFP (CVE-2018-3665) involving side channel speculative execution affects Intel CPUs, like previous ones it could be exploited by hackers to access sensitive information from the affected system.

The vulnerability was discovered by Julian Stecklina from Amazon Germany, Thomas Prescher from Cyberus Technology and Zdenek Sojka from SYSGO AG.

The vulnerability resides in the floating point unit (FPU) that is used by the operating system when switching between processes. It is used to save the current context (state of the current process and registries) and restores the context of the new process.

System software may opt to utilize Lazy FP state restore instead of eager save and restore of the state upon a context switch. Lazy restored states are potentially vulnerable to exploits where one process may infer register values of other processes through a speculative execution side channel that infers their value, reads the advisory published by Intel.

There are two types of switching, Lazy FPU and Eager FPU, the former has better performance on older systems.

Security researchers discovered recently that if the Lazy method if vulnerable to attacks that could expose FPU state data, which can contain sensitive information such as cryptographic keys.

The register state of the floating point unit (FPU), which consists of the AVX, MMX and SSE register sets, can be leaked across protection domain boundaries. This includes leaking across process- and virtual machine boundaries. reads the analysis published by Thomas Prescher, Julian Stecklina, Jacek Galowicz

The FPU state may contain sensitive information such as cryptographic keys.

According to the expert, the CVE-2018-3665 vulnerability is similar to Meltdown  Variant 3a.

Intel confirms the CVE-2018-3665 vulnerability affects Core processors, but it claims the issue has been addressed by operating system and hypervisor software developers for many years, Intel urges vendors that still havent fixed the issue to do it as soon as possible by releasing necessary security updates.

Lazy FPU doesnt affect systems using AMD or ARM processors, while Microsoft confirmed that Lazy restore is enabled by default in all versions of the operating system and cannot be disabled. Customers using the Azure platform are not affected by the problem.


Friday, 15 June


New Music Random Thoughts

Music Ive bought this month.

jukebox.php?image=micro.png&group=The+Ex&album=27+Passports jukebox.php?image=micro.png&group=Breathless&album=After+All+These+Years jukebox.php?image=micro.png&group=Joe+Jackson+Band&album=Afterlife jukebox.php?image=micro.png&group=Breathless&album=Always ...


The Most Remote Island in the World is Home to Seals, Seabirds, and an Internet Top-Level Domain IEEE Spectrum Recent Content full text

Bouvet Island's most valuable resource might be its untapped .bv country code Image: Jesse Allen and Robert Simmon/NASA Earth Observatory Ice covers about 94 percent of Bouvet Island year-round.

Bouvet Island has little to offer. The most remote island in the world is fewer than 20 square miles in size, and its almost entirely covered by a glacier. Long ago, it was an active volcano, but those fiery days have long since passed. Now, its home to hundreds of thousands of seabirds, a Norwegian research station, and its own top-level internet domain.

Top-level domains serve as part of the Internets architecture. Aside from generic domains like .com and .edu, every country has a specific two-letter domain assigned to it. The United Kingdom, for example, uses .uk; Japan uses .jp. The United States has .us, though its not widely used. The original idea was that each country could manage the websites registered by individuals and organizations within its borders by issuing them websites that use their country-specific domain.

An animated gif zooming out on Bouvet Island to give a sense of it's location in the world. Gif: Google Maps/Google Earth/IEEE Spectrum Where in the world is Bouvet Island?

But heres the weird thing about Bouvet Island having its own top-level domain: Its uninhabited. Its always been uninhabited. Located in the southern Atlantic, the closest land to Bouvet Island is the coast of Antarctica, 1,100 miles to the south. The closest inhabited land is the island Tristan da Cunha, a British overseas territory located 1,400 miles to the north (Interestingly enough, Tristan da Cunha does not have its own top-level domain).

So how did Bouvet Island end up with the .bv domaina domain which is not in use and not open to registration?

It starts with the United Nations. The UNs Statistics Division maintains a publication called the Standard Country or Area Codes for Statistical Use. Published since 1970 and also known as the M49 standard, the UNs primary intention is to use its three-digit codes to group nations and geographic regions for statistical analysis.

Since 1974, the International Organization for Standardization, an international standards body just as unaffili...


Intel Icelake Bringing New MIPI DSI Controller, Linux Driver Patches Posted Phoronix

While Intel Icelake hardware is quite a ways out from making its debut, the open-source Intel Linux developers working on the hardware enablement for its "Gen 11" graphics continue working dilligently on this hardware enablement...


Facebook execs to meet with GOP leaders over concerns about anti-conservative bias The Hill: Technology Policy

Facebook is sending some of its top executives to meet with Republican leaders following complaints about anti-conservative bias on social media, the company confirmed to The Hill on Friday.The officials from Facebooks public policy team will be...


Re: Re: Intel FP security issue Open Source Security

Posted by Marcus Meissner on Jun 15


For the record, this is
aka CVE-2018-3665 with codename "Lazy FPU Save/Restore".

XEN advisory was posted here too, describing it a bit better.

Full details are planned to be released June 27th.

Ciao, Marcus


Smart Lock Can be Hacked 'in Seconds' SoylentNews

A hi-tech padlock secured with a fingerprint can be opened by anyone with a smartphone, security researchers have found.

On its website, Tapplock is described as the "world's first smart fingerprint padlock".

But researchers said it took just 45 minutes to find a way to unlock any Tapplock.

[...] The "major flaw" in its design is that the unlock key for the device is easily discovered because it is generated from the Bluetooth Low Energy ID that is broadcast by the lock.

Anyone with a smartphone would be able to pick up this key if they scanned for Bluetooth devices when close to a Tapplock.

Using this key in conjunction with commands broadcast by the Tapplock would let attackers successfully open any one they found, said Mr Tierney.

In response, Tapplock said in a statement that it was issuing a software update.

-- submitted from IRC

Original Submission

Read more of this story at SoylentNews.


Re: Are `su user' and/or `sudo -u user sh' considered dangerous? Open Source Security

Posted by Georgi Guninski on Jun 15

Looks like util-linux currently supports pty's:
-P, --pty
Create pseudo-terminal for the session.
This feature is EXPERIMENTAL for now and may be removed in the
next releases.


Trump announces tariffs on $50 billion in Chinese goods The Hill: Technology Policy

President Trump on Friday announced that the United States would impose tariffs on $50 billion in Chinese products, making good on a threat that has been months in the making.The White House's move is expected to ramp up trade tensions with Beijing...


Google Releases Open Source 'GIF for CLI' Terminal Tool on GitHub

It's GIF's 31st anniversary -- exciting, right? Those animated images have truly changed the world. All kidding aside, it is pretty amazing that the file format came to be way back in 1987!

To celebrate tomorrow's milestone, Google releases a new open source tool today. Called "GIF for CLI," it can convert a Graphics Interchange Format image into ASCII art for terminal. You can see such an example in the image above.


Five Supercomputers That Aren't Supercomputers

A supercomputer, of course, isn't really a "computer." It's not one giant processor sitting atop an even larger motherboard. Instead, it's a network of thousands of computers tied together to form a single whole, dedicated to a singular set of tasks. They tend to be really fast, but according to the folks at the International Supercomputing Conference, speed is not a prerequisite for being a supercomputer.


Router Vulnerability and the VPNFilter Botnet

On May 25, the FBI asked us all to reboot our routers. The story behind this request is one of sophisticated malware and unsophisticated home-network security, and its a harbinger of the sorts of pervasive threats from nation-states, criminals and hackers that we should expect in coming years.


Intel Chip Flaw: Math Unit May Spill Crypto Secrets to Apps Modern Linux, Windows, BSDs Immune

A security flaw within Intel Core and Xeon processors can be potentially exploited to swipe sensitive data from the chips' math processing units. Malware or malicious logged-in users can attempt to leverage this design blunder to steal the inputs and results of computations performed in private by other software.

These numbers, held in FPU registers, could potentially be used to discern parts of cryptographic keys being used to secure data in the system. For example, Intel's AES encryption and decryption instructions use FPU registers to hold keys.

IndyWatch Science and Technology News Feed Archiver

Go Back:30 Days | 7 Days | 2 Days | 1 Day

IndyWatch Science and Technology News Feed Today.

Go Forward:1 Day | 2 Days | 7 Days | 30 Days

IndyWatch Science and Technology News Feed was generated at World News IndyWatch.

Resource generated at IndyWatch using aliasfeed and rawdog