IndyWatch Science and Technology News Feed Archiver

Go Back:30 Days | 7 Days | 2 Days | 1 Day

IndyWatch Science and Technology News Feed Today.

Go Forward:1 Day | 2 Days | 7 Days | 30 Days

IndyWatch Science and Technology News Feed was generated at World News IndyWatch.

Thursday, 21 June


Google lays groundwork for secure offline app distribution Help Net Security

Google will start adding security metadata to Android application packages (APKs) distributed via Google Play, so that users with limited internet access can check whether the apps they get via peer-to-peer app sharing are legitimate. The move, announced late last year, is part of a wider push for improving app security and will surely benefit a lot of users. Often when you buy a physical product, youll find an official label or a badge which More

The post Google lays groundwork for secure offline app distribution appeared first on Help Net Security.


Googles Fuchsia Adds Emulator for Running Linux Apps

Googles Fuchsia Adds Emulator for Running Linux Apps

Go Back:30 Days | 7 Days | 2 Days | 1 Day

IndyWatch Science and Technology News Feed Today.

Go Forward:1 Day | 2 Days | 7 Days | 30 Days

Wednesday, 20 June


Undoing Aging 2019 is Confirmed Lifeboat News: The Blog

Glorious news! Undoing Aging 2019 has been announced today hosted by Forever Healthy and the SENS Research Foundation. We loved being there last year and bringing the community all the news and interviews from the event and we are delighted to see it is making a return in 2019.

We are very pleased to see that there will be a return of the successful Undoing Aging Conference in 2019. We attended the conference earlier this year, and as we reported at the time, it was a really positive experience.

This was, from the outset, a serious conference focused on the rapid science and research going on in the field and was just the kind of conference that the community needed. The conference was a superb mixture of respected researchers, investors, and thought leaders from the community, and it had no hint of the snake oil that has plagued our community in past years.


The 2019 Undoing Aging Conference will take place March 28 30 in Berlin, Germany Lifeboat News: The Blog

Exciting news smile

Mountain view, california / berlin, germany.

After the incredible success of the 2018 Undoing Aging Conference with 350 participants from 36 countries and over 40 brilliant speakers, SENS Research Foundation (SRF) and Forever Healthy Foundation (FHF) are pleased to announce that Undoing Aging 2019 will take place in Berlin at the Umspannwerk Alexanderplatz from March, 28 to 30.

The conference series Undoing Aging is focused on the cellular and molecular repair of age-related damage as the basis of therapies to bring aging under full medical control. Undoing Aging 2019 will once again bring together scientists from around the globe, all pioneers in their respective fields, who are leading the charge in maintaining and restoring full health in old age.


Avocados With Double the Shelf Life Debut in the U.S. SoylentNews

Edible coating allows avocados to stay ripe for twice as long

Avocados that stay ripe for twice as long as usual thanks to an edible barrier made from plant materials will be sold in the US for the first time this week.

The tasteless coating, developed by Santa Barbara company Apeel Sciences, controls the two main factors that cause fresh produce to go bad: the rate at which water escapes the surface of fruit and vegetables and the rate at which oxygen enters. This allows treated produce to stay fresh for longer. "We're creating an optimised microclimate that can double the shelf life [of the fruit]," said James Rogers, CEO of Apeel Sciences. "The average avocado might be ripe for 2-3 days. Ours will stay ripe for 4-6 days."

[...] Although Apeel is starting with avocados, the coating's formulation can be modified to create optimal conditions for other items including strawberries, mangoes, apples, bananas, kumquats and asparagus. [...] From this week, the Apeel-treated avocados grown by California-based Del Rey Avocado will be available in Costco and Harp Foods stores across the midwest, before rolling out across the United States.

[...] The coating can also extend the life of produce in developing countries where refrigeration is not widely available across the supply chain, which explains why the company launched in 2012 with funding from the Bill & Melinda Gates Foundation. The company has carried out pilots in Nigeria and Kenya, treating cassava root and mangoes.

Also at Fast Company, Fortune, and Delish.

Original Submission

Read more of this story at SoylentNews.


Preventing and Eliminating Lightning Damage with Surge Arrestors IEEE Spectrum Recent Content full text

With proper grounding and high-current surge protection devices, electrical equipment and personnel can be protected from the dangers of lightning.

This white paper discusses what lightning is and where it comes from, and gives recommendations on how to protect electrical equipment and personnel from this common but deadly event in nature.


Execs dont believe their companies learn the right lessons in cybersecurity Help Net Security

A majority of executives around the world feel their organizations can do better when it comes to learning from their past cyber mistakes, according to the results of a newly released global survey conducted by The Economist Intelligence Unit (EIU) and Willis Towers Watson. Who takes the leading role in developing employee-related cyber risk policies? The EIU surveyed over 450 companies across the globe about their strategies and the challenges they face in building cyber More

The post Execs dont believe their companies learn the right lessons in cybersecurity appeared first on Help Net Security.


OpenSUSE Tumbleweed Jumps On Linux 4.17, KDE Plasma 5.13 Riding Well Phoronix

For users of openSUSE's Tumbleweed rolling-release Linux distribution, it's been a very busy month on the update front...


Red Hat Enterprise Linux 6.10 Released With Spectre/Meltdown Mitigation Phoronix

While Spectre and Meltdown mitigation has been available to RHEL6 users via kernel upgrades, Red Hat Enterprise Linux 6.10 is out today as the newest release while its bundled kernel features Retpolines and KPTI for mitigating against these CPU vulnerabilities...


Inferring Internet security posture by country through port scanning Help Net Security

In this podcast, Tod Beardsley, Director of Research at Rapid7, talks about the recently released National Exposure Index, which aims to better understand the nature of Internet exposure services that either do not offer modern cryptographic protection, or are otherwise unsuitable to offer on the increasingly hostile internet and how those exposure levels look around the globe. Heres a transcript of the podcast for your convenience. Im Tod Beardsley, Director of Research at More

The post Inferring Internet security posture by country through port scanning appeared first on Help Net Security.


Employee negligence still poses major security concerns Help Net Security

With one-third of working adults in the U.S. admitting to potentially risky behavior at work, employee negligence poses major security concerns for U.S. businesses, according to a survey conducted by Ipsos. When assessing the cause of data breaches, the report found that employee negligence or accidental loss is a main cause. Nearly half of C-Suite Executives (C-Suites) (47 percent) and Small Business Owners (SBOs) (42 percent) reported that human error or accidental loss by an More

The post Employee negligence still poses major security concerns appeared first on Help Net Security.


3,000+ mobile apps leaking data from unsecured Firebase databases Help Net Security

Appthority published research on its discovery of a new HospitalGown threat variant that occurs when app developers fail to require authentication to Google Firebase databases. Appthority security researchers discovered the HospitalGown vulnerability in 2017 which leads to data exposures, not due to any code in the app, but to the app developers failure to properly secure backend data stores (hence the name). The new Firebase variant exposes large amounts of mobile app-related data stored in More

The post 3,000+ mobile apps leaking data from unsecured Firebase databases appeared first on Help Net Security.


ICE has access to license plate readers at hospitals, shopping malls and much more MassPrivateI

The threat to everyone's privacy is all to real.

The U.S. Immigration and Customs Enforcement agency (ICE) has been given access to License Plate Readers (LPR's) at hospitals, shopping malls and much more. ICE is using this data to target immigrants, activists and people of interest.

Allowing the Federal government to create secret lists is the hallmark of a Police State.

Secret license plate reader database

In 2014, the Highland Hospital in Oakland, California secretly installed an LPR near the entrance to its emergency room.

The camera tracked the license plates of all vehicles that approached the emergency room and instantly sent the data to numerous local, state, and federal law enforcement agencies, including the ICE.

Three years later after public pressure, they removed the license plate reader but not until it had coll...


Visibility across the digital experience is critical to manage it successfully Help Net Security

Riverbed found that 99% of business decision makers agree that optimizing digital performance is essential to business performance, and 98% agree that digital, including the delivery of digital services and applications, is critical to the future of their business. However, 95% of these same business decision makers say that major barriers including budget constraints, legacy networks and lack of visibility are holding them back from advancing digital strategies and delivering the performance and More

The post Visibility across the digital experience is critical to manage it successfully appeared first on Help Net Security.


Pentagon Confirms Halt of War Games With South Korea SoylentNews

The Pentagon confirmed Monday that major U.S. military exercises this summer in South Korea would be suspended, following President Trump's decision.

'We will be stopping the war games, which will save us a tremendous amount of money, unless and until we see the future negotiation is not going along like it should,' Trump told reporters after his meeting last Tuesday with Kim in Singapore. 'But we'll be saving a tremendous amount of money. Plus, I think it's very provocative.'

Original Submission

Read more of this story at SoylentNews.


Hackers Steal $31 Million from South Korean cryptocurrency exchange Bithumb Security Affairs

Just weeks after Korean exchange Coinrail was hacked, the Bithumb crypto exchange was hacked, crooks stole over $30 million in cryptocurrency.

It has happened again, for the second time in a year, the cryptocurrency exchange Bithumb has been hacked.

The South Korean cryptocurrency exchange confirmed that hackers stole 35 billion won ($31.6 million) worth of cryptocurrency between June 19 and June 20.

In response to the incident, the exchange moved all funds to cold wallets and temporarily suspended the deposits and blocked user withdrawals.

At the time of writing, Bithumb did not reveal any details about the security breach, but it announced that it will cover losses.

We have noticed that between the last night and today morning, about 35,000,000,000 KRW worth cryptocurrencies have been stolen. However, this loss will be compensated by Bithumbs own reservoir, and all of our assets are securedly saved in Bithumbs cold wallet. reads the security advisory published by Bithumb.

However, due to implementation enhancement as well as security check on deposit / withdrawal services, cryptocurrency deposit / withdrawal and KRW withdrawal service will be halted for time being and services are thoroughly reviewed.

Bithumb is one of the top 10 most popular cryptocurrency exchanges, experts noticed that Bitcoin price fell 3 percent following the announcement of the incident.



SMT Disabled by Default in -current OpenBSD Journal

As part of ongoing mitigations against CPU vulnerabilities, -current has gained a new sysctl, "hw.smt", to control Simultaneous Multi Threading (SMT). This is disabled by default (only on Intel CPUs, for now).

Read more


Bunnie Weighs in on Tariffs Hackaday

[Bunnie] has penned his thoughts on the new 25% tariffs coming to many goods shipped from China to the US. Living and working both in the US and China, [Bunnie] has a unique view of manufacturing and trade between the two countries. The creator of Novena and Chumby, hes also written the definitive guide on Shenzen electronics.

All the marked items are included in the new tariffs

The new US tariffs come into effect on July 6th. We covered the issue last week, but Bunnie has gone in-depth and really illustrates how these taxes will have a terrible impact on the maker community. Components like LEDs, resistors, capacitors, and PCBs will be taxed at the new higher rate. On the flip side, Tariffs on many finished consumer goods such as cell phone will remain unchanged.

As [Bunnie] illustrates, this hurts small companies buying components. Startups buying subassemblies from China will be hit as well. Educators buying parts kids for their classes...


Top 5 Disruptive Startups in AI Technology TechWorm

Our society is transforming at an unbelievable pace today as the industries are being influenced by new-age technologies like machine learning and Artificial Intelligence (AI).

We saw tech giant Microsoft unveil Xiaoice, an AI-bot that can place voice calls just like humans, gaming leader NVIDIA joining hands with Nuance to create an AI Marketplace for Diagnostic Imaging, and other big players leveraging the powerful and versatile technology that AI is. However, there are many innovative startups in the AI domain that the disrupting the industries too. The following are top 5 of them:

  1. Riminder

Riminder is taking the recruitment process to a whole new level by simplifying and accelerating the hiring process to help recruitment companies find the right candidates easily.

Riminder uses deep learning to rank millions of candidates who apply for jobs by comparing their resumes with employees that are currently working as well as others from different parts of the world that fit the job description. This way, the HR can sort through applications must faster and focus on the high-ranking candidates that meet their requirements.

Riminder currently offers a SaaS model for the companies that are interested in its services. It already has some of the biggest names such as Uber, Accenture, Orange, etc. on its clientele portfolio.

  1. Tailor Brands


Not only Tailor Brands has made headlines across the globe for its advanced line of services in the branding industry, its solved a huge problem that the SMEs and startups were facing for a long time.

Tailor Brands is an AI-powered branding platform that helps businesses from various sectors to create a strong online presence and a brand that makes them stand out from the rest. With an entire arsenal of branding tools available at affordable prices including logo designer, business deck designer, social media analytics, social media banners, etc.  even a small mom and pop store can now easily shake things up and grow their business faster than ever.

  1. Legal Robot



Linux Gets Experimental Support For In-Kernel Hibernation Encryption Phoronix

Intel's Chen Yu has sent out a set of patches providing experimental support for in-kernel encryption support for hibernation...


Going In-Depth With Flatpak For Sandboxed Application Packaging Phoronix

Red Hat / GNOME developer veteran Matthias Clasen has recently begun a series of blog posts going in-depth with Flatpaks for those wondering how this application deployment technology is taking over the Linux desktop...


X-Plane Flight Simulator Reports Linux Users At Just About 1% Phoronix

Laminar Research has published their latest usage statistics on the incredible X-Plane flight simulator software...


OpenBSD Disables Intel Hyper-Threading to Prevent Spectre-Class Attacks The Hacker News

Security-oriented BSD operating system OpenBSD has decided to disable support for Intel's hyper-threading performance-boosting feature, citing security concerns over Spectre-style timing attacks. Introduced in 2002, Hyper-threading is Intel's implementation of Simultaneous Multi-Threading (SMT) that allows the operating system to use a virtual core for each physical core present in processors


Scientists Isolate Protein Data From the Tiniest of Caches -- Single Human Cells SoylentNews

Scientists have obtained a slew of key information about proteins, the molecular workhorses of all cells, from single human cells for the first time.

The stockpile of information about proteins -- the most such data ever collected from a single mammalian cell -- gives scientists one of their clearest looks yet at the molecular happenings inside a human cell. Such data can reveal whether a cell is a rogue cancer cell, a malfunctioning pancreatic cell involved in diabetes, or a molecular player important for a preemie's survival.

These events and many more are determined by the actions of proteins in cells. Until now, detailed information on proteins inside single cells was hard to come by. The raw "data" -- the amount of each protein -- in a cell is extraordinarily scant and hard to measure. That's largely because scientists can't amplify proteins the way they can genes or other molecular messengers.

Now, in a study published in Angewandte Chemie, scientists from the Department of Energy's Pacific Northwest National Laboratory, working with counterparts at the University of Rochester Medical Center, show how they were able to learn an unprecedented amount of information about the proteins within samples of single human lung cells.

The scientists analyzed single cells, first from cultured cells and then from the lungs of a human donor, and detected on average more than 650 proteins in each cell -- many times more than conventional techniques capture from single cells.

Read more of this story at SoylentNews.


EU Parliament Committee Adopts Piracy Upload Filter Proposal TorrentFreak

Through a series of new proposals, the European Commission is working hard to modernize EU copyright law.

These plans have not been without controversy. In particular, Article 13 of the proposed Copyright Directive has been widely criticized as it would pressure online services to monitor and filter uploaded content.

The article states that online services are liable for any uploaded content unless they take effective and proportionate action to prevent copyright infringements, as identified by copyright holders.

That also includes preventing allegedly infringing files from being reuploaded, which implies some form of hash filtering and continuous monitoring of all user uploads.

Today, the Legal Affairs Committee of the Parliament (JURI) voted on the issue. With a 15 to 10 majority, the Article 13 proposal of Rapporteur Voss was adopted. This means that the plans move ahead in their current form, despite massive public outcry.

Over the past year, we have repeatedly covered the widespread opposition. Legal scholars, digital activists, politicians, all worried that the upload restrictions would violate the rights of regular Internet users.

In recent weeks, the wave of protests swelled. More prominent figures sounded the alarm bell, including Internet pioneer Vint Cerf, World Wide Web inventor Tim Berners-Lee, the Internet Archives Brewster Kahle, and Jimmy Wales from Wikipedia.

The campaign was picked up by the public as well. Roughly 320,000 people have signed petitions urging lawmakers to reject the plans and over the last week more than 50,000 tweets went up mentioning the #SaveYourInternet hashtag.

In addition to Article 13, there was also considerable pushback against Article 11, which is regularly referred to as the link tax. This proposal was accepted as well, with a 13 to 12 majority.

Now that the proposal has passed the Committee the plans will move to plenary before progressing towards the final vote on copyright reform next spring.

It also means that they are now much harder to stop or change. That has been done before, such as with ACTA, but achieving that type of momentum will be a tough challenge.

Pirate Party MEP Julia Reda, who suggested alternatives to the controversial pro...


5 biggest risks of sharing your DNA with consumer genetic-testing companies Lifeboat News: The Blog

Some individuals worry they will discover things about their DNA that will be frightening namely, the risks they run of contracting various diseases and not know how to move forward with the information. Professional scientific skeptics contend the information may not even be as accurate as claimed, and lead people to make questionable health decisions. But theres another type of risk that consumers arent focusing on as much, and its a big one: privacy. There is nothing more private than your personal genetic information, and sending away for a personal genome kit means sharing your DNA with the testing companies. What do they do with it, beyond providing consumers with genetic and health assessments?

Consumer DNA genetic testing kits are a booming business, and the biggest risk isnt necessarily uncovering a health scare; its what these companies may do, or be forced to do, with your genetic data.


ZeroFont phishing attack can bypass Office 365 protections Security Affairs

ZeroFont phishing attack Crooks are using a new technique that involves manipulating font sizes to bypass Office 365 protections.

According to cloud security firm Avanan, one of the detection mechanisms in Office 365 involves natural language processing to identify the content of the messages typically used in malicious emails.

For example, an email including the words Apple or Microsoft that are not sent from legitimate domains, or messages referencing user accounts, password resets or financial requests are flagged as malicious.

Experts from Avanan discovered phishing campaigns using emails in which some of the content is set to be displayed with zero-size font using <span style=FONT-SIZE: 0px>, for this reason, they dubbed the technique ZeroFont.

Recently, we have been seeing a number of phishing attacks using a simple strategy to get their blatant email spoofs past Microsofts phishing scans. The tactic, which we are calling ZeroFont, involves inserting hidden words with a font size of zero that are invisible to the recipient in order to fool Microsofts natural language processing. reads the analysis published by Avanan.

The email appears to the recipient as normal, but Microsofts filters are able to analyze also the text having a font size of 0.

phishing zerofont

Summarizing, while the user sees a classic phishing content like this:



Carbon Nanotube Optics Provide Optical-Based Quantum Cryptography and Quantum Computing SoylentNews

Researchers at Los Alamos and partners in France and Germany are exploring the enhanced potential of carbon nanotubes as single-photon emitters for quantum information processing. Their analysis of progress in the field is published in this week's edition of the journal Nature Materials.

"We are particularly interested in advances in nanotube integration into photonic cavities for manipulating and optimizing light-emission properties," said Stephen Doorn, one of the authors, and a scientist with the Los Alamos National Laboratory site of the Center for Integrated Nanotechnologies (CINT). "In addition, nanotubes integrated into electroluminescent devices can provide greater control over timing of light emission and they can be feasibly integrated into photonic structures. We are highlighting the development and photophysical probing of carbon nanotube defect states as routes to room-temperature single photon emitters at telecom wavelengths."

The team's overview was produced in collaboration with colleagues in Paris (Christophe Voisin) who are advancing the integration of nanotubes into photonic cavities for modifying their emission rates, and at Karlsruhe (Ralph Krupke) where they are integrating nanotube-based electroluminescent devices with photonic waveguide structures. The Los Alamos focus is the analysis of nanotube defects for pushing quantum emission to room temperature and telecom wavelengths, he said.

As the paper notes, "With the advent of high-speed information networks, light has become the main worldwide information carrier. . . . Single-photon sources are a key building block for a variety of technologies, in secure quantum communications metrology or quantum computing schemes."

X. He, H. Htoon, S. K. Doorn, W. H. P. Pernice, F. Pyatkov, R. Krupke, A. Jeantet, Y. Chassagneux, C. Voisin. Carbon nanotubes as emerging quantum-light sources. Nature Materials, 2018; DOI: 10.1038/s41563-018-0109-2

Original Submission

Read more of this story at SoylentNews.


Would You Look At That Yaw Control Hackaday

[Jeff Bezos] might be getting all the credit for developing a rocket that can take off and land vertically, but [Joe Barnard] is doing it the hard way. Hes doing it with Estes motors you can pick up in any hobby shop. Hes doing it with a model of a Falcon 9, and hes on his way to launching and landing a rocket using nothing but solid propellant.

The key to these launches is, of course, the flight controller, This is the Signal flight controller, and it has everything you would expect from a small board meant to mount in the frame of a model rocket. Theres a barometer, an IMU, a buzzer (important!), Bluetooth connectivity, and a microSD card slot for data logging. What makes this flight computer different is the addition of two connectors for standard hobby servos. With the addition of a 3D printed adapter, this flight controller adds thrust vectoring control. That means a rocket will go straight up without the use of fins.

Weve seen [Joe]s work before, and things have improved significantly in the last year and a half. The latest update from last weekend was a scale model (1/48) of the Falcon Heavy. In a 45-second video, [Joe]s model of the Falcon Heavy launches on the two booster rockets, lights the center core, drops the two boosters and continues on until the parachutes unfurl. This would be impressive without active guidance of the motor, and [Joe] is adding servos and launch computers to the mix. Its awesome, and certainly unable to be exported from the US.


Olympic Destroyer was involved in a new wave of cyber attacks Security Affairs

Olympic Destroyer, the malicious code that was used in attacks against Winter Games in Pyeongchang, was involved in a new wave of cyber attacks.

The same malware used in recent Olympic Winter Games in Pyeongchang, tracked as Olympic Destroyer, has been used in a new wave of attacks against organizations in Germany, France, the Netherlands, Russia, Switzerland, and Ukraine.

Olympic Destroyer

Shortly before the opening ceremonies on Friday, televisions at the main press centre, wifi at the Olympic Stadium and the official website were taken down.

According to an analysis conducted by experts from Cisco Talos, there are many similarities between the Pyeongchang attack, which they dubbed Olympic Destroyer and earlier attacks such as BadRabbit and NotPetya. All of these attacks are focused on destruction and disruption of equipment not exfiltration of data or other, more subtle attacks. Using legitimate tools such as PsExec and WMI the attackers targeted the domain to steal browser and system credentials to move laterally in the network and then wipe the victim computer to make it unusable.

While the source of the attacks is uncertain, the Cisco Talos blog post is clear in identifying motivation, Disruption i...


Magento Hackers Using Simple Evasion Trick to Reinfect Sites With Malware The Hacker News

Security researchers have been warning of a new trick that cybercriminals are leveraging to hide their malicious code designed to re-introduce the infection to steal confidential information from Magento based online e-commerce websites. So, if you have already cleaned up your hacked Magento website, there are chances your website is still leaking login credentials and credit card details of


Patent Extremists Are Unable to Find Federal Circuit Cases That Help Them Mislead on Alice Techrights

Freedom to develop software (code) with lower risk of patent litigation in the US


Summary: Patent extremists prefer talking about Mayo but not Alice when it comes to 35 U.S.C. 101; Broadcom is meanwhile going on a fishing expedition, looking to profit from patents by calling for embargo through the ITC

IN RECENT years the US Supreme Court (SCOTUS) guided the USPTO into a harder approach towards software patents; if theres nothing hard (as in non-abstract), then a patent isnt suitable protection, maybe copyrights at best. This has always made perfect sense to actual software developers, but policy was perturbed by lawyers for their selfish interests.

This has always made perfect sense to actual software developers, but policy was perturbed by lawyers for their selfish interests.The Federal Circuit has taken SCOTUS decisions such as Mayo and Alice into account; so did the Patent Trial and Appeal Board (PTAB), which is basically a lot more efficient and is technically part of the Office.

This case had nothing to do with software.At the start of the year there were a few Federal Circuit outcomes (decisions) which patent maximalists were able to spin in order to market software patents; but nothing of that kind has happened for months. Watchtroll, failing to cherry-pick any convenient cases, would rather speak of Vanda Pharmaceuticals a case that weve mentioned here before (albeit not much because its really about Mayo, not Alice). John M. Rogitz (Rogitz & Associates) wrote about this USPTO memo [which] dives into the Federal Circuits holding, noting that [t]he Federal Circuit distinguished Mayo, stating: The inventors recognized the relationships between iloperidone, CYP2D6 metabolism, and QTc prolongation, but that is not what they claimed. They claimed an application of that relationship. Unlike the claim at issue in Mayo, the claims here require a treating doctor to a...


Ayahuasca, the Psychedelic Antidepressant? Terra Forming Terra



We are now starting to see the science come out and it is clear that it helps.  This report is a good look at all that.  I have little doubt now that all out so called psychedelics will prove potentially beneficial to the restoration of brain function.

Misuse has deeply clouded the whole  field and we have lost over two generations of science on this.  We will recover that quickly.

What is blindingly clear is that these drugs are effective and must be used under strict protocols because they are effective.  Now we are learning how they are effective.  Resolving depression is apparent for several of these substances.  Healing brain damage is also apparent as well and we are now learning how.

PTSD needs to be cured and it now appears possible.

Ayahuasca, the Psychedelic Antidepressant?

By Neuroskeptic | June 17, 2018 6:09 am

A traditional Amazonian psychedelic brew is an effective and rapid-acting antidepressant, according to a paper just published. But the new study revives some long-standing questions.



Congress is proposing big changes to the National Organic Standards Board and farmers are raising the alarm Terra Forming Terra

Yes do raise the alarm.  We have seen major top down regulatory initiatives converted into monopoly protection schemes although in fairness i expect this to end abruptly under Trump.
 First off, the Organic system we have is not broken at all.  In fact it is becoming robustly healthy as the move to organic methods rapidly expands. It simply does not need to be fixed.. 
That the majors want to be able to dick with the rule making system is no surprise.  In the end though i expect it to be futile.  The reason for this is that the bad news regarding non organic methods keeps expanding and is building a broad constituency that is paying attention.
There is no such thing as organic GMOs although strangely they could prove welcome.  After all we have plenty of true GMO well accepted and clearly successful.  In fact all our nine thousand year old food staples have proved to be GMOs in the form of polyploidys which means someone doubled the DNA size in order to expand the grain size.  
Yet exceptional care is desired and the roundup scheme is the clear counjter example . .
Congress is proposing big changes to the National Organic Standards Board and farmers are raising the alarm

Saturday, June 09, 2018 by: Vicki Batts


Marine Protected Areas Are Important. But Are They Working? Terra Forming Terra

I have been on this topic for a long time and the world is slowly stumbling into this space.  We are al long way from best practice as yet.

Let us propose a thought experiment.  Establish a manged block of ocean, say the south China Sea which is actually a submerged continental land mass.  In this case a starting point would be to establish harvesting channels along side non harvesting channels.  Done right, this should allow a productive channel to naturally dump productive surpluses into the harvested channel.  sizing needs to be optimized but perhaps only a third of the area is ever harvest against a schedule that optimizes the economics.

There are plenty of variables involved here but the intent is to have the highest sustainable biomass along with the related harvest without producing productive deserts however temporary..  .

Marine Protected Areas Are Important. But Are They Working? 

The world won't meet international ocean conservation targets by 2020, so a team of scientists is looking at what's next for saving our seas. 

A view from Air Force One of Papahanaumokuakea Marine National Monument in the Pacific Ocean. Former President Barack Obama expanded the ocean reserve to be the largest marine protected area in 2016. 

Photograph by Saul Loeb, AFP/Getty Images

By Sarah Gibbens

PUBLISHED June 16, 2018

Every year National Geographic brings together explorers, scientists, and storytellers from around the world to share their discoveries and insightsalong with their solutions for creating a more sustainable future. Learn more about the Explorers Festival and watch a live feed of the event. Read more explorer stories and join the conversation wit...


'Whatever this animal is, it can read my mind!' - Terra Forming Terra

This report is extremely important. I had come to the conclusion that the large smart critters out there have the ability to control our ability to see them by mind to mind influence.   However, this came about reviewing many reports in which that provided the best explanation.  It was a long way from been directly observed simply because no observer is expecting this.

This report does exactly that. We never learn what the creature is except it is noisy and angry and very much in their face.  Better yet it responds to the observer's thoughts of using his shotgun by getting more angry.

The good news is that the creature shows restraint.  No one Got hurt.  That makes it a likely Big Foot although we cannot count out the Dogman or Giant Sloth.  We are long overdue to make direct contact with this lineage and to learn how to cooperate with them...   .

'Whatever this animal is, it can read my mind!' --

 Saturday, June 16, 2018
'Whatever this animal is, it can read my mind!'

In my encounter with Sasquatch/Dogman(?), it was screaming right in my face (note there were no trees for 75 yards). AND I COULD NOT SEE A THING!!! I had accidentally caught one in a trap; he destroyed the trap then followed me home. When it got dark, he came to my house screaming. When the whole family went out on the porch to see what it was, we could hear it right in front of us but could see nothing! Every time I thought of asking my father if I could take his shotgun to see what this thing was the screams got five times louder. I said to myself, 'Whatever this animal is, it can read my mind!' This is a true life experience that happened 55 years ago (1962). Since then I have had one other experience where I knew they were right next to me but I could not see them!" - PeterBerian


Air Force Tests Two Turboprops as Potential A-10 Replacements SoylentNews

The US Air Force has kicked off the procurement for another round of wing replacements for A-10 Thunderbolt II attack aircraft, known affectionately by many as the Warthog. With new wings, the A-10s will help fill a gap left by the delayed volume delivery of F-35A fighters, which were intended to take over the A-10's close air support (CAS) role in "contested environments"places where enemy aircraft or modern air defenses would pose a threat to supporting aircraft. For now, the A-10 is being used largely in uncontested environments, where the greatest danger pilots face is small arms fire or possibly a Stinger-like man-portable air defense system (MANPADS) missile. But the Warthog is also being deployed to Eastern Europe as part of the NATO show of strength in response to Russia.

While the A-10 will keep flying through 2025 under current plans, Air Force leadership has perceived (or was perhaps convinced to see) a need for an aircraft that could take over the A-10's role in low-intensity and uncontested environmentssomething relatively inexpensive and easy to maintain that could be flown from relatively unimproved airfields to conduct armed reconnaissance, interdiction, and close air support missions. The replacement would also double as advanced trainer aircraft for performing weapons qualifications and keeping pilots' flight-time numbers up.

So, last year the Air Force kicked off the Light Attack Experiment (OA-X), a four-aircraft competition to determine what would best fit that bill.

Original Submission

Read more of this story at SoylentNews.


What Use Are 10 Million Patents That Are of Low Quality in a Patent Office Controlled by the Patent Industry? Techrights

To technology companies, NPEs [patent trolls] are a drag on innovation, taxing them tens of billions of dollars every year while achieving no social purpose Mark Lemley and Robin Feldman

Mark Lemley
Image source: Stanford Law School

Summary: The patent maximalists are celebrating overgranting; the USPTO, failing to heed the warning from patent courts, continues issuing far too many patents and a new paper from Mark Lemley and Robin Feldman offers a dose of sobering reality

THIS post is not another rant about the EPO but purely about the USPTO, which is now being run by patent maximalists (see/recall the Director's selection, which seems to have involved nepotism). As the USPTOs CIO Watchdog put it yesterday (amid pretty substantial rumours of endemic USPTO nepotism): PTO is sending Patent SES (David Wiley) back to Patents and bringing another (Debbie Stephens) to serve as the DCIO for a couple of months, this sounds odd? Rumors are flying about a new CIO selection but nothing official. Wiley seemed to be well thought of, Stephens not sure?

A meaningless symbolic at best milestone will be celebrated. 10 million patents!Nobody in the media has been covering the spousal connections there; barely anyone bothered pointing out that the USPTOs new Director headed a firm that used to work for Donald Trump before Trump nominated/appointed him. Either way, the news sites will be full of pieces like this one in the coming days. A meaningless symbolic at best milestone will be celebrated. 10 million patents! As one site put it (the first we have seen on this):

The US Patent and Trademark Office (USPTO) has issued its 10 millionth patent.

The patent, Coherent Ladar Using Intra-Pixel Quadrature Detection, was the first to receive a new patent cover design, which was unveiled back i...


The Eastern District of Texas is Where Asian Companies/Patents/Trolls Still Go After TC Heartland Techrights

Katana Silicon Technologies

Summary: Proxies of Longhorn IP and KAIST (Katana Silicon Technologies LLC and KAIST IP US LLC, respectively) roam Texas in pursuit of money of out nothing but patents and aggressive litigation; theres also a Microsoft connection

THE decision on TC Heartland (SCOTUS) dealt with the venue at which companies operate and what this means for the venue of litigation (where patent lawsuits get filed). Weeks ago there were some new cases related to this, especially when it comes to foreign (non-US) companies from somewhere like South Korea or Taiwan. We wrote about that.

For those who havent been keeping track, KAIST has generally become a patent parasite masquerading as education or research (thats how its known or recognised around Korea or Seoul, like CSIRO in Australia). Jacob Schindler of IAM (the patent trolls lobby) now celebrates litigation in the Eastern District of Texas by KAISTs proxy in another country (KAIST IP US LLC). Its a shell entity of an entity that produces nothing. This shell has won the case, but we certainly hope that Samsung will appeal this decision to the Federal Circuit, overriding the notorious biases of the Eastern District of Texas (biases which is openly advertises). As IAM makes clear, the Patent Trial and Appeal Board (PTAB) was already involved prior to this. From the summary (outside the paywall) its made apparent that a nontechnical jury decided on this technical case (we explained many times why such trials may be unsuitable for patents):

Last Friday, a jury in the Eastern District of Texas ordered Samsung Electronics to pay $400 million to the IP licensing arm of South Koreas top technology university. KAIST IP US LLC, an affiliate of the Korea Advanced Institute of Science and Technology, saw its patent survive multiple IPR...


Coreboot Now Supports Directly Booting To A Linux Kernel FIT Image Phoronix

Coreboot's latest development code now supports parsing and booting of FIT payloads. FIT in this context is a Flattened Image Tree that leverages DeviceTree...


EPO Insiders Correct the Record of Benot Battistellis Tyranny and Abuse of Law: Legal Harassment and Retaliation Techrights

Battistelli himself broke the law, discrediting any notion that EPO complements patent law

Faces of cards

Summary: Battistellis record, as per EPO-FLIER 37, is a lot worse than the Office cares to tell stakeholders, who are already complaining about decline in patent quality

YESTERDAY afternoon the EPO published its latest nonsense (warning: link). EPO publishes Quality Report 2017, the headline said. Thats like North Korea releasing its democracy report. Remember that the EPO now has something called the Working Party for Quality [1, 2] because the Office has been reduced to just lying (left right and centre) before crooked Battistelli leaves the helm.

The timing of this publication might not be a coincidence considering last weeks letter and resultant press coverage (bemoaning patent quality). Staff generally agrees with concerned stakeholders thar patent quality has sunk. Alas, as usual, the EPO is just taking the piss and is nowadays googlebombing the word quality with the sole intention of lying, lying, and lying. In the face of facts all they can do is lie. Repeatedly. A lot.

The EPO has published the second edition of its dedicated Quality Report, it wrote in Twitter. Compared with the 2016 edition, the report provides more extensive information on existing and new measures to deliver high-quality products and services.

They conflate stuff like timeliness (i.e. how quickly they recklessly grant or reject) with quality. In many ways, quick grants (permitting less time for public input) are likely o...


Ex-CIA Employee Charged In Leak Of Classified Hacking Tools SoylentNews

Ex-CIA Employee Charged In Leak Of Classified Hacking Tools

A former CIA employee was charged Monday with leaking information on CIA hacking tools to Wikileaks.

Joshua Adam Schulte, 29, was charged with the theft of classified national defense information in a 13-count indictment handed down by a grand jury, the Justice Department said Monday. According to the indictment, Schulte stole the classified information from a CIA network in 2016 and then transmitted it to an organization that was unidentified in the indictment.

Schulte is also accused of intentionally damaging a CIA computer system, deleting records of his activities and blocking others from accessing the system. Schulte is currently in custody on child pornography charges. He's pleaded not guilty to those charges.

The leaks, which Wikileaks called "Vault 7," revealed tools used by the CIA to hack phones, TVs and computers as part of its investigations. The disclosures showed the lengths to which government investigators go to access electronic evidence, tailoring hacks for specific smart TVs, for example.

[...] "Schulte utterly betrayed this nation and downright violated his victims. As an employee of the CIA, Schulte took an oath to protect this country, but he blatantly endangered it by the transmission of classified Information," William F. Sweeney Jr., head of the New York FBI office, said in a statement Monday.

Man who allegedly gave Vault 7 cache to WikiLeaks busted by poor opsec

Submitted via IRC for Runaway1956

FBI used passwords used on suspect's cellphone to also get into his computer.


Original Submission #1 Original Submission #2

Read more of this story at SoylentNews.


A YouTube Subscriber Counter With A Tetris Twist Hackaday

When it comes to YouTube subscriber counters, theres not much wiggle room for creativity. Sure, you can go with Nixies or even more exotic displays, but in the end a counter is just a bunch of numbers.

But [Brian Lough] found a way to jazz things up with this Tetris-playing YouTube sub counter. For those of you not familiar with [Brian]s channel, its really worth a watch. He tends toward long live-stream videos where he works on one project for a marathon session, and theres a lot to learn from peeking over his virtual shoulder. This project stems from an earlier video, posted after the break, which itself was a condensation of several sessions hacking with the RGB matrix that would form the display for this project. Hes become enamored of the cheap and readily-available 6432 pixel RGB displays, and borrowing an idea from Mc Lighting author [toblum], he decided that digits being assembled from falling Tetris blocks would be a nice twist. [Brian] had to port the Tetris-ifying code to Arduino before getting the ESP8266 to do the work of getting the subs and updating the display. We think the display looks great, and the fact that the library is open and available means that you too can add Tetris animations to your projects.

None of this is to say that more traditional sub counters cant be cool too. From a minimalist display to keeping track of all your social media, good designs are everywhere. And adding a solid copper play button is a nice touch too.


Articles About a Unitary Patent System Are Lies and Marketing From Law Firms With Lawsuits Lust Techrights

Lying has become a norm

A small EPO

Summary: Team UPC has grown louder with its lobbying efforts this past week; the same lies are being repeated without much of a challenge and press ownership plays a role in that

EARLIER this week we warned about two lies about UPC lies that we see perpetuated almost daily by Team UPC and sometimes the EPO as well. Amid expectations of layoffs the Office is looking for a replacement.

The UPC wont start in a matter of months; this is a blatant lie from corrupt Battistelli and Team UPC, which has a lot of money at stake. They need this lie repeated ad infinitum in order to make sales (telling customers to pursue their unitary offerings). As for Battistelli, if all his abuses were in vain (resulting in 8 years of immeasurable damage, corruption and unprecedented abuses), how would he be remembered?

The UPC wont start in a matter of months; this is a blatant lie from corrupt Battistelli and Team UPC, which has a lot of money at stake.Wed like to draw attention to the latest lies and respond to these very quick. Well, marked as (press release) (blog) in Google News yesterday was this utter garbage titled Patent Translation in Europe: How to Deal with IP Protection (they mean patents, not IP). Rae Steinbach is trying to tell the German Federal Constitutional Court (FCC) what to do. And what for? To basically harm the whole of Europe for the interests of some patent law firms (like his). Great example of the arrogance and greed of Team UPC? Still willing to lie and break laws, constitutions etc. to make a buck/euro?

from the article (flagged by Google as press release and blog):

The European Unitary Patent package also aims to address these complications and make the system easier for businesses and individuals to navigate. As a result, the organization is looking to reduce the costs associated with patent and other IP related applications.

It is expected that the Uni...


Is Reliable Energy Storage On The Horizon? Lifeboat News: The Blog

He formerly headed the U.S. federal safety agency responsible for overseeing all energy & hazmat transportation by air, land, sea, rail and pipelines as the head of the Pipeline and Hazardous Materials Safety Administration (PHMSA) at the U.S. Department of Transportation (USDOT). He also served as the federal government&s;s top trucking, bus, and moving industry attorney as the Chief Counsel of the Federal Motor Carrier Safety Administration (FMCSA), also at the USDOT.

A retired a commissioned officer and naval aviator, his military service included tours of duty in Europe, Asia, Africa, and the Middle East. During his time he participated in military combat and humanitarian relief operations around the globe.

An avid traveler and student of history, he spends his time covering public policy impact issues for Forbes and other publications and provides legal and advisory services to public and private sector clients interested in matters pertaining to defense, energy, transportation, homeland security, and the environment.


The Decline in Patent Quality at the EPO Causes Frivolous Lawsuits That Only Lawyers Profit From Techrights

But only as long as their clients still believe that European Patents have predictability associated with them

Spare money

Summary: The European Patent Office (EPO) will continue granting low-quality European Patents under the leadership of the Battistelli-nominated Frenchman, Antnio Campinos; this is bad news for science and technology as that quite likely means a lot more lawsuits without merit (which only lawyers profit from)

THE USPTO unlike the EPO is actually trying to improve patent quality (it has to, seeing what the courts have been doing). We will write about that separately later today.

All the key managers will remain in place; it will be Team Battistelli, led by a Battistelli-picked President.Based on what we have been hearing (sources close to the EPO), Antnio Campinos will be another Battistelli but a much younger Battistelli. All the key managers will remain in place; it will be Team Battistelli, led by a Battistelli-picked President.

Now, we totally understand that EPO staff is hoping for a surprise, but optimism can sometimes lead to disappointments. Dugie Standeford from IP Watch has just published EPO Staff, Users List Priorities For Incoming President an article behind a paywall that starts as follows:

As the European Patent Office (EPO) prepares to welcome a new president, staff members and patent practitioners are setting out their priorities and suggestions for the newcomer, Antnio Campinos. Topping the list for patent examiners is ending the contentious relationship between management and employees. Patent attorneys and litigators, meanwhile, want to see more attention paid to creating a fair balance between the speed of patent grants and patent quality.

They would be wrong to assume that Campinos may pursue a turnaround. As far as hes concerned, Battistelli has done nothing wrong and patent quality is fine (Dr. Erst, his upcoming boss, says the same thing). But patent quality is not fine; examiners say so and so do stakeholders, who are definitely noticing.

Yesterday (last night in fact) we caught...


It's Time for TLS 1.0 and 1.1 to Die SoylentNews

As TLS 1.3 inches towards publication into the Internet Engineering Task Force's RFC series, it's a surprise to realise that there are still lingering instances of TLS 1.0 and TLS 1.1.

The now-ancient versions of Transport Layer Security (dating from 1999 and 2006 respectively) are nearly gone, but stubborn enough that Dell EMC's Kathleen Moriarty and Trinity College Dublin's Stephen Farrell want it formally deprecated.

This Internet-Draft (complete with die die die in the URL) argues that deprecation time isn't in the future, it's now, partly because developers in recalcitrant organisations or lagging projects probably need something to convince The Boss it's time to move.

The last nail in the coffin would be, formally and finally, to ban application fallback to the hopelessly insecure TLS 1.0 and 1.1 standards.

Deprecation also removes any excuse for a project to demand support for all four TLS variants (up to TLS 1.3), simplifying developers' lives and reducing the risk of implementation errors.

[...] The publication of TLS 1.3 into the RFC stream is imminent it's reached the last stage of the pre-publication process, author's final review. When it's published, it will carry the designation RFC 8446.

Original Submission

Read more of this story at SoylentNews.


AI Learns the Art of Debate Lifeboat News: The Blog

Project Debater is the first AI system that can debate humans on complex topics. The goal is to help people build persuasive arguments and make well-informed decisions.


Scavenging Russias Rocket Graveyard Is Dangerous and Profitable - Facts So Romantic Nautilus

This might be one of the most remote places on earth, little accessible by road, but its peace is routinely broken by the oldest, largest and busiest spaceport in the world: the Baikonur Cosmodrome. Photograph by Alex Zelenko / Wikicommons

The Altai mountain region of Central Asia is a rugged and remote place. Right in the center of the continental landmass, it forms a crossroads between the Kazakh steppes, the snow forests of Siberia and the arid plains of Mongolia. Its a landscape of granite, forced up by the inch-a-year collision of the Indian tectonic plate with Asia, then carved out over millions of years by streams of snowmelt. Siberian Ibex wander here along with musk deer feeding on the lichenous rocks and brown bears that follow the retreating snow fields in spring.

This might be one of the most remote places on earth, little accessible by road, but its peace is routinely broken in the most dramatic way. Thats because the Altai region sits right beneath the main flight path of the oldest, largest and busiest spaceport in the world: the Baikonur Cosmodrome. Debris from each rocket launch rains down on these remote hills, and the people of the region are
Read More


What Battistellis Workers Think of His Latest EPO Propaganda Techrights

Modernising the EPO

Summary: Modernising the EPO is what Battistelli calls a plethora of human rights abuses and corruption


Waymo, Uber, Ford, and others are joining forces to explore the human impact of self-driving cars Lifeboat News: The Blog

Driverless vehicles could eliminate millions of jobs in the future, from cabbies to truckers to food delivery workers. But the companies that are hoping to hasten the adoption of this disruptive technology dont want to seem callous to this brewing labor crisis, so they are joining forces to study the human impact of robot cars.

The Partnership for Transportation Innovation and Opportunity (PTIO) is a newly formed group comprised of most of the major companies that are building and testing on self-driving cars. This includes legacy automakers like Ford, Toyota, and Daimler; tech giants like Waymo (ne Google), Uber, and Lyft; and logistics providers like FedEx and the American Trucking Association. The new organization is being formed as a 501(6), which allows it to accept donations like a nonprofit and lobby government like a chamber of commerce.


General Electric Loses Place in Elite Dow Jones Industrial Average

Disclosure: I sell solar power systems in New Zealand. Via: Reuters: General Electric Co has lost its spot in the Dow Jones Industrial Average after over a century in the blue chip stock index, a new blow to a company that once towered over the American business landscape but is now struggling to retain []


Calm Down: Its Only Assembly Language Hackaday

Based on [Ben Jojos] title x86 Assembly Doesnt have to be Scary we assume that normal programmers fear assembly. Most hackers dont mind it, but we also dont often have an excuse to program assembly for desktop computers.

In fact, the post is really well suited for the typical hacker because it focuses the on real mode of an x86 processor after it boots. What makes this tutorial a little more interesting than the usual lecture is that it has interactive areas, where a VM runs your code in the browser after assembling with NASM.

We really like that format of reading a bit and then playing with some code right in the browser. There is something surreal about watching a virtual PC booting up inside your browser. Yeah, weve seen it before, but it still makes our eyebrows shoot up a little.

We hope hell continue this as a series, because right now it stops after talking about a few BIOS functions. Wed love to see more about instructions, indexing, string prefixes, and even moving to code that would run under Linux or Windows. It would be nice, too, if there was some information about setting up a local environment. Now if you want to make a serious investment and you use Linux, this book is a lot to chew on but will answer your questions.

Of course, there are many tutorials, but this is a fun if brief introduction. If you want to know more about assembly outside the browser, we covered that. If you really want to write a real bootloader, theres help for that, too.


Why Being Left-Handed Matters for Mental Health Treatment SoylentNews

[...] Since the 1970s, hundreds of studies have suggested that each hemisphere of the brain is home to a specific type of emotion. Emotions linked to approaching and engaging with the world -- like happiness, pride and anger -- lives in the left side of the brain, while emotions associated with avoidance -- like disgust and fear -- are housed in the right.

But those studies were done almost exclusively on right-handed people. That simple fact has given us a skewed understanding of how emotion works in the brain, according to Daniel Casasanto, associate professor of human development and psychology at Cornell University.

That longstanding model is, in fact, reversed in left-handed people, whose emotions like alertness and determination are housed in the right side of their brains, Casasanto suggests in a new study. Even more radical: The location of a person's neural systems for emotion depends on whether they are left-handed, right-handed or somewhere in between, the research shows.

Geoffrey Brookshire, Daniel Casasanto. Approach motivation in human cerebral cortex. Philosophical Transactions of the Royal Society B: Biological Sciences, 2018; 373 (1752): 20170141 DOI: 10.1098/rstb.2017.0141

Original Submission

Read more of this story at SoylentNews.


NEW 'Off The Wall' ONLINE 2600 - 2600: The Hacker Quarterly

NEW 'Off The Wall' ONLINE

Posted 20 Jun, 2018 1:13:12 UTC

The new edition of Off The Wall from 19/06/2018 has been archived and is now available online.


President Trump Trumped as US Senate Votes to Reinstate ZTE Ban SoylentNews

The United States Senate has passed an amendment that reinstates the ban on Chinese telecoms concern ZTE doing business with US-based companies.

President Trump said hed secured a reversal of the ban as a personal favour to Chinese president Xi Jinping in the hope that the show of good faith would ease trade negotiations between the two nations. ZTE was banned from dealing with US firms for flouting laws about exporting to Iran and North Korea. The ban cut ZTE off from critical component-makers like Qualcomm and led to it shuttering production lines and resellers dumping its products.

Trump's plan to have his friendship with Xi ease tensions appears not to have worked, in the short term at least, because the Trump administration today issued a statement that said China apparently has no intention of changing its unfair practices related to the acquisition of American intellectual property and technology and therefore threatening tariffs on US$200bn of Chinese goods.

The threat came after Trump last week announced tariffs on $50bn of Chinese goods, sparking retaliatory tariffs on about $35bn of US-made goods from China.

All of which doesnt look like that personal favour worked out as planned.

Back to the ZTE vote, as it saw US Senators from both sides of politics decry the removal of the ban on grounds of national security. A joint statement from senior Republican and Democratic senators read: We're heartened that both parties made it clear that protecting American jobs and national security must come first when making deals with countries like China, which has a history of having little regard for either. It is vital that our colleagues in the House keep this bipartisan provision in the bill as it heads towards a conference.

Original Submission

Read more of this story at SoylentNews.


Microsoft employees demand company cut ties with ICE The Hill: Technology Policy

Dozens of Microsoft employees are calling on the company to cut ties with U.S. Immigration and Customs Enforcement (ICE) amid growing outcry over the Trump administrations "zero tolerance" immigration policy.More than 100 employees signed on to an...


HPR2578: LinuxLUGcast 102 the lost episode Hacker Public Radio

This was episode 102 of the LinuxLUGcast. So the LinuxLUGcast is an open podcast/LUG that meets every first and third friday of the month using mumble. This method of running a podcast leaves it open to anyone showing up (which is what we want because it gets difficult for fiftyonefifty and I to come up with topics all the time). We have also gotten the reputation of being a safe for work podcast. This is why episode 102 is being posted here. Between the not safe for work language and the fact that after a few drinks during the podcast I get a little rambly we thought it best not to publish it on the regular LinuxLUGcast feed, but I thought there was some good conversation here that would be lost if it did not go somewhere. After some discussion we at the LinuxLUGcast decided that we would publish it here so that it could be heard by the HPR community. We have also done some website remodeling which has screwed up the .ogg feed, and wanted to let people know that we are still podcasting and to please check out for the new .ogg feed. Enjoy p.s. please forgive my rambling


A Slew Of AMDGPU DC Updates Published, Further Improvements For Raven Ridge Phoronix

There hasn't been a new AMDGPU DC code drop in a while as AMD developers work to improve their internal processes, but hitting the wire today is a set of 51 new patches for this "display code" stack that work on a variety of improvements...


Refurbishing A DEC 340 Monitor Hackaday

Back in the good old days movie theaters ran serials. Every week youd pay some pocket change and see what happened to Buck Rogers, Superman, or Tex Granger that week. Each episode would, of course, end in a cliffhanger. [Keith Hayes] has started his own serial about restoring a DEC 340 monitor found in a scrap yard in Australia. The 340 not a VT340 looks like it could appear in one of those serials, with its huge cabinets and round radar-like display. [Keith] describes the restoration as his big project of the year and we are anxious to see how the cliffhangers resolve.

Hes been lucky, and hes been unlucky. The lucky part is that he has the cabinet with the CRT and the deflection yoke. Those would be very difficult to replace. The unlucky part is that one entire cabinet of electronics is missing.

Keep in mind, this monitor dates from the 1960s when transistors were fairly new. The device is full of germanium transistors and oddball silicon transistors that are unobtainable. A great deal of the circuitry is on system building block cards. This was a common approach in those days, to create little PC boards with a few different functions and build your circuit by wiring them together. Almost like a macro-scale FPGA with wire backplanes as the programming.

Even if some of the boards were not missing, there would be some redesign work ahead. The old DEC machine used a logic scheme that shifted between ground and a negative voltage. [Keith] wants to have a more modern interface into the machine so the boards that interface with the outside world will have to change, at least. It sounds like hes on his way to doing a modern remake of the building block cards for that reason, and to preserve the originals which are likely to be difficult to repair.

The cliffhanger to this first installment is a brief description of what one of the system building block cards looks like. The 1575 holds 8 transistors and 11 diodes. Its apparently an analog building block made to gate signals from the monitors digital to analog converters to other parts of the circuit. Youll have to tune into the next episode to hear more of his explanation.

If you want to read about how such a thing was actually used, DECUS had a programming manual that you can read online. Seeing the round monitor made us think of the old PDP-1 that lives at the Computer History Museum. We are sure it had lots of practical uses, but we think of it as a display for...


YouTubes Piracy Filter Blocks MIT Courses, Blender Videos, and More SoylentNews

YouTube's ContentID system blocks videos alleged to infringe on copyright. Lately it has been coming down on a great many highly visible, legitimate videos. YouTube is apparently taking its time in resolving the problem.

Several popular YouTube accounts, including those belonging to 'MIT OpenCourseWare' and the 'Blender Foundation,' have had all their videos blocked. People who try to access the videos are informed that they are not available in their country, suggesting that YouTube's piracy filters have been triggered. It's unclear, however, who or what is to blame.

Source TorrentFreak : YouTube's Piracy Filter Blocks MIT Courses, Blender Videos, and More (Updated)

Original Submission

Read more of this story at SoylentNews.


Flaw in Google Home and Chromecast devices reveals user location HackRead

By Waqas

Craig Young, an IT security expert from Tripwire has found

This is a post from Read the original post: Flaw in Google Home and Chromecast devices reveals user location


Hillicon Valley: Verizon, AT&T call off data partnerships after pressure | Tech speaks out against Trump family separation policy | T-Mobile, Sprint make case for $26B merger The Hill: Technology Policy

The Cyber and Tech overnights have joined forces to give you Hillicon Valley, The Hill's comprehensive newsletter detailing all you need to know about the tech and cyber news from Capitol Hill to Silicon Valley.Welcome! Follow the cyber team, Olivia...


CyberMap: Live map of Israels cybersecurity ecosystem Help Net Security

During CyberWeek 2018, YL Ventures launched CyberMap, the first live map of Israels cybersecurity ecosystem. The live landscape enables interactive filtering based on: company category, funding stage, and more. Unlike other industry guides and infographics, CyberMap is flexible, and constantly updated. It allows for continued relevance and wider applicability. Additionally, YL Ventures have curated the list of source data to only include companies theyve determined are active and engaged. CyberMap is designed to be relevant More

The post CyberMap: Live map of Israels cybersecurity ecosystem appeared first on Help Net Security.


Vulkan Display Extensions To Be Used By SteamVR Merged Into Mesa RADV/ANV Phoronix

Keith Packard's long in development work for improving the Linux display stack infrastructure for better dealing with VR head-mounted displays is about rounded out with the new Vulkan extension support being merged into Mesa...


Can Thousands of Smartphones Help Detect Cosmic Rays? Lifeboat News: The Blog

Your smartphone has a particle detector on it, and scientists want you to help them uncover how the universe really works and maybe even discover the true nature of dark matter. There are just a few bugs to work out.

High-energy particles from space, called cosmic rays, constantly bombard the Earth. There are all sorts of things we might be able to learn about the universe by studying those particles. Weve previously discussed high-tech, expensive equipment used to monitor them. But the physicists behind a new project want your smartphone to help gather data on these cosmic rays, hopefully revealing new insights into dark matter and other strange phenomena.

This project can only be successful with a large number of people, Piotr Homola, associate professor at the Institute of Nuclear Physics at the Polish Academy of Sciences, told Gizmodo. We need public engagement on an unprecedented scale.


OpenBSD Disabling SMT / Hyper Threading Due To Security Concerns Phoronix

Security oriented BSD operating system OpenBSD is making the move to disable Hyper Threading (HT) on Intel CPUs and more broadly moving to disable SMT (Simultanious Multi Threading) on other CPUs too...


Musk Alleges Tesla Model 3 Production Has Been Sabotaged, According To CNBC SoylentNews

Tesla CEO Elon Musk has accused a Tesla employee of "quite extensive and damaging sabotage to our operations," according to an email obtained by CNBC. In the all-hands email to Tesla staff, Musk wrote that the employee had made "direct code changes" to the company's production systems, as well as exporting "large amounts" of Tesla's data to unknown third parties.

According to Musk's email, the unnamed employee claimed he had become disgruntled after failing to receive a promotion. However, the Tesla CEO also suggested the alleged saboteur could have been working with short sellers, oil and gas companieswhom he described as "sometimes not super nice"or "the multitude of big gas/diesel car company competitors." Of this last group, Musk reminded his employees that, since the traditional OEMs have been known to cheat emissions tests, "maybe they're willing to cheat in other ways."

[...] Tesla has faced plenty of criticism about its ongoing troubles in ramping up Model 3 production. But that may have been unwarranted if those problems were due to sabotage. We reached out to Tesla regarding CNBC's story, but the company declined to comment at this time.

Original Submission

Read more of this story at SoylentNews.


5 Things to Know About 5G New Radio IEEE Spectrum Recent Content full text

The Future of Wireless Communication

Learn about the recently specified New Radio physical layer implementation that makes the 5G future possible, including the waveforms, numerology, millimeter wave operation and multiuser MIMO and the concept of bandwidth parts for more efficient spectrum utilization.


Will governments ever approve of cryptocurrency? Lifeboat News: The Blog

The question was asked of me as columnist at Will governments eventually approve of cryptocurrency? First lets agree on terminology

  1. By approve, I assume that you are asking if governments will adopt or at least tolerate the use of crypto as legal tender in commerce. That is, not just as a payment instrument, but as the money itselfperhaps even accepting tax payments in cryptocurrency.
  2. The word cryptocurrency is sometimes applied to altcoins and even to ICOs. These are not the same. Many altcoins meet the criteria of the next paragraph, but none of the ICOs measure up (ICOs are scams). I assume that your question applies to Bitcoin or to a fair and transparent altcoin forked from the original code, such as Bitcoin Cash or Litecoin.

A blockchain-based cryptocurrency that is open source, permissionless, capped, fast, frictionless, with a transparent historyand without proprietary or licensing restrictions is good for everyone. It is good for consumers; good for business; and it is even good for government.

Of course, politicians around the world are not quick to realize this. It will take years of experience, education, and policy experimentation.

Many pundits and analysts have the impression that shifting to cryptocurrencynot just as a payment instrument, but as the money itselfwill never be supported by national governments. A popular misconception suggests that a cryptocurrency based economy has these undesirable traits:

  • it is deflationary (i.e. that inflation is necessary to promote spending or to accommodate a growing economy)
  • it facilitates crime
  • it interferes with tax collection
  • It interferes with national sovereignty, which leads to world government
  • It is not backed by anything, or at least not by anything substantial, like the Dollar, Euro, Pound, Yuan or Yen
  • it interferes with a governments ability to control its own monetary policy

Over time, perceptions will change, because only the last entry is true. Adoption of cryptocurrency puts trust into math rather than the whims of transient politicians. It helps governments avoid the trap of hoisting debt on future generations or making promises to creditors that they cannot keepYet, it does not lead to the maladies on this list.

But, what about that last item? Does an open source currency cause a nation to lose control over its own monetary policy? Yes! But it is not bad! Crypto cannot be printed, gamed or manip...


Intel hyper-threading security issues Open Source Security

Posted by Loganaden Velvindron on Jun 19

Hi all,

OpenBSD has gone ahead and disabled Intel Hyper threading with a
fairly detailed comment about the reasons behind: () openbsd org/msg99141.html

As far as I can tell:
-cache timing attacks are possible, and spectre-like problems are an
issue again.
-OSes will need to modify their schedulers to avoid scheduling domains
in a dangerous way.

When will the details be published so that OpenBSD...


ZTE and US government working on escrow account agreement: report The Hill: Technology Policy

The U.S. government and Chinese telecoms giant ZTE are hashing out the details of an escrow account that must be settled before a ban on the Chinese firm doing business with U.S. companies is lifted, according to Reuters. A Commerce...


Cambridge Analytica-linked researcher: Data wasn't helpful to Trump campaign The Hill: Technology Policy

The researcher at the center of the Cambridge Analytica scandal told Congress on Tuesday that he doesnt believe the data he handed over helped the Trump campaign.Aleksandr Kogan, a psychologist at the University of Cambridge, told a Senate Commerce...


Stop downloading fake malicious Fortnite Android apps HackRead

By Uzair Amir

Fortnite, a popular multiplayer sandbox survival game from Epic Games has

This is a post from Read the original post: Stop downloading fake malicious Fortnite Android apps


Major tech lobbying group urges Trump to end family separations at border The Hill: Technology Policy

A group that lobbies on behalf of major technology companies such as Apple, Facebook and Google is pushing President Trump to end the separation of families at the U.S.-Mexico border.We also believe strongly that separating children from their...


Email Phishers Using A Simple Way to Bypass MS Office 365 Protection The Hacker News

Security researchers have been warning about a simple technique that cyber criminals and email scammers are using in the wild to bypass most AI-powered phishing detection mechanisms implemented by widely used email services and web security scanners. Dubbed ZeroFont, the technique involves inserting hidden words with a font size of zero within the actual content of a phishing email, keeping


Laser Cutter Turns Scrapped To Shipped Hackaday

Well go way out on a limb here and say youve probably got a ridiculous amount of flattened cardboard boxes. Were buying more stuff online than ever before, and all those boxes really start to add up. At the least we hope theyre making it to the recycling bin, but what about reusing them? Surely theres something you could do with all those empty shipping boxes

Heres a wild ideawhy not use them to ship things? But not exactly as they are, unless youre in the business of shipping big stuff, the probably wont do you much good as-is. Instead, why not turn those big flattened cardboard boxes into smaller, more convenient, shippers? Thats exactly what [Felix Rusu] has done, and weve got to say, its a brilliant idea.

[Felix] started by tracing the outline of the USPS Priority Small Flat Rate Box, which was the perfect template as it comes to you flat packed and gets folded into its final shape. He fiddled with the design a bit, and in the end had a DXF file he could feed into his 60W CO2 laser cutter. By lowering t...


FreeBSD Celebrates 25th Anniversary, Tuesday, June 19th SoylentNews

The FreeBSD Foundation has announced that the name FreeBSD turns 25 years old on 2018-06-19. The mailing list archives contain a thread about name selection with with a message containing the following suggestion

How about just simply "FreeBSD"? No confusion, no fuss, seems like a good compromise to me. :-)

Original Submission

Read more of this story at SoylentNews.



Does Cryptocurrency Encourage Crime? Security Affairs

Is cryptocurrency making some wrongdoings harder to commit while making others more rampant in society? Does Cryptocurrency Encourage Crime?

People hear a lot about how cryptocurrency and particularly the blockchain technology associated with it could decrease some kinds of crime because its so transparent and all transactions become part of an unchangeable record.

However, is cryptocurrency making some wrongdoings harder to commit while making others more rampant in society?

Cybersecurity Firm Says Cryptocurrency Causes Raised Ransom Demands

A cybersecurity firm in the United Kingdom called MWR InfoSecurity believes the increasing demand in the cryptocurrency market contributes to more depth and liquidity. So, people who buy and sell cryptocurrency assets can more easily move enormous amounts of the virtual currency without causing dramatic price fluctuations in those assets.

Representatives of MWR InfoSecurity argue that those conditions make cybercriminals feel emboldened when making larger than usual ransom requests from their victims. They often request cryptocurrency instead of traditional money, and its becoming easier for them to up the amounts they demand.

Although cryptocurrency doesnt necessarily facilitate crimes in these cases, it could urge the criminals to be more devastating to their targets.

Cryptocurrency Connected to Crime Increase in India

The Indian government does not recognize cryptocurrency as legal tender, and it banned banks from providing services to companies that buy and sell virtual currency. That latter decision caused some cryptocurrency exchanges to shut down.

India is not a welcoming country for cryptocurrency users, and thats likely because when cryptocurrency began taking off in the country, related crimes rose too.

Some of them focused on duping hopeful investors who wanted to get rich with cryptocurrency. Others include crimes connected to malware on cryptocurrency mining machines. Fake cryptocurrency apps and unscrupulous companies appeared as well.

In the majority of cases, criminals likely noticed opportunities because people got excited about a technology about which they knew little.

The perpetrators cashed in on ignorance and often succeeded because their victims were so eager to get involved in cryptocurrency that they took leaps without first getting sufficiently educated.

Criminals commonly prey on people who are desperate, and thats why the cryptocurrency market is ripe for their misdeeds.

Many individuals view the cryptocurrency market as one filled with promise. Moreover, they read the stories of people who are now millionaires after becoming early cryptocurrency investors. So, some people are more likely tha...


UBports' Ubuntu Touch OTA-4 RC Released, Upgrades To Ubuntu 16.04 LTS Phoronix

The UBports community has announced the first release candidate of their long-awaited Ubuntu Touch OTA-4 update...


Our Ille C. Gebeshuber was named Austrian of the Year (Research) and won the Look!Business Award (the largest business award for women in Austria). Lifeboat News

Our Ille C. Gebeshuber was named Austrian of the Year (Research) and won the Look!Business Award (the largest business award for women in Austria).


Baby monkeys cloned successfully, humans may be next Lifeboat News: The Blog

Meet Zhong Zhong and Hua Hua, the first monkeys to ever be cloned .


Charles Petrie: Giving Burning Man Its Wings IEEE Spectrum Recent Content full text

For one week a year, a patch of desert becomes one of Nevadas busiest airports Photo: Susan Karlin

img img Photos: Susan Karlin

Ready for Takeoff: Each year, an airport springs into existence in the desert [top]. Charles Petrie [bottom] has helped it scale dramatically.

Most people know Burning Man as the 70,000-strong end-of-summer experimental arts festival in Nevadas Black Rock Desert. Lesser known is its FAA-designated airport. The Black Rock City Municipal Airport springs up each year to coordinate nearly 3,700 general aviation, chartered, and scenic flights carrying some 6,000 passengers in and out of the gate.

Its been nearly two decades since the airport, founded in 1999 by pilot Lissa Shoun, began as a single dusty landing strip handling tens of flights. Computer engineer Charles Petrie was instrumental in transforming it into Nevadas third busiest airport (behind Las Vegass McCarran and Reno-Tahoe airports) during 7 of its 13 operating days.

Petrie worked in early artificial intelligence at the now-defunct Microelectronics and Computer Technology Corp., in Austin, Texas. At Stanford University, he served from 1993 until retiring in 2011 as a computational-logic research scientist and executive director of the Stanford Networking Research Center. He was also the founding editor of IEEE Internet Computing . Petries first burn, in 1998, came the year after a motorcycle rally he was in took him past Burning Man. I saw all these costumed people coming off a bus and said, Thats what I want to do next year.

Petrie is notoriously accident-prone, with repeated injuries earning him the nickname Calamity. Im the only person whos ever been medevaced twice from Burning Man! he says with a laugh.

In the earliest days, things at the Burning Man airport were very informal. It started off as this little flying club with a few hundred passengers. We had to scale it to its current size, says Petrie. Ive worked to preserve this community, but its gotten very complicated, very difficult. People just see a bunch of planes parked next to tents and dont realize there are all these processes a...


iOS 12 will allow users to share their exact location with emergency services Help Net Security

When iOS 12 is released later this year, it will come with a new feature that will allow iPhone users in the US who call 911 to automatically and securely share their location data with first responders. How does it work? Since 2015, Apple used Hybridized Emergency Location (HELO), a technology that estimates a mobile 911 callers location using cell towers and on-device data sources (GPS, WiFi Access Points). This data was made available to More

The post iOS 12 will allow users to share their exact location with emergency services appeared first on Help Net Security.


AT&T, Verizon say they'll stop sharing location data with third-party brokers The Hill: Technology Policy

Verizon and AT&T announced Tuesday that they will no longer sell location data to third-party aggregators after revelations that the information was being used to track cellphone users without their knowledge.The announcements come after...


Urgent need to prepare for manmade virus attacks, says US government report Lifeboat News: The Blog

Report warns that swift progress in our ability to manufacture viruses is making us vulnerable to biological attacks.

Science editor.


Could coffee replace insulin injections for diabetics? Lifeboat News: The Blog

Scientists have developed an implant which releases diabetes medication when it senses caffeine in the blood.

Science editor.


Interaction of paired and lined-up electrons can be manipulated in semiconductors Lifeboat News: The Blog

The way that electrons paired as composite particles or arranged in lines interact with each other within a semiconductor provides new design opportunities for electronics, according to recent findings in Nature Communications.

What this means for , such as those that send information throughout , is not yet clear, but hydrostatic can be used to tune the interaction so that electrons paired as composite particles switch between paired, or superconductor-like, and lined-up, or nematic, phases. Forcing these phases to interact also suggests that they can influence each others properties, like stability opening up possibilities for manipulation in electronic devices and quantum computing.

You can literally have hundreds of different phases of electrons organizing themselves in different ways in a semiconductor, said Gbor Csthy, Purdue professor of physics and astronomy. We found that two in particular can actually talk to each other in the presence of hydrostatic pressure.



We're close to selling out the Hotel Pennsylvania for the upcoming Circle of HOPE conference. You can still take advantage of the super-discounted rooms being made available to HOPE attendees right in the middle of midtown Manhattan by clicking this link. After Friday, these rates will no longer apply. (They may also sell out before then and certain room types are already unavailable.)

And while you're remembering to do things, don't forget to get your tickets to HOPE by clicking here.



Microsoft Proudly Supports ICE In Its Work SoylentNews

Several sites are reporting, without reference to IBM's activities 70 years ago, that Microsoft's contact with ICE (U.S. Immigration and Customs Enforcement) is drawing fire online. The Computer Business Review includes a quote from Microsoft now missing from their press release:

"ICE's decision to accelerate IT modernization using Azure Government will help them innovate faster while reducing the burden of legacy IT. The agency is currently implementing transformative technologies for homeland security and public safety, and we're proud to support this work with our mission-critical cloud," he wrote.

KUOW radio writes on their web site that Microsoft is facing outrage their for blog post touting ICE contract:

As outrage grew online, a Microsoft employee quietly removed mention of ICE from the January press release this morning. Social media users noticed that, too. The company has since restored the press release's original language, and called its removal a "mistake."

After a little bit of conference swag gets handed out and a few advertising contracts^W^Wscholarships get handed out, this will all blow over and be forgotten.

Original Submission

Read more of this story at SoylentNews.


Washington opens de facto embassy in Taiwan, angering China Terra Forming Terra

Journalists tour the new office complex of the American Institute in Taiwan (AIT) during an opening ceremony in Taipei on June 12, 2018.

Actually, this is the proper and correct response to the action China has been taking to secure a de facto presence in the south China Sea.

It starts to put a clear price on unilateral action in the international arena.

It also challenges China's confrontation with Taiwan which is nonsense and would disappear the same day the communist party was disbanded.  It is a diplomatic leftover.

Historically Taiwan was seized in the seventeenth century by a Chinese warlord from the Dutch who truly have the first rights for what those are worth after an indigenous population which then was scant.  Thus an independent Taiwan is no far stretch and can be compared to England and France who have less legitimacy for separation.

China needs to learn that the more they push the more that the border states will act to strengthen ties with each other and the USA.  There are smarter options.
Washington opens de facto embassy in Taiwan, angering China

By Steven Jiang, CNN



Printing Strain Wave Gears Hackaday

We just wrapped up the Robotics Module Challenge portion of the Hackaday Prize, and if theres one thing robots need to do, its move. This usually means some sort of motor, but youll probably want a gear system on there as well. Gotta have that torque, you know.

For his Hackaday Prize entry, [Johannes] is building a 3D printed Strain Wave Gear. A strain wave gear has a flexible middle piece that touches an outer gear rack when pushed by an oval central rotor. The difference in the number of teeth on the flexible collar and the outer rack determine the gear ratio.

This gear is almost entirely 3D printed, and the parts dont need to be made of flexible filament or have weird support structures. Its printed out of PETG, which [Johannes] says is slippery enough for a harmonic drive, and the NEMA 17 stepper is completely contained within the housing of the gear itself.

Printing a gear system is all well and good, but what do you do with it? As an experiment, [Johannes] slapped two of these motors together along with a strange, bone-like adapter to create a pan/tilt mount for a camera. Yes, if you dont look at the weird pink and blue bone for a second, its just a DSLR on a tripod wit...



Mueller Scrambles To Limit Evidence After Indicted Russians Actually Show Up In Court Terra Forming Terra

Far too often, Americans think that they live in an information cocoon impenetrable to outsiders and are rudely shocked to discover that outsiders can be even better informed.  I think that happened here.

No one calculated if the Russians so indicted had a good motive to show up and it is obvious that someone did and decided to have some fun.

How would you respond upon discovering that you had been charged in absentia for a bogus crime merely to save an investigator's butt.  If money was no object, the temptation to turn the tables would be overwhelming.  That is exactly what happened here and now Mueller must come up with evidence that never existed..

Mueller Scrambles To Limit Evidence After Indicted Russians Actually Show Up In Court

By Tyler Durden

Zero Hedge

June 13, 2018

Special Counsel Robert Mueller is scrambling to limit pretrial evidence handed over to a Russian company he indicted in February over alleged meddling in the 2016 U.S. election, according to Bloomberg.

Mueller asked a Washington federal Judge for a protective order that would prevent the delivery of copious evidence to lawyers for Concord Management and Consulting, LLC, one of three Russian firms and 13 Russian nationals. The indictment accuses the firm of producing propaganda, pretending to be U.S. activists online and posting political content on social media in order to sow discord among American voters.

The special counsels office argues that the risk of the evidence leaking or falling into the hands of foreign intelligence services, especially Russia, would assist the Kremlins active interference operations against the United States.

The substance of the governments evidence identifies uncharged individuals and entities that the government believes...


CVE-2018-12558: DOS in perl module Email::Address Open Source Security

Posted by Pali Rohr on Jun 19


to Algorithm Complexity problem and can cause Denial of Service when
attacker prepares specially crafted input. Root of this problem is that
parsing of email addresses in Email::Address module is done by regular
expressions, which in perl can be exponential.

The trivial input is 30 form-fields characters. You can test it with
following oneliner:

$ perl...


AT&T, Sprint, Verizon to Stop Sharing Customer Location Data With Third Parties Krebs on Security

In the wake of a scandal involving third-party companies leaking or selling precise, real-time location data on virtually all Americans who own a mobile phone, AT&T, Sprint and Verizon now say they are terminating location data sharing agreements with third parties.

At issue are companies known in the wireless industry as location aggregators, entities that manage requests for real-time customer location data for a variety of purposes, such as roadside assistance and emergency response. These aggregators are supposed to obtain customer consent before divulging such information, but several recent incidents show that this third-party trust model is fundamentally broken.

On May 10, 2018, The New York Times broke the story that a little-known data broker named Securus was selling local police forces around the country the ability to look up the precise location of any cell phone across all of the major U.S. mobile networks.

Then it emerged that Securus had been hacked, its database of hundreds of law enforcement officer usernames and passwords plundered. We also learned that Securus data was ultimately obtained from a company called 3Cinteractive, which in turn obtained its data through a California-based location tracking firm called LocationSmart.

On May 17, KrebsOnSecurity broke the news of research by Carnegie Mellon University PhD student Robert Xiao, who discovered that a LocationSmart try-before-you-buy opt-in demo of the companys technology was wide open allowing real-time lookups from anyone on anyones mobile device without any sort of authentication, consent or authorization.

LocationSmart disabled its demo page shortly after that story. By that time, Sen. Ron Wyden (D-Ore.) had already sent letters to AT&T, Sprint, T-Mobile and Verizon, asking them to detail any agreements to share real-time customer location data with third-party data aggregation firms.

AT&T, T-Mobile and Verizon all said they had terminated data-sharing agreements with Securus. In a written response (PDF) to Sen. Wyden, Sprint declined to share any informa...


Cataract Removal Surgery Lifeboat News: The Blog

How surgeons remove cataract from the eye.


How to add encrypted ZFS pool on FreeBSD server nixCraft

I recently added hard disk to my FreeBSD based server. How do I configure an encrypted ZFS pool to store data on this disk? How can I add encrypted ZFS pool on FreeBSD 11.x server?

The post How to add encrypted ZFS pool on FreeBSD server appeared first on nixCraft.


Ex-CIA employee Joshua Adam Schulte charged with leaking Vault 7 dumps Security Affairs

An Ex-CIA employee, Joshua Adam Schulte (29), has been charged with stealing classified national defense information and sharing Vault 7 dumps with WikiLeaks.

Yesterday, the Department of Justice announced that Schulte has been charged with 13 count indictment.

In middle May, both The New York Times and The Washington Post, revealed the name of the alleged source of the Vault 7 leak, the man who passed the secret documents to Wikileaks. According to his LinkedIn profile, Schulte worked for the NSA for five months in 2010 as a systems engineer, after this experience, he joined the CIA as a software engineer and he left the CIA in November 2016.

Schulte was identified a few days after WikiLeaks started leaking the precious dumps.

Schulte was arrested for possession of child pornography, he was charged on three counts of receipt, possession and transportation of child pornography in August 2017.

The man was released in September 2017, but in December he was arrested again for violating the conditions of his release.

SCHULTE, 29, of New York, New York, is charged with one count each of (i) illegal gathering of national defense information, (ii) illegal transmission of lawfully possessed national defense information, (iii) illegal transmission of unlawfully possessed national defense information, (iv) unauthorized access to a computer to obtain classified information, (v) theft of Government property, (vi) unauthorized access of a computer to obtain information from a Department or Agency of the United States, (vii) causing transmission of a harmful computer program, information, code, or command, (viii) making material false statements to representatives of the FBI, (ix) obstruction of justice, (x) receipt of child pornography, (xi) possession of child pornography, (xii) transportation of child pornography, and (xiii) copyright infringement. reads the press release published by the DoJ.

According to the DoJ, Schulte used his access to CIAs networks while working for the intelligence agency.

Joshua Schulte, a former employee of the CIA, allegedly used his access at the agency to transmit classified material to an outside organization, said Geoffrey S. Berman, US Attorney for...


Fraudster exploited US govt staff info stolen in 2015 OPM breach Help Net Security

The data breach suffered by the Office of Personnel Management (OPM) is, by now, very old news, but some of the people involved and affected are still feeling the repercussions. Stone data used for identity theft The US Attorneys Office for the Eastern District of Virginia announced on Monday that a Maryland woman has pleaded guilty to using that stolen identification information to obtain fraudulent personal and vehicle loans through Langley Federal Credit Union (LFCU). More

The post Fraudster exploited US govt staff info stolen in 2015 OPM breach appeared first on Help Net Security.


IBM Debater supercomputer argues against a human in landmark AI debate Lifeboat News: The Blog

Neither the machine or nor the professional human debaters were given prior knowledge of the subject of the on-stage debate, which took place in San Francisco on Monday.


Washington firm could create nuclear fusion power within decades Lifeboat News: The Blog

Olympia, Washington, firm Agni Energy has designed a nuclear fusion reactor that borrows elements from existing designs and could lead it to be the first to crack the Holy Grail of energy production.


Google says its AI is better at predicting death than hospitals Lifeboat News: The Blog

Nature article presents an AI developed by Googles Medical Brain team which outperforms hospitals own warning system in predicting the death risk among hospital patients.

Googles Medical Brain team is now training its AI to predict the death risk among hospital patients and its early results show it has slightly higher accuracy than a hospitals own warning system.

Bloomberg describes the healthcare potential of the Medical Brains findings, including its ability to use previously unusable information in order to reach its predictions. The AI, once fed this data, made predictions about the likelihood of death, discharge, and readmission.

In a paper published in Nature in May, from Googles team, it says of its predictive algorithm:


Sugarcoating aging wont fight ageism Lifeboat News: The Blog

Glossing over the fact ageing is a chronic decline in function wont help with anything, let alone ending ageism.

At times, I think that I have written enough rejuvenation advocacy articles and that every time I write a new one, Im just repeating myself. I sometimes say to myself that Ive written about concerns and misconceptions from so many angles that Ive probably exhausted all the options. However, from time to time, there comes the bittersweet reassurance that Im not going to be out of a job any time soon.

The culprit

I came across a Refinery29 article titled Anti-Aging Is Officially Being Phased Out& Thats Good News For Women. The article summarizes, and wholeheartedly agrees with, a report by the Royal Society For Public Health, That Age Old Question. The report endeavors to expose ageism and help end discrimination against older people, but while it does make a handful of valid points, it seems to suggest that sweeping the true nature of aging under the rug will help to end ageism.


Should All Android Phones Run Stock Android? SoylentNews

There's no excuse: All Android phones (even Samsung's) should run stock Android

Nokia has taken a different approach with Android One. Earlier this year parent company HMD made the bold decision to switch to Android One for its entire family of phones, from the budget-minded Nokia 3.1 to the Snapdragon 835-powered Nokia 8 Sirocco. That means when you buy a Nokia phone you're getting the peace of mind that you'll get updates, and timely ones at that, for at least two years, and security patches for three years.

Or, as Juho Sarvikas, chief product officer at parent company HMD Global puts it, "pure and secure and up to date." That's something that can't be said for for than 90 percent of Android phones, based on the latest Oreo adoption numbers. And it's time the leading Android phone makers start closing the gap.

Original Submission

Read more of this story at SoylentNews.


Federico Faggin: The Real Silicon Man Hackaday

While doing research for our articles about inventing the integrated circuit, the calculator, and the microprocessor, one name kept popping which was new to me, Federico Faggin. Yet this was a name I should have known just as well as his famous contemporaries Kilby, Noyce, and Moore.

Faggin seems to have been at the heart of many of the early advances in microprocessors. He played a big part in the development of MOS processors during the transition from TTL to CMOS. He was co-creator of the first commercially available processor, the 4004, as well as the 8080. And he was a co-founder of Zilog, which brought out the much-loved Z80 CPU. From there he moved on to neural networking chips, image sensors, and is active today in the scientific study of consciousness. Its time then that we had a closer look at a man whos very core must surely be made of silicon.

Learning Electronics

Federico at Olivetti, middle-rightFederico at Ol...


Black Holes Could Actually Be Colliding Wormholes Lifeboat News: The Blog

Like the gravitational waves left behind by merging black holes, detectable ripples in space-time could come from colliding wormholes.


Debian Installer Buster Alpha 3 Released Phoronix

The third alpha release of the Debian Installer to be used by Debian 10 "Buster" is now available for testing...


Friday Free Software Directory IRC meetup time: June 22nd starting at 12:00 p.m. EDT/16:00 UTC FSF blogs

Help improve the Free Software Directory by adding new entries and updating existing ones. Every Friday we meet on IRC in the #fsf channel on

When a user comes to the Directory, they know that everything in it is free software, has only free dependencies, and runs on a free OS. With over 16,000 entries, it is a massive repository of information about free software.

While the Directory has been and continues to be a great resource to the world for many years now, it has the potential to be a resource of even greater value. But it needs your help! And since it's a MediaWiki instance, it's easy for anyone to edit and contribute to the Directory.

A few weeks back we launched a new Project Team to create a logo that packages can use to show off that they are included in the Directory. But at this time, we still haven't found a team captain for the project. This project could really help promote the Directory, as well as helping packages to demonstrate that they care about software freedom. This week, we'll be working to recruit a team captain, as well as trying to get the project off the ground.

If you are eager to help, and you can't wait or are simply unable to make it onto IRC on Friday, our participation guide will provide you with all the information you need to get started on helping the Directory today! There are also weekly Directory Meeting pages that everyone is welcome to contribute to before, during, and after each meeting. To see the meeting start time in your time zone, run this in GNU bash: date --date='TZ="America/New_York" 12:00 this Fri'


[CVE-2018-3760] Path Traversal in Sprockets Open Source Security

Posted by Rafael Mendona Frana on Jun 19

There is an information leak vulnerability in Sprockets. This vulnerability
has been assigned the CVE identifier CVE-2018-3760.

Versions Affected: 4.0.0.beta7 and lower, 3.7.1 and lower, 2.12.4 and lower.
Not affected: NONE
Fixed Versions: 4.0.0.beta8, 3.7.2, 2.12.5

Specially crafted requests can be used to access files that exists on
the filesystem that is outside an application's root directory, when the Sprockets server is...


Think Tank: Congress Should Make Streaming Piracy a Felony TorrentFreak

Soon after the turn of the century, P2P consumption of unlicensed media quickly dominated the file-sharing landscape.

The BitTorrent protocol emerged as the unchallenged kind of peer-to-peer transfers and for many years no rival could get anywhere near its level of market saturation.

Then, soon after the turn of the decade, the tide began to turn. With cheaper, faster bandwidth becoming increasingly available to a broader user base, opportunities to stream content directly from websites gathered unprecedented momentum. What began several years earlier as a relatively niche activity, soon turned into a content monster.

This critical shift in consumption habits was interesting on several fronts, not least since it made piracy accessible to relative novices via the growing Internet-enabled set-top box market.

As a result, illegal streaming is now considered one of the major threats, but various pro-copyright groups are concerned that current legislation doesnt go far enough to tackle those involved in supply.

The problem was summed up in April 2015 testimony before the House Judiciary Committee by then-Register of Copyrights Maria Pallante.

Currently, criminals who engage in unlawful internet streaming can only be charged with a misdemeanor, even though those who unlawfully reproduce and distribute copyrighted material can be charged with a felony, Pallante said.

This distinction makes no sense. As streaming becomes a dominant method of obtaining content online, unlawful streaming has no less of an adverse impact on the rights of copyright owners than unlawful distribution.

In a new paper published by the Free State Foundation (FSF), a think tank founded in 2006 which receives regular donations from the MPAA, streaming is again described as a misdemeanor offense and one that should be taken more seriously to protect copyright holders.

In its report Modernizing Criminal Copyright Law to Combat Online Piracy, FSF notes that copyright holders face difficulties prosecuting mass-scale willful infringement via civil lawsuits. So, to give them the assistance they require, Congress should upgrade piracy via streaming to a felony offense.

Congress should update criminal copyright law to better address growing copyright piracy taking place through online streaming sites and enabled by illicit streaming devices, FSF writes.

Currently, willful copyright infringement via online streaming is only a misdemeanor, whereas willful infringement via digital downloading is a felony when statutory minimums are satisfied.

This disparate trea...


How to Hack Wifi Password | Tech Blog

Internet connection has become a basic need in our advanced modern lives. A couple of networks like wired and wireless have been used so as make use of Internet in the best way. Wireless networks have become most common at workplaces for business and home-based works. Usage of wireless networks is robust and at the...

The post How to Hack Wifi Password appeared first on | Tech Blog.


Open Source Skills Soar In Demand According to 2018 Jobs Report

Linux expertise is again in the top spot as the most sought after open source skill, says the latest Open Source Jobs Reportfrom Dice and The Linux Foundation. The seventh annual report shows rapidly growing demand for open source skills, particularly in areas of cloud technology.

Key findings of the report include:


Reliefbands Motion Sickness Wearable, Take 2 IEEE Spectrum Recent Content full text

Two years ago, I tried the original and judged it to be my favorite gadget ever. Version 2.0 aims for better form to match its function Photo: Tekla Perry The author's "geek stack": a Fitbit, a hair tie, a small analog watch, and Reliefband 2.0.

The motion sickness wearable Reliefband changed my life back in 2016, making me able to comfortably ride in cars, planes, and boats without sleep-inducing motion sickness drugs. Theres no arguing that the wearable works amazingly well for me, someone who is severely susceptible to motion sickness,.

There was also no arguing that generation one is not the most attractive design. It resembles something my kid got as part of a secret agent spy kit when he was six. Or like a toy compass from a cereal box.

And indeed, after just over a year of use, the plastic case started cracking. A replacement unit had a battery door that just wouldnt close. I solved both problems with duct tape; it wasnt pretty, but I wasnt giving up this gadget Id come to rely on. Instead, I tucked my sleeve over it to hide it as much as possible, and wore it only as long as I had to.

Back in 2016, the company promised that it was in the midst of a redesign, and would be shipping a much sleeker and more functional band by the end of that year. It took a little longer than that, but now Reliefband has finally rolled out generation 2.0.

But while Reliefband 2.0 is now my band of choice, its not superior in every respect to the original version.  

Before we get into why, heres a quick refresher on the basic operating principle of both the old and new bands. They work by emitting electric pulses; carefully positioned contact plates on the device send those pulses tingling up the middle couple of fingers. These intermittent pulses work to block the neurological signals that trigger motion sickness. The electric jolts have to be spaced carefully, company reps told me. Not frequent enough, and they wont do the job. Too frequent, and theyll make the nerves insensitive to them.

As someone who gets motion sickness essentially anytime Im in a car and not in the drivers seat, I can attest that my original Reliefband works brilliantly. Only once in my two years of using it has it failedand even then, it helped me recover quickly.

Reliefband 2.0 solves some of its issues, but creates new ones.

First, the look: Version 2.0 is much more attractive. The bulky part of the gadget, containing the battery and electronics, has been moved to the top, so it looks like a smart watch or bul...


Purism's Librem 5 To Rely On Secondary Processor For Binary Blobs Phoronix

With not being able to deliver a 100% fully free software / libre system, the Librem 5 smartphone will rely upon a secondary processor for dealing with the necessary binary blobs for hardware initialization to keep them out of touch from the U-Boot boot-loader and Linux kernel...


T-Mobile, Sprint file for approval of $26 billion merger The Hill: Technology Policy

T-Mobile and Sprint on Tuesday laid out the case for a $26 billion merger, filing for approval at the Federal Communications Commission (FCC).In the 678-page document, the two companies argue that the combination, which theyre calling New T-...


NVIDIA & Valve Line Up Among The Sponsors For X.Org's XDC 2018 Phoronix

The initial list of sponsors have been announced for the annual X.Org Developers' Conference (XDC2018) where Wayland, Mesa, and the X.Org Server tend to dominate the discussions for improving the open-source/Linux desktop...


Elon Musk launches investigation into sabotage at Tesla: report The Hill: Technology Policy

Elon Musk sent an all-staff email on Sunday alleging "extensive and damaging sabotage" by a Tesla employee that the company will investigate this week, according to CNBC.The person in question changed the code of an internal project and exposed data...


Lawn From Hell Saved by Mower From Heaven Hackaday

Its that time of year again, at least in the northern hemisphere. Everything is alive and growing, especially that narrow-leafed non-commodity that so many of us farm without tangible reward. [sonofdodie] has a particularly hard row to hoehis backyard is one big, 30 slope of knee-ruining agony. After 30 years of trudging up and down the hill, his body was telling him to find a better way. But no lawn service would touch it, so he waited for divine inspiration.

And lo, the answer came to [sonofdodie] in a trio of string trimmers. These Whirling Dervishes of grass grazing are mounted on a wheeled plywood base so that their strings overlap slightly for full coverage. Now he can sit in the shade and sip lemonade as he mows via rope and extension cord using a mower that cost about $100 to build.

These heavenly trimmers have been modified to use heavy nylon line, which means they can whip two weeks worth of rain-fueled growth with no problem. You can watch the mower shimmy down what looks like the worlds greatest Slip n Slide hill after the break.

Yeah, this video is two years old, but somehow we missed it back then. Ideas this fresh that tackle age-old problems are evergreen, unlike these plots of grass we must maintain. Theres more than one way to skin this ecological cat, and weve seen everything from solar mowers to robotic mowers to mowers tied up to wind themselves around a stake like an enthusiastic dog.

Thanks for the tip, [Itay]!


Infant Mortality Rates Higher in Areas with More Christian Fundamentalists SoylentNews

Researchers report in areas with greater numbers of Christian fundamentalists, infant mortality rates are higher than in areas with more mainstream Christians. The study reveals external factors such as lack of social support, birth defects, poverty and lack of insurance, in addition to religious conviction, are the main reasons for the increased mortality rates.

The odds of an infant dying before their first birthday are higher in counties with greater proportions of conservative Protestants, especially fundamentalists, than in counties with more mainline Protestants and Catholics, according to a new Portland State University study The study, published online in May in the Journal for the Scientific Study of Religion, supports the idea that the more insular, anti-institutional culture of fundamentalists can lead to poorer health outcomes.

Ginny Garcia-Alexander, a sociology professor in PSU's College of Liberal Arts and Sciences and the study's lead author, examined the influence of religion on postneonatal infant mortality rates, or the number of deaths from four weeks through the first year, using data from 1990 through 2010. Garcia-Alexander said a leading cause of infant death in the first 28 days is birth defects, which can be heavily influenced by advances in medical knowledge and technology. By contrast, deaths in the next 11 months of life are more often linked to external factors such as poverty, lack of insurance, social support networks and religion.

Garcia-Alexander said the findings mirror trends seen in adult mortality rates, where areas with more mainline Protestants and Catholics had better health outcomes than areas with more conservative Protestants.

The study's findings build on previous research that says that Catholicism and mainline Protestantism are civically minded, externally oriented faiths that emphasize community-level care. For example, church-affiliated hospitals and social-service providers such as Catholic Charities can bolster the health infrastructure of local communities.


Original Submission

Read more of this story at SoylentNews.


Sway 1.0 Wayland Compositor Nears With Floating Windows, Tablet Support & More Phoronix

The release of the Sway 1.0 Wayland compositor is inching closer with the recent third alpha release. Sway for the uninformed is a very promising i3-compatible Wayland compositor...


The Multiverse Falsified Not Even Wrong

The July 1 issue of the Monthly Notices of the Royal Astronomy Society includes an article evaluating the standard multiverse prediction of the cosmological constant, with result:

The predicted (median) value is 5060 times larger than the observed value. The probability of observing a value as small as our cosmological constant 0 is 2percent.

If your theory only makes one prediction, and that prediction is off by a factor of 50, thats the end of it for your theory. Im very glad that this has now been sorted out, the multiverse hypothesis has been falsified, and theorists who have been working on this can move on to more fruitful topics.

Update: As David Appell realized, the last sentence here was sarcasm (or maybe black humor). Those promoting the multiverse are doing Fake Physics, not Physics. This is ideology, not science, and there is no chance that they will stop referring to the successful multiverse prediction of the CC, no matter what analysis shows a seriously incorrect prediction.

As Blake Stacey points out, this paper was on the arXiv back in January (see here), and has just been ignored by multiverse proponents. Part of doing Fake Physics is ignoring any information that contradicts what you want to believe. Another commenter points to this 2014 argument from Sesh Nadathur, which similarly as far as I know has just been ignored.

After appearing on the arXiv in January, this latest work was promoted by press release from Durham University back in May, which led to lots of media stories (e.g. here). For some reason, the press release didnt really explain that this work falsifies the usual claim that the value of the CC is evidence of a multiverse. Instead, the work was promoted as showing that the multiverse is more hospitable to life than thought, which sounds good I guess, but seems like a bizarre way to explain the significance of this work.

For various sensible explanations of what is really going on here, see Jim Baggott, Philip Ball, and Sabine Hossenfelder. Ive often...


Security updates for Tuesday

Security updates have been issued by Arch Linux (libgcrypt), Fedora (bouncycastle, nodejs, and perl-Archive-Tar), openSUSE (aubio), and Red Hat (chromium-browser, glibc, kernel, kernel-rt, libvirt, pcs, samba, samba4, sssd and ding-libs, and zsh).


Couple raises more than $4M for free legal services for separated immigrant families The Hill: Technology Policy

A California couple has raised more than $4 million as part of a Facebook campaign to reunite separated migrant families.Charlotte and Dave Wilner started the campaign, titled Reunite an immigrant parent with their child, with a goal of raising $1...


Hackers Who Hit Winter Olympics 2018 Are Still Alive and Kicking The Hacker News

Remember the 'Olympic Destroyer' cyber attack? The group behind it is still alive, kicking and has now been found targeting biological and chemical threat prevention laboratories in Europe and Ukraine, and a few financial organisation in Russia. Earlier this year, an unknown group of notorious hackers targeted Winter Olympic Games 2018, held in South Korea, using a destructive malware that


Systemd Services: Monitoring Files and Directories

Systemd Services: Monitoring Files and Directories


What is Our Martian Quarantine Protocol? Hackaday

If you somehow havent read or watched War of the Worlds, heres a spoiler alert. The Martians are brought down by the common cold. You can argue if alien biology would be susceptible to human pathogens, but if they were, it wouldnt be surprising if aliens had little defense against our bugs. The worrisome part of that is the reverse. Could an astronaut or a space probe bring back something that would ravage the Earth with some disease? This is not science fiction, it is both a historically serious question and one well face in the near future. If we send people to Mars are they going to come back with something harmful?

A Bit of News: Methane Gas Fluctuations on Mars

What got me thinking about this was the mounting evidence that there could be life on Mars. Not a little green man with a death ray, but perhaps microbe-like life forms. In a recent press release, NASA revealed that they not only found old organic material in rocks, but they also found that methane gas is present on Mars and the amount varies based on the season with more methane occurring in the summer months. Theres some dispute about possible inorganic reasons for this, but it is at least possible that the variation is due to increased biological activity during the summer.



Watch: Laser Origami Makes Inductors IEEE Spectrum Recent Content full text

Army researchers use a common laser engraver to make inductors and other complex shapes Photo: U.S. Army Research Laboratory/IEEE

In research reported in an upcoming issue of IEEE Electron Device Letters , researchers at the U.S. Army Research Laboratory, in Adelphi, Md., show how they can make three-dimensional inductors by using a laser to both cut and fold copper. The Army is interested in origami inductors because the technology could give deployed soldiers the ability to make replacement parts rather than rely on what could be a risky and expensive delivery. But never mind its practical purpose; the process is just absolutely mesmerizing to watch.

The laser origami technique exploits a phenomenon called counterbending. Using the laser at half-power (10 watts) and rapid scanning (100 mm/s), the laser heats a spot to be bent. Because of the low power and brief blast, only one side of the copper gets hot. That side temporarily expands, bending away from the laser and producing permanent strain in the cooler, opposite side. When the hot spot contracts again, the strain bends the copper back up toward the laser, folding the copper permanently.

Compared to commercial inductors from Coilcraft that have about the same inductances, the laser-origami components rang in with similar quality factors. (Quality factor is a dimensionless quantity that tells how awesome your inductor is.) 

Here, the Army teamNathan Lazarus, Sarah S. Bedair, and Gabriel L. Smithare building a planar inductor, which requires a bit of conductor to protrude into the third dimension. Its about 20 millimeters on a side, and the process took about 12 minutes, so the video is sped up.

Go Back:30 Days | 7 Days | 2 Days | 1 Day

IndyWatch Science and Technology News Feed Today.

Go Forward:1 Day | 2 Days | 7 Days | 30 Days

Tuesday, 19 June


Biohacker With Implanted Card Escapes Conviction SoylentNews

Australian Broadcast Corporation follows-up on a 3 months old story:

Biohacker Meow-Ludo Disco Gamma Meow-Meow who was fined for implanting an Opal Card chip into his hand has had his conviction overturned. [...] Mr Meow-Meow appealed against the conviction in the District Court and today it was quashed. District court judge Dina Yehia took into account his good character, while describing the case as "highly unusual ... involving a unique set of circumstances."

[...] She said that, while there were legal issues of general deterrence, she was of the view that the objective seriousness of the offence fell towards the lower end of the range, if not the bottom.

The previous story offers the context:

Meow-Ludo Disco Gamma Meow-Meow, 33, surgically implanted an Opal Card chip into his hand last year, so that he could swipe on and off without using a card. Transport authorities charged him for using public transport without a valid ticket and for not producing a ticket to transport officers. Mr Meow-Meow pleaded guilty to both offences at Newtown Local Court. He was fined $220 for breaching the Opal Card terms of use and was ordered to pay $1,000 in legal costs.

The lawyer representing Mr Meow Meow argued that transport legislation had advanced to include methods of contactless payment through MasterCard and some smart phones. He said that the law should adapt to all available technologies including implantable tech. But Magistrate Michael Quinn said, while the legislation may catch up with technology in the future, the law of the day must be followed.

Outside court, Mr Meow Meow said he was disappointed both offences were not dismissed and that he was ordered to pay legal costs. Despite the decision, Mr Meow Meow said he would continue to experiment with implanted technology. He said he was planning to push the boundary even further, replacing his Opal chip with one that will hold all of his personal information, including credit cards and memberships.

Why wait until the govt chips you when you can use your freedom and DIY? (large grin)

Original Submission

Read more of this story at SoylentNews.


California lawmakers debate creating regional electric grid Lifeboat News: The Blog

A contentious proposal to link oversight of Californias electric grid with other western states faces a crucial test Tuesday in a state Senate committee.

Supporters say regionalizing the grid would make it easier and cheaper to deploy renewable energy across the western United States. But critics, including some environmentalists and consumer advocates, say California would jeopardize its efforts to require the expansion of renewables.

California has greatly expanded the use of , particularly wind and solar, but thats brought new challenges for grid operators to manage supply and demand as weather patterns and sunlight vary.


The Pirate Bays Frozen in Time, No New Uploads TorrentFreak

thepirateThe Pirate Bay has more than its fair share of technical inconveniences. Every other week the site goes down for a few hours, or days, just to reappear as if nothing ever happened.

In recent days many users have noticed some hiccups as well, as TPBs upload functionality is currently broken. According to the recent uploads page, no new torrents have been added since last weekend.

The last torrent was uploaded on Sunday and the recent torrents page suggests that the problems started just before 7:00 a.m. Central European Time.

After that, things went quiet and the official Pirate Bay status page confirms that no new uploads are coming through. Whats causing the trouble is unknown at the moment.

Recent torrents

Several trusted VIP uploaders have mentioned the problem in the TPB forums. They reportedly see an Error File empty notice on their end, no matter what they try.

These upload issues are not completely new, but its been a while since problems have lasted this long.

TPB moderator workerbee points people to the status page and confirms that the situation is the same for all.

Everyone is experiencing the same problem. The situation will be sorted out in due course, the mod notes.

Seasoned uploaders have weathered quite a few stormy periods on the site, so they might not be bothered too much. However, some are losing patience and are growing more pessimistic by the day.

Been down since Sat.. for uploads, VIP uploader psspss2 writes. TPB sinking ship too many holes.

Source: TF, for the latest info on copyright, file-sharing, torrent sites and more. We also have VPN reviews, discounts, offers and coupons.



Rex Mundi hacking extortion gang busted by Europol Graham Cluley

Rex Mundi

Theres so much bad news about computer security that we sometimes forget to applaud when something good happens.

Lets change that right now.


16 arrested for hacking Internet cafes to mine cryptocurrency HackRead

By Waqas

The group of hackers mined Siacoin cryptocurrency from hacked computer

This is a post from Read the original post: 16 arrested for hacking Internet cafes to mine cryptocurrency


NVIDIA Releases DALI Library & nvJPEG GPU-Accelerated Library For JPEG Decode Phoronix

For coinciding with the start of the Computer Vision and Patern Recognition conference starting this week in Utah, NVIDIA has a slew of new software announcements...


Links 19/6/2018: Total War: WARHAMMER II Confirmed for GNU/Linux, DragonFlyBSD 5.2.2 Released Techrights

GNOME bluefish




Deprecating TLS 1.0 and TLS 1.1 kill them now! Security Affairs

The Internet-Draft document if approved formally deprecates Transport Layer Security versions 1.0 (TLS 1.0) [RFC2246] and 1.1 (TLS 1.1) [RFC4346].

It was a long journey, the IETF has been analyzing proposals for TLS 1.3 since April 2014, the final release is the result of the work on 28 drafts.

The TLS protocol was designed to allow client/server applications to communicate over the Internet in a secure way preventing message forgery, eavesdropping, and tampering.

Some experts argue the best way to make the Internet more secure is to ban application fallback to both TLS 1.0 and 1.1 standards.

The PCI Councils deprecation deadline of June 30, 2018, is upon us and the Internet-Draft urges the deprecation of insecure protocols.

The support for TLSv1.0 has been removed or will be by July 2018 from several standards, products, and services, including 3GPP 5G, CloudFare, Amazon Elastic Load Balancing, o GitHub.

The Draft also highlights that supporting older versions also requires additional effort for library and product maintenance.

This document [if approved] formally deprecates Transport Layer Security (TLS) versions 1.0 [RFC2246] and 1.1 [RFC4346] and moves these documents to the historic state. These versions lack support for current and recommended cipher suites, and various government and industry profiiles of applications using TLS now mandate avoiding these old TLS versions. reads the Draft.



Qt 5.11.1 Released With 150+ Bug Fixes Phoronix

Qt 5.11 was released just under one month ago while debuting today is the first point release with over 150 bug fixes...


U.S. Supreme Court to Hear Apple App Store Antitrust Case SoylentNews

U.S. top court mulls Apple's App Store commissions in antitrust case

The U.S. Supreme Court on Monday agreed to take up Apple Inc's bid to escape a lawsuit accusing it of breaking federal antitrust laws by monopolizing the market for iPhone software applications and causing consumers to pay more than they should.

The justices said they would hear Apple's appeal of a lower court's ruling that revived the proposed class-action lawsuit by iPhone buyers over commissions that the Cupertino, California-based technology company receives through its App Store.

The case could expand the threat of antitrust damages against companies in the rapidly growing field of electronic commerce, which generates hundreds of billions of dollars annually in U.S. retail sales.

President Donald Trump's administration backed Apple and urged the justices to take the case.

Also at The Hill and The Register.

Original Submission

Read more of this story at SoylentNews.


Early detection of compromised credentials can greatly reduce impact of attacks Help Net Security

According to Bluelivs credential detection data, since the start of 2018 there has been a 39% increase in the number of compromised credentials detected from Europe and Russia, compared to the same period in 2017 (January-May). In fact, Europe and Russia are now home to half of the worlds credential theft victims (49%). In this podcast, Patryk Pilat, Head of Engineering and Cyberthreat Intelligence at Blueliv, talks about the report, and illustrates how these startling More

The post Early detection of compromised credentials can greatly reduce impact of attacks appeared first on Help Net Security.


Tesla saboteur caused extensive damage and leaked highly sensitive data, claims Elon Musk Graham Cluley

Tesla CEO Elon Musk believes that the company is the victim of deliberate sabotage perpetrated by an employee.

Read more in my article on the Hot for Security blog.


Global IoT tech spending to reach $1.2 trillion in 2022 Help Net Security

IDC forecasts IoT spending will experience a compound annual growth rate (CAGR) of 13.6% over the 2017-2022 forecast period and reach $1.2 trillion in 2022. The forecast is based on the latest research in the burgeoning IoT technology market, which offers business investment opportunities across a spectrum of industries and illuminated through use case implementations. As the diverse IoT market reaches broad-based critical mass, innovative offerings in analytics software, cloud technologies, and business and IT More

The post Global IoT tech spending to reach $1.2 trillion in 2022 appeared first on Help Net Security.


An Arduino Powered Tank Built To Pull Planes Hackaday

Surely our readers are well aware of all the downsides of owning an airplane. Certainly the cost of fuel is a big one. Birds are a problem, probably. That bill from the traveling propeller sharpener is a killer tooright? Alright fine, we admit it, nobody here at Hackaday owns an airplane. But probably neither do most of you; so dont look so smug, pal.

But if you did own a plane, or at least work at a small airport, youd know that moving the things around on the ground is kind of a hassle. Smaller planes can be pulled by hand, but once they get up to a certain size youll want some kind of vehicle to help out. [Anthony DiPilato] wanted a way to move around a roughly 5,200 pound Cessna 310, and decided that all the commercial options were too expensive. So he built his own Arduino powered tank to muscle the airplane around the tarmac (if site is down try Google cache), and his journey from idea to finished product is absolutely fascinating to see.

So the idea here is pretty simple. A little metal cart equipped with two beefy motors, an Arduino Mega, a pair of motor controllers, and...


iOS 12 to Automatically Share Exact Location With Emergency Responders SoylentNews

This Apple Update Could Prove To Be A True Lifesaver

With about 80 percent of 911 calls made from mobile devices, it's sometimes difficult for emergency responders to pinpoint the location of those callers.

On Monday, Apple unveiled plans to work with 911 centers to automatically share the exact locations of iPhone users that need to call in an emergency.

Under a collaboration with startup company RapidSOS, Apple's current Hybridized Emergency Location system will integrate with 911 centers' existing software. Apple's system uses technology that estimates a phone's location with data from cell towers, GPS and Wi-Fi access points.

Privacy concerns have been at the center of this sort of location sharing in the past. However, Apple said that with the new feature, "user data cannot be used for any non-emergency purpose and only the responding 911 center will have access to the user's location during an emergency call."

Original Submission

Read more of this story at SoylentNews.


Fedora Atomic Workstation To Be Renamed Fedora Silverblue Phoronix

Back in early May was the announcement of the Silverblue project as an evolution of Fedora Atomic Workstation and trying to get this atomic OS into shape by Fedora 30. Beginning with Fedora 29, the plan is to officially rename Fedora Atomic Workstation to Fedora Silverblue...


Astronomers See Distant Eruption as Black Hole Destroys Star Lifeboat News: The Blog

For the first time, astronomers have directly imaged the formation and expansion of a fast-moving jet of material ejected when the powerful gravity of a supermassive black hole ripped apart a star that wandered too close to the massive monster.

The scientists tracked the event with radio and infrared telescopes, including the National Science Foundations Very Long Baseline Array (VLBA) and NASAs Spitzer Space Telescope, in a pair of colliding galaxies called Arp 299. The galaxies are nearly 150 million light-years from Earth. At the core of one of the galaxies, a black hole 20 million times more massive than the Sun shredded a star more than twice the Suns mass, setting off a chain of events that revealed important details of the violent encounter. The researchers also used observations of Arp 299 made by NASAs Hubble space telescope prior to and after the appearance of the eruption.

Only a small number of such stellar deaths, called tidal disruption events, or TDEs, have been detected. Theorists have suggested that material pulled from the doomed star forms a rotating disk around the black hole, emitting intense X-rays and visible light, and also launches jets of material outward from the poles of the disk at nearly the speed of light.


Intel Broxton To Support GVT-g With Linux 4.19 Phoronix

Intel developers working on the GVT-g graphics virtualization technology have published their latest batch of Linux kernel driver changes...


Red Hat Changes Its Open-Source Licensing Rules

Red Hat-initiated open-source projects, which use GPLv2 or LGPLv2.1, will be expected to add GPLv3's cure commitment language to their licenses.

From outside programming circles, software licensing may not seem important. In open-source, though, licensing is all important.


SysVinit 2.90 Released With Fixes & Better Support For Newer Compilers Phoronix

It's been a while since last having anything to report on the SysVinit init system for those wishing to live in a systemd-free world, but a new release is now available...


How to Build a Strong DevSecOps Culture: 5 Tips

We have a tendency in IT to treat security as fundamentally a technology problem. Hence, we also tend to focus on technology solutions.

Tools and processes do matter: But if youll recall our recent look at the seven habits of strong security organizations, the top of the list had nothing explicitly to do with technology: These companies treat security as a culture, not a step.


People With Religious Affiliations Live Longer SoylentNews

Arthur T Knackerbracket has found the following story:

[...] A new nationwide study of obituaries has found that people with religious affiliations lived nearly four years longer than those with no ties to religion.

That four-year boost -- found in an analysis of more than 1,000 obits from around the country -- was calculated after taking into account the sex and marital status of those who died, two factors that have strong effects on lifespan.

[...] "We found that volunteerism and involvement in social organizations only accounted for a little less than one year of the longevity boost that religious affiliation provided," Wallace said. "There's still a lot of the benefit of religious affiliation that this can't explain."

So what else explains how religion helps people live longer? It may be related to the rules and norms of many religions that restrict unhealthy practices such as alcohol and drug use and having sex with many partners, Way said.

In addition, "many religions promote stress-reducing practices that may improve health, such as gratitude, prayer or meditation," he said.

[...] Way said there are limitations to the study, including the fact that it could not control for important factors related to longevity such as race and health behaviors. But a potential strength was that, unlike other studies, religious affiliation was not self-reported, but was reported by the obituary writer.

-- submitted from IRC

Original Submission

Read more of this story at SoylentNews.


Marc Benioff of Salesforce: Are We Not All Connected? Lifeboat News: The Blog

So what is Salesforce doing about it?

A billionaire tech mogul with a spiritual side, Mr. Benioff riffs on his early days at Apple and Oracle, and whats wrong with Facebook.


TRON Cryptocurrency Founder Buys BitTorrent, Torrent for $140 Million The Hacker News

BitTorrent, the company which owns the popular file-sharing client uTorrent, has quietly been sold for $140 million in cash to Justin Sun, the founder of blockchain-focused startup TRON. TRON is a decentralized entertainment and content-sharing platform that uses blockchain and distributed storage technology. It allows users to publish content without having to use third-party platforms such


Re: cantata: cantata-mounter D-Bus service local privilege escalation and other security issues Open Source Security

Posted by Matthias Gerstner on Jun 19

This was assigned CVE-2018-12559.

This was assigned CVE-2018-12560.

This was assigned CVE-2018-12561.

This was assigned CVE-2018-12562.


Evaluate a Product/Market Fit

How to identify when a fit has been achieved, and how to exit the explore stage and start exploiting a product with its identified market.

We live in a world of data overload, where any argument can find supporting data if we are not careful to validate our assumptions. Finding information to support a theory is never a problem, but testing the theory and then taking the correct action is still hard.


Security and Performance Help Mainframes Stand the Test of Time

As of last year, the Linux operating system was running 90 percent of public cloud workloads; has 62 percent of the embedded market share and runs all of the supercomputers in the TOP500 list, according to The Linux Foundation Open Mainframe Projects 2018 State of the Open Mainframe Survey report.


HeroRAT A totally new Telegram-based Android RAT is spreading in the wild Security Affairs

Malware researchers from ESET have discovered a new strain of Android RAT, tracked as HeroRat, that leverages Telegram protocol for command and control, and data exfiltration.

HeroRat isnt the first malware abusing Telegram protocol, past investigation reported similar threats like TeleRAT and IRRAT.

The new RAT has been in the wild at least since August 2017 and in March 2018 its source code was released for free on Telegram hacking channels allowing various threat actors to create their own variant.

HeroRat is born in this way, but it appears quite different from other variants that borrowed the source code. HeroRat is the first Telegram-based malware developed from scratch in C# using the Xamarin framework, previous ones were written in Java.

The RAT leverages Telesharp library for creating Telegram bots with C#.

One of these variants is different from the rest despite the freely available source code, it is offered for sale on a dedicated Telegram channel, marketed under the name HeroRat. reads the analysis published by ESET. 

It is available in three pricing models according to functionality, and comes with a support video channel. It is unclear whether this variant was created from the leaked source code, or if it is the original whose source code was leaked.

The malware is spread through different channels, it is spread third-party app stores through disguised as social media and messaging apps.

Researchers observed the largest number of infection in Iran where malicious apps are offered promising free bitcoins, free internet connections, and additional followers on social media.

The apps analyzed by ESET shows a strange behavior, after the malware is installed and launched on the victims device, it displays a sm...


Ex-CIA employee charged with leaking 'Vault 7' hacking tools to Wikileaks The Hacker News

A 29-year-old former CIA computer programmer who was charged with possession of child pornography last year has now been charged with masterminding the largest leak of classified information in the agency's history. Joshua Adam Schulte, who once created malware for both the CIA and NSA to break into adversaries computers, was indicted Monday by the Department of Justice on 13 charges of


Tables are Turned as Robots Assemble IKEA Furniture Hackaday

Hackaday pages are rife with examples of robots being built with furniture parts. In this example, the tables are turned and robots are the masters of IKEA pieces. We are not silly enough to assume that these robots unfolded the instructions, looked at one another, scratched their CPUs, and began assembling. Of course, the procedure was preordained by the programmers, but the way they mate the pegs into the ends of the cross-members is a very human thing to do. It reminds us of finding a phone charging socket in the dark. This kind of behavior is due to force feedback which tell the robots when a piece is properly seated which means that they can use vision to fit the components together without sub-millimeter precision.

All the hardware used to make the IKEA assembler is publicly available, and while it may be out of the typical hacker price range, this is a sign of the times as robots become part of the household. Currently, the household robots are washing machines, smart speakers, and 3D printers. Ten years ago those werent Internet connected machines so it should be no surprise if robotic arms join the club of household robots soon. Your next robotics project could be the tipping point that brings a new class of robots to the home.

Back to our usual hijinks, here is a robot arm from IKEA parts and a projector built into a similar lamp. or a 3D printer enclosed in an IKEA cabinet for a classy home robot.

Thank you, [Itay] for another great tip.

Potential New Treatment for Drug Addiction Relapse Revealed SoylentNews

Research published in Addiction Biology by scientists at the University of Bath reveals a new potential mechanism for combatting drug addiction relapse.

Relapsing into drug taking is a big problem in treating addiction, where the majority of addicts return to drug-taking within 12 months of quitting. This is brought into focus by the burgeoning 'opioid epidemic' of prescription as well as recreational opioid drugs, such as morphine and heroin. Addiction relapse is associated with drug-related cues such as places, drug paraphernalia, the drug itself, or stress, highlighting that memories play a key role in addiction relapse.

In this study researchers at Bath, working with colleagues from the University of Surrey and RenaSci, used an animal model to study relapse to morphine seeking behaviour. Rats or mice learned to associate particular environmental cues with morphine. After removal of the drugs, relapse back to drug-seeking behaviour occurred in response to getting the cues again.

Original Submission

Read more of this story at SoylentNews.


BitTorrent Is Reportedly Selling for $140 Million (Update) TorrentFreak

Last month, TF broke the news that Justin Sun, the entrepreneur behind the popular cryptocurrency TRON, was in the process of acquiring BitTorrent Inc.

The San-Francisco based file-sharing company confirmed the interest from Sun and last week sources added that details of the sale had been finalized.

One of the questions that remained unanswered is how much the company is worth. This gap has now been filled by TechCrunch, which reports that TRONs founder agreed to pay $140 million to acquire the company.

According to the report, there are still some outstanding issues regarding the terms of the deal. More than one person claims to have introduced Sun to BitTorrent, which guarantees an extra payout. This has yet to be resolved.

It is unclear what Suns plans are for BitTorrent but the existing products, including uTorrent, are not expected to go away. According to a shareholder quoted by TechCrunch, one of the plans is to use the acquisition to legitimize TRONs business, which currently has a controversial reputation.

This is an interesting goal, as BitTorrent itself has also dealt with some controversy of its own. The company was previously asked to do more to combat piracy and a few weeks ago, New Mexico Attorney General Hector Balderas launched an investigation into the links between uTorrent usage and images of child exploitation.

While the final details are worked out, BitTorrent or Rainberry as its called now has begun hiring new personnel. The company is currently looking for a recruiter to hire new talent as well as several developers, including a senior iOS Engineer.

BitTorrent is currently working on a new iOS app which will allow users to play videos on their mobile devices. When completed, it will be released on Apples App Store.

The $140 million acquisition follows a turbulent time for BitTorrent during which the company was nearly destroyed due to questionable management practices. At the same time, none of the new products, services, and business models it...


This New Chip Design Could Make Neural Nets More Efficient and a Lot Faster Lifeboat News: The Blog

Neural networks running on GPUs have achieved some amazing advances in artificial intelligence, but the two are accidental bedfellows. IBM researchers hope a new chip design tailored specifically to run neural nets could provide a faster and more efficient alternative.

It wasnt until the turn of this decade that researchers realized GPUs (graphics processing units) designed for video games could be used as hardware accelerators to run much bigger neural networks than previously possible.

That was thanks to these chips ability to carry out lots of computations in parallel rather than having to work through them sequentially like a traditional CPU. Thats particularly useful for simultaneously calculating the weights of the hundreds of neurons that make up todays deep learning networks.


Best evidence of rare black hole captured Lifeboat News: The Blog

Scientists have been able to prove the existence of small black holes and those that are super-massive but the existence of an elusive type of black hole, known as intermediate-mass black holes (IMBHs) is hotly debated. New research coming out of the Space Science Center at the University of New Hampshire shows the strongest evidence to date that this middle-of-the-road black hole exists, by serendipitously capturing one in action devouring an encountering star.


Daily fasting works for weight loss, finds report on 16:8 diet Lifeboat News: The Blog

Daily fasting is an effective tool to reduce weight and lower blood pressure, according to a new study published by University of Illinois at Chicago researchers in the journal Nutrition and Healthy Aging.


Sit anywhere with this wearable chair Lifeboat News: The Blog

Sit anywhere, at any time, with this wearable chair .


This personal helicopter from the 1950s Lifeboat News: The Blog

This personal helicopter was way ahead of its time.


LSD and magic mushrooms could heal damaged brain cells in people suffering from depression, study shows Terra Forming Terra

As we suspected, there is a biological basis for the apparent brain healing phenomena shown by LSD and for CBDs as well.  This is really good news and the promise is that extended research should establish safe protocols that will allow us to control depression and other mental health issues.

Ten years ago, no one was seriously pressing this insight home.  That has now all changed and it appears we are having a full press investigation into all these drugs.

The promise is excellent and may well serve to extensively and perhaps progressively relieve all symptoms.
LSD and magic mushrooms could heal damaged brain cells in people suffering from depression, study shows

Psychedelic drugs like LSD and ecstasy ingredient MDMA have been shown to stimulate the growth of new branches and connections between brain cells which could help address conditions like depression and addiction.

Researchers in California have demonstrated these substances, banned as illicit drugs in many countries, are capable of rewiring parts of the brain in a way that lasts well beyond the drugs' effects.

This means psychedelics could be the "next generation" of treatments for mental health disorders which could be more effective and safer than existing options, the study's authors from the University of California.

Now they h...


Pesticides making America STUPID Terra Forming Terra


This is really bad news simply because it is statistically significant and you do not understand what that really means to a huge population.

One thing that it does mean is that if you are potentially one in a million, that whole cohort disappears in the population.  It also means a large mass in the center of the distribution drop enough to create real learning difficulties.

We want the shift to be upward, not downward.

Pesticides making America STUPID: Agricultural chemicals found to lower the IQ of children

Sunday, June 10, 2018 by: Isabelle Z.
Tags: agricultural chemicals, badfood, badhealth, badmedicine, badpollution, brain function, brain health, children's IQ, Chlorpyrifos, cognitive function, insecticide, IQ, organophosphates, pesticides, pregnancy




Google Algorithm Predicts When Patients Will Die SoylentNews

Google is training machines to predict when a patient will die

A woman with late-stage breast cancer went to a hospital, fluids flooding her lungs. She saw two doctors and got a radiology scan. The hospital's computers read her vital signs and estimated a 9.3% chance she would die during her stay.

Then came Google's turn. An new type of algorithm created by the company read up on the woman 175,639 data points and rendered its assessment of her death risk: 19.9%. She died in a matter of days.

The harrowing account of the unidentified woman's death was published by Google in May in research highlighting the healthcare potential of neural networks, a form of artificial intelligence software that is particularly good at using data to automatically learn and improve. Google had created a tool that could forecast a host of patient outcomes, including how long people may stay in hospitals, their odds of readmission and chances they will soon die.

What impressed medical experts most was Google's ability to sift through data previously out of reach: notes buried in PDFs or scribbled on old charts. The neural net gobbled up all this unruly information then spat out predictions. And it did so far faster and more accurately than existing techniques. Google's system even showed which records led it to conclusions.

Scalable and accurate deep learning with electronic health records (open, DOI: 10.1038/s41746-018-0029-1) (DX)

Original Submission

Read more of this story at SoylentNews.


Dont install Fortnite Android APK because it could infect your mobile device Security Affairs

Fortnite is currently the most popular game, crooks are attempting to exploit the interest in forthcoming Fortnite Android to infect millions of fans.

No doubt, Fortnite is currently the most popular game, it is a co-op sandbox survival game developed by Epic Games and People Can Fly.

The game was released as a paid-for early access title for Microsoft Windows, macOS, PlayStation 4 and Xbox One on July 25, 2017, with a full free-to-play releases in 2018.

The Fortnite game has now more than 125 million active users.

The great success obtained by the Fortnite attracted cyber criminals that are attempting to exploit its popularity to target the fans.

Fortnite Android 2

The company announced that the Battle Royale game is planned to be released for Android devices this summer.

Surfing online it is quite easy to find blog posts and video tutorial with instructions to install fake Fortnite Android App.

I spent an entire week to explain to my son and his friends the risks of installing APK from untrusted sources, believe me it was the unique real battle royal of this story

Just searching for Fortnite Android App on YouTube you will get an impressive number of videos on How to install Fortnite on Android, many of these videos were viewed millions of times also include links to actual Fortnite APK files.



Hybrid Lab Power Supply From Broken Audio Amp Hackaday

The lab power supply is an essential part of any respectable electronics workbench. However, the cost of buying a unit that has all the features required can be eye-wateringly high for such a seemingly simple device. [The Post Apocalyptic Inventor] has showed us how to build a quality bench power supply from the guts of an old audio amplifier.

Weve covered our fair share of DIY power supplies here at Hackaday, and despite this one being a year old, it goes the extra mile for a number of reasons. Firstly, many of the expensive and key components are salvaged from a faulty audio amp: the transformer, large heatsink and chassis, as well as miscellaneous capacitors, pots, power resistors and relays. Secondly, this power supply is a hybrid. As well as two outputs from off-the-shelf buck and boost converters, there is also a linear supply. The efficiency of the switching supplies is great for general purpose work, but having a low-ripple linear output on tap for testing RF and audio projects is really handy.

The addition of the linear regulator is covered in a second video, and its impressively technically comprehensive. [TPAI] does a great job of explaining the function of all the parts which comprise his linear supply, and builds it up manually from discrete components. To monitor the voltage and current on the front panel, two vintage dial vol...


American Toddlers Are Eating More Sugar Than the Amount Recommended for Adults SoylentNews

Weve long known that processed sugar is bad for kids. And yet new data presented this week (June 10) at the American Society for Nutritions annual meeting show that American infants are consuming excessive amounts of added sugar in their diets, much more than the amounts currently recommended by the American Heart Association (AHA) and other medical organizations.

The study, conducted by researchers at the Centers for Disease Control and Prevention, looked at added sugar consumptionsugars in your diet that are not naturally occurring, like those found in fruit and milk, but rather added into foods during preparation or processing. Researchers used data collected from a nationally representative sample of more than 800 kids between six and 23 months old who participated in the 2011 to 2014 National Health and Nutrition Examination Survey. Parents were asked to record every item their child ate or drank during a 24-hour period, and the researchers calculated a mean sugar intake based on these testimonies.

The study found that toddlers 12 to 18 months consumed 5.5 teaspoons per day, and that toddlers 19 to 23 months consumed 7.1 teaspoons. This is close to, or more than, the amount of sugar recommended by AHA for adult women (six teaspoons) and men (nine teaspoons). Parents of more than 80% of kids aged six to 23 months reported their children consumed at least some added sugar on a given day.

Original Submission

Read more of this story at SoylentNews.


LFD440 27August2018 ENEA

Learn the methods and internal infrastructure of the Linux kernel, focussing on the important tools used for debugging and monitoring the kernel, and how security features are implemented and controlled.

LFD440 17December2018 ENEA

Learn the methods and internal infrastructure of the Linux kernel, focussing on the important tools used for debugging and monitoring the kernel, and how security features are implemented and controlled.

LFD430 26November2018 ENEA

Learn how to write Linux device drivers, about the specifics of different types of devices and drivers, and learn the appropriate APIs and methods through which devices interface with the kernel.

LFD460 15October2018 ENEA

Obtain a solid understanding of embedded development using the Yocto Project, including the Poky Reference Distribution and Bitbake, the use of emulators, building images for multiple architectures and the creation of board support packages (BSP).

LFD420 5November2018 ENEA

Learn the basic methods and internal infrastructure of the Linux kernel, grasping both the theoretical and practical underpinnings.

LFD450 17Setember2018 ENEA

Get advanced Linux training on the key steps to developing an embedded Linux product. Gain real world experience through extensive hands-on practice with target devices.


Ancient Agricultural Activity Caused Lasting Environmental Changes SoylentNews

Agricultural activity by humans more than 2,000 years ago had a more significant and lasting impact on the environment than previously thought. The finding -- discovered by a team of international researchers led by the University of British Columbia -- is reported in a new study published today in the journal Science Advances.

The researchers found that an increase in deforestation and agricultural activity during the Bronze Age in Ireland reached a tipping point that affected Earth's nitrogen cycle -- the process that keeps nitrogen, a critical element necessary for life, circulating between the atmosphere, land and oceans.

"Scientists are increasingly recognizing that humans have always impacted their ecosystems, but finding early evidence of significant and lasting changes is rare," said Eric Guiry, the study's lead author and a postdoctoral research fellow in UBC's department of anthropology. "By looking at when and how ancient societies began to change soil nutrients at a molecular level, we now have a deeper understanding of the turning point at which humans first began to cause environmental change."

Original Submission

Read more of this story at SoylentNews.


Climate Change Is Making Plants Behave Like Costco Shoppers - Facts So Romantic Nautilus

Not having to endure costs radically changes behavior, in humans and in plants.Photograph by Thomas Hawk / Flickr

Plants have their own form of money: carbon dioxide. For decades, our fossil fuel industry has been artificially inflating their currency. What happens to plants during inflationwhen CO2 levels in the atmosphere rise?

The same thing that happens if you drop money from the sky over Times Square, leaving everyone there with $1,000 in their pockets, says Hope Jahren, a geochemist and geobiologist at the University of Oslo, and author of Lab Girl, a personal memoir of her life in science.* Some people would save it; some people would run out and buy clothes; some people would gamble it away within 5 minutes, she told Nautilus editor in chief Michael Segal. Plants face similar choices. Some build a bunch of new leaves; some make a bunch more flowers; some shunt it into their roots; some stop making defense compounds. I call that the Costco effect. If you go buy 100 rolls of toilet paper, youre going to use toilet paper at your house very differently than if youre buying it roll by roll. So plants, if its that easy to make a
Read More


Tesla Model 3: Musk Claims Extensive and Damaging Sabotage by Employee

Via: CNBC: Tesla CEO Elon Musk sent an email to all employees on Monday morning about a factory fire, and seemed to reference possible sabotage. Now, CNBC has learned that Musk also sent an e-mail to all employees at Tesla late on Sunday night alleging that he has discovered a saboteur in the companys ranks. []


The Colpitts Oscillator Explained Hackaday

The Colpitts oscillator is a time-tested design from 1918. [The Offset Volt] has a few videos covering the design of these circuits including an op-amp and a transistor version. You can find the videos below.

You can tell a Colpitts oscillator by the two capacitors in the feedback circuit. The capacitors form an effective capacitance for the circuit (assuming you have C1 and C2) of the product of C1 and C2 divided by the sum of the two capacitors. The effective capacitance and the inductance form a bandpass filter that is very sharp at the frequency of interest, allowing the amplifier to build up oscillations at that frequency.

It is unusual to show an op-amp oscillator, and it is interesting to think about the design changes and limitations discussed in the video. The video isnt just theoretical. He also builds the circuit and looks at the real world performance.

It is also interesting to look at the difference between the op amp and the bipolar circuit. Of course, you can use other active devices like a FET, too. This is also an important circuit when a crystal is part of the feedback circuit instead of an inductor.

We see a lot of these as low-power ham radio transmitters. If you want to see a different oscillator design, we talked about Pierce oscillators before.


President Trump Orders the Creation of a United States Space Force SoylentNews

Trump orders creation of space-focused U.S. military branch

U.S. President Donald Trump on Monday said he was ordering the creation of a sixth branch of the military to focus on space, a move critics said could harm the Air Force.

"It is not enough to merely have an American presence in space. We must have American dominance in space," Trump said before a meeting of his National Space Council. "We are going to have the Air Force and we're going to have the 'Space Force.' Separate but equal. It is going to be something," he said later.

The United States is a member of the 1967 Outer Space Treaty, which bars the stationing of weapons of mass destruction in space and only allows for the use of the moon and other celestial bodies for peaceful purposes.

The idea of a Space Force has been raised before, by Trump and previous administrations, with proponents saying it would make the Pentagon more efficient. It has also faced criticism from senior military officials. Air Force Chief of Staff General David Goldfein told a 2017 congressional hearing that creating a new space branch would "move us in the wrong direction." The Air Force oversees most of the nation's space-related military activity.

The move would require the budgetary approval of the U.S. Congress, which has been divided on the idea.

President Trump orders the creation of new Starship Troopers/Space Marines memes.

We should have a separate "Space" topic on SoylentNews at this point. We are all going to be drafted to fight aliens eventually.

Also at BBC (#winning image).

Previously: The United States Space Corps Wants You...
Congressional Panel Puts Plans for a US Space Corps in 2018 Defense Budget
The Case for a U.S. Space Force

Original Submission

Read more of this story at SoylentNews.


HPR2577: Emigration Hacker Public Radio

Confused about leaving your homeland for &#60;strike&#62;greener&#60;&#47;strike&#62; pastures? Maybe this episode will shed some light on the subject. Public domain music from Can you find your national anthem? Do you know all the words to your national anthem? Either way, you should be ashamed of yourself.


AMD Offers Threadripper Trade-in for Winners of Intel Core i7-8086K Sweepstakes SoylentNews

AMD Trolls Intel: Offers 16-Core Chip to Winners of Six-Core 8086K

AMD's feud with Intel took an interesting turn today as the company announced that it would swap 40 Core i7-8086K's won from Intel's sweepstakes with a much beefier Threadripper 1950X CPU.

At Computex 2018, Intel officially announced it was releasing the Core i7-8086K, a special edition processor that commemorates the 40th anniversary of the 8086, which debuted as the first x86 processor on June 8, 1978. As part of the special-edition release, Intel opened up a sweepstakes to give away 8,086 of the six-core 12-thread processors. Intel also made the processors available at retail, and though the company doesn't have an official MSRP, you can find the chips at several retailers for ~$425.

Now AMD is offering to replace 40 of the winners' chips with its own 16-core 32-thread $799 Threadripper processors, thus throwing a marketing wrench into Intel's 40th-anniversary celebration.

See also: The Intel Core i7-8086K Review

Original Submission

Read more of this story at SoylentNews.


Hillicon Valley: Supreme Court takes up Apple case | Senate votes to block ZTE deal | Officials testify on Clinton probe report | Russia's threat to undersea cables | Trump tells Pentagon to create 'space force' | FCC begins T-Mobile, Sprint deal review The Hill: Technology Policy

The Cyber and Tech overnights have joined forces to give you Hillicon Valley, The Hill's new comprehensive newsletter detailing all you need to know about the tech and cyber news from Capitol Hill to Silicon Valley.Welcome! Follow the cyber team,...


RadeonSI Lands OpenGL 3.3 Compatibility Profile Support Phoronix

Thanks to work done over the past few months by AMD's Marek Olk on improving Mesa's OpenGL compatibility profile support and then today carried over the final mile by Valve's Timothy Arceri, Mesa 18.2 now exposes OpenGL 3.3 under the compatibility context...


[$] TCP small queues and WiFi aggregation a war story

This article describes our findings that connected TCP small queues (TSQ) with the behavior of advanced WiFi protocols and, in the process, solved a throughput regression. The resulting patch is already in the mainline tree, so before continuing, please make sure your kernel is updated. Beyond the fix, it is delightful to travel through history to see how we discovered the problem, how it was tackled, and how it was patched.

Subscribers can read on for the full story by guest authors Carlo Grazia and Natale Patriciello.


Google can use AI to predict when youll die Lifeboat News: The Blog

It works by matching up personal data with hospital records.



Inside the controversial new surgery to transplant human wombs Lifeboat News: The Blog

Pioneering surgeons have made it possible to transplant a human uterus that can bear children, offering hope to millions of women who never thought they could give birth.


A Neuroscientist Explains What Happens to Your Brain When You Dont Sleep Lifeboat News: The Blog

Sleep deprivation affects nearly all parts of your brain, but it is most detrimental to simple cognitive functions that we take for granted, such as memory and staying alert.

Ph.D. neuroscience candidate Shannon Odell says scientific research suggests that sleep deprivation majorly reduces cognitive performance. Studies have shown that patients have significantly reduced their thinking ability after just one night of sleep deprivation, specifically in the hippocampus, also known as the memory center.

Watch Your Brain on Blank on Facebook for more mind-expanding brain truths.


Colony ship to nearest star only needs crew of 100 to survive Lifeboat News: The Blog

A mission to Proxima Centauri b, the closest Earth-like exoplanet, would take over six thousand years but you only need a small crew to get started.


Microsoft briefly removes blog post mentioning ICE contract after backlash The Hill: Technology Policy

Microsoft on Monday briefly removed a post referencing its contract with U.S. Immigration and Customs Enforcement (ICE) following backlash over its work with the government agency.The post from January explains that Microsofts Azure cloud...


Trump Orders Creation of Space-Focused U.S. Military Branch

Oh sure, itll make the Pentagon more efficient: At incinerating trillions of taxpayer dollars. Also, theres Carol Rosins account of her time with Wernher Von Braun, which might finally be coming into play: The strategy that Wernher Von Braun taught me was that first the Russians are going to be considered to be the enemy. []


Researchers capture best ever evidence of rare black hole Lifeboat News: The Blog

ESAs XMM-Newton observatory has discovered the best-ever candidate for a very rare and elusive type of cosmic phenomenon: a medium-weight black hole in the process of tearing apart and feasting on a nearby star.

There are various types of black hole lurking throughout the Universe: massive stars create stellar-mass black holes when they die, while galaxies host supermassive black holes at their centres, with masses equivalent to millions or billions of Suns.

Lying between these extremes is a more retiring member of the black hole family: intermediate-mass black holes. Thought to be seeds that will eventually grow to become supermassive, these black holes are especially elusive, and thus very few robust candidates have ever been found.


Raytheons Analog Read-Only Memory is Tube-Based Hackaday

There are many ways of storing data in a computers memory, and not all of them allow the computer to write to it. For older equipment, this was often a physical limitation to the hardware itself. Its easier and cheaper for some memory to be read-only, but if you go back really far you reach a time before even ROMs were widespread. One fascinating memory scheme is this example using a vacuum tube that stores the characters needed for a display.

[eric] over at TubeTime recently came across a Raytheon monoscope from days of yore and started figuring out how it works. The device is essentially a character display in an oscilloscope-like CRT package, but the way that it displays the characters is an interesting walk through history. The monoscope has two circuits, one which selects the character and the other determines the position on the screen. Each circuit is fed a delightfully analog sine wave, which allows the device to create essentially a scanning pattern on the screen for refreshing the display.

[eric] goes into a lot of detail on how this c.1967 device works, and its interesting to see how engineers were able to get working memory with their relatively limited toolset. One of the nice things about working in the analog world, though, is that its relatively easy to figure out how things work and start using them for all kinds of other purposes, like old analog UHF TV tuners.


Senate votes to block Trump's ZTE deal The Hill: Technology Policy

The Senate moved to block President Trump's deal to save Chinese telecommunications giant ZTE despite pushback from the White House. Senators passed an annual defense policy bill on Monday that included a provision keeping in place&...


[SECURITY] [CVE-2018-8030] Apache Qpid Broker-J Denial of Service Vulnerability when AMQP 0-8...0-91 messages exceed maximum size limit Open Source Security

Posted by Alex Rudyy on Jun 18

CVE-2018-8030: Apache Qpid Broker-J Denial of Service Vulnerability
when AMQP 0-8...0-91 messages exceed maximum size limit

Severity: Important

Vendor: The Apache Software Foundation

Versions Affected: Versions 7.0.0-7.0.4


A Denial of Service vulnerability [1] was found in Apache Qpid Broker-J
versions 7.0.0-7.0.4 when AMQP protocols 0-8, 0-9 or 0-91 are used to
publish messages with size greater than allowed maximum message...


Meet The Universes First-Ever Supermassive Binary Black Holes Lifeboat News: The Blog

If you thought LIGOs recent discoveries were profound and unusual, wait until you meet OJ 287.


The Shift From 4G to 5G Will Change Just About Everything Lifeboat News: The Blog

Telecom experts are going so far as to herald the arrival of 5G as the advent of the fourth industrial revolution. There are an ever-expanding number of high-tech devices out there trying to connect to the internet every day, many of which require extensive bandwidth, and companies across the board will leverage 5G capabilities to better reach consumers.

The application of 5G technology will result in massive changes for both consumers and enterprises, said Jeff Weisbein, founder and CEO of digital media company Best Techie. 5G networks will offer consumers incredible broadband speeds at home (up to 20Gb/s). It will also enable companies to make advancements such as even smarter, better connected cars, advancements in medical technologies and improved retail experiences through personalization.

5G refers to 5th-Generation Wireless Systems and uses additional spectrum in the existing LTE frequency range to build on the capabilities of 4G, which is often used interchangeably with 4G LTE by marketers. LTE denotes Long Term Evolution, and is a term that was deployed with early 4G networks that presented a substantial improvement on 3G, but did not fully qualify as 4G, meaning 4G LTE is essentially first-generation 4G.


Google Removes Uber Integration From Google Maps SoylentNews

Uber booking has been removed from Google Maps for Android

Google Maps can no longer be used to book an Uber on Android. It brings the app in line with the iOS version, which lost the feature last summer, as noted by Android Police.

Google has had the ability to show price estimates and pickup wait times for ride-sharing apps for a while. Back in January 2017, Uber alone gained the ability to actually book rides in the Google Maps app by pulling up your account window and hailing your ride without ever leaving the app.

[...] It's not entirely clear why Google is removing the feature. For what it's worth, Alphabet's venture capital business has made a large investment in Lyft.

Also at Ars Technica and 9to5Google.

Original Submission

Read more of this story at SoylentNews.


More Media Reports About Decline in Quality of European Patents (Granted by the EPO) Techrights

Free tour en ruine

Summary: What the media is saying about the letter from Grnecker, Hoffmann Eitle, Maiwald and Vossius & Partner whilst EPO communications shift attention to shallow puff pieces about how wonderful Benot Battistelli is

FOUND among the puff pieces from European Inventor Award (heres the latest example with a uniquely French flavour, Michelin) theres some EPO scandals coverage. Its not so easy to find however; the EPO wasted a lot of money on several external PR agencies, which are ghostwriting a bunch of nonsense to drown out actual, real news.

the EPO wasted a lot of money on several external PR agencies, which are ghostwriting a bunch of nonsense to drown out actual, real news.This morning in Google News the article EPO under pressure not to lower quality standards came up. Well, unlike EPO-bribed publications that look the other way while Europes system burns, this one has said:

In a letter send to the outgoing EPO president Benot Battistelli, four reowned law firms Grnecker, Hoffmann Eitle, Maiwald und Vossius&Partner critisise that the time for the examination of patents has been cut drastically on cost of quality. While the goal of establishing a higher productivity at the EPO through its Early Certainty Initiative in Examination was good, working routines, which incentivise a high throughput of patent searches and examinations have led to lower quality. When the aim is to terminate proceedings as quickly as possible within specific allowed times, the quality of the search and examination of applications must suffer, the patent attorneys write in their letter. The fees for search and examination, which are rather high when compared internationally, can only be justified by giving the examiners sufficient time for an indepth assessment...


HHVM 3.27 Released With More Mature HackC Compiler Front-End Phoronix

Just over one month after the release of HHVM 3.26 that introduced the new HackC compiler front-end for Hack and PHP languages, HHVM 3.27 is now available...


Digital Enterprises - How Product Analytics can be used to automate insights to create actionable intelligence IEEE Spectrum Recent Content full text

Learn about the role of product analytics in optimizing the utilization phase of an enterprises solution.

Trends in the Electronics Industry such as intelligent, connected devices are disrupting how enterprises develop products, bring them to market, and evolve them over time.  Successful digitization strategies require an integrated approach to this flow of ideation, realization and utilization. The transformation in the utilization phase is arguably the most dramatic, since it has been driving large increases in a solutions value and even new business models. Increasingly, the data explosion from Advanced Manufacturing (Industry 4.0) and smarter more connected devices is complicating efforts to gain visibility to product and supply chain performance. Data is disparate, out of context and often inaccessible. Yet, customers increasingly demand rapid resolution of issues and innovation driven by their own product experiences.

In this webinar, the first in our series: Digital Enterprises - Electronics and Semiconductor Industry, we will focus on the role of product analytics in optimizing the utilization phase of an enterprises solution.  Well focus in on the following challenges and show you how to:

  • Close the loop between product design and performance
  • Discover emerging product trends to prevent recalls
  • Eliminate time and costs required to repeatedly consolidate and search big data
  • Empower data-driven decision making across the organization
  • Improve customer experience

You may think youre doing this today, right? Well, our experience is that traditional analytics projects are failing to deliver on expectations while they consume excess time and budget. Please join us while we take a deeper dive into some of the new and fascinating areas and technological advances that are transforming the electronics industry.




Beware Team UPCs Biggest Two Lies About the Unitary Patent (UPC) Techrights

France stands to benefit, as usual

The three Frenchmen

Summary: Claims that a Unified Patent Court (UPC) will commence next year are nothing but a fantasy of the Liar in Chief, Benot Battistelli, who keeps telling lies to French media (some of which he passes EPO money to, just like he passes EPO money to his other employer)

THE EPO has not been saying much about the UPC. There was mere repetition of Battistellis lies in French media a month ago (e.g. about UPC timeline [1, 2]) and its all the same nonsense about UPC getting ready to commence. Team UPC has not said much, either. For weeks!

This whole pursuit of unitary patents has been one big lie on top of serious political corruption and continental-scale entryism by the patent microcosm.Earlier today, however, we saw this new article from Charles Russell Speechlys LLPs Mary Bagnall, who perpetuates popular (among Team UPCs greedy echo chamber) myths. Amid Brexit negotiations and a serious constitutional complaint (related to EPO scandals and Brexit) they pretend that nothing is amiss.

As we said several weeks ago, the main two lies which Team UPC keeps telling/spreading/copy-pasting about UPC these days are as follows: 1) UPC will definitely start in 2019. 2) the only question is, can the UK participate?

One is wishful thinking and the second is a loaded statement/question. This whole pursuit of unitary patents has been one big lie on top of serious political corruption and continental-scale entryism by the patent microcosm. Thankfully, German judges are seeing all that and we expect the UPC to languish in years to come. It remains to be seen when...


'Martyr of the A10': DNA Leads to France Arrests Over 1987 Murder SoylentNews

Submitted via IRC for Runaway1956

'Martyr of the A10': DNA leads to France arrests over 1987 murder

French police have arrested a couple 31 years after their daughter was found dead, in a cold case revived through DNA evidence. The mutilated body of the child, named by police as Inass, was found by a motorway in central France in 1987. The parents were traced after the DNA of their son, tested in an unrelated case, was matched with that of the girl, French media report.

[...] In 2008, her DNA was formally identified, and the related information registered in a national genetic prints database. However no identification was made at that stage. The case was reopened in 2012 when a call for witnesses was released with a picture of the dead girl's face and the caption: "Who is she?"

The apparent breakthrough in the case happened when a man was arrested over a violent incident in 2016. His DNA reportedly identified him as the victim's brother. Months of investigation then led police to the parents.

Related: DNA From Genealogy Site Led to Capture of Golden State Killer Suspect
GEDmatch: "What If It Was Called Police Genealogy?"
DNA Collected from Golden State Killer Suspect's Car, Leading to Arrest
Another Alleged Murderer Shaken Out of the Family Tree

Original Submission

Read more of this story at SoylentNews.


Diversity at the EPO Techrights

At the EPO, we already know that diversity of any kind can be great for an organisation. Our Office benefits from the dedication of staff that come from 35 countries. And we draw strength from our many different cultural backgrounds. Benot Battistelli, earlier this month.

French EPO

Summary: Two decades of EPO with 16-17 years under the control of French Presidents (and nowadays predominantly French management in general with Inventor Award held in France almost half the time) is diversity at the EPO


Hacking more than 400 Axis camera models by chaining 3 flaws Security Affairs

Researchers from cybersecurity firm VDOO have discovered several vulnerabilities affecting nearly 400 security cameras from Axis Communications.

Researchers from cybersecurity firm VDOO have conducted a study on IoT devices and discovered seven vulnerabilities in cameras manufactured by Axis Communications. According to the vendor, nearly 400 models are affected by the issue and Axis has released security patches for each flaw.

An attacker can remotely take over a camera by knowing its IP address, exploiting the flaws it is possible to access and freeze the video stream, control every function of the camera (e.g. motion detection, direction) and also to alter the software.

Experts warn that an attacker can compromise cameras to recruit them in a botnet that could be used to power a broad range of attacks, such a DDoS and cryptocurrency mining.

One of the vendors for which we found vulnerable devices was Axis Communications. Our team discovered a critical chain of vulnerabilities in Axis security cameras. The vulnerabilities allow an adversary that obtained the cameras IP address to remotely take over the cameras (via LAN or internet). In total, VDOO has responsibly disclosed seven vulnerabilities to Axis security team. reads the analysis published by VDOO.

Chaining three of the reported vulnerabilities together, allows an unauthenticated remote attacker that has access to the camera login page through the network (without any previous access to the camera or credentials to the camera) to fully control the affected camera.

The experts published Technical details for each issue and related proof-of-concept (PoC) code.

The researchers demonstrated that chaining three vulnerabilities it is possible to hack Axis cameras by sending specially crafted requests as root (CVE-2018-10662) and bypassing authentication (CVE-2018-10661), then injecting arbitrary shell commands (CVE-2018-10660).

Below the attack sequence demonstrated by the researchers:

  • Step 1: The attacker uses an authorization bypass vulnerability (CVE-2018-10661) to send unauthenticated HTTP requests that reach the .srv functionality (that handles .srv requests) inside /bin/ssid. Normally, this functionality should only be accessible to administrative users.
  • Step 2: The attacker then utilizes an interface that allows sending any dbus message to the devices bus, without restriction (CVE-2018-10662...


Zacinlo malware spams Windows 10 PCs with ads and takes screenshots HackRead

By Waqas

The IT security researchers at Bitdefender have discovered a sophisticated

This is a post from Read the original post: Zacinlo malware spams Windows 10 PCs with ads and takes screenshots


DragonFlyBSD 5.2.2 Released To Fix The Lazy State Save/Restore Bug Phoronix

DragonFlyBSD 5.2.2 is now available as the latest stable release to this popular BSD operating system...


Arduino Watchdog Sniffs Out Hot 3D Printers Hackaday

We know weve told you this already, but you should really keep a close eye on your 3D printer. The cheaper import machines are starting to display a worrying tendency to go up in flames, either due to cheap components or design flaws. The fact that it happens is, sadly, no longer up for debate. The best thing we can do now is figure out ways to mitigate the risk for all the printers that are already deployed in the field.

At the risk of making a generalization, most 3D printer fires seem to be due to overheating components. Not a huge surprise, of course, as parts of a 3D printer heat up to hundreds of degrees and must remain there for hours and hours on end. Accordingly, [Bin Sun] has created a very slick device that keeps a close eye on the printers temperature at various locations, and cuts power if anything goes out of acceptable range.

The device is powered by an Arduino Nano and uses a 1602 serial LCD and KY040 rotary encoder to provide the user interface. The user can set the shutdown temperature with the encoder knob, and the 162 character LCD will give a real-time display of current temperature and power status.

Once the user-defined tem...


SurveyMonkey confidentially registers for initial public stock offering The Hill: Technology Policy

SurveyMonkey on Monday said that it has confidentially filed for an initial public offering with the Securities and Exchange Commission via its parent company SVMK. The company said that it had not yet determined the number of shares nor the price...


French authorities dismantle Black Hand dark web market Help Net Security

The Black Hand forum, considered to be one of the most important illegal platforms of the dark web in France, has been dismantled by French law enforcement. According to information shared by Grald Darmanin, the French Minister of Public Action and Accounts, over 40 agents of the National Directorate of Intelligence and Customs Investigations (DNRED), customs handlers and technical experts were involved in coordinated raids in several French cities on June 12, 2018. The operation More

The post French authorities dismantle Black Hand dark web market appeared first on Help Net Security.



5 Best Android Emulators for Windows PC and Mac TechWorm

Android gained popularity after Google took over the nascent startup and released it publicly in 2007. Since then, Android emulators for PC gained popularity for various reasons. Some use it for trying different apps before installing on their phones while others try it for business purposes. A new breed of users has emerged as well who utilize Android emulators for gaming. It can be attributed to games like PUBG Mobile

What is an Android emulator?

An Android emulator is an Android Virtual Device(AVD) that emulates the Android environment for other devices to run the Android operating system. It is generally used for testing, bug-finding, running various apps on a virtually controlled system on devices other than actual Android phones.

It lets the host(mainly computer system) behave like another hardware or software system for different purposes. The idea of Android emulator gained traction with the release of Android SDK by Google, in 2007(2008 for Public)

Here are some of the best Android emulators for PC

1. MemeU Play

First on the list is Android 5.1 Lolipop based Android emulator for Windows. It is among the most customizable Android emulators for PC in the segment.

The installation is quick and simple with no bloatware third-party apps to install like we come across in some emulators. The installer is also one fancy thing, I might add.

It takes around 2-3 minutes when launching for the first time. Time varies according to the processing power of your computer, among the performance of other components.

MemU, android emulators for PC

The emulator comes pre-loaded with some third party apps, preferably the ones sponsoring them so cant really a complaint. There is no option to remove them. Honestly, I wouldnt worry unless Im running on 2 GIG of RAM and a Pentium 4 processor which really cant handle multi-tasking.

One of the hot selling points of this emulator is Key Mapping. What Key-Mapping does is that you can put markers anywhere on the screen and assign a keyboard key or mouse button.
When you press that key or push a button, the controls or app present on that part of the sc...


San Francisco Tourists Shocked By Aggressive Vagrants, Discarded Needles, Dead Bodies

Via: ZeroHedge: San Francisco a Democratic stronghold known for cable cars, quaint architecture and its diverse culture, has become a bastion of squalor and crime as city dwellers and visitors alike dodge aggressive, drug-addled vagrants. And its beginning to scare the tourists


Dem: Trump 'Space Force' would 'rip the Air Force apart' The Hill: Technology Policy

Sen. Bill Nelson (D-Fla.) is pushing back on President Trumps declaration that the Pentagon will create a new military branch dedicated to space, warning that such a move will rip the Air Force apart.Trump on Monday ...


Mozilla is working on a voice-controlled web browser Scout TechWorm

Mozilla discloses Scout, a voice-controlled web browser project

Considered as the preferred browser by many users, Googles Chrome is undoubtedly the leader in the browser market. However, its rivals such as Mozillas Firefox and Apples Safari are trying to compete and match up to its level.

For instance, Mozillas recently released Firefox Quantum browser has given the Chrome a tough competition on certain parameters, such as faster downloading speeds, and being less of a memory hog. Quantum has been reported to load websites faster than Chrome. Mozilla is constantly working on Firefox Quantum and is expected to bring in more changes and improvements in future updates.

Now, Mozilla is reportedly working on a new voice-controlled browser project called Scout, where it uses voice commands instead of the traditional mouse, keyboards, and even mobile touch inputs.

With the Scout app, we start to explore browsing and consuming content with voice, Mozilla said in an agenda item for its all-hands meeting this week in San Francisco. This talk will discuss the architecture and key components needed for a voice platform, the required capabilities of those components and the challenges of working with the limitations and confines of existing platforms.

The new browser will use the voice commands to not only open the requested page but also scroll pages and read pages aloud to the user. This browser could help people with visual impairments by using their voice to search the web and those who have trouble using their hands.

At present, details of the project are scarce, since it is still at a very early stage of development.

We use our internal All Hands conference to come together so we can plan and build for the future. We know there is a great deal of excitement about the early stage projects and initiatives we explore at this event. We look forward to discussing these efforts publicly when they are further developed, a Mozilla spokesperson told CNet who first spotted the project.

Currently, Google Chrome holds 58% of browser market share around the world, while Mozilla Firefox is struggling at 5%, according to StatCounter.

The post Mozilla is working on a voice-controlled web browser Scout appeared first on TechWorm.


Audi CEO Arrested for Role in Volkswagen Diesel Emissions Scandal SoylentNews

Head of VW's Audi arrested in Germany over diesel scandal

German authorities arrested the head of Volkswagen's luxury arm Audi on Monday, the most senior company official so far to be detained over the carmaker's emissions test cheating scandal.

Munich prosecutors, who earlier this month widened their probe into Audi, said Rupert Stadler was being held due to fears he might hinder their investigation into the scandal, plunging Volkswagen into a leadership crisis.

News of the arrest comes as Volkswagen's (VW) new group CEO Herbert Diess is trying to introduce a new leadership structure, which includes Stadler, to speed up a shift toward electric vehicles in the wake of its "dieselgate" troubles.

Also at BBC, DW, The Register, and CNN.

Original Submission

Read more of this story at SoylentNews.


Square receives New York state cryptocurrency license The Hill: Technology Policy

The digital payment company Square has obtained a license that will allow New York state residents to buy and sell Bitcoin through its mobile payments app, Cash. The company announced on Monday that it had received the license from New Yorks...


How to add cron job on Asuswrt Merlin Wifi Router nixCraft

How can I add or delete cron jobs on my wifi router powered by Asuswrt Merlin firmware? How do I add cron job on Asuswrt Merlin Wifi router using command line?

The post How to add cron job on Asuswrt Merlin Wifi Router appeared first on nixCraft.


FCC launches regulatory review of T-Mobile-Sprint merger The Hill: Technology Policy

The Federal Communications Commission (FCC) has launched the regulatory review for T-Mobiles proposed $26 billion acquisition of Sprint.The FCC on Friday opened a docket for the merger and issued a protective order allowing the companies to shield...


Modulating the Immune System Reduces Inflammation Following Heart Attack Lifeboat News: The Blog

Researchers from Washington University School of Medicine in St. Louis have discovered that a particular type of immune cell encourages harmful inflammation in the heart after a heart attack, and they have found a potential solution for protecting the heart.

The study, which was led by Dr. Douglas L. Mann, showed that a mouse model of human heart attack lived longer than control mice when treated with the drug pirfenidone, a drug already approved for treating lung conditions. The researchers showed that the drug works by regulating the immune response of B cell lymphocytes in the heart, thereby reducing inflammation and progressive injury following a cardiac event.

Pirfenidone is already used to treat idiopathic pulmonary fibrosis, a condition in which the lungs become increasingly damaged and form scar tissue rather than healthy, functioning tissue. The researchers hope to understand how pirfenidone works in the heart and reduces inflammation; in doing so, they could potentially modify the drug to work more efficiently.


World Health Organization Officially Lists "Gaming Disorder" in ICD SoylentNews

The World Health Organization (WHO) will officially classify "gaming disorder" as a mental health condition:

The World Health Organization is set to announce "gaming disorder" as a new mental health condition to be included in the 11th edition of its International Classification of Diseases, set to release Monday.

"I'm not creating a precedent," said Dr. Vladimir Poznyak, a member of WHO's Department of Mental Health and Substance Abuse, which proposed the new diagnosis to WHO's decision-making body, the World Health Assembly. Instead, he said, WHO has followed "the trends, the developments, which have taken place in populations and in the professional field."

However, not all psychologists agree that gaming disorder is worthy of inclusion in the International Classification of Diseases, known as the ICD.

What are the characteristics of gaming disorder?

"One is that the gaming behavior takes precedence over other activities to the extent that other activities are taken to the periphery," he said. The second feature is "impaired control of these behaviors," Poznyak said. "Even when the negative consequences occur, this behavior continues or escalates." A diagnosis of gaming disorder, then, means that a "persistent or recurrent" behavior pattern of "sufficient severity" has emerged, according to the ICD. A third feature is that the condition leads to significant distress and impairment in personal, family, social, educational or occupational functioning, Poznyak said. The impact is real, he said, and may include "disturbed sleep patterns, like diet problems, like a deficiency in the physical activity."

Overall, the main characteristics are "very similar" to the diagnostic features of substance use disorders and gambling disorder, he said. Gambling disorder "is another category of clinical conditions which are not associated with a psychoactive substance use but at the same time being considered as addictive as addictions."

Also at NYT.

Previously: World Health Organization Will Recognize "Gaming Disorder"

Original Submission

Read more of this story at SoylentNews.


Buttery Smooth Fades with the Power of HSV Hackaday

In firmware-land we usually refer to colors using RGB. This is intuitively pleasing with a little background on color theory and an understanding of how multicolor LEDs work. Most of the colorful LEDs we are use not actually a single diode. They are red, green, and blue diodes shoved together in tight quarters. (Though interestingly very high end LEDs use even more colors than that, but thats a topic for another article.) When all three light up at once the emitted light munges together into a single color which your brain perceives. Appropriately the schematic symbol for an RGB LED without an onboard controller typically depicts three discrete LEDs all together. So its clear why representing an RGB LED in code as three individual values {R, G, B} makes sense. But binding our representation of color in firmware to the physical system we accidentally limit ourselves.

The inside of an RGB LED



Free software is at risk in the EU -- take action now FSF blogs

Members of the European Parliament want to turn upload platforms like GitLab into "censorship machines" that require user-uploaded materials to be monitored and automatically filtered, a process which would prevent modified and reused code from being uploaded. This provision is covered under Article 13 of the Copyright Directive.

If Article 13, embedded within the proposal, becomes official policy, it will be impossible for developers to build off of one another's code -- which is not only a blow to the collaborative development of free software, but a push against the basic freedoms of free software. Software isn't free unless it can be modified and shared. Article 13 will affect all users of free software -- as development of free software suffers, the quality and availability of updates, new features, and new programs will also suffer.

What you can do

You can help turn the tide against Article 13. Contact your member of European Parliament (MEP) before June 20th.

Not sure what to say? You can try this sample email.

Dear MEP,

I am an EU citizen and I oppose Article 13 of the proposed Copyright Directive. Article 13 is harmful to the free, global development of software, including that which provides necessary infrastructure on an international scale. Please vote against the Copyright Directive.


Need help finding your MEPs?

A complete list of MEPs is available online.

What to do next

After you contact your MEP, there is still more to do!

To learn more, you can check out the links below:

You can also support the work of the Free Software Foundation by become an Associate Member or making a donation today.


Apple macOS Bug Reveals Cache of Sensitive Data from Encrypted Drives The Hacker News

Security researchers are warning of almost a decade old issue with one of the Apple's macOS feature which was designed for users' convenience but is potentially exposing the contents of files stored on password-protected encrypted drives. Earlier this month, security researcher Wojciech Regula from SecuRing published a blog post, about the "Quick Look" feature in macOS that helps users


Why a minor change to how EPA makes rules could radically reduce environmental protection Lifeboat News: The Blog

Since the Reagan administration, federal agencies have been required to produce cost-benefit analyses of their major regulations. These assessments are designed to ensure that regulators are pursuing actions that make society better off.

In my experience working on the White House economic team in the Clinton and Obama administrations, I found cost-benefit provides a solid foundation for understanding the impacts of regulatory proposals. It also generates thoughtful discussion of ways to design rules to maximize net benefits to the public.

On June 7, Environmental Protection Agency Administrator Scott Pruitt proposed changing the agencys approach to this process in ways that sound sensible, but in fact are a radical departure from how government agencies have operated for decades.


To Start a New Life at Proxima Centauri, This Is How Many People We Need to Send Lifeboat News: The Blog

Humanity has long dreamed about sending humans to other planets, even before crewed spaceflight became a reality. And with the discovery of thousands exoplanets in recent decades, particularly those that orbit within neighboring star systems (like Proxima b), that dream seems closer than ever to becoming a reality.

But of course, a lot of technical challenges need to be overcome before we can hope to mount such a mission.

In addition, a lot of questions need to be answered. For example, what kind of ship should we send to Proxima b or other nearby exoplanets? And how many people would we need to place aboard that ship?


A Session Suspension & Restoration Protocol Proposed For Wayland Phoronix

KDE Wayland developer Roman Gilg who started contributing to Wayland via last year's Google Summer of Code is proposing a new Wayland protocol for dealing with desktop session suspension and restoration...


(IN)SECURE Magazine issue 58 released Help Net Security

(IN)SECURE Magazine is a free digital security publication discussing some of the hottest information security topics. Issue 58 has been released today. Table of contents Is GDPR-regulated data lurking in unexpected pockets of your organization? Leveraging security analytics to investigate and hunt modern threats When was the last time your anti-virus software alerted you? Software-defined perimeter: The pathway to Zero Trust Report: Infosecurity Europe 2018 Life after May 25th: How large organization should navigate the More

The post (IN)SECURE Magazine issue 58 released appeared first on Help Net Security.


Promising new material has the right properties to capture solar energy, split water into hydrogen and oxygen Lifeboat News: The Blog

Solar energy is clean and abundant. But when the sun isnt shining, you must store the energy in batteries or through a process called photocatalysisin which solar energy is used to make fuels. In photocatalytic water splitting, sunlight separates water into hydrogen and oxygen. The hydrogen and oxygen can then be recombined in a fuel cell to release energy.

Now, a new class of halide double perovskitesmay have just the right properties to split water, according to a newly published paper in Applied Physics Letters.

If we can come up with a material that can be useful as a water-splitting photocatalyst, then it would be an enormous breakthrough, said Feliciano Giustino, a co-author on the paper.


LibreOffice Picks Up A Native "KDE 5" File Picker Phoronix

Several months back LibreOffice developers began working on better integration with KDE Plasma 5 and that has advanced again today with now having a native file picker...


Tens or Hundreds of Billions of Dollars Needed to Combat Opioid Crisis? SoylentNews

US needs to invest 'tens of billions or hundreds of billions' to fight opioid epidemic

The goal of an opioid is to reduce pain, but the addictive drugs are creating pain for millions of families suffering through the crisis. Deaths from opioid overdoses number at least 42,000 a year in the U.S., according to the Centers for Disease Control.

"This is an epidemic that's been getting worse over 10 to 20 years," Caleb Alexander, co-director of Johns Hopkins Center for Drug Safety, told CNBC's "On The Money" in a recent interview. "I think it's important that we have realistic expectations about the amount of work that it will take and the amount of coordination to turn this steamship around," Alexander added.

[...] Alexander added: "The statistics are stunning. More than 2.1 million Americans have an opioid use disorder or opioid addiction" and he says the country needs to "invest tens of billions or hundreds of billions of dollars" to shore up the treatment system. He said patients should be able to access medications that "we know work to help reduce the cravings for further opioids."

Don't mention the Portugal model!

Meanwhile, the Massachusetts Attorney General is suing members of the family that runs Purdue Pharma:

Their family name graces some of the nation's most prestigious bastions of culture and learning the Sackler Center for Arts Education at the Guggenheim Museum, the Sackler Lefcourt Center for Child Development in Manhattan and the Sackler Institute for Developmental Psychobiology at Columbia University, to name a few.

Now the Sackler name is front and center in a lawsuit accusing the family and the company they own and run, Purdue Pharma, of helping to fuel the deadly opioid crisis that has killed thousands of Americans. Massachusetts Attorney General Maura Healey took the unusual step of naming eight members of the Sackler family this week in an 80-page complaint that accused Purdue Pharma of spinning a "web of illegal deceit" to boost profits.

While prosecutors in more than a dozen other states hit ha...


Watch The World Spin With The Earth Clock Hackaday

With the June solstice right around the corner, its a perfect time to witness first hand the effects of Earths axial tilt on the days length above and beyond 60 degrees latitude. But if you cant make it there, or otherwise prefer a more regular, less deprived sleep pattern, you can always resort to simulations to demonstrate the phenomenon. [SimonRob] for example built a clock with a real time rotating model of Earth to visualize its exposure to the sun over the year.

The daily rotating cycle, as well as Earths rotation within one year, are simulated with a hand painted plastic ball attached to a rotating axis and mounted on a rotating plate. The hand painting was done with a neat trick; placing printed slivers of an atlas inside the transparent orb to serve as guides. Movement for both axes are driven by a pair of stepper motors and a ring of LEDs in the same diameter as the Earth model is used to represent the Sun. You can of course wait a whole year to observe it all in real time, or then make use of a set of buttons that lets you fast forward and reverse time.

Earths rotation, and especially countering it, is a regular concept in astrophotography, so its a nice change of perspective to use it to look onto Earth itself from the outside. And who knows, if [SimonRob] ever feels like extending his clock with an aurora borealis simulation, he might find inspiration in this northern lights tracking light show.

This is a spectacular showpiece and a great project you can do with common tools already in your workshop. Once youve mastered earth, put on your machinists hat and give the solar system a try.


DHS, FBI published a join alert including technical details of Hidden Cobra-linked Typeframe Malware Security Affairs

The US DHS and the FBI have published a new joint report that includes technical details of a piece of malware allegedly used by the Hidden Cobra APT.

A new joint report published by US DHS and FBI made the headlines, past document details TTPs associated with North Korea-linked threat groups, tracked by the US government as Hidden Cobra.

The US authorities have published the report to reduce the exposure to the activities of North Korea-linked APT groups.

Hidden Cobras arsenal includes Sharpknot, Hardrain, Badcall, BankshotFallchil, Volgmer, and Delta Charlie.

The latest joint report includes a piece of malware dubbed Typeframe and it covers a total of 11 samples analyzed by the government experts.

The researchers analyzed several executables and weaponize Word documents containing VBA macros.

DHS and FBI identified Trojan malware variants used by the North Korean government. This malware variant is known as TYPEFRAME. The U.S. Government refers to malicious cyber activity by the North Korean government as HIDDEN COBRA. reads the joint report.

This malware report contains analysis of 11 malware samples consisting of 32-bit and 64-bit Windows executable files and a malicious Microsoft Word document that contains Visual Basic for Applications (VBA) macros. These files have the capability to download and install malware, install proxy and Remote Access Trojans (RATs), connect to command and control (C2) servers to receive additional instructions, and modify the victims firewall to allow incoming connections.

Hidden Cobra

The security alert includes indicators of compromise (IoCs) for each of the sample analyzed by the experts.

The report includes a description...


California Tests Kindle-ized License Plates IEEE Spectrum Recent Content full text

California drivers can now opt for e-paper license plates that display custom messages Photo: Reviver Auto

That license plate frame sporting a dealership name, sports team logo, or your favorite superhero? Thats so last year.

This year, auto dealers in California will be able to go beyond personalized license plate frames to sell Kindle-ized license plates, in which the entire plate can display custom text and graphics using e-paper technology. These displays can be updated remotely, with such updates replacing the little date stickers that must be reapplied each year when registration is renewed.

And, when the car is stopped, drivers will also be able to reduce the license number to a small window and use the rest of the screen for a different graphic. (Though Im not sure the people stopped behind a custom-plate-bearing car will notice; so many people take that opportunity to surreptitiously check their mobile phones.)

Reviver Auto is making the so-called Rplates, and they arent cheapthe plates are listed at US $700, plus an $8 a month subscription fee. The company is initially focused on marketing them to fleet managers, who are expected to use the displays for advertising messages, but expects early adopters to quickly jump on the technology, and other consumers to come on board as the company proves out the plates usefulness.

The project started in 2008, Reviver founder and CEO Neville Boston says, with a plan to eliminate those date stickersit was time, he thought, to get registration renewals out of snail mail and into the wireless world. In the midst of an economic downturn, he says, he was also looking to get involved with something that exists in good times and badand the DMV is certainly that.

Then, he says, he started thinking about what else e-paper plates could do. His list of possibilities includes:

  • Paying for tolls and parking

  • Identifying cars as legal for travel in high-occupancy vehicle lanes

  • Replacing special hangtags and license plates for people with disabilities

  • Helping an Uber driver find a passenger by displaying the passengers name

  • Indicating that a car is in autonomous mode

  • Displaying a QR code that could work with an app for keyless entry

  • Celebrating holidays with greetings, like Happy Fathers Day

  • Switching between multiple special interest plates...


Security updates for Monday

Security updates have been issued by CentOS (kernel), Debian (libgcrypt20, redis, and strongswan), Fedora (epiphany, freedink-dfarc, gnupg, LibRaw, nodejs-JSV, nodejs-uri-js, singularity, strongswan, and webkit2gtk3), Mageia (flash-player-plugin, freedink-dfarc, and imagemagick), openSUSE (enigmail, gpg2, java-1_7_0-openjdk, java-1_8_0-openjdk, poppler, postgresql96, python-python-gnupg, and samba), Oracle (kernel), SUSE (gpg2 and xen), and Ubuntu (gnupg and webkit2gtk).


Aevums New Rocket-Drone Airplane Duo Could Launch Satellites Every 3 Hours Lifeboat News: The Blog

A space launch every 3 hours may soon be possible using rockets carried on a fully autonomous unmanned airplane, a new startup company suggests.

Alabama-based startup Aevum aims to per mission, using an air-launch system called Ravn.

Ravn is designed to launch every 180 minutes, Jay Skylus, Aevums CEO and chief launch architect, told Other launch vehicles fly only a handful of times a year with an average of 18 months of lead time. [Rocket Launches: The Latest Liftoffs, Photos & Videos].


Phoronix Test Suite 8.0.1 Is Coming Next Week Phoronix

Just a heads up that Phoronix Test Suite 8.0.1 is slated for release next week if there are any last minute bug reports or requests...


How SUSE Is Bringing Open Source Projects and Communities Together

How SUSE Is Bringing Open Source Projects and Communities Together


Can Great Tech Products Suffer From Poor Marketing? TechWorm

Image is everything in business. The right illustrations, logo, and stock images can speak volumes about the essence of who you are and what you do as a company. The old adage of a picture speaking a thousand words goes to show that this has been the case for a long time. As humans, we respond to images. If the history of art has thought us anything, it is that there is always an audience for bold and beautiful things to look at, once they come in the right frame.

As our brains are hardwired to judge on the visual aspects of a person, company, and their actions, we can be persuaded into purchasing products and services through the medium of advertising alone. Striking images can attract the eyes like almost nothing else. Pictures from Focused Collection are a strong example of a company who further this point. For almost every adult over a certain age will tell you, sometimes impulse buys happen. The reason for our last-minute splurges and spontaneous purchases quite often come down to the image within the advertisement.

The importance of imagery to a business, therefore, cannot be underestimated. Procuring the right images ones which will do a brand good rather than harm is crucial. You want to stand out from the cacophony of advertisements and marketing material out there and sometimes, even if it is against our inner-nature, we must learn to adopt the understanding that those that shout loudest get the most attention.

The Dominant Sense

For those of us blessed with the wonders of good eyesight will know, the majority of things which our human minds are attracted to come via our vision. It is the most dominant of our senses and the one which forces the brain to work harder than any other. In fact, our eyesight is accountable for up to half of the human brains functioning powers, which, in turn, means that we are designed to respond to images.

Although the voracious reader may argue with this, text can only go so far to stimulate the human mind. It is the photos and images which resonate on a deeper cognitive level and this is not something which is breaking news.

Standing Out in the Crowd...


malicious_ip_check.ps1- Freaky fast PowerShell script for malicious IP address checking The S@vvy_Geek Tips Tech Blog

I here want to introduce my new PowerShell script, malicious_ip_check.ps1.

It checks a single IP address against a huge database (it included 26,073 IP addresses when I checked it today) of malicious IP addresses, constantly updated, available at

The code downloads the information from the webpage to an output text file, dumps that to an array and checks whether an IP address entered by the user is included in the list or not, and all this in one minute!

Isn't that awesome?

I think it is.

I recently published it on GitHub, so go check it out!


Google to Fix Location Data Leak in Google Home, Chromecast Krebs on Security

Google in the coming weeks is expected to fix a location privacy leak in two of its most popular consumer products. New research shows that Web sites can run a simple script in the background that collects precise location data on people who have a Google Home or Chromecast device installed anywhere on their local network.

Craig Young, a researcher with security firm Tripwire, said he discovered an authentication weakness that leaks incredibly accurate location information about users of both the smart speaker and home assistant Google Home, and Chromecast, a small electronic device that makes it simple to stream TV shows, movies and games to a digital television or monitor.

Young said the attack works by asking the Google device for a list of nearby wireless networks and then sending that list to Googles geolocation lookup services.

An attacker can be completely remote as long as they can get the victim to open a link while connected to the same Wi-Fi or wired network as a Google Chromecast or Home device, Young told KrebsOnSecurity. The only real limitation is that the link needs to remain open for about a minute before the attacker has a location. The attack content could be contained within malicious advertisements or even a tweet.

It is common for Web sites to keep a record of the numeric Internet Protocol (IP) address of all visitors, and those addresses can be used in combination with online geolocation tools to glean information about each visitors hometown or region. But this type of location information is often quite imprecise. In many cases, IP geolocation offers only a general idea of where the IP address may be based geographically.

This is typically not the case with Googles geolocation data, which includes comprehensive maps of wireless network names around the world, linking each individual Wi-Fi network to a corresponding physical location. Armed with this data, Google can very often determine a users location to within a few feet (particularly in densely populated areas), by triangulating the user between several nearby mapped Wi-Fi access points. [Side note: Anyone whod like to see this in action need only to turn off location data and remove the SIM card from a smart phone and see how well nav...


Fatalities vs False Positives: The Lessons from the Tesla and Uber Crashes Hackaday

In one bad week in March, two people were indirectly killed by automated driving systems. A Tesla vehicle drove into a barrier, killing its driver, and an Uber vehicle hit and killed a pedestrian crossing the street. The National Transportation Safety Boards preliminary reports on both accidents came out recently, and these bring us as close as were going to get to a definitive view of what actually happened. What can we learn from these two crashes?

There is one outstanding factor that makes these two crashes look different on the surface: Teslas algorithm misidentified a lane split and actively accelerated into the barrier, while the Uber system eventually correctly identified the cyclist crossing the street and probably had time to stop, but it was disabled. You might say that if the Tesla driver died from trusting the system too much, the Uber fatality arose from trusting the system too little.

But youd be wrong. The forward-facing radar in the Tesla should have prevented the accident by seeing the barrier and slamming on the brakes, but the Tesla algorithm places more weight on the cameras than the radar. Why? For exactly the same reason that the Uber emergency-braking system was turned off: there are too many false positives and the result is that far too often the cars brake needlessly under normal driving circumstances.

The crux of the self-driving at the moment is precisely figuring out when to slam on the brakes and when not. Brake too often, and the passengers are annoyed or the car gets rear-ended. Brake too infrequently, and the consequences can be worse. Indeed, this is the central problem of autonomous vehicle safety, and neither Tesla nor Uber have it figured out yet.

Tesla Cars Drive Into Stopped Objects

Lets start with the Tesla crash. Just before the crash, the car was following behind another using its traffic-aware cruise control which attempts to hold a given speed subject to leaving appropriate following distance to the car ahead of it. As the Tesla approached an exit ramp, the car ahead kept right and the Tesla moved left, got confused by the lane markings on the lane split, and accelerated into its programmed speed of 75 mph (120 km/h) without noticing the barrier in front of it. Put simply, the algorithm got things wrong and drove into a lane divider at full speed.



Supreme Court to hear Apple's challenge to class-action lawsuit over iPhone apps The Hill: Technology Policy

The Supreme Court on Monday agreed to hear Apple's challenge to a class-action lawsuit brought by consumers who alleged the company has a monopoly on how apps can be purchased for its devices.Consumers allege the tech company illegally...

Monday, 18 June


Near-Infrared Photosynthesis Discovered in Cyanobacteria SoylentNews

A newly discovered form of photosynthesis could have implications for exoplanet/exomoon habitability:

The vast majority of life on Earth uses visible red light in the process of photosynthesis, but the new type uses near-infrared light instead. It was detected in a wide range of cyanobacteria (blue-green algae) when they grow in near-infrared light, found in shaded conditions like bacterial mats in Yellowstone and in beach rock in Australia. As scientists have now discovered, it also occurs in a cupboard fitted with infrared LEDs in Imperial College London.

The standard, near-universal type of photosynthesis uses the green pigment, chlorophyll-a, both to collect light and use its energy to make useful biochemicals and oxygen. The way chlorophyll-a absorbs light means only the energy from red light can be used for photosynthesis.

Since chlorophyll-a is present in all plants, algae and cyanobacteria that we know of, it was considered that the energy of red light set the 'red limit' for photosynthesis; that is, the minimum amount of energy needed to do the demanding chemistry that produces oxygen. The red limit is used in astrobiology to judge whether complex life could have evolved on planets in other solar systems.

However, when some cyanobacteria are grown under near-infrared light, the standard chlorophyll-a-containing systems shut down and different systems containing a different kind of chlorophyll, chlorophyll-f, takes over.

Also at ScienceAlert.

Photochemistry beyond the red limit in chlorophyll fcontaining photosystems (DOI: 10.1126/science.aar8313) (DX)

Original Submission

Read more of this story at SoylentNews.


Epic Games Fortnite for AndroidAPK Downloads Leads to Malware The Hacker News

Given Fortnite's current popularity and craziness across the globe, we understand if you have been searching the web for download links to Fortnite APK for Android phone. However, you are not alone, thousands of people out there are also searching tutorials and links for, "how to install Fortnite on Android" or "how to download Fortnite for Android" on the Internet. The app has taken the


Using W10Privacy To Boost Ubuntu WSL Performance On Windows 10 Phoronix

While Microsoft is working on low-level improvement to the Windows Subsystem for Linux (WSL) to yield better I/O performance, it is possible to dramatically increase some disk workloads by removing a number of running Windows services via the independent W10Privacy application. Here are some benchmarks of W10Privacy on the overall performance impact to Microsoft Windows 10 Pro x64 itself and of Ubuntu 18.04 running on the Windows 10 installation via WSL.


Call for Code Is Open and Organizations Are Lining Up to Join the Cause

By Bob Lord, Chief Digital Officer, IBM

Today is the first official day of Call for Code, an annual global initiative from creator David Clark Cause, with IBM proudly serving as Founding Partner. Call for Code aims to unleash the collective power of the global open source developer community against the growing threat of natural disasters.


YouTubes Blocks MIT Courses, Blender Videos, and More (Updated) TorrentFreak

To protect copyright holders, YouTube uses an advanced piracy recognition system that flags and disables videos which are used without permission.

This system, known as Content ID, works well most of the time, but it is far from perfect.

Its not well equipped to determine whether content deployment is protected under fair use, and in some cases it even views white noise or birds chirping as piracy.

Over the past several days, an even more worrying trend has appeared. Several popular YouTube accounts including those belonging to MIT OpenCourseWare and the Blender Foundation, have suddenly had all their videos blocked.

People who try to watch one of the freely available MIT courses on YouTube get the following message, which typically appears as an anti-piracy notice if an uploader doesnt have the rights to show content locally.

This video contains content from MIT. It is not available in your country.

The message appears in all locations that we were able to check, suggesting that it may very well apply worldwide. In any case, on social media theres no shortage of people mentioning that they can no longer access the courses.

Blocked courseware

The issue hasnt gone unnoticed by MITs OpenCourseWare team which is investigating the matter, without pointing fingers.

You may have noticed that we are having some trouble with our videos! Please stand by. The elves are working around the clock to fix the issue, they write, referring people to non-video content in the meantime.

Interestingly, the MIT case doesnt appear to be an isolated incident. Another organization that was hit by the same mysterious blocking efforts is the Blender Foundation.

The nonprofit organization, which is leading the development of the open source 3D content-creation application Blender, has also had its videos blocked.

Ton Roosendaal, Chairman of the Blender Foundation, noticed the issue on Saturday and contacted YouTube. This is most probably an error from their side, Roosendaal said.

At t...


China-Linked APT15 is still very active, experts found its new malware tracked as MirageFox Security Affairs

Following the recent hack of a US Navy contractor security experts found evidence of very recent activity by the China-linked APT group tracked as APT15.

The China-linked APT15 group (aka Ke3chang, Mirage, Vixen Panda, Royal APT and Playful Dragon) has developed a new strain of malware borrowing the code from one of the tool he used in past operations.

APT15 has been active since at least 2010, it conducted cyber espionage campaigns against targets in defense, high tech, energy, government, aerospace, manufacturing industries worldwide. The attackers demonstrated an increasing level of sophistication across the years, they used a custom-malware and various exploits in their attacks.

Across the years, security firms identified many hacking tools associated with APT15 such as Mirage, BS2005, RoyalCLI, RoyalDNS, TidePool, BMW and MyWeb.

The group has been known to target organizations in the defense, high tech, energy, government, aerospace, manufacturing and other sectors.

In March 2018, APT15 used new backdoors is an attack that was likely part of a wider operation aimed at contractors at various UK government departments and military organizations.

One of the attacks aimed at a UK-based customer of NCC Group, an organization that provides a wide range of services to the United Kingdom government. The hackers focused on government departments and military technology by targeting the customer of the company.

NCC noted at the time that the APT15 used two new backdoors, tracked as RoyalCLI and RoyalDNS.


One of the backdoors has been tracked as RoyalCLI due to a debugging path left in the binary, it is the successor of BS2005 backdoor used by the group. Both RoyalCLI and BS2005 communicate with command and control (C&C) servers via Internet Explorer using the COM interface IWebBrowser2.

The attackers utilized Windows commands to conduct reconnaissance activities, the lateral movement was conducted by using a combination of net command, mounting the C$ share of hosts and manually copying files to or from compromised hosts.

The second backdoor, tracked as RoyalDNS, uses DNS to communic...


13 Ways Cyber Criminals Spread Malware HackRead

By David Balaban

Security incidents where hackers distribute malicious code (malware) via spam,

This is a post from Read the original post: 13 Ways Cyber Criminals Spread Malware


Why Open Source Is Good for Business, And People

The open source world isnt defined by geography, nor are the communities within it. Open source communities are defined by sharing attitudes, interests, and goals, wherever their participants are. An open source community spans locations, political affiliations, religion, and life experience. There are no boundaries of company, country, or even language. People from all backgrounds with diverse perspectives can get involved. And they do.


A Chat With 'Super Meat Boy Forever' Creator Tommy Refenes SoylentNews

Submitted via IRC for BoyceMagooglyMonkey

Tommy Refenes' life is about to change dramatically. He's turning 37 in a few days and his first child, a boy, is expected to arrive just a few weeks later. On top of this perfect storm of personal anxiety, he's preparing to launch his second major video game, Super Meat Boy Forever, later this year on the PlayStation 4, Xbox One, Nintendo Switch and PC.

Unlike in parenthood, Refenes has experience in the video game industry. He's famous in the world of independent development for his programming work on Super Meat Boy, a legendary 2010 platformer that helped usher in the modern marketplace for indie games. He's also a film star: Refenes and game designer Edmund McMillen were the focus of the 2012 documentary Indie Game: The Movie, which tracked the development and surprisingly successful launch of Super Meat Boy. The movie was a critical and commercial hit, picking up an award for documentary editing at the 2012 Sundance Film Festival.


Original Submission

Read more of this story at SoylentNews.


Has Agile Programming Lost its Way?

Programmers are passionate about which development methodology is the best. Is it Agile? Waterfall? Feature Driven Development? Scrum? So everyone took notice when one of the 17 original signers of the seminal Agile Manifestowrote a blog post last month headlined Developers Should Abandon Agile.


Opening A Ford With A Robot and the De Bruijn Sequence Hackaday

The Ford Securicode, or the keyless-entry keypad available on all models of Ford cars and trucks, first appeared on the 1980 Thunderbird. Even though its most commonly seen on the higher-end models, it is available as an option on the Fiesta S the cheapest car Ford sells in the US for $95. Doug DeMuro loves it. Its also a lock, and that means its ready to be exploited. Surely, someone can build a robot to crack this lock. Turns out, its pretty easy.

The electronics and mechanical part of this build are pretty simple. An acrylic frame holds five solenoids over the keypad, and this acrylic frame attaches to the car with magnets. Theres a second large protoboard attached to this acrylic frame loaded up with an Arduino, character display, and a ULN2003 to drive the resistors. So far, everything you would expect for a robot that will unlock a car via...


US Government warns of more North Korean malware attacks Graham Cluley

US Government warns of more North Korean malware attacks

Just days after the two countries signed a joint agreement at their unprecedented talks, the US Department of Homeland Security has issued a warning about more malware being used by the North Korean government against US organisations.

Read more in my article on the Hot for Security blog.


Buildah 1.0: Linux Container Construction Made Easy

The good news about containers, such as Docker's, is they make it easy to deploy applications, and you can run far more of them on a server than you can on a virtual machine. The bad news is that putting an application into a container can be difficult. That's where Buildah comes in.


Feral Is Bringing Total War: WARHAMMER 2 To Linux Phoronix

Feral Interactive has announced this morning that they will be bringing Total War: WARHAMMER 2 to Linux this year as the latest Total War game seeing a native Linux port...


Hayabusa2 Approaches Asteroid Ryugu SoylentNews

Hayabusa2 will begin orbiting asteroid 162173 Ryugu on June 27th. The spacecraft includes four robotic landers and will capture material for a sample return:

The Japanese asteroid sampling mission Hayabusa2, launched on December 3, 2014 aboard an H-IIA rocket from Tanegashima, Japan, has nearly completed its long flight to asteroid Ryugu (formerly 1999 JU3) after a five year mission and an Earth flyby.

[...] The Hayabusa2 follow-on has one more reaction wheel (to make four) and improved, higher thrust ion engines, along with a backup asteroid sampling system, and the spacecraft is in good health so far. Hayabusa2 is a 600 kilogram (1300 pound) spacecraft that is based on the Hayabusa craft, with some improvements. It is powered by two solar panels and uses an ion engine with xenon propellant as its main propulsion source. The ion engine technology was first used in the Deep Space One experimental spacecraft in the late 1990's and also has been successfully used in the Dawn asteroid probe as well.

[...] Besides the primary and backup sample collectors, the mission includes three MINERVA "hoppers" similar to the one used on the original Hayabusa mission that will land at several locations on the surface to study these locations with cameras and thermometers. [...] International contributions include a small robotic lander (10 kilograms or 20 pounds) called MASCOT that is a joint venture of DLR (Germany) and CNES (France), while NASA is providing communications through the Deep Space Network.

[...] Its arrival at Ryugu is set for June 27th, and Hayabusa2 will be 20 km (12 miles) above the surface on that date, as things currently stand. The arrival will be followed by a press conference in Sagamihara, Japan.

The total mission cost is about $150 million. The H-IIA rocket costs about $90 million to launch.

Also at NHK.

Original Submission

Read more of this story at SoylentNews.


Senate braces for Trump showdown over Chinese telecom giant The Hill: Technology Policy

The Senate is speeding toward a confrontation with President Trump over his plan to revive the Chinese telecommunications giant ZTE.Senators are poised to pass legislation as part of a mammoth defense bill on Monday evening to block...


cantata: cantata-mounter D-Bus service local privilege escalation and other security issues Open Source Security

Posted by Matthias Gerstner on Jun 18

Hello list,

this is a report about local privilege and local denial of service
issues found in cantata, a graphical client for MPD

cantata supports a D-Bus helper daemon "cantata-mounter" for mounting
remote samba shares by calling `mount.cifs` on Linux systems. This
daemon is configured for on-demand activation, running as root and its
D-Bus interface is accessible by...


Systems Languages: An Experience Report

Recently, theres been a lot of turmoil in the systems language community. We have the Rust Evangelism Strikeforce nudging us towards rewriting everything in Rust. We have the C++17 folks who promise the safety and ease of use of modern programming languages with the performance and power of C. And then theres a long tail of other systems programming languages, like Nim, Reason / OCaml, Crystal, Go, and Pony.


Interplanetary Challenge Lifeboat News: The Blog


Let Bill Nye and Robert Picardo take you on a journey through the future of space exploration and artificial intelligence. Each week they will show us a different space-themed topic and reveal how AI can help us reach the stars.


Elon Musk and State of Minds Transhumanism Philosophy Lifeboat News: The Blog

What does it mean to be human in world of increasingly powerful technology? This is a question video games have grappled with, most recently in the Deus Ex franchise and the upcoming E3 show-stealing Cyberpunk 2077.

Daedalics State of Mind approaches the topic in a different, more philosophical way. Guns and body mods arent the order of the day. Rather, State of Mind is a narrative adventure that considers how far the human race will go to trade dystopia for utopia.

Creative lead Martin Gantefhr is an avid follower of transhumanist theory, and how humanity will evolve over the coming decades as scientists pursue the singularity. Transhumanism explores the intersection of people and technology, with the ultimate goal giving all people access to technology that leads to an egalitarian utopia.


Is your brain ready for Monday? Tease your mind with these four optical illusions Lifeboat News: The Blog

Better than coffee smile

___ A great way to learn more about our brains and minds is to look at how we can trick themthat is, to see how we react to brain teasers and visual illusions. Below are four fun optical illusio


Money Doesnt Buy HappinessBut Time Just Might Do It - Facts So Romantic Nautilus

A citys pace of life was indeed significantly related to the physical, social, and psychological well-being of its inhabitants.Photograph by Neta Bartal / Flickr

While on vacation in distant locales, people often find that time moves quite differently than in the places theyre used to. In the tropics, we settle into the grooves of island time and relax thanks to a more leisurely rhythm. A trip to a big city can leave us exhilarated but also drained by the energetic whir of life there.

The different paces of different communities also seem to be connected to other cultural characteristics. Robert Levine and his colleagues have studied the speed of life in cities around the world and across the U.S. In a series of experiments they measured how fast solitary pedestrians in a downtown core covered a distance of 60 feet (being careful to exclude those who are obviously window shopping), timed how long it took to complete a simple commercial transaction, and recorded the accuracy of randomly selected clocks in the downtown business area. They found that places with a faster pace of life also had more robust economies (as measured by GDP per capita, average purchasing power, and average caloric
Read More


UMaxHosting 50GB RAID-10 VPS for $1.95/mo with a month free and more! Low End Box

John from UMaxHosting has submitted their first offer ever with us! They are offering OpenVZ based virtual services out of Los Angeles and New York. They started with New York and are now expanding over to the west coast! We hope you enjoy what they have to offer and please let us know of any questions/comments/concerns you may have below.

Heres what they had to say:

UMaxHosting is a hosting provider that specializes in providing maximum performance at the lowest cost possible. UMaxHosting provides a low latency network backed with a 99.9% network uptime guarantee. Additionally, our support staff are available 247 to assist our customers with any questions they may have. Our staff are also working behind the scenes to ensure our mission statement is constantly being delivered, without any shortcuts being taken!

Our Mission Statement: To deliver the highest level of hosting performance at the best value possible. To adapt to customer requirements and provide personalized service.

***** Order any LEB special below and get 1 month free on top of your next due date! Open a ticket to our Billing Department to claim your free month after you have ordered. *****

256MB Plan

  • 1 CPU Core
  • 256MB DDR3 RAM
  • 256MB vSwap
  • 50GB RAID-10 Storage
  • 2000GB Monthly Bandwidth
  • 100Mbps Network Port
  • SolusVM Control Panel
  • Any Linux OS
  • Unlimited OS Reinstalls
  • Full Root Privileges
  • Instant Deployment
  • Easy API Access
  • $1.95/mo [ORDER]

1GB Plan

  • 2 CPU Cores
  • 1024MB (1GB) DDR3 RAM
  • 1024MB (1GB) vSwap
  • 70GB RAID-10 Storage
  • 3000GB Monthly Bandwidth
  • 100Mbps Network Port
  • SolusVM Control Panel
  • Any Linux OS
  • Unlimited OS Reinstalls
  • Full Root Privileges
  • Instant Deployment
  • Easy API Access
  • $9/qtr OR $18/yr [ORDER]

6GB Plan

  • 4 CPU Cores
  • 6144MB (6GB) DDR3 RAM
  • 6144MB (6GB) vSwa...

IndyWatch Science and Technology News Feed Archiver

Go Back:30 Days | 7 Days | 2 Days | 1 Day

IndyWatch Science and Technology News Feed Today.

Go Forward:1 Day | 2 Days | 7 Days | 30 Days

IndyWatch Science and Technology News Feed was generated at World News IndyWatch.

Resource generated at IndyWatch using aliasfeed and rawdog