IndyWatch Science and Technology News Feed Archiver

Go Back:30 Days | 7 Days | 2 Days | 1 Day

IndyWatch Science and Technology News Feed Today.

Go Forward:1 Day | 2 Days | 7 Days | 30 Days

IndyWatch Science and Technology News Feed was generated at World News IndyWatch.

Sunday, 24 September


The State Of Intel's GPU Virtualization Pass-Through On Linux Phoronix

Wrapping up our XDC2017 coverage for this annual X.Org developer event that took place this past week in Mountain View, Zhenyu Wang of Intel presented on their ongoing work for mediated GPU virtualization pass-through support on Linux, Intel GVT...


IBM and IPO Continue Working Behind the Scenes to Undermine Alice and Promote Software Patents Techrights

Ginni Rometty

Summary: The Intellectual Property Owners Association (IPO), together with IBM (Manny Schecter, Marian Underweiser and others), is still trying to overturn Mayo and Alice

THREE years ago Alice came to change everything. It was the summer of 2014 when the US patent system became more officially hostile towards software patents. Much has been written on the subject since then, including literally about a thousand articles here in Techrights (we regret not developing a detailed index page in Wiki form as we went along covering Alice; we had made one for the Bilski case).

We constantly need to defend and advocate Alice; in absence of opposition to these saboteurs (usually the patent microcosm, which produces nothing but lawsuits) things can quickly change for the worse.Alice is not a done deal, so to speak. Alice and Section 101 are constantly under attack. USPTO examiners often ignore the determination, instead relying on amorphous and dynamic guidelines, which contain loopholes for patenting software (a bunch of loopholes that courts dont quite fall for).

We constantly need to defend and advocate Alice; in absence of opposition to these saboteurs (usually the patent microcosm, which produces nothing but lawsuits) things can quickly change for the worse. We have already named some of these saboteurs. They dont quite keep it a secret (at least not effectively).

Yesterday we were reminded of the effect of stacked panels because Juves UPC specialist wrote: Nine panelist @Vossius #UPC Conference to vote on new start date of #UPC. All: at some day in 2019

We have already named some of these saboteurs. They dont quite keep it a secret (at least not effectively).I guess none of these panelists was a UPC sceptic, I wrote. Just gotta push the lie of Unitary Patent being inevitable.

UPC is a great example of echo chamber politics. Lots of people with financial stake in the outcome keep misleading one another. Its like a blind religion.

The same is true for software patents.

Just a short while ago IBMs patent chief, Manny Schecter, wrote that 99% of respondents to a survey at the...


Tech's Push to Teach Coding Isn't About Kids' Success - It's About Cutting Wages SoylentNews

Commentary from The Guardian

The rationale for this rapid curricular renovation is economic. Teaching kids how to code will help them land good jobs, the argument goes. In an era of flat and falling incomes, programming provides a new path to the middle class a skill so widely demanded that anyone who acquires it can command a livable, even lucrative, wage.

This narrative pervades policymaking at every level, from school boards to the government. Yet it rests on a fundamentally flawed premise. Contrary to public perception, the economy doesn't actually need that many more programmers. As a result, teaching millions of kids to code won't make them all middle-class. Rather, it will proletarianize the profession by flooding the market and forcing wages down and that's precisely the point.

Original Submission

Read more of this story at SoylentNews.


Giant D20 Is A Critical Hit in More Ways than One Hackaday

[Mikael Vejdemo-Johansson] is a member of the NYC Resistor hackerspace and an avid fan of a D&D themed improv theatre called The Campaign. To show his appreciation, he decided to gift them a Christmas present: a giant D20. The original plan called for integrated LEDs to burst alight on a critical hit or miss, or let out pulses if it landed on another face. Cool, right? Well, easier said than done.

[Vejdemo-Johansson] figured a circle of 4 tilt sensors mounted on the one and twenty face would be enough to detect critical rolls. If any of the switches were tilted beyond 30 degrees, the switch would close. He mounted eight ball-tilt switches and glued in the LEDs. A hackerspace friend also helped him put together an astable multivibrator to generate the pulses for non-critical rolls.

This did not work out so well. His tilt sensor array proved to be a veritable electronic cacophony and terribly sensitive to any movement. That and some other electronic troubles forced a shelving of any light shows on a critical hit or miss. [Vejdemo-Johansson] kept the pulsing LEDs which made for a cool effect when shining through the mirrored, red acrylic panes he used for the die faces. Foam caulk backer rods protect as the dies structure to stop it from being shattered on its first use.

Before The Campaigns next show, [Vejdemo-Johansson] managed to stealthily swap-out of the troupes original die with his gift, only for it to be immediately thrown in a way that would definit...


Dori Liszkai, Advisory Council Member Blockchain at GLG (Gerson Lehrman Group), joins our New Money Systems Board. Lifeboat News

Dori Liszkai, Advisory Council Member - Blockchain at GLG (Gerson Lehrman Group), joins our New Money Systems Board.


Rise of the Robolawyers Lifeboat News: The Blog

Thankfully, no ones out there systematically murdering lawyers. But advances in artificial intelligence may diminish their role in the legal system or even, in some cases, replace them altogether. Heres what we stand to gainand what we should fearfrom these technologies.

How legal representation could come to resemble TurboTax.


Security Researchers Warn that GO Keyboard is Spying on Millions of Android Users SoylentNews

Submitted via IRC for SoyCow8963

Security researchers from Adguard have issued a warning that the popular GO Keyboard app is spying on users. Produced by Chinese developers GOMO Dev Team, GO Keyboard was found to be transmitting personal information about users back to remote servers, as well as

Adguard made the discovery while conducting research into the traffic consumption and unwanted behavior of various Android keyboards. The AdGuard for Android app makes it possible to see exactly what traffic an app is generating, and it showed that GO Keyboard was making worrying connections, making use of trackers, and sharing personal information.

Read more of this story at SoylentNews.


This new ransomware asks to send nude photographs instead of Bitcoin TechWorm

nRansomware demands victims to send nude pics instead of Bitcoin

Most of us are aware that ransomware is a type of malicious software from cryptovirology that threatens to publish the victims data or perpetually block access to it unless a cryptocurrencytypically Bitcoin is paid. But what happens if you are asked to send nude photographs instead of Bitcoin to get access to your device? Shocked, right?

That is what a new ransomware known as nRansomware is doing. On Thursday, the researchers at MalwareHunterTeam, a research group focused on ransomware, discovered the ransomware software installed through a file called nRansom.exe, which demands at least 10 nude photographs from the victim in order to get their files back. The victim is actually forced to create a Protomail account, which will then be verified as legitimate by the attacker. Once the photos are sent, the victim will receive a code to disable the malware. It appears that the attackers are looking to sell the photos to make money.

The ransomware has a background of several images of the fictional childrens character Thomas the Tank Engine and an image stating the conditions. The malware also appears to play looped music in the background.

The below screenshot was tweeted by the researchers displaying the message when a victims device is hacked:

Your computer has been locked. You can only unlock it with the special unlock code, reads the message. The victim is also asked to create an email account on a specified website and then email to hackers from that address. After we reply, you must send at least 10 nude pictures of you. After that we will have to verify that the nudes belong to you.

It is still unclear how many people have been affected with this ransomware or whether the demand is legitimate threat and not a prank. However, the file nRansom.exe, to some extent does appear to be legitimate, as it is classified as malicious by several antivirus engines, including VirusTotal and Hybrid Analysis, which are both public malware repositories.


Belgium Wants to Blacklist Pirate Sites & Hijack Their Traffic TorrentFreak

The thorny issue of how to deal with the online piracy phenomenon used to be focused on punishing site users. Over time, enforcement action progressed to the services themselves, until they became both too resilient and prevalent to tackle effectively.

In Europe in particular, theres now a trend of isolating torrent, streaming, and hosting platforms from their users. This is mainly achieved by website blocking carried out by local ISPs following an appropriate court order.

While the UK is perhaps best known for this kind of action, Belgium was one of the early pioneers of the practice.

After filing a lawsuit in 2010, the Belgian Anti-Piracy Foundation (BAF) weathered an early defeat at the Antwerp Commercial Court to achieve success at the Court of Appeal. Since then, local ISPs have been forced to block The Pirate Bay.

Since then there have been several efforts (1,2) to block more sites but rightsholders have complained that the process is too costly, lengthy, and cumbersome. Now the government is stepping in to do something about it.

Local media reports that Deputy Prime Minister Kris Peeters has drafted new proposals to tackle online piracy. In his role as Minister of Economy and Employment, Peeters sees authorities urgently tackling pirate sites with a range of new measures.

For starters, he wants to create a new department, formed within the FPS Economy, to oversee the fight against online infringement. The department would be tasked with detecting pirate sites more quickly and rendering them inaccessible in Belgium, along with any associated mirror sites or proxies.

Peeters wants the new department to add all blocked sites to a national pirate blacklist. Interestingly, when Internet users try to access any of these sites, he wants them to be automatically diverted to legal sites where a fee will have to be paid for content.

While its not unusual to try and direct users away from pirate sites, for the most part Internet service providers have been somewhat reluctant to divert subscribers to commercial sites. Their assistance would be needed in this respect, so it will be interesting to se...


Passwords and much more for 540,000 SVR Tracking accounts leaked online Security Affairs

Login credentials for 540K records belonging to vehicle tracking device company SVR Tracking (aka Stolen Vehicle Records Tracking) have been leaked online.

Another day, another data breach to report, login credentials of more than half a million records belonging to vehicle tracking device company SVR Tracking (aka Stolen Vehicle Records Tracking) have been leaked online.

The incident potentially exposes the personal data and vehicle details of drivers and businesses using the SVR Tracking service.

A few hours ago Verizon data was leaked online, and last week a similar incident affected the entertainment giant Viacom, in both cases data were found on an unsecured Amazon S3 server.

The unsecured AWS S3 cloud storage bucket containing SVR Tracking data was discovered by experts at Kromtech Security Center.The SVR Tracking service allows its customers to track their vehicles in real time by using a physical tracking device hidden in the vehicles.

SVR Tracking device

The S3 bucket contained details of roughly 540,000 SVR accounts, including email addresses and passwords, as well as users vehicle data, such as VIN (vehicle identification number) and the IMEI numbers of GPS devices.

The exposed archive also includes information where the tracking device was hidden in the car.

The repository contained over a half of a million records with logins / passwords, emails, VIN (vehicle identification number), IMEI numbers of GPS devices and other data that is collected on their devices, customers and auto dealerships. Interestingly, exposed database also contained information where exactly in the car the tracking unit was hidden. reads the blog post published by Kromtech.

Experts highlighted that leaked passwords were protected by the weak SHA-1 hashing algorithm that was easy to crack.

The experts discovered a Backup Folder named accounts contained 540,642 ID numbers, account information that included many plate & vin numbers, emails, hashed passwords, IMEI numbers and mo...


Air conditioner that can fit in your pocket TechWorm

This Air Conditioner Can Fit in Your Pocket

UCLA researchers have developed a new type of air conditioner that is not only energy efficient and eco-friendly , but can also fit inside your pocket. When we think about air conditioners, the image that comes into our minds is a big bulky machine that is fitted onto a wall that cools down the entire room. These machines usually pump refrigerant fluids, that can harm the environment when they break down or arent disposed of properly. This new research, can possibly change all of this.

How does it work ?

These devices are named   thermoelectric coolers do not work in the same manner as traditional ACs. They need expensive ceramic materials and are not the most efficient in cooling down entire rooms as the traditional ACs. The reason for this is the way they work.

The researchers have said these devices use electrocaloric effects , in simpler terms, an electric field is used to move the unwanted heat through specially designed materials. Polymers with special properties are used and is placed between two points a heat source where the heat is generated and the heat sink that takes away the heat.

When this polymer comes in contact with the heat source, it will absorb the heat. At this point, the electric field is inactive. When the polymer comes in contact with the heat sink, the electric field is turned on. This field will cause the molecules of the polymer to arrange themselves in a particular order which will push the heat into the sink.

Cheaper than traditional ACs ?

Besides being energy efficient, there is another reason why this technology could end up being cheaper than the AC we use today. Traditional ACs are used to cool an entire room. With this technology, companies could instead cool down individual seats thus saving on their AC bills. The researchers have even used this method to cool a Galaxy S4 by making a cooling device with flexible materials. Their results showed that this caused the phone to cool down by around 8 degrees.

Source: Sciencr

The post Air conditioner that can fit in your pocket appeared first on TechWorm.


Game Boy Advance Hiding In a Medical Device Hackaday

It turns out that medical manufacturers also do hacking once in a while. [JanHenrikH] recently tweeted a photo of an ECG-Trigger-Unit that hed opened up. Inside he found that the LCD screen was that of a Game Boy Advance (GBA) and the reason he could tell was that the screens original case was still there, complete with GAME BOY ADVANCE SP written on it.

In the manufacturers defense, this device was likely made around the year 2000 when gaming products were some of the best sources for high speed, high quality, small LCD displays.  This design document for a portable ECG measurement instrument from as recently as 2013 cites reasons for using a GBA as:

  • impressive plotting results,
  • no serious transmission delays, and
  • fine graphics processing capability.

The Verge had even turned up this US patent from 1997 that has the diagnostic medical device be a cartridge for plugging into a Game Boy. At the time, PCs were frequently used for medical displays but this patent cites issues such as the higher cost of PCs, software installation issues, and crashing. However, they talk about the crashing being due to running word processing and spreadsheet software on the same PC, something not likely to happen if the PC is dedicated to bedside monitoring.

But despite all those pros, wouldnt you feel surprise and alarm when you first glimpse the Game Boy inside the device thats monitoring your heart? We also have to wonder what licensing these products went through in the countries in which they were used. This particular device was made by German company Medical Imaging Electronics.

Game Boy hacks arent limited to the medical industry though. Here on Hackaday, weve seen them turned into remote controls for flying drones and weve seen Game Boy cartridge emulators that use STM32. Finally, if youre wondering where you saw [Jan Henrik]s name before, he was one of the two hackers driving the motorized armchair in a photo in our [Jenny List]s SHACamp 2017 write-up.

Our thanks to [geonomad] for the tip!

Filed under: Medical hacks...


First Human Embryo Editing Performed in the UK SoylentNews

Scientists at the Francis Crick Institute have performed the UK's first human embryo editing experiment:

The blueprint for life - DNA - has been altered in human embryos for the first time in the UK. The team at the Francis Crick Institute are unravelling the mysteries of the earliest moments of life. Understanding what happens after a sperm fertilises an egg could lead to ways of improving IVF or explain why some women miscarry. The embryos were modified shortly after fertilisation and allowed to develop for seven days.

[...] The researchers used 41 embryos that had been donated by couples who no longer needed them for IVF. After performing the genetic modification, the team could watch how the embryos developed without OCT4.

Over the course of the first seven days, a healthy, normal embryo goes from one cell to about 200. It also goes through the first steps of organising itself and handing out specialised jobs to different cells. The embryo forms a hollow sphere called a blastocyst, with some cells destined to go on to form the placenta, some the yolk sac and others, ultimately, us. But without OCT4 the blastocyst cannot form. It tries - but implodes in on itself. From the embryo's perspective it is a disaster but for scientists it has given unprecedented insight.


Also at CNN, Science Magazine, and The Guardian.

Genome editing reveals a role for OCT4 in human embryogenesis (open, DOI: 10.1038/nature24033) (DX)

Original Submission

Read more of this story at SoylentNews.


Giving a 4k Webcam Special Eyes Hackaday

Its a problem as old as photography: your camera is only as good as your lens. As cameras shrink, so do lenses, and so do the options for upgrading to a better lens. And forget about switching to a different focal length or aperture its often just not an option. Unless you make it an option by adding a CS lens mount to a high-end webcam.

Well stipulate that at 4k resolution and packed with all sorts of goodies, the Logitech Brio Pro is a heck of a nice camera. And the lens isnt bad either, as youd hope for a camera with almost 9 megapixels at its disposal. But with an optical field of view optimized for video conferencing, its hard to use this premium camera for much else. [Saulius] fixed that by taking the camera apart and adding a new case with a built-in C- and CS-mount, resulting in literally thousands of lens choices. [Saulius] post has valuable teardown information, which includes exposing the CCD sensor completely. The new case is sold as a kit, but it looks like a 3D-printed case would be pretty easy to whip up.

[Salius] sure seems to love those optical hacks, whether they be a budget microscope camera, high-resolution LIDAR, or capturing license plates at great distances.

Filed under: digital cameras hacks


Malicious code written into DNA infects the computer that reads it Lifeboat News: The Blog

In a mind-boggling world first, a team of biologists and security researchers have successfully infected a computer with a malicious program coded into a strand of DNA.

It sounds like science fiction, but I assure you its quite real although you probably dont have to worry about this particular threat vector any time soon. That said, the possibilities suggested by this project are equally fascinating and terrifying to contemplate.

The multidisciplinary team at the University of Washington isnt out to make outlandish headlines, although its certainly done that. They were concerned that the security infrastructure around DNA transcription and analysis was inadequate, having found elementary vulnerabilities in open-source software used in labs around the world. Given the nature of the data usually being handled, this could be a serious problem going forward.


WhatsApp Refused to add a Backdoor for the UK Government SoylentNews

Submitted via IRC for SoyCow8963

The UK government has made no secret of its dislike of encrypted messaging tools, and it has made frequent reference to the problems WhatsApp causes it with regard to investigations into terrorism. Calls have been made by the government to force companies to allow access to encrypted content when asked.

In the wake of Theresa May's "more needs to be done about extremist content" speech, it has emerged that WhatsApp refused to add a backdoor that would allow the government and law enforcement agencies to access private conversations.

Sky News reports anonymous sources as saying that during the summer the government told WhatsApp to devise a way that would enable it to access encrypted messages. While WhatsApp already complies with government requests to provide meta data such as the name of an account holder, associated email address, and IP addresses used, it does not -- and, indeed, due to lack of access itself, cannot -- provide access to, or the content of encrypted messages.


Original Submission

Read more of this story at SoylentNews.


These tiny robots can kill cancer cells Lifeboat News: The Blog

Scientists have developed tiny robots than can drill into deadly cancer cells, blasting them open.


EMMC Hacks For The Speed And Capacity Upgrade Win Hackaday

You could say that it is the essence of a site like this one, that the kind of people who form our readership are also the kind of people who examine the specs of the devices in front of them to reveal hidden features. Such was the case with [Ryan], who noticed that the eMMC controller on his 96Boards HiKey development board supports both HS200 data transfer speeds and 1.8v signaling, both of which it wasnt using.

In unlocking the extra performance, he takes readers through a primer on the device tree, and is happy to report that his transfer rate has increased from 26 to 36 MB/s, a tidy return on his work.

However, the story doesnt end there. The 8GB Samsung eMMC chip wasnt quite as roomy as hed have liked, so it was time to replace it with a 32GB version. Even with careful desoldering, he managed to lift a few pads, though very fortunately they were ones that were either NC or power rails that were duplicated elsewhere. Some tricky reflowing of what is quite a formidable BGA package to do by hand, and he was rewarded with a working board featuring higher flash capacity. We salute him for taking it on, we probably wouldnt have had the courage.

Weve brought you a similar upgrade before, this time an eMMC on a Nexus 5 phone.

Thanks [darkspr1te] for the tip.

Filed under: parts


Development Release: FreeBSD 10.4-RC2 News

Less than a week after the first release candidate (RC) was made available, the second RC build of FreeBSD 10.4 is now also ready for testing. Some of the recent noteworthy changes include: "Given that the amd64 disc1 image was overflowing, more of the base components installed into....


Microsoft, Facebook, and Telxius Complete 160 Tb/s Atlantic Ocean Cable SoylentNews

Microsoft, Facebook, and Telxius have completed the Marea subsea cable, which connects Virginia Beach, Virginia, U.S. to Bilbao, Spain:

The Marea cable's new "open" design allows it to evolve with technology, ensuring the highest performance for users now and well into the future, even as the global population of internet users grows. And make no mistake, the demand is growing. Just think of the many high-bandwidth applications and content you use today such as Skype and Facebook Live, and the volume of streaming videos, movies and music consumed daily. This ability to interoperate with many different kinds of networking equipment brings significant benefits including lower costs and easier equipment upgrades, leading to faster growth in bandwidth rates.

Completed in less than two years nearly three times faster than is typical Marea is a powerful example of the important role the private sector has to play in connecting the world. It also set a new standard for subsea cables because it is designed to meet today's demand and evolve with the progress of tomorrow, allowing companies offering digital services to be better equipped to handle cross-border internet traffic, which is expected to increase eightfold by 2025.

Read more of this story at SoylentNews.


Ashley Brooke Taylor, Cofounder at Future Culture, joins our New Money Systems Board. Lifeboat News

Ashley Brooke Taylor, Cofounder at Future Culture, joins our New Money Systems Board. Future Culture is a nonprofit partnership honing a unique perspective on the integration of blockchain and community.


Uber to Lose its License to Operate in London SoylentNews

Uber will lose its license to operate inside London. The issue may be only a temporary setback since the license expires on September 30th and Uber can continue to operate in London while appealing the decision:

London's transportation agency dealt a major blow to Uber on Friday, declining to renew the ride-hailing service's license to operate in its largest European market. [...] "Uber's approach and conduct demonstrate a lack of corporate responsibility in relation to a number of issues which have potential public safety and security implications," the agency, Transport for London, said in a statement.

[...] In issuing its decision, Transport for London, which is responsible for the city's subways and buses as well as regulating its taxicabs, declared that Uber was not "fit and proper" to operate in the city a designation that carries significant weight in Britain. "Fit and proper" is a benchmark applied across different sectors of business and the charitable organizations in the country to ensure that people or organizations meet the requirements of their industry or specialty. Tests typically assess factors like an individual or company's honesty, transparency and competence, though there is no formal exam. In Uber's case, Transport for London said it examined issues of how it dealt with serious criminal offenses, how it conducted background checks on drivers and its justification for a software program called Greyball that "could be used to block regulatory bodies from gaining full access to the app."

Opinion: London's Uber Ban Is a Big Brexit Mistake

Original Submission

Read more of this story at SoylentNews.


Playing Mario on an Oscilliscope Hackaday

Theres not many technical details but [phckopper] lets us know that the rendering is done using the SPI on the STM, transferred via DMA, which is synchronized to two saw-tooth waves that are fed in to the X and Y axes of the oscilloscope.  The Z axis, which controls the brightness of the dot, is fed from the MOSI. By making the oscilloscope range all over the screen, similar to the way a CRTs gun does, [] is able to draw sprites, rather than vector graphics. The display has a resolution of 400400 and each sprite is 1616. The input is from a PS2 joystick connected to [phckopper]s PC, with the information communicated over UART using a simple protocol.

[via Reddit]

Filed under: hardware, Microcontrollers, nintendo hacks


NVIDIA Making Progress On Server-Side GLVND: Different Drivers For Different X Screens Phoronix

While NVIDIA isn't doing much to help out Nouveau, at least the company is contributing to the open-source Linux graphics ecosystem in other ways. In addition to presenting at XDC2017 this week on the Unix device memory allocator API and DeepColor / HDR support, they also presented on server-side GLVND...


Antibody Combination Attacks 99% of HIV Strains SoylentNews

Scientists have engineered a "tri-specific antibody" that they say can attack 99% of HIV strains:

Scientists have engineered an antibody that attacks 99% of HIV strains and can prevent infection in primates. It is built to attack three critical parts of the virus - making it harder for HIV to resist its effects.

The work is a collaboration between the US National Institutes of Health and the pharmaceutical company Sanofi. The International Aids Society said it was an "exciting breakthrough". Human trials will start in 2018 to see if it can prevent or treat infection.

Trispecific broadly neutralizing HIV antibodies mediate potent SHIV protection in macaques (DOI: 10.1126/science.aan8630) (DX)

The development of an effective AIDS vaccine has been challenging due to viral genetic diversity and the difficulty in generating broadly neutralizing antibodies (bnAbs). Here, we engineered trispecific antibodies (Abs) that allow a single molecule to interact with three independent HIV-1 envelope determinants: 1) the CD4 binding site, 2) the membrane proximal external region (MPER) and 3) the V1V2 glycan site. Trispecific Abs exhibited higher potency and breadth than any previously described single bnAb, showed pharmacokinetics similar to human bnAbs, and conferred complete immunity against a mixture of SHIVs in non-human primates (NHP) in contrast to single bnAbs. Trispecific Abs thus constitute a platform to engage multiple therapeutic targets through a single protein, and could be applicable for diverse diseases, including infections, cancer and autoimmunity.

Original Submission

Read more of this story at SoylentNews.


Why Are These People Eating Worms to Be Healthy? (part I) Lifeboat News: The Blog

Summary: The Hygiene Hypothesis persuades people to consume parasitic worms as a way to treat chronic autoimmune disorders. As well, people eat tapeworms as a way to lose weight. Learn more about two closely related scientific beliefs called the Hygiene Hypothesis and the Old Freinds Hypothesis. Part 1 of a 2-part series. Cover photo: 3drenderings / Getty Images.

Its difficult to believe, but thousands of people eat worms as a way to lose weight or cure diseases.

People dont just eat worms on TV shows, like the Fear Factor. Some extreme dieters consume tapeworms as a way to lose weight. Another group of people ingests parasitic worms known as helminths to ward-off the debilitating symptoms of autoimmune diseases.


Over Half a Million Vehicle Records from SVR Tracking Leaked Online HackRead

By Waqas

Over Half a Million Vehicle Records from SVR Tracking Leaked

This is a post from Read the original post: Over Half a Million Vehicle Records from SVR Tracking Leaked Online


Why Are These People Eating Worms to Be Healthy? (part II) Lifeboat News: The Blog

Summary: Helminthic therapy is the intentional consumption of parasites as a treatment for autoimmune disease. Out of the 7000 people who practice helminthic therapy each year, this report tells the story of a young woman who purchases black market worms and then treats herself at a high cost. Part 2 of a 2-part series. Cover photo: Eraxion / Getty Images.

Would you eat worms to boost your overall health or cure what ails you?

Over 7,000 people intentionally self-infect with parasites, and the practice is growing in popularity.


Hackaday Prize Entry: Infrared Vein Illumination Hackaday

Phlebotomy is a fun word, and the fine art of finding veins. While the skill of putting needles in arms is honed by nurses and physicians over the course of decades, there are, of course, technological solutions to finding veins. One of the more impressive medical devices that does this uses near-infrared imaging basically looking under the skin with almost visible light. These devices cost a fortune.

One project in the Hackaday Prize is looking to change that. Its a near-infrared vein finder. Instead of the thousands of dollars professional unit costs, this one can be built for under one hundred bucks.

As far as this build goes, veins are illuminated via IR light at about 950nm. The backscatter of this light is captured via a Raspberry Pi NoIR camera, with regular old photography film blocking visible light. From there, its just a simple matter of image processing and hitting enhance several times until veins appear on a display.

The HackadayPrize2017 is Sponsored by:
Texas Instruments

Filed under: The Hackaday Prize ...


Rhonda Stevenson, President of Tau Zero Foundation, joins our Space Settlement Board. Lifeboat News

Rhonda Stevenson, President of Tau Zero Foundation, joins our Space Settlement Board.


Re: Why send bugs embargoed to distros? Open Source Security

Posted by Marcus Meissner on Sep 23

We have released openSUSE Leap and SUSE Linux Enterprise 12 SP2/SP3 updates.

Where did you look and not find this?

SUSE has rated the issue as moderate severity (bordering on important),
as exploitability seems difficult and not targetable.

So we were not targeting a "same as CRD day release" as with other more
severe issues, but have now released updates in the next days after the...


SDL 2.0.6 Released With Vulkan Helpers, DRM/KMS Driver Phoronix

SDL 2.0.6 was released on Friday as the latest feature update for this widely-used library that allows for more cross-platform portability of applications and games centered around input, audio, and video helpers...


Re: Why send bugs embargoed to distros? Open Source Security

Posted by Till Drges on Sep 23

Am 23.09.2017 um 13:44 schrieb Hanno Bck:

JFTR, there are:

Regards -- Till


A Vaccine Is Being Developed For Preventing Tooth Decay And It Sounds Amazing Lifeboat News: The Blog

Regular visits to the dentist are an important part of keeping your teeth healthy. But what if you could give your oral health a boost by receiving a vaccine on top of your regular dental care routine?

Researchers from the Wuhan Institute of Virology (WIOV) of the Chinese Academy of Sciences are working on such a vaccine, and their study has just been published in Scientific Reports.

Led by WIOV scientist Yan Huimin, the researchers tested a fusion of proteins to prevent the development of dental caries. Better known as dental cavities, caries is caused by the bacteria Streptococcus mutans (S. mutans).


3D Printing At Maker Faire Hackaday

The current trend of cheap, desktop, consumer 3D printers arguably began at the World Maker Faire in New York several years ago. What began with just a single printer exploded into a mindless proliferation of extrusion boxes, and by 2012, every single booth had to have a 3D printer on display no matter how applicable a CNC machine was to what they were actually selling.

Now were in the doldrums of the hype cycle and 3D printers just arent cool anymore. This year at the World Maker Faire, 3D printers were relegated to a tiny corner of the faire, right next to the portajohns. Its the smallest showing of 3D printing Ive ever seen at the New York Maker Faire.

Of course, this doesnt mean the state of 3D printing isnt constantly improving. 3D printers have never been cheaper, more capable, or more popular. This is how technology works, really: it doesnt get good until it gets boring. Still, there were some impressive displays of the current state of 3D printing at the World Maker Faire this weekend. You can check that out below.

Prusas I3 Mk. 3

One of the perennial favorite 3D printers is the Prusa I3, In the last year, Prusa has been knocking everything out of the park with actual innovation like a slicer for beginners, a dead-simple implementation of variable layer thickness printing, and of course multi-material extrusion.

Now the I3 is getting an upgrade, announced today at the World Maker Faire. The I3 MK 3 is an incremental upgrade, but still has some awesome, very desirable features. The stepper drivers have been upgraded to Trinamic drivers, and the fan is now a PC Master Race-approved Noctua unit. The print bed has been upgraded to a removable, magnetic piece of spring steel coated with PEI, and theres now a touch sensor to turn the printer on. Also on the upgrade list is a Bondtech drive gear, an optical filament encoder, and the ability to recover prints after a power failure and to recover shifted layers.

There are a few pics of the prints coming off the multi-extrusion Prusa below. These are really some of the finest prints Ive ever seen coming off a 3D printer. Of course, most of this is due to the incredible operator skill demonstrated by the Prusa team, but these results show the Prusa is capable of just about anything.


Neanderthal Brains Developed More Slowly than Humans SoylentNews

A new study of a Neanderthal child's skeleton has suggested that Neanderthal brains developed more slowly than previous studies had indicated:

A new study shows that Neanderthal brains developed more slowly than ours. An analysis of a Neanderthal child's skeleton suggests that its brain was still developing at a time when the brains of modern human children are fully formed. This is further evidence that this now extinct human was not more brutish and primitive than our species. The research has been published in the journal Science.

Until now it had been thought that we were the only species whose brains develop slowly. Unlike other apes and more primitive humans modern humans have an extended period of childhood lasting several years. This is because it takes time and energy to develop our large brain. Previous studies of Neanderthal remains indicated that they developed more quickly than modern humans - suggesting that their brains might be less sophisticated.

But a team led by Prof Antonio Rosas of the Museum of Natural Sciences in Madrid found that if anything, Neanderthal brains may develop more slowly than ours. "It was a surprise," he told BBC News. "When we started the study we were expecting something similar to the previous studies," he told BBC News.

Also at Science Magazine, NYT, and Discover Magazine.

The growth pattern of Neandertals, reconstructed from a juvenile skeleton from El Sidrn (Spain) (open, DOI: 10.1126/science.aan6463) (DX)

Original Submission

Read more of this story at SoylentNews.


2 awesome open source apps to share your terminal over the web nixCraft

Want to share your terminal over the web for demo, learning or collaboration purpose? Try these two applications to share your terminal as a web application.


The Tiny, $25 PocketBone Hackaday

It was announced a day or two ago, but now the PocketBone has made its first real-world appearance at the World Maker Faire in New York this weekend. This is a tiny, tiny Linux computer thats small enough to fit on a keychain, or in an Altoids mini tin. Its only $25 USD, and from the stock lists on Mouser and Digikey, there are plenty to go around.

The specs for the PocketBeagle are more or less exactly what you would expect from any BeagleBone. Theres an ARM Cortex-A8 running at 1GHz, 512 MB of RAM, and SD card storage. I/O is eight analog inputs, up to 44 digital GPIOs, up to 3 UARTs, 2 I2C busses, 2 SPI busses, and 4 PWM outputs. All of this is packed into the OSD3358 System on a Chip from Octavo Systems.

This isnt the first time weve seen Octavo Systems BeagleBone on a Chip Before the release, head Beagle herder [Jason Kridner] built a PocketBone in Eagle, which was shortly followed by [Michael Welling]s similar efforts in KiCad. The PocketBone has been a reality for months, but now its accessible to hackers who dont want to deal with soldering BGA packages.

Of course, a new development board isnt worth anything without a few demos and examples. For Maker Faire, [Jason] brought out two demos. The first of these is effectively a PacMan arcade game just a simple 3D printed enclosure, a screen, and two d-pads made out tact switches. It plays PacMan and only PacMan, but its good enough to demonstrate the Linux-ness of the PocketBone.



Re: Why send bugs embargoed to distros? Open Source Security

Posted by Kurt H Maier on Sep 23

This is standard operating procedure for Red Hat, at least. Generally
days or even weeks pass before patches are released. If you're an
"Extended Update Support" customer you can expect months to go by. If
you're super lucky you'll get a systemtap script to play with, but that
generally requires a kernel RCE.



Adobe Accidentally Publishes One of its Private PGP Keys SoylentNews

Adobe is showing that it can be transparent about its security practices:

Having some transparency about security problems with software is great, but Adobe's Product Security Incident Response Team (PSIRT) took that transparency a little too far today when a member of the team posted the PGP keys for PSIRT's e-mail accountboth the public and the private keys. The keys have since been taken down, and a new public key has been posted in its stead.

The faux pas was spotted at 1:49pm ET by security researcher Juho Nurminen:

Oh shit Adobe
Juho Nurminen (@jupenur) September 22, 2017

Nurminen was able to confirm that the key was associated with the e-mail account.

Also at The Register and Wccftech.

[How many here have done something like this? Perhaps an extra file accidentally uploaded to GitHub? --Ed.]

Original Submission

Read more of this story at SoylentNews.


Azam Shaghaghi, Strategy Analyst at BMO Financial Group, joins our New Money Systems Board. Lifeboat News

Azam Shaghaghi, Strategy Analyst at BMO Financial Group, joins our New Money Systems Board.


How to install xfs and create xfs file system on Debian/Ubuntu Linux nixCraft

I recently switched to a Ubuntu/Debian Linux server from a CentOS/RHEL 7.x. How do I install mkfs.xfs command on a Debian/Ubuntu Linux server? How do I create and manage file XFS file system on a Ubuntu or Debian Linux LTS server?


Retefe banking Trojan leverages EternalBlue exploit to infect Swiss users Security Affairs

Cyber criminals behind the Retefe banking Trojan have improved it by adding a new component that uses the NSA exploit EternalBlue.

ETERNALBLUE is the alleged NSA exploit that made the headlines with DOUBLEPULSAR in the WannaCry attack and NotPetya massive attacks.

ETERNALBLUE targets the SMBv1 protocol and it has become widely adopted in the community of malware developers.

Investigations on WannaCry, for example, revealed that at least other 3 different groups have been leveraging the NSA EternalBlue exploit. In August, a new fileless miner dubbed CoinMiner appeared in the wild, it uses NSA EternalBlue exploit and WMI tool to spread, earlier this year, researchers at Flashpoint observed the TrickBot banking Trojan also included an EternalBlue module as well.

Cyber criminals behind the Retefe banking Trojan have improved it by adding a new component that uses the NSA exploit EternalBlue.

The Retefe banking Trojan has historically targeted Austria, Sweden, Switzerland and Japan, and we have also observed it targeting banking sites in the United Kingdom. While it has never reached the scale or notoriety of better-known banking Trojans such as Dridex or Zeus, it is notable for its consistent regional focus, and interesting implementation. states the analysis published by ProofPoint.

Unlike Dridex or other banking Trojans that rely on webinjects to hijack online banking sessions, Retefe operates by routing traffic to and from the targeted banks through various proxy servers, often hosted on the TOR network, 

Researchers have observed a wave of phishing messages using weaponized Microsoft Office documents. containing embedded Package Shell Objects, or Object Linking and Embedding Objects, that are typically Windows Shortcut .lnk files, researchers said.

Once the user opened the shortcut accepting the security...


Nouveau Developers Remain Blocked By NVIDIA From Advancing Open-Source Driver Phoronix

Longtime Nouveau contributors Martin Peres and Karol Herbst presented at this week's XDC2017 X.Org conference at the Googleplex in Mountain View. It was a quick talk as they didn't have a whole lot to report on due to their open-source NVIDIA "Nouveau" driver efforts largely being restricted by NVIDIA Corp...


Security cameras can be hacked using infrared light, claims study TechWorm

Researchers hack security camera networks with IR LEDs

Cybersecurity experts from Ben-Gurion University of the Negev (BGU) in Israel have demonstrated that security cameras infected with malware can be hacked invisibly and controlled using infrared (IR) light, which then can be used to either infiltrate a network or disclose sensitive information from the cameras network.

In a paper titled aIR-Jumper: Covert Air-Gap Exfiltration/Infiltration via Security Cameras & Infrared (IR), the researchers said that the technique can be used on professional and home security cameras, and even LED doorbells, which can detect infrared light (IR), not visible to the human eye. CCTV cameras are equipped with IR LEDs, used for night vision, and are perfect for the aIR-Jumper technique to exploit.

In this paper, we show how attackers can use surveillance cameras and infrared light to establish bi-directional covert communication between the internal networks of organizations and remote attackers. We present two scenarios: exfiltration (leaking data out of the network) and infiltration (sending data into the network), the researchers wrote.

The cyber team led by Dr. Mordechai Guri, head of research and development for BGUs Cyber Security Research Center (CSRC), demonstrated how IR can be used to create a secret communication channel between malware installed on an internal computer network and an attacker located at a distance of hundreds of metres to kilometres away with direct line of sight.

The researchers were able to leak internal data at a bit rate of 20bit/s per camera and were able to deliver commands to the network at bit rate of more than 100bit/s from one camera. The aIR-Jumper method can be used to transfer hidden signals to surveillance cameras, including PIN codes, passwords, and encryption keys, which are modulated, encoded, and then transferred to attackers.

Security cameras are unique in that they have one leg inside the organization, connected to the internal networks for security purposes, and the other leg outside the organization, aimed specifically at a nearby public space, providing very convenient optical access from various directions and angles, Mordechai Guri said in the release.

The researchers uploaded two videos on YouTube, wherein the first video shows an attacker sending infrared signals to the security camera, while the second one shows the camera (which is already infected with malware) exfiltrating data from the affected network.

In an infiltration scenario, an attacker standing in a public area (e.g., in the s...


Re: Why send bugs embargoed to distros? Open Source Security

Posted by Marc Deslauriers on Sep 23


Having access to the embargoed information allowed us (Ubuntu) to evaluate the
impact of the issue, look at the fix, and start locally testing the fix to
determine if there were any issues. It also allows us to properly assign
resources to working on the update.

It would have probably taken us more than a day to publish this update if we
didn't have access to the information in advance.

For issues that aren't critical, we tend to...


Samsung Galaxy S9 Video Camera May Be 4x Faster Than iPhone X TechWorm

Samsung Galaxy S9 video with 1,000 frame-per-second, may be four times faster than iPhone X

We have always seen that Apple and Samsung try to outdo each other with their new flagships. Recently, Apple launched its premium smartphone iPhone X on September 12 in Cupertino to celebrate the 10th anniversary of the first ever iPhone. While people are still talking about Apples iPhone X, Samsung has decided not to be left behind and make its presence felt too.

According to a report by Korean publication ETNews, Samsung has reportedly developed a high speed new image sensor that can capture photos at an incredible 1,000 frames per second (fps) with 4x slow motion video capability. On the other hand, Apples iPhone X is able to take 240 frames per second based on full HD resolution.

The 4x slo-mo capture by Samsung is similar to how Sony created for its incredible Xperia XZ1 and XZ Premium smartphones. However, the company may use slightly different technology for the sensor to avoid infringement of Sony patent, the site said. For instance, Samsungs design is a little different from Sonys (which also uses a three-layer chip) in that the memory is bonded to the rear surface of an existing two-layer sensor design rather than fitted in between the image sensor and logic components.

The new image sensor camera is planned for Samsungs upcoming Galaxy S9 line and the company will start the mass production of the three-layered image sensor as early as November 17th. This layered three-structure design of the sensor is made into a layered structure by connecting a system semiconductor (logic chip) that is in charge of calculations and DRAM chip that can temporarily store data through TSV (Through Silicon Via) technology. After the pilot operation, the company will start mass producing it in December.

Currently, we are unsure if all these rumors and speculations are accurate. With Samsung not expected to announce the Galaxy S9 atleast till the start of 2018, we are likely to come across many more leaks about the device in the near future. However, on the other hand, if Samsung manages to fit the slow-mo camera into the Galaxy S9, it is expected to beat the Galaxy S8, Galaxy Note 8, iPhone X and maybe the current top end Sony phones too.

The post Samsung Galaxy S9 Video Camera May Be 4x Faster Than iPhone X appeared first on TechWorm.


The Think Liberty Podcast Candidate Spotlight Zoltan Istvan Lifeboat News: The Blog

I did a 30 minute podcast at Think Liberty about my #transhumanism ideas and governor run:

Our very own Kevin Shaw sits down and speaks with 2018 California Libertarian Governor candidate Zoltan Istvan. Comments comments Related.


The Court of Appeals for the Federal Circuit (CAFC) Gradually Champions Patent Quality, in a Spectacular Reversal on Its Past Ways Techrights

Under Chief Judge Sharon Prost

Sharon ProstSummary: Some of the latest actions and decisions from the Federal Circuit, which originally brought software patents to the United States and is now taking them away, gradually

LAST night we wrote about the Federal Circuit (CAFC) refuting Gilstrap yet again. We later updated our post with a statement from CCIA and then found this good coverage from a good journalist (a lot of those who cover patent issues are unfortunately with and usually from the patent microcosm). He summarised it as follows:

Not long after TC Heartland, though, the East Texas judge who hears more patent cases than any other turned down a motion to transfer by supercomputer maker Cray Inc., which was sued for patent infringement by Raytheon in 2015. Lawyers for Cray argued that, under the provisions of TC Heartland, their client was entitled to have its case in a home venue. But US District Judge Rodney Gilstrap disagreed and said that Crays ties to the districta single salesperson, working out of his homewas enough to keep the case in the Eastern District.

Today, Gilstraps decision was reversed by the US Court of Appeals for the Federal Circuit, which hears all patent appeals. In a 20-page decision (PDF), the three-judge panel directed the case against the Seattle-based tech company to be transferred.

Gilstraps decision to keep Raytheon v. Cray in his court turned the normally wonky area of patent venue into a scorching political issue. At a Capitol Hill hearing about patent reform, the judge was denounced by both Rep. Bob Goodlatte (R-Va.) and Rep. Darrell Issa (R-Calif.), with Issa calling Gilstraps decision reprehensible.

Last week the patent microcosm...


Dip update 90/n wherestheflux

[Orig: Sept 23, 2017]
Hi everyone,
Below is the latest LCO light curve. Comparing to other 'out of transit' times (e.g., pre- and post-Elsie), it is suggestive that the variability seen here after Angkor is real, though our observations are not sensitive enough to say more (you would need a space telescope to make this distinction at this low level of variability).        
More later,
~Tabby and team
PS: These observations are happening because of the wonderful backers of our 2016 Kickstarter project. The Kickstarter campaign has ended, but we are still accepting donations to purchase additional observing time on the LCO 0.4m network. Thanks in advance for your support!      


Re: Why send bugs embargoed to distros? Open Source Security

Posted by Anthony Liguori on Sep 23

Just as an FYI, we (Amazon Linux AMI) also did all of the preparation
during the embargo period published shortly after embargo lift.

The pre-disclosure period gives us an opportunity to take the time to
analyze the problem and run through testing of the reported fix. It's
super valuable for us.


Anthony Liguori


New ransomware scam asks for nude pics to unlock files HackRead

By Uzair Amir

A few months ago, two ransomware scams made news for

This is a post from Read the original post: New ransomware scam asks for nude pics to unlock files


Quick and Dirty Blimp Mount for a Shotgun Mike Hackaday

Sometimes you dont have the hardware you need, and you can either do without or let the projects needs inspire you to create an alternative. Thats pretty sweet, and its even sweeter when you find a solution thats dirt cheap.

[Chu_st] created a sub-$10 blimp mount for his shotgun mike. It consists of a PVC pipe which attaches to the microphones shock mount. Plastic gardening grid is used for the shell, shaped by hand into the desired blimp shape and secured with zip ties and gaffer tape. [Chu_st] suggests using nylon stocking as a wind screen. The microphone itself attaches to a length of bicycle seat tube using a standard mic clamp.

For DIY microphone projects, we got you covered, with everything from a low noise floor microphone to one built out of a hard drive published previously.

Filed under: hardware


Re: Why send bugs embargoed to distros? Open Source Security

Posted by Simon McVittie on Sep 23

The Debian bug tracker ( is always public and has no
mechanism for embargoing individual bugs, so it is never used before
public disclosure.

It's entirely possible that your conclusion is correct in this case
(I don't have any more information than you do on whether the Debian
security team or package maintainer made use of the embargo period
for this vulnerability), but the late opening of a bug is not evidence
that no...


Re: Why send bugs embargoed to distros? Open Source Security

Posted by Levente Polyak on Sep 23


For Arch Linux I tested the patch beforehand and prepared the changed
buildscripts locally. The final build/release/publication process was
invoked just minutes after the public disclosure and the final artifact
was signed and hit the repository just 20 minutes after the disclosure.
The advisories were sent ~4 hours later once gone through a
peer-reviewing process (yes this could have been done even faster).

But that's not actually...


The Mohawk-PTAB Fiasco Threatens the Tribes Reputation More Than It Threatens PTAB Techrights

Since the patents are not even assigned to the Mohawk people, this whole scam accomplishes nothing

Suscol Intertribal Council
Photo credit: Sarah Stierch (CC BY 4.0)

Summary: In an effort to dodge scrutiny from the Patent Trial and Appeal Board (PTAB), Allergan Plc offloaded a lot of negative publicity onto the Mohawk people, owing primarily to the Mowhawk Tribes general counsel, Dale White

THE Patent Trial & Appeal Board (PTAB) has been making many headlines recently. The patent microcosm is trying as hard as it can to kill it. It cannot kill the people inside the PTAB (whom it vainly refers to as a death squad), so it wants to kill the entire institution. Its appalling.

We were very sad to see the Mohawk people exploited, or virtually used as a sort of instrument for killing PTAB. As some people have put it, the Mohawk tribe is now facilitating a "scam" (not our word). Dont expect the patent microcosm to admit this. In fact, in some comments that we saw over the past week, all criticisms of this ploy are being dismissed or played down as being just a substance-less cry of scam. Far from it!

Earlier this week, in a site of the patent microcosm, Philippe J.C. Signore from Oblon wrote about this as a case for refreshing Constitutional Law recollection. Well, as patent radicalism is waning (the system has improved in recent years) they will try to crush the system. Here is what Signore wrote:

Article III also states that the judicial power of the U.S. is vested in the federal courts and judges. In its brief filed in August 2017, Oil States argued that IPR proceedings are unconstitutional because they are set up as adversarial judicial trials (as opposed to examination proceedings) of granted private property rights, and as such should be handled by Article III judges and not administrative agency employees who are beholden to Executive Branch officials. Oil States also argued that IPR trials resolve questions of novelty or obviousness, which are precisely the same questions that English jurors resolved, such that they fall within the Seventh Amendments scope.

The Eleventh Amendment of the Constitution has also made the patent headlines lately. Th...


SolarCity Will Pay $29.5 Million to Settle Allegations that it Lied to the Government SoylentNews

SolarCity, a company Tesla acquired in Nov. 2016, has agreed to pay $29.5 million to resolve allegations that it lied to the government by submitting inflated claims to cash in on a solar stimulus program, the Department of Justice announced Friday.

SolarCity has agreed to drop charges it had against the US government as part of the settlement, which is not an admission of guilt. The settlement is a SolarCity obligation, a SolarCity representative told Business Insider.

The investigation centered on a program Section 1603 set up under the Obama administration that was meant to encourage solar adoption by subsidizing installation costs. The program allowed solar companies to receive a federal grant that was equal to 30% of the cost to install or acquire solar systems.

The Justice Department alleges that SolarCity made thousands of claims that overstated the costs of its installations, allowing it to receive inflated grant payments. It has been probing SolarCity and several other solar companies since 2012.

Source: Business Insider

SolarCity was founded in 2006 by brothers Peter and Lyndon Rive, based on a suggestion for a solar company concept by their cousin, Elon Musk, who is the chairman and helped start the company. The Rive brothers left SolarCity earlier this year.

Original Submission

Read more of this story at SoylentNews.

Go Back:30 Days | 7 Days | 2 Days | 1 Day

IndyWatch Science and Technology News Feed Today.

Go Forward:1 Day | 2 Days | 7 Days | 30 Days

Saturday, 23 September


HTTPS By Default For Everyone Phoronix

Just a quick heads up for those that haven't noticed yet, HTTPS is now used by default across all of as of this week...


Dr. Aubrey de Grey Lifeboat News: The Blog

Aging is a consequence of physics, not biology. Dr. Aubrey de Grey believes that the aging of any machine with moving parents is fundamentally the same, whether that machine is alive or not. He states that the SENS Foundation doesnt work on longevity and immortality it works on health. The only way we are going to live substantially longer is by staying truly youthful for substantially longer.


Latest EPO Rumours Allege That Benot Battistelli Rigged the Process of EPO Presidents Selection Techrights

Dont mess with the cole

Order of succession
Reference: Order of succession

Summary: Antnio Campinos is quite likely the next EPO President, as insiders suspect that many applications for the job got rejected politically (turned down by political mischief)

THE German media believes that Antnio Campinos will be the next head of the EPO (the Office, not the Organisation, whose Chairman will leave one week from now). Campinos is believed to be French, for reasons we explained before [1, 2], and he is close to Battistelli. Insiders suspect that Battistelli is already paving the way for Campinos to win the job, as we previously explained in:

  1. Its a Family Business: French Succession Plan at EPO After Battistellis Departure
  2. One Week Left for Battistellis Coronation of Another Frenchman, Antnio Campinos, to Lobby for UPC?
  3. Rumours That Another Frenchman is the Only Candidate to Succeed Benot Battistelli at the EPO

Imagine having 3 French Presidents (out of 4) in succession! Never mind the fact that much of the remaining management, dubbed Team Battistelli, is also French. What a coup! (French word)

Insiders suspect that Battistelli is already paving the way for Campinos to win the jobAccording to sources close to the action, one read...


X.Org Foundation Has Become A Khronos Adopter Phoronix

The X.Org Foundation board announced during this week's XDC2017 summit that they have officially completed the paperwork to become a Khronos adopter...


Why send bugs embargoed to distros? Open Source Security

Posted by Hanno Bck on Sep 23


A few days have passed since the optionsbleed disclosure. Some
interesting things have surfaced, e.g. the fact that it was apparently
discovered already in 2014, but nobody noticed it was a security bug.

But I'd like to discuss something else:
I had informed the distros mailing list one week earlier about the
upcoming disclosure with a bug description and links to the already
available patch.
My understanding is that the purpose of the...


CSE CybSec ZLAB Malware Analysis Report: Petya Security Affairs

Im proud to share with you the second report produced by Z-Lab, the Malware Lab launched by the company CSE CybSec. Enjoy the Analysis Report Petya.

CybSec Enterprise recently launched a malware Lab called it Z-Lab, that is composed of a group of skilled researchers and lead by Eng. Antonio Pirozzi.

Its a pleasure for me to share with you the second analysis that we have recently conducted on the Petya Ransomware.

We have dissected the ransomware and discovered interesting details that are included in our report.

Below the abstract from the analysis, the detailed report is available for free on our website.


In a modern environment, where data stored in computers play a fundamental role in the private and work routine, we must consider the problem of the risk of losing these data. In fact, the ever-increasing threat, that is spreading, is Ransomware. In the last 15 years, malware writers have realized that they may have anyone in their hand with his data.

Figure 1: Characteristic Petya Skull with the corresponding UI containing the payment ransom instructions.



Intel Prepping Support For Huge GTT Pages Phoronix

Intel OTC developers are working on support for huge GTT pages for their Direct Rendering Manager driver...


More Ice Found in Craters on Mercury SoylentNews

More ice has been found to exist in permanently shadowed craters and terrain on Mercury's surface:

The study, published in Geophysical Research Letters [DOI: 10.1002/2017GL074723] [DX], adds three new members to the list of craters near Mercury's north pole that appear to harbor large surface ice deposits. But in addition to those large deposits, the research also shows evidence that smaller-scale deposits scattered around Mercury's north pole, both inside craters and in shadowed terrain between craters. Those deposits may be small, but they could add up to a lot more previously unaccounted-for ice.

"The assumption has been that surface ice on Mercury exists predominantly in large craters, but we show evidence for these smaller-scale deposits as well," said Ariel Deutsch, the study's lead author and a Ph.D. candidate at Brown. "Adding these small-scale deposits to the large deposits within craters adds significantly to the surface ice inventory on Mercury."

[...] To seek further evidence that such smaller-scale deposits exist, the researchers looked though the altimeter data in search of patches that were smaller than the big crater-based deposits, but still large enough to resolve with the altimeter. They found four, each with diameters of less than about 5 kilometers. "These four were just the ones we could resolve with the MESSENGER instruments," Deutsch said. "We think there are probably many, many more of these, ranging in sizes from a kilometer down to a few centimeters."

A Mercury Colony?

Also at the American Geophysical Union.

Original Submission

Read more of this story at SoylentNews.


Keith Packard's Work On Better Supporting VR HMDs Under Linux With X.Org/DRM Phoronix

Earlier this year Keith Packard started a contract gig for Valve working to improve Linux's support for virtual reality head-mounted displays (VR HMDs). In particular, working on Direct Rendering Manager (DRM) and X.Org changes needed so VR HMDs will work well under Linux with the non-NVIDIA drivers...


Building This TARDIS Is Anything But A Snap Hackaday

As an avid fan of the show Dr Who, [Adam Sifounakis] saw a model for a laser-cut TARDIS that piqued his curiosity that eventually grew into a multi-week project involving multiple setbacks, missteps, revamps and finally gratification. Behold, his sound activated TARDIS.

First and foremost, assembling and painting the model was a fun puzzle despite a few trips to the store with a little backtracking on the painting due to impatience. Next, the creation of a pulsing soft white LED circuit timed with an audio clip to really sell the image of a mini-TARDIS proved to be a tedious ordeal, paying off in the end with a satisfying glow through the vellum-diffused windows on the model.

How to trigger the lights? [Sifounakis] initially wanted a capacitive sensor to trigger the sound effects, but that way lay dragons and madness so he went with snap-activated effect to activate the TARDIS like the Doctor himself. After struggling with building his own microphone setup, he switched to an electret mic with adjustable gain which worked like a charm. Setting up this TARDIS Adafruit Pro Trinket brain involved a snag or two, and after that it was smooth s...


Links 23/9/2017: Mesa 17.1.10 RC, Samba 4.7.0, KStars 2.8.4 Techrights

GNOME bluefish



  • Roughing it, with Linux

    I have been traveling for about two weeks now, spending 10 days camping in Iceland and now a few days on the ferry to get back. For this trip I brought along my Samsung N150 Plus (a very old netbook), loaded with openSUSE Linux 42.3.

  • Server

    • Finding the Mainframers of the Future Through Open Source Ecosystem Development

      Speak the word mainframe to many millennial techies, and the first things that likely come to mind are in the form of grainy sepia photos of floor-to-ceiling, wall-to-wall computers with big spinning tapes. But thats far from the reality of the modern mainframe.

      Imagine instead up to 240 10-core, 5.2ghz processors, 32TB of RAIM (redundant array of independent memory), hardware-based encryption, and fully hot-swappable hardware components. Those are the specs of the newly released IBM z14 a single machine that could replace the computing resources of an average corporate data center with room to spare.

    • Hybrid datacenter is Dockers latest open source goal

      Docker, Docker, Docker everyones talking about Docker. A surprising fact is that Docker wasnt on anyones roadmap in 2014, but was on everyones roadmap just a year later. A lot of people are calling it the most phenomenal, amazing, and speedy adoption of technology that theyve witnessed during their careers. But this sudden rise to fame hasnt been a lonely one. Docker has shared this amazing growth spurt with an entire ecosystem of tools and services.

  • Audiocasts/Shows


Chinese robot dentist is first to fit implants in patients mouth without any human involvement Lifeboat News: The Blog

An epidemiological survey has found there were about 400 million patients needing new teeth in China, but the number of qualified dentists was lagging behind demand.

In March this year the US Food and Drug Administration approved the use of a robot system named Yomi designed to assist human surgeons when fitting implants.

Successful procedure raises hopes technology could avoid problems caused by human error and help overcome shortage of qualified dentists.

PUBLISHED : Thursday, 21 September, 2017, 6:30pm.

UPDATED : Friday, 22 September, 2017, 9:43pm.


Beijing-Shanghai Railway Restores 350 km/h Train Service SoylentNews

China is once again operating the world's fastest train service after a speed cap was lifted:

China increased the maximum speed of bullet trains on the Shanghai-Beijing line to 350 kilometers per hour yesterday, six years after a fatal accident led to a speed cap. The limit was reduced to 300kph after 40 people died in a high-speed train crash near Wenzhou, east China's Zhejiang Province, in July 2011.

The decision to increase the speed means that China once again has the world's fastest train service. The new limit cuts the time of the 1,318-kilometer journey between Shanghai and the capital to four hours and 28 minutes, saving passengers nearly an hour. A total of 14 trains a day will run between the two cities at the higher speed.

Also at Xinhua and NextBigFuture.

Original Submission

Read more of this story at SoylentNews.


Russias Largest Torrent Site Celebrates 13 Years Online in a Chinese Restaurant TorrentFreak

For most torrent fans around the world, The Pirate Bay is the big symbol of international defiance. Over the years the site has fought, avoided, and snubbed its nose at dozens of battles, yet still remains online today.

But there is another site, located somewhere in the east, that has been online for nearly as long, has millions more registered members, and has proven just as defiant.

RuTracker, for those who havent yet found it, is a Russian-focused treasure trove of both local and international content. For many years the site was frequented only by native speakers but with the wonders of tools like Google Translate, anyone can use the site at the flick of the switch. When people are struggling to find content, its likely that RuTracker has it.

This position has attracted the negative attention of a wide range of copyright holders and thanks to legislation introduced during 2013, the site is now subject to complete blocking in Russia. In fact, RuTracker has proven so stubborn to copyright holder demands, it is now permanently blocked in the region by all ISPs.

Surprisingly, especially given the enthusiasm for blockades among copyright holders, this doesnt seem to have dampened demand for the sites services. According to SimiliarWeb, against all the odds the site is still pulling in around 90 million visitors per month. But the impressive stats dont stop there.

Impressive stats for a permanently blocked site

This week, RuTracker celebrates its 13th birthday, a relative lifetime for a site that has been front and center of Russias most significant copyright battles, trouble which doesnt look like stopping anytime soon.

Back in 2010, for example, RU-Center, Russias largest domain name registrar and web-hosting provider, pulled the plug on the sites former domain. The Director of Public Relations at RU-Center said that the domain had been blocked on the orders of the Investigative Division of the regional prosecutors office in Moscow. The site never got its domain back but carried on regardless, despite the setbacks.

Back then the site had around 4,000,000 members but now, seven years on, its ranks have swelled to a reported 15,382,907. According to figures published by the site this week, 778,317 of those members signed up this year during a period the site was supposed to be completely inaccessible. Needless to say, its operators remain defiant.



A humanely killed animal is still killed and thats wrong Terra Forming Terra

Hereford cattle arrive at a meat processing plant. <em>Photo by Daniel Garcia/Getty</em>

This is a stretch of course.  The animal's death releases its spirit body for a new cycle of life.  A humane death does matter while death itself does not matter at all.  The reason that is true is because death is inevitable while the experience is what is retained by the spirit body.  .

The faux moralists argue nonsense that demands outright extinction for all domesticates and a complete rewilding of the Earth as well.

I am actually a fan of a successful vegetarian diet.  At the same time i am also a fan of organic farming methodology and all that demands a massive increase in our use of working livestock to assist us.  That does mean a steady stream of animal protein to be consumed and ultimately a global surf...


Scooter Wheels Keep DIY Barn Doors on Track Hackaday

[MotoGeeking] built a giant spray booth and is in the process of making customized, air-filtering barn doors for it. When it came to buy hardware to move the doors, though, he found all the ready-made options to be prohibitively expensive. You know what comes next: he designed barn door hardware from the ground up, and did it as cheaply as possible.

After intensely studying many images of barn doors and hardware, [MotoGeeking] decided on the right wheels and went from there. Kick scooter wheels fit the bill nicely, since they are designed to support a lot of weight and come with their own bearings and spacers. And theyre cheap, too just $9 for a pair.

[MotoGeeking] found some C channel extruded aluminium that seemed to be a perfect match for the wheels, but the wheel was quick to bind whenever it touched the sides. He solved that one by epoxying a length of round bar into the bottom corners. This allows the wheel to move freely while forcing it to stay centered in the track.

In designing the 1/4 aluminium brackets, [MotoGeeking] took a measure thrice, order once approach to selecting the fasteners. You probably know by now that McMaster-Carr has free CAD drawings for every little thing. [MotoGeeking] imported the ones he liked into Illustrator and built around them. This helped him get it right the first time and kept the headaches and hair-tearing away. Watch the giant door skeleton glide effortlessly on its track after the break.

Filed under: hardware, how-to


Return of the city-state Terra Forming Terra

I personally posit the Communion of Xanadu as a global entity in which governance is through the natural community of approx. 150 souls and the rule of twelve.  The Nation State as we know it reduces natural communities into virtual communities inefficiently and fails a significant portion of its citizens.
What can be retained is the nation city that provides direct citizenship to ethnic avocations.   For example the city of Edinburgh can grant Scottish citizenship to all Scots.  This would give it almost 50,000,000 citizens able to vote on obvious cultural issues and a real forum to promote cultural values. They just would not mostly live there as that would no longer matter anyway.
What needs to be delinked is control over land use generally as that is best handled through the local; natural community and the application of the rule of twelve for conflicting issues...

Return of the city-state 
Nation-states came late to history, and theres plenty of evidence to suggest they wont make it to the end of the century

If youd been born 1,500 years ago in southern Europe, youd have been convinced that the Roman empire would last forever. It had, after all, been around for 1,000 years. And yet, following a period of economic and military decline, it fell apart. By 476 CE it was gone. To the people living under the mighty empire, these events must have been unthinkable. Just as they must have been for those living through the collapse of the Pharaohs rule or Christendom or the Ancien Rgime.

We are just as deluded that our model of living in countries is inevitable and eternal. Yes, there are dictatorships and democracies, but the whole world is made up of nation-states. This means a blend of nation (people with common attributes and characteristics) and state (an organised political system with sovereignty over a defined space, with borders agr...


Global cooperation depends on the strength of local connections Terra Forming Terra

Of course it does.  Thus my Rule of Twelve.   No communicating fully networked population is able to sustain conflict at all.  Where the problem arises is when such communication is assigned to an ill chosen one in such a way that he or she restricts such communication.  In short, hierarchy acts to limit cooperation and by extension, the more hierarchy we have the less cooperation we earn

The future will see all this resolved.  A lot we are actually relearning.  It is instructive that my newly imagined rule of twelve is integral to Bronze Age community governance and likely goes back to Antediluvian times.

We still see little substantive movement in my indicated direction mostly because hierarchical structures have and continue to control access to credit.

Global cooperation depends on the strength of local connections
Benjamin Allen  is an assistant professor of mathematics at Emmanuel College in Boston.



The healing power of nature Terra Forming Terra

This is a reminder, but also do note that methodology is also evolving as well and that this all needs to be taken much further.  I do think that running water has much to do with all this.

Thus there are plenty of local streams that need to be dressed up a little and set up for straight up canoe trips.  This also has the advantage of placing eyeballs on these forgotten rivers and getting political support for full restoration.  They will no longer be out of sight and out of mind.

My own experience tells me that even modest creeks can use this attention and be nicely restored.

The healing power of nature 

The idea that immersing yourself in forests and nature has a healing effect is far more than just folk wisdom 



Scientists Develop Device to Detect Counterfeit Booze SoylentNews

Researchers at The University of Manchester have developed the world's first handheld SORS device that can detect fake spirits, such as vodka and whisky, whilst still in their bottles.

SORS, or 'spatially offset Raman spectroscopy," devices give highly accurate chemical analysis of objects and contents beneath concealing surfaces, such as glass bottles. It works by using 'an optical approach' where lasers are directed through the glass, enabling the isolation of chemically-rich information that is held within the spirits.

Such devices are already commercially available but are usually used for security and hazmat detection, screening and pharmaceutical analysis. This latest version, developed at the University's School of Chemistry in the Manchester Institute of Biotechnology (MIB), is the first time such a handheld tool is being used for a food or beverage product. The reseach has been published in Nature today (21st September).

Spirit drinks are the EU's biggest agri-food export, with EU governments' revenues of at least 23 billion in excise duties and VAT, and approximately 1 million jobs linked to the production, distribution and sale of spirit drinks.

Bah, I make my own.

Original Submission

Read more of this story at SoylentNews.



Google released a Chrome 61 update that patches 2 High-Risk Flaws Security Affairs

The first high-risk bug, tracked as CVE-2017-5121, is an Out-of-bounds access in V8 reported by Jordan Rabet, Microsoft Offensive Security Research and Microsoft ChakraCore team on 2017-09-14.

The expert received a $ 7,500 reward under the Google bug bounty program.

The second high-risk vulnerability, tracked as CVE-2017-5122, is an Out-of-bounds access in V8 as well that was reported by Choongwoo Han of Naver Corporation on 2017-08-04.

The CVE-2017-5122 vulnerability was also awarded a $3,000 bounty.

According to Krishna Govind from Google, many vulnerabilities in Google solutions have been detected using AddressSanitizer, MemorySanitizer, UndefinedBehaviorSanitizer, Control Flow Integrity, libFuzzer, or AFL.

Google Chrome

To date, Google has already fixed 25 vulnerabilities (8 of them were assessed as High-severity issues) affecting different Chrome 61 releases, half of which were reported by external researchers.

Google already paid over $30,000 in bug bounty rewards to the external security researchers who discovered the vulnerabilities, the highest one was $7,500.

Pierluigi Paganini

(Security Affairs  Google Chrome, bug bounty)



Re: [CVE-2017-14266] tcprewrite Heap-Based Buffer Overflow Open Source Security

Posted by Salvatore Bonaccorso on Sep 22


Thanks for providing the (it looks the mail did not make it to
the list, the attachment was 6.4M so maybe it was rejected).

I'm attaching for list archiving purposed the base64 encoded tcp.pcap
gzip compressed file.

Now looking at an ASAN build, on i386:

sid-i386:/tmp/source-tcpreplay/tcpreplay-3.4.4# ./src/tcprewrite --portmap=21:2121 --infile=/tmp/tcp.pcap


Cheap, Full-Duplex Software Defined Radio With The LimeSDR Hackaday

A few years ago, we saw the rise of software-defined radios with the HackRF One and the extraordinarily popular RTL-SDR USB TV tuner dongle. Its been a few years, and technology is on a never-ending upwards crawl to smaller, cheaper, and more powerful widgets. Now, some of that innovation is making it to the world of software-defined radio. The LimeSDR Mini is out, and its the cheapest and most capable software defined radio yet. Its available through a Crowd Supply campaign, with units shipping around the beginning of next year.

The specs for the LimeSDR mini are quite good, even when compared to kilobuck units from Ettus Research. The frequency range for the LimeSDR Mini is 10 MHz 3.5 GHz, bandwidth is 30.72 MHz, with a 12-bit sample depth and 30.72 MSPS sample rate. The interface is USB 3.0 (the connector is male, and soldered to the board, but USB extension cables exist), and the LimeSDR is full duplex. That last bit is huge the RTL-SDR cant transmit at all, and even the HackRF is only half duplex. This enormous capability is thanks to the field programmable RF transceiver found in all of the LimeSDR boards. We first saw these a year or so ago, and now these boards are heading into the hands of hackers. Someones even building a femtocell out of a Lime board.

The major selling point for the LimeSDR is, of course, the price. The early bird rewards for the Crowd Supply campaign disappeared quickly at $99, but there are still plenty available at $139. This is very inexpensive and very fun on the Crowd Supply page, you can see a demo of a LimeSDR mini set up as an LTE base station, streaming video between two mobile phones. These are the golden days of hobbyist SDR.

Filed under: Crowd Funding, radio hacks


Microsofts Andromeda OS to turn Windows 10 into a modular platform TechWorm

Is Microsofts Andromeda OS, The New Windows 10 Mobile OS?

Microsoft is apparently working on to make Windows into a modular operating system known as Andromeda OS internally at the Redmond HQ, that will work cross-platform, on any device type or architecture, as reported by Microsoft insiders at Windows Central. Andromeda OS is the future support of Windows 10 operating system.

Windows OS is more than 30 years old now and is based on old and demanding code, architecture and features. With the introduction of Andromeda OS, Microsoft is looking to make Windows 10 a universal OS that will allow it to adapt to each specific device without being based on particular, prior product variants. In other words, Andromeda OS will turn Windows 10 into a modular system suitable for different architectures rather than the x86 architecture used by desktops, laptops, and tablets running Intel or AMD chips.

Andromeda OS will allow any functions to be added or removed to suit the system or device its required to run on. This will in turn offer developers the flexibility to build versions of Windows 10 with different features and functions, quickly and efficiently or use a Windows OS without being affected by performance-sapping features not required by the device.

Microsoft is expected to replace the mobile platform Windows 10 Mobile with Andromeda OS likely to be seen in phones and tablets, and possibly even wearables in 2018 or later.

The post Microsofts Andromeda OS to turn Windows 10 into a modular platform appeared first on TechWorm.


Janet Faulkner, Program Manager at the University of Houston, joins our Futurists Board. Lifeboat News

Janet Faulkner, Program Manager at the University of Houston, joins our Futurists Board.


lowRISC is Hiring: Help Make Open-Source Hardware a Reality. SoylentNews

From the lowRISC blog:

We are looking for a talented hardware engineer to join the lowRISC team and help make our vision for an open source, secure, and flexible SoC a reality. Apply now!

lowRISC C.I.C. is a not-for-profit company that aims to demonstrate, promote and support the use of open-source hardware. The lowRISC project was established in 2014 with the aim of bringing the benefits of open-source to the hardware world. It is working to do this by producing a high quality, secure, open, and flexible System-on-Chip (SoC) platform. lowRISC C.I.C. also provides hardware and software services to support the growing RISC-V ecosystem. Our expertise includes the LLVM Compiler, hardware security extensions and RISC-V tools, hardware and processor design.

[...] lowRISC is an ambitious project with a small core team, so you will be heavily involved in the project's development direction. This role will involve frequent work with external contributors and collaborators. While much of the work will be at the hardware level the post will offer experience of the full hardware/software stack, higher-level simulation tools and architectural design issues.

Some practical experience of hardware design with a HDL such as Verilog/SystemVerilog is essential, as is a good knowledge of the HW/SW stack. Ideally, candidates will also have experience or demonstrated interest in some of: SoC design, large-scale open source development, hardware or software security, technical documentation, board support package development and driver development. Industrial experience and higher degree levels are valued, but we would be happy to consider an enthusiastic recent graduate with a strong academic record.

Informal enquires should be made to Alex Bradbury

takyon (thanks to an AC): lowRISC is a project to create a "fully open-sourced, Linux-capable, system-on-a-chip"; it is based around RISC-V, the "Free and Open RISC Instruction Set Architecture", which is meant to provide an extensible platform that scales from low-level microcontrollers up to highly parallel, high-bandwidth general-purpose supercomputers.

Reduced instruction set computer (RISC).

Previously: RISC-V Projects to Collaborate
LowRISC Announces its 0.4 Milestone Release
SiFive and UltraSoC Partner...


Marsia Bealby, Coeditor of "Current Research in Egyptology 2012", joins our Futurists Board. Lifeboat News

Marsia Bealby, Coeditor of "Current Research in Egyptology 2012: Proceedings of the Thirteenth Annual Symposium", joins our Futurists Board.


8-Channel ADC For the Raspberry Pi Hackaday

The Raspberry Pi is a powerful embedded computing platform. However, for all its Linux-based muscle, it lacks one thing that even the simplest 8-bit microcontrollers usually have analog-to-digital conversion. There are a great many ways to rectify this shortcoming, and [Chris Burgess] has brought us another with an 8-channel ADC for the Raspberry Pi.

For the ADC, [Chris] chose the MCP3008, for its low cost and availability. In this configuration it offers 10-bit resolution and a maximum sampling rate of 200 kilosamples per second. Adafruit has a great guide on working with the MCP3008, too. With such a useful resource to hand, [Chris] was able to spin up a PCB to interface the chip to the Raspberry Pi using SPI. [Chris] took care to try to make the board to the official HAT specifications. As far as the physical aspects go, the board is to spec, however [Chris] omitted the EEPROM required for auto-configuration purposes. That said, the pads are on the board if someone wants to take the initiative to install one.

Its a tidy build that provides something sorely missing from the Raspberry Pi, for a reasonable cost. [Chris]s goal was to build something that would enable the measurement of analog sensors for a robot project; wed love to hear your ideas for potential uses in the comments!

Filed under: Raspberry Pi


Inside the Strange Science of the Fake Meat that 'Bleeds' SoylentNews

From Wired:

WIRED wants to take you on the deepest dive yet into the science behind the Impossible Burger.

Biting into an Impossible Burger is to bite into a future in which humanity has to somehow feed an exploding population and not further imperil the planet with ever more livestock. Because livestock, and cows in particular, go through unfathomable amounts of food and water (up to 11,000 gallons a year per cow) and take up vast stretches of land. And their gastrointestinal methane emissions aren't doing the fight against global warming any favors either (cattle gas makes up 10 percent of greenhouse gas emissions worldwide).

This is the inside story of the engineering of the Impossible Burger, the fake meat on a mission to change the world with one part soy plant, one part genetically engineered yeastand one part activism. As it happens, though, you can't raise hell in the food supply without first raising a few eyebrows.

Read more of this story at SoylentNews.


New antibody attacks 99% of HIV strains Lifeboat News: The Blog

Experiments on 24 monkeys showed none of those given the tri-specific antibody developed an infection when they were later injected with the virus.

It will enter clinical trials to prevent and treat the infection next year.


One year later, Microsoft AI and Research grows to 8k people in massive bet on artificial intelligence Lifeboat News: The Blog

Microsofts first mission statement envisioned a computer on every desk and in every home, but Bill Gates also had another goal: that computers would someday be able to see, hear, communicate and understand humans and their environment.

More than 25 years and two CEOs later, Microsoft is betting its future on it.


Guajataca Dam in Puerto Rico Failing - 70,000 at Risk - Evacuations Ordered SoylentNews

As if the onslaught of hurricanes Irma and Maria were not enough, the National Weather Service in San Juan is reporting that a major dam is failing in Puerto Rico and that 70,000 people are being evacuated by bus. From CBS:

The National Weather Service in San Juan said Friday that the northwestern municipalities of Isabela and Quebradillas, home to some 70,000 people, were being evacuated with buses because the nearby Guajataca Dam was failing after Hurricane Maria hit the U.S. territory.

Maria poured more than 15 inches of rain on the mountains surrounding the dam, swelling the reservoir behind it.

Details remained slim about the evacuation with communications hampered after the storm, but operators of the dam reported that the failure was causing flash-flooding downstream. The 345-yard dam holds back a man-made lake covering about 2 square miles and was built decades ago, U.S. government records show.

"Move to higher ground now," the weather service said in a statement. "This is an extremely dangerous and life-threatening situation. Do not attempt to travel unless you are fleeing an area subject to flooding or under an evacuation order."

"Act quickly to protect your life," it added. "Buses will be evacuating people from these areas."

Wikipedia has a page about Guajataca Dam

NWS report on Twitter; also at Al Jazeera and BBC.

Original Submission

Read more of this story at SoylentNews.


Tesla Reportedly Teaming Up With AMD for Custom AI Chip SoylentNews

According to CNBC, Tesla is teaming up with AMD to develop a custom chip optimized for AI, to be used for self-driving features in Tesla cars. The head of Tesla's "Autopilot" team is Jim Keller, formerly of AMD and Apple, who helped design the A4 and A5 chips while working at Apple and was lead architect on the Athlon 64 at AMD.

Also at Engadget, TechCrunch, and Business Insider

GlobalFoundries, which fabricates chips for Advanced Micro Devices Inc, said on Thursday that Tesla had not committed to working with it on any autonomous driving technology or product, contradicting an earlier media report. [...] The spokesperson for GlobalFoundries said that Jhas comments at the GlobalFoundries Technology Conference were not reported accurately.

Original Submission

Read more of this story at SoylentNews.


Warren no longer blocking Trump antitrust nominee: report The Hill: Technology Policy

Sen. Elizabeth Warren (D-Mass.) is no longer blocking President Donald Trumps nominee to head the Justice Departments Antitrust Division, Reuters reported.Warren on Friday reportedly lifted her hold and will allow the Senate to vote on Makan...


GitLab 10.0 Released

GitLab 10.0 has been released. "With every monthly release of GitLab, we introduce new capabilities and improve our existing features. GitLab 10.0 is no exception and includes numerous new additions, such as the ability to automatically resolve outdated merge request discussions, improvements to subgroups, and an API for Wiki thanks to a contribution from our open source community."


The quest for eternal life is trending Lifeboat News: The Blog

A long summary.

Could we live to 140? 1,000? Is there a limit? Scientific research into extending the human life span is being backed by Silicon Valley giants like Google and Facebook.


Solar Tide Clock Keeps Track of the Moon Hackaday

[rabbitcreek] based his the tide prediction software off of [Luke Millers] Tide Clock, which applies location-specific adjustments to the standard lunar clock, taking into consideration such factors as the geographic features (basin depth, etc.) that modify the default timing. [Miller]s Arduino code includes a library of common locations organized by NOAA station number.

[rabbitcreek]s project consists of a Adafruit Feather board hooked up to a DS3231 RTC breakout and a HS-225BB servo, which turns the clocks hand. Its an 180-degree servo, attached to a hacked-down Actobotics gearbox gearing the servo down 2:1 to permit 360 degrees of movement.

He also wanted his creation to be left to operate unattended for years, theoretically so solar power was a natch. The face of the clock consists of individual wavers o...


Announcing Intel Clear Containers 3.0

The Clear Containers team at Intel has announced the release of Clear Containers 3.0. "Completely rewritten and refactored, Clear Containers 3.0 uses Go language instead of C and introduces many new components and features. The 3.0 release of Clear Containers brings better integration into the container ecosystem and an ability to leverage code used for namespace based containers."


Blockchain for Good Hackathon, September 30 and October 1

When is it on?

The Blockchain for Good Hackathon takes place Saturday, 30 September and Sunday, 1 October. Full agenda can be found here.

How many years has it been going?

This is the inaugural event.

What exciting things can people look forward to for the 2017 version?


Facebook relicenses several projects

Facebook has announced that the React, Jest, Flow, and Immutable.js projects will be moving to the MIT license. This is, of course, a somewhat delayed reaction to the controversy over the "BSD+patent" license previously applied to those projects. "This decision comes after several weeks of disappointment and uncertainty for our community. Although we still believe our BSD + Patents license provides some benefits to users of our projects, we acknowledge that we failed to decisively convince this community."


Five Ways Ancient India Changed the World With Maths SoylentNews

India's contributions to mathematics:

It should come as no surprise that the first recorded use of the number zero, recently discovered to be made as early as the 3rd or 4th century, happened in India. Mathematics on the Indian subcontinent has a rich history going back over 3,000 years and thrived for centuries before similar advances were made in Europe, with its influence meanwhile spreading to China and the Middle East.

As well as giving us the concept of zero, Indian mathematicians made seminal contributions to the study of trigonometry, algebra, arithmetic and negative numbers among other areas. Perhaps most significantly, the decimal system that we still employ worldwide today was first seen in India.

With such a significant technical lead, how did they fall behind?

Original Submission

Read more of this story at SoylentNews.



Video Friday: ANYmal Robot, Jibo Unboxing, and Anki Overdrive Fast & Furious IEEE Spectrum Recent Content full text

Your weekly selection of awesome robot videos Image: ANYbotics via YouTube

Video Friday is your weekly selection of awesome robotics videos, collected by your Automaton bloggers. Well also be posting a weekly calendar of upcoming robotics events for the next two months; heres what we have so far (send us your events!):

ROSCon  September 21-22, 2017  Vancouver, B.C., Canada
IEEE IROS  September 24-28, 2017  Vancouver, B.C., Canada
RoboBusiness  September 27-28, 2017  Santa Clara, Calif., USA
BtS Maritime Robotics  October 1-8, 2017  Biograd na Moru, Croatia
Drone World Expo  October 2-4, 2017  San Jose, Calif., USA
HAI 2017  October 17-20, 2017  Bielefeld, Germany

Let us know if you have suggestions for next week, and enjoy todays videos.

This video shows some impressively robust autonomous rough-terrain locomotion from ANYmal, but its mostly worth watching for the epic ANYmal back massage (!) at the end:

We present an architecture for rough-terrain locomotion with quadrupedal robots. All sensing, state estimation, mapping, control, and planning runs in real-time onboard the robot. The method is implemented on the quadrupedal robot ANYmal and we present experiments of climbing stairs, steps, and slopes and show how the robot can adapt to changing and moving environments.

By Pter Fankhauser, Marko Bjelonic, Miki Takahiro, Tanja Baumann, C. Dario Bellicoso, Christian Gehring, and Marco Hutter.

ANYmal ]

Some of you have been waiting a long, long, long time for this: an actual Jibo unboxing and setup video!

Jibos are shipping now for early Indiegogo backers. Im not sure how Sean got his first, but itll be interesting to see what...


Samba 4.7.0 released

The Samba 4.7.0 release is out. New features include whole DB read locks (a reliability improvement), active directory with Kerberos support, detailed audit trails for authentication and authorization activities, a multi-process LDAP server, better read-only domain controller support, and more. See the release notes for details.


Courts Are Losing Patience for Gilstraps Unbridled Support of Patent Trolls Techrights

Hes no better than Randall Rader, a facilitator of trolls (discharged with dishonor, so to speak)

Randall R. Rader
Photo from Reuters

Summary: The man whose court has become a trolling factory is being refuted (but not reprimanded) by the CAFC, which certainly can see that something is amiss and serves to discredit the system as a whole

THE media does not usually name judges (personifying cases). But Gilstrap is a special case; he himself has become the story due to outrageous rulings on patents (and more recently copyrights, too). The judge whom prominent politicians have dubbed reprehensible keeps ignoring the Supreme Court [1, 2]. He has single-handedly decided that the litigation industry in his town is more important than the law itself.

What will people think of the legal system, having read about the tales of Gilstrap? Its almost as though he is proudly biased; he boasts about it and openly invites patent trolls to his court (for favourable treatment). If he continues to make complete and utter mockery of the law, how long will it take before higher courts intervene at a more personal level/capacity?

Well, towards the end of this week the patent microcosms media took note of one such development; Federal Circuit rejects Gilstraps test for patent venue, said the headline. Here is the opening paragraph (much of the rest is behind a paywall):

The Federal Circuit has reversed an Eastern District of Texas refusal to transfer the Cray case, and rejected Judge Gilstraps test for determining patent venue. This includes the appeals court stating there must be a physical, geographical location in the district from which the business of the defendant is carried out

Almost simultaneously the other site of the patent microcosm...


India to Join China and the United States With Its Own Quantum Computer TechWorm

India to take on China and the United States by building its own Quantum Computer

Quantum computer is touted as the next big leap in technology. China has been leading the Quantum computer arena and has already sent a hack-proof quantum computer into space. They even managed to achieve the first ever Star Trek-like teleportation by sending a Photon 500 km from space to the Space Center in China. The United States is not far behind but its Quantum computer technology is shrouded in secret under the official secrets act.  Indian scientists who have made a name for themselves by sending Mangalyaan a Mars orbiter at 1/5th the price of American Mars Orbiter and launching an extraordinary 104 satellites in the space at one go.

Now the Indian scientists have embarked on their next mission building Indias own Quantum computer. Keen to tap into the next big advance in computing technology, the Department of Science and Technology (DST) is planning to build its own quantum computer.

What is a Quantum Computer?

Unlike the normal computer and laptops that we have at our homes, the quantum computer employs the principles of quantum mechanics to store information in qubits instead of the typical bits of 1 and 0. While our computers and laptops run on the principle of bits and bytes, the Quantum computers run on Qubits These Qubits are theoretically 100 times faster than the conventions bits and bytes and work faster because of the way such circuits are designed, and their promise is that they can do intensive number-crunching tasks much more efficiently than the fastest comparable computers.

How fast is a Quantum Computer?

Quantum computers are considered to the fastest things on Earth. To give you an example, a quantum computer would require 3.5 million fewer steps than a traditional machine to sort and parse a billion numbers. A quantum computer can find the solution in only 31,623 steps compared to the millions of steps a conventional computer would take.

What is the use of a Quantum Computer?

One of the top uses of Quantum computer is of course military. Indian military could have the power to number crunch any problems from field military formations to in-house missile tests and hydrogen yield testing. Quantum computer can also be used to predict the weather correctly. India depends on monsoon and a correct prediction may help its millions of farmers produce a variety of crops according to the monsoon outbreak. A quantum computer can also help ISROs space programme besides providing the necessary infrastructure for the Aadhar card backbone. The Indian government hopes to directly credit benefits and subsidies (Universal Basic Income) directly to the account of the beneficiary.

How long will Indias Qua...


Zuckerberg abandons plan to reclassify Facebook stocks The Hill: Technology Policy

Mark Zuckerberg announced on Friday that he was dropping a bid to maintain majority control of Facebook while he and his wife Priscilla sell off almost all of their shares in the company to fund their philanthropy.Zuckerberg specifically said in a...


New Verizon data leak, the second one in a few months Security Affairs

Experts at Kromtech Security Research Center discovered a new Verizon leak exposed confidential and sensitive data on internal systems.

It has happened again, security researchers with Kromtech Security Research Center discovered a new Verizon leak exposed confidential and sensitive data on internal systems.

Leaked data includes server logs and credentials for internal systems, the huge trove of documents was found on an unprotected Amazon S3 bucket.

The archive seems to refer to internal Verizon Wireless systems, known as Distributed Vision Services (DVS), that is a middleware system used by the company to deliver data from the back-end systems to the front-end applications used by employees and staff in stores and at call centers.

On September 20th, Kromtech Security researchers discovered publicly accessible Amazon AWS S3 bucket containing around 100MB of data attributing to internal Verizon Wireless system called DVS (Distributed Vision Services). states a blog post published by Kromtech.

DVS is the middleware and centralized environment for all of Verizon Wireless (the cellular arm of VZ) front-end applications, used to retrieve and update the billing data.

The Amazon cloud storage contained several files, mostly scripts and server logs that included some login credentials to internal systems, some folders contained internal Verizon confidential documents, another folder contained 129 Outlook messages with internal communications within Verizon Wireless domain.

The repository contained:

  • Admin user info that could potentially allow access to other parts of the network
  • Command notes, logs including
  • B2B payment server names and info
  • Internal PowerPoints showing VZ infrastructure, with server IPs, marked as Verizon Wireless Confidential and Proprietary information
  • Global router hosts
  • 129 saved Outlook messages with access info and internal communications

Although no customers data are involved in this data leak, some scripts could be used by an attacker to elevate privileges within the internal systems and access them.

Some documents, marked as confidential and proprietary materials, include detailed information on the internal infrastructure, including server IP addresses and global router hosts.

Its not clear why the confidential documents were exposed on a public server.

According to ZDNet, the unprotected Amazon S3 storage server was controlled by an employee that told ZDNet on the phone Thursday that the files were not confidential, he also added that Verizon was fully aware of the server...


Game Engine Powered Arcan Display Server With Durden Desktop Updated Phoronix

Arcan, the open-source display server powered by a game engine, is out with a new release. Its Durden desktop environment has also been updated...


U.S. Marine Corps to Have its First Female Infantry Officer SoylentNews

The U.S. Marine Corps will soon have its first female infantry officer. The unnamed lieutenant is expected to lead an infantry platoon of about 40 marines:

The Marine Corps is set to have its first female infantry officer, a milestone in its nearly 250-year-long history.

The lieutenant is scheduled to graduate with her all-male peers on Monday after she completed all of the graduation requirements in the service's grueling 13-week Infantry Officer Course, the Corps said. Her completion of the course was first reported by The Washington Post. The officer's name was not made public.

The course was opened to women in 2012, and on an experimental basis. More than 30 women attempted it, but when none passed, the course was once again closed to females in the spring of 2015. After the Pentagon opened all military jobs to women, four additional women tried the course without success.

Also at The Hill.

Original Submission

Read more of this story at SoylentNews.


Intellectual Ventures, GNU/Linux/Android/FOSS Patents, and the Ascent of European Patent Trolls Techrights

Summary: The existing status of GNU/Linux in a world full of patent trolls, which not only target OEMs from Asia typically in the US but are also dragging them into Europe, aided by the EPOs patent bubble

THE FREE/LIBRE software world is thriving. Its spreading everywhere. But that does not mean that users of such software are protected from frivolous lawsuits, especially in countries where software patents exist. Developers too are occasionally being threatened or sued; we have given examples where projects got shut down due to these actions.

Readers might rightly wonder why we havent said a single thing about Red Hats latest press release; we instead included about a dozen stories in our daily links under the Red Hat section (not much new there, just reiteration of a promise from a decade and a half ago). We are more concerned about real, existing, potent threats to software.

According to todays blog post from IAM, Microsofts patent troll Nathan Myhrvold now dominates the worlds largest troll, Intellectual Ventures. IAM is a fan of his and this is what it wrote:

Intellectual Ventures founder Greg Gorder has left the firm, becoming the latest of the quartet of its founders to step away from the business, following Peter Detkin and Ed Jung. According to his bio, which remains on the IV website, Gorder left earlier this month and will now focus on his familys philanthropic activities.

Detkin stood down as vice chairman in January 2015, although he has continued to devote part of his time to IV-related work. Earlier this year he became a senior adviser to Sherpa Technology Group, the consulting business that was established by former VP of IP at IBM and IP Hall of Fame member Kevin Rivette. Jung also took on a new role at the start of the year, becoming CEO of Xinova, the innovation business that was spun out of IV in 2016.

Intellectual property is the next software, Myhrvold once said. It means that to him its all about patents. This Microsoft-connected patent troll is already suing quite a few companies that distribute BSD and/or GNU/Linux. Its not a matter of if or when. The battle began years ago, but Intellectual Ventures operates through various shells. On...


Roku Is Building Its Own Anti-Piracy Team TorrentFreak

Online streaming piracy is on the rise and many people use dedicated media players to watch unauthorized content through their regular TV.

Although the media players themselves can be used for perfectly legal means, third-party add-ons turn them into pirate machines, providing access to movies, TV-shows and more.

The entertainment industry isnt happy with this development and is trying to halt further growth wherever possible.

Just a few months ago, Roku was harshly confronted with this new reality when a Mexican court ordered local retailers to take its media player off the shelves. This legal battle is still ongoing, but its clear that Roku itself is now taking a more proactive role.

While Roku never permitted any infringing content, the company is taking steps to better deal with the problem. The company has already begun warning users of copyright-infringing third-party channels, but that was only the beginning.

Two new job applications posted by Roku a few days ago reveal that the company is putting together an in-house anti-piracy team to keep the problem under control.

One of the new positions is that of Director Anti-Piracy and Content Security. Roku stresses that this is a brand new position, which involves shaping the companys anti-piracy strategy.

The Director, Anti-Piracy and Content Security is responsible for defining the technology roadmap and overseeing implementation of anti-piracy and content security initiatives at Roku, the application reads.

This role requires ability to benchmark Roku against best practices (i.e. MPAA, Studio & Customer) but also requires an emphasis on maintaining deep insight into the evolving threat landscape and technical challenges of combating piracy.

The job posting

The second job listed by Roku is that of an anti-piracy software engineer. One of the main tasks of this position is to write software for the Roku to monitor and prevent piracy.

In this role, you will be responsible for implementing anti-piracy and content protection technology as it pertains to Roku OS, the application explains.

This entails developing software features, conducting forensic investigations and mining Roku...


Making a Gun Without a 3D Printer Hackaday

Around four years ago the world was up in arms over the first gun to be 3D printed. The hype was largely due to the fact that most people dont understand how easy it is to build a gun without a 3D printer. To that end, you dont even need access to metal stock, as [FarmCraft101] shows us with this gun made out of melted aluminum cans.

The build starts off by melting over 200 cans down into metal ingots, and then constructing a mold for the guns lower. This is the part that is legally regulated (at least in the US), and all other parts of a gun can be purchased without any special considerations. Once the aluminum is poured into the mold, the rough receiver heads over to the machine shop for finishing.

This build is fascinating, both from a machinists and blacksmiths point-of-view and also as a reality check for how easy it is to build a firearm from scratch provided the correct tools are available. Of course, we dont need to worry about the world being taken over by hoards of angry machinists wielding unlicensed firearms. Theres a lot of time and effort that goes into these builds and even then they wont all be of the highest quality. Even the first 3D printed guns only fired a handful of times before becoming unusable, so it seems like any homemade firearm, regardless of manufacturing method, has substantial drawbacks.

Thanks to [Rey] for the tip!

Filed under: tool hacks


Shelston IP Blames Well-Organised and Appropriately-Connected Open Source Lobby for Ban on Software Patents Techrights

Shelston IPSummary: The activism is working and foes of programmers are feeling the pressure, for software patents are being more explicitly banned in some countries

THANKFULLY enough, New Zealands software industry (i.e. developers) managed to keep software patents away. The same is true, to some degree, in Australia (we wrote some articles about that a few weeks ago). We have covered the subject very closely for many years and it last intensified again a couple of years ago when Shelston IP et el basically a bunch of self-serving liars (lying about the software industry) reared their ugly heads again [1, 2, 3, 4]. No doubt they will keep on trying again and again until they get their way (if ever).

It is now blaming FOSS by name for the de facto software patents ban (loopholes notwithstanding).A couple of days ago Shelston IP had another go at it. It is now blaming FOSS by name for the de facto software patents ban (loopholes notwithstanding). The whole thing was largely due to a well-organised and appropriately-connected open source lobby however, the change of Government and its amenability to such campaigning cannot be ruled out as a contributing factor.

Last year we wrote a lot of articles about the Productivity Commission of Australia, whose suggestions were more officially adopted only weeks ago, in defiance of pressure from law firms (whose agenda is altogether different; theyre patent maximalists).

Writing from Australia, here is...


Enterprise cloud adoption and IaaS security Help Net Security

Barracuda Networks and research firm Vanson Bourne polled 300 IT decision makers from organizations across the US on their use of public cloud Infrastructure as a Service (IaaS). Survey results Respondents included IT professionals across small, medium, and large-sized organizations, and their answers paint the following picture: Respondents currently run 44 percent of their infrastructure in the public cloud, but expect this percentage to increase to 75.57% in five years 74 percent of respondents state More


Startup: LPPFusion Embraces Instability IEEE Spectrum Recent Content full text

Rather than fighting to control plasma, this startups device exploits instabilities to fuse atoms Photos: LPPFusion (2)

img img Photos: LPPFusion (Almost) Tabletop Fusion: The heart of LPPFusions device is a vessel filled with gaseous fuel at low pressure [top]. Inside, a blast of current down a set of electrodes turns the gas into plasma. Instabilities fuse plasma atoms [bottom].

Since nuclear fusions earliest days, the sun has served as the ultimate prototype. Its the closest continuously functioning large-scale fusion reactor, after all. Why not copy from the best? So tokamaks, stellarators, and laser ignition facilities all strive to create high-pressure and high-temperature plasmas that behave like microcosms of the suns core.

One of the biggest challenges these systems face is achieving the tight control they require over the plasma fuel they seek to fuse. But one New Jersey fusion startup company is taking a very different tack: Guide the plasmas instability; dont fight it, says Eric Lerner, president and chief scientist at LPPFusion, based in Middlesex, N.J.

LPPFusion is building what it calls a Dense Plasma Focus (DPF) device. This consists of a thick, hollow central anode surrounded by a ring of cathodes that are about the size and shape of candles. And indeed, the whole thing looks rather like a candelabra.

Heres how its supposed to work: The device sits in a chamber filled with the gas to be fused at a low pressure, while a bank of external capacitors blast pulses of electricity down the electrodes, forming a plasma from the gas. In a millionth of a second, the electric blast reaches the top of the electrodes, and natural instabilities produce filaments of plasma. The pulse of current reaches the end of the electrodes, and the filaments combine and collapse near the mouth of the cathode. This produces microscopic balls of plasma called plasmoids. Further instabilities in the plasmoids produce electron beams, which heat up the plasmoids to the temperatures required for fusion.

Still under peer review as of press time was a paper submitted to the journal Physics of Plasmas,...


A SoylentNews Reader Reviews Firefox Developer Edition 57.0b1 SoylentNews

I knew this day would eventually come. We had been warned that Firefox 57 would force some significant changes on us users, including the removal of support for extensions that did not conform to the WebExtensions model, along with the introduction of the new Photon user interface appearance.

Although I have always only wanted to run the stable releases, long ago I had been forced to run the Developer Edition of Firefox just so I could easily use some extensions I had written on my own. Now Firefox was showing me that an update to Firefox 57.0b1 was available. Should I do it? Should I install this update? I debated with myself for several minutes. But in the end I knew I would have no choice. I would at some point have to update to Firefox 57 if I wanted to keep receiving security fixes and other important updates. So I did it. I upgraded to Firefox Developer Edition 57.0b1.

Read more of this story at SoylentNews.


Experian Flaw Lets Attacker Obtain Credit Freeze PIN and Access Account HackRead

By Waqas

Plenty of consumers decided to go for a credit freeze

This is a post from Read the original post: Experian Flaw Lets Attacker Obtain Credit Freeze PIN and Access Account


The EPOs Latest Lies About the UPC and SMEs Unraveled, Long-Term Plan Described as Daunting Techrights

Battistelli sets up Europe for patent trolls and abuse

Troll bookSummary: The vision of Battistelli and the latest lies (about SMEs) are being criticised anonymously for fear of retaliation as Europe braces for impact with patent trolls from all around the world

THE EPO has sunk to new lows this week, at least as far as lying is concerned. As we said last night, one must now assume that everything the EPOs management says is a lie. Its almost always the case (and were barely exaggerating).

Look at the EPOs Twitter account. When they dont post template promotions (e.g. of some upcoming event or section of the site) they just carry on with the usual nonsense. Earlier today the EPO wrote: The very first guide for obtaining, maintaining and managing Unitary Patents is out:

Remember that EPO examiners are smart people. They are very well educated and they obviously know all the above. They know when theyre being lied to by the management and are conscious when the management lies in their name/on their behalf.So I responded: Why put out a guide for a system that does not exist and probably will never exist?

Later on they wrote: See if and where a patent has been granted, if it is valid, if there is still time to challenge it, etc. All here:

They also wrote: Want to know more about the opposition procedure at the EPO? This course will help

I told them that Battistelli [had] narrowed [the] oppositions window, attacked the appeal board/s, forced examiners to issue many bogus patents (as leaks serve to reaffirm).

Its getting very frustrating to work as a patent examiner, no matter the level of compensation (salary).Remember that EPO examiners are smart people. They are very well educated and they obviously know all the above. They know when theyre being lied to by the management and are conscious when the management lies in their name/on their behalf. Th...


Report: T-Mobile, Sprint close to merger agreement The Hill: Technology Policy

T-Mobile and Sprint are close to an agreement on a major wireless merger, Reuters reported on Friday.The deal would revive an effort that was abandoned in 2014 amid tough regulatory hurdles under President Obama. The Trump administration since...


Hackaday Prize Entry: HaptiVision Creates a Net of Vibration Motors Hackaday

HaptiVision is a haptic feedback system for the blind that builds on a wide array of vibration belts and haptic vests. Its a smart concept, giving the wearer a warning when an obstruction comes into sensor view.

The earliest research into haptic feedback wearables used ultrasonic sensors, and more recent developments used a Kinect. The project team for HaptiVision chose the Intel RealSense camera because of its svelte form factor. Part of the goal was to make the HaptiVision as discreet as possible, so fitting the whole rig under a shirt was part of the plan.

In addition to a RealSense camera, the team used an Intel Up board for the brains, mostly because it natively controlled the RealSense camera. It takes a 640480 IR snapshot and selectively triggers the 128 vibration motors to tell you whats close. The motors are controlled by 8 PCA9685-based PWM expander boards.

The project is based on David Antn Snchezs OpenVNAVI project, which also featured a 128-motor array. HaptiVision aims to create an easy to replicate haptic system. Everything is Open Source, and all of the wiring clips and motor mounts are 3D-printable.

The HackadayPrize2017 is Sponsored by:
Texas Instruments

Filed under: The Hackaday Prize ...


userdel: user vivek is currently used by process 749 error and fix on Linux nixCraft

I am trying to delete a user named vivek using the userdel command as follows
userdel -r vivek userdel: user vivek is currently used by process 749

How do I fix this problem and delete username vivek on a Debian Linux 9.x server?


Your phone can now be turned into an ultrasound sonar tracker against you and others Falkvinge on Liberty


Global:New research shows how a mobile phone can be turned into a passive indoor ultrasound sonar, locating people with high precision indoors using multi-target echolocation, and is even able to discern a rough selection of activities. It does this by overlaying imperceptible ultrasound sonar pings into played-back music, measuring the reflections coming back to the phones microphone. The privacy implications are staggering.

By emitting inaudible ultrasound pings as part of normal music playback, a phone can be turned into a passive sonar device, researchers from the University of Washington show in a new paper. It can track multiple individuals at an indoor precision of 8 centimeters (3 inches), and detect different types of activity by the people in its detection zone even through barriers, all using a normal smartphone.

People with military technology background will recognize this as next-generation passive covert radar systems, radar systems which dont transmit, but which detect objects in the sky from changes to reflection patterns from everpresent civilian transmitters such as radio and TV towers. The primary advantage of passive covert radars is that they cant be detected, as they only contain very sensitive receivers, no transmitters. This phone research appear to be using the same kind of technology, except it is also used as a transmitter of ultrasound pings; however, it would be trivial to separate the transmitter of pings from the receiver of the reflected patterns.

We achieve this by transforming a smartphone into an active sonar system that emits a combination of a sonar pulse and music and listens to the reflections off of humans in the environment. Our implementation, CovertBand, monitors minute changes to these reflections to track multiple people concurrently and to recognize different types of motion, leaking information about where people are in addition to what they may be doing.

The researchers are straightforward about the privacy threat that this technology poses: There are privacy leaks possible with todays devices that go beyond the ability to simply record conversations in the home. For example, what if an attacker could remotely co-opt your television to track you as you move around, w...


Carbon Nanotube Thread Could Generate Electricity From The Bloodstream IEEE Spectrum Recent Content full text

Researchers have reported an idea to implant nanotube yarns that could draw electricity from flowing blood Image: Fudan University/Wiley

To power wearable electronics, engineers have for years been tinkering with ways to generate electricity from our bodies. Theyve cooked up schemes to convert heartbeats, footsteps, and muscle motions into electricity.

Now a team from Fudan University in China has come up with a method for generating electricity from blood flow using a tiny fiber spun from carbon nanotubes. The idea is that the fiber could be implanted in a blood vessel to harvest the energy from flowing blood. Theyve presented the rudimentary concept in Angewandte Chemie , and havent tested the device in animals yet.

To make the 0.8-millimeter-diameter fibers, they either wrap a plastic fiber with an ordered array of carbon nanotubes, or simply twist a carbon nanotube sheet to make a yarn-like thread.

As the solution flows past, negative ions in the solution and electrons drawn from the nanotubes try to balance out the electric double layer. But they dont quite succeed: more charge builds up at the front of the flow. And this leads to a potential difference between the two ends of the fiber, generating voltage and electric current. Other teams have made nanotube-based yarns that generate electricity when twisted and stretched.

When the fiber is put in a tube that is connected on each end with a copper wire and has salty fluid flowing through it, it generates power with an efficiency of over 23 percent. This is higher than previously reported fiber-shaped energy harvesting devices, the researchers say. The electrical output is higher with longer fibers, faster-flowing liquid, and more concentrated salt solution.

A 30-centimeter-long device generates 0.04 milliwatts of power. That might be enough to...


Is your router sending out spam? Help Net Security

A Linux Trojan that has been infecting IoT devices for half a year and made them run a SOCKS proxy server has now acquired spam-sending capabilities. About Linux.ProxyM Doctor Web virus analysts first documented Linux.ProxyM back in February 2017, and posited that cybercriminals use this Trojan to ensure online anonymity. With the latest upgrade, they can also earn money by sending out spam. Two builds of this Trojan exist for devices possessing the following architectures: More


RADV Vulkan vs. RadeonSI OpenGL Performance With Linux 4.13 + Mesa 17.3-dev Phoronix

It's been a few weeks since last delivering any large RADV/RadeonSI open-source AMD Linux graphics benchmark results due to being busy with testing other hardware as well as battling some regressions / stability problems within the AMDGPU DRM code and Mesa Git. But with Linux 4.13 stable and the newest Mesa 17.3-dev code, things are playing well so here are some fresh OpenGL vs. Vulkan benchmarks on three Radeon graphics cards.


Crooks using Linux.ProxyM IoT botnet to send spam messages Security Affairs

Experts at security firm Doctor Web discovered a new botnet of IoT devices leveraging the Linux.ProxyM, that is used by crooks for mass spam mailings.

The most popular thingbot since now is the Mirai, but it isnt the only one targeting Linux-based internet-of-things (IoT) devices.

Researchers with security firm Doctor Web discovered a new botnet of IoT devices leveraging the Linux.ProxyM, that is used by crooks for mass spam mailings.

Experts first analyzed the Linux.ProxyM in July, it was used to create a proxy network through SOCKS proxy server on infected devices that are used to relay malicious traffic, disguising his real source.

The Trojan has been noted since February 2017 but peaked in late May as reported in the chart below.

Linux malware proxym_en.2

According to Dr. Web, the number of devices infected with Linux.ProxyM reached 10,000 units in July since its discovery in February 2017.

Recently the Linux.ProxyM trojan has recently been updated to add mas spam sending capabilities to earn money.

The number of malicious programs capable of infecting smart Linux devices is constantly increasing. A major portion of them is designed to mount DDoS attacks and ensure online anonymity. Research conducted by Doctor Webs specialists has revealed that cybercriminals are using such Linux Trojans for mass mailings. reads the analysis from Dr. Web.

The malware is capable of detecting honeypots in order to hide from malware researchers and can operate on almost any Linux device, including routers, set-top boxes, and other equipment.

Experts identified two builds of this Linux.ProxyM Trojan for devices based on x86, MIPS, MIPSEL, PowerPC, ARM, Superh, Motorola 68000, and SPARC architectures.

Once the Linux.ProxyM infects a device, it connects to a command and con...


Special Relativity and Classical Field Theory Not Even Wrong

For quite a while Leonard Susskind has been giving some wonderful courses on physics under the name The Theoretical Minimum, pitched at a level in between typical popularizations and standard advanced undergraduate courses. This is a great idea, since there is not much else of this kind, while lots of people inspired by a popular book could use something more serious to start learning what is really going on. The courses are available as Youtube lectures here.

The third book in the series (also with Art Friedman) is about to appear. Its entitled Special Relativity and Classical Field Theory, and is in much the same successful style as the first two books. Robert Crease has a detailed and very positive review in Nature which does a good job of explaining whats in the book and which Id mostly agree with.

The basic concept of the book is to cover special relativity and electromagnetism together, getting to the point of understanding the behavior of electric and magnetic fields under Lorentz transformations, and the Lorentz invariance properties of Maxwells equation. Along the way, theres quite a lot of the usual sort of discussion of special relativity in terms of understanding what happens as you change reference frame, a lot of detailed working out of gymnastics with tensors, and some discussion in the Lagrangian language of the Klein-Gordon equation as a simpler case of a (classical) relativistic field theory than the Maxwell theory. Much of what is covered is clearly overkill if you just want to understand E and M, but undoubtedly is motivated by his desire to go on to general relativity in the next volume in this series.

At various points along the way, the book provides a much more detailed and leisurely explanation of crucial topics that a typical textbook would cover all too quickly. This should be very helpful for students (perhaps the majority?) who have trouble following whats going on in their textbooks or course due to not enough detail or motivation. Besides non-traditional students in a course of self-study, the book may be quite useful for conventional students as a supplement to th...


Former Football Star Aaron Hernandez's Brain Found to Have Severe CTE SoylentNews

Former New England Patriots tight end Aaron Hernandez, who committed suicide a week after being acquitted of double homicide, has been found to have had severe signs (original AP text) of chronic traumatic encephalopathy (CTE). Hernandez's brain had been released to Boston University by his family for study. In 2015, Hernandez was found guilty for the murder of Odin Lloyd and automatically sentenced to life in prison without a possibility of parole:

Tests conducted on the brain of former football star Aaron Hernandez showed severe signs of the degenerative brain disease chronic traumatic encephalopathy, and his attorney said Thursday that the player's daughter is suing the NFL and the New England Patriots for leading Hernandez to believe the sport was safe.

In a news conference at his offices, Hernandez's attorney, Jose Baez, said the testing showed one of the most severe cases ever diagnosed. "We're told it was the most severe case they had ever seen for someone of Aaron's age," Baez said. Hernandez was 27 when he killed himself in April. Dr. Ann McKee, the director of the CTE Center at Boston University, concluded that the New England Patriots tight end had stage 3 of 4 of the disease and also had early brain atrophy and large perforations in a central membrane.

[...] A week before his suicide, Hernandez was acquitted in the 2012 drive-by shootings of two men in Boston. Prosecutors had argued that Hernandez gunned the two men down after one accidentally spilled a drink on him in a nightclub, and then got a tattoo of a handgun and the words "God Forgives" to commemorate the crime.

Baez said he deeply regretted not raising the issue of Hernandez's having CTE during his murder trials. He said the defense team did not blame CTE for the murders because Hernandez's defense was actual innocence.

Previously: NFL Acknowledges Link Between American Football and CTE
What if PTSD is More Physical Than Psychological?
Ailing NFL Players' Brains Show Signs of Neurodegenerative Disease

Original Submission



Passwords For 540,000 Car Tracking Devices Leaked Online The Hacker News

Another day, another news about a data breach, though this is something disconcerting. Login credentials of more than half a million records belonging to vehicle tracking device company SVR Tracking have leaked online, potentially exposing the personal data and vehicle details of drivers and businesses using its service. Just two days ago, Viacom was found exposing the keys to its kingdom on


Ask Hackaday: Security Questions And Questionable Securities Hackaday

Your first school. Your mothers maiden name. Your favorite color. These are the questions were so used to answering when weve forgotten a password and need to get back into an account. Theyre not a password, yet in many cases have just as much power. Despite this, theyre often based on incredibly insecure information.

Sarah Palins Yahoo account is perhaps the best example of this. In September 2008, a Google search netted a birthdate, ZIP code, and where the politician met her spouse. This was enough to reset the accounts password and gain full access to the emails inside.

While were not all public figures with our life stories splashed across news articles online, these sort of questions arent exactly difficult to answer. Birthdays are celebrated across social media, and the average online quiz would net plenty of other answers. The problem is that these questions offer the same control over an account that a password does, but the answers are not guarded in the same way a password is.

For this reason, I have always used complete gibberish when filling in security questions. Whenever I did forget a password, I was generally lucky enough to solve the problem through a recovery e-mail. Recently, however, my good luck ran out. It was a Thursday evening, and I logged on to check my forex trading account. I realised I hadnt updated my phone number, which had recently changed.

Upon clicking my way into the account settings, I quickly found that this detail could only be changed by a phone call. I grabbed my phone and dialed, answering the usual name and date of birth questions. I was all set to complete this simple administrative task! I was so excited.

Thanks Lewin, Ill just need you to answer your security question.

Oh no.

The question is Chutney butler?

Yes. Yes it is. Uh

would you like to guess?

Needless to say, I didnt get it.

I was beginning to sweat at this point. To their credit, the call center staffer was particularly helpful, highlighting a number of ways to recover access to the account. Mostly involving a stack of identification documents and a visit to the nearest office. If anything, it was a little reassuring that my account details required such effort to change. Perhaps the cellular carriers of the world could learn a thing or two.

In the end, I realised that I could change my security question with my regular password, and then change the phone number with the new security question. Alls well that ends...


Linux Trojan Using Hacked IoT Devices to Send Spam Emails The Hacker News

Botnets, like Mirai, that are capable of infecting Linux-based internet-of-things (IoT) devices are constantly increasing and are mainly designed to conduct Distributed Denial of Service (DDoS) attacks, but researchers have discovered that cybercriminals are using botnets for mass spam mailings. New research conducted by Russian security firm Doctor Web has revealed that a Linux Trojan,


How to find bash shell function source code on Linux/Unix nixCraft

I am a new Linux server user. I cannot figure out how to find out the source code of a bash function named foo() which is defined. How to locate the file where a bash function is defined and how to view the source code of foo() from shell prompt itself?


For the First Time, Signal Transfer Between Molecules Has Been Achieved IEEE Spectrum Recent Content full text

Molecular computing reaches another milestone Image: Nanchang University/Nature Nanotechnology STM image of all the initial -form molecules in the middle row that changed into the -form owing to a single manipulation

The history of molecular computing and electronics has been a long and twisting roadone that was meticulously catalogued on the pages of IEEE Spectrum two years ago. While the future of molecular electronics and computing remains somewhat up in the air, a great deal of research is still being focused on the field.

There have been proof-of-concept molecular switches, molecular data storage bits, and diodes.  However, one fundamental issue that has not been resolved is the transfer and exchange of signals between molecular devices for complex signal processing at room temperature.

Now researchers at Nanchang University in China have described, in the journal Nature Nanotechnology , a device that uses a particular kind of molecule that takes on two specific geometries when in contact with a copper surface. These two geometries can serve as the 0 and 1 of digital logic.

The work is based on a phenomenon known as in-plane molecular orientation, which occurs when an organic molecule lands on a solid surface. This adsorbed molecule might take different adsorption geometries. These adsorption geometries can be classified into several groups.

In our case, the molecule we used has two distinguished adsorption geometries on a copper surface, explained Li Wang, professor of physics at Nanchang University, in an e-mail interview with IEEE Spectrum. One is left-handed, the other is right handed. For the purposes of data storage or transfer, We define left-handed geometry as 1 and the right-handed geometry as 0, added Wang.

Wang and his colleagues discovered that the in-plane orientation of a molecule could be controlled by the in-plane orientations of two neighboring molecules due to their intermolecular interactions. The researchers exploited this intermol...


Pimax Launches Kickstarter for "8K" Virtual Reality Headset SoylentNews

While the headsets have a listed refresh rate of 90 Hz, Pimax claims that its "Brainwarp" software technique can effectively double the perceived frame rate:

You may be asking yourself how a VR-ready gaming computer could possibly drive these sorts of graphically demanding resolutions. Pimax's answer is a software technique they call 'Brainwarp', which renders a 4K image only on a single display at time, doing it 150/180 times per second. Pimax says users "perceive a complete 8K at 150/180 Hz with high frame rate," and that it "boosts refresh rate, reduces latency and decreases GPU pressure for Pimax 8K."

Pimax showed off its headset prototypes at CES in January. The company is also developing modular accessories for its headsets.

Just 4.73 times more pixels to reach the "ideal" resolution.

Original Submission

Read more of this story at SoylentNews.


Modifying Neutrophil Behavior for Stroke Recovery Lifeboat News: The Blog

The immune system is like an army keeping us safe from invasion, injury and infection and helps us to regenerate and repair tissues and organs. However, the immune system is sometimes a double-edged sword that does more harm than good.

A lot of focus has been on the role of macrophages and their ability to facilitate tissue healing and regeneration. Today, we will be looking at a study that examines the role of neutrophils and how they can actually harm the brain further following a stroke[1].


Customizable PCB Business Card Hackaday

[Corey Harding] designed his business card as a USB-connectable demonstration of his skill. If potential manager inserts the card in a USB drive, open a text editor, then touches the copper pad on the PCB, [Corey]s contact info pops up in the text box.

In addition to working as a business card, the PCB also works as a Tiny 85 development board, with a prototyping area for adding sensors and other components, and with additional capabilities broken out: you can add an LED, and theres also room for a 1K resistor, a reset button, or break out the USBs 5V for other uses. Theres an AVR ISP breakout for reflashing the chip.

Coolly, [Corey] intended for the card to be an Open Source resource for other people to make their own cards, and hes providing the Fritzing files for the PCB. Fritzing is a great program for beginning and experienced hardware hackers to lay out quick and dirty circuits, make wiring diagrams, and even export PCB designs for fabrication. You can download [Corey]s files from his GitHub repository.

For another business card project check out this full color business card we published last month.

Filed under: Arduino Hacks


Dip update 89/n wherestheflux

[Orig: Sept 22, 2017]
Hi everyone,
Below are the newest data from LCO at TFN and OGG, showing that we are sitting around normal brightness.  Also note that I have slightly changed some of the plot settings so the graph is easier to read (hopefully).  
~Tabby and team
PS: These observations are happening because of the wonderful backers of our 2016 Kickstarter project. The Kickstarter campaign has ended, but we are still accepting donations to purchase additional observing time on the LCO 0.4m network. Thanks in advance for your support!      


Security updates for Friday

Security updates have been issued by CentOS (augeas, samba, and samba4), Debian (apache2, bluez, emacs23, and newsbeuter), Fedora (kernel and mingw-LibRaw), openSUSE (apache2 and libzip), Oracle (kernel), SUSE (kernel, spice, and xen), and Ubuntu (emacs24, emacs25, and samba).


Lidar-Equipped Autonomous Wheelchairs Roll Out in Singapore and Japan IEEE Spectrum Recent Content full text

No more waiting for an orderly to see you out, or an attendant to see you to your gate Photo: Panasonic

Photo: Panasonic The Uber of Wheelchairs: At Haneda Airport in Tokyo, people with disabilities will be able to hail autonomous wheelchairs using a smartphone app that lets them select a destination, sit back, and relax.

Autonomous vehicles can add anew member to their ranksthe self-driving wheelchair. This summer, two robotic wheelchairs made headlines: one at a Singaporean hospital and another at a Japanese airport.

The Singapore-MIT Alliance for Research and Technology, or SMART, developed the former, first deployed in Singapores Changi General Hospital in September 2016, where it successfully navigated the hospitals hallways. It is the latest in a string of autonomous vehicles made by SMART, including a golf cart, an electric taxi, and most recently, a scooter that zipped more than 100 MIT visitors around on tours in 2016.

The SMART self-driving wheelchair has been in development since January 2016, says Daniela Rus, director of MITs Computer Science and Artificial Intelligence Laboratory and a principal investigator in the SMART Future Urban Mobility research group. Today, SMART has two wheelchairs in Singapore and two wheelchairs at MIT being tested in a variety of settings, says Rus.

The robots computer uses data from three lidars to make a map. A localization algorithm then determines where the smart chair is on the map. The chairs six wheels lend stability, and the chair is designed to make tight turns and fit through normal-size doorframes. When we visited several retirement communities, we realized that the quality of life is dependent on mobility. We want to make it really easy for people to move around, said Rus in a recent MIT statement.

A s...


Vintage Voyager: Online Video Resources Centauri Dreams

With Voyager on my mind because of its recent anniversary, I had been exploring the Internet landscape for archival footage. But Ioannis Kokkinidis made my search unnecessary with the following essay, which links to abundant resources. The author of several Centauri Dreams posts including Agriculture on Other Worlds, Ioannis holds a Master of Science in Agricultural Engineering from the Department of Natural Resources Management and Agricultural Engineering of the Agricultural University of Athens. He went on to obtain a Mastre Spcialis Systmes dinformations localises pour lamnagement des territoires (SILAT) from AgroParisTech and AgroMontpellier and a PhD in Geospatial and Environmental Analysis from Virginia Tech. Now a resident of Fresno CA, Ioannis tells us in addition how a lifelong interest in space exploration was fed by the Voyager mission and its continuing data return. 

by Ioannis Kokkinidis


Back in the end of August 1989, when I was 9 years old and the whole family was on vacation, the Greek press set aside momentarily its coverage of the continuing shenanigans of Greek politics and the rapidly changing situation to the north of our borders due to the collapse of communism and instead put Voyager 2s encounter with Neptune in its front pages. My late grandfather was an avid reader of newspapers, which I would also read afterwards. I devoured what I could get my hands on, which alas was not much, it was after all August.

The next year my family moved to California for two years, my father was a visiting professor at UCSF, and I read all the books and magazines about space I could find in the public libraries. I even discovered NASAs Spacelink, a NASA public education computer service hosted by the Marshall Space Flight Center in Alabama, containing mostly NASA press releases, and I would dial in with our PC XTs 2400 bps modem. However feeding my space interest was a privilege and my parents made me do a thing I truly dreaded in exchange for dialing the long distance number and indulging myself: play the piano.

After we returned to Greece keeping myself appraised of the latest space developments proved difficult since there is very little popular scientific press in Greece and the mainstream press is not that interested in space. When I got our first internet connection NASAs Spacelink, now a website, was still up, it still had similar content, though more importantly the releases now included in the bottom instructions on how to get on NASAs press listserv. I promptly signed up, and I still am on that listerv, becoming informed...


Russia denies use of Facebook ads in 2016 election The Hill: Technology Policy

Russia's government on Friday denied using Facebook ads to influence the 2016 U.S. presidential election, saying in a statement it didn't even know "how to place an advert" on the social media giant.We do not know ... how to place an advert on...


CVE-2017-14489: Linux kernel: scsi: nlmsg is not properly parsed in iscsi_if_rx() Open Source Security

Posted by Vladis Dronov on Sep 22


It was found that the iscsi_if_rx() function in 'drivers/scsi/scsi_transport_iscsi.c'
in the Linux kernel since v2.6.24-rc1 through 4.13.2 allows local users to cause
a denial of service (a system panic) by making a number of certain syscalls by
leveraging incorrect length validation in the kernel code.

Our tests show that indeed an unprivileged local user can easily cause (i.e. run a binary)
a system panic or a compete lock...


Distrustful U.S. Allies Force Spy Agency to Back Down in Encryption Fight SoylentNews

An international group of cryptography experts has forced the U.S. National Security Agency to back down over two data encryption techniques it wanted set as global industry standards, reflecting deep mistrust among close U.S. allies.

In interviews and emails seen by Reuters, academic and industry experts from countries including Germany, Japan and Israel worried that the U.S. electronic spy agency was pushing the new techniques not because they were good encryption tools, but because it knew how to break them.

The NSA has now agreed to drop all but the most powerful versions of the techniques - those least likely to be vulnerable to hacks - to address the concerns.

Have the chickens come home to roost for the NSA, or should we distrust the report that they backed down?

Original Submission

Read more of this story at SoylentNews.


CCleaner Backdoor Attack: A State-sponsored Espionage Campaign HackRead

By Waqas

Infected CCleaner Software Attack that Affected 700,000 Customers is part

This is a post from Read the original post: CCleaner Backdoor Attack: A State-sponsored Espionage Campaign


VPSslim VPS+Dedicated Server offers! Low End Box

Hey LowEndBox community! The guys over at VPSslim sent over an offer today and were pleased to have them back. Theyve been posted quite a few times, going all the way back to 2012, but we havent had anything from them since 2015. Theyve always had good reviews and support, so were happy to have a new offer to share.

VPSslim is a registered company in the Netherlands (52966887), their WHOIS is public, and you can find their ToS/Legal Docs here.  As method of payment, you can use: iDEAL, Creditcard, PayPal, Bitcoin, alt coins (50 different coins), & Wire transfer.

In their own words: 

VPSslim has been active in the hosting business for quite a while now. In that time we have become a major player in the field of virtual private server hosting. VPSslim is a profitable, healthy and independent company. When ordering a VPS, you can count on years of experience, professional and friendly staff and advanced equipment. We put all our knowledge and experience together to bring you the best hosting experience possible. Do you have a question, problem or comment? Our helpdesk can be reached 24 hours a day, 7 days a week via email or social media.

The offers: 


4096MB RAM
 4096MB Swap
2x vCPU
200GB HDD space
5TB transfer
1Gbps uplink
1x IPv4
/64 IPv6


Intel Xeon E3-1230v5 CPU
2x 1TB hard drives
Software RAID
25TB transfer
1Gbps uplink
/32 IPv4
/48 IPv6
IPMI: yes


Datacenter Serverius Netherlands, Meppel
Test IPv4:
Test IPv6: ::1
Test file: 100mb.bin
Looking glass:


Network Analysers: The Electrical Kind Hackaday

Instrumentation has progressed by leaps and bounds in the last few years, however, the fundamental analysis techniques that are the foundation of modern-day equipment remain the same. A network analyzer is an instrument that allows us to characterize RF networks such as filters, mixers, antennas and even new materials for microwave electronics such as ceramic capacitors and resonators in the gigahertz range. In this write-up, I discuss network analyzers in brief and how the DIY movement has helped bring down the cost of such devices. I will also share some existing projects that may help you build your own along with some use cases where a network analyzer may be employed. Lets dive right in.

Network Analysis Fundamentals

As a conceptual model, think of light hitting a lens and most of it going through but part of it getting reflected back.

The same applies to an electrical/RF network where the RF energy that is launched into the device may be attenuated a bit, transmitted to an extent and some of it reflected back. This analysis gives us an attenuation coefficient and a reflection coefficient which explains the behavior of the device under test (DUT).

Of course, this may not be enough and we may al...


Pitivi 1.0 Release Candidate Arrives Phoronix

The Pitivi open-source non-linear video editor has been in development for thirteen years while its v1.0 release is finally near...


Uber getting booted from London The Hill: Technology Policy

Uber is losing its license to operate in London, its biggest market, according to the citys transportation authority.Transport for London (TfL) said on Friday that it will not renew the ride-hailing services license to operate in the city when it...


Satanic Fashion Show Inside a Church at London Fashion Week

Via: Vigilant Citizen: Turkish designer Dilara Findikoglus presented her Spring/Summer 2018 collection at London Fashion Week and it was nothing less than a satanic Black Mass. Indeed, the event took place at the altar of St Andrew Church in London and incorporated heavy occult and satanic symbolism. In short, the event summed up everything the []


Security Tools to Check for Viruses and Malware on Linux

Security Tools to Check for Viruses and Malware on Linux


Open-Source OpenCL Adoption Is Sadly An Issue In 2017 Phoronix

While most of the talks that take place at the annual X.Org Developers' Conference are around the exciting progress being made across the Linux graphics landscape, at XDC2017 taking place this week at Google, the open-source GPGPU / compute talk is rather the let down due to the less than desirable state of the open-source OpenCL ecosystem...


Hundreds of universities have helped DHS create a nation of fear MassPrivateI

Ever wonder who's responsible for our daily dosage of fear, terror and crime?

Look no further than our colleges and universities.

According to DHS, 'Homeland Security Centers of Excellence' (COE) are 'led by a college or university'.

COE's are responsible for blacklists, countering violent extremism and DHS propaganda videos and literature.

Colleges and universities have been working with DHS for fifteen years.

Since 2002, when the Homeland Security Act was passed, numerous colleges and universities have been feeding from the DHS money trough. Each year they line up like good little Bundists, promoting DHS's vision of terror.

Think about that, everything you've been told about terrorism and extremism is coming from colleges!

Schools across America will do anything, even if that means working with DHS, so they can get a piece of the annual $35-$40...

Friday, 22 September


Block The Pirate Bay Within 10 Days, Dutch Court Tells ISPs TorrentFreak

Three years ago in 2014, The Court of The Hague handed down its decision in a long-running case which had previously forced two Dutch ISPs, Ziggo and XS4ALL, to block The Pirate Bay.

Ruling against local anti-piracy outfit BREIN, which brought the case, the Court decided that a blockade would be ineffective and also restrict the ISPs entrepreneurial freedoms.

The Pirate Bay was unblocked while BREIN took its case to the Supreme Court, which in turn referred the matter to the EU Court of Justice for clarification. This June, the ECJ ruled that as a platform effectively communicating copyright works to the public, The Pirate Bay can indeed be blocked.

The ruling meant there were no major obstacles preventing the Dutch Supreme Court from ordering a future ISP blockade. Clearly, however, BREIN wanted a blocking decision more quickly. A decision handed down today means the anti-piracy group will achieve that in just a few days time.

The Hague Court of Appeal today ruled (Dutch) that the 2014 decision, which lifted the blockade against The Pirate Bay, is now largely obsolete.

According to the Court of Appeal, the Hague Court did not give sufficient weight to the interests of the beneficiaries represented by BREIN, BREIN said in a statement.

The Court also wrongly looked at whether torrent traffic had been reduced by the blockade. It should have also considered whether visits to the website of The Pirate Bay itself decreased with a blockade, which speaks for itself.

As a result, an IP address and DNS blockade of The Pirate Bay, similar to those already in place in the UK and other EU countries, will soon be put in place. BREIN says that four IP addresses will be affected along with hundreds of domain names through which the torrent platform can be reached.

The ISPs have been given just 10 days to put the blocks in place and if they fail there are fines of 2,000 euros per day, up to a maximum of one million euros.

It is nice that obviously harmful and illegal sites like The Pirate Bay will be blocked again in the Netherlands, says BREIN chief Tim Kuik.

A very bad time for our culture, which was free to access via these sites, is now happily behind us.

Todays interim decision by the Court of Appeal will stand until the Supreme Court hands down its decision in the main case between BREIN and Ziggo / XS4ALL.

Looking forward, it seems extremely unlikely that the Supreme Court will hand down a conflicting decision, so we&#821...



Listen up: the easiest place to use CRISPR might be in your ear Lifeboat News: The Blog

Scientists are hopeful they can inject the gene-editing technology directly into the ear to stop hereditary deafness.


VIA Graphics & Other Vintage GPUs Still Interest At Least One Developer In 2017 Phoronix

Kevin Brace, the sole active developer left working on the OpenChrome driver stack for VIA x86 graphics, presented yesterday at XDC2017 about his work on this driver and how in the years to come he still hopes to work on other vintage GPU support...


Researchers Find Recipe for Forest Restoration SoylentNews

To find out what works best for reestablishing tropical dry forests, the researchers planted seedlings of 32 native tree species in degraded soil or degraded soil amended with sand, rice hulls, rice hull ash or hydrogel (an artificial water-holding material). After two years, they found that tree species known for traits that make them drought tolerant, such as enhanced ability to use water and capture sunlight, survived better than other species. Some of the soil amendments helped get seedlings off to a good start, but by the end of the experiment there was no difference in survival with respect to soil condition.

"This study is important for a number of reasons," Powers said. "First, it demonstrates that it is possible to grow trees on extremely degraded soils, which provides hope that we can indeed restore tropical dry forests. Second, it provides a general approach to screen native tree species for restoration trails based on their functional traits, which can be applied widely across the tropics.

Is 'ecosystem restoration' the job growth area of the future?

Original Submission

Read more of this story at SoylentNews.


Nestl Makes Billions Bottling Water It Pays Nearly Nothing For

Via: Bloomberg: The companys operation in Michigan reveals how its dominated the industry by going into economically depressed areas with lax water laws. The Michigan operation is only one small part of Nestl, the worlds largest food and beverage company. But it illuminates how Nestl has come to dominate a controversial industry, spring by []


CCleaner hackers targeted tech giants with a second-stage malware Security Affairs

The threat actor that recently compromised the supply chain of the CCleaner software targeted at least 20 tech firms with a second-stage malware.

When experts first investigated the incident did not discover a second stage payload, affected users were not infected by other malware due to initial compromise.

The experts at Cisco Talos team that investigated the incident, while analyzing the command-and-control (C2) server used by the threat actor discovered a lightweight backdoor module (GeeSetup_x86.dll) that was delivered to a specific list of machines used by certain organizations.

In analyzing the delivery code from the C2 server, what immediately stands out is a list of organizations, including Cisco, that were specifically targeted through delivery of a second-stage loader. Based on a review of the C2 tracking database, which only covers four days in September, we can confirm that at least 20 victim machines were served specialized secondary payloads. Below is a list of domains the attackers were attempting to target. reads the analysis published by Cisco Talos.

The list of domains targeted by hackers is long and included:

  • Google
  • Microsoft
  • Cisco
  • Intel
  • Samsung
  • Sony
  • HTC
  • Linksys
  • D-Link
  • Akamai
  • VMware

CCleaner tech giants

The C2 MySQL database held two tables: one describing all machines that had reported to the server and one describing all machines th...


Scaled Composites, LLC Photo Lifeboat News: The Blog

Mojave, CA. The Scaled Composites Facebook Page.


Finding the Mainframers of the Future With Linux and Open Source

Speak the word mainframe to many millennial techies, and the first things that likely come to mind are in the form of grainy sepia photos of floor-to-ceiling, wall-to-wall computers with big spinning tapes. But thats far from the reality of the modern mainframe.


Trump: 'Russia hoax continues, now it's ads on Facebook' The Hill: Technology Policy

President Trump early Friday called reports of Kremlin-linked groups buying Facebook ads to sway the 2016 presidential election part of a "Russia hoax.""The Russia hoax continues, now it's ads on Facebook. What about the totally biased and dishonest...


Automating Steps in the Security Process is Critical to Defeat Todays Relentless and Complex Attack SoylentNews

I often talk about automation in my articles and it's a hot topic in general a quick Google search reveals more than 100 million results for security automation. Given the global shortage of cybersecurity professionals, and the volume and velocity of increasingly sophisticated threats we all have to deal with, humans can't go it alone. Automation helps get more from the people you have handling time-intensive manual tasks so they can focus on high-value, analytical activities. But the catch with automation is that it has to be applied at the right time in the security lifecycle in order to be effective.

You've likely heard the phrase: "dirty data in, dirty data out." Jumping to the end of the security lifecycle and using automation to take action like automating playbooks and automatically sending the latest intelligence to your sensor grid (firewalls, IPS/IDS, routers, web and email security, endpoint, etc.) can backfire. Without first aggregating, scoring and prioritizing intelligence you can actually exacerbate the dirty data problem.

[...] But with the sheer volume of threat data continuing to climb at a staggering rate, we need to start with the threat automating how we gather, score and prioritize threat intelligence. Otherwise we're just amplifying the noise, wasting precious resources and hampering security and that's the dirty secret.

Filter first, not last.

Original Submission

Read more of this story at SoylentNews.


Reviving a $25 Generator Hackaday

[Jennies Garage] found a used and abused inverter based generator in the clearance section of his local home improvement store. The generator had been returned on a warranty claim and was deemed uneconomical to fix. Originally $799, [Jennies Garage] picked it up for just $25. He documented his quest to get the device running with a trio of videos.

The generator had spark, but didnt want to fire. The only obvious problem was the fact that the machine had been overfilled with oil. There was little or no compression, but that is not uncommon with modern small engines many of them have a compression release mechanism which makes them easier to start.

With all the obvious problems eliminated, the only thing left to do was tear into the engine and figure out what was wrong. Sure enough, it was a compression issue. The overfull oil condition had forced engine oil up around the piston rings, causing them to stick, and snapping one of the rings. The cylinder bore was still in good shape though, so all the engine needed was a new set of rings.

Thats when the problems started. At first, the manufacturer couldnt find the rings in their computer system. Then they found them but the rings would take two weeks to ship. [Jennies Garage] isnt the patient type though. He looked up the piston manufacturer in China. They would be happy to ship him complete pistons but the minimum order quantity was 5000. Then he started cross-referencing pistons from other engines and found a close match from a 1960s era 90cc motorcycle. Ironically, its easier to obtain piston rings for an old motorcycle than it is to find them for a late model generator.

The Honda rings werent perfect the two compression rings needed to be ground down about 1/2 a millimeter. The oil ring was a bit too thick, but thankfully the original oil ring was still in good shape.

Once the frankenpiston was assembled, it was time to put the repair to the test. [Jennies Garage] reassembled the generator, guessing at the torque specs he didnt have. The surgery was a complete success. The generator ran perfectly, and lit up the night at the [Jennies Garage] cabin.

If youre low on gas, no problem. Did you know you can run a generator on soda? Want to keep an eye on your remote generator? Check out this generator monitor project.



Massive Viacom Data Exposed Through Amazon Web Services HackRead

By Waqas

Database on Amazon Web Services Containing Sensitive Data of Viacom

This is a post from Read the original post: Massive Viacom Data Exposed Through Amazon Web Services


Electric Cars, Open Source Summit, and Linux Server Innovation

Electric Cars, Open Source Summit, and Linux Server Innovation


Heterogeneous Memory Management Made It For Linux 4.14 Phoronix

While busy covering the many new features of Linux 4.14, one important change slipped by that I have long been waiting to see merged: Heterogeneous Memory Management...


Java JDK 9 Finally Reaches General Availability Phoronix

Java 9 (JDK 9) has finally reached general availability! Following setbacks, Java 9 is officially available as well as Java EE 8...


A Set Of BFQ Improvements Ready For Testing Phoronix

Recently I wrote about a BFQ regression fix that should take care of a problem spotted in our recent I/O scheduler Linux 4.13 benchmarks while now that work has yielded a set of four patches working to improve this recently-merged scheduler...


Microservice Architecture Takes a Whole New Approach to Infrastructure

With microservice architecture where it is today, the gap between the good, the bad, and the ugly, is now enormous in terms of being able to deliver high-quality software with speed and efficiency.


Why Should You Speak at Tech Conferences? Or At Least Attend Them Regularly (Part 1)

Now I talk regularly at local meetups and I went as a speaker to few big conferences. Given that I am no expert in public speaking, my heart beat rises and occasionally words scramble as I am on the stage. But still, I will give you some reasons, why you should speak at conferences or at least attend them.


Introducing The Linux Foundations Open Source Networking Days

OSN Days are a fantastic opportunity for network developers and users to learn how ONAP, OPNFV, OpenDaylight  and other open source initiatives are changing NFV/SDN orchestration and networking solutions.

IndyWatch Science and Technology News Feed Archiver

Go Back:30 Days | 7 Days | 2 Days | 1 Day

IndyWatch Science and Technology News Feed Today.

Go Forward:1 Day | 2 Days | 7 Days | 30 Days

IndyWatch Science and Technology News Feed was generated at World News IndyWatch.

Resource generated at IndyWatch using aliasfeed and rawdog