IndyWatch Science and Technology News Feed Archiver

Go Back:30 Days | 7 Days | 2 Days | 1 Day

IndyWatch Science and Technology News Feed Today.

Go Forward:1 Day | 2 Days | 7 Days | 30 Days

IndyWatch Science and Technology News Feed was generated at World News IndyWatch.

Friday, 20 April


Identity-as-a-Service for hybrid customer environments Help Net Security

OneLogin is showcasing enhancements to its Identity-as-a-Service (IDaaS) cloud platform, including the OneLogin Desktop experience, LDAP, and RADIUS capabilities, at RSA Conference 2018, in continued efforts to serve the sophisticated Access Management needs of modern enterprises. As customers digitally transform, OneLogin makes it simpler and safer for organizations to access the apps and data they need anytime, anywhere. OneLogins Unified Access Management Platform (UAM) is purpose-built for hybrid customer environments, allowing companies of any size More

The post Identity-as-a-Service for hybrid customer environments appeared first on Help Net Security.


Organizations are becoming more resilient to focused cyber attacks Help Net Security

Accenture has polled 4,600 security decision makers at US$1B+ companies in 15 countries to understand the effectiveness of security efforts and the adequacy of existing investments. The survey has shown that, while the average number of focused cyberattacks per organization has more than doubled this year compared to the previous 12 months (232 vs 106), organizations are demonstrating far more success in detecting and blocking them. They are now preventing 87 percent of all focused More

The post Organizations are becoming more resilient to focused cyber attacks appeared first on Help Net Security.


Stealth network traffic analysis appliance automates defense actions Help Net Security

LookingGlass Cyber Solutions announced at RSA Conference 2018 the general availability of the LookingGlass IRD-100 (Intelligence Response and Deception) security appliance. This fully programmable, custom stealth hardware is invisible to adversaries view of corporate and government networks. Designed to run in-line with low latency, the appliance creates a new point of control by using real-time traffic analysis. Performing these actions invisibly at line speeds across enterprise networks is made possible by the IRD-100s unique Titan More

The post Stealth network traffic analysis appliance automates defense actions appeared first on Help Net Security.


How attackers can exploit iTunes Wi-Fi sync to gain lasting control of target devices Help Net Security

An iOS feature called iTunes Wi-Fi sync, which allows a user to manage their iOS device without physically connecting it to their computer, could be exploited by attackers to gain lasting control over the device and extract sensitive information from it. The vulnerability was discovered by Symantec researchers, disclosed to Apple and now to the RSA Conference 2018 attendees and the wider public. Apple has implemented a mechanism that should prevent easy exploitation of the More

The post How attackers can exploit iTunes Wi-Fi sync to gain lasting control of target devices appeared first on Help Net Security.


Azure Sphere Makes Microsoft an Arm Linux Player for IoT

Azure Sphere Makes Microsoft an Arm Linux Player for IoT


Migrating to Linux: Network and System Settings

Migrating to Linux: Network and System Settings

Go Back:30 Days | 7 Days | 2 Days | 1 Day

IndyWatch Science and Technology News Feed Today.

Go Forward:1 Day | 2 Days | 7 Days | 30 Days

Thursday, 19 April


Excel pivot table data leak leads to 120,000 fine for London council Graham Cluley

A London council has been fined 120,000 for accidentally revealing the names of people who owned empty properties. An error that could have been avoided with a simple double-click.

Read more in my article on the Tripwire State of Security blog.


MySQL 8.0 Released With Many Improvements, Faster Performance Phoronix

It's a busy day in the software and hardware space today as well as a busy week for Oracle with several big releases this week. The latest is the general availability of the long-awaited MySQL 8.0 update...


Palantir Using War on Terror Tools to Track American Citizens

Via: Bloomberg: The LAPD uses Palantirs Gotham product for Operation Laser, a program to identify and deter people likely to commit crimes. Information from rap sheets, parole reports, police interviews, and other sources is fed into the system to generate a list of people the department defines as chronic offenders, says Craig Uchida, whose consulting []


Facebook Calling for Chip Designers SoylentNews

A Facebook job posting indicates the company is looking to design its own system-on-a-chip or Application Specific Integrated Circuit (ASIC):

Facebook Inc. is building a team to design its own semiconductors, adding to a trend among technology companies to supply themselves and lower their dependence on chipmakers such as Intel Corp. and Qualcomm Inc., according to job listings and people familiar with the matter.

The social media company is seeking to hire a manager to build an "end-to-end SoC/ASIC, firmware and driver development organization," according to a job listing on its corporate website, indicating the effort is still in its early stages.

The Menlo Park, California-based company would join other technology giants tackling the massive effort to develop chips. In 2010, Apple Inc. started shipping its own chips and now uses them across many of its major product lines. Alphabet Inc.'s Google has developed its own artificial intelligence chip as well.

Also at TechCrunch and The Verge.

Original Submission

Read more of this story at SoylentNews.


Massachusetts new vehicle registration program uses five cameras to spy on vehicles in real-time MassPrivateI

Since October 1, 2017, Massachusetts vehicle inspection stations have been required to purchase five cameras to record vehicles in real-time.

The new system called 'Mass Vehicle Check' (MVC) requires inspectors and stations to spend $5,710.00 - $8.141.00 dollars to purchase government approved surveillance gear.

Forcing vehicle inspection stations to pay to for government surveillance cameras sounds familiar.

It reminds me of police community cam-share programs like Project Green Light, that are popping up across the country.(Click here to find out more about police cam-share programs.)

Massachusetts uses inspection stations to spy on motorists
Image credit: MassVehicleCheck

To call the MVC program intrusive, doesn't really do it justice.

Last year an article in the Boston Globe warned everyone that inspection stations are spying on much more than your license plate.

"Service stations will now use cameras to ensure accurate inspections, document the status of vehicles being inspected, and allow for video conferencing for inspectors if they need technical support, the RMV said. Vehicles arriving for inspection will have photographs taken of their VIN, odometer, fr...


IBM introduces open-source library for protecting AI systems TechWorm

IBMs new AI toolbox secures AI from adversarial attacks

IBM released an open-source software library meant to help developers and researchers to protect AI systems including Deep Neural Networks (DNNs) against adversarial attacks. DNNs are complex machine learning models that has certain similarity with the interconnected neurons in the human brain.

The Adversarial Robustness Toolbox is a platform-agnostic artificial intelligence (AI) toolbox created by IBM that features attacks, defenses, and benchmarks to protect AI systems.

Current AI methods like recognizing objects in images, annotating videos, converting speech to text, or translating between different languages are based on DNNs. According to IBM, while DNNs are usually very accurate, they are vulnerable to adversarial attacks and can be used to misclassify or incorrectly predict outcomes that could benefit an attacker.

Adversarial attacks pose a real threat to the deployment of AI systems in security critical applications. Virtually undetectable alterations of images, video, speech, and other data have been crafted to confuse AI systems. Such alterations can be crafted even if the attacker doesnt have exact knowledge of the architecture of the DNN or access to its parameters. Even more worrisome, adversarial attacks can be launched in the physical world: instead of manipulating the pixels of a digital image, adversaries could evade face recognition systems by wearing specially designed glasses, or defeat visual recognition systems in autonomous vehicles by sticking patches to traffic signs, IBM wrote in a blog post.

According to the researchers, outside of applications these adversarial attacks can affect the physical world by avoiding facial recognition systems and defeating visual recognition systems such as autonomous cars. IBMs Python-based Adversarial Robustness Toolbox aims to help protect AI systems against these types of threats, which can pose a serious problem to security-critical applications.

The Adversarial Robustness Toolbox is designed to support researchers and developers in creating novel defense techniques, as well as in deploying practical defenses of real-world AI systems. Researchers can use the Adversarial Robustness Toolbox to benchmark novel defenses against the state-of-the-art. For developers, the library provides interfaces which support the composition of comprehensive defense systems using individual methods as building blocks, the researchers wrote.

With the Adversarial Robustness Toolbox, multiple attacks can be launched against an AI system, and security teams can select the most effective defenses as building blocks for maximum robustness. With each proposed change to the defense of the system, the ART will provide benc...


Hurricane Harvey: Research shows most fatalities occurred outside flood zones Lifeboat News: The Blog

A Dutch-Texan team found that most Houston-area drowning deaths from Hurricane Harvey occurred outside the zones designated by government as being at higher risk of flooding: the 100- and 500-year floodplains. Harvey, one of the costliest storms in US history, hit southeast Texas on 25 August 2017 causing unprecedented flooding and killing dozens. Researchers at Delft University of Technology in the Netherlands and Rice University in Texas published their results today in the European Geosciences Union journal Natural Hazards and Earth System Sciences.

It was surprising to me that so many fatalities occurred outside the flood zones, says Sebastiaan Jonkman, a professor at Delfts Hydraulic Engineering Department who led the new study.

Drowning caused 80% of Harvey deaths, and the research showed that only 22% of fatalities in Houstons 4,600-square-kilometre district, Harris County, occurred within the 100-year floodplain, a mapped area that is used as the main indicator of flood risk in the US.


AMD Ryzen 5 2600X + Ryzen 7 2700X Linux Benchmarks Phoronix

The embargo on the Ryzen 5 2600X and Ryzen 7 2700X processors has expired now that these Ryzen+ CPUs are beginning to ship today. We can now talk about the Linux support and the initial performance figures for these upgraded Zen desktop CPUs.


Mystery Brand EV Will Offer WiTricity's Wireless Charging This Year IEEE Spectrum Recent Content full text

The customer parks the car over a garage-floor charging plate, then comes back in the morning to a full battery Illustration: WiTricity

In the coming months, an unnamed manufacturer will bring an electric car to market that offers wireless charging from WiTricityAlex Gruzen, the companys chief executive, tells IEEE Spectrum.

Unnamed, yes, but not utterly un-guessable. Among the companies that have demonstrated wireless charging are BMW and Hyundai. And, though there are other wireless charging companies out thereQualcomm, for exampleHyundai has explicitly named WiTricity as the supplier of the system it showed on its new Kona EV last week at the Geneva Motor Show. Other companies known to be working with WiTricity include Honda, Nissan, and Toyota.

Charging a Hyundai Kona at the Geneva Auto Show Photo: WiTricity A Hyundai Kona recharges with WiTricitys wireless system at the 2018 Geneva Auto Show.

Magnetic resonance was developed at MIT in the early 2000s. It works by establishing a kind of duet between an oscillating magnetic field in a pizza-box size charger on the floor and a receiver mounted under the car.
The charger and receiver are tuned to resonate, which is why little energy goes astray, making transmission as efficient as youd get from a cable.

"Theres often a misconception that somehow plugging in is 100 percent efficient," Gruzen says. "But a plug-in is from just 88 to 94 percent efficient; WiTricity's wireless system runs at 90 to 93 percent.  

The resonance also gives you a certain leeway in aligning the car and the charging plate. The vertical clearance can be as little as 10 centimeters (4 inches), for a sports car, and as much as 25 cm, for an SUV. The left-to-right positioning need be only within 10 cm of dead center. The fore-and-aft errorwhich is easier for a driver to controlis 7.5 cm.

Drivers shouldnt take long to get the hang of parking close enough to the charger on the first try. That ease of use is the entire point.

About 70 percent of plug-in customers never bother to plug in, Gruzen says. They dont want to deal with cables. And broad, mainstream consumer behavior does not change, as it might with the 1 percent who are early adopters. I pl...

Linux Gaming Performance With AMD Ryzen 5 2600X / Ryzen 7 2700X Phoronix

Today the Ryzen+ "Pinnacle Ridge" processors begin shipping and we can now share with you the initial performance results for the Ryzen 5 2600X and Ryzen 7 2700X processors. One of the most common questions I've received about these improved Zen processors since showing them off last week was inquiries/hopes about the Linux gaming performance, so those numbers are first up today followed by other Linux benchmark results forthcoming.


KDE Applications 18.04 Brings Dolphin Improvements, JuK Wayland Support Phoronix

The KDE community has announced the release today of KDE Applications 18.04 as the first major update to the open-source KDE application set for 2018...


Photo gallery: RSA Conference 2018 Expo Help Net Security

The RSA Conference 2018 is underway at the Moscone Center in San Francisco. Here are a few photos from the Expo floor. Featured companies: LogRhythm, Qualys, Sophos, RSA Conference, Intel, AWS, IBM Security, Wombat Security, A10 Networks.

The post Photo gallery: RSA Conference 2018 Expo appeared first on Help Net Security.


Hacking Cisco WebEx with a malicious Flash file. Patch it now! Security Affairs

Cisco issues a critical patch to address a remote code execution vulnerability in the Cisco WebEx software, hurry up apply it now!

Cisco has issued a critical patch to fix a serious vulnerability (CVE-2018-0112) in its WebEx software that could be exploited by remote attackers to execute arbitrary code on target machines via weaponized Flash files.

The vulnerability affects both client and server versions of WebEx Business Suite or WebEx Meetings. Cisco urges its users to update their software to fix the problem.

A vulnerability in Cisco WebEx Business Suite clients, Cisco WebEx Meetings, and Cisco WebEx Meetings Server could allow an authenticated, remote attacker to execute arbitrary code on a targeted system. reads the security advisory published by Cisco.

The vulnerability is due to insufficient input validation by the Cisco WebEx clients. An attacker could exploit this vulnerability by providing meeting attendees with a malicious Flash (.swf) file via the file-sharing capabilities of the client. Exploitation of this vulnerability could allow arbitrary code execution on the system of a targeted user.

The flaw has received a CVSS score of 9.0 and was rated as a critical severity issue by Cisco.

cisco webex

The vulnerability was reported by the ENISA security expert Alexandros Zacharis of ENISA, it is due to insufficient input validation by the Cisco WebEx clients.

Zacharis discovered that an attacker could submit a malicious Flash file (.swf ) to a room full of attendees using the file sharing feature, then trigger the flaw to execute arbitrary code.

Cisco has already released software updates that fix the flaw, it confirmed that is not aware of any attacks exploiting the vulnerability in the wild.

Cisco added that currently there is no workaround to address the problem.

WebEx Business Suite software should be updated to the versions T32.10 and T31.23.2, while WebEx Meetings client software should be updated to T32.10 and Meetings Server should be updated to 2.8 MR2.



Cisco plugs critical hole in WebEx, users urged to upgrade ASAP Help Net Security

Cisco has fixed a critical vulnerability in its WebEx videoconferencing software that could be exploited to compromise meeting attendees systems by simply opening a booby-trapped Flash file shared in a meeting. About the vulnerability (CVE-2018-0112) The flaw is due to insufficient input validation by the Cisco WebEx clients, and affects Cisco WebEx Business Suite clients, Cisco WebEx Meetings, and Cisco WebEx Meetings Server. (The Cisco WebEx Business Suite (WBS) meeting services and Cisco WebEx Meetings More

The post Cisco plugs critical hole in WebEx, users urged to upgrade ASAP appeared first on Help Net Security.


Salmonella & Illnesses: 206 Million Eggs Recalled SoylentNews

Common Dreams reports

[April 17] the Food and Drug Administration issued a report[PDF] based on inspections of Rose Acre Farms from March 26-April 11, and a review of facility records from September 2017. On [April 13], Rose Acre Farms announced a recall of 206 million shell eggs after federal investigators found that illnesses in multiple states were linked to a strain of Salmonella that was found at the company's facility in North Carolina. The FDA report shows an "ongoing rodent infestation" at the facility and "insanitary conditions and poor employee practices" that allow for the spread of pathogens. The FDA had also previously found "alarmingly high rodent populations" and salmonella contamination at another facility owned by the company in 2011.

In response, Food & Water Watch Executive Director Wenonah Hauter issued [a statement which included}:

"This most recent Salmonella outbreak resulting in a massive recall is another example of how the ultra-consolidated factory farm system can have major consequences for food safety. That one facility can so quickly supply so many stores with tainted food shows that we need more regulation, not less, of our food supply. And repeated violations over the years show that the company continues to act recklessly where food safety protocols are concerned."

Note that the recall is for "shell eggs".
It appears that processed foods in which eggs from this source have been used are not covered.

Original Submission

Read more of this story at SoylentNews.


Facebook Plans to Build Its Own Chips For Hardware Devices The Hacker News

A new job opening post on Facebook suggests that the social network is forming a team to build its own hardware chips, joining other tech titans like Google, Apple, and Amazon in becoming more self-reliant. According to the post, Facebook is looking for an expert in ASIC and FPGAtwo custom silicon designs to help it evaluate, develop and drive next-generation technologies within Facebook


The Patent Microcosm, Patent Trolls and Their Pressure Groups Incite a USPTO Director Against the Patent Trial and Appeal Board (PTAB) and Section 101/Alice Techrights

Trying to make it sound like patent maximalism is a patriotic duty

A tractor's oil pressure guage

Summary: As one might expect, the patent extremists continue their witch-hunt and constant manipulation of USPTO officials, whom they hope to compel to become patent extremists themselves (otherwise those officials are defamed, typically until theyre fired or decide to resign)

THE US Supreme Court, SCOTUS, wont stop PTAB (based on Oil States predictions) and it stands firmly behind Alice. So the patent extremists now lean hard on the USPTO, in particular its new Director, who himself came from the patent microcosm.

We wish to remind readers that patent lawyers make a living out of intimidation; they are bullying, threatening and suing people. Theyre quite often sociopaths, so their attitude towards USPTO officials (or publishers like me whom they SLAPP) is consistent with their occupation. Its just what theyre trained to do; colleagues and classmates of theirs are largely the same.

We wish to remind readers that patent lawyers make a living out of intimidation; they are bullying, threatening and suing people.No Oil States Decision Today from the Supreme Court, one patent maximalist bemoaned a couple of days ago as if theres a chance theyll get their way (abolishing PTAB or its IPRs). Watch this anti-PTAB site doing its marketing. These people are attempting to make a business by dancing on a grave.

A couple of days ago CCIA wrote about yesterdays hearing, in which Director Iancu faced some grilling over the sanity of the patent system. To quote the CCIA (which generally represents technology companies):

Tomorrow, members of the Judiciary Committee will have the opportunity to point out to Director Iancu that predictability, stability, and positivity are in fact already here, in large part due to the implementation of IPR and 101. Instead, the Director...


Unlock & Talk: Open Source Bootloader & Modem Hackaday

During the early years of cell phones, lifespan was mainly limited by hardware (buttons wearing out, dropping phones, or water damage), software is a primary reason that phones are replaced today. Upgrades are often prompted by dissatisfaction with a slow phone, or manufacturers simply stopping updates to phone software after a few years at best. [Oliver Smith] and the postmarketOS project are working to fix the update problem, and have begun making progress on loading custom software onto cellphone processors and controlling their cellular modems.

Since [Tom Nardi] introduced Hackaday readers to postmarketOS, the team has made progress on compiling a standard bootloader for MediaTek System-on-Chip (SoC) processors. Many Android phones use the MIT-licensed Little Kernel as the base of their bootloader and then apply custom closed-source modifications. [McBitter] has worked to eliminate this closed-source code by porting Little Kernel to the MT6735P used in the Coolpad Modena 2. By understanding the modifications MediaTek used for this particular SoC, the postmarketOS team hopes to use their modified, open-source Little Kernel bootloader with other MediaTek-based devices. While progress has been difficult and attempts at using emulators to probe bootloader memory have failed, [McBitter] was able to decode the DRAM configuration settings by searching for a leaked portion of the configuration strings. Now that he can set up the DRAM, there should be few barriers to running Little Kernel.



'iTunes Wi-Fi Sync' Feature Could Let Attackers Hijack Your iPhone, iPad Remotely The Hacker News

Be careful while plugging your iPhone into a friend's laptop for a quick charge or sharing selected files. Researchers at Symantec have issued a security warning for iPhone and iPad users about a new attack, which they named "TrustJacking," that could allow someone you trust to remotely take persistent control of, and extract data from your Apple device. Apple provides an iTunes Wi-Fi sync


Maine Supreme Court Approves Ranked-Choice Voting for 2018 Elections SoylentNews

Common Dreams reports

Election reform advocates on [April 18] praised a decision by Maine's Supreme Court, upholding the use of ranked-choice voting for the state's upcoming primary elections, saying the ruling demonstrated that the court heeded the demands of Maine voters.

[...]Unlike in traditional voting, in which the candidate with the largest share of votes wins--even if he or she is far from capturing a majority of the support--in ranked choice voting, voters rank each candidate in order of preference. If no candidate has a majority after the first count, the least-popular contender is eliminated, voters' ballots are added to the totals of their second-ranked candidates, and the ballots are recounted. The eliminations and recounts continue until one candidate has a majority.

Supporters of the system say it increases voter turnout and proportional representation.

Maine's June 12 multi-party primary elections, in which voters will choose candidates for governor and congressional districts, will now make history as the first state election to use ranked-choice voting.

Fifty-two percent of Maine voters supported the system in a November 2016 ballot initiative, but lawmakers passed a bill last year delaying its implementation until December 2021 and argued that the state could not use a new voting system without direction from the legislature. The state Senate also threatened to repeal ranked-choice voting altogether if it could not pass a constitutional amendment by then.

More than 77,000 Maine residents signed a petition saying any repeal of the system by the legislature should be voided.

"The Maine legislature has changed or repealed all four of the initiatives passed by Maine voters in 2016", said Kyle Bailey of the Committee for Ranked Choice Voting in a statement on Tuesday. "Today's decision by the Maine Supreme Court confirms that the Maine people are sovereign and have the final say."

The Portland Press Herald, Maine's largest circulation daily newspaper, has extensive background details in their April 17th story: Ranked-choice voting will be used for June primaries, Maine supreme court rules.



Rise of the Tomb Raider Linux Performance On AMD Radeon GPUs Phoronix

Yesterday Feral announced that the long-awaited Linux release of Rise of the Tomb Raider would be coming tomorrow and now they have honored that release. Rise of the Tomb Raider is now natively available for Linux and this port is exclusively relying upon the Vulkan graphics API for rendering. Here are our initial benchmarks of Rise of the Tomb Raider on Linux with Radeon GPUs while making use of the Mesa RADV driver.


Taringa - 27,971,100 breached accounts Have I Been Pwned latest breaches

In September 2017, news broke that Taringa had suffered a data breach exposing 28 million records. Known as "The Latin American Reddit", Taringa's breach disclosure notice indicated the incident dated back to August that year. The exposed data included usernames, email addresses and weak MD5 hashes of passwords.


Microsofts Lobbying for FRAND Pays Off as Microsoft-Connected Patent Troll Conversant (Formerly MOSAID) Goes After Android OEMs in Europe Techrights

Royalty stacking until free/libre platforms become very expensive

Coin stacking

Summary: The FRAND (or SEP) lobby seems to have caused a lot of monopolistic patent lawsuits; this mostly affects Linux-powered platforms such as Android, Tizen and webOS and there are new legal actions from Microsoft-connected patent trolls

EARLIER THIS week we wrote a couple of short articles that alluded to Samsungs small victory over Huawei. For those who dont know, Huawei is a highly government (or regime) connected entity, more so than a corporation as is known in Western democracies. Huawei nowadays uses patents in an effort to embargo the competition, but that hasnt been particularly successful outside China (where government connections help). The Asian giants almost always use Android; this includes Huawei and Samsung, which also has the Linux-based Tizen (LG has the Linux-based webOS). As one site put it yesterday:

Back in January, we updated you on the Huawei vs. Samsung patent infringement lawsuit. The big news was that a Chinese court found in favor of Huawei in that dispute.

The patent infringement had to do with Samsung using Huaweis cellular technology and software patents in various Samsung devices, without paying Huawei the necessary licensing fees. Samsung denied any wrongdoing (as usual), but the court said that Huaweis patents were indeed infringed upon, and Samsung would have to pay a fine and halt Chinese production and sales of the infringing devices.

Docket Navigator also wrote about Huawei Technologies Co., Ltd. et al v Samsung Electronics Co., Ltd. et al, showing that the US patent system/law suddenly becomes friendlier (to engineers, not lawyers) than Chinas. To quote:

The court granted defendant Samsungs motion for an antisuit injunction prohibiting plaintiff Huawei from enforcing injunction orders issued by a Chinese court and found that the Chinese injunction orders would frustrate domestic policies.

Boasting a new Samsung patent that we criticised the other day,...


To Understand Why People Say That Lawyers are Liars Look No Further Than Misleading Promotion of Software Patents Techrights

Lawyers are Liars
Credit: Book cover by Mark Kohler

Summary: Some of the latest misleading claims from the patent microcosm, which is only interested in lots and lots of patents (its bread and butter is monopolies after all) irrespective of their merit, quality, and desirability

THE happenings at the USPTO have been particularly noteworthy this past week. Well say a lot about it over the weekend because we prefer to cover EPO scandals as a matter of priority. One aspect we cant quite wait until the weekend to cover is the lobbying and pressure put on Andrei Iancu. Well cover this in the post after our next post. This post will focus on software patents and the next one on litigation.

The patent maximalists are fuming. They have become rather nasty and unpleasant. Some sent me threats by post. Yesterday, for example, Watchtroll (Gene Quinn and Steve Brachmann) reran the China! scaremongering. Increases in Innovation, Patent Boom Leads to Development in China, says Watchtrolls headline. But patents have nothing to do with it, its just typical Watchtrollism; its watching after patent trolls interests by promoting patent maximalism. We already did a lot of articles debunking this China! nonsense. Its growing in influence not owing to patents but in spite of patents. China even permits software patents now; does that make China a software powerhouse? Not by a long shot! Its India, where such patents are banned, which takes the jackpot.

Its growing in influence not owing to patents but in spite of patents. China even permits software patents now; does that make China a software powerhouse? Not by a long shot! Its India, where such patents are banned, which takes the jackpot.In our view, patent maximalism is a flawed mindset and a brain virus; one lawyer typically poisons the minds of others with patent maximalism. It has become like a faith and a religion; theyre unable to see facts and instead saturate their minds with more of their nonsense, typically in exclusionary echo chambers that exclude people not like them. These are supposedly well-educated individuals, but greed outweighs the wits and they know they can make more money with patent maximalism (more litigation, draining money out of practising...


Engine of Southwest Airlines 737 Explodes; Kills 1 Passenger, Injures 7 SoylentNews

In an excellent article, jam-packed with details, The Seattle Times reports: (Javascript required)

One passenger died and several others were injured [April 18] when a Boeing 737 operated by Southwest en route from New York to Dallas suffered a serious engine blowout. Shrapnel broke a passenger window and penetrated the fuselage, forcing an emergency landing in Philadelphia.

[...] Southwest Flight 1380 [...] suffered a serious engine blowout 20 minutes into the flight at 32,500 feet

[...] The left engine exploded with such force that shrapnel penetrated the aircraft's fuselage and broke a window in the passenger cabin, causing depressurization and the deployment of oxygen masks.

The pilots--Capt. Tammie Jo Shults and an unidentified co-pilot--guided the plane carrying 144 passengers and five crew to a smooth landing. According to flight-tracking service FlightAware, the jet landed 20 minutes after the explosion.

Emergency vehicles drenched the damaged left engine in foam to prevent a fire as passengers exited the plane via stairs on the right side.

The woman who died was identified by Albuquerque TV news station KOAT as Jennifer Riordan, 43, a mother of two children and vice president of community relations at Wells Fargo in Albuquerque, New Mexico.

In preliminary briefings, National Transportation Safety Board (NTSB) Chairman Robert Sumwalt said that inspection of the damaged engine revealed that one of the titanium blades on the big fan had broken off at the root, and that there was evidence of metal fatigue at the site where it broke.

He said metal fatigue is a major problem.

[...] Southwest CEO [Gary Kelly] said the airplane had undergone a routine maintenance inspection two days earlier, on April 15.

Read more of this story at SoylentNews.


Serious Sam 4: Planet Badass Is Coming With Linux Support Phoronix

Croteam today released a trailer for their upcoming game Serious Sam 4: Planet Badass...


AMDGPU DRM Gets "GFXOFF" Patches To Turn Off Graphics Engine Phoronix

AMD's Huang Rui has posted a set of 20 patches providing "GFXOFF" support for the AMDGPU Direct Rendering Manager Linux kernel driver...


Raspberry Pi W Antenna Analysis Reveals Clever Design Hackaday

The old maxim is that if you pay peanuts, you get a monkey. Thats no longer true, though: devices like the Raspberry Pi W have shown that a $10 device can be remarkably powerful if it is well designed. You might not appreciate how clever this design is sometimes, but this great analysis of the antenna of the Pi W by [Carl Turner, Senior RF Engineer at Laird Technology] might help remind you.

[Carl] used some fancy toys in his analysis, such as the awesome-looking antenna test chamber that his employer uses to test designs. He used this to measure two very interesting things; the radiation pattern of the antenna, and the efficiency. Simply put, the efficiency is a measure of how much of the energy you push into an antenna is emitted as RF radiation. There is always a little loss, but he found that the Pi W antenna has decent efficiency, with -3.5 dB losses at WiFi frequencies. Thats nowhere near as good as the stand-up antennas on your wireless router, but remember that the WiFi antenna on the Pi W is tiny compared to them: it is a small spot on the PCB made by removing several layers of copper, creating what engineers call a resonant chamber. That makes it a remarkable bit of engineering, keeping the cost down and using the copper layers that are already on the board to create the antenna rather than adding a new component.

The radiation pattern of the Pi W is also interesting. Because the antenna is located right on th...


48 million people put at risk after firm that scraped social networks left data exposed for anyone to download Graham Cluley

Chances are that youve never heard of Washington-based data firm LocalBlox. But that doesnt mean that they havent heard of you. And it doesnt mean that your personal information hasnt been recklessly exposed through their sloppy disregard for the most basic security.

Read more in my article on the Hot for Security blog.


When News About the EPO is Dominated by Sponsored Reports and Press Releases Because Publishers Are Afraid of (or Bribed by) the EPO Techrights

The EPO sent Fieldfisher, which seeks to profit from the UPC, to bully us several times

Fieldfisher and UPC
SLAPP action: In their own words

Summary: The lack of curiosity and genuine journalism in Europe may mean that serious abuses (if not corruption) will go unreported

THE EPO scandals will hopefully be covered here as often as they used to be. Weve slowed down a bit in recent months even though theres no lack of material to cover. Whats disheartening, however, is seeing how the media no longer writes about EPO scandals. Almost never!

Whats disheartening, however, is seeing how the media no longer writes about EPO scandals.
Yesterday we found nothing but this press release about a patent grant, the EPO was mentioned in this sponsored report about Asia, and there was another one about Brexit. UK patent protection will continue to be available through the EPO regardless of how Brexit proceeds, it says, but nobody ever doubted that (thats just a talking point of Team UPC in the UK). From the press release:

Provectus Biopharmaceuticals, Inc. (OTCQB: PVCT, (Provectus or the Company), a clinical-stage biotechnology company developing PV-10 as the first small molecule oncolytic immunotherapy for solid tumor cancers, today announced that the Japan Patent Office (JPO) had granted and the European Patent Office (EPO) had allowed the Companys patent application fo...


Another Critical Flaw Found In Drupal CorePatch Your Sites Immediately The Hacker News

It's time to update your Drupal websites, once again. For the second time within a month, Drupal has been found vulnerable to another critical vulnerability that could allow remote attackers to pull off advanced attacks including cookie theft, keylogging, phishing and identity theft. Discovered by the Drupal security team, the open source content management framework is vulnerable to


Second-Largest Blackout in World History Hits Puerto Rico SoylentNews

Vox reports

Another blackout hit Puerto Rico Wednesday morning [April 18], the Associated Press reported, cutting off electricity across the whole island and once again undermining the fragile progress made in restoring power in the [seven] months since Hurricane Maria struck.

The Puerto Rico Electric Power Authority said that it could be 24 to 36 hours before power is restored to the areas that had it. Its priorities are to get electricity back to hospitals, the San Juan Airport, water systems, and financial centers

The outage was caused by a bulldozer hitting a power line while trying to remove a collapsed transmission tower, according to El Nuevo Dia.[1] The company responsible was D. Grimm, a subcontractor for Cobra Energy, which received a $200 million contract to repair Puerto Rico's devastated power grid.

Cobra was selected alongside Whitefish Energy Services in the aftermath of the hurricane, but the deals drew scrutiny from Congress because the companies had limited experience in grid repair on such a large scale.

[...] more than 61,000 utility customers[PDF] haven't had electricity since last September, the US Department of Energy reported earlier this month. Since "customer" typically refers to a household, which can encompass several people, estimates indicate that more than 100,000 people haven't had power since the storm.

[...] The blackout is the largest[2] in US history and is now the second-largest in the world. Only Typhoon Haiyan, one of the largest tropical storms ever to make landfall and the deadliest storm ever to hit the Philippines, had a bigger impact on electricity service.

[1] En Espaol
[2] As measured in millions of customer hours of lost electricity service.

Original Submission

Read more of this story at SoylentNews.


Phantasmic Phoenicia Terra Forming Terra

I always wondered about Phoenicia simply because the closer you looked the further away it got.  What does not exist is a land based city or even a people calling themselves Phoenicians ever.

What does exist is a global community of sea men who resided wherever they were comfortable and who easily escaped when they were not.  There was always another port down the coast happy to see them.  Thus even Levantine seamen means little.

It also speaks to the Genesis of the Atlanteans who at least had a city that was lost.

What does ring home is that such folk were ungovernable but could be hired.  Piracy was likely handled internally as operated at Port Royale.  That it did coalesce to produce a serious force appears rarely but famously as the Sea Peoples in and around the time of the dissolution of the Atlantean world through subsidence.

After that event we had a well established sea traffic in the Mediterranean and North Atlantic which remained independent and without a land home although the mines in Cornwall, Wales, and Georgia surely provided most of the manpower.

Phantasmic Phoenicia 

The British, Irish and Lebanese have all claimed descent from the ancient Phoenicians. But ancient Phoenicia never existed

Women of Phoenicia 1879, by Robert Fowler. Image by Public Catalogue Foundation. Supplied by National Museums Liverpool

Josephine Quinn is an associate professor in ancient history at Worcester College, University of Oxford. Her latest book is In Search of the Phoenicians (2017).

Modern nationalism created history as we know it today: what we learn in school, what we study at university, what we read at home is all shaped by the forms and norms of our nation-states. Modern nationalism took history from the province of the wealthy gentleman amateur, as nationalisms focus on literacy and organised education professionalised and democratised the past. And in return, history is called upon to justify nationalism itself, as well as the existence of particular nation-states;...


What is good science? Terra Forming Terra

When your understanding of physics establishes that empirical infinity is a large number and that the inverse is a small number establishing the scaling system of the universe, it soon becomes impossible to securely observe what must be the foundation details.

It has been possible to image a neutron sort of. Yet that neutron could by constructed from 600 dark matter elements or so. Each dark matter element is additionally constructed from likely 1200 additional components. All while dropping the implied scale by a 1000 and then a million.

So far there is no plausible way to use our clumsy hardware see any of this and we may never be able to. 

Good science starts with learning to collect observations such as they are to establish a phenomena. It continues through learning to study observers and to find many of them. From that it is possible to enhance your potential conjecture to something you can trust to test.

If it becomes impossible to collect data, then you must contrive blank sheet conjectures that you then learn to bound and test. This is what we really have with quantum theory and it has been a fruitful approach to the physical problem of seeing the physical at the scales involved. My Cloud cosmology is orthogonal to the quantum approach and thus allows me to start with creation itself and self assemble the universe to the point in which our observations become resolved.

Both are good science as they attack the observations in two separate directions of inquiry.  Bad science takes to form of manipulating data to produce desired conclusions or outright ignoring the phenomena and bad mouthing it.....


lucid dreaming playbook MILD Terra Forming Terra

<em>Young Woman Sleeping </em> by Jean-Baptiste Santerre, Museu Nacional dArt de Catalunya. <em>Courtesy Wikipedia</em>

Suddenly we have a viable trigger protocol. From this follows creditable therapies as well. In fact all this could now lead to a serious revolution is mental health care as it allows for a planned program of useful dreams.

I would set my alarm to ring at the five hour mark or at least two hours before you normally wake up.  Then you can do the mantra as you are slipping back to sleep for the last two hours.

 All good and practical as well.  Sweet dreams
The lucid dreaming playbook: how to take charge of your dreams 



Too much Prostate testing is dangerous Terra Forming Terra

Ouch.  What makes this awful is the clear prospect of a false diagnosis simply because the treatment protocols are themselves killers.
What does remain is that urinary problems are an age related risk for men and well worth addressing with something other than a cancer diagnosis that licenses chop and dice.
Our science is getting better as well and postponement may be a viable choice as well.  It is certainly the case for those over eighty..
Too much testing is dangerous: Prostate cancer screening does NOT save lives, puts men at risk according to groundbreaking study

Friday, March 30, 2018 by: Lance D Johnson

Tags: apple peel, badcancer, badhealth, badmedicine, badscience, cancer, cancer myths, curcumin, Dangerous Medicine, fake diagnosis, false-positive, healing foods, healthcare coverage, impotence, inconclusive testing, medical myths, men's health, natural remedies, prostate health, reproductive health, resveratrol,...


How My Nobel Dream Bit the Dust - Issue 59: Connections Nautilus

You may speculate from the day that days were created, but you may not speculate on what was before that.Talmud, Tractate Hagigah 11b, 450 A.D.

To go back to the beginning, if there was a beginning, means testing the dominant theory of cosmogenesis, the model known as inflation. Inflation, first proposed in the early 1980s, was a bandage applied to treat the seemingly grave wounds cosmologists had found in the Big Bang model as originally conceived. To call inflation bold is an understatement; it implied that our universe began by expanding at the incomprehensible speed of light ... or even faster! Luckily, the bandage of inflation was only needed for an astonishingly minuscule fraction of a second. In that most microscopic ash of time, the very die of the cosmos was cast. All that was and ever would be, on a cosmic scale at leastvast assemblies of galaxies, and the geometry of the space between themwas forged.

For more than 30 years, inflation remained frustratingly unproven. Some said it couldnt be proven. But everyone agreed on one thing: If cosmologists could detect a unique pattern in the cosmoss earliest light, light known as the cosmic microwave background (CMB), a ticket
Read More

Bombers and Dinosaurs Were Both Before Their Time - Issue 59: Connections Nautilus


In the beginning it was known as TMM 41450-3. Then things got more personal.

Yes, life had already taken to the heavens, long ago in the Carboniferous, eons before TMM 41450-3s discovery in the spring of 1971. Some claim it was from gills that wings had originally sprouted, others that they grew from limbs. Some believe wings were a novelty, arising in tiny nubs that bud during development. There is little to go by; the guessing game rules. But whether wings on the Insects came from breathing or walking, in the waters or on land; whether they had or did not have a prior historythey needed to lift but ounces. And this, in comparison to TMM 41450-3, was childs play.

It was only later that the true challenge came, in the line of the Vertebrates. For there was lift and drag and thrust to navigate, and the terrible weight of the bones. Yes, after TMM 41450-3 evolution would yet converge, copying the ingenious solution. But before the birds, before the bats, before the planes, it was the lizards who took to the skies.



Much had transpired since the first fish walked onto land. For after a time, by
Read More

The 315-Year-Old Science Experiment - Issue 59: Connections Nautilus

The most arrogant astronomer in Switzerland in the mid-20th century was a solar physicist named Max Waldmeier. Colleagues were so relieved when he retired in 1980 that they nearly retired the initiative he led as director of the Zurich Observatory. Waldmeier was in charge of a practice that dated back to Galileo and remains one of the longest continuous scientific practice in history: counting sunspots.

The Zurich Observatory was the world capital for tallying sunspots: cool dark areas on the suns surface where the circulation of internal heat is dampened by magnetic fields. Since the 19th century, astronomers had correlated sunspots with solar outbursts that could disrupt life on Earth. Today scientists know the spots mark areas in the sun that generate colossal electromagnetic fields that can interfere with everything from the Global Positioning System to electricity grids to the chemical makeup of our atmosphere.

What alienated Waldmeiers potential Swiss successors was his hostility toward methods other than his own. In the space age, he insisted on counting sunspots by eye, using a Fraunhofer refracting telescope, named after its 18th-century inventor, installed by the first Zurich Observatory director, Rudolf Wolf, in 1849. (With Waldmeiers legacy uncertain, his assistant walked off
Read More


LLVM Is Playing A Big Role With Vulkan/SPIR-V Compilers Phoronix

The usage of LLVM as part of the graphics driver stack continues to be picked up now especially in the Vulkan/SPIR-V world...


IsoHunt Founder Returns With New Search Tool TorrentFreak

Of all the major torrent sites that dominated the Internet at the beginning of this decade, only a few remain.

One of the sites that fell prey to ever-increasing pressure from the entertainment industry was isoHunt.

Founded by the Canadian entrepreneur Gary Fung, the site was one of the early pioneers in the world of torrents, paving the way for many others. However, this spotlight also caught the attention of the major movie studios.

After a lengthy legal battle isoHunts founder eventually shut down the site late 2013. This happened after Fung signed a settlement agreement with Hollywood for no less than $110 million, on paper at least.

Launching a new torrent search engine was never really an option, but Fung decided not to let his expertise go to waste. He focused his time and efforts on a new search project instead, which was unveiled to the public this week.

The new app called WonderSwipe has just been added to Apples iOS store. Its a mobile search app that ties into Googles backend, but with a different user interface. While it has nothing to do with file-sharing, we decided to reach out to isoHunts founder to find out more.

Fung tells us that he got the idea for the app because he was frustrated with Googles default search options on the mobile platform.

I find myself barely do any search on the smartphone, most of the time waiting until I get to my desktop. I ask why? Fung tells us.

One of the main issues he identified is the fact that swiping is not an option. Instead, people end up browsing through dozens of mobile browser tabs. So, Fung took Googles infrastructure and search power, making it swipeable.

From a UI design perspective, I find swiping through photos on the first iPhone one of the most extraordinary advances in computing. Its so easy that babies would be doing it before they even learn how to flip open a book!

Bringing that ease of use to the central way of conducting mobile search and research is the initial eureka I had in starting work on WonderSwipe, Fung adds.

That was roughly three years ago, and a few hours ago WonderSwipe finally made its way into the App store. Android users will have to wait for now, but the application will eventually be available on that platform as well.

In addition to swiping through search results, the app also promises faster article loading an...


The Boards of Appeal at the European Patent Organisation (EPO) Complain That They Are Understaffed, Not Just Lacking the Independence They Depend on Techrights

The Office still controls and sometimes punishes judges

A shocked Battistelli

Summary: The Boards of Appeal have released a report and once again they openly complain that theyre unable to do their job properly, i.e. patent quality cannot be assured

THE management of the EPO has, in our humble assessment, destroyed the EPO. Its broken beyond repair. It may never recover. Even leadership has been compromised as its now succession-based, with Battistelli choosing his successor. Not to mention all the toxic people he brought in after he had seized power. Its grotesque, yet thats where we are today. To be most frank, I do not think EPO will ever recover, not even with reporting that exposes the corruption. Itll like abuse is just far too deeply embedded in the Organisation now, not just the Office. Oversight has been obliterated. Assumptions of goodwill (e.g. given huge budget with endless power and minimal oversight) might seem OK in theory. When you put a thug in charge, as happened about a decade ago, it will inevitably go bonkers. Even the media, which is supposed to cover such abuses, is being bribed by the Organisation. Its not a very obvious bribe, but it still is a soft bribe (we covered that subject a decade ago) and it has more or less the same effects. Academia too has been compromised. EPO budget, instead of improving the integrity of the EPO, has helped the EPO poison everything. Judges are being bullied, bloggers like myself habitually receive legal threats, votes are allegedly being bought, and my site (Techrights) has been blocked/banned by the EPO for over 3 years not because of falsehoods but because it helped expose EPO abuses.

What gives?

Judges are being bullied, bloggers like myself habitually receive legal threats, votes are allegedly being bought, and my site (Techrights) has been blocked/banned by the EPO for over 3 years not because of falsehoods but because it helped expose EPO abuses.Where are so-called news sites about patents? Do they not care? Not even European sites? The systems they rely on (for coverage) are rotting away. Look at IAM! Benot Battistelli is joined by the hip to it. This patent trolls lobby, IAM, has given a keynote talk to him (Palace Hotel in San Francisco) one in which he will promote software patents. Joff Wild...


OpenBSD Community Goes Gold for 2018! OpenBSD Journal

Ken Westerback (krw@ when wearing his developer hat) writes:

Monthly paypal donations from the OpenBSD community have made the community the OpenBSD Foundation's first Gold level contributor for 2018!

2018 is the third consecutive year that the community has reached Gold status or better.

These monthly paypal commitments by the community are our most reliable source of funds and thus the most useful for financial planning purposes. We are extremely thankful for the continuing support and hope the community matches their 2017 achievement of Platinum status. Or even their 2016 achievement of Iridium status.

Sign up now for a monthly donation!

Note that Bitcoin contributions have been re-enabled now that our Bitcoin intermediary has re-certified our Canadian paperwork.


The One-Transistor Flip-Flop SoylentNews

Submitted via IRC for TheMightyBuzzard

A flip-flop is one of the most basic digital electronic circuits. It can most easily be built from just two transistors, although they can and have been built out of vacuum tubes, NAND and NOR gates, and Minecraft redstone. Conventional wisdom says you can't build a flip-flop with just one transistor, but here we are. [roelh] has built a flip-flop circuit using only one transistor and some bizarre logic that's been slowly developing over on

[...] The single-transistor flip-flop works just like any other flip-flop there are set and reset pulses, and a feedback loop to keep the whatever state the output is in alive. The key difference here is the addition of a clock signal. This clock, along with a few capacitors and a pair of diodes, give this single transistor the ability to store a single bit of information, just like any other flip-flop.

That's damned nifty.


Original Submission

Read more of this story at SoylentNews.


15 Albert Einstein quotes that reveal the mind of a true genius Lifeboat News: The Blog

Albert Einstein died exactly 63 years ago today.

Albert Einstein wasnt just a brilliant physicist he was also a master at explaining the human condition.


RADV Driver Lands Support For Vulkan's New Descriptor Indexing Extension Phoronix

Earlier this month with the Vulkan 1.1.72 specification update was the new VK_EXT_descriptor_indexing extension that is quickly being well received by developers...


Browsing Modern Day BBS on the Epson PX-8 Laptop Hackaday

[Blake Patterson] is one of these people, and he writes in to tell us about his recent experiments with using a particularly gorgeous example the Epson PX-8 Geneva laptop on modernized BBSs. The form factor of the device makes it a fairly convenient client for chatting, despite the somewhat unusual screen. Luckily, modern BBS software is able to cope with the PX-8s 80 character by 8 line LCD display, its just a matter of getting the thing online.

The trick is tethering the PX-8 to a Linux machine as a serial terminal. [Blake] had to build a serial cable for the laptop, and then used a basic USB-to-serial converter to get it connected to a Raspberry Pi. Once youve logged in over serial, you can simply fire off a telnet command to connect to the BBS of your choice. In the video after the break, he demonstrates what its like browsing and chatting on a BBS using the PX-8. The screen certainly takes a bit of getting used to, but actually works fairly well given the nature of the BBS interface.

[Blake] recently gave us a look at a Wi-Fi modem for retro computers based on the ESP8266, if youd rather cruise your favorite BBS without a dangling Pi.


Intel Opens Up nGraph Source Code For DNN Model Compiler Phoronix

Intel tonight announced they are open-sourcing their nGraph compiler code, which serves as a framework-neutral deep neural network model compiler...


DNA methylation-based biomarkers and the epigenetic clock theory of ageing Lifeboat News: The Blog

Biomarkers of ageing based on DNA methylation data enable accurate age estimates for any tissue across the entire life course. Horvath and Raj review the development of these epigenetic clocks and how they link to biological ageing.


Experts are observing Drupalgeddon2 (CVE-2018-7600) attacks in the wild Security Affairs

After the publication of a working Proof-Of-Concept for Drupalgeddon2 on GitHub experts started observing attackers using it to deliver backdoors and crypto miners.

At the end of March, the Drupal Security Team confirmed that a highly critical vulnerability (dubbed Drupalgeddon2), tracked as CVE-2018-7600, was affecting Drupal 7 and 8 core and announced the availability of security updates on March 28th.

The vulnerability was discovered by the Drupal developers Jasper Mattsson.

Both Drupal 8.3.x and 8.4.x are no more supported, but due to the severity of the flaw, the Drupal Security Team decided to address it with specific security updates and experts called it Drupalgeddon2.

Drupal development team released the security update in time to address CVE-2018-7600.

After the publication of a working Proof-Of-Concept for Drupalgeddon2 on GitHub for educational or information purposes, experts started observing bad actors attempting to exploit the flaw.


A week after the release of the security update, the experts at security firm Check Point along with Drupal experts at Dofinity analyzed the CMS to analyzed the Drupalgeddon2 vulnerability and published a technical report on the flaw.

After the publication of the report. the expert Vitalii Rudnykh shared a working  Proof-Of-Concept for Drupalgeddon2 on GitHub for educational or information purposes.

Immediately after the disclosure of the PoC, security experts started observing bad actors attempting to exploit the flaw.

Over the weekend, several security firms observed threat actors have started exploiting the flaw to install malware on the vulnerable websites, mainly cryptocurrency miners.

The experts at the SANS Internet Storm Center reported several attacks delivering a cryptocurrency miner, a PHP backdoor, and an IRC bot written in Perl....


NEW 'Off The Hook' ONLINE 2600 - 2600: The Hacker Quarterly

NEW 'Off The Hook' ONLINE

Posted 19 Apr, 2018 3:53:04 UTC

The new edition of Off The Hook from 18/04/2018 has been archived and is now available online.


Mentally Ill Woman Wearing a Wig and Carrying a Loaded Gun, a Passport, and $100,000 in Cash Arrested After Driving to CIA Headquarters

Via: WTOP: A woman who drove into the CIA headquarters compound in McLean, Virginia, with a loaded gun, a passport and $100,000 in cash while wearing a wig is being held without bond. Charging documents said Beth Huth drove her white Kia Soul onto CIA property in Langley last Friday afternoon past signs restricting access []


[slackware-security] gd (SSA:2018-108-01) Bugtraq

Posted by Slackware Security Team on Apr 18

[slackware-security] gd (SSA:2018-108-01)

New gd packages are available for Slackware 14.2 and -current to
fix security issues.

Here are the details from the Slackware 14.2 ChangeLog:
This update fixes two security issues:
Double-free in gdImagePngPtr() (denial of service).
Buffer over-read into uninitialized memory (information leak).
For more information, see:...


GM to Slash 1500 Jobs at Lordstown, Ohio Plant SoylentNews

The World Socialist Web Site reports:

In spite of a continuous chorus in the media of a booming economy creating robust job numbers, General Motors is unleashing a new round of attacks on autoworkers in North America as part of a global cost-cutting offensive against the working class.

The corporation announced on [April 13] it will cut one of two operating shifts at its massive Lordstown, Ohio, assembly plant, cutting as many as 1,500 jobs effective June 15. As recently as 2016, the plant was operating three shifts around the clock with nearly 4,000 workers. By the end of June only 1,500 will remain.

As sales for the compact Chevy Cruze, the only vehicle produced at the facility, began to slip, GM shuttered the third shift in January 2017, axing 800 jobs. Over the course of 2017, the plant was idled for weeks at a time and rumors began to circulate about the impending layoffs.

As an indication of the severity of the cuts, this is the first time since the recession of the 1980s that the plant will operate with only one shift.

[...] The company sold 450,000 fewer vehicles to dealers last year than they did in 2016, but because of aggressive cost-cutting attacks on the workers, imposed by the union, which include everything from an expansion of Temporary Part Time employees at less than half pay, widespread layoffs and shutdowns[,] GM pretax profits for 2017 topped $12.8 billion.

US passenger car sales are on track to decline for the fifth straight year while sales of light trucks are setting records. US sales of compact cars dropped 10 percent in the first quarter and 5.8 percent through 2017.

Lordstown is not the only plant affected by this shift. GM's Detroit-Hamtramck factory, for example, relies heavily on production of small and midsize sedans, including the Buick LaCrosse, Cadillac CT6, Chevrolet Impala, and the Chevrolet Volt. In October, the automaker announced plans to cut about 200 jobs there and halt production beginning November 20 through the Christmas break, affecting 1,500 jobs over the holidays. The second shift was eliminated in March 2017, eliminating 1,300 jobs.

[...] The same conditions are developing in [GM] factories everywhere as GM pursues its cost-cutting strategy with a vengeance.

Original Submission

Read more of this story at SoylentNews.


Narendra Malewar joins our blog team with the post Finding lost siblings of the Sun. Lifeboat News

Narendra Malewar joins our blog team with the post "Finding lost siblings of the Sun". Narendra Malewar joins our blog team with the post "Finding lost siblings of the Sun".


Finding lost siblings of the Sun Lifeboat News: The Blog

UNSW scientists in collaboration with European scientists demonstrated that the DNA, or spectra, of more than 340,000 stars in the Milky Way could aid them to search the siblings of the Sun, now scattered across the sky.

Scientists actually are working on project GALAH, the survey observations for the ambitious galactic archaeology project- which launched in late 2013 as part of a quest to uncover the formulation and evolution of galaxies. Scientists gathered the data from HERMES spectrograph at the Australian Astronomical Observatorys (AAO) 3.9-metre Anglo-Australian Telescope near Coonabarabran in NSW to collect spectra for the 340,000 stars.

The data shows that how the Universe went from having just hydrogen and helium soon after the Big Bang to being loaded with every one of the components show now on Earth that is fundamental forever.


YC Bio Providing Lab Space for Biotech Startups Working on Aging Lifeboat News: The Blog

Y Combinator announces the first wave of support for biotech startups working on aging.

Earlier this year, the Y Combinator (YC) community showed interest in supporting biotechnology focused on healthspan and age-related disease. The YC community is an influential part of the Bay Area technology-focused industry in California. It was great to hear that it was planning to support biotech startups working on aging through its YC Bio program.

The first area were going to focus on is healthspan and age-related diseasewe think theres an enormous opportunity to help people live healthier for longer, and that it could be one of the best ways to address our healthcare crisis.

YC Bio launches in June with lab space for biotech startups

The YC Bio program has started to move forward with an announcement that from June, the bio companies will all have access space at Bonneville Labs.


Baboons Work Together to Escape From Texas Biomedical Research Institute SoylentNews

Four baboons briefly escaped an enclosure at a biomedical research center by repositioning a barrel:

The barrels were in the enclosure because they are used as an enrichment tool for the animals, but after Saturday's escape, the barrels have been removed from the enclosure. Three of the baboons were recaptured within 20-30 minutes of escaping. The fourth baboon returned to the enclosure on his own.

KSAT viewers sent pictures and video of a baboon running along the road.

The Texas Biomedical Research Institute has congratulated itself on its response to the incident:

Read more of this story at SoylentNews.


SDR IF Experiments Hackaday

The R820T tuner IC is used in the popular Airspy software defined radio (SDR) as well as many of the inexpensive RTL SDR dongles. [TLeconte] did some experiments on intermediate frequency (IF) configuration of the chip, and youll find his results interesting.

Using 5 million samples per second and the devices real mode, the tests look at a what comes out when the IC reads a noise source. There are two registers that set the IF parameters, but the tests show the effects these registers have in precise terms.

According to the post, there are three things you can set:

  • Coarse IF filter bandwidth : narrow/mid/large
  • Manual fine tuning IF filter bandwidth from 0 (large) to 15 (narrow)
  • High pass filter frequency from 0 (high) to 15 (low)

Some of the settings dont make sense at least at the 5 MHz sample rate because of aliasing. However, it is instructive to see what each setting does. [TLeconte] uses Octave to visualize the data.

If you want to know more about SDR in general, we have something to get you started. If you want to do your own testing, consider using GNU Radio.


Facebook moves to exempt 1.5 billion users from new EU protections The Hill: Technology Policy

Facebook is moving to exempt 1.5 billion users in Africa, Asia, Australia and Latin America from its terms of service as dictated under a new European Union regulation, according to a Reuters report.The move comes weeks before the E.U.'s...


A Stunning Gene-Therapy Breakthrough in the Fight Against Beta Thalassemia, a Devastating Blood Disease Lifeboat News: The Blog

Jerome Groopman discusses the results of a trial described in the New England Journal of Medicine, in which twenty-two patients with beta thalassemia, a common and devastating blood disorder, were treated with gene therapy.


Warming, not cooling, donated livers may improve transplants Lifeboat News: The Blog

WASHINGTON (AP) Surgeons pack donated organs on ice while racing them to transplant patients but it may be time for a warmer approach. British researchers said Wednesday that keeping at least some livers at body temperature instead may work better.

The livers keep functioning until theyre transplanted thanks to a machine that pumps them full of blood and nutrients. Its a life-support system for the organs, and similar machines are being explored for lung and heart transplants, too.

The transplant community isnt ditching affordable ice chests for the far pricier approach just yet. But proponents hope that storing organs in a way that mimics the body might eventually increase the number of transplants by keeping precious donations usable for longer periods, and allowing use of some that today get thrown away.


French President Macron Challenges Nationalism, Promises Reform of Islam and Stronger Copyright Laws SoylentNews

French president challenges 'inward-looking nationalist selfishness' in Europe:

Emmanuel Macron has outlined his vision for the future of the European Union in Strasbourg. The 40-year-old, who secured the French Presidency in May on a pro-EU platform amid a populist surge in the bloc, delivered his highly anticipated speech to over 700 MEPs in the European Parliament on Tuesday.

Macron challenged "inward-looking nationalist selfishness" amid populist sentiment in the bloc and pushed for a more united and reinvigorated Europe. "Nationalism will lead Europe into the abyss. We see authoritarianism rising all around us," he said. "The response should not be authoritarian democracy but the authority of democracy."

Macron also sought to tackle the "poisoned debate" on migration, proposing the creation of a European programme that could subsidise local authorities which host and integrate refugees.

In a speech which touched on a range of issues, Macron recommended that copyright law be tightened to protect artists' "genius" and reiterated his support for tougher environmental legislation.

Meanwhile, Macron wants to "reform" Islam:

Speaking alongside the flag-draped coffin of a police officer killed in a terrorist attack in southern France, President Emmanuel Macron last month lay blame on "underground Islamism" and those who "indoctrinate on our soil and corrupt daily." The attack added further urgency to a project already in the works: Macron has embarked on a controversial quest to change Islam in France with the goal of integration but also preventing radicalization.

He has said that in the coming months he will announce "a blueprint for the whole organization" of Islam. And those trying to anticipate what that will look like are turning their attention to Hakim El Karoui, a leading voice on how Islamic traditions fit within French culture.

It's hard to miss that the man who appears to have Macron's ear on this most sensitive of subjects cuts a similar figure. Like the president, El Karoui is an ex-Rothschild investment banker with an elite social pedigree who favors well-tailored suits, crisp white shirts and the lofty province of big ideas. The latest of those ideas is this: that the best way to...


Jordan Peele, BuzzFeed Create Fake News Video To Warn Of Dangerous Time Lifeboat News: The Blog

We all knew this was going to happen eventually. But this is a seriously dangerous time for this kind of technology to come out, given the state of the countrys complete lack of ability to apparently discern truth from blatant self-serving lies. I wonder how many of these it would take to start a war, how many of these it would take to start a revolution.

Barack Obama appears to say, Stay woke, bitches.


HPR2534: Moving to Office 365 (and painting the ceiling) Hacker Public Radio

A couple of weeks ago we moved to a new house and I had some time on my hands to talk to you guys while painting the ceiling. Moving was very much on the forefront of my mind since I also recently moved my company's Email platform to Office 365. As a cross platform slider with a foot in each major operating system I decided to give you my first impressions of the new platform (and upset the GNU-purists) with my review.


[$] Weekly Edition for April 19, 2018

The Weekly Edition for April 19, 2018 is available.


RadeonSI Now Appears To Support "RX Vega M" With Intel Core CPUs Phoronix

One of the most common Linux hardware questions I've received dozens of times in the past few weeks alone has been over the support for "RX Vega M" Vega-based graphics processors found on select newer Intel Kabylake CPUs. It appears RadeonSI at least should now support these Radeon graphics on Intel CPUs...


Mesa 18.0.1 Released With A Number Of Fixes Phoronix

In addition to Mesa 17.3.9 being released today, Mesa 18.0.1 also rolled out the door as the first point release to last quarter's Mesa 18.0 series...


Smashing Security #074: Smashing Security isnt bullsh*t Graham Cluley

Smashing Security #074: Smashing Security isn't bullsh*t

Crime forums on Facebook, fraudsters pose as anti-fraud hotlines, and how big advertising companies are in bed with the rampant data collection of internet giants.

All this and more is discussed in the latest edition of the Smashing Security podcast by computer security veterans Graham Cluley and Carole Theriault, joined this week by special guest B J Mendelson, author of Social media is bullsh*t.


LocalBlox found leaking info on tens of millions of individuals Help Net Security

LocalBlox, a US-based data technology company that crawls, discovers, extracts, indexes, maps and augments data in a variety of formats from the web and from exchange networks and ties it all together to create profiles on individuals that contain personal, business and consumer data for marketing purposes, has been found leaking information on tens of millions of individuals. The discovery was made by UpGuard researcher Chris Vickery, who stumbled upon the unsecured Amazon Web Services More

The post LocalBlox found leaking info on tens of millions of individuals appeared first on Help Net Security.


Overnight Tech: Alleged robocall kingpin testifies before Congress | What lawmakers learned | Push for new robocall rules | Facebook changes privacy settings ahead of new data law | Time Warner CEO defends AT&T merger at trial The Hill: Technology Policy

LAWMAKERS ARE GOING AFTER ROBOCALLS: Lawmakers heard from one of the most prolific alleged robocallers as they weigh new actions to cut down on the fraudulent phone calls.Senators grilled a Florida man who is accused of making 96 million robocalls&...


Classic American Dial Phone Gets A GSM Makeover Hackaday

For sturdy utilitarianism, there were few designs better than the Western Electric Model 500 desk phone. The 500 did one thing and did it well, and remained essentially unchanged from the mid-1940s until Touch Tone phones started appearing in the early 70s. That doesnt mean it cant have a place in the modern phone system, though, as long as youre willing to convert it into a cellphone.

Luckily for [bicapitate], the Model 500 has plenty of room inside the case once the network interface is removed, because the new electronics take up a fair bit of space. Theres no build log per se, but the photo album makes it clear whats going on. An Arduino reads the hook switch and dial pulses, while a Fona GSM module takes care of the cellular side of things. It looks like a small electret mic and a speaker replace the original transmitter and receiver. As a nice touch, the original ringer is used, but instead of trying to drive it electrically, [bicapitate] came up with a simple cam mechanism on a small motor. Driven at the right speed, the cam hooks the clapper arm, rings one bell, then releases it to let the clapper spring back to hit the other bell. Everything is powered by a LiPo, so it could be taken to the local coffee shop for some hipster hijinks.

Weve seen similar retro-mods like this before using phones from all over the world; heres a British take and one from Belgium, both using phones with equally classic lines.

[via r/arduino]


AMD Blasts Nvidia Over GeForce Partner Program, G-Sync SoylentNews

AMD calls out NVIDIA's partner program, G-Sync 'gamer taxes':

A promotional push by NVIDIA has apparently tied up PC builders, and raised the ire of its competitor AMD. The current leader in the graphics card market, NVIDIA has apparently developed a GeForce Partner Program (GPP) that it claims exists to "ensure that gamers have full transparency into the GPU platform and software they're being sold, and can confidently select products that carry the NVIDIA GeForce promise."

But according to AMD, that vague explanation hides an attempt to elbow competition out of high-profile system lines. A recent report by HardOCP suggests that for PC builders to be a part of the program (with access to combined marketing efforts, bundles and rebate offers) they have to exclusively align their gaming brand with NVIDIA's GeForce hardware (and not AMD's Radeon). Things came to a head yesterday when ASUS suddenly announced a new gaming line, AREZ, that apparently exists only to keep AMD Radeon-powered PCs out of its well-known ROG gaming equipment. With AMD out of the way, the ROG line can join NVIDIA's GPP.

Also at Digital Trends, Tom's Hardware, and Notebookcheck.

Original Submission

Read more of this story at SoylentNews.


In preparation for the GDPR, CoSoSys launches Endpoint Protector 5.1 Help Net Security

CoSoSys announced the latest update of its award-winning flagship Data Loss Prevention product, Endpoint Protector 5.1, which brings added functionalities to key features and a boost for GDPR compliance. With only a few weeks to go until the EUs General Data Protection Regulation (GDPR) comes into force on May 25th, companies on both sides of the Atlantic serving European customers are rushing to reach compliance before time runs out. Placing a heavy emphasis on protecting More

The post In preparation for the GDPR, CoSoSys launches Endpoint Protector 5.1 appeared first on Help Net Security.


Facebook crime forums existed unchallenged for up to nine years Graham Cluley

Facebook crime forums existed unchallenged for up to nine years

Cybersecurity blogger Brian Krebs spent just a couple of hours last week hunting for the Facebook forums used by fraudsters, and what he discovered is alarming.


Time Warner chief: DOJ case against AT&T merger 'ridiculous' The Hill: Technology Policy

The CEO of Time Warner on Wednesday argued in court that his companys merger with AT&T is essential to compete with internet giants and dismissed the Justice Department's case against the deal as "ridiculous."Jeff Bewkes took the stand in the...


In Florida, all systems go for SpaceXs launch of space telescope Lifeboat News: The Blog

CAPE CANAVERAL, Fla. (Reuters) SpaceX said all systems and weather were go for blast-off on Wednesday of its first high-priority science mission for NASA, a planet-hunting space telescope whose launch was delayed for two days by a rocket-guidance glitch.

FILE PHOTO: NASAs Transiting Exoplanet Survey Satellite, scheduled to launch from Cape Canaveral Air Force Station in Florida, U.S., is shown in this artists rendering image obtained on April 9, 2018. Courtesy Chris Meaney/Goddard Space Flight Center/NASA/Handout via REUTERS.


Facebook asks conservatives for help amid scrutiny over data practices: report The Hill: Technology Policy

Facebook reportedly reached out to conservative groups last week to appeal for help as CEO Mark Zuckerberg was preparing to testify before Congress over its data practices. A Facebook public policy manager, Lori Moylan, emailed conservative...


Lost in Space Writer Reveals Robinsons Location: a Goldilocks Planet Lifeboat News: The Blog

In the new Netflix series Lost in Space, the Robinson family land on an unknown planet described as a Goldilocks planet by both Maureen Robinson and one of the shows writers, Burk Sharpless. The term Goldilocks planet refers to planets in the habitable zone of their solar system.


A Robot Does the Impossible: Assembling an Ikea Chair Without Having a Meltdown Lifeboat News: The Blog

And just like that, humanity draws one step closer to the singularity, the moment when the machines grow so advanced that humans become obsolete: A robot has learned to autonomously assemble an Ikea chair without throwing anything or cursing the family dog.

Researchers report today in Science Robotics that theyve used entirely off-the-shelf partstwo industrial robot arms with force sensors and a 3D camerato piece together one of those Stefan Ikea chairs we all had in college before it collapsed after two months of use. From planning to execution, it only took 20 minutes, compared to the human average of a lifetime of misery. It may all seem trivial, but this is in fact a big deal for robots, which struggle mightily to manipulate objects in a world built for human hands.

To start, the researchers give the pair of robot arms some basic instructionslike those cartoony illustrations, but in code. This piece goes first into this other piece, then this other, etc. Then they place the pieces in a random pattern front of the robots, which eyeball the wood with the 3D camera. So the researchers give the robots a list of tasks, then the robots take it from there.


Barbara Bush Remembered by Politicians and Lawmakers Around the World SoylentNews

"With the news of Barbara Bush's passing on Tuesday, lawmakers and officials from around the world shared fond words about the former first lady."

Bush, described as "a relentless proponent of family literacy," died at the age of 92, a spokesman for the family confirmed.

The BBC adds:

She was a fierce advocate of civil rights and went against many of her husband's Republican party supporters with her more liberal view on abortion rights.

In a statement from the White House, President Donald Trump said Mrs Bush would be long remembered for her devotion to country and family, "both of which she served unfailingly well".

Barack and Michelle Obama described her as "the rock of a family dedicated to public service" and as "an example of the humility and decency that reflects the very best of the American spirit".

Another former US president, Bill Clinton, said Mrs Bush was "feisty in support of her family and friends, her country and her causes".


Original Submission

Read more of this story at SoylentNews.


The One-Transistor Flip-Flop Hackaday

A flip-flop is one of the most basic digital electronic circuits. It can most easily be built from just two transistors, although they can and have been built out of vacuum tubes, NAND and NOR gates, and Minecraft redstone. Conventional wisdom says you cant build a flip-flop with just one transistor, but here we are. [roelh] has built a flip-flop circuit using only one transistor and some bizarre logic thats been slowly developing over on

[roelh]s single transistor flip-flop is heavily inspired by a few of the strange logic projects weve seen over the years. The weirdest, by far, is [Ted Yapo]s Diode Clock, a digital clock made with diode-diode logic. This is the large-scale proof of concept for the unique family of logic circuits [Ted] came up with that only uses bog-standard diodes to construct arbitrary digital logic.

The single-transistor flip-flop works just like any other flip-flop there are set and reset pulses, and a feedback loop to keep the whatever state the output is in alive. The key difference here is the addition of a clock signal. This clock, along with a few capacitors and a pair of diodes, give this single transistor the ability to store a single bit of information, just like any other flip-flop.

This is, without a doubt, a really, really weird circuit but falls well into territory that is easily understood despite being completely unfamiliar. The key question here is, why?. [roelh] says this could be used for homebrew CPUs, although this circuit is trading two transistors for a single transistor, two diodes, and a few more support components. For vacuum tube-based computation, this could be a very interesting idea that someone at IBM in the 40s had, then forgot to write down. Either way, its a clever application of diodes and an amazing expression of the creativity that can be found on a breadboard.


Constructing a Better Bike Light IEEE Spectrum Recent Content full text

This gadget projects light onto the ground to help you remain visible at night David Schneider

Bicycling at night can be dangerous, particularly if you don't put much effort into making yourself visible to drivers. Alas, many people don't. This video describes the construction of an Arduino-controlled rear light meant to make a cyclist more visible by throwing a sequence of red spots on the ground adjacent to the bike. It's not a perfect insurance policy by any means, but it's better than what many people are doingriding about on bikes at night with little or no light to advertise their presence.

Read more: Build an Attention-Grabbing Bicycle Light



Security experts at CSE CybSec ZLab malware Lab have conducted an interesting analysis of the principal Ransomware-as-a-Service platforms available on the dark web.

Over the years, the diffusion of darknets has created new illegal business models. Along with classic illegal goods such as drugs and payment card data, other services appeared in the criminal underground, including hacking services and malware development. New platforms allow crooks without any technical skills to create their own ransomware and spread it.

Ransomware is malicious code that infects the victims machines and blocks or encrypts their files, requesting the payment of a ransom. When ransomware is installed on a victim machine, it searches for and targets sensitive files and data, including financial data, databases and personal files. Ransomware is developed to make the victim machine unusable. The user has only two options: pay the ransom without having the guarantee of getting back the original files or format the PC disconnecting it from the Internet.


The rise of the RaaS business model is giving wannabe criminals an effortless way to launch a cyber-extortion campaign without having technical expertise, and it is the cause of flooding the market with new ransomware strains.

Ransomware-as-a-Service is a profitable model for both malware sellers and their customers. Malware sellers, using this approach, can acquire new infection vectors and could potentially reach new victims that they are not able to reach through a conventional approach, such as email spamming or compromised website. RaaS customers can easily obtain ransomware via Ransomware-as-a-Service portals, just by configuring a few features and distributing the malware to unwitting victims.


Naturally, RaaS platforms cannot be found on the Clearnet, so they are hidden into the dark side of the Internet, the Dark Web.

Surfing the dark web through unconventional search engines, you can find several websites that offer RaaS. Each one provides different features for their ransomware allowing users to select the file extensions considered by the encrypting phase; the ransom demanded to the victim and other technical functionality that the malware will implement...


Open-source library for improving security of AI systems Help Net Security

IBM researchers have created the Adversarial Robustness Toolbox, an open-source library to help researchers improve the defenses of real-world AI systems. Attacks against neural networks have recently been flagged as one of the biggest dangers in our modern world where AI systems are increasingly getting embedded in many technologies we use and depend on daily. Adversaries can sometimes tamper with them even if they dont know much about them, and breaking the system could result More

The post Open-source library for improving security of AI systems appeared first on Help Net Security.


Meltdown/PTI Mitigation Impact On BSDs vs. Linux Phoronix

Besides the fresh BSD/Linux disk performance tests, some other tests I ran on various BSDs and Linux distributions this week was looking at the performance impact of Intel Meltdown CPU vulnerability mitigation on each of them, namely the performance impact of using kernel page-table isolation...


Senators grill alleged robocall kingpin The Hill: Technology Policy

Senators grilled a Florida man who is accused of making 96 million robocalls during a hearing Wednesday focused on curbing fraudulent phone calls.Adrian Abramovich of Miami, who faces a $120 million fine from regulators, appeared before the Senate...


Lobbying group for Amazon, Google, Facebook hires staffer to head diversity efforts The Hill: Technology Policy

A group that lobbies on behalf of major technology companies, including Amazon, Facebook and Google, announced on Wednesday that it is hiring a new counsel and director of diversity and inclusion to improve minority representation an issue...


Senate Dems push bill to make it easier for FCC to go after robocalls The Hill: Technology Policy

A group of Senate Democrats is floating a bill that would make it easier for the Federal Communications Commission (FCC) to go after robocall scammers.The Robocall Enforcement Enhancement Act of 2018, introduced by Sen. Brian Schatz (D-Hawaii) on...


The Linux Filesystem Explained

The Linux Filesystem Explained



Tesselated Worklights Are Nifty, Modular Hackaday

Electric lighting is there anything it cant do? Coming in all manner of forms and flavours, you can get everything from a compact reading lamp to a blindingly powerful worklight for your garage. Generally, different lights are built in different ways to suit their purpose, but its not the only way to do things. Enter [slisgrinder] and the MOSAIC Lighting System.

At its heart, MOSAIC is a way of building lighting rigs out of individual modules. Where it gets interesting is the design theyre triangles! The boards carry a variety of LEDs and are laid out in a fashion that allows the power and data connections to be made between adjacent cells by laying them out next to each other.  Many boards can be tesselated together to create larger, smaller, or unusually shaped arrays. The connections are well thought out, allowing the tiles to make a connection along any one of their 3 edges, regardless of orientation.

The project began out of a desire to grow okra in an otherwise inhospitable climate; to this end, there are both general work lighting modules as well as grow light versions with UV LEDs on board. The modules can be combined in different ways and command and control is done over RS-485.

Its a tidy project that shows how a little thought can create a versatile design through the use of an unusual form factor. Weve seen modular lighting projects before, too like this entry to last years Hackaday Prize.

The HackadayPrize2018 is Sponsored by:


Researchers propose scheme to secure brain implants Help Net Security

A group of researchers from KU Leuven, Belgium, have proposed a practical security scheme that would allow secure communications between a widely used implantable neurostimulator an electrical brain implant used to treat a number of medical issues and its external device programmer. Other researchers have already noted that motivated attackers could find ways to hack brain implants due to their poor or inexistent security, and have pointed out that, while the current risk More

The post Researchers propose scheme to secure brain implants appeared first on Help Net Security.


Meteorite Diamonds Point to Destruction of an Early Solar System Proto-Planet SoylentNews

Space diamonds 'came from lost planet':

A diamond-bearing space rock that exploded in Earth's atmosphere in 2008 was part of a lost planet from the early Solar System, a study suggests.

The parent "proto-planet" existed billions of years ago before breaking up in a collision and would have been about as large as Mercury or Mars.

A team has published their results in the journal Nature Communications.

They argue that the pressures necessary to produce diamonds of this kind could only occur in [a] planet of this size.

A large planetary body inferred from diamond inclusions in a ureilite meteorite (open, DOI: 10.1038/s41467-018-03808-6) (DX)

Planetary formation models show that terrestrial planets are formed by the accretion of tens of Moon- to Mars-sized planetary embryos through energetic giant impacts. However, relics of these large proto-planets are yet to be found. Ureilites are one of the main families of achondritic meteorites and their parent body is believed to have been catastrophically disrupted by an impact during the first 10 million years of the solar system. Here we studied a section of the Almahata Sitta ureilite using transmission electron microscopy, where large diamonds were formed at high pressure inside the parent body. We discovered chromite, phosphate, and (Fe,Ni)-sulfide inclusions embedded in diamond. The composition and morphology of the inclusions can only be explained if the formation pressure was higher than 20GPa. Such pressures suggest that the ureilite parent body was a Mercury- to Mars-sized planetary embryo.

Original Submission

Read more of this story at SoylentNews.


A flaw could allow easy hack of LG Network-attached storage devices Security Affairs

Network-attached storage devices manufactured by LG Electronics are affected by a critical remote code execution vulnerability that could be exploited by attackers to gain full control of the devices.

The experts at the security firm VPN Mentor found a pre-auth remote command injection vulnerability that affects the majority of LG NAS device models.

we found a way to hack into the system using a pre-authenticated remote command injection vulnerability, which can then allow us to do virtually everything including access the data and tamper with the user data and content. states the blog post published by VPN Mentor.

The vulnerability is a pre-auth remote command injection vulnerability found in the majority of LG NAS devices.

LG Network-attached storage

The flaw ties the improper validation of the password parameter of the user login page for remote management, this means that a remote attacker can pass arbitrary system commands through this field.

As we show in the video, you cannot simply log in with any random username and password. However, there lies a command injection vulnerability in the password parameter (you have to use an interceptor like burp). We can simply trigger this bug by adding to it. continues the analysis.

To add a new user, we can simply write a persistent shell called c.php by using:

;echo > /tmp/x2;sudo mv /tmp/x2 /var/www/c.php

Entering it as a password exploits the vulnerability.

Then, by passing the following command, we can dump the users:

echo .dump user | sqlite3 /etc/nas/db/share.db"

The experts explained that it is quite simple to dump all database data and add a new user. The experts noticed that LG uses the MD5 hash algorithm to protect passwords, this means that they can be easily cracked.

Below a video PoC of the hack that shows how to exploit the vulnerability to establish a shell on the vulnerable Network-attached storage device and use it to execute...


Millions of apps are exposing sensitive & unencrypted user data HackRead

By Waqas

Security researchers at Kaspersky Lab discovered that about 4 million

This is a post from Read the original post: Millions of apps are exposing sensitive & unencrypted user data


Robots Continue Attempting to Master Ikea Furniture Assembly IEEE Spectrum Recent Content full text

These robots are slow, careful, and successful, making them way better than humans at assembling an Ikea chair Image: NTU

Apparently, one of the standards by which we should be measuring the progress of useful robotic manipulation is through the assembly of Ikea furniture. With its minimalistic and affordable Baltoscandian design coupled with questionably creditable promises of effortless assembly, Ikea has managed to convince generations of inexperienced and desperate young adults (myself included) that we can pretend to be grownups by buying and putting together our own furniture. Its never as easy as that infuritatingly calm little Ikea manual dude makes it look, though, and in terms of things we wish robots would solve, Ikea furniture assembly has ended up way higher on the priority list than maybe it should be. 

Weve seen a variety of robotic systems tackle Ikea in the past, but today in Science Robotics is (perhaps for the first time) a mostly off-the-shelf system of a few arms and basic sensors that can put together the frame of a Stefan chair kit autonomously(ish) and from scratch.

This research comes from the Control Robotics Intelligence (CRI) group at NTU in Singapore, and theyve been working on the whole Ikea chair assembly thing for a while. First, they had to teach robots to insert those wooden pins that Ikea uses to connect parts to one another:

Then youve got multiple pin insertion under uncertainty:

Next, cooperatively moving partially assembled chair pieces around:

And finally, bimanual whole-chair manipulation:

The research being presented today in Science Robotics is essentially a synthesis of these skills, all put together resulting in a fully autonomous Ikea chair frame assembly:

To help put this research in perspective, lets briefly take a look at a few other attempts at Ikea furniture assembly by robots, both from 2013:

Willow Garage:



Xen 4.11 Hypervisor Reaches The Release Candidate Stage Phoronix

The first release candidate of the upcoming Xen 4.11 virtualization hypervisor release is now available...


[$] Counting beansand morewith Beancount

It is normally the grumpy editor's job to look at accounting software; he does so with an eye toward getting the business off of the proprietary QuickBooks application and moving to something free. It may be that Beancount deserves a look of that nature before too long but, in the meantime, a slightly less grumpy editor has been messing with this text-based accounting tool for a variety of much smaller projects. It is an interesting system, with a lot of capabilities, but its reliance on hand-rolling for various pieces may scare some folks off.


Distribution Release: Trisquel GNU/Linux 8.0 News

Trisquel GNU/Linux is an Ubuntu-based desktop distribution which features free and open source software exclusively. The project's latest release, Trisquel 8.0 "Flidas", is based on Ubuntu 16.04 and includes support through to the year 2021. "The biggest internal change to the default edition is the switch from GNOME....


The Quantum Race the United States Cant Afford To Lose Lifeboat News: The Blog

The quantum race is on, and the stakes are high. The winner will gain a military and intelligence edge, as well as a first mover advantage in what is guaranteed to be a massive industry for decades to come. How will the United States fare?

Blog Post by Guest Blogger for Adam Segal.


Artificial intelligence can scour code to find accidentally public passwords Lifeboat News: The Blog

Sometimes sensitive data, like passwords or keys that unlock encrypted communications, are accidentally left open for anybody to see. Its happened everywhere from the Republican National Committee to Verizon, and as long as information can be public on the internet the trend isnt going to stop.

But researchers at software infrastructure firm Pivotal have taught AI to locate this accidentally public sensitive information in a surprising way: By looking at the code as if it were a picture. Since modern artificial intelligence is arguably better than humans at identifying minute differences in images, telling the difference between a password and normal code for a computer is just like recognizing a dog from a cat.

The best way to check whether private passwords or sensitive information has been left public today is to use hand-coded rules called regular expressions. These rules tell a computer to find any string of characters that meets specific criteria, like length and included characters. But passwords are all different, and this method means that the security engineer has to anticipate every kind of private data they want to guard against.


How to blow up a star Lifeboat News: The Blog

Supernova simulations are resolving a 50-year-old mystery about stellar death throes.


When Hackerspace Directors Burn Out Hackaday

A friend of mine once suggested that there should be a support group for burned-out former hackerspace directors. We could have our own Village of the Damned at summer camps, where wed sit moodily in the gathering twilight sipping our bourbon and Club Mate and decrying whatever misfortunes came to our space to leave such visible mental scars, or gazing hollow-eyed into the laser-tinged haze and moving gently to the pulse of the chiptune music. See thats Jenny over there, she dont say much. Hackerspace noir, where the only entry criterion is being crazy enough to stand for election to your spaces board.

You can tell [Dr. Seuss] is thinking about his next volume: <em>How The Grinch Stole Whoville Hackspace</em>. Al Ravenna, World Telegram [Public domain].You can tell [Dr. Seuss] is thinking about his next volume: How The Grinch Stole Whoville Hackspace. Al Ravenna, World Telegram [Public domain]....


MIT Spin-off Faces Daunting Challenges on Path to Build a Fusion Power Plant in 15 Years IEEE Spectrum Recent Content full text

Commonwealth Fusion Systems has pledged to build a commercial fusion reactor based on new superconducting magnets Image: Ken Filar, PSFC Research Affiliate


Music Intensifies Effects Of Anti-Hypertensive Medication SoylentNews

Research shows anti-hypertensive drugs improve heart rate more in patients who listen to music after taking medication. Among musical genres, classical music is the one with greatest efficiency at reducing arterial pressure; authors of the study speculate whether music acts on the patients' parasympathetic system, increasing their capability of absorbing medication.

In addition to remembering to take the medication prescribed by their cardiologists at the right times and going to the trouble of making healthy lifestyle changes, patients with high blood pressure (hypertension) can include a pleasing beneficial activity in routine treatment of the disease thanks to the discovery that listening to music significantly enhances the effect of anti-hypertensive drugs.

[...] "We've observed classical music activating the parasympathetic nervous system and reducing sympathetic activity," said the principal investigator of the FAPESP-funded project. The sympathetic and parasympathetic nervous systems constitute the autonomic nervous system, which maintains homeostasis. The sympathetic nervous system accelerates heart rate, constricts blood vessels and raises blood pressure. The parasympathetic nervous system controls the body at rest, slowing the heart, lowering blood pressure, and stabilizing blood sugar and adrenaline.

Original Submission

Read more of this story at SoylentNews.


Pip 10.0 has been released

The release of pip 10.0 has been announced. Some highlights of this release include the removal of Python 2.6 support, limited PEP 518 support (with more to come), a new "pip config" command, and other improvements.


Some DragonFly HAMMER2 / FreeBSD ZFS / Linux EXT4 Benchmarks Phoronix

With the recent release of DragonFlyBSD 5.2 one of the prominent changes is HAMMER2 now being considered stable for most use-cases. I've been running some benchmarks of this file-system compared to alternatives on other operating systems and have some FreeBSD / Linux reference points to share...


Critical Unpatched RCE Flaw Disclosed in LG Network Storage Devices The Hacker News

If you have installed a network-attached storage device manufactured by LG Electronics, you should take it down immediately, read this article carefully and then take appropriate action to protect your sensitive data. A security researcher has revealed complete technical details of an unpatched critical remote command execution vulnerability in various LG NAS device models that could let


A Review of Stem Cell Therapies for Alzheimers Disease Lifeboat News: The Blog

A new open access paper takes a look at the potential of regenerative medicine for the treatment of Alzheimers disease [1]. The review covers approaches such as spurring the production of new neurons and transplanting new neurons while taking a look at the disease-modeling approaches and techniques that science is now using to refine approaches to treating Alzheimers.

The authors here investigate how induced pluripotent stem cells (iPSCs) are contributing to the growing knowledge in the field by allowing researchers to create increasingly refined models of Alzheimers disease. A current problem we have is that animal models do not emulate the disease closely enough to lead to translational therapies that work in humans; this is why so many new medicines that work in mice fail in clinical trials. The review takes a look at the challenges and how science is working to develop better models.



New PyPI launched

The new PyPI has been launched. Browser traffic and API calls (including "pip install") have been redirected from the old to the new site. The old PyPI will shut down on April 30. LWN covered the new PyPI last week.


Where is HBO Silicon Valleys Real Pied Piper? Look in Ayr, Scotland IEEE Spectrum Recent Content full text

HBO's Silicon Valley turns to real-world startup MaidSafe for its decentralized Internet Photo: Ali Paige Goldstein/HBO

Pied Piper, the fictional startup of HBOs Silicon Valley, began as a data compression company. Producers during its first few seasons consulted with researchers at Stanford who specialize in compression algorithmsfirst, Tsachy Weissman and Vinith Misra, and later Dmitri Pavlichinto put a real-world spin on discussions about its technology and the whiteboards explaining it. Weissman developed a new compression metric, the Weissman Score, for the show; real-world researchers even started using it. And Misra wrote a technical paper, published online, explaining a fictional (and R-rated) improvement to the compression algorithm.

But like so many startups, Pied Piper eventually pivoted to a different business modeland a new technology. Last season, Richard Hendriks and his team changed their focus to decentralizing the Internet, that is, creating what the show explained as a peer-to-peer network of websites with no firewalls, no tolls, no government regulation, no spying.

This wasnt a unique idea, though it hadnt gotten a huge amount of notice outside of segments of the tech industry. In 2015, Brewster Kahle, founder of the Internet Archive, published a white paper making a case for a Decentralized Web, and in 2016 the Internet Archive held the first Decentralized Web Summit. Meanwhile, several real-world startups were working on developing the technology, including Anonymouse and MaidSafe. (While HBO Silicon Valley refers to a decentralized Internet, what the show describes is generally what the rest of the tech world calls a de...


Friday Hack Chat: Circuit Board Art Hackaday

We are now in a golden age of printed circuit boards. It wasnt too long ago that making your own circuit boards either involved a lot of money, or slightly less money and using some proprietary garbage PCB layout tool. Now, every board house speaks Gerber, and you can get a ten-pack of PCBs from China for five bucks. This incredible cost reduction means people are making art with printed circuit boards. Weve seen portraits, landscapes, and memes. This is truly the beginning of a new artistic medium rendered in fiberglass and soldermask.

Check out this blinky bit of art nouveau. There is a facebook group for PCB paintings, and some of the Badgelife crew are relying on woodcut and linoleum engraving techniques to create works of art in copper and fiberglass.

For this weeks Hack Chat, were going to be talking all about PCB artwork. Our guest for this weeks Hack Chat will be [Andrew Sowa], an electrical engineer, a vocal advocate of KiCad, and the guy who made more of me money. The Benchoff Nickel was created by simply taking some of the fantastic illustrations from Hackadays own [Joe Kim] and applying KiCads Bitmap2Component tool. Since the creation of the nickel, [Andrew] has been working on extending his technique to cross-hatching, backlighting, and halftones.



[$] PostgreSQL's fsync() surprise

Developers of database management systems are, by necessity, concerned about getting data safely to persistent storage. So when the PostgreSQL community found out that the way the kernel handles I/O errors could result in data being lost without any errors being reported to user space, a fair amount of unhappiness resulted. The problem, which is exacerbated by the way PostgreSQL performs buffered I/O, turns out not to be unique to Linux, and will not be easy to solve even there.


Artificial Intelligence And Its Role In Mobile App Development TechWorm

Since mobile app development is transforming our lives by turning unfeasible things into reality, Artificial Intelligence is not only a hot topic in the field of science but also a topic of exploration and development in the business industry, purposely in the industry of mobile app development.

These days, AI is not limited to Apples Siri anymore, but it is growing much more than our imaginations and the time is here to see mobile app developers putting more of artificial intelligence together in their endeavors.

Introduction to Artificial Intelligence

Well, AI or artificial intelligence is the branch of science that usually design and develop intelligent machines that totally work and react like humans. It is a brilliant way of impacting aptitude to advanced machines so they can troubleshoot problems themselves even more accurately, efficiently and rapidly than before.

A big number of well know companies and organizations are successfully using artificial intelligence in their business operations not only to accomplish their business process efficiently but to boost the productivity as well.

As mobile app development companies are using AI in business app development projects, it can boost competency of a company or business as it provides more personalized, relevant and flawless customer services at the end. Companies can easily understand customer behavior just by using the data collected by artificial intelligence in mobile apps.

Role of AI in Mobile App Development

Affirmative business growth and user engagement are the core factors that are proving the significance of the use of artificial intelligence in mobile app development services.

There are a lot of things that make huge difference between mobile apps developed with and without artificial intelligence such as

  • Collection of users data by analyzing the behavior and usage pattern of the app
  • Use of the location, contacts and daily behavior to allow the app to serve users better than before
  • Generating the maximum revenues with satisfactory and user-friendly user interfaces

There is nothing wrong to say that it is the time to experience big change in performances and process as we are now getting more AI and machine learning-driven apps from mobile app development companies.

We have a lot of live examples of trending mobile app technologies in our mobile phones that are using artificial intelligence such as Google assistant, Siri and Contra etc.

Now in this digital age we can feel free to say that increasing growth of artificial intelligence is empowering new opportunities and possibilities in mobile app development services. A mobile application developed with artificial intelligence is designed in a way that it can make right decisions itself, resource your finances an...


Anomali partners with Visa to offer global payment breach intelligence Help Net Security

Threat management and collaboration solutions provider Anomali announced a partnership with Visa to provide cyber security teams with intelligence on indicators of compromise (IoCs) drawn from Visa Threat Intelligence, to better detect and manage breaches involving payment information in retail, hospitality, restaurant and other sectors. Delivered to the Anomali platform through an API from the Visa Developer Platform, Visa Threat Intelligence enables merchants to collaborate within and across sectors to proactively mitigate threats and work More

The post Anomali partners with Visa to offer global payment breach intelligence appeared first on Help Net Security.


Vlogger loses $2M in cryptocurrency during YouTube live stream HackRead

By Uzair Amir

Ian Balina is a well-known, sponsored YouTube blogger or rather

This is a post from Read the original post: Vlogger loses $2M in cryptocurrency during YouTube live stream


A Sobering Look at Fake Online Reviews Krebs on Security

In 2016, KrebsOnSecurity exposed a network of phony Web sites and fake online reviews that funneled those seeking help for drug and alcohol addiction toward rehab centers that were secretly affiliated with the Church of Scientology. Not long after the story ran, that network of bogus reviews disappeared from the Web. Over the past few months, however, the same prolific purveyor of these phantom sites and reviews appears to be back at it again, enlisting the help of Internet users and paying people $25-$35 for each fake listing.

Sometime in March 2018, ads began appearing on Craigslist promoting part-time social media assistant jobs, in which interested applicants are directed to sign up for positions at seorehabs[dot]com. This site promotes itself as leaders in addiction recovery consulting, explaining that assistants can earn a minimum of $25 just for creating individual Google for Business listings tied to a few dozen generic-sounding addiction recovery center names, such as Integra Addiction Center, and First Exit Recovery.

The listing on advertising jobs for creating fake online businesses tied to addiction rehabilitation centers.

Applicants who sign up are given detailed instructions on how to step through Googles anti-abuse process for creating listings, which include receiving a postcard via snail mail from Google that contains a PIN which needs to be entered at Googles site before a listing can be created.

Assistants are cautioned not to create more than two listings per street address, but otherwise to use any U.S.-based street address and to leave blank the phone number and Web site for the new business listing.

A screen shot from Seorehabs instructions for those hired to create rehab center listings.

In my story...


Laser Games Techmoan

Here's a link to the Laserdock Software featured in the video.
You can buy a laser projector like the one I used on ebay:
(This is an Affiliated Link)


Please consider this as an extra video. Youll see that it was shot back in February and initially I scrapped it as I wasnt happy with the way the laser images came across on camera. Ive since added some sections and significantly re-edited it, however its still not the best. However as I mentioned in the video - it is what it is. Also the projector is a low-end model and no amount of software tweaking can fix that - its all about the hardware - if you want better results then you have to spend the money. But do you really want to spend a thousand pounds to play these games, well thats up to you, but as far as Im concerned this is the end of my experiment. Also if youre wondering about the other features of the software - download it and try it for yourself, its free. 


Pirate Party Urges Swedish Govt to Stop Copyright Troll Invasion TorrentFreak

In recent years, millions of file-sharers around the world have been ordered to pay significant settlement fees, or face legal repercussions.

These so-called copyright trolling efforts have been a common occurrence in several countries, with Sweden one of the latest hunting grounds.

Over the past months, tens of thousands of Swedes have been targeted in this manner.

The copyright holders go to court, armed with a list of IP-addresses, and when permission is granted they ask the associated ISPs for the account details of individual subscribers.

These suspected pirates then get a settlement demand in their mailbox, urging them to pay the equivalent of a few hundred dollars, or have their day in court.

As in many other countries, these practices are not without controversy. Several experts have spoken out against them, and ISPs have raised objections too. However, according to Swedish law, the rightsholders have the right to pursue these cases.

Despite its name, the Swedish Pirate Party has been relatively silent on the issue. However, that changed this week, as the party now calls on Justice Minister Morgan Johansson to take action.

The Pirate Party describes the copyright trolling efforts as extortion. It stresses that the evidence copyright holders rely on is far from solid, something they believe the courts should take into account.

It is a scandal that the Swedish judicial system facilitates the mafia-like methods of copyright trolls, says Pirate Party leader Magnus Andersson.

To condone the sending of extortion letters without reasonable ground for suspicion of criminal activity is not acceptable. We demand the Justice Minister to do something about the situation with these copyright trolls!

The Pirate Party sees plenty of opportunities to intervene. The Government could, for example, change how the IPRED directive is interpreted and demand higher scrutiny of the provided evidence.

Another option would be to work at the EU level to repeal the IPRED-directive in its entirety.

Besides calling on the Justice Minister to take action, the Pirate Party is also backing the anti-copyright troll initiative of Internet provider Bahnhof. Through this campaign, members of the public can voice their concerns to the Swedish Government.

Through these and other efforts, the Pirate Party hopes that something will be done to protect the public from the trolling practices.

We cannot accept a situation where private companies use the judicial system as a weapon of fear to extort inno...


Dem senators call on FCC to protect against robocalls The Hill: Technology Policy

A group of 15 Democratic senators are urging the Federal Communications Commission (FCC) to take further action in stopping automated solicitation calls, or robocalls. In an era when the onslaught of unwanted and abusive robocalls is on the rise,...


50,000 Minecraft users infected with hard drive wiping malware HackRead

By Waqas

Here is why you should avoid downloading mods and skins

This is a post from Read the original post: 50,000 Minecraft users infected with hard drive wiping malware


Aiseesoft FoneEraser Best iPhone Erasing Tool You Shouldnt Miss TechWorm

Want to erase all privacy data on iPhone and better protect your personal information? Aiseesoft FoneEraser is the best data removing tool to do that


Why FoneEraser Is the Best iPhone Erasing Tool

After the Facebook privacy crisis, are you pay more attention to your personal information?

In fact, you may freak yourself out if you realize how much of your information stored by Facebook, Google and other apps. For instance, Google stores your location every time you turn on the phone, knows everything youve ever searched, and Facebook stores everything from your stickers to login location. Go without saying that, your iPhone must carry lots of important data about you.

So its very necessary to delete all iPhone files thoroughly when you want to sell it on eBay. Considering that, you need to find a reliable iPhone eraser tool to get the job done. Facing so many choices in the market, which iPhone eraser is the best for you to remove all iPhone data clearly? Through lots of tests, we found Aiseesoft FoneEraser. And here is why.

Why FoneEraser Is the Best iPhone Erasing Tool

Aiseesoft FoneEraser is one powerful utility to erase all iPhone content and settings permanently and thoroughly. It provides three erasing levels optionally. You can erase any data on iPhone/iPad/iPod to better protect your privacy. This iPhone eraser tool also enables you to remove all files and settings on more than one iOS device (iPhone/iPad/iPod) simultaneously to save your time.

Erase all files and settings

For all contents related to your personal information like Music, Videos, Photos, Contacts, Text Messages/iMessages, Call history, Calendar, Notes, Reminder, Safari bookmark, iBooks, Podcast, iTunes U, Ringtones, Audio Books, Voice Memos, App, documents and various settings, FoneEraser can remove them permanently. You can get a 100% privacy guard.



Facebook announces new privacy settings ahead of EU data law The Hill: Technology Policy

Facebook announced new privacy changes on Tuesday as it prepares for a sweeping new European data law, but the company says it will stick with the targeted advertising system thats come under fire in recent weeks.The new features are...


Facebook Facial Recognition Faces Class-Action Suit SoylentNews

Facebook must face a class action lawsuit over its use of facial recognition technology, a California judge has ruled.

The lawsuit alleges that Facebook gathered biometric information without users' explicit consent.

It involves the "tag suggestions" technology, which spots users' friends in uploaded photos; the lawsuit says this breaches Illinois state law.

Facebook said the case had no merit and it would fight it vigorously.

On Monday, US District Judge James Donato ruled to certify a class of Facebook users - a key legal hurdle for a class action suit.

The class of people in question is Facebook users "in Illinois for whom Facebook created and stored a face template after June 7, 2011", according to the court order.

In a successful class action suit, any person in that group could be entitled to compensation.

In his order, Judge Donato wrote: "Facebook seems to believe... statutory damages could amount to billions of dollars."

The decision comes days after Facebook CEO Mark Zuckerberg faced intensive questioning by US lawmakers over the company's collection and use of user data.

June 2011 was the date on which Facebook rolled out its "tag suggestions" feature.

Original Submission

Read more of this story at SoylentNews.


Security updates for Wednesday

Security updates have been issued by Debian (freeplane and jruby), Fedora (kernel and python-bleach), Gentoo (evince, gdk-pixbuf, and ncurses), openSUSE (kernel), Oracle (gcc, glibc, kernel, krb5, ntp, openssh, openssl, policycoreutils, qemu-kvm, and xdg-user-dirs), Red Hat (corosync, glusterfs, kernel, and kernel-rt), SUSE (openssl), and Ubuntu (openssl and perl).


New targeted surveillance spyware found on Google Play Help Net Security

A new targeted surveillance app has been found and booted from Google Play. The app, named Dardesh, posed as a chat application and acted as a downloader for a second app that could spy on users. The Dardesh app was spotted and analyzed by Lookout researchers, who dubbed the malware family Desert Scorpion. How was the app delivered to targets? The malicious Dardesh chat app was apparently downloaded and installed by over a hundred users, More

The post New targeted surveillance spyware found on Google Play appeared first on Help Net Security.


7 Axioms for Calm Technology

By 2020, 50 billion devices will be online. That projection was made by researchers at Cisco, and it was a key point in Amber Cases Embedded Linux Conference keynote address, titled Calm Technology: Design for the Next 50 Years which is nowavailable for replay.


Fire. Vortex. Cannon. Need We Say More? Hackaday

Tornadoes are a rightfully feared natural disaster. Fire tornadoes are an especially odious event to contend with on top of whatever else is burning. But, a fire vortex cannon? Thats some awesome eye candy.

The madman behind this cannon belching huge gouts of fire is none other than Youtuber [JAIRUS OF ALL]. This build is actually an upgrade to one of his previous projects a fire tornado gun that burned itself out and is now twice-revived and is arguably better at creating a proper vortex to direct the flames. Built around a modified NERF gun, a pair of 60mm electric ducted fans with some additional venting and tunable via a speed controller direct the airflow through slits in a vortex chamber. A backpack of liquid propane literally fuels this phoenix of a flamethrower, so [JAIRUS] had plenty of time to put together some great footage. Check it out!

As you may expect, to form a proper vortex [JAIRUS] has to point the cannon more or less straight up, but you can still see the flames spiraling outwards when hes firing it horizontally. Despite how wicked-cool it is, the fire vortex cannon is a hulking weapon to wield, so for fast-paced firefights you might want to rely on the art of firebending.

[Thanks for the tip, Itay!]


OpenSUSE Leap 15 Planned For Release At The End Of May Phoronix

We've known openSUSE Leap 15 would arrive this summer now we finally know when exactly it will make its debut...


Dog Cam Trains Computer Vision Software for Robot Dogs IEEE Spectrum Recent Content full text

Strapping some gear to an Alaskan Malamute produces data that can train deep learning algorithms to navigate the world like a dog Image: DECADE

A dogs purpose can take on new meaning when humans strap a GoPro camera to her head. Such dog cam video clips have helped train computer vision software that could someday give rise to robotic canine companions.

The idea behind DECADE, described as a dataset of ego-centric videos from a dogs perspective, is to directly model the behavior of intelligent beings based on how they see and move around within the real world. Vision and movement data from a single dogan Alaskan Malamute named Kelp M. Redmonproved capable of training off-the-shelf deep learning algorithms to predict how dogs might react to different situations, such as seeing the owner holding a bag of treats or throwing a ball.

The near-term application would be to model the behavior of the dog and try to make an actual robot dog using this data, said  Kiana Ehsani , a PhD student in computer science at the University of Washington in Seattle.

Dogs became the research candidate of choice for modeling visually intelligent agents because they have simpler behaviors than humans. But they also display more complex behaviors than many other animals through their social interactions with other dogs and humans.

This research was backed with funding from the U.S. National Science Foundation and the Office of Naval Research. Ehsani and her colleagues at the University of Washington and the Allen Institute for AI (AI2) published the details of their work in a 28 March 2018 paper uploaded to the  preprint server arXiv [pdf].

The data collection process went beyond just putting a GoPro camera on the Alaskan Mamalutes head. Researchers also attached motion trackers to the dogs body and joints to record each body parts absolute position and the relative angle of the dogs limbs and body. The trackers collected an average rate of 20 readings per second and were synchronized through a system based on a Raspberry Pi 3.0 computer.

We needed the setup to be robust to the dog's movements and shakings and also light-weight and comfortable for the dog such that there is no interference in her normal behavior, Ehsani explained.



Infrastructure-agnostic web app protection with virtual patching option Help Net Security

Signal Sciences announced the latest innovations for its Web Protection Platform. Its patented architecture provides security, operations and development teams with the visibility, security and scalability needed to protect against the full spectrum of threats their web applications now face, from OWASP Top 10 to account takeovers, API misuse and bots. Signal Sciences works across any architecture, providing the broadest coverage against real threats and attack scenarios as well as integrations into DevOps tools that More

The post Infrastructure-agnostic web app protection with virtual patching option appeared first on Help Net Security.


Suspected 'Big Bitcoin Heist' Mastermind Fled to Sweden On Icelandic PM's Plane The Hacker News

Remember the "Big bitcoin heist" we reported last month when a group of thieves stole around 600 powerful bitcoin mining devices from Icelandic data centers? Icelandic Police had arrested 11 suspects as part of the investigation, one of which has escaped from prison and fled to Sweden on a passenger plane reportedly also carrying the Icelandic prime minister Katrin Jakobsdottir. Sindri Thor


Fix Your Insecure Amazon Fire TV Stick Hackaday

I recently spent a largely sleepless night at a hotel, and out of equal parts curiosity and boredom, decided to kill some time scanning the guest network to see what my fellow travelers might be up to. As youd probably expect, I saw a veritable sea of Samsung and Apple devices. But buried among the seemingly endless number of smartphones charging next to their sleeping owners, I found something rather interesting. I was as picking up a number of Amazon-made devices, all of which had port 5555 open.

As a habitual Android tinkerer, this struck me as very odd. Port 5555 is used for Android Debug Bridge (ADB), a development tool used to control and perform various administrative tasks on an Android device over the network or (more commonly) locally over USB. The number of users who would have legitimately needed to enable network ADB on their devices is surely rather low, so to see a half dozen of them on the network at the same time seemed improbable to say the least.

Why would so many devices manufactured by Amazon all have network ADB enabled? I realized there must be a connection, and it didnt take long to figure it out.

The Seedy World of Jailbroken Fire Sticks

The somewhat awkwardly named Fire TV Stick is a cheap little device that you stick in the HDMI port of your TV to turn it into a smart TV. Ostensibly it allows you to stream content from all the big name providers out there, but realistically Amazon is hoping it will get you to spend more money within their ecosystem. For Amazon, the Fire Stick is to video content as the Kindle is to books: sell the hardware cheap, and make money on the subsequent content purchases.


Go Back:30 Days | 7 Days | 2 Days | 1 Day

IndyWatch Science and Technology News Feed Today.

Go Forward:1 Day | 2 Days | 7 Days | 30 Days

Wednesday, 18 April


For Project Safety Back Up Your People, Not Just Your Data

Does your open source project have a succession plan for its key players? Here's why it should.

I propose that instead of viewing succession planning as a leadership pipeline, free and open source projects should view it as a skills pipeline. What sorts of skills does your project need to continue functioning well, and how can you make sure those skills always exist in your community?


Man Becomes the First Person to Receive a "Second Face Transplant" SoylentNews

A man who had previously received a face transplant has received another face transplant, following complications with an antibiotic:

The first person in the world to receive two facial transplants says he is feeling well, three months after his latest groundbreaking operation.

Jrme Hamon had his first transplanted face removed last year after signs of rejection following a treatment with an incompatible antibiotic during a cold. The 43 year old remained in a hospital in Paris without a face for two months while a compatible donor was sought. He said: "The first [face] I accepted immediately. This time it's the same."

Mr Hamon suffers from neurofibromatosis type 1, a genetic condition that caused severe disfiguring tumours on his face. His first transplant, in 2010, was a success, but he caught a common cold in 2015 and was given antibiotics. The drug was incompatible with the immunosuppressive treatment he was having to prevent a rejection of the transplanted material. The first signs of rejection came in 2016 and last November, the face, suffering from necrosis, had to be removed.

Original Submission

Read more of this story at SoylentNews.


RADV vs. AMDVLK Vulkan Drivers Continue Stiff Performance Battle Phoronix

With the RADV Mesa Radeon Vulkan driver continuing to be advanced by Valve and other independent developers while AMD continues with open-source code drops of their official AMDVLK Vulkan driver, it's been a friendly open-source Radeon Vulkan driver performance and feature/extension battle since that official AMD Vulkan driver was opened up at the end of last year. With new AMDVLK/XGL/PAL code drops happening about weekly and RADV continuing to receive new feature/performance work every few days, both drivers continue maturing gracefully as shown by our latest performance benchmarks.


Facebook claims that Google and Twitter also collect users offline data TechWorm

Facebook drags Google and Twitter into privacy scuffle

Recently, it was revealed that data analysis firm, Cambridge Analytica and Facebook were involved in a privacy data scandal wherein the former illegally harvested up to 87 million Facebook users personal data without their knowledge and consent. Facebook allowed thousands of app developers to harvest data through third-party online games and quizzes.

This scandal raised concerns over users data privacy for which Facebooks CEO Mark Zuckerberg had to face intensive questioning by U.S. lawmakers over the companys collection and use of user data.

The popular social media giant has now released a detailed blog post explaining how Facebook collects information about its users from the web even if youre not a Facebook user or are logged out of your account. The blog post that was posted by David Baser, Facebook Product Management Director on Monday said that the post is a partial response to questions Zuckerberg was unable to answer during his Senate and Congressional hearings.

Baser pointed out in the blog post that not only Facebook even companies like Google, Twitter and Amazon use many of the same user data collection practices that the social media giant does.

He wrote, Twitter, Pinterest, and LinkedIn all have similar Like and Share buttons to help people share things on their services. Google has a popular analytics service. And Amazon, Google, and Twitter all offer login features. These companies and many others also offer advertising services. In fact, most websites and apps send the same information to multiple companies each time you visit them. Explaining how Facebook receives cookies, IP address, and browser info about users from other sites, he added, When you see a YouTube video on a site thats not YouTube, it tells your browser to request the video from YouTube. YouTube then sends it to you.

Baser said the team collects information on individuals for their own benefit. He wrote: Apps and websites that use our services, such as the Like button or Facebook Analytics, send us information to make their content and ads better.

In return, Facebook helps those websites serve up relevant and engaging ads or receive analytics to study how people use their services.

When you visit a site or app that uses our services, we receive information even if youre logged out or dont have a Facebook account. This is because other apps and sites dont know who is using Facebook, Baser added.

Our privacy policy explains in detail what we do with the information we receive and we just updated the policy to make it...


Senators demand info on unusual surveillance activity in DC The Hill: Technology Policy

A bipartisan group of senators is pushing the Department of Homeland Security (DHS) to make public more information about the use of rogue surveillance devices colloquially known as Stingrays.Homeland Security recently acknowledged the devices are...


Facebook pushes ahead with controversial facial recognition feature in Europe Graham Cluley

Facebook has started pushing European and Canadian users into giving its controversial facial recognition technology free reign to run rampant over their photos and videos.


Pornhub Starts Accepting Cryptocurrency For Premium Subscription TechWorm

Pornhub Starts Accepting Verge As Payment For Premium Subscription

Adult entertainment giant Pornhub has announced a partnership with cryptocurrency Verge (XVG) that will now allow its users to make payments for its premium content in privacy-focused cryptocurrency. Verge (VXG), which is a secure and anonymous cryptocurrency, will allow Pornhub users to purchase a premium subscription as well as other available purchases without the fear of leaving a trace on the adult website.

In an official press release on Tuesday that was accompanied by a video, Pornhub states: The future has come. In our efforts to keep current with our communitys privacy and payment preferences, Pornhub will now be accepting Verge as a means of payment for services like Pornhub Premium and more, on our platforms. Building on Verges core values of security, anonymity, and practicality, the introduction of this cryptocurrency as a means of payment Pornhub signifies an important foray into the future from the industry that is always on the cutting edge of technology.

Pornhub Vice President Corey Price said in the press release that [n]ot only is this an exciting announcement for us and the adult entertainment industry, its exciting for the crypto space. He further added, History has proven that the adult entertainment industry plays a critical role in the adoption of innovative technology. We saw that with VHS, Beta Max, credit card payment icons and, most recently, VR goggles. We expect to see widespread adoption of crypto and blockchain in short order.

In January 2018, the Pornhubs suggestion page had received close to 6,000 votes requesting the website to start accepting Verge payments.

In a statement, Pornhub said that Verge was an obvious choice when it came to a cryptocurrency partnership on its site purely for its emphasis on user anonymity. Verge is a secure and anonymous cryptocurrency, which is very near and dear to us here at Pornhub, the statement read. [Verge] provides that extra layer of security many people look for, particularly in the adult entertainment industry.

While Verges cryptocurrency transactions are available for anyone to see through its public ledger, Verge, which is built on the Bitcoin (BTC) Blockchain uses Tor and I2P networks to maintain its anonymity, the press release notes.

According to Pornhub, the currency allows for anonymous transactions by obfuscating the IP address...


Anatomy of a JavaScript Error

Its not a pretty sight when an application dies. Error messages can be difficult to understand, and we sometimes have to put our investigator hats on to solve the mystery and find the culprit.

Most software developers spend all their time avoiding errors, but here at Bugsnag, our entire product is built around capturing and managing errors. As such, we deal a lot with the ins and outs of JavaScript errors and their related APIs. In this blog, well take a look at the different types of JavaScript errors, why they happen, and how to handle them in your application.


Cryptominers displace ransomware as the number one threat Help Net Security

During the first three months of 2018, cryptominers surged to the top of detected malware incidents, displacing ransomware as the number one threat, Comodos Global Malware Report Q1 2018 has found. Another surprising finding: Altcoin Monero became the leading target for cryptominers malware, replacing Bitcoin. The surge of cryptominers For years, Comodo Cybersecurity has tracked the rise of cryptominer attacks, malware that hijacks users computers to mine cryptocurrencies for the attackers profit while remaining hidden More

The post Cryptominers displace ransomware as the number one threat appeared first on Help Net Security.


Full of hot air and proud of it Lifeboat News: The Blog

This could be used for hydrogen storage.

Of the four states of matter, gases are the hardest to pin down. Gas molecules move quickly and wildly and dont like to be confined. When confined, heat and pressure build in the container, and it doesnt take long before the gas blows the lid off the place, literally. Luckily, gases are superficial. Provide them with an attractive internal surface area, and theyll pin themselves down in no time. No, its not love at first sight, its adsorption.

Adsorption is the processes of gas pinning to the surface of another materialthe inside walls of a container, for example, says Chris Wilmer, assistant professor in Pitts Department of Chemical and Petroleum Engineering. When adsorption occurs, the stop bumping into each other, reducing pressure. So, by increasing a containers internal surface area, we can store more gas in less space.

Dr. Wilmer directs the Hypothetical Materials Lab, where he and his research group develop new ways to store, separate, and transport gases. They recently published their study Thermal Transport in Interpenetrated Metal-Organic Frameworks in the American Chemistry Society Journal Chemistry of Materials. The issues cover also featured an image designed by Kutay Sezginel, a chemical engineering graduate student in Dr. Wilmers Lab. It depicted interpenetrated or MOFs.


CVE-2018-1088 glusterfs: Privilege escalation via gluster_shared_storage when snapshot scheduling is enabled Open Source Security

Posted by Siddharth Sharma on Apr 18


A flaw was found in glusterfs which can lead to privilege escalation on
gluster server nodes.

This flaw is based on symlink attack. Any glusterfs unauthenticated client
having access to gluster nodes can mount gluster_shared_storage volume which
contains file symlink to /etc/cron.d which is owned by root. After mounting
this shared volume client can schedule malicious cronjob which would run as
root. This would lead to privilege...


Scalable manufacturing process spools out strips of graphene for use in ultrathin membranes Lifeboat News: The Blog

MIT engineers have developed a continuous manufacturing process that produces long strips of high-quality graphene.

The teams results are the first demonstration of an industrial, scalable method for manufacturing high-quality that is tailored for use in membranes that filter a variety of molecules, including salts, larger ions, proteins, or nanoparticles. Such membranes should be useful for desalination, biological separation, and other applications.

For several years, researchers have thought of graphene as a potential route to ultrathin membranes, says John Hart, associate professor of mechanical engineering and director of the Laboratory for Manufacturing and Productivity at MIT. We believe this is the first study that has tailored the manufacturing of graphene toward membrane applications, which require the graphene to be seamless, cover the substrate fully, and be of high quality.


China fights big smog with big air purifier Lifeboat News: The Blog

China has a found a novel way to tackle its massive air pollution problem: Putting up a giant air purifier the size of an industrial smokestack in the middle of a smog-plagued city.

Instead of pumping out billows of black smoke like the chimneys rising from factories in the northern province of Shaanxi, the 60-meter (197-foot) tall structure on the outskirts of the regional capital Xian blasts .

Standing between high-rises, the device is capable of cleaning between five million and 18 million cubic meters of air each day, depending on the weather, season, and level of pollution, according to a report by the Chinese website


Team develops sodium ion batteries using copper sulfide Lifeboat News: The Blog

A KAIST research team recently developed sodium ion batteries using copper sulfide anode. This finding will contribute to advancing the commercialization of sodium ion batteries (SIBs) and reducing the production cost of any electronic products with batteries.

Professor Jong Min Yuk and Emeritus Professor Jeong Yong Lee from Department of Materials Science and Engineering developed a new material suitable for use in an SIB. Compared to the existing anode materials, the copper sulfide anode was measured to exhibit 1.5 times better cyclability with projected 40 percent reduction in cost.

Lithium-ion batteries (Li-ion batteries or LIBs) are widely used in mobile phones and other personal electronics. However, large-scale require less expensive, more abundant materials. Hence, a SIBs have attracted enormous attention for their advantage over lithium-based batteries.


IRS Gives Taxpayers One-Day Extension After Payment Site Crashes SoylentNews

C|net reports:

If you were waiting until the last minute to pay your taxes and were depending on to make a payment from your checking account, there's some bad news.

For most of Tuesday, the last day to file taxes, the Direct Pay section of the Internal Revenue Service's website wasn't working. Instead, people planning to pay electronically saw a message reading, "This service is currently unavailable. We apologize for any inconvenience."

Now there's good news -- of sorts. The site is working once again. And Treasury Secretary Steve Mnuchin told reporters Tuesday that Americans who couldn't pay their taxes because of the outage will receive an extension. The IRS later said that individuals and businesses with a filing or payment due date of April 17 will now have until midnight on Wednesday, April 18. Taxpayers need do nothing to qualify for the extra time.

Read more of this story at SoylentNews.


Top tech firms pledge not to help governments launch cyberattacks Help Net Security

34 global technology and security companies have pledged not to aid governments launch cyberattacks and to protect all customers regardless of nationality, geography or attack motivation. The Cybersecurity Tech Accord The Cybersecurity Tech Accord is a watershed agreement among the largest-ever group of companies agreeing to defend all customers everywhere from malicious attacks by cybercriminal enterprises and nation-states. The 34 companies include ABB, Arm, Avast, Bitdefender, BT, CA Technologies, Cisco, Cloudflare, Datastax, Dell, DocuSign, Facebook, More

The post Top tech firms pledge not to help governments launch cyberattacks appeared first on Help Net Security.


Google Kaniko Tool Wrenches on Container Privilege Concern

Google unveiled an open source tool that targets container security issues tied to the granting of privileged access to a Docker-based container.


This Thermal Printer has Serious Game Hackaday

[Dhole], like the fox, isnt the first to connect his computer to a Game Boy printer but he has done a remarkable job of documenting the process so well that anyone can follow. The operation is described well enough that it isnt necessary to scrutinize his code, so dont be put off if C and Rust are not your first choices. The whole thing is written like a story in three chapters.

The first chapter is about hacking a link cable between two Game Boys. First, he explains the necessity and process of setting the speed of his microcontroller, a NUCLEO-F411RE development board by STMicroelectronics. Once the rate is set, he builds a sniffer by observing the traffic on the cable and listens in on two Game Boys playing Tetris in competition mode. We cant help but think that some 8-bit cheating would be possible if Tetris thought your opponent instantly had a screen overflowing with tetrominoes. Spying on a couple of Game Boys meant that no undue stress was put on the printer.

Chapter two built on the first chapter by using the protocol to understand how the printer expects to be spoken to. There is plenty of documentation about this already, and it is thoughtfully referenced. It becomes possible to convince a Game Boy that the connected microcontroller is a printer so it will oblige by sending an image. Since there isnt a reason to wait for printing hardware, the transfer is nearly instantaneous. In the image above, you can see a picture of [Dhole] taken by a Game Boy camera.

The final chapter, now that all the protocols are understood, is also the climax where the computer and microcontroller convince the printer they are a Game Boy that wants to print an image. In the finale, we get another lesson about measuring controller frequency without an oscilloscope. If you are looking for the hack, there it is. There is a handful of success in the form of old receipts with superimposed grayscale images since virgin thermal printer paper by Nintendo costs as much as a used printer.

This story had a happy ending but grab your reading glasses for the smallest Game Boy and heres someone who wrote their own Game Boy color game.


Rise of the Tomb Raider Launching Tomorrow For Linux Phoronix

Feral Interactive has just announced they will be launching Rise of the Tomb Raider for Linux tomorrow, 19 April...


Scientists make counterintuitive observations in hybrid quantum systems Lifeboat News: The Blog

A team of researchers from the National Institute of Informatics (NII) in Tokyo and NTT Basic Research Laboratories (BRL, Nippon Telegraph and Telephone Corporation) in Japan have published an explanation of how quantum systems may be able to heat up by cooling down. Their paper appeared recently in Physical Review Letters.

Heating by cooling sounds rather counterintuitive, but if the system has symmetries, decay could mean many things, says Kae Nemoto, a professor in the Principles of Informatics Research Division at NII which is part of the Inter-University Research Institute Corporation Research Organization of Information and Systems (ROIS).

Nemoto and her team examined a double sub system coupled to a single constant temperature reservoir. Each sub-domain contained multiple spinsa form of angular momentum carried by elementary particles such as electrons and nuclei. The researchers considered the situation in which the spins within each sub-domain are aligned with respect to each other, but the sub-domains themselves are oppositely aligned (for instance all up in one and all down in the second). This creates a certain symmetry in the system.


Famed NPR Newscaster Carl Kasell Dies at 84 SoylentNews

Carl Kasell, the longtime NPR newscaster who breathed new life into his career as the judge on the public radio station's "Wait Wait Don't Tell Me!," has died, NPR reports. He was 84.

The radio personality reportedly died Tuesday in Potomac, Md. of complications from Alzheimer's disease.

Kasell, who was known as the steady voice of the news on NPR for more than three decades, grew up in Goldsboro, N.C. with the dream of one day getting his pipes on the air.

"Before I even started to school," he told NPR in 2009, "I sometimes would hide behind the radio, which would be sitting on a table, and pretend that I was on the air, and try to fool people that came by to listen."

Original Submission

Read more of this story at SoylentNews.


Mesa 17.3.9 Released To End Out The Series Phoronix

For those still using the Mesa 3D release that debuted in Q4'2017, the Mesa 17.3.9 point release is now available while it's the last planned update for the series...


Chrome 66 Released With Security Improvements & New JavaScript APIs Phoronix

Google has rolled out Chrome 66 to its stable channel for Linux desktop users as well as other supported desktop/mobile operating systems...


Links 18/4/2018: New Fedora 27 ISOs, Nextcloud Wins German Government Contract Techrights

GNOME bluefish



  • Desktop

    • Launching Netrunner 18.03 for the Pinebook

      The team over at Netrunner have just announced the launch of Netrunner 18.03 Idolon for the Pinebook. This is the direct result of a year of collaboration between the Netrunner, Pine and KDE Communities in a effort to drive down memory consumption, fix glitches in the graphics stack and enabling accelerated video decode, all of which has resulted in a product that showcases the coming together of the amazing software from KDE and some brilliant hardware engineering from the folks over at Pine.

      Its been quite a journey for my colleagues and I at Blue Systems in putting together this product. We have had to delve into areas where we originally did not have the expertise to fix bugs and constantly push the boundaries of our abilities. This was especially challenging in the ARM world since there are parts of the stack that were proprietary, meaning we cannot debug those parts, leading to many frustrating evenings having been spent on trying to reverse engineer buggy behaviour.

  • Server

    • Docker Enterprise Edition 2.0 Launches With Secured Kubernetes

      After months of development effort, Kubernetes is now fully supported in the stable release of the Docker Enterprise Edition.

      Docker Inc. officially announced Docker EE 2.0 on April 17, adding features that have been in development in the Docker Community Edition (CE) as well as enhanced enterprise grade capabilities. Docker first announced its intention to support Kubernetes in October 2017. With Docker EE 2.0, Docker is providing a secured configuration of Kubernetes for container orchestration.

      Docker EE 2.0 brings the promise of choice, Docker Chief Operating Officer Scott Johnston told eWEEK. We have been investing heavily in security in the last few years, and youll see that in our Kubernetes integration as well....


Probably you ignore that Facebook also tracks non-users across the web Security Affairs

Facebook explained how it is tracking Non-Users across the Internet and for which purposes it is using their metadata.

Facebook is still in the middle of a storm for its conduct and the way it approached the privacy of its users after the Cambridge Analytica case.

Now Facebook is under scrutiny after Zuckerberg testified in front of the US Congress, the social network giant disclosed more information on data collection activity that aimed to gather info related to non-Facebook users.

Yes, it is true! Facebook can track you even if you are not using it, this is possible if you visit a website or an application that uses the services of the tech giant.

The services include Social plugins (i.e. Like and Share buttons), Facebook Login, Facebook Analytics, and ads and measurement tools.

When you visit a site or app that uses our services, we receive information even if youre logged out or dont have a Facebook account. This is because other apps and sites dont know who is using Facebook. explained product management director David Baser.

Many companies offer these types of services and, like Facebook, they also get information from the apps and sites that use them. Twitter, Pinterest and LinkedIn all have similar Like and Share buttons to help people share things on their services. Google has a popular analytics service. And Amazon, Google and Twitter all offer login features.

As you can imagine, all these companies also offer targeted advertising services by leveraging the information gathered through their services.

Everytime a user visits a website, his browser shares the IP address to the website along with info about the machine (i.e. browser, operating system) and cookies. Facebook also collects data related to website or app accessed by the user.

According to Baser, the social network platform uses the information received from websites and apps, to implements its services, to target the advertising and to improve the safety and security on Facebook.



Hackers Exploiting Drupal Vulnerability to Inject Cryptocurrency Miners The Hacker News

The Drupal vulnerability (CVE-2018-7600), dubbed Drupalgeddon2 that could allow attackers to completely take over vulnerable websites has now been exploited in the wild to deliver malware backdoors and cryptocurrency miners. Drupalgeddon2, a highly critical remote code execution vulnerability discovered two weeks ago in Drupal content management system software, was recently patched by the


Oracle Ships GraalVM 1.0 To "Run Programs Faster Anywhere" Phoronix

Tuesday was a very busy release day for Oracle folks as in addition to shipping an updated Solaris 11.4 beta and Oracle Linux 7 Update 5, their compiler folks also announced the GraalVM 1.0 virtual machine release...


Is Holochain Better than Blockchain? Lifeboat News: The Blog

What is Holochain? #notblockchain

Holochain has been in the works since before the Bitcoin whitepaper and now it is being released on the world. There is no mining, no cryptocurrency and it claims to be more efficient than Blockchain. Could Holochain be the future or decentralization?




Trisquel 8.0 Arrives Of The 100% Libre Linux OS, Using MATE & Powered By Linux 4.4 Phoronix

Four years after the debut of Trisquel 7.0 and a year and a half since the 8.0 Alpha, Trisquel 8.0.0 is now available for this Linux distribution that's endorsed by the Free Software Foundation...


How to Build a Mini Supercomputer for Under $100 Lifeboat News: The Blog

Wei Lin built a scalable computing cluster comprised of $7 chips.


Wayland's Weston Begins Switching To Head-Based Output API Phoronix

Following last week's release of Wayland 1.15 / Weston 4.0, the development gates are once again open for new feature activity to land for Wayland and the reference Weston compositor. Weston has already landed a big patch series for what will likely become Weston 5.0...


Arming the World: Inside Trumps Buy American Drive to Expand Weapons Exports

Via: Reuters: In a telephone call with the emir of Kuwait in January, U.S. President Donald Trump pressed the Gulf monarch to move forward on a $10 billion fighter jet deal that had been stalled for more than a year. Trump was acting on behalf of Boeing Co, Americas second-largest defense contractor, which had become []


8 Ways Linux Is Taking Over the World

The Large Hadron Collider (LHC) is the worlds largest and most powerful particle accelerator. Its a 17-mile long circular tube thats buried 175 meters below the French-Swiss border near Geneva.

Its common knowledge that the facility has been resounding success from a scientific perspective. But the LHC is also a computing miracle.

In its first 12 months of operation, the LHC produced more than 50 petabytes of data. The team needed 170 computing centers across 42 countries to analyze it all in a timely manner. It is the largest distributed computing grid in the world.


Guest Post: Responding to Your Recent Posting The European Patent Office Will Never Hold Its Destroyers Accountable Techrights

Readers response to this post

EPO FIFA-approved graphic

Summary: In France, where Battistelli does not enjoy diplomatic immunity, he can be held accountable like his "padrone" recently was

It should be obvious to all and sundry by now that people who expect the EPO Administrative Council to hold Battistelli to account are barking up the wrong tree. The unfortunate fact of the matter is that it really is possible to get away with serious abuses as long as the perpetrator is protected by diplomatic immunity. In this case Battistelli enjoys diplomatic immunity as President of the EPO and he also seems to be protected by a supine Administrative Council which shows no interest in calling him to account.

In this case Battistelli enjoys diplomatic immunity as President of the EPO and he also seems to be protected by a supine Administrative Council which shows no interest in calling him to account.But what people who complain about Battistelli seem to forget is that he also wears other hats and operates in other contexts where he does not enjoy immunity. To be more precise: he is the deputy mayor in charge of culture in his home town of Saint-Germain-en-Laye.

He was appointed to this position in October 2017 after the last local elections when he succeeded Arnaud Pricard. Pricards was promoted to the position of mayor after the death of Emmanuel Lamy in May 2017. Until October 2017 Battistelli was the municipal councillor in charge of theatre. In this position he was mainly responsible for the municipal theatre which is known as the Thtre Alexandre Dumas.

Until October 2017 Battistelli was the municipal councillor in charge of theatre. In this position he was mainly responsible for the municipal theatre which is known as the Thtre Alexandre Dumas.The Thtre Alexandre Dumas (TAD) is named after the famous French writer, some of whose most illustrious works, such as The Three Musketeers, were written in Saint-Germain-en-Laye. It is a municipal institution which is directly under the management of the municipal council. Both the deputy mayor for culture and the the town councillor in charge of theat...


Meet the Woman Who Leads NightWatch, Googles Internal Privacy Strike Force SoylentNews

Submitted via IRC for SoyCow4408

Lea Kissner is back at her alma mater, the University of California at Berkeley, armed with a crisp gray blazer, a slide deck, and a laptop with a 'My Other Car Is A Pynchon Novel' sticker on it. Since graduating in 2002, she's earned a PhD at Carnegie Mellon in cryptography and worked her way up at Google, where she manages user privacy and tries to keep things from breaking. She's here to tell a hall of computer science students how she did itand also how to create privacy-protective systems at a scale that you won't find outside a handful of massive tech companies.


Original Submission

Read more of this story at SoylentNews.


Telegram Founder Pledges Millions in Bitcoin For VPNs and Digital Resistance TorrentFreak

Starting yesterday, Russia went to war with free cross-platform messaging app Telegram. Authorities including the FSB wanted access to Telegrams encryption keys, but the service refused to hand them over.

As a result, the service which serviced 200,000,000 people in March alone came under massive attack. Supported by a court ruling obtained last Friday, authorities ordered ISPs to block huge numbers of IP addresses in an effort to shut Telegram down.

Amazon and Google, whose services Telegram uses, were both hit with censorship measures, with around 1.8 million IP addresses belonging to the Internet giants blocked in an initial wave of action. But the government was just getting warmed up.

In an updated posted by Pavel Durov to Twitter from Switzerland late last night, the Telegram founder confirmed that Russia had massively stepped up the fight against his encrypted messaging platform.

Of course, 15 million IP addresses is a huge volume, particularly since just 14 million of Telegrams users are located in Russia thats more than one IP address for each of them. As a result, there are reports of completed unrelated services being affected by the ban, which is to be expected given its widespread nature. But Russia doesnt want to stop there.

According to Reuters, local telecoms watchdog Rozcomnadzor asked both Google and Apple [Update: and APKMirror] to remove Telegram from their app stores, to prevent local citizens from gaining access to the software itself. It is unclear whether either company intends to comply but as yet, neither...


A Taxonomy of Tech Debt

Hi there. Im Bill LtRandolph Clark, and Im the engineering manager for the Champions team on LoL. Ive worked on several different teams on League over the past years, but one focus has been consistent: Im obsessed with tech debt. I want to find it, I want to understand it, and where possible, I want to fix it.


Dispensing Solder Paste Automatically Hackaday

Through-hole chips are slowly falling by the wayside, and if you want to build something with new parts you will be using surface mount components. This means spreading paste and throwing it in the toaster oven. Of course, if you dont want to take the time to get a stencil for your solder paste, you can always lay it down by hand. For that, [owhite] has created a tiny, handheld, robotic solder paste dispenser. Its a robotic pen that dispenses just the right amount of solder paste on your pads.

The design of this solder paste dispenser is basically a syringe filled with paste and a stepper motor to push the plunger down. Devices like this already exist, and the i-extruder can be had for somewhere around two hundred bucks. Why buy when you can build, so [owhite] set out to create his own.

The key to a successful solder paste pen, it seems, is driving the plunger with a small NEMA 8 stepper motor, using a very fine pitch on the threads of the gears pushing the plunger down, and surprisingly finding a small-diameter syringe. [owhite] found the last bit in the form of a gas-tight syringe with a nylon gasket. The electronics consist of just a Teensy 3.2, DRV8825 stepper driver, footswitch, and an OLED for a UI.

With just a few parts, [owhite] managed to create a solder paste pen thats better than the commercial i-extruder, and with a bit of practice can be used to place paste on some SMD pads.


Hardware accelerated AES/HMAC-SHA on octeons OpenBSD Journal

In this commit, visa@ submitted code (disabled for now) to use built-in acceleration on octeon CPUs, much like AESNI for x86s.

I decided to test tcpbench(1) and IPsec, before and after updating and enabling the octcrypto(4) driver.

Read more


From Insulator to Conductor in a Flash SoylentNews

Over the past decades, computers have become faster and faster and hard disks and storage chips have reached enormous capacities. But this trend cannot continue forever: we are already running up against physical limits that will prevent silicon-based computer technology from attaining any impressive speed gains from this point on. Researchers are particularly optimistic that the next era of technological advancements will start with the development of novel information-processing materials and technologies that combine electrical circuits with optical ones. Using short laser pulses, a research team led by Misha Ivanov of the Max Born Institute in Berlin together with scientists from the Russian Quantum Center in Moscow have now shed light on the extremely rapid processes taking place within these novel materials. Their results have appeared in the journal Nature Photonics.

Read more of this story at SoylentNews.


Disney announces massive $6.5-billion Disneyland Resort for Toronto Islands Terra Forming Terra

 Toronto Disneyland

This is important as it represents only the third such facility in North America and certainly in the major market.  It will succeed in making Toronto a tourist destination for the entire North East USA market.

Considering that Greater Toronto now exceeds Chicago and compares to the other two mega centers of New York and L.A. this was a natural fit.  Yet it was hardly predestined.  Choice land existed kept out by of the urban land bank by decades of decisions ultimately looking for a best fit.

Rapid rail travel between Toronto and Chicago and Montreal was always obvious and this may help it come about.  Toronto's burgeoning ascendancy matters here to overcome natural jealousies.  The area also needs fast links from TO to New York as well through Buffalo and another fast link from Montreal to New York.  The Great Lakes States and Provinces have long learned to cooperate with each other and little could be as rewarding than making such a system work.

One of the great Geographical markets in the world is the Great Lakes Codominion or GLC.  It happens to also be the best test for the global elimination of poverty and establishing universal sustainable agriculture while cleaning up past environmental errors.

Disney announces massive $6.5-billion Disneyland Resort for Toronto Islands
Kenneth ChanApr 01, 2018 6:05 am446,655


School District Decides To Bring Back Paddling After Getting Consent From Parents Terra Forming Terra

The application of all forms of corporal punishment is a response to an ultimate failure to communicate.  Except communication is a binary operator and the decision of one partner to impose their sense of power by refusing to communicate and thus cooperate must be countered and resolved.  
This always implies escalation and that can be achieved in many ways.  Truth is the paddle is already much to formal and implies a time wasting regulatory approach which is practically crazy.  All i know for sure is that when i went through, it was exceptional for any other intervention beyond what the teacher could apply.  That was ad hoc and worked well enough and often was hilarious.  Yet we lost few students though a formal suspension if any at all in a school of several hundred.

Of course it was God save you if you were sent to the principal.  And his reputation was not harmed if he looked into a class, spotted a boy clowning around behind the teacher's back, by his abrupt charging into the classroom and dragging the miscreant out to be forthwith noisily banged against the lockers outside while been yelled at.  Great acting.  He likely did a circuit every week looking for a suspect to make into an example.
In the end we always have a handful of chronic trouble makers who we still want to bring up to standard while they grow up a little slower than most.  Intimidation is a tool that never needs to be applied to ninety percent of the student body.  And if you cannot bring them up to standard they will slip into a hard life and be potential criminals.  So is a little intimidation worth it to have a better disciplined population in the most vulnerable part?

School District Decides To Bring Back Paddling After Getting Consent From Parents

In todays world, parenting offers a new set of challenges. There is no point in denying the fact that many kids today lack discipline. But, it is an argumentative topic whether this problem is responsible for home or school. While some of the parents feel that excessive strictness would make their children under pressure, others r...


Copper pipeline lowest in a century Terra Forming Terra

Current copper pipeline the lowest this century despite growing appetite for assets
I am surprised to see this. This will drive sustained higher prices for copper for at least a decade while the pipeline is refilled.

The industry has been plagued in North America by a lack of internal political support for mining generally and opposition from environmental activists who see an easy target and always create ample damage for the proponents to the extent of canceling without compensation substantial sunk investments..

Even today we see the Canadian federal government is engaged trying to  mobilize a necessary pipeline that clearly is in the National Interest.  Several others are also looking like pipe dreams because of this enviro nonsense and political cowardice.  This has also happened to mines as well after they reached the final decision point to build.

And we do not even attempt to build one in the USA.  Their two great remaining great copper mines a century old already will run out soon enough and then there will be two thirds less copper produced.

Copper pipeline lowest in a century

Cecilia Jamasmie | a day ago | 0 | 4 

Escondida is the worlds largest copper producing mine. (Image courtesy of...


Trump Overrules Sessions To Protect States' Pot Legalization Rights Terra Forming Terra

In the end, there is only one possible pathway for Marijuana law.   Trump knew this from the beginning and i suspect Sessions did as well.  However they had the stick and I do suspect that Trump hates to never use a perfectly good stick at least once.

At the very least we have returned to status quo Ante Bellum.

There will be a full legislative initiative to settle all this and i do hope they apply it to all drugs once and for all and we adopt the clear alternative protocols.  .
Trump Overrules Sessions: Promises To Protect States' Pot Legalization Rights

by Tyler Durden

Fri, 04/13/2018 - 13:48

Just over 3 months ago, AG Jeff Sessions dropped a bombshell on the marijuana market when he rescinded policies allowing states to legalize pot.

But now, following Sen. Cory Gardner's, the Colorado Republican, threat to block all DOJ nominations, The Washington Post reports that President Trump has defused the standoff and promised the top Senate Republican that he will support congressional efforts to protect states that have legalized marijuana.



The EPO in 2018: Partnering With Saudi Arabia and Cambodia (With Zero European Patents) Techrights

Fourth Industrial Revolution is just code (or buzzword) for "software patents" part of the race to the bottom (of patent quality)

EPO gazette

Summary: The EPOs status in the world has declined to the point where former French colonies and countries with zero European Patents are hailed as success stories for Battistelli

THE reputation of the EPO and by extension of European Patents (EPs) is badly damaged. It wont be able to compete with the USPTO. In fact, in IP5 its now generally seen as the most abusive; some would call it a laughing stock, especially when publicly represented by corrupt/abusive officials from France.

Its worth noting that the number of granted EPs from Saudi Arabia fell by a whopping 44.4% last year.The EPO has totally lost touch with patent quality. It just habitually misuses the word quality.

Saudi patents are laughable. People I know who work there tell me so. But the EPO, which no longer values the quality of patents, has found itself company. Yesterday Saba & Co Intellectual Property wrote about the EPO MOU:

King Abdul Aziz City of Science and Technology, where the Saudi Patent Office resides, signed a memorandum of understanding with the European Patent Office. The MOU, which aims to strengthen the patent system and increase bilateral cooperation, foresees joint activities in the areas of patent procedures, search, examination and automation, as well as use and exchange of patent data and databases.

Its worth noting that the number of granted EPs from Saudi Arabia fell by a whopping 44.4% last year.

Also yesterday there was this new article bragging about EPO validation in a former French colony with...


Facebook to face class action suit over its facial recognition tool TechWorm

Facebook to face class action suit over its facial recognition tool

Facebook must face a class action lawsuit over its unlawful use of facial recognition technology on photos without user permission, a U.S. federal judge in California ruled on Monday.

According to the lawsuit, Facebook violated an Illinois state law by incorrectly using photo-scanning and face recognition technologies on users uploaded photographs and gathered biometric information without their explicit consent.

The case dates back to 2015, where three Illinois residents, Nimesh Patel, Adam Pezen, and Carlo Licata had sued Facebook for violating a state privacy law on protecting biometric privacy.

U.S. Judge James Donato in his ruling on Monday said the claims by the three plaintiffs were sufficiently cohesive to allow for a fair and efficient resolution on a class basis.

The judge also noted that there is enough proof to show that Facebook violated the Illinois Biometric Information Privacy Act (BIPA), passed in 2008, which prevents companies from collecting and storing the biometric data of people without their consent.

Under the Illinois Act, Facebook can be fined $1,000 to $5,000 each time the companys Tag Suggestions feature was used on a persons image without permission. Tag Suggestions is a feature that recommends people to tag after a Facebook user uploads a photo.

Consequently, the case will proceed with a class consisting of Facebook users located in Illinois for whom Facebook created and stored a face template after June 7, 2011, he said, according to the ruling.

However, according to Facebook, the photo tagging tool provides the option to users to turn the feature off and prevent themselves from being suggested in photo tags, which the company says is available since its inception.

Shawn Williams, the plaintiffs attorney, said its unclear as of now if the lawsuit might prompt changes in the way Facebook uses biometric data.

As more people become aware of the scope of Facebooks data collection and as consequences begin to attach to that data collection, whether economic or regulatory, Facebook will have to take a long look at its privacy practices and make changes consistent with user expectations and regulatory requirements, said Williams.

A Facebook spokeswoman said the company was reviewing Mondays ruling that certifies the class action. We continue to believe the case has no merit and will defend ourselves vigorously, she said.

Mondays ruling is certainly not good news for Facebook, as the Silicon Valley giant is currently caught in a privacy scandal over the mishandling of 87 million users personal data and sharing with a third party.



SpaceX to Begin BFR Production at the Port of Los Angeles SoylentNews

The Mayor of Los Angeles has announced that SpaceX will begin production of the BFR at the port of Los Angeles:

SpaceX can start building its "Big Fucking Rocket," now that it has officially found a home in LA. Mayor Eric Garcetti has announced on Twitter that the private space giant "will start production development of the Big Falcon Rocket (the spacecraft's tamer name, apparently)" at the port of Los Angeles. SpaceX designed the 348-foot-long behemoth to fly humanity to the moon, Mars and beyond. It will be able to carry up to [150] tons in payload, whereas Falcon Heavy can only carry [63.8] tons. "This vehicle holds the promise of taking humanity deeper into the cosmos than ever before," he added, along with an illustration of the company's massive interplanetary spacecraft.

The massive cylindrical body of the BFR's fabrication mold has been photographed at a tent at the Port of San Pedro (compare to this earlier photo of the main body tool):

Finally, it's worth noting just how shockingly busy the BFR tent was on both April 13th and 14th, as well as the 8th (the first day Pauline visited the facility). With upwards of 40 cars parked at the tent, it's blindingly clear that SpaceX is not simply using the tent as a temporary storage location alongside the arrival of composite fabrication materials (prepreg sheets, epoxy, etc) from Airtech International, SpaceX undeniably intends to begin initial fabrication of the first BFR prototypes in this tent, although they will likely eventually move the activities to the Berth 240 Mars rocket factory. That's certainly not a sentence I ever expected to write, but it is what it is.

The BFR's height may be elongated from its planned total of 106 meters.

Related: SpaceX to Launch Five Times in April, Test BFR by 2019
SpaceX BFR vs. ULA Vulcan Showdown in the 2020s
SpaceX Value...


Intel announced the new Threat Detection Technology and Security Essentials Security Affairs

Intel announced a new Threat Detection Technology and a framework of critical root-of-trust hardware security capabilities in its chips.

Intel continues to innovate its products, the tech giant announced two new technologies, the Threat Detection Technology (TDT) and Security Essentials.

The Threat Detection Technology leverages the silicon-level telemetry and functionality to allow security products detect sophisticated threats.

The new Intel Threat Detection Technology (TDT) includes two main capabilities, the Accelerated Memory Scanning and Advanced Platform Telemetry.

The Accelerated Memory Scanning feature allows anti-malware solutions to use Intels integrated GPU to scan and detect fileless malware attacks without having any impact on performance and power consumption.

Microsoft will integrate the Accelerated Memory Scanning feature into Windows Defender Advanced Threat Protection (ATP) within a couple of weeks.

According to Intel researchers, using the GPU instead of the CPU to scan the memory will allow frequent scanning reducing the impact on performance, Intel tests revealed that the CPU usage dropped from 20 percent to as little as 2 percent.

The first new capability is Accelerated Memory Scanning. Current scanning technologies can detect system memory-based cyberattacks, but at the cost of CPU performance. reads the announcement published by Intel

With Accelerated Memory Scanning, the scanning is handled by Intels integrated graphics processor, enabling more scanning, while reducing the impact on performance and power consumption. Early benchmarking on Intel test systems show CPU utilization dropped from 20 percent to as little as 2 percent

The second Intel Threat Detection Technology is Intel Advanced Platform Telemetry that was designed to include cloud-based machine learning and endpoint data collection to improve threat detection.

Intel Advanced Platform Telemetry combines platform telemetry with machine learning algorithms to improve the detection of advanced threats, while reducing false positives and minimizing performance impact. continues Intel.

The New Intel Advanced Platform Telemetry technology will first be integrated into Cisco Tetration, a solution designed to provide data center security and cloud workload protection.

Intel has announced Security Essentials, a set of cri...


Keeping Streets Ice-Free with the Raspberry Pi Hackaday

[Revanth Kailashnath] writes in to tell us about an interesting project he and his team have been working on for their Real Time Embedded Programming class at the University of Glasgow. Intended to combat the harsh and dangerous winters in Glasgow, their system uses a Raspberry Pi and a suite of sensors to automatically deploy a brine solution to streets and sidewalks. While the project is still only a proof of concept and hasnt been deployed, the work the team has done so far runs the gamut from developing their own PCBs to creating a web-based user interface.

The core idea is simple. If the conditions are right for ice to form, spray salt water. Using salt water is a cheap and safe way of clearing and preventing ice as it simply drops the temperature at which water freezes. The end result is that the ice wont form until it gets down to 10F (-12C) or so. Not a perfect solution, but it can definitely help. Of course, you dont want to spray people with salt water as they pass by, so theres a bit more to it than that.

Using the venerable DHT22 sensor the team can get the current temperature and humidity, which allows them to determine when its time to start spraying. But to prevent any wet and angry pe...


FDA Launches Criminal Probe Into Unauthorized Herpes Vaccine Research SoylentNews

FDA Launches Criminal Investigation Into Unauthorized Herpes Vaccine Research

The Food and Drug Administration has launched a criminal investigation into research by a Southern Illinois University professor who injected people with his unauthorized herpes vaccine, Kaiser Health News has learned. SIU professor William Halford, who died in June, injected participants with his experimental herpes vaccine in St. Kitts and Nevis in 2016 and in Illinois hotel rooms in 2013 without safety oversight that is routinely performed by the FDA or an institutional review board.

According to four people with knowledge about the inquiry, the FDA's Office of Criminal Investigations is looking into whether anyone from SIU or Halford's former company, Rational Vaccines, violated FDA regulations by helping Halford conduct unauthorized research. The probe is also looking at anyone else outside the company or university who might have been complicit, according to the sources who asked not to be identified because of the sensitivity of the matter.

The FDA rarely prosecutes research violations, usually choosing to administratively sanction or ban researchers or companies from future clinical trials, legal experts said. Even so, the agency is empowered to pursue as a crime the unauthorized development of vaccines and drugsand sometimes goes after such cases to send a message.

[...] Rational Vaccines was co-founded with Hollywood filmmaker Agustn Fernndez III, and the company received millions of dollars in private investment from investors after the Caribbean trial, including from billionaire Peter Thiel. Thiel, who for months has refused to respond to questions from KHN, contributed to President Donald Trump's campaign and is a high-profile critic of the FDA. Thiel is part of a larger libertarian movement to roll back FDA regulations to speed up medical innovation.

Three people have sued Rational Vaccines over the experimental injections.

Also at

See also: Can We Gene-Edit Herpes Away?



: New Kilauea lava vent could form at any time, scientists say Lifeboat News: The Blog

KILAUEA VOLCANO, BIG ISLAND (HawaiiNewsNow) Scientists with the U.S.G.S. issued a Volcano Activity Notice on Tuesday, warning that the magma system beneath Kilaueas East Rift Zone had become increasingly pressurized and that a new vent could form at any time if conditions persist.

Based on data observed over the past month, the new vent could form on either the existing Puu Oo cone or on an adjacent area along the East Rift Zone, scientists say.

Magma is currently accumulating at shallow depths beneath the existing Puu Oo eruption. The last time a major vent opened in the area was June 27, 2014 the appropriately-named June 27th Flow sent lava flowing more than 12 miles into the town of Pahoa, causing minor damage to roads and structures.


GPUs Mine Astronomical Datasets for Golden Insight Nuggets SoylentNews

As humankind continues to stare into the dark abyss of deep space in an eternal quest to understand our origins, new computational tools and technologies are needed at unprecedented scales. Gigantic datasets from advanced high resolution telescopes and huge scientific instrumentation installations are overwhelming classical computational and storage techniques.

This is the key issue with exploring the Universe it is very, very large. Combining advances in machine learning and high speed data storage are starting to provide hitherto unheard of levels of insight that were previously in the realm of pure science fiction. Using computer systems to infer knowledge from observation isnt new, but the scale at which we need to examine large data today certainly is.

Because the data are so unwieldy and complicated, new methods need to be devised to quickly annotate features that are important, sifting out valuable signals from all of the noise. Nothing is probably more difficult than finding the signal of an echo observed from the sound a pair of black holes colliding billions of light years away from Earth. This was the premise of the algorithms needed to make sense of the data from the Laser Interferometer Gravitational-Wave Observatory (LIGO) project. They need to filter out a vast array of noise from the real proton sized signal, it is an intrinsically computationally intensive process, the main reason being just the sheer size and noiseiness of the captured data.

The team has now published two papers on their methods to use AI to find gravitational waves. First up was the initial paper, Deep neural networks to enable real-time multimessenger astrophysics in Physics Review D, in February 2018, with the follow-on Deep Learning for real-time gravitational wave detection and parameter estimation: Results with Advanced LIGO data in Physics Letters B, in March 2018.

Original Submission

Read more of this story at SoylentNews.


Tips for an Information Security Analyst/Pentester career - Ep. 60: Pivoting attack The S@vvy_Geek Tips Tech Blog

This post follows up from Tips for an Information Security Analyst/Pentester career - Ep. 47: Post-exploitation (pt. 3), where I had tried to perform a pivoting attack, but I had failed.

This time I'm going to show you how to perform a successful attack.

Pivoting attacks are part of the post-exploitation stage.

In other words, after compromising a target, you can use that target as a bridgehead to reach other networks, that might be otherwise unreachable directly from the attacking machine.

Network configuration

In this specific case, we're going to have the following network configuration: 
Therefore, we can access the vulnerable XP machine only through LAN interface 2 in Windows 7.

Windows 7 attack (from Kali to Windows 7)

I'm going to perform the same steps explained in my previous post  Tips for an Information Security Analyst/Pentester career - Ep. 42: Client-side attacks (pt. 3) but this time I need to change the IP address for the Kali machine to

I run the malicious Winamp Rocketship skin and get a shell.

We're within our Windows 7 machine, as proven by the output of the sysinfo command.



Mans second face transplant is a world first Lifeboat News: The Blog

A man in Paris has become the worlds first to successfully receive two facial transplants.

Jrme Hamon, 43, underwent his first face transplantation procedure in 2010 to treat neurofibromatosis, a genetic disorder characterized by the growth of tumors along nerves in the skin, brain and other parts of the body. Yet Hamons body rejected the original transplant.

In January, a team of surgeons and paramedics at Georges Pompidou European Hospital AP-HP, led by surgeon Dr. Laurent Lantieri, performed Hamons second transplant.


Artificial intelligence is writing fairy tales now, and humanity is doomed Lifeboat News: The Blog

If its started to feel like all summer blockbuster movies are being written by robots [INSERT FORMER PRO WRESTLER, INSERT GIANT CGI ANIMAL], youll be disquieted to learn that that future may not be too far off.

The meditation app Calm teamed up with the tech team at Botnik to write a new Brothers Grimm-style fairy tale entirely through artificial intelligence. By inputting the data from existing Brothers Grimm stories and using predictive text technology (and with a few human writers stitching things together), the group at Botnik crafted The Princess and the Fox, a story about a talking fox [who] helps the lowly millers son to rescue the beautiful princess from the fate of having to marry a dreadful prince who she does not love.

Were doing for the Brothers Grimm what Jurassic Park did for dinosaurs, says Michael Acton Smith, co-founder of Calm, in a press press release. Were bringing them back from the dead, with modern science. (It perhaps bears remembering here that Jurassic Park famously did not end well.)


DIY Magnetic Actuator, Illustrated And Demonstrated Hackaday

Electromagnetic actuators exert small amounts of force, but are simple and definitely have their niche. [SeanHodgins] took a design thats common in flip-dot displays as well as the lightweight RC aircraft world and decided to make his own version. He does a good job of explaining and demonstrating the basic principles behind how one of these actuators works, although the robotic application claimed is less clear.

Its a small, 3D printed lever with an embedded magnet that flips one way or another depending on the direction of current flowing through a nearby coil. Actuators of this design are capable of fast response and have no moving parts beyond the lever itself, meaning that they can be made very small. He has details on an imgur gallery as well as a video, embedded below.

As we mentioned, flip-dot displays are one example of device that use this method. Compared to things like motors, these actuators may not be capable of exerting much force but have to be quite strong relative to their size. Their simplicity also means they can be made very small, which is why they are among some of the serious tricks used by micro RC airplane builders where even the most aggressively miniaturized of servo actuators are simply not an option.


One machine to rule them all: A Master Algorithm may emerge sooner than you think Lifeboat News: The Blog

Will robots dream in ones and zeros? Can they appreciate a rose by any other name? Perhaps a new class calculus will provide us with those answers, and machines with consciousness.


WebKitGTK+ Security Advisory WSA-2018-0003 Bugtraq

Posted by Michael Catanzaro on Apr 17

WebKitGTK+ Security Advisory WSA-2018-0003

Date reported : April 04, 2018
Advisory ID : WSA-2018-0003
Advisory URL :
CVE identifiers : CVE-2018-4101, CVE-2018-4113, CVE-2018-4114,
CVE-2018-4117, CVE-2018-4118, CVE-2018-4119,...


Bathroom Hot-Air Hand Dryers Can Deposit Pathogens SoylentNews

Hot-air hand dryers in multiple men's and women's bathrooms in three basic science research areas in an academic health center were screened for their deposition on plates of (i) total bacteria, some of which were identified, and (ii) a kanamycin-resistant Bacillus subtilis strain, PS533, spores of which are produced in large amounts in one basic science research laboratory.

Plates exposed to hand dryer air for 30 s averaged 18 to 60 colonies/plate; but interior hand dryer nozzle surfaces had minimal bacterial levels, plates exposed to bathroom air for 2 min with hand dryers off averaged 1 colony, and plates exposed to bathroom air moved by a small fan for 20 min had averages of 15 and 12 colonies/plate in two buildings tested.

Retrofitting hand dryers with HEPA filters reduced bacterial deposition by hand dryers 4-fold, and potential human pathogens were recovered from plates exposed to hand dryer air whether or not a HEPA filter was present and from bathroom air moved by a small fan. Spore-forming colonies, identified as B. subtilis PS533, averaged 2.5 to 5% of bacteria deposited by hand dryers throughout the basic research areas examined regardless of distance from the spore-forming laboratory, and these were almost certainly deposited as spores. Comparable results were obtained when bathroom air was sampled for spores.

These results indicate that many kinds of bacteria, including potential pathogens and spores, can be deposited on hands exposed to bathroom hand dryers and that spores could be dispersed throughout buildings and deposited on hands by hand dryers.

Original Submission

Read more of this story at SoylentNews.


NEW 'Off The Wall' ONLINE 2600 - 2600: The Hacker Quarterly

NEW 'Off The Wall' ONLINE

Posted 18 Apr, 2018 0:55:24 UTC

The new edition of Off The Wall from 17/04/2018 has been archived and is now available online.


HPR2533: Burp Suite / ABCMouse Game Hacker Public Radio more burp/android videos:



Google Announces Two Updated "AIY" (DIY AI) Kits SoylentNews

Google's new DIY AI kits could help shape the future

Google just announced two new "AIY" (it's like DIY, but for artificial intelligence) kits that build upon the ideas the company set forth with its first-generation kits. This time around, however, the new kits ship with everything a student might need to build AI solutions, including a Raspberry Pi Zero WH board.

Also at The Verge.

Original Submission

Read more of this story at SoylentNews.


Photo gallery: RSA Conference 2018 Innovation Sandbox Help Net Security

The RSA Conference 2018 is underway at the Moscone Center in San Francisco. Here are a few photos from the Innovation Sandbox, where the 10 finalists Acalvio Technologies, Awake Security, BigID, BluVector, CyberGRX, Fortanix, Hysolate, ReFirm Labs, ShieldX Networks, and StackRox demonstrated their technology to conference attendees as well as a judging panel. This years winner is BigID.

The post Photo gallery: RSA Conference 2018 Innovation Sandbox appeared first on Help Net Security.


GIMP 2.10 RC2 Released With Multi-Threaded Painting, Rewritten Themes Phoronix

In the three weeks since GIMP 2.10 finally reached the release candidate stage a lot of changes have continued to land and today marks the GIMP 2.10 RC2 availability...


Why Wont This Darn Thing Charge? Hackaday

What is more fun than plugging in your phone and coming back to find your battery on empty? Stepping on a LEGO block with bare feet or arriving hungry at a restaurant after closing probably qualify. [Alex Sidorenko] wont clean your floors or order you a pizza, but he can help you understand why cheap chargers wont always power expensive devices. He also shows how to build an adapter to make them work despite themselves.

The cheapest smart device chargers take electricity from your home or car and convert it to five volts of direct current. That voltage sits on the power rails of a USB socket until you plug in a cable. If youre fortunate, you might get a measly fuse.

Smart device manufacturers dont make money when you buy an off-brand charger, and they cant speak to the current protection of them, so they started to add features on their own chargers to protect their components and profit margins. In the case of dedicated chargers, a simple resistor across the data lines tells your phone it is acceptable power. Other devices are more finicky, but [Alex Sidorenko] shows how they work and provides Eagle files to build whatever flavor you want. Just be positive that your power supply is worthy of the reliability these boards promise to the device.

Now you know why connecting a homemade benchtop power supply to a USB cable seems good on paper but doesnt always get the job done. Always be safe when you make your own power supplies.


Overnight Tech: Dem FCC commish stepping down | Lawmakers clash over internet 'fast lanes' | Tech giants vow not to help government cyberattacks | Tax filers to get extension after IRS tech troubles The Hill: Technology Policy

CLYBURN STEPPING DOWN: Democratic FCC Commissioner Mignon Clyburn announced today that she would be stepping down, ending a nine-year tenure at the agency.She made the announcement at the FCC's open meeting on Tuesday, which Clyburn said...


Solaris 11.4 Beta Updated With Spectre V1 Mitigation, Systemd Bit To Make GNOME Happy Phoronix

While some at Oracle were busy releasing Oracle Linux 7 Update 5 as their RHEL7 downstream, the remaining Solaris developers were putting out a refreshed public beta spin of Solaris 11.4...


Anomali collaborates with Microsoft to integrate threat data Help Net Security

Threat management solutions provider Anomali announced a collaboration with Microsoft to integrate threat intelligence from the Anomali ThreatStream platform with the security insights customers can obtain from the new Microsoft Graph security API. The collaboration provides Microsoft and Anomali customers with the ability to correlate cloud service and network activity with adversary threat information. As the work progresses, the integration will provide a complete view of asset and user information from Graph providers allowing for More

The post Anomali collaborates with Microsoft to integrate threat data appeared first on Help Net Security.


Superconducting DARKNESS Integral Field Spectrograph Camera Could Directly Image Exoplanets SoylentNews

DARKNESS, an integral field spectrograph, could be used by a ground telescope to directly image exoplanets:

The DARKNESS, shorthand for "Dark-speckle Near-infrared Energy-resolved Superconducting Spectrophotometer" reads noise and dark current, small electric currents that flow through photosensitive devices.

Together, these elements can force errors in a variety of instruments, but DARKNESS, which UC Berkeley calls the "world's largest and most advanced superconducting camera," snaps thousands of frames-per-second without being affected by either. With this accuracy, scientists can determine the wavelength and arrival time of every single photon it views.

"This technology will lower the contrast floor so that we can detect fainter planets, says DARKNESS scientist Dimitri Mawet of the California Institute of Technology in a press statement. "We hope to approach the photon noise limit, which will give us contrast ratios close to 10-8, allowing us to see planets 100 million times fainter than the star. At those contrast levels, we can see some planets in reflected light, which opens up a whole new domain of planets to explore. The really exciting thing is that this is a technology pathfinder for the next generation of telescopes."

[...] According to the team's paper [DOI: 10.1088/1538-3873/aab5e7] [DX], DARKNESS is "the first of several planned integral field spectrographs." "Our hope is that one day we will be able to build an instrument for the Thirty Meter Telescope planned for Mauna Kea on the island of Hawaii or La Palma," says UC Santa Barbara physicist and team leader Ben Mazin. "With that, we'll be able to take pictures of planets in the habitable zones of nearby low mass stars and look for life in their atmospheres."

Also at Astronomy Now.

Original Submission

Read more of this story at SoylentNews.


GNOME 3.29.1 Released As The First Step Towards GNOME 3.30 Phoronix

GNOME 3.29.1 was released this afternoon as the first step towards what will eventually become GNOME 3.30 in September...


FCC moves forward with rule aimed at protecting US communications networks The Hill: Technology Policy

The Federal Communications Commission (FCC) on Tuesday proposed a new rule that would stop government programs from using agency funds to buy equipment and services from countries that pose cybersecurity risks to the United...


Photo gallery: CIO/CISO Interchange inaugural event Help Net Security

CIO/CISO Interchange, a new non-profit, non-commercial organization co-founded by Philippe Courtot, Chairman & CEO, Qualys, and the Cloud Security Alliance (CSA) was launched during RSA Conference 2018. The CIO/CISO Interchange is a private, invitation-only forum for discussions, debates and exchanges between CIOs, CTOs, CISOs and security experts centered around securing the digital transformation. There are no product pitches and no sales personnel, just frank talk on important security issues to help CXOs secure the digital More

The post Photo gallery: CIO/CISO Interchange inaugural event appeared first on Help Net Security.


NVIDIA 396.18.02 Vulkan Linux Beta Brings Better Shader Performance Phoronix

Last week NVIDIA released their first 396 Linux driver beta that most notably introduces their new "NVVM" Vulkan SPIR-V compiler. Coming out today is a new Vulkan beta update with some continued enhancements...


Industrializing additive manufacturing for electronics through an integrated, end-to-end process IEEE Spectrum Recent Content full text

Learn about how to realize the full potential of additive manufacturing, and how to employ a robust process that integrates design, engineering, manufacturing planning, and production functions.

Part manufacturers in all industries are under tremendous pressure to shorten the delivery time of high-quality products, with increasing complexity. The Electronics Industry has its own unique challenges but one theme resonates for all; in order to stay ahead in todays competitive marketplace, companies must innovate their manufacturing processes.  Additive Manufacturing (AM) offers tremendous opportunities to innovate completely new levels of competitive products, manufacturing operations, and business models. However, in order to realize the full potential of additive manufacturing, companies must employ a robust process that integrates design, engineering, manufacturing planning, and production functions.

In this webinar, we take a deeper dive into meeting this challenge head on by creating a full end-to-end additive manufacturing production system:

  • Learn how the additive manufacturing market is moving from prototyping to full production
  • How a tightly integrated system reduces the complexity of the additive manufacturing process
  • Realize the benefits of an unbroken digital thread from design to manufacturing
  • Understand the factors driving the additive manufacturing market towards sustainable, repeatable, quality industrial processes to meet the demands of the marketplace

Having an industrialized additive manufacturing process is the key to realizing the full potential of additive manufacturing.




Investor calls for oversight committee at Facebook The Hill: Technology Policy

A Facebook investor is urging other shareholders to vote to install an oversight committee for the company, arguing that more supervision is needed after a string of controversies at the social media giant.Trillium Asset Management, an activist...


France Building Whatsapp-Like Service to Avoid Privacy Breaches SoylentNews

The French government is looking to move officials away from popular apps such as WhatsApp and Telegram -- even if the French president likes using them.

As Facebook continues to reel from the Cambridge Analytica saga, the French government is taking precautions against the social media behemoth's WhatsApp service.

The French government is developing its own encrypted messaging service, Reuters reported Monday. The goal is to alleviate concerns about privacy breaches, which could result in the leaking of private conversations between top officials to foreign parties.

The French government's privacy concerns come amid a backlash against Facebook following a massive data leak concerning millions of users. WhatsApp, which provides encrypted messaging services, is owned by Facebook and shares user information with its parent company -- something that hasn't sat well with privacy regulators.

In December 2016, the European Union expressed concerns over Facebook's access to WhatsApp users' data. Just a month later, the popular social messaging platform was sued in German court over the issue, while French privacy watchdog CNIL warned WhatsApp in the same year to stop sharing user data with Facebook or risk a fine. Last month, Facebook agreed not to access any data from WhatsApp until its activities are considered compliant with a Europe-wide General Data Protection Regulation expected in May.

[...] While few details are available on the French-built messaging service, a ministry spokeswoman told Reuters the app is being designed by a "state-employed developer" and tested by "about 20 officials and top civil servants." It is hoped that the use of this app will become mandatory across the government by this summer before being rolled out to all French citizens, she added.

CNET has reached out to the French government for a comment.

Original Submission

Read more of this story at SoylentNews.


Woman who hacked airline network busted through VPN logs HackRead

By Waqas

VPN Logs Lead to Capturing of an Ex-PenAir Employee Who

This is a post from Read the original post: Woman who hacked airline network busted through VPN logs


Cambridge Analytica sought to create its own digital currency: reports The Hill: Technology Policy

Cambridge Analytica reportedly planned to raise funding through an initial coin offering (ICO) before it became the subject of controversy for improperly obtaining the data of 87 million Facebook users.The British research firm, which also worked...


Apple developing news subscription service: report The Hill: Technology Policy

Apple is reportedly planning on launching a news subscription service as a part of its integration of the magazine app Texture, which it recently acquired. The new service comes as a part of a broader push at Apple to make money from premium...


Researchers develop algorithm to detect fake users on social networks Help Net Security

Ben-Gurion University of the Negev and University of Washington researchers have developed a new generic method to detect fake accounts on most types of social networks, including Facebook and Twitter. According to their new study in Social Network Analysis and Mining, the new method is based on the assumption that fake accounts tend to establish improbable links to other users in the networks. With recent disturbing news about failures to safeguard user privacy, and targeted More

The post Researchers develop algorithm to detect fake users on social networks appeared first on Help Net Security.


DIY Drill-Powered Water Pump Hackaday

Whether you need to pump water out of your basement this spring, or just want to have fun shooting water around in the yard this summer, heres a way to build a pump instead of buying one. This is a simple but ingenious build, and [NavinK30] did everything shy of machining his own hardware and making his own tools. Well, it looks as if he might have made that drill.

As youll see in his how-to after the break, this centrifugal pump is mostly acrylic, PVC, and fasteners. [Navin] cut two sides and a base for the paddles from acrylic, and joined them with a heat-formed sidewall made of PVC. We love that he cut and bent his own paddles from sheet metal. These are bolted to a round piece of acrylic that attaches to the outside with a long hex bolt. A ball bearing mounted on the drill side allows the pump to churn freely as long as the bolt is chucked into the drill, and the hose clamp is tight enough to hold down the trigger.

Have an extra drill, but dont need to pump water? Add a camping stove and use it to power a small-batch coffee roaster.


SpaceX Will Attempt to Recover Falcon 9 Upper Stage With a "Giant Party Balloon" SoylentNews

Elon Musk's latest SpaceX idea involves a party balloon and bounce house:

Elon Musk took to Twitter Sunday night to announce a new recovery method for an upper-stage SpaceX rocket. A balloon a "giant party balloon" to quote him directly will ferry part of a rocket to a bounce house. Seriously.

[...] This isn't the first time a balloon has been used to return a rocket. Legendary programmer John Carmack's rocket company attempted to use a ballute in 2012 to return a rocket body and nose cone. It didn't work as planned and, according to officials at the time, the rocket made a "hard landing" around the Spaceport America property in New Mexico.

SpaceX has yet to recover the entire Falcon 9 fairing despite adding a parachute and positioning a boat to catch it.

The TESS launch has been delayed to Wednesday.

Also at Engadget and

Original Submission

Read more of this story at SoylentNews.


New Music Random Thoughts

Music Ive bought this month.

jukebox.php?image=micro.png&group=Matthew+Herbert&album=A+Fantastic+Woman jukebox.php?image=micro.png&group=The+Breeders&album=All+Nerve jukebox.php?image=micro.png&group=David+Byrne&album=American+Utopia jukebox.php?image=micro.png&group=Alva+Noto+and+Ryuichi+Sakamoto&album=Async+(Remodels) ...


For Samsung and Apple the Biggest Threat Has Become Patent Trolls and Aggressors in China and the Eastern District of Texas, Not Each Other Techrights

Samsung and Apple ought to unite against software patents rather than waste money (legal fees) fighting one another in court

Korean dancers

Summary: The latest stories about two of the worlds largest phone OEMs, both of which find themselves subjected to a heavy barrage of patent lawsuits and even embargoes; Samsung has meanwhile obtained an antisuit injunction against Huawei

LAST year we explained why Apple should care about software patents and work against them rather than leverage them against rivals. VirnetX has once again won a legal case against Apple, relying on questionable USPTO patents. The lawyers have just issued a press release about the ruling, which was covered in many hundreds of sites last week. We mentioned the latest ruling as well.

A week later IAM wrote about the Pantech story, which basically involved passage of many more patents to Apple. Those are USPTO patents:

Apple has acquired a portfolio of 27 US patents from Korean smartphone maker Pantech, according to assignment records filed with the USPTO. The transfer follows the iPhone manufacturers purchase last summer of a package of 11 patents from Korean NPE Goldpeak assets which were originally owned by Pantech. The latest portfolio appears to be largely focused on wireless technology and all of the grants have been made since 2012. Pantech is a Korean smartphone maker which has struggled in recent years as its local rivals LG and Samsung have thrived in the handset sector.

This isnt really a solution to Apples problems because when patent trolls like VirnetX come knocking they just dont care what patents you have (or havent). It doesnt matter to them. These cannot impact trolls. What about Apples archrival (in phones) Samsung? Watch this latest news from Asia [...


Hollywood Studios Get ISP Blocking Order Against Rarbg in India TorrentFreak

While the major Hollywood studios are very reluctant to bring a pirate site blocking case to their home turf, they are very active abroad.

The companies are the driving force behind lawsuits in Europe, Australia, and are also active in India, where they booked a new success last week.

Website blocking is by no means a new phenomenon in India. The country is known for so-called John Doe orders, where a flurry of websites are temporarily blocked to protect the release of a specific title.

The major Hollywood studios are taking a different approach. Disney Enterprises, Twentieth Century Fox, Paramount Pictures, Columbia Pictures, Universal, and Warner Bros. are requesting blockades, accusing sites of being structural copyright infringers.

One of the most recent targets is the popular torrent site Rarbg. The Hollywood studios describe Rarbg as a habitual copyright infringer and demand that several Internet providers block access to the site.

It is submitted that the Defendant Website aids and facilitates the accessibility and availability of infringing material, and induce third parties, intentionally and/or knowingly, to infringe through their websites by various means, the movie studios allege.

The complaint filed at the High Court of Delhi lists more than 20 Internet providers as co-defendants, and also includes Indias Department of Telecommunications and Department of Electronics and Information Technology in the mix.

The two Government departments are added because they have the power to enforce blocking orders. Specifically, the Hollywood studios note that the Department of Technologys license agreement with ISPs requires these companies to ensure that copyright infringing content is not carried on their networks.

It is submitted that the DoT itself acknowledges the fact that service providers have an obligation to ensure that no violation of third party intellectual property rights takes place through their networks and that effective protection is provided to right holders of such intellectual property, the studios write.

Last week the court granted an injunction that requires local Internet providers including Bharti Airtel, Reliance Communications, Telenor, You Broadband, and Vodafone to block Rarbg.

Blocking order

As requested, the Department of Telecommunications and Department of Electronics and Information Technology are directed to notify all local internet and telecom service...


Automating The Design Of Word Clocks Hackaday

Word clocks, or a matrix of light-up letters that spell out the time, are a standard build for all enterprising electronics enthusiasts. The trouble is finding the right way to drive a matrix of LEDs and the significant amount of brainpower that goes into creating a matrix of letters that will spell out the time without making it look like its supposed to spell out the time.

For his Hackaday Prize entry this year, [Stephen Legge] is creating a standard toolkit that makes word clocks easier to build. Its a hardware and software project, allowing for LED matrices of any reasonable size, and the software to make a grid of letters that only spells out the words you want and not the four-letter ones you dont.

The hardware for this project is built around the IS31FL3733 LED driver from ISSI. This is an interesting chip that takes I2C in and spits out a LED matrix with very few additional support components. This chip provides [Stephen] with a 1216 single-color LED matrix, which is more than enough for a word clock.

Where this build gets slightly more interesting is the creation of a custom matrix of letters that will still spell out quarter to noon when lit in the appropriate way. This is a big challenge in creating a customized word clock; you could always borrow the layout of the letters from another word clock, but if you want customized phrases, youll either have to sit down with a pencil and graph paper, or write some software to do it automatically.

Its a great project, and since all of [Stephen]s work is being released under Open Source licenses, its a great entry to the first portion of the Hackaday Prize where were challenging hardware creators to build Open Hardware.

The HackadayPrize2018 is Sponsored by:


The EPO Continues to Lie About Patent Quality Whilst Openly Promoting Software Patents, Even Outside Europe Techrights

Gazettes latest

EPO quality lies

Summary: EPO patent quality continues to sink while EPO management lies about it (the article above is new and not satirical) and software patents are openly being promoted/advocated

THERES NO room for humour when the EPO moves further to the right (patent extremists) while the USPTO, conversely, moves to the left. The EPO has become a rather radical organisation which not only treats workers in Medieval ways/standards but also grants monopolies similarly. It is almost as though a feudal system has reasserted control.

The EPO has become a rather radical organisation which not only treats workers in Medieval ways/standards but also grants monopolies similarly.Compare the EPO to India and to China. The Chinese government has moved so far to the right (censoring almost everything) and lowered patent quality to the point where like the EPO quality of patents is no longer recognised and dissent is not tolerated. India, contrariwise perhaps, has rejected many patents. This new article (from earlier today) speaks of confusion regarding software patents in the global IT hub, but theres no confusion; theyve banned software patents in the country a long time ago. To quote the opening paragraph:

While the world eagerly watches the development of Indias software industry, the confusion regarding software patents in the global IT hub remains considerable. This is despite or perhaps because of the three attempts by the Indian Patent Office (IPO) to establish guidelines on computer-related inventions (CRIs), each of which has provoked questions, criticism and controversy. The IPO released its latest CRI examination guidelines on June 30 2017; this chapter looks into the evolution of the guidelines, from the first set to the third, as well as the effects that they have had.

These also earned India praised, but the article (sister site of IAM) says the policy provoked questions, criti...


Nanoparticles Grow Bone, Cartilage Tissue Without Harmful Side Effects Lifeboat News: The Blog

Human stem cellsthe biological jack of all tradeshave revolutionized modern medicine, with their ability to transform into specialized cell types.

But the current approach, which requires specialized instructive protein molecules known as growth factors, comes with risks, including the potential development of unwanted tissue, i.e., a tumor.

Researchers at Texas A&M University, however, have discovered a gentler approach.


Discovery VR, Oculus Veterans Launch New AR/VR Studio Tomorrow Never Knows (EXCLUSIVE) Lifeboat News: The Blog

Four virtual reality (VR) veterans from Discovery Digital, Oculus Story Studio and Lightshed officially launched their new company out of stealth mode in San Francisco this week. Dubbed Tomorrow Never Knows, the new studio aims to use virtual and augmented reality as well as other emerging technologies including artificial intelligence for groundbreaking storytelling projects, said co-founder and CEO Nathan Brown in an interview with Variety this week.

The thesis behind the company is to consistently violate the limits of storytelling, forcing the creation of new tools, methodologies and workflow and to do this intentionally so we create original creative and technology IP, he said.

Before founding Tomorrow Never Knows, Brown co-founded Discovery VR, which has become one of the most ambitious network-backed VR outlets. Also hailing from Discovery VR is Tomorrow Never Knows co-founder Tom Lofthouse. They are joined by Gabo Arora, whose previous work as the founder of Lightshed included VR documentaries like Clouds Over Sidra and Waves of Grace, as well as Oculus Story Studio co-founder Sachka Unseld, the director of the Emmy Award-winning VR animation short Henry and the Emmy-nominated VR film Dear Angelica.


Here Are the Necessary Ingredients for a Life-Supporting Exoplanet Lifeboat News: The Blog

NASAs Transiting Exoplanet Survey Satellite, TESS for short, will add a powerful new tool to the hunt for Earth-like planets. Heres how scientists are going about identifying habitable exoplanets.



This is What Happens When Bitcoin Miners Take Over Your Town SoylentNews

Here's a month-old article from Politico Magazine about the big business of cloudscale blockchain minery in the better Washington:

Hands on the wheel, eyes squinting against the winter sun, Lauren Miehe eases his Land Rover down the main drag and tells me how he used to spot promising sites to build a bitcoin mine, back in 2013, when he was a freshly arrived techie from Seattle and had just discovered this sleepy rural community.

The attraction then, as now, was the Columbia River, which we can glimpse a few blocks to our left. Bitcoin miningthe complex process in which computers solve a complicated math puzzle to win a stack of virtual currencyuses an inordinate amount of electricity, and thanks to five hydroelectric dams that straddle this stretch of the river, about three hours east of Seattle, miners could buy that power more cheaply here than anywhere else in the nation. Long before locals had even heard the words "cryptocurrency" or "blockchain," Miehe and his peers realized that this semi-arid agricultural region known as the Mid-Columbia Basin was the best place to mine bitcoin in Americaand maybe the world.

[...] As bitcoin's soaring price has drawn in thousands of new players worldwide, the strange math at the heart of this cryptocurrency has grown steadily more complicated. Generating a single bitcoin takes a lot more servers than it used toand a lot more power. Today, a half-megawatt mine, Miehe says, "is nothing." The commercial miners now pouring into the valley are building sites with tens of thousands of servers and electrical loads of as much as 30 megawatts, or enough to power a neighborhood of 13,000 homes. And in the arms race that cryptocurrency mining has become, even these operations will soon be considered small-scale. Miehe knows of substantially larger mining projects in the basin backed by out-of-state investors from Wall Street, Europe and Asia whose prospecting strategy, as he puts it, amounts to "running around with a checkbook just trying to get in there and establish scale."

It's pretty long for an internet article but it's got pictures.

Original Submission

Read more of this story at SoylentNews.


I Was a Russian Facebook Troll Named Martha IEEE Spectrum Recent Content full text

Who has all those fake Russian Facebook accounts? I think I had one, at least for a couple of days Photo: Randi Klett The real Tekla Perry.

Back in the earliest days of Facebook, before you could attach a second name to your Facebook account or before businesses could set up pages, I created two Facebook accounts. I use my original name professionally and my married name for my personal life, and so it made sense to me that I would have a professional account and a personal account.

But before I really got going with Facebook, I started using Twitter for professional postings, so the Facebook account associated with my work email just gathered digital dust. For years and years.

A couple of weeks ago, however, I started getting notices via email from Facebook pointing out that the account hadnt been updated in a while. I thought that was odd; why would Facebook suddenly care about this old account? Is it really that desperate for traffic? And I also started getting notices whenever a friend on that account (which at that point was only me, that is, my other account) posted anything new. That was annoying, and given Id never gotten these notices before, I was pretty sure updates on your friends was not something for which I had created an email alert. I tried to log on to my old work-related account to turn the notices off, but the password failed. I wrote that off to bad recordkeeping on my part and I didnt have the time to fiddle with it, so I moved on to other things.

Screenshot of the author's alternative facebook profile. Image: Tekla Perry My Facebook profile lay dormant, until it was hijacked by an unidentified person, organization, or bot. Then Tekla Perry (real photo, at top) became Martha Negron (above). Facebooks algorithms adjusted quickly in suggesting people Martha might know.

Then last week, the notification emails started referring to me as Martha. Huh? And alerted me that I had changed my profile picture. And then came more, noting that Id added two friendsone in the Ukraine, one in Tanzaniaand suggesting a long list of possible friends, most of whom were tagged in Cyrillic. It looked like my dusty little Facebook account was turning into a Russian troll. (Ironically, my actual first name is of Russian originbut I guess you cant have a Russian troll with a Russian name.)

I dug through all of Facebooks reporting mechanismsthere wasnt any option for Im a troll. I couldnt report my own profile for abuse, only report someone elses profile, or posts someone else had made. The online menus sent me through...

FlyJacket Lets You Control a Drone With Your Body IEEE Spectrum Recent Content full text

EPFL's FlyJacket exosuit allows you to embody a fixed-wing drone, making it feel like you're flying Photo: EPFL LIS

It takes a lot of practice to fly a drone with confidence. Whether its a multirotor or a fixed-wing drone, there are a lot of complicated things going on all at once, and most of the control systems are not even a little bit intuitive. The first-person viewpoint afforded by drone-mounted cameras and VR headsets helps, but youre still stuck with trying to use a couple of movable sticks to manage a flying robot, which takes both experience and concentration.

EPFL has developed a much better system for drone control, taking away the sticks and replacing them with intuitive and comfortable movements of your entire body. Its an upper-body soft exoskeleton called FlyJacket, and with it on, you can pilot a fixed-wing drone by embodying the droneput your arms out like wings, and pitching or rolling your body will cause the drone to pitch or roll, all while you experience it directly in immersive virtual reality.

Weve seen a few projects that explore the same basic idea as FlyJacket; the most notable is probably Birdly, which is a sort of platform that you lie down on while wearing a VR headset, flapping your arms like a bird as a fan blows air in your face. Itll make more sense if you watch the video, and people seem to like it, but its not exactly portable (or cheap) and the amount of control that you get is fine for VR but not ideal for flying a drone in real life. 

FlyJacket, on the other hand, was designed to be portable and affordable. Developed at EPFLs Laboratory of Intelligent Systems, led by Professor Dario Floreano, the exosuit doesnt require much in the way of training since its inherently so intuitive. It may look a little bit awkward, but those arm supports (which are removable) make it comfortable for long-term use by offloading the weight of your outstretched arms down to your hips. Sensors in the suit detect body motion, and translate torso pitch (bending forwards and backwards) into drone pitch, and torso roll (bending sideways) into drone roll. Its worth noting that neither of these motions require your arms to be outstretched, or really for your arms to move at all, but its instinctive for people to hold their arms out when theyre pretending to fly, and theyre more comfor...


Android malware on Play Store targeting Palestinians on Facebook HackRead

By Waqas

We have reported time and again about the widespread malware

This is a post from Read the original post: Android malware on Play Store targeting Palestinians on Facebook


SCOTUS on WesternGeco v Ion Geophysical Almost Done; Will Oil States Decision Affirm the PTABs Quality Assurance (IPRs) Soon? Techrights

The Patent Trial and Appeal Board (PTAB) might get its role cemented by months end

WesternGeco LLC v. ION Geophysical Corp.

Summary: Ahead of WesternGeco and Oil States, following oral proceedings, its expected that the highest court in the United States will deliver more blows to patent maximalism

TECHRIGHTS attempts to simplify things and strives to put US patent news in simple terms that anyone can understand. The USPTO and US courts just like law firms that try to impress/show off by confusing like using jargon, legalese and sometimes Latin words/phrases. Its like they encrypt everything to necessitate professional legal advice while pushing away those outside the patent microcosm (excluding it from the debate).

The US Supreme Court (SCOTUS) is a bit different. When dealing with patent matters it uses more generic terms because it looks at the matters from a Constitutional perspective and Justices unlike patent judges arent experts in these particular domains (which is a positive, not just a negative). Justices can look outside the box, so to speak, and sometimes their rulings can be expected based on what they say in oral proceedings. They very often overturn the CAFC (Federal Circuit), which historically needed patent maximalism to justify its existence.

Its like they encrypt everything to necessitate professional legal advice while pushing away those outside the patent microcosm (excluding it from the debate).The other day I publicly exchanged some messages with Daniel Nazer (EFF) regarding Oil States. Its a decision that everyone in the patent world is waiting for and it has been almost exactly a year since TC Heartland. Nazer told me that Oil States will be decided before summer after he had written about WesternGeco (not so relevant to us) as follows: Thoughts on WesternGeco hearing today in S.Ct: 1) did not go well for respondent; 2) court likely to reverse Fed Cir; 3) ruling will open door to international damages in 271(a) cases (bad) but leave open possibility comity/proximate cause cuts chain of causation in those cases. [...


Democratic FCC Commissioner stepping down The Hill: Technology Policy

Federal Communications Commissioner Mignon Clyburn on Tuesday announced that she would be stepping down from her post at the agency. Her resignation follows months of anticipation that she would leave the agency. The Democratic commissioner has held...


Beatrice Tinsley and the Evolution of Galaxies Hackaday

It seems almost absurd now, but cosmologists once assumed that galaxies of a given type were all the same and didnt change. Because of this assumption, galaxies were used as a redshift or light-based yardstick to measure distances in the universe. But what if some galaxies were intrinsically redder than others? Little to no thought was given to their origins, compositions, or evolution until Beatrice Tinsley came along.

Beatrice saw galaxies as changing bodies of stars. She believed that they grew, evolved, and died because theyre made of stars, and thats what their star populations did. To lump all galaxies together and use them as a standard candle was an oversimplification. Beatrice created the first computer model of a galaxy to prove her point and in doing so, she founded the field of galaxy evolution.

If youve never heard of Beatrice, dont feel bad. Just as her career was really beginning to take off, she developed cancer and died shortly after her 40th birthday. Though her life was short, her influence on cosmology is long-reaching.

Beatrice earns her PhD in 1966. Via Science Learn NZ

Renaissance Woman

Beatrice Muriel Hill was born in 1941 as WWII raged in and around Chester, England,...


Drummer With Cyborg Arm Wants to Take It On Tour IEEE Spectrum Recent Content full text

Jason Barnes' Kickstarter campaign aims to drum up funds to build a duplicate that's not tied to the Georgia Tech robotics lab where it was developed Photo: Georgia Tech

Because we write so much about futuristic, cutting edge technology, were often covering things that are so brand new that only one of them may exist in the world. What we dont often discuss, though, is how frustrating it must be to get to test one of these 0ne-off inventions out, only to have to give it right back after whatever research youre participating in has concluded.

Georgia Tech professor Gil Weinberg has been developing prosthetic limbs that can play music with the help of Jason Barnes, a drummer and amputee. One cyborg arm Barnes has been fitted with allows him to play faster than humanly possible. He's used it in enough performancesincluding one at the Kennedy Centerthat he considers the arm to be a part of his musical identity now. But heres the rub: The cybernetic arm is technically the property of Georgia Tech, and doesn't belong to Barnes.

Today, Weinberg and Barnes are launching a Kickstarter campaign to raise funds to build a custom prosthetic drumming arm that Jason can take on tour. It wont be cheap, but Barnes thinks itll be worth every penny. With it, hell be able to create music that no other human has ever been able to.

The Cyborg Drummer Project Kickstarter is looking to raise $90,000; of that, $70,000 will go straight to production of the new arm. A big chunk of the cost comes from trying to replace the couple of computers and a technical team that are currently required to operate the arm with components that are portable, self-contained, and user operated. The remaining $20,000 will go towards organizing concerts and making recordings so that folks who contribute will be able to hear and enjoy some of the result, potentially in person.

One of the unique things about the prosthetic that Weinberg and Barnes want to build is that it will be partially autonomous. There are two drumsticks: Barnes controls one; the other operates autonomously through its own actuator. The arm listens to the music being played (by Jason and the musicians around him...


Nginx 1.14 Web Server Released Phoronix

Nginx 1.14.0 is now available as the latest open-source stable release of this popular web server alternative to Apache...


Google launches updated DIY kits for AI Voice and Vision TechWorm

Google rolls out updated DIY AI Vision and Voice kits that include a Raspberry Pi Zero

Last year, Google had launched its AIY (Artificial Intelligence Yourself) projects also known as AI DIY to improve and create tools that will give the developers the power to build AI into their projects. Back then, the search giant had launched two do-it-yourself kits: Voice Kit and Vision Kit, which were specially designed to integrate into educational plans.

Google in a blog post said that theyve noticed continued demand for the Voice and Vision Kits especially from the STEM audience where parents and teachers alike have found the products to be great tools for the classroom.

Now, the search giant has released updated versions of its Voice Kit and Vision Kit that are not only easy to assemble but also more widely available. This will give students and educators an easy, cheap platform for developing and programming their own smart gadgets.

Previously, the Voice Kit and the Vision Kit, had to depend upon the Raspberry Pi board, which the users had to purchase separately other than the AIY kits. However, Google has decided to make it easy for you to build your own smart speaker similar to a Google Home or a smart home camera that can detect faces and expressions by including everything that you need, including the boards in the updated versions of its Voice Kit and Vision Kit. The box will also include clear instructions on how to setup.

To make setup easier, both kits have been redesigned to work with the new Raspberry Pi Zero WH, which comes included in the box, along with the USB connector cable and pre-provisioned SD card. Now users no longer need to download the software image and can get running faster. The updated AIY Vision Kit v1.1 also includes the Raspberry Pi Camera v2, Google adds.

Google is also releasing an AIY companion app for Android, available in Google Play, to make wireless setup and configuration a snap. Google is also working on releasing an AIY companion app for iOS and Chrome very soon.

You can purchase the new Vision Kit and Voice Kit at U.S. Target Stores and for $89.99 and...


Is Using Cat Videos Effective for Overwriting Sensitive Data on a Hard Drive? SoylentNews

I once read in a news article (can't find it now... sorry) that apparently if you overwrite data with other data on a hard drive that the previous data is unrecoverable. So, would overwriting the entire hard drive with cat videos be just as effective as all these other "professional" security protocols that are used?

janrinok: Data erasure is important when you want to prevent anyone from recovering whatever was written on the storage device in the first instance. But there are many potential problems including just how secure does the erasure have to be, what hardware is controlling the reading and writing to the disk, are you attempting to delete data on a spinning rust device, a more modern SSD , or a thumb drive, and who are you trying to prevent from reading the data? If you are just trying to prevent a regular Joe Soap from reading what you once securely stored on a hard drive then simple overwriting might be enough. However, if you are concerned that law enforcement or a government agency might be interested in the drive's contents then you will have to take more stringent precautions. Ultimately, many of the highest classifications of data can only be securely erased by full degaussing or the physical destruction of the device. The link details the various standards that are deemed as acceptable to securely erase data to meet specific documented requirements.

Read more of this story at SoylentNews.


House Dems, GOP clash over internet 'fast lanes' The Hill: Technology Policy

House Democrats and Republicans are clashing over internet fast lanes, a major sticking point for the two sides in the battle over net neutrality.Since the GOP-controlled Federal Communications Commission (FCC) overturned the Obama-era net...


Dr. Josh Mitteldorf Are we on the verge of major breakthroughs in anti-aging science? Lifeboat News: The Blog

Today we bring you an interview with author and researcher Dr. Josh Mitteldorf who runs the aging research blog Aging Matters.

Dr. Josh Mitteldorf is an evolutionary biologist and a long-time contributor to the growing field of aging science. His work in this field has focused on theories of aging. He asks the basic question: why do we age and die? This can seem like a silly question to people encountering it for the first time because most of us would quickly respond, Because thats just how it is; all creatures age and die eventually as their bodies wear out.

Essentially, Josh is saying, Not so fast. In fact, a lot of creatures dont age and die. Humans, as well as most other animals that do age and die, are programmed to do so. So, humans are programmed to die in much the same way that salmon are programmed to die after spawning.


Links 17/4/2018: Linux 5.x Plans and Microsofts Embrace Techrights

GNOME bluefish




Intel Processors Now Allows Antivirus to Use Built-in GPUs for Malware Scanning The Hacker News

Global chip-maker Intel on Tuesday announced two new technologiesThreat Detection Technology (TDT) and Security Essentialsthat not only offer hardware-based built-in security features across Intel processors but also improve threat detection without compromising system performance. Intel's Threat Detection Technology (TDT) offers a new set of features that leverage hardware-level telemetry


Microsoft built its own Linux Kernel for IoT devices TechWorm

Microsoft introduces Azure Sphere to secure IoT devices with chips and Linux

Microsoft yesterday announced a Linux-based operating system called Azure Sphere, an ARM-based platform for the Internet of Things (IoT) with a focus on security, at the RSA 2018 security conference. The main purpose of creating Azure Sphere is to secure millions of microcontroller-based devices that come online as part of the IoT.

Azure Sphere mainly contains three components that work together to protect and power devices at the intelligent edge: certified microcontrollers (MCUs), the Azure Sphere Security Service a cloud-based security service for connecting and security IoT devices, and Azure Sphere OS a custom Linux-based operating system, which marks the first time Microsoft has basically launched its own Linux distribution.

Microsoft says the goal is to be able to offer security protection for a 10-year lifetime of the device.

The announcement was made on Microsofts Azure blog that can be read here and a description of each new component is given below:

  • Azure Sphere certified microcontrollers (MCUs): A new cross-over class of MCUs that combines both real-time and application processors with built-in Microsoft security technology and connectivity. Each chip includes custom silicon security technology from Microsoft, inspired by 15 years of experience and learnings from Xbox, to secure this new class of MCUs and the devices they power.
  • Azure Sphere OS: This OS is purpose-built to offer unequalled security and agility. Unlike the RTOSes common to MCUs today, our defense-in-depth IoT OS offers multiple layers of security. It combines security innovations pioneered in Windows, a security monitor, and a custom Linux kernel to create a highly-secured software environment and a trustworthy platform for new IoT experiences.
  • Azure Sphere Security Service: A turnkey, cloud service that guards every Azure Sphere device; brokering trust for device-to-device and device-to-cloud communication through certificate-based authentication, detecting emerging security threats across the entire Azure Sphere ecosystem through online failure reporting, and renewing security through software updates. It brings the rigor and scale Microsoft has built over decades protecting our own devices and data in the cloud to MCU powered devices.

Azure Sphere Security Service will be compatible not only with Azure, but also with other cloud infrastructure providers such as Amazon Web Services (AWS), Google Cloud, IBM, Oracle, and others, says Microsoft chief financial officer Brad Sm...


Tech giants sign pledge not to aid government cyberattacks The Hill: Technology Policy

More than 30 major technology firms, including Microsoft and Facebook, signed a pledge on Tuesday agreeing that they would not assist any government in launching cyberattacks, vowing to protect all customers regardless of nationality,...


US, UK, and Australian governments accuse Russia of targeting networking infrastructure Graham Cluley

An alert warns that since 2015 large numbers of enterprise-class and consumer routers, switches, firewalls, and Network-based Intrusion Detection Systems have been compromised to further the national security and economic goals of Russia.

Read more in my article on the Bitdefender Business Insights blog.


3D Printing Watertight Containers Hackaday

Most normal 3D prints are not watertight. There are a few reasons for this, but primarily it is little gaps between layers that is the culprit. [Mikey77] was determined to come up with a process for creating watertight objects and he shared his results.

The trick is to make the printer over extrude slightly. This causes the plastic from adjacent layers to merge together. He also makes sure there are several layers around the perimeters.

Of course, over extruding may not be good for your parts dimensions. There are other techniques weve seen that work, too, like acetone smoothing ABS or using an epoxy coating to seal the print. Those are probably not going to keep your dimensions, either.

[Mikey77] talks a lot about food safety. Just remember, theres more to food safety than just being watertight. We covered a lot of considerations about food safety and 3D printing. However, even if you just want to hold water for flowers or print an airway for a pick and place system, these techniques could be very handy even if not food safe.

Maybe with these kinds of techniques, well see more 3D printed boats. Or perhaps a real submarine.


Top Cars to buy under 4 Lakhs In India TechWorm

One needs to be careful while buying a car for teenagers. They have grown up in an era which was more advanced than that of us. While we used to find our way by asking the routes from the passersby, these people simply fire the navigation. The young generation will love to have music and mobile connectivity options in their new cars. Also, you will need to be sure about the cars safety features.

Among a wide range of cars, we have listed the best four low price cars in India that can fulfil all your demands as well as your teens convenience requirements.

Tata Tiago









The Tata Tiago is one of the best options in this price range as it comes with a magnificent build quality along with a premium design. It comes with some convenience features such as smartphone-enabled Turn-By-Turn Navigation app, Juke-Car app and Multi-drive mode (City & Eco).

The vehicle is blessed with a 1.2-litre Revotron petrol engine that churns out up to 83 bhp power by developing 114 Nm of peak torque. Moreover, it is also available with a 1.05 L Revotorq diesel motor, which is capable of providing a maximum of 67 bhp power and 140 Nm torque. Both the engines are mated to a 5-speed manual transmission.

The base model of the Tata Tiago is priced at Rs. 3.24 lakhs (Ex-showroom, Delhi).

Also Read: Top 5 Hot Deals in Sedans in April 2018

Renault Kwid



This remarkable spinal implant was created by an algorithm Lifeboat News: The Blog

With the right design, titanium implants can be moulded closer to the form and stiffness of human bone. To perfect the design all you need is an algorithm and a 3D printer.


Wormholes Could Cast Shadows That We Can Detect Lifeboat News: The Blog

Wormholes, or hypothetical tunnels through space-time that allow faster-than-light travel, could potentially leave dark, telltale imprints in the sky that might be seen with telescopes, a new study suggests.

These slightly bent, oblong wormhole shadows could be distinguished from the more circular patches left by black holes and, if detected, could show that the cosmic shortcuts first proposed by Albert Einstein more than a century ago are, in fact, real, one researcher says.

Wormholes are cosmic shortcuts, tunnels burrowing through hyperspace. Hop in one end, and you could emerge on the other side of the universe a convenient method of hyperfast travel thats become a trope of science fiction. [8 Ways You Can See Einsteins Theory of Relativity in Real Life].


The more hours you sit per day, the smaller your medial temporal lobe (MTL) seems to become, brain scans show Lifeboat News: The Blog

Important The researchers found that sedentary behavior is a significant predictor of thinning of the MTL and that physical activity, even at high levels, is insufficient to offset the harmful effects of sitting for extended periods

In the study, both (A) Total medial temporal lobe (MTL) and (B) parahippocampal thickness correlated inversely with hours of sitting/day, controlling for age. Reference: Siddarth P et al (2018), Sedentary behavior associated with reduced medial temporal lobe thickness in middle-aged and older adults. PLOS ONE.


UK NCSC, DHS and the FBI Warn of Russian hacking campaign on Western networks Security Affairs

UK NCSC, DHS, and the FBI warn of Russian hacking campaign on Western networks, state-sponsored hackers are targeting network infrastructure key components.

US and Britain government agencies warn of Russian state-sponsored cyber attacks to compromise government and business networking equipment. Russian hackers aim to control the data flaw to support espionage, extract intellectual property, maintain persistent access to victim networks and potentially lay a foundation for future offensive operations,

The operation was to support espionage, extract intellectual property, maintain persistent access to victim networks and potentially lay a foundation for future offensive operations, Washington and London said in a joint statement.

Russian state-sponsored actors are using compromised routers to conduct spoofing man-in-the-middle attacks to support espionage, extract intellectual property, maintain persistent access to victim networks and potentially lay a foundation for future offensive operations, reads a joint statement issued by UK and US Goverments.

Whoever controls the routing infrastructure of a network essentially controls the data flowing through the network.

According to the US DHS, the campaign is part of well known Grizzly Steppe.

In December 2016, the Department of Homeland Security (DHS) and the Federal Bureau of Investigation (FBI) published a Joint Analysis Report(JAR) that provided information about the tools, infrastructure and TTPs used by the Russian civilian and military intelligence Services (RIS) against United States election.

U.S. Government linked the cyber activity to a Russian threat actor designated as GRIZZLY STEPPE.  It was the first time that the JAR attributed a malicious cyber activity to specific countries or threat actors.

The JAR reports the activity of two different RIS actors, the APT28 and the APT29, that participated in the cyber attacks on a US political party. The APT29 known as (Cozy Bear, Office Monkeys, CozyCar, The Dukes and CozyDuke) broke into the partys systems in summer 2015. The APT28 known as (...


Security updates for Tuesday

Security updates have been issued by Debian (corosync, linux-tools, qemu, qemu-kvm, and r-cran-readxl), openSUSE (evince, memcached, nodejs4, ntp, pdns-recursor, python-gunicorn, python3-gunicorn, and python3), and Ubuntu (ruby1.9.1, ruby2.0, ruby2.3).


Japan Team Maps 'Semi-Infinite' Trove of Rare Earth Elements SoylentNews

Submitted via IRC for TheMightyBuzzard

Japanese researchers have mapped vast reserves of rare earth elements in deep-sea mud, enough to feed global demand on a "semi-infinite basis," according to a new study.

The deposit, found within Japan's exclusive economic zone waters, contains more than 16 million tons of the elements needed to build high-tech products ranging from mobile phones to electric vehicles, according to the study, released Tuesday in the journal Scientific Reports.

[...] The finding extrapolates that a 2,500-sq. km region off the southern Japanese island should contain 16 million tons of the valuable elements, and "has the potential to supply these metals on a semi-infinite basis to the world," the study said.

The area reserves offer "great potential as ore deposits for some of the most critically important elements in modern society," it said.

The report said there were hundreds of years of reserves of most of the rare earths in the area surveyed.


Original Submission

Read more of this story at SoylentNews.


SpaceX just got approval to build Mars spaceships in Los Angeles from the citys mayor Lifeboat News: The Blog

SpaceX just got the okay to build its giant Mars spaceship in LA.

Los Angeles Mayor Eric Garcetti said on Monday that hes officially approved SpaceXs plan to build a Mars spaceship factory at the citys port.


North and South Korea Reportedly Set to Announce Official End to War

Via: Reuters: North and South Korea are in talks to announce a permanent end to the officially declared military conflict between the two countries, daily newspaper Munhwa Ilbo reported Tuesday, citing an unnamed South Korean official. Ahead of a summit next week between North Korean premier Kim Jong Un and South Korean President Moon Jae-in, []


Experts Call for Global Data Sharing to Defend Against Cyberattacks IEEE Spectrum Recent Content full text

A new cybersecurity report highlights the need for a worldwide data clearinghouse to thwart next-generation, AI-powered hacks Illustration: iStockphoto

If they havent done so already, cyber attackers may soon be arming themselves with artificial intelligence and machine learning (ML) strategies and algorithms. Before long, it may not be a fair fight if defenders remain naive to what AI and ML can do on both sides of the battle. So suggests a new report by IEEE and the Canadian tech consulting firm Syntegrity.

The reportstemming from a three-day intensive last October of cybersecurity experts from government, the military, and industryaggregates the groups findings into what it calls the six dimensions at the intersection of AI, ML, and cybersecurity.

First, the report advocates ways to keep cybersecurity regulations and laws up to speed with the latest developments in the field. The report says that laws and legal precedents should be altered to encourage, not burden or discourage, continued research toward anticipating and countermanding next-generation cyberattacks.

Specifically, it notes, both copyright and export control standards need to be modified to allow security researchers to investigate cutting-edge cybersecurity questions without worrying about running afoul of outdated laws and regulations.

Brian David Johnson, Futurist in Residence at Arizona State University and contributor to the report, says cyberdefense research is no longer an academic exercise or incidental curio. Increasingly, he says, the severity, sophistication, and frequency of cyberattacks is making cyberdefense crucial to both the commercial and public sphere.

We are starting to see cybersecurity and defense against cyber and digital attacks mature, he says. What weve seen over the last five years is increasingly larger, deeper, broader attacks. Not only is it raising this to the attention of people, its also becoming bad for businessand bad for the business of government.

Report co-sponsor and professor of electrical engineering at West Point, Col. Barry Shoop, says one of the more significant recommendations from the report involved a widespread problem that has emerged when a company or government agency in any field tries to mount an effective cyberdefense.

In the for-profit sector, say a financial institution, th...


Plight of the Bees Hits Unaware Businesses SoylentNews

Agriculture's dependence on pollinators, including both wild and domesticated bees, has increased fourfold since the 1960s. A recent study of these pollinators found that they provide up to $577 billion a year of crops, half of which comes from wild pollinators. These ratios underline the severity of their collapsing numbers. More than a third are facing extinction.

Gemma Cranston, head of the Cambridge Institute for Sustainability Leadership team that participated in the study, warned that "less than half the companies sampled know which of the raw materials they source depend on pollinators", adding that there needs to be more research to get the full picture.

Plight of the bees hits unaware businesses

Original Submission

Read more of this story at SoylentNews.


Supreme Court tosses out DOJ case against Microsoft The Hill: Technology Policy

The Supreme Court on Tuesday tossed out the case the government had brought against Microsoft over whether law enforcement can search and seize data stored overseas. In a three-page order, the court said the dispute is resolved...


Over 20 million Chrome users have installed fake malicious Ad Blockers HackRead

By Waqas

Ad Blockers play a vital role in hurting the earnings

This is a post from Read the original post: Over 20 million Chrome users have installed fake malicious Ad Blockers


P-State/CPUFreq CPU Frequency Scaling Tests For Radeon/NVIDIA Gaming With Linux 4.16 Phoronix

With last week's release of Feral GameMode as a system tool to optimize Linux gaming performance, which at this point just toggles the CPU frequency scaling driver's governor to the "performance" mode, reignited the CPU governor debate, here are some fresh Linux gaming benchmarks. Tests were done with both the CPUFreq and P-State scaling drivers on Linux 4.16 while testing the various governor options and using both AMD Radeon and NVIDIA GeForce graphics cards.


Cloud Foundry for Developers: Definitions

Cloud Foundry for Developers: Definitions


Beeping The Enemy Into Submission Hackaday

In July 1940 the German airforce began bombing Britain. This was met with polite disagreement on the British side and with high technology, ingenuity, and improvisation. The defeat of the Germans is associated with anti-aircraft guns and fighter planes, but a significant amount of potential damage had been averted by the use of radio.

Night bombing was a relatively new idea at that time and everybody agreed that it was hard. Navigating a plane in the dark while travelling at two hundred miles per hour and possibly being shot at just wasnt effective with traditional means. So the Germans invented non-traditional means. This was the start of a technological competition where each side worked to implement new and novel radio technology to guide bombing runs, and to disrupt those guidance systems.

Finding a Runway is Like Finding a Bombing Target

For the first four months of the campaign, Germany used a guidance system called Knickebein. This translates as crooked leg and allegedly was derived from the shape of the transmitting antennas. In 1940, radio navigation was decades old technology and in wide-spread use. The Lorenz system for example was a landing aid that allowed pilots to precisely line up with a runway from as far as 30 miles away. Such systems were in international use since the mid thirties.


Tuesday, 17 April


Scientists accidentally discovered a mutant enzyme that could help the world eliminate plastic waste Lifeboat News: The Blog

Researchers in the US and UK examined an existing enzyme which had occurred naturally in landfill sites and was able to slowly digest man-made plastics.

But in the course of testing the enzymes origins, the researchers made biological changes to it that turbo-charged its ability to digest plastics, according to Britains University of Portsmouth.

According to The Guardian, the enzyme starts breaking down plastic in a matter of days, a process which would take centuries under normal conditions.



Whats the Value of CI/CD?

There are two questions you have to ask when considering shipping software:


Making the Most Out of Microservices with Service Mesh

Making the Most Out of Microservices with Service Mesh


This Week in Programming: Thats How C Does It

I had grand ambitions this week. Id come across a smattering of articles delving into the history of programming languages, practices, and other Internet-based tidbits. Id pondered a pithy title like if !mistake(history) do repeat and dug through my source materials for evidence, but came up a bit empty-handed. In the end, the line that really summed up this weeks theme was found at the closing of an interesting article asking why does = mean assignment?


The Ars Guide to Building a Linux Router from Scratch

After finally reaching the tipping point with off-the-shelf solutions that can't match increasing speeds available, we recently took the plunge. Building a homebrew router turned out to be a better proposition than we could've ever imagined. With nearly any speed metric we analyzed, our little DIY kit outpaced routers whether they were of the $90- or $250-variety.


Finding What Youre Looking for on Linux

It isnt hard to find what youre looking for on a Linux system a file or a command  but there are a lot of ways to go looking.

7 commands to find Linux files


The most obvious is undoubtedly the find command, and find has become easier to use than it was years ago. It used to require a starting location for your search, but these days, you can also use find with just a file name or regular expression if youre willing to confine your search to the local directory.

From USENET to Facebook: The Second Time as Farce

Facebook repeats the pattern of USENET, this time as farce. As a no-holds-barred Wild West sort of social network, USENET was filled with everything we rightly complain about today. It was easy to troll and be abusive; all too many participants did it for fun. Most groups were eventually flooded by spam, long before spam became a problem for email. Much of that spam distributed pornography or pirated software (warez). You could certainly find newsgroups in which to express your inner neo-Nazi or white supremacist self. Fake news?

IndyWatch Science and Technology News Feed Archiver

Go Back:30 Days | 7 Days | 2 Days | 1 Day

IndyWatch Science and Technology News Feed Today.

Go Forward:1 Day | 2 Days | 7 Days | 30 Days

IndyWatch Science and Technology News Feed was generated at World News IndyWatch.

Resource generated at IndyWatch using aliasfeed and rawdog