IndyWatch Science and Technology News Feed Archiver

Go Back:30 Days | 7 Days | 2 Days | 1 Day

IndyWatch Science and Technology News Feed Today.

Go Forward:1 Day | 2 Days | 7 Days | 30 Days

IndyWatch Science and Technology News Feed was generated at World News IndyWatch.

Thursday, 18 October


The Pirate Bay And Other Sites Ordered To Be Blocked By ISP Telia TechWorm

ISP Telia has been ordered by the court to block The Pirate Bay, Fmovies, Dreamfilm, and other sites

Telia, an internet service provider (ISP) which operates in Sweden, in an interim ruling on Monday has been ordered by Swedens Patent and Market Court to block large torrent and streaming platforms, such as The Pirate Bay, Dreamfilm, FMovies, and NyaFilmer.

The decision comes following a complaint by a huge association of content companies and groups including the Swedish Film Industry, Nordisk Film, Disney, Paramount, Columbia, Disney, and Twentieth Century Fox.

Also Read: The Pirate Bay Alternatives- 10 Best Torrent Sites like TPB (2018)

Site-blocking has become one of the preferred anti-piracy tools by many content companies and distributors who are looking to decrease the level of copyright infringement.

It all started in Sweden last year when the Swedish Patent and Market Court of Appeal ordered local ISP Bredbandsbolaget (Broadband Company) to block The Pirate Bay and streaming site Swefilmer. Back then, Telia said that it would not block The Pirate Bay, unless it is forced to do so by law and that the decision only affected Bredbandsbolaget.

The order by the Patent and Market Court has now put Telia in the same situation that Bredbandsbolaget was last year.

Per Strmbck of the Film and TV Industry Cooperation Committee said in a statement that a favorable decision was expected, reported IDG.

The decision was expected and complies with the current legal situation. Now its high time that Telia takes the same responsibility in Sweden as it already does in Denmark and Norway, Strmbck said.

However, site blocking in Sweden is not as easy as it seems, as the same was observed in last years decision in the Bredbandsbolaget case.

Apparently, the Court discovered that under EU law, the copyright holders can obtain an injunction against ISPs whose services are used to carry out copyright infringement, mentioning that the Swedish Copyright Act should be interpreted in the light of EU law.

The Court also wanted to ensure before deciding on an injunction that any blocking would be proportional. A blocking order is now considered an appropriate response since sites like The Pirate Bay and similar platforms primarily offer illegally-distributed copyright-protected content.

The interim ruling handed by the Court on Monday will be valid from October 30. Effective that date, Telia will stop providing subscribers access to the sites that are mentioned in the complaint and will continue to follow it until the case is finalized. Meanwhile, Telia says it is considering its position.

We are surprised by the news and we are going to analyze the decision to decide if we will appeal, Telia spokesper...


Balancing Robots From Off-The-Shelf Parts Hackaday

In this day and age, we are truly blessed as far as the electronics hobby is concerned. Advanced modules such as gyros and motor controllers are readily available, not just as individual parts, but as pre-soldered modules that can be wired together with a minimum of fuss and at low cost. This simple balancing robot is a great example of what can be done with such parts (Google Translate link).

The robot has an ESP32 running the show, which provides both the processing power required, as well as the WiFi interface used to control the bot from a smartphone. This is achieved using an app from JJRobots, an open-source robotics teaching resource. Stepper motors are controlled by DRV8825 modules sourced from amazon, and an MPU6050 gyro rounds out the major components. Naturally, source code is available on GitHub for your reading pleasure.

Its remarkable that in this day and age, its possible to build such a project with little to no soldering required at all. With a credit card and a healthy supply of patch leads, its possible to whip up complex digital projects quite quickly. Weve seen a similar approach before, too. Video after the break.

[Thanks to Baldpower for the tip!]


Windows 10 October 2018 Update Build 17763.104 released to Insiders with fixes TechWorm

Patched Windows 10 October 2018 Update Build 17763.104 Released To Slow And Release Preview Rings

This cumulative update KB4464455 that brings the build number up to 17763.104 comes after the file deletion bug that saw Microsoft pausing the rollout of Windows 10 October 2018 update to the public.

The new update adds no new features. According to Microsoft, the Cumulative Update contains the following fixes:

  • We have fixed the issue where the incorrect details were being shown in Task Manager under the Processes tab.
  • We fixed an issue where in certain cases IME would not work in the first process of a Microsoft Edge user session.
  • We fixed an issue where in some cases applications would become unresponsive after resuming from Connected Standby.
  • We fixed several issues causing application compatibility problems with 3rd-party antivirus and virtualization products.
  • We fixed several issues with driver compatibility.

While the new update adds no new features, it, however, does fix the bug in Task Manager in Windows 10 October 2018 Update that caused it to incorrectly report CPU usage. It has also fixed driver compatibility issues and capability issues with 3rd-party antivirus product experienced by some users.

Currently, Microsoft has paused the Windows 10 October 2018 Update and it is unclear when it would re-release the final patch that has fixed all the critical issues.

Insiders in the Slow and Release Preview Ring can install the latest updates by opening Settings, then navigating to Updates & Security and tapping on check for updates button.

The post Windows 10 October 2018 Update Build 17763.104 released to Insiders with fixes appeared first on TechWorm.


Security updates for Wednesday

Security updates have been issued by CentOS (tomcat), Debian (asterisk, graphicsmagick, and libpdfbox-java), openSUSE (apache2 and git), Oracle (tomcat), Red Hat (kernel and Satellite 6.4), Slackware (libssh), SUSE (binutils, ImageMagick, and libssh), and Ubuntu (clamav, libssh, moin, and paramiko).


Re: ghostscript: bypassing executeonly to escape -dSAFER sandbox (CVE-2018-17961) Open Source Security

Posted by Rich Felker on Oct 17

I don't, but one further idea that might appeal to upstream if they
want the fs bindings for the sake of executing ancient programs
written in postscript that operate on files: rather than binding to
actual fs operations on the host, implement a virtual filesystem
within the interpreter, and require explicit command line options to
import/export files from/to the real filesystem at entry/exit.



A Techie's Tour of New York City IEEE Spectrum Recent Content full text

Here are some NYC attractions that you won't find in the guidebooks

Do your travel plans include New York City? Are you a techie? If the answer to those questions is yes, let IEEE Spectrum be your guide! Weve put together a list of some of our favorite places to visit, including important locations in the history of electrotechnology (New York was once the center of the electrical and electronic world) and places where fun and interesting things are happening today. See where Nikola Tesla lived, check out cutting-edge artists working with technology, or take the kids to see an Atlas and Titan rocket. 

All the locations are accessible via the subway, and many are free to visit. If you do visit, take a selfie and post a link in the comments below.


Jaguar Considers Transformation to EV-Only Brand SoylentNews

Autocar reports:

Jaguar Land Rover bosses are considering a plan to turn Jaguar into an EV-only brand within the next decade, Autocar has learned.

It is understood that company product planners have produced an outline strategy under which Jaguar's conventional vehicle range would be phased out over the next five to seven years, to be replaced by pure-electric vehicles.

Jaguar Land Rover bosses are considering a plan to turn Jaguar into an EV-only brand within the next decade, Autocar has learned.  

It is understood that company product planners have produced an outline strategy under which Jaguar's conventional vehicle range would be phased out over the next five to seven years, to be replaced by fully electric vehicles. 

Under the plans being considered, a full-on luxury electric saloon, replacing the unloved XJ, is expected within two years. It will be a direct competitor for Porsche's upcoming Taycan, alongside strong-selling cars such as the Tesla Model S

Rethought as an electric vehicle, the new XJ will both play to the strengths of the 1967 original by offering segment-leading refinement and ride and look to the future by completely reinventing the classic Jaguar interior. 

It is understood that the new XJ will be a no-holds-barred luxury car in every sense, offering customers a zero-pollution alternative to a Mercedes-Benz S-Class or even a Bentley Flying Spur.

Original Submission

Read more of this story at SoylentNews.


Arm Launches Mbed Linux and Extends Pelion IoT Service

Politics and international relations may be fraught with acrimony these days, but the tech world seems a bit friendlier of late. Last week Microsoft joined the Open Invention Network and agreed to grant a royalty-free, unrestricted license of its 60,000-patent portfolio to other OIN members, thereby enabling Android and Linux device manufacturers to avoid exorbitant patent payments.


Startups in the Aging Sector Ending Age-Related Diseases 2018 Lifeboat News: The Blog

Earlier this year, we hosted the Ending Age-Related Diseases 2018 conference at the Cooper Union in New York City. This conference was designed to bring together the best in the aging research and biotech investment worlds and saw a range of industry experts sharing their insights.

Dr. Oliver Medvedik, LEAF vice president and Director of the Maurice Kanbar Center for Biomedical Engineering at the Cooper Union, chaired a panel with a focus on starting up biotech companies and dealing with the challenges inherent to launching a company in this industry.


LuminosityLink Hacking Tool Author Gets 30-Months Prison Sentence The Hacker News

A 21-year-old Kentucky man who previously pleaded guilty to developing, marketing, and selling an infamous remote access trojan (RAT) called LuminosityLink has now been sentenced to 30 months in prison. According to a press release published Monday by U.S. Attorneys Office, Colton Grubbs, who used online moniker 'KFC Watermelon,' was pleaded guilty for three counts--unlawfully accessing


DragonFlyBSD Continues Squeezing More Performance Out Of AMD's Threadripper 2990WX Phoronix

DragonFlyBSD 5.4 should be a really great release if you are a BSD user and have an AMD Threadripper 2 box, particularly the flagship Threadripper 2990WX 32-core / 64-thread processor.


Hacking When It Counts: Setting Sail in a Submarine Hackaday

By the early 20th century, naval warfare was undergoing drastic technological changes. Ships were getting better and faster engines and were being outfitted with wireless communications, while naval aviation was coming into its own. The most dramatic changes were taking place below the surface of the ocean, though, as brave men stuffed themselves into steel tubes designed to sink and, usually, surface, and to attack by stealth and cunning rather than brute force. The submarine was becoming a major part of the worlds navies, albeit a feared and hated one.

For as much animosity as there was between sailors of surface vessels and those that chose the life of a submariner, and for as vastly different as a battleship or cruiser seems from a submarine, they all had one thing in common: the battle against the sea. Sailors and their ships are always on their own dealing with forces that can swat them out of existence in an instant. As a result, mariners have a long history of doing whatever it takes to get back to shore safely even if that means turning a submarine into a sailboat.

Pigs of the Sea

R-14 at the pier. Source:

The first generation of militarily important submarines were, to modern eyes, terribly primitive affairs. Compared to...


These Researchers Want to Send Smells Over the Internet IEEE Spectrum Recent Content full text

Electrical stimulation of cells in the nasal passages produces sweet fragrances and chemical odors

Imagine a virtual reality movie about the Civil War where you can smell the smoke from the soldiers rifles. Or an online dating site where the profiles are scented with perfume or cologne. Or an augmented reality app that lets you point your phone at a restaurant menu and sample the aroma of each dish. 

The researchers who are working on digital smell are still a very long way from such applicationsin part because their technologys form factor leaves something to be desired. Right now, catching a whiff of the future means sticking a cable up your nose, so electrodes can make contact with neurons deep in the nasal passages. But theyve got some ideas for improvements. 

This digital smell research is led by Kasun Karunanayaka, a senior research fellow at the Imagineering Institute in Malaysia. He started the project as a PhD student with Adrian Cheok, now director of the institute and a professor at the City University of London, whos on a quest to create a multi-sensory Internet. In one of Cheoks earliest projects he sent hugs to chickens, and his students have also worked with digital kisses and electric taste.

Karunanayaka says most prior experiments with digital smell have involved chemical cartridges in devices that attach to computers or phones; sending a command to the device triggers the release of substances, which mix together to produce an odor.

Working in that chemical realm, Karunanayakas team is collaborating with a Japanese startup called Scentee that he says is developing the worlds first smartphone gadget that can produce smell sensations. Theyre working together on a Scentee app that integrates with other apps to add smells to various smartphone functions. For example, the app could link to your morning alarm to get the day started with the smell of coffee and frying bacon, or could add fragrances to texts so that messages from different friends come with distinct aromas.

But Karunanayakas team wanted to find an alternative to chemical devices with cartridg...


Tesla secures land in China for first plant abroad The Hill: Technology Policy

Tesla said Wednesday that it has secured land in Shanghai to build its first plant outside of the U.S., according to the AP.The electric carmaker first announced its plans to expand overseas in July after the Chinese government said it would...


Twitter releases data on Iranian, Russian influence campaigns The Hill: Technology Policy

Twitter is releasing an archive of all of the content it has discovered from Russian and Iranian disinformation campaigns since 2016.The company announced Wednesday that the release of the datasets is intended to allow researchers to analyze how the...


Thousands of servers easy to hack due to a LibSSH Flaw Security Affairs

The Libssh library is affected by a severe flaw that could be exploited by attackers to completely bypass authentication and take over a vulnerable server.

The Secure Shell (SSH) implementation library, the Libssh, is affected by a four-year-old severe vulnerability that could be exploited by attackers to completely bypass authentication and take over a vulnerable server without requiring a password.

The issue tracked as CVE-2018-10933 was discovered by Peter Winter-Smith from NCC Group, it ties a coding error in Libssh.

The exploitation of the flaw is very trivial, an attacker only needs to send an SSH2_MSG_USERAUTH_SUCCESS message to a server with an SSH connection enabled when it expects an SSH2_MSG_USERAUTH_REQUEST message.

libssh versions 0.6 and above have an authentication bypass vulnerability in the server code. By presenting the server an SSH2_MSG_USERAUTH_SUCCESS message in place of the SSH2_MSG_USERAUTH_REQUEST message which the server would expect to initiate authentication, the attacker could successfully authentciate without any credentials. reads the security advisory.

The library fails to validate if the incoming successful login packet was sent by the server or the client, and also fails to check if the authentication process has been successfully completed.

This means that if a remote attacker sends the SSH2_MSG_USERAUTH_SUCCESS response to libssh, the library considers that the authentication has been successfully completed.

Thousands of vulnerable servers are exposed online, by querying the Shodan search engine we can see that more than 6,500 servers are affected by the issue.

But before you get frightened, you should know that neither the widely used OpenSSH nor Githubs implementation of libssh was affected by the vulnerability.

The Libssh maintainers addressed the flaw with the release of the libssh versions 0.8.4 and 0.7.6.

Experts pointed out that GitHub and OpenSSH implementations of the libssh library are not affected by the flaw.


Re: ghostscript: 1Policy operator gives access to .forceput CVE-2018-18284 Open Source Security

Posted by Bob Friesenhahn on Oct 17

Memory allocations would build to extremely large values across
hundreds of rendered pages. Use of Ghostscript in interactive
programs is still surely common. Programs using libgs will inherit
any leaks. These leaks and other issues should be fixed.

Keep in mind that Ghostscript is also used to render/view PDF files.
When interactively viewing it is common to do just-in-time rendering.


Re: ghostscript: bypassing executeonly to escape -dSAFER sandbox (CVE-2018-17961) Open Source Security

Posted by Perry E. Metzger on Oct 17

On Wed, 17 Oct 2018 02:09:28 -0400 Rich Felker <dalias () libc org>

Does anyone other than Tavis know their way around the inside of the
codebase? Perhaps we can collaborate on patches.



Facepunch - 342,913 breached accounts Have I Been Pwned latest breaches

In June 2016, the game development studio Facepunch suffered a data breach that exposed 343k users. The breached data included usernames, email and IP addresses, dates of birth and salted MD5 password hashes. Facepunch advised they were aware of the incident and had notified people at the time. The data was provided to HIBP by whitehat security researcher and data analyst Adam Davies.

Go Back:30 Days | 7 Days | 2 Days | 1 Day

IndyWatch Science and Technology News Feed Today.

Go Forward:1 Day | 2 Days | 7 Days | 30 Days

Wednesday, 17 October


Oracle CPU October 2018: 301 vulnerabilities patched Help Net Security

Oracle has released its Critical Patch Update for October 2018, fixing 301 vulnerabilities across a wide range of its products, including Oracle Database Server, Oracle E-Business Suite, Oracle Java SE, and others. As with previous Critical Patch Update releases, a significant proportion of the patches is for third-party components (non-Oracle CVEs, including open source components), Oracle Software Security Assurance Director Eric Maurice has noted. This CPU is the last one scheduled for 2018, and brings More

The post Oracle CPU October 2018: 301 vulnerabilities patched appeared first on Help Net Security.


Re: CVE-2018-10933: libssh: authentication bypass in server code Open Source Security

Posted by Minh Tuan Luong on Oct 17

I have coded a simple POC for this CVE:

--- ----

import paramiko
import socket
import sys

nbytes = 4096
hostname = ""
port = 2222

sock = socket.socket()
    sock.connect((hostname, port))
    # instantiate transport
    m = paramiko.message.Message()
    transport = paramiko.transport.Transport(sock)



Why Scientists Had Trouble Predicting Hurricane Michaels Rapid Intensification SoylentNews

Submitted via IRC for Bytram

Why scientists had trouble predicting Hurricane Michael's rapid intensification

Hurricane Michael roared into Mexico Beach, Florida, on 10 October as the strongest storm ever to strike the Florida Panhandle in terms of wind speed, and the third strongest to make landfall in the continental United States. The storm caused severe damage to several coastal communities, Tyndall Air Force Base, and Florida State University's Panama City campus. Officials have attributed 18 deaths to the storm and dozens of people have been reported missing.

Although National Hurricane Center (NHC) forecasters were able to predict where and when Michael was likely to make landfall several days in advance, the storm's rapid intensificationjumping from a Category 2 to just shy of a Category 5 in 24 hoursproved tougher to anticipate. NHC defines "rapid intensification" as a storm's maximum sustained winds increasing by at least 56 kilometers per hour in 24 hours or less. Michael underwent at least three intensification periods on its 5-day march toward the coast.

"Predicting a hurricane's track is relatively straightforward because storms are propelled in one direction or another by the large-scale air currents in the atmosphere," says Robert Rogers, a meteorologist at the National Oceanic and Atmospheric Administration's (NOAA's) Hurricane Research Division in Miami, Florida. "We've gotten a much better handle on predicting those large-scale currents over the past 20 years."

But when it comes to predicting changes to a storm's intensity, the underlying physics becomes much more complicated, says Kerry Emanuel, a professor of atmospheric sciences at the Massachusetts Institute of Technology in Cambridge. That's because hurricanes are complex, massive rotating heat engines, Emanuel says, fueled by a favorable combination of warm ocean water, moist air, and consistent atmospheric winds.

Original Submission

Read more of this story at SoylentNews.


China May Have $5.8 Trillion in Hidden Debt With Titanic Risks

Via: Bloomberg: Chinas local governments may have accumulated 40 trillion yuan ($5.8 trillion) of off-balance sheet debt, or even more, suggesting further defaults are in store, according to S&P Global Ratings. The potential amount of debt is an iceberg with titanic credit risks, S&P credit analysts led by Gloria Lu wrote in a report Tuesday. []


CVE-2018-12617 Qemu: qemu-guest-agent: Integer overflow in qmp_guest_file_read may lead to crash Open Source Security

Posted by P J P on Oct 17


The QEMU Guest Agent in QEMU is vulnerable to an integer overflow in the
qmp_guest_file_read(). An attacker could exploit this by sending a crafted QMP
command (including guest-file-read with a large count value) to the agent via
the listening socket to trigger a g_malloc() call with a large memory chunk
resulting in a segmentation fault.

A user could use this flaw to crash the Qemu-guest-agent resulting in DoS.

Upstream Patch:...


Howard S. Friedman Lifeboat News: The Blog

Surprising discoveries for health and long life.

An extraordinary eighty-year study has led to some unexpected discoveries about long life.

-O, The Oprah Magazine

For years we have been told to obsessively monitor when were angry, what we eat, how much we worry, and how often we go to the gym. So why isnt everyone healthy? Drawing from the most extensive study of long life ever conducted, The Longevity Project busts many long- held myths, revealing how:


What can neuroscience tell us about ethics? Lifeboat News: The Blog

Today on The Neuroethics Blog is a post by Adina L. Roskies, Professor of Philosophy and chair of the Cognitive Science Program and Helman Family Distinguished Professor at Dartmouth College, entitled

By Adina L. Roskies Image courtesy of Bill Sanderson, Wellcome Collection What can neuroscience tell us about ethics? Some say nothing ethics is a normative discipline that concerns the way the world should be, while neuroscience is normatively insignificant: it is a descriptive science which tells us about the way the world is. This seems in line with what is sometimes called Humes Law, the claim that one cannot derive an ought from an is (Cohon, 2018). This claim is contentious and its scope unclear, but it certainly does seem true of demonstrative arguments, at the least. Neuroethics, by its name, however, seems to suggest that neuroscience is relevant for ethical thought, and indeed some have taken it to be a fact that neuroscience has delivered ethical consequences. It seems to me that there is some confusion about this issue, and so here Id like to clarify the ways in which I think neuroscience can be relevant to ethics.


Pirate Party enters parliament in Luxembourg, gets 17% in Prague Falkvinge on Liberty

Photo by Jewel Mitchell on Unsplash

Pirate Parties:This past weekend, elections were held in Luxembourg and the Czech Republic. The Pirate Party of Luxembourg tripled their support and entered the Luxembourg Parliament with two MPs, and in the Czech Republic, the Pirate Party increased their support further now receiving a full 17% in Prague.

With 6.45% of the votes of the final tally, the Luxembourg Pirate Party is entering its national Parliament, being the fifth Pirate Party to enter a national or supranational legislature (after Sweden, Germany, Iceland, and the Czech Republic). This may not seem like much, but it is a very big deal, for reasons Ill elaborate on later. A big congratulations to Sven Clement and Marc Goergen, new Members of Parliament for Luxembourg!

Further, the Czech Republic has had municipal elections, and the Czech Pirate Party showed a full 17.1% support in Prague, the Czech capital, making the Pirates the second biggest party with a very narrow gap to the first place (at 17.9%). This may or may not translate to votes for the Czech national legislature, but is nevertheless the highest score recorded so far for a Pirate Party election day. I understand the Czech Pirates have as many as 275 (two hundred and seventy-five!) newly-elected members of city councils, up from 21 (twenty-one). Well done, well done indeed!

For people in a winner-takes-all system, like the UK or United States, this may sound like a mediocre result. In those countries, there are usually only two parties, and the loser with 49% of the vote gets nothing. However, most of Europe have so-called proportional systems, where 5% of the nationwide votes gives you 5% of the national legislation seats. In these systems, the parties elected to Parliament negotiate between themselves to find a ruling majority coalition of 51%+ of the seats, trying to negotiate common positions between parties that are reasonably close to each other in policy. This usually requires a few weeks of intense negotiations between the elections and the presentation of a successfully negotiated majority coalition.

Further, it could reasonable be asked what kind of difference...


Carnegie Mellon is Saving Old Software from Oblivion

A prototype archiving system called Olive lets vintage code run on todays computers.

Researchers growing dependence on computers and the difficulty they encounter when attempting to run old software are hampering their ability to check published results. The problem of obsolescent software is thus eroding the very premise of reproducibilitywhich is, after all, the bedrock of science. ...


News From M.I.T. SoylentNews

M.I.T. Plans College for Artificial Intelligence, Backed by $1 Billion

Submitted via IRC for BoyceMagooglyMonkey

M.I.T. Plans College for Artificial Intelligence, Backed by $1 Billion

Every major university is wrestling with how to adapt to the technology wave of artificial intelligence how to prepare students not only to harness the powerful tools of A.I., but also to thoughtfully weigh its ethical and social implications. A.I. courses, conferences and joint majors have proliferated in the last few years.

But the Massachusetts Institute of Technology is taking a particularly ambitious step, creating a new college backed by a planned investment of $1 billion. Two-thirds of the funds have already been raised, M.I.T. said, in announcing the initiative on Monday.

The linchpin gift of $350 million came from Stephen A. Schwarzman, chief executive of the Blackstone Group, the big private equity firm. The college, called the M.I.T. Stephen A. Schwarzman College of Computing, will create 50 new faculty positions and many more fellowships for graduate students.

It is scheduled to begin in the fall semester next year, housed in other buildings before moving into its own new space in 2022.

Read more of this story at SoylentNews.


Coreboot's Flashrom Working On Radeon GPU Flashing Support Phoronix

Former RadeonHD driver developer Luc Verhaegen is back at the AMD Radeon GPU reverse-engineering game. He's now pursuing Radeon firmware flashing with the Coreboot Flashrom utility...


Run and Scale a Distributed Crossword Puzzle App with CI/CD on Kubernetes (Part 3)

Run and Scale a Distributed Crossword Puzzle App with CI/CD on Kubernetes (Part 3)


Flamethrower Gets Update, Retains Some Sketchiness Hackaday

Part of what makes flamethrowers fun is their inherent danger. This is what makes a lot of things fun, though, from snowboarding to skydiving to motorcycle riding. As with all of these sensible hobbies, though, its important to take as much unnecessary risk out of the activity as possible to make sure youre around as long as possible to enjoy your chosen activity. With that in mind, [Stephen] decided to make some improvements on his classic wrist-mounted flamethrower.

To start, he ditched the heavy lead-acid battery that powered the contraption in favor of a smaller 5 V battery. In fact, the entire build is much more compact and efficient. He was also able to use the same battery to run a tiny taser that acts as an ignition source for the flamethrowers fuel. The fuel itself is butane, and the modified flamethrower is able to launch flames much further than the original due to improvements in the fuel delivery system. These improvements also include Finding a way to prevent butane droplets from lighting and landing on [his] hand which seems like a necessary feature as well.

The entire build now is very well refined and professional-looking, which is also a major improvement from the first version. Its also worth watching the video after the break as well, which includes a minor run-in with the New York City fire marshal. And, it still retains some of the danger and all of the fun of the original builds which is something we always like to see.



LibSSH Flaw Allows Hackers to Take Over Servers Without Password The Hacker News

A four-year-old severe vulnerability has been discovered in the Secure Shell (SSH) implementation library known as Libssh that could allow anyone to completely bypass authentication and gain unfettered administrative control over a vulnerable server without requiring a password. The security vulnerability, tracked as CVE-2018-10933, is an authentication-bypass issue that was introduced in


Undoing Aging 2019 is on the horizon Lifeboat News: The Blog

It will be our second conference totally focussed on the science of actual human rejuvenation therapies to repair the damage of aging.

We are happy to begin introducing the speakers, starting with Dr. Jerry Shay.

Dr. Shay is the Vice Chairman of the Department of Cell Biology at The University of Texas Southwestern Medical Center in Dallas. Dr. Shays work on the relationships of telomeres and telomerase to aging and cancer is well recognized.

Jerry has been a stalwart supporter of the SENS concept for well over a decade, and a world leader in the telomere biology field for much longer than that. He spoke at the very first SENS conference, back in 2003, and it will be a joy to welcome him again. says Aubrey de Grey.


4-Phase Approach for Taking Over Large, Messy IT Systems

Everyone loves building shiny, new systems using the latest technologies and especially the most modern DevOps tools. But that's not the reality for lots of operations teams, especially those running larger systems with millions of users and old, complex infrastructure.

It's even worse for teams taking over existing systems as part of company mergers, department consolidation, or changing managed service providers (MSPs). The new team has to come in and hit the ground running while keeping the lights on using a messy system they know nothing about.


Silicon Valley tested by Saudi crisis The Hill: Technology Policy

Saudi Arabias alleged involvement in the disappearance and possible murder of a dissident Washington Post columnist is putting Silicon Valley in a difficult position, with potentially billions in business deals at stake.The diplomatic crisis is...


GreyEnergy group targeting critical infrastructure with espionage Help Net Security

ESET has uncovered details of a successor to the BlackEnergy APT group. Named GreyEnergy by ESET, this threat actor focuses on espionage and reconnaissance, quite possibly in preparation for future cyber-sabotage attacks. BlackEnergy has been terrorizing Ukraine for years and rose to prominence in December 2015 when they caused a blackout that left 230,000 people without electricity the first-ever blackout caused by a cyberattack. Around the time of that incident, ESET researchers began detecting More

The post GreyEnergy group targeting critical infrastructure with espionage appeared first on Help Net Security.


Brazil expert discovers Oracle flaw that allows massive DDoS attacks Security Affairs

Oracle has just released a security update to prevent 2.3 million servers running the RPCBIND service from being used in amplified DDoS attacks.

The flaw was discovered by the Brazilian researcher Mauricio Corra, founder of Brazilian security company XLabs. The exploitation of this vulnerability could cause major problems on the Internet.

A proof of concept (POC) made in only one XLabs server generated a traffic of 69 gigabits per second, Mauricio told

At the time of the discovery, the expert queried Shodan and found that there were nearly 2.6 million servers running RPCBIND on the Internet. The multiplication of this exploit in a 2.6 million server farm leads to a frightening conclusion.


RPCBIND is software that provides client programs with the information they need about server programs available on a network. It runs on port 111 and responds with universal addresses of the server programs so that client programs can request data through RPCs (remote procedure calls).

These addresses are formed by the server IP pool plus port. Since its launch, RPCBIND has been receiving updates that cover several failures, including security. This, however, is the most serious finding so far.

The discovery of the crash began on June 11 this year. On that day, one of the web application firewalls (WAFs) installed in the XLabs SOC (security operations center) detected an abnormal pattern of network traffic that caught the eye of Mauricio.

The data showed that a DDoS attack was in progress, coming from port 111 of several servers, all from other countries.

We then decided to open a server with port 111 exposed on the Internet, with the same characteristics as those who were attacking us and we were monitoring that server for weeks. We found that he was receiving requests to generate attacks, he explained. 

After further analysis of the subject, it was possible to reproduce the attack in the laboratory.

By analyzing the servers exposed at Shodan, the extent of the problem was confirmed, continues Mauricio.

The problem discovered by Mauricio is worse than Memcrashed, detected in February of this year. In this type of distributed denial of service (DDoS) attack, the malicious traffic generated with the techni...


FCC Says Hurricane Michael Victims in Florida Deserve a Month of Free Cell Service SoylentNews

Ars Technica:

Wireless carriers' failure to fully restore cellular service in Florida after Hurricane Michael "is completely unacceptable," Federal Communications Commission Chairman Ajit Pai said today in a rare rebuke of the industry that he regulates.

Verizon in particular has been under fire from Florida Governor Rick Scott, who says Verizon hasn't done enough to restore service. By contrast, Scott has praised AT&T for its disaster response.

The FCC will open an investigation into the post-hurricane restoration efforts, Pai said. Pai and Scott urged wireless carriers to immediately disclose plans for restoring service, waive the October bills of affected customers, and let customers switch providers without penalty.

Pai's statement didn't name specific carriers. but Verizon seems to be struggling the most to restore service, based on criticism from the governor. Verizon was the only wireless carrier mentioned specifically by Scott today in a statement that called on telecom companies to "treat Floridians fairly."

Gov. Scott suggested that Verizon has misled the public about its progress in restoring service. He said:

Verizon recently said in a press release that 98 percent of Florida has service. This statement, which includes customers in Florida that were hundreds of miles away from impacted areas, does not help Florida's law enforcement in Bay County and families communicate with loved ones in Panama City and does not help those needing medicine call their pharmacy in Lynn Haven.

[...] Verizon announced shortly after Pai's statement today that it will give three months of free mobile service to "every Verizon customer in Bay and Gulf counties."

"Verizon is 100 percent focused on repairing our network in the Florida Panhandle," the company said in a press release. "We are making progress every hour, and we expect that trend to continue at a rapid pace. We won't rest until service is completely restored."

Also at Reuters & The Washington Post

Original Submission



Endpoint security solutions challenged by zero-day and fileless attacks Help Net Security

There is an endpoint protection gap against modern threats, the result of a recent survey by the Ponemon Institute and Barkly have shown. The organizations polled 660 IT and security professionals to get insight on the state of endpoint security risk, and have found that: 64% of organizations experienced a successful endpoint attack in 2018 (a 20% increase from the previous 12-month period). 63 percent say that the frequency of attacks theyre facing has also More

The post Endpoint security solutions challenged by zero-day and fileless attacks appeared first on Help Net Security.


VMware addressed Code Execution Flaw in its ESXi, Workstation, and Fusion products Security Affairs

VMware has addressed a critical arbitrary code execution flaw affecting the SVGA virtual graphics card used by its ESXi, Workstation, and Fusion products.

VMware has released security updated to fix a critical arbitrary code execution vulnerability (CVE-2018-6974) in the SVGA virtual graphics card used by its ESXi, Workstation, and Fusion solutions.

The issue in the VMware products is an out-of-bounds read vulnerability in the SVGA virtual graphics card that could be exploited by a local attacker with low privileges on the system to execute arbitrary code on the host.

VMware ESXi, Fusion and Workstation contain an out-of-bounds read vulnerability in SVGA device. This issue may allow a guest to execute code on the host. reads the security advisory published by the company.

VMware credited an anonymous researcher for reporting the flaw through Trend Micros Zero Day Initiative (ZDI).

According to the ZDIs own advisory, the vulnerability was reported to VMware in mid-June.

This vulnerability allows local attackers to execute arbitrary code on vulnerable installations of VMware Workstation. An attacker must first obtain the ability to execute low-privileged code on the guest system in order to exploit this vulnerability. read the ZDIs advisory.

The specific flaw exists within the handling of virtualized SVGA. The issue results from the lack of proper validation of user-supplied data, which can result in an overflow of a heap-based buffer. An attacker can leverage this in conjunction with other vulnerabilities to execute code in the context of the host OS.

VMware classified the issue as medium severity and assigned it a CVSS score of 6.9.

The same anonymous expert also reported an out-of-bounds write vulnerability in the e1000 virtual network adapter, tracked as CVE-2018-6973, used by Workstation and Fusion.

The CVE-2018-6973 flaw could be exploited by a local attacker to execute arbitrary code, VMware addressed this flaw in September.

This flaw is similar to the previous one, an attacker requires at low-privileged access to the exploit the issue on the target system.

This vulnerability allows local attackers to execute arbitrary code on vulnerable installations of VMware Workstation. An attacker must first obtain the ability to execute low-privileged code on the guest system in order to exploit this vulnerability....


GNOME Developers Are Looking At Sprucing Up Pango Phoronix

GNOME developers want to make sure they have a competitive text rendering stack with other platforms and as such are looking to make some modernization improvements to Pango...


GCC 9 Feature Development Is Ending Next Month Phoronix

There is just three weeks left for GNU toolchain developers to finish landing new feature material in GCC 9.0 ahead of next year's GCC 9.1 stable release...


Google Will Charge Android Phone Makers to Use Its Apps In Europe The Hacker News

Would you prefer purchasing an Android device that doesn't have any apps or services from Google? No Google Maps, No Gmail, No YouTube! And NOT even the Google Play Storefrom where you could have installed any Android apps you want Because if you live in Europe, from now on, you have to spend some extra cash on a smartphone with built-in Google services, which were otherwise until now


How Robots and Drones Will Change Retail Forever Lifeboat News: The Blog

We are in the early days of what might be called the physical cloud, an e-commerce ecosystem that functions like the internet itself. Netflix caches the movies you stream at a data center physically close to you; Amazon is building warehouse after warehouse to store goods closer to consumers. And the storage systems at those warehouses are looking more like the data-storage systems in the cloud. Instead of storing similar items in the same placea helpful practice when humans were fetching the goodsAmazons warehouses store multiples of the same item at random locations, known only to the robots. Trying to find an Instapot at one of Amazons warehouses would be like trying to find where in the cloud one of your emails is stored. Of course, you dont have to. You just tap your screen and the email appears. No humans are involved.

What if you could store and deliver goods as easily as data? Amazon, Walmart and others are using AI and robotics to transform everything from appliance shopping to grocery delivery. Welcome to the physical cloud.


Raptor Computing Systems Is Working On Bringing Up Chrome's POWER Support Phoronix

With Raptor Computing Systems' Talos II Lite and especially the forthcoming Blackbird positioning the POWER architecture in a prime spot for use by libre Linux users who want a system that's open-source down to the firmware, they've been trying to make sure the Linux desktop stack is in order. The latest area they've been working on is browser coverage...


Improving US Patent Quality Through Reassessments of Patents and Courts Transparency Techrights

Transparency in CD

Summary: Transparency in US courts and more public participation in the patent process (examination, litigation etc.) would help demonstrate that many patents are being granted and sometimes asserted that are totally bunk, bogus, fake

THE new leadership is oftentimes frustrating if now downright depressing; they put the so-called swamp in charge. A new event about patents issued the following nonsensical tweet: A new twist has recently entered the debate about how #patents and #opensource interact and whether the two principles are compatible with each other or not.

So stop granting software patents; the principal problem would be solved.Theyre obviously not compatible, but the sponsors would pay for us to believe otherwise. The event took place yesterday and attending as well as speaking was Director Iancu, who said, according to third-party accounts: lack of predictability on Section 101 limits investment in innovation. [] gets specific: Step 1 of Alice-Mayo test must be a category analysis not a claim analysis. If the matter is sometimes patentable then it is not a subject matter Section 101 problem.

So stop granting software patents; the principal problem would be solved. Well probably say more in the weekend (once all the patent maximalists are done boosting him).

Totally meaningless is the message above (lots of mythology embedded in it, pure fiction from the patent microcosm). He just wants to find ways to defy the courts, ignore caselaw, and grant software patents anyway.

Last night Josh Landau (CCIA) spoke about history and noted that [w]hile the PTO no longer operates under a registration system, that situation still exists today. The PTOunlike many other patent offices around the worldis unable to permanently refuse a patent application.

Here are some key bits:



Anaxi App Shows the State of Your Software Project

If you work within the world of software development, youll find yourself bouncing back and forth between a few tools. Youll most likely use GitHub to host your code, but find yourself needing some task/priority software. This could be GitHub itself or other ones like Jira. Of course, you may also find yourself collaborating on several tools, like Slack, and several projects. Considering that its already hard to keep track of the progress on one of your projects, working across several of them becomes a struggle.


Roku to Go Back on Sale in Mexico After Copyright Victory TorrentFreak

Commercial streaming-capable devices are often designed to receive officially licensed programming but many can be reprogrammed to do illegal things.

Manufacturers say they are not responsible for this behavior but last year in Mexico, that position was successfully challenged.

Following a complaint filed by cable TV provider Cablevision, the Superior Court of Justice of the City of Mexico handed down an order preventing the importation of Roku devices and prohibiting stores such as Amazon, Liverpool, El Palacio de Hierro, and Sears from putting them on sale.

Cablevision complained that pirated content was being made available through Roku devices, with claims of more than 300 channels of unauthorized content being supplied to consumers.

Following a swift appeal by Roku, the sales ban was quickly overturned by a federal judge. However, on June 28, 2017, a Mexico City tribunal upheld the previous decision which banned importation and distribution of Roku devices. Several appeals followed, without success, leading to Roku declaring the ban unjust.

Now, however, and after an extended period off the shelves, Roku has booked a significant legal victory. A ruling handed down by the 11th Collegiate Court in Mexico City has found that the original ban was incorrect and the Roku device isnt illegal, which means that the streaming hardware will soon be back on sale.

The Court reportedly acknowledged Rokus efforts to keep pirated content away from its platform, an opinion also shared by Cablevision. However, should pirate channels appear on Roku in the future, Cablevision warned that it would take further legal action to have those sources blocked via the Mexican Institute of Industrial Property and other local authorities.

The decision of the Mexico City Court was welcomed by Roku General Counsel Stephen Kay.

Todays decision is an important victory for Roku and its Mexican distributor, Latamel Distribuidora, S. de R.L. de C.V. and Mexican retailers in the legal battle against an improper ban on sales of its popular streaming players in Mexico. We are pleased with the Collegiate Courts decision and look forward to continuing to build Rokus TV streaming business in Mexico, Kay said.

Noting that streaming is the future of TV, offering greater choice for consumers alongside better value for money, Roku Chief Marketing Officer Matthew Anderson thanked the companys customers in Mexico who continued to use the device over the past year, despite the troubles.

We are grateful for our cus...


Can A Motorized Bicycle Run On Trees? Hackaday

Some of the earliest automobiles werent powered by refined petrochemicals, but instead wood gas. This wood gas is produced by burning wood or charcoal, capturing the fumes given off, and burning those fumes again. During World War II, nearly every European country was under gasoline rations, and tens of thousands of automobiles would be converted to run on wood gas before the wars end.

The basic setup for this experiment is a tiny, tiny internal combustion engine attached to a bicycle. Add a gas tank, and you have a moped, no problem. But this is meant to run on firewood, and for that you need a wood gas generator. This means [NightHawkinLight] will need to burn wood without a whole lot of oxygen, similar to how you make charcoal. There is, apparently, the perfect device to do this, and itll fit on the back of a bike. Its a bee smoker, that thing bee keepers use to calm down a hive of honeybees.

The bee smoker generates the wood gas, which is filtered and cooled in a gallon paint bucket filled with cedar chips. The output from this filter is fed right into where the air filter for the internal combustion engine should be, with an added valve to put more air into the carburetor.

So, with that setup, does the weird bike motorcycle wood gas thing turn over? Yes. The engine idled for a few seconds without producing any useful power. Thats alright, though, because this is just a proof of concept and work in progress. Getting this thing to run and be a useful mode of transportation will require a much larger wood gas generator, but right now [NightHawkinLight] knows his engine can run on wood gas.


35 Million Voter Records For Sale on Popular Hacking Forum SoylentNews

Approximately 35 Million voter registration records from 20 states have appeared for sale online. These records include Full Name, Phone, Address, Voting History and 'other' data. There have been other larger leaks and breaches of voter registration records in the past (for example, in 2015 191 Million were found to be freely accessible online)

Details including the affected states are available here:

Why is our voting history retained beyond the current election? This is especially worrisome if you vote in the wrong primaries in an area that has a prevailing opinion that differs sharply from your own.

Original Submission

Read more of this story at SoylentNews.


DataLocker Sentry K300 features encrypted micro SSD keypad flash drive Help Net Security

The DataLocker Sentry K300 encrypted flash drive is in stock and now available for order. When the company introduced the K300, the company received a positive reaction to the menu driven encrypted keypad flash drive featuring AES 256-bit encryption, an alpha-numeric keypad, enhanced security features, and up to 256GB capacity, all developed around DataLockers Simply Secure design principles. The K300 has passed FIPS 197 and IP57 certifications. The Sentry K300 is the platform-independent and OS More

The post DataLocker Sentry K300 features encrypted micro SSD keypad flash drive appeared first on Help Net Security.


BestCrypt Explorer: Create and access storage space for data encryption on Android Help Net Security

Jetico released of BestCrypt Explorer, a mobile file manager on Android and an extension of BestCrypt Container Encryption. Jeticos Android file encryption app is now available for free download on Google Play. Throughout the digital world, our privacy is constantly threatened by hardware theft, cyber attack and unauthorized account access. says Jetico CEO, Michael Waksman. BestCrypt Explorer is a welcome addition to our family of data protection products, continuing Jeticos mission to ensure a safer More

The post BestCrypt Explorer: Create and access storage space for data encryption on Android appeared first on Help Net Security.


Zyxel launches SD-WAN solution for SMBs and MSPs Help Net Security

Zyxel Communications launches Zyxel SD-WAN, the software-defined wide area network solution. Zyxel SD-WAN enables SMBs and Managed Service Providers (MSP) to optimize network connections between distributed sites over the internet to achieve enterprise-class network performance, stability and security for critical applications across the organization. Zyxel SD-WAN is a solution that mitigates network issues faced by businesses and organizations that depend upon the internet to provide connectivity between distributed sites and remote users. Packet-level routing provides More

The post Zyxel launches SD-WAN solution for SMBs and MSPs appeared first on Help Net Security.


CVE-2018-18438 Qemu: Integer overflow in ccid_card_vscard_read() allows memory corruption Open Source Security

Posted by P J P on Oct 17


An integer overflow issue was found in the CCID Passthru card device
emulation, while reading card data in ccid_card_vscard_read() function. The
ccid_card_vscard_read() function accepts a signed integer 'size' argument,
which is subsequently used as unsigned size_t value in memcpy(), copying large
amounts of memory.

A user inside guest could use this flaw to crash the Qemu process resulting in

Upstream patch:...


Kolanovic: The Market Is Disagreeing With The Fed, Raising Risk Of "Policy Error" Terra Forming Terra


Here we go again.  Interest rates were at historic lows and badly needed to be brought back into balance.  That has now happened and we will likely see no more.

Rising markets reflect improving future business prospects and this allows massive cdapital inflows as well.  This needs to now be cooled down and consolidated.  The USA economy has now recovered or is recovering from the 2008 crash and only eight years late.

Otherwise folks need to catch on that Trump opens negotiations by repudiating the status quo.  What truly matters is the deal arrived at and that is usually unexciting.  .

Kolanovic: The Market Is Disagreeing With The Fed, Raising Risk Of "Policy Error"


UN Admits Latest Outbreak of Polio in Syria Was Caused by the Polio Vaccine Terra Forming Terra

 Polio is practically extinct thanks to modern ideas of sanitation and this is merely unfortunate.  Where do they find these people?  The aggressive sale of all forms of vaccines is a criminal outrage.

Yet all our own mothers have been totally brainwashed into trusting these scientific scammers because that is exactly what it has become.

Applying only what is totally necessary would collapse the racket.  Applying what is clearly safe would still cover our childhood nasties which is generally safe enough though we still need to resolve the dangers of the carriers.

UN Admits Latest Outbreak of Polio in Syria Was Caused by the Polio Vaccine

In war-torn Syria, theres little doubt that the conflict has taken a toll on health. Now, the United Nations Childrens Fund (UNICEF) reports that their attempt at using vaccines to protect children against polio has backfire infecting more children with the devastating disease rather than saving them.

Vaccines make children sick, you dont say?


The HPV Vaccine On Trial: Seeking Justice For A Generation Betrayed Terra Forming Terra

 First off, far too little science was done on this. This means that we were sold a real pig in a poke.

Now the chickens have come home to roost and this will mean extensive settlements not least because of the shoddy science.

The marketing drive associated with this turkey has done huge damage to the vaccination meme.


The HPV Vaccine On Trial: Seeking Justice For A Generation Betrayed

This article represents something Ive never done in my life or as a researcher, writ...


The United Nations reported that 2.6 million Venezuelans are now living abroad Terra Forming Terra

Venezuelan migrants living in Medellin, Colombia sleep as they wait to attend a job fair on 27 September. The United Nations reported that 2.6 million Venezuelans are now living abroad.

We gave been fed a lot of bunkum here whose intent it to rationalize the landing of USA troops.  Other reports are saying nothing of the kind and even here we quote 1000,000 making it into Columbia.  Any other direction is impossible.  The real numbers are likely much lower and may actually be around a couple hundred thousand.

We have an apparent effort to remove Maduro who may or may not have been fairly elected. 

What we now lack is real facts on the ground..  The whole situation can surely be settled since sanctions are actually blocking money transfers.

Venezuela: nearly 2m people have fled country since 2015, UN says UN refugee agency chief called for a non-political and humanitarian response to the exodus

Agence France-Presse in Geneva

Mon 1 Oct 2018 18.10 BST Last modified on Mon 1 Oct 2018 18.32 BST 

Nearly two million people have fled Venezuelas economic and political crisis since 2015, according to the UN which called for a non-political response to an exodus that is straining regional resources.

Some 5,000 people are now leaving Venezuela daily the largest population movement in Latin Americas recent history, UN refugee agency (UNHCR) chief Filippo Grandi told the organisations executive committee on Monday....


Ask OIN How It Intends to Deal With Microsoft Proxies Such as Patent Trolls Techrights

Microsoft does not need to sue GNU/Linux (and hasnt done so in quite a while); there are tentacles for enforcement

Bill and Nathan
The "Microsoft spinoff" Intellectual Ventures is still managed by the same man. Credit: Reuters

Summary: OIN continues to miss the key point (or intentionally avoid speaking about it); Microsoft is still selling protection from the very same patent trolls that it is funding, arming, and sometimes even instructing (who to pass patents to and sue)

WE HAD been writing about Microsofts attacks especially by means of patents and defensive aggregators (DPAs) long before the Open Invention Network (OIN) added Microsoft as a member (or even LOT Network). We wrote many articles about why OIN wasnt the solution, except perhaps to large companies such as Red Hat and IBM (which already cross-licenses with Microsoft anyway). We foresaw Microsoft joining as a member and clarified that it would not mean very much. OIN cannot really tackle some of the key problems. Even if Microsoft threw away all of its patents (voiding everything) however unlikely that is that would still leave many patents out there that it gave to patent trolls such as MOSAID (now known as Conversant). For well over a decade Microsoft has polluted several spaces/domains with trolls, flooding them with risks that help Microsoft sell Azure IP Advantage [1,...


Re: ghostscript: 1Policy operator gives access to .forceput CVE-2018-18284 Open Source Security

Posted by Rich Felker on Oct 16

An obvious fix for UaF's would be just removing the frees. Use of gs
as an interactive program where leaks would matter is a historical
curiosity; the only meaningful modern use is as a converter.

If someone insists there are still uses where freeing matters,
something like talloc may be a reasonable solution, removing all the
internal frees and only performing frees of the whole context.



Re: ghostscript: bypassing executeonly to escape -dSAFER sandbox (CVE-2018-17961) Open Source Security

Posted by Rich Felker on Oct 16

This. It's utterly ridiculous that the interpreter even has bindings
for accessing the filesystem and such. But I wonder if some of its
library routines (e.g. font loading) are implemented in Postscript,
using these bindings, rather than being implemented in C outside of
the language interpreter. If so it might be harder to extricate. But I
still think it's worthwhile to try. Once there are patches I would
expect all reasonable distros...


Researchers Produce Virus-resistant Pigs, Could Vastly Improve Global Animal Health SoylentNews

Submitted via IRC for Bytram

Researchers produce virus-resistant pigs, could vastly improve global animal health

Researchers at the University of Missouri have successfully produced a litter of pigs that are genetically resistant to a deadly porcine virus.

Coronaviruses, highly contagious and widespread viruses known for their distinctive microscopic halos, are responsible for a variety of deadly intestinal diseases in livestock. One such virus, Transmissible Gastroenteritis Virus (TGEV), commonly infects the intestines of pigs, causing almost 100 percent mortality in young pigs. Now, a team of researchers from MU, Kansas State University and Genus plca global leader in animal genetics has succeeded in breeding pigs that are resistant to the virus by means of gene editing.

"Previous research had identified an enzyme called ANPEP as a potential receptor for the virus, meaning it could be an important factor in allowing the virus to take hold in pigs," said Randall Prather, distinguished professor of animal sciences in the College of Agriculture, Food and Natural Resources. "We were able to breed a litter of pigs that did not produce this enzyme, and as a result, they did not get sick when we exposed them to the virus."

Original Submission

Read more of this story at SoylentNews.


Why we need to bridge the gap between IT operations and IT security Help Net Security

Thycotic released the findings from its 2018 VMworld survey of more than 250 IT operations professionals which looked into their experiences in using cybersecurity tools on a daily basis, including their concerns and preferences. According to the findings, even though IT operations personnel help influence the selection of cybersecurity tools, nearly two out of three say complexity in deployment (30 percent) and complexity in daily use (34 percent) are the biggest hindrances in security tool More

The post Why we need to bridge the gap between IT operations and IT security appeared first on Help Net Security.


Protecting applications from malicious scripts Help Net Security

In 2018, malicious client-side scripts are still posing a problem for large organizations. This year, British Airways revealed that they suffered a data breach in which 380,000 records were exfiltrated. Now, NewEgg has been hit with a similar data breach. This follows a string of attacks from a group known as Magecart, who were also responsible for publicized data breaches of Ticketmaster and Feedlify. Any time malicious Javascript is loaded onto a critical page for More

The post Protecting applications from malicious scripts appeared first on Help Net Security.


How corporate boards are navigating cybersecurity risks and data privacy Help Net Security

Digital transformation initiatives have transcended beyond the sole domain of IT to involve the entire organization, elevating digital strategy to the top of the board agenda, according to BDO USA. Developing a strategic path for an organizations digital transformation and devoting company resources and board oversight to cybersecurity and data privacy are now necessities for businesses to survive and thrive during this time of intense change, said Amy Rojik, national assurance partner and director of More

The post How corporate boards are navigating cybersecurity risks and data privacy appeared first on Help Net Security.


Few organizations use cyber wargaming to practice response plan Help Net Security

Nearly half (46 percent) of executive-level respondents to a Deloitte poll say their organizations have experienced a cybersecurity incident over the past year, with more than 1,500 surveyed professionals feeling only somewhat confident in their organizations ability to respond to and remediate a cyber incident. With cybercrime expected to reach $6 trillion annually and no indication of a slowdown in cyber threats, the Deloitte poll taken during a webcast on cyber preparedness and wargaming exposes More

The post Few organizations use cyber wargaming to practice response plan appeared first on Help Net Security.


A crippling ransomware attack hit a water utility in the aftermath of Hurricane Florence Security Affairs

A water utility in the US state of North Carolina suffered a severe ransomware attack in the week after Hurricane Florence hit the East Coast of the U.S.

According to the Onslow Water and Sewer Authority (aka ONWASA) some internal systems were infected with the Emotet malware, but the regular water service was not impacted.

According to ONWASA, the infections would require several of the main databases to be completely recreated, fortunately, no customer information was compromised.

We are in the middle of another disaster following Hurricane Florence and tropical storm Michael, CEO Jeff Hudson said employees in a video posted on Facebook,

With a very sophisticated attack they penetrated our defenses, just as they penetrated the city of Atlanta and Mecklenburg county.

hurricane florence

ONWASA CEO Jeffrey Hudson confirmed the ransomware attack began on October 4, the IT staff initially thought to have locked out the threat, however, on October 13 the malware started dropping the Ryuk ransomware into the infected systems.

An ONWASA IT staff member was working was working at 3am and saw the attack, ONWASA said.

IT staff took immediate action to protect system resources by disconecting ONWASA from the internet, but the crypto-virus spread quickly along the network encrypting databases and files.

Operators at the utility did not pay the ransom and opted out to recreate the infected systems.

Ransom monies would be used to fund criminal, and perhaps terrorist activities in other countrie...


Researchers expose security vulnerabilities in terahertz data links Help Net Security

A new study shows that terahertz data links, which may play a role in ultra-high-speed wireless data networks of the future, arent as immune to eavesdropping as many researchers have assumed. The research shows that it is possible for a clever eavesdropper to intercept a signal from a terahertz transmitter without the intrusion being detected at the receiver. Terahertz eavesdropping (Mittleman lab / Brown University) The conventional wisdom in the terahertz community has been that More

The post Researchers expose security vulnerabilities in terahertz data links appeared first on Help Net Security.


LibSSH Vuln: You Dont Need to See my Authentication Hackaday

Another day, another CVE (Common Vulnerabilities and Exposures). Getting a CVE number assigned to a vulnerability is a stamp of authenticity that you have a real problem on your hands. CVE-2018-10933 is a worst case scenario for libssh.  With a single response, an attacker can completely bypass authentication, giving full access to a system.

Before you panic and yank the power cord on your server, know that libssh is not part of OpenSSH. Your Linux box almost certainly uses OpenSSH as the SSH daemon, and that daemon is not vulnerable to this particular problem. Libssh does show up in a few important places, the most notable is probably Github and their security team already announced their implementation was not vulnerable.

The libssh project shares code between their client and server implementations, as one would expect. There are different callbacks to handle packet types as a new connection completes the handshake process. The SSH protocol defines several responses that are to be sent as an authentication request is handled. One of those messages is USERAUTH_SUCCESS, which the server sends to inform the client that authentication was successful, and the requested service is ready.

 * @internal
 * @brief Handles a SSH_USERAUTH_SUCCESS packet.
 * It is also used to communicate the new to the upper levels.
SSH_PACKET_CALLBACK(ssh_packet_userauth_success) {

  SSH_LOG(SSH_LOG_DEBUG, "Authentication successful");

  session->auth.state = SSH_AUTH_STATE_SUCCESS;

You may already begin to guess the vulnerability here. Libssh didnt have a mechanism to determine if an incoming packet was allowed for the current state of the connection. An attacker could start a connection, the server would send the authentication challenge, and the attacker could reply with the USERAUTH_SUCCESS response. The problem is that this response is only meant to be sent by the server, not the client, and only after authentication is completed.

Because of the shared code, the server incorrectly jumps to the handler for this message type, and marks the authentication phase completed. At that point, the daemon sets up the SSH connection just as if the client had authenticated, rolling out the red carpet for the attacker.

The vulnerability was discovered by Peter Winter-Smith from NCC Group,...


Palm Rises From the Dead as a Zombie Brand, Launches Tiny Smartphone SoylentNews

Submitted via IRC for BoyceMagooglyMonkey

Palm rises from the dead as a zombie brand, launches tiny smartphone

If you recall, Palm, creator of the Palm Pilot and WebOS, bombed out of the smartphone market and was purchased by HP. Palm died at HP after a short run of tablets and smartphones, and eventually Chinese smartphone company TCL snatched up the rights to the Palm brand in 2014, and things have been quiet since then. You might know TCL from running that other smartphone zombie brand, Blackberry.

Today, TCL's Palm presents itself as actual new company with new co-founders, a new logo, and an office in San Francisco. The company is launching the, uh, "Palm" phone (Do we call it the Palm Palm?) and it's taking the "Palm" name literally, with a device small enough to fit in the palm of your hand. The Palm Palm has a practically microscopic 3.3-inch display, and it measures just 96.6mm tall by 50.6mm wide, which is close to the size of a credit card. Palm is pitching the Palm as a "companion" device to your main smartphone, allowing you to leave your big phone behind and bring the Palm in a wallet, on a lanyard, or in any tiny pocket.

This tiny phone also comes with a really tiny spec sheet. You're getting a 3.3-inch 1280720 display with a respectable 445ppi. This is powered by a Qualcomm Snapdragon 435 SoC (that's eight Cortex A53 cores, usually at 1.4GHz) 3GB of RAM, and an 800mAh battery. There's 32GB of storage, a 12MP rear camera, 8MP front camera, IP68 dust and water resistance, USB-C, Wi-Fi, Bluetooth, GPS, and LTE.

Original Submission

Read more of this story at SoylentNews.


YouTube Went Down for Millions Around the World Lifeboat News: The Blog

YouTube is down and reports are coming in worldwide about the service being unavailable.


LLVM Still Proceeding With Their Code Relicensing Phoronix

It's been three years since the original draft proposal for relicensing the LLVM compiler code was sent out and while there hasn't been a lot to report on recently about the effort, they are making progress and proceeding...


YouTube experiences global outage The Hill: Technology Policy

YouTube on Tuesday night went down for more than an hour, impacting users across the globe.The video-sharing website, which is a subsidiary of Google, acknowledged the outage in a tweet after users began posting about it on other social...


Two Degrees Decimated Puerto Rico's Insect Populations SoylentNews

Submitted via IRC for Bytram

Two degrees decimated Puerto Rico's insect populations

While temperatures in the tropical forests of northeastern Puerto Rico have climbed two degrees Celsius since the mid-1970s, the biomass of arthropodsinvertebrate animals such as insects, millipedes, and sowbugshas declined by as much as 60-fold, according to new findings published today in the Proceedings of the National Academy of Sciences.

The finding supports the recent United Nations Intergovernmental Panel on Climate Change warnings of severe environmental threats given a 2.0 degree Celsius elevation in global temperature. Like some other tropical locations, the study area in the Luquillo rainforest has already reached or exceeded a 2.0 degree Celsius rise in average temperature, and the study finds that the consequences are potentially catastrophic.

"Our results suggest that the effects of climate warming in tropical forests may be even greater than anticipated" said Brad Lister lead author of the study and a faculty member in the Department of Biological Sciences at Rensselaer Polytechnic Institute. "The insect populations in the Luquillo forest are crashing, and once that begins the animals that eat the insects have insufficient food, which results in decreased reproduction and survivorship and consequent declines in abundance."

Original Submission

Read more of this story at SoylentNews.


Can Analogies Reveal the Laws of Physics? - Facts So Romantic Nautilus

Reprinted with permission from Quanta Magazines Abstractions blog.

So-called analogue experiments are becoming increasingly common in physics, but do they teach or mislead?Image by National Institute of Standards and Technology / Wikicommons

Hoping to gain insight into domains of nature that lie beyond experimental reachthe interiors of black holes, the subtleties of the quantum realm, the Big Bangphysicists are experimenting on analogue systems made of fluids and other easily manipulable materials that can be modeled by similar equations. Results from these analogue experiments often end up in top scientific journals, with a sense that they say something about the systems of interest. But do they? And how do we know?

As Stephan Hartmann, philosopher of physics at Ludwig Maximilian University in Munich put it, Under which conditions can evidence that we obtain here in a certain experiment confirm or support claims about a different system, which is far away?

The issue keeps coming up.

In 2014, researchers reported in Nature that they had discovered a particle-like state in a fluid of supercold rubidium atoms that is analogous to a magnetic monopolea long-sought, hypothetical elementary particle that would act like one end of a magnet. One physicist quoted in Nature News deemed the discovery one more
Read More


SpaceX successfully landed its Falcon 9 rocket on the California coast for the first time Lifeboat News: The Blog

Original Story: This evening, SpaceX is set to launch a used Falcon 9 rocket from California, a flight that will be followed by one of the companys signature rocket landings. But this time around, SpaceX will attempt to land the vehicle on a concrete landing pad near the launch site not a drone ship in the ocean. If successful, itll be the first time that the company does a ground landing on the West Coast.

Up until now, all of SpaceXs ground landings have occurred out of Cape Canaveral, Florida, the companys busiest launch site. SpaceX has two landing pads there, and has managed to touch down 11 Falcon 9 rockets on them. And each time the company has attempted to land on land, its been a success.


How will NASA transform by joining forces with private space travel? Lifeboat News: The Blog

60 years of NASA has brought us the first moon landing, the Voyagers, a progression of Mars rovers, Hubble, Cassini, TESSand the next six decades are going to see it venturing even further into uncharted territory, but this time, the space agency will not be alone on the voyage.

NASA couldnt even start fantasizing about private spaceflightor collaborating with the private sectorwhen it first took off in 1958. Now companies like SpaceX, Boeing and Blue Origin will bring dreams that originally lived between the pages of science fiction books into reality. Dreams like space travel for anyone.

Private companies could potentially lower the cost of suborbital flights from hundreds of thousands to tens of thousands. That still might sound astronomical to the average Earthling, but to NASA, it could mean more opportunities than ever. NASAs Commercial Crew Program is a collab with Boeing and SpaceX to fly astronauts to and from the ISS (which is not going to end up as space junk after all). SpaceXs Crew Dragon and Boeings CST-100 Starliner will start making crewed flights into low-Earth orbit as soon as next year.


Autonomous Flights Are One Step Closer to Reality Lifeboat News: The Blog

The air cargo industry is already considering one-person flight crews. Self-flying planes may be next.


Yuval Harari & Russell Brand in conversation | Penguin Talks Lifeboat News: The Blog

Hacking humanity russell brand & noah yuval harari

Penguin Talks is a new series of free creative events which gives young people the opportunity to hear


Space Force is not a crazy idea Lifeboat News: The Blog

The famed astrophysicist sits down with CBS News Chief White House Correspondent Major Garret for The Takeout.


FIDO2 Authentication In All The Colors Hackaday

Here at Hackaday, we have a soft spot for security dongles. When a new two-factor-authentication dongle is open source, uses USB and NFC, and supports FIDO2, the newest 2FA standard, we take notice. That just happens to be exactly what [Conor Patrick] is funding on Kickstarter.

Weve looked at [Conor]s first generation hardware key, and the process of going from design to physical product.  With that track record, the Solo security key promises to be more than the vaporware that plagues crowdfunding services.

Another player, Yubikey, has also recently announced a new product that supports FIDO2 and NFC. While Yubikey has stepped away from their early open source policy, Solo is embracing the open source ethos. The Kickstarter promises the release of both the software and hardware design as fully open, using MIT and CC BY-SA licenses.

For more information, see the blog post detailing the project goals and initial design process.  As always, caveat emptor, but this seems to be a crowdfunding project worth taking a look at.


Stephen Hawking Essay Warns of Gene Editing; Final Hawking Research Paper Published SoylentNews

Essays reveal Stephen Hawking predicted race of 'superhumans'

The late physicist and author Prof Stephen Hawking has caused controversy by suggesting a new race of superhumans could develop from wealthy people choosing to edit their and their children's DNA. Hawking, the author of A Brief History of Time, who died in March, made the predictions in a collection of articles and essays.

[...] In Brief Answers to the Big Questions, Hawking's final thoughts on the universe, the physicist suggested wealthy people would soon be able to choose to edit genetic makeup to create superhumans with enhanced memory, disease resistance, intelligence and longevity. Hawking raised the prospect that breakthroughs in genetics will make it attractive for people to try to improve themselves, with implications for "unimproved humans". "Once such superhumans appear, there will be significant political problems with unimproved humans, who won't be able to compete," he wrote. "Presumably, they will die out, or become unimportant. Instead, there will be a race of self-designing beings who are improving at an ever-increasing rate."

Stephen Hawking's last paper on black holes is now online

Stephen Hawking never stopped trying to unravel the mysteries surrounding black holes -- in fact, he was still working to solve one of them shortly before his death. Now, his last research paper on the subject is finally available online through pre-publication website arXiv, thanks to his co-authors from Cambridge and Harvard. It's entitled Black Hole Entropy and Soft Hair, and it tackles the black hole paradox. According to Hawking's co-author Malcolm Perry, the paradox "is perhaps the most puzzling problem in fundamental theoretical physics today" and was the center of the late physicist's life for decades.

Read more of this story at SoylentNews.


Updated Proton 3.16 Beta For Steam Play Has DXVK 0.90, D3D11 Fixes Phoronix

Valve in cooperation with CodeWeavers and other developers continues making rapid progress on Steam Play and their "Proton" downstream flavor of Wine...


NEW 'Off The Wall' ONLINE 2600 - 2600: The Hacker Quarterly

NEW 'Off The Wall' ONLINE

Posted 17 Oct, 2018 1:03:30 UTC

The new edition of Off The Wall from 16/10/2018 has been archived and is now available online.


Google Engineer Proposes KUnit As New Linux Kernel Unit Testing Framework Phoronix

Google engineer Brendan Higgins sent out an experimental set of 31 patches today introducing KUnit as a new Linux kernel unit testing framework to help preserve and improve the quality of the kernel's code...


Chrome 70 Now Officially Available With AV1 Video Decode, Opus In MP4 & Much More Phoronix

Google's Chrome/Chromium 70 web-browser made it out today for Linux users as well as all other key supported platforms...


HPR2663: Short review on a 2.5 inch SSD/HDD caddy Hacker Public Radio

Well Ken made another call for shows and as my recent interview series has come to an end by the time you listen to this here is a short review of a USB3 2.5inch HDD/SSD caddy I got from E-bay a few weeks ago. As many of you who have listened to my previous ramblings know I frequent a local Computer auction and recently they have had some cheap 128Gig SSDs for sale and I managed to pick several up at a good price. After using some to upgrade some desktop PCs to SSD I had a couple of these spare and as I have USB3 on my main laptop thought it would be good to be able to use one or two of these as portable storage or even for boot drives to test out odd Linux distro or 2. So I purchased a caddy off that font of all things techie E-bay for 5.50, link here:;_trksid=p2057872.m2749.l2648 So after it arrived I plugged in one of the drives and tested it out. The first thing to notice is that SSDs being 7mm in depth flop about a bit in the case but this is easily resolved by a bit of card under the drive to help it fit snug in the case and it does mean that the case will support the larger 9mm 2.5inch spinners if needed. Ive not tested a larger older spinner but I suspect they will not fit as 9mm ones are very snug in the case. Anyway the drive was detected by the PC/Laptop and works flawlessly and as it is so quick to swap drives in the caddy means I can carry large data files and my music and video library when on the move with the advantage that it is less likely to be damaged if accidentally dropped or knocked off a surface, which is quite likely with a portable spinner HDD. I am very happy with this purchase and it has already become a regular part of my travelling tool kit/laptop bag.

Saudi Arabia Reportedly Prepared to Admit Involvement in Journalist's Death SoylentNews

Saudis preparing to admit Jamal Khashoggi died during interrogation, sources say

The Saudis are preparing a report that will acknowledge that Saudi journalist Jamal Khashoggi's death was the result of an interrogation that went wrong, one that was intended to lead to his abduction from Turkey, according to two sources.

One source says the report will likely conclude that the operation was carried out without clearance and transparency and that those involved will be held responsible.

One of the sources acknowledged that the report is still being prepared and cautioned that things could change.

The Washington Post columnist was last seen in public when he entered the Saudi consulate in Istanbul in Turkey on October 2. Previously, Saudi authorities had maintained Khashoggi left the consulate the same afternoon of his visit, but provided no evidence to support the claim.

Saudi Arabia could hike oil prices over the Khashoggi case. Here's why it would backfire

Saudi Arabia's not-so-veiled threat issued in a government statement Sunday emphasized its "vital role in the global economy" and that any action taken upon it will be met with "greater action". But as oil ticks upward, a look at history and geopolitics suggests that while a Saudi-driven oil price spike would bring pain for much of the world, it would ultimately backfire on itself.

"If this is something the Saudis were allowed to do, they'd be really shooting themselves in the foot," Warren Patterson, commodities analyst at ING, told CNBC's Squawk Box Europe on Tuesday. "In the short to medium term we'll definitely see an incremental amount of demand destruction, but the bigger issue is in the longer term."

Any action in withholding oil from the market, he said, "would only quicken the pace of energy transition."

Previously: Turkey Says that a Missing Critic of the Saudi Government was Killed in Saudi Consulate in Istanbul

Original Submission

Read more of this story at SoylentNews.



Hillicon Valley: Agencies show progress on email security | DHS pushes back on report claiming spike in election attacks | Judge approves SEC-Elon Musk settlement | Uber IPO proposal valued at $120B The Hill: Technology Policy

Welcome to Hillicon Valley, The Hill's newsletter detailing all you need to know about the tech and cyber news from Capitol Hill to Silicon Valley.Welcome! Follow the cyber team, Olivia Beavers (@olivia_beavers) and Jacqueline Thomsen (@jacq_thomsen...



Modular Violin Takes A Bow Hackaday

They say the only difference between a violin and a fiddle is the way you play it. If thats so, this modular violin will need a new name, since it can be broken apart and changed in ways that make it sound completely different, all within a few minutes.

The fiddle is the work of [David Perry] and has 3D printed body, neck, pegbox, and bridge. While it might seem useful on the surface as a way to get less expensive instruments out in the world where virtually anyone has access to them, the real interesting qualities are shown when [David] starts playing all of the different versions hes created. The sound changes in noticeable ways depending on the style of print, type of plastic used, and many other qualities.

Of course you will need a bow, strings, pegs, and a fingerboard, but the rest is all available if you have a 3D printer around. If youre already a skilled violinist this could be a very affordable way to experiment with new sounds. Its not the first time weve seen 3D printed violins, but it is the first time weve seen them designed specifically to alter the way they sound rather than their physical characteristics. If you want to make your own, all of the .stl files are available on the projects site.


Toward Community-Oriented, Public & Transparent Copyleft Policy Planning Bradley M. Kuhn's Blog ( bkuhn )

More than 15 years ago, Free, Libre, and Open Source Software (FLOSS) community activists successfully argued that licensing proliferation was a serious threat to the viability of FLOSS. We convinced companies to end the era of vanity licenses. Different charities from the Open Source Initiative (OSI) to the Free Software Foundation (FSF) to the Apache Software Foundation all agreed we were better off with fewer FLOSS licenses. We de-facto instituted what my colleague Richard Fontana once called the Rule of Three assuring that any potential FLOSS license should be met with suspicion unless (a) the OSI declares that it meets their Open Source Definition, (b) the FSF declares that it meets their Free Software Definition, and (c) the Debian Project declares that it meets their Debian Free Software Guidelines. The work for those organizations quelled license proliferation from radioactive threat to safe background noise. Everyone thought the problem was solved. Pointless license drafting had become a rare practice, and updated versions of established licenses were handled with public engagement and close discussion with the OSI and other license evaluation experts.

Sadly, the age of license proliferation has returned. It's harder to stop this time, because this isn't merely about corporate vanity licenses. Companies now have complex FLOSS policy agendas, and those agendas are not to guarantee software freedom for all. While it is annoying that our community must again confront an old threat, we are fortunate the problem is not hidden: companies proposing their own licenses are now straightforward about their new FLOSS licenses' purposes: to maximize profits.

Open-in-name-only licenses are now common, but seem like FLOSS licenses only to the most casual of readers. We've succeeded in convincing everyone to check the OSI license list before you buy. We can therefore easily dismiss licenses like Common Clause merely by stating they are non-free/non-open-source and urging the community to...


Initial thoughts on MongoDB's new Server Side Public License Matthew Garrett

MongoDB just announced that they were relicensing under their new Server Side Public License. This is basically the Affero GPL except with section 13 largely replaced with new text, as follows:

MongoDB admit that this license is not currently open source in the sense of being approved by the Open Source Initiative, but say:We believe that the SSPL meets the standards for an open source license and are working to have it approved by the OSI.

At the broadest level, AGPL requires you to distribute the source code to the AGPLed work[1] while the SSPL requires you to distribute the source code to everything involved in providing the service. Having a license place requirements around things that aren't derived works of the covered code is unusual but not entirely unheard of - the GPL requires you to provide build scripts even if they're not strictly derived works, and you could probably make an argument that the anti-Tivoisation provisions of GPL3 fall into this category.

A stranger point is that you're required to provide all of this under the terms of the SSPL. If you have any code in your stack that can't be released under those terms then it's literally impossible for you to comply with this license. I'm not a lawyer, so I'll leave it up to them to figure out whether this means you're now only allowed to deploy MongoDB on BSD because the license would require you to relicense...


Ubuntu Server Is Making It Easier To Deploy Let's Encrypt SSL Certificates Phoronix

The Ubuntu Server developers are looking to make it easier to deploy free SSL/TLS certificates from Let's Encrypt...


[$] A farewell to email

The free-software community was built on email, a distributed technology that allows people worldwide to communicate regardless of their particular software environment. While email remains at the core of many projects' workflow, others are increasingly trying to move away from it. A couple of recent examples show what is driving this move and where it may be headed.


Internet Relay Chat Turns 30and We Remember How It Changed Our Lives SoylentNews

Submitted via IRC for BoyceMagooglyMonkey

Internet Relay Chat turns 30and we remember how it changed our lives

Internet Relay Chat (IRC) turned 30 this August.

The venerable text-only chat system was first developed in 1988 by a Finnish computer scientist named Jarkko Oikarinen. Oikarinen couldn't have known at the time just how his creation would affect the lives of people around the world, but it became one of the key early tools that kept Ars Technica running as a virtual workplaceit even lead to love and marriage.

To honor IRC's 30th birthday, we're foregoing the cake and flowers in favor of some memories. Three long-time Ars staffers share some of their earliest IRC interactions, which remind us that the Internet has always been simultaneously wonderful and kind of terrible.

Original Submission

Read more of this story at SoylentNews.


Notes on the UK IoT cybersec "Code of Practice" Errata Security

The British government has released a voluntary "Code of Practice" for securing IoT devices. I thought I'd write some notes on it.

First, the good parts

Before I criticize the individual points, I want to praise if for having a clue. So many of these sorts of things are written by the clueless, those who want to be involved in telling people what to do, but who don't really understand the problem.

The first part of the clue is restricting the scope. Consumer IoT is so vastly different from things like cars, medical devices, industrial control systems, or mobile phones that they should never really be talked about in the same guide.

The next part of the clue is understanding the players. It's not just the device that's a problem, but also the cloud and mobile app part that relates to the device. Though they do go too far and include the "retailer", which is a bit nonsensical.

Lastly, while I'm critical of most all the points on the list and how they are described, it's probably a complete list. There's not much missing, and the same time, it includes little that isn't necessary. In contrast, a lot of other IoT security guides lack important things, or take the "kitchen sink" approach and try to include everything conceivable.

1) No default passwords

Since the Mirai botnet of 2016 famously exploited default passwords, this has been at the top of everyone's list. It's the most prominent feature of the recent California IoT law. It's the major feature of federal proposals.

But this is only a superficial understanding of what really happened. The issue wasn't default passwords so much as Internet-exposed Telnet.

IoT devices are generally based on Linux which maintains operating-system passwords in the /etc/passwd file. However, devices almost never use that. Instead, the web-based management interface maintains its own password database. The underlying Linux system is vestigial like an appendix and not really used.

But these devices exposed Telnet, providing a path to this otherwise unused functionality. I bought several of the Mirai-vulnerable devices, and none of them used /etc/passwd for anything other than Telnet.

Another way default passwords get exposed in IoT devices is through debugging interfaces. Manufacturers configure the system one way for easy development, and then ship a separate "release" version. Sometimes they make a mistake and ship the development backdoors as well. Programmers often insert secret backdoor accounts into products for development purposes without realizing how easy it is for hackers to discover those passwords.

The point is that this focus on backdoor passwords is misunderstanding the problem. Device makers can easily beli...


Re: ghostscript: 1Policy operator gives access to .forceput CVE-2018-18284 Open Source Security

Posted by Perry E. Metzger on Oct 16

Good question. One obstacle for me is a lack of familiarity with the
codebase (which others here seem to have), but on the other hand, I
appear to have more motivation.



Ecuador to Assange: Look after cat, clean bathroom if you want internet The Hill: Technology Policy

The government of Ecuador reportedly is making WikiLeaks founder Julian Assange's internet access subject to a series of rules, including cleaning the bathroom, taking care of his cat and steering clear of hot political topics.Assange is&...


Google to start charging phone makers for app store in Europe The Hill: Technology Policy

Google is set to start charging phone makers to use its Google Play app store and it will also allow them to use rivals of its Android mobile operating system, as a part steps to comply with a European Union antitrust order. The...



New York AG subpoenas 14 companies in net neutrality comments probe: report The Hill: Technology Policy

New York Attorney General Barbara Underwood (D) has subpoenaed more than a dozen companies and organizations as part of the states investigation into widespread fake public comments submitted to the Federal Communications Commission (FCC) over net...


Re: ghostscript: 1Policy operator gives access to .forceput CVE-2018-18284 Open Source Security

Posted by Hanno Bck on Oct 16

I think nobody here will disagree with you that this would be good to
The question is: Who's gonna do it? Will you?


Uber valued at $120 billion in IPO proposals: report The Hill: Technology Policy

Uber received valuations from Wall Street banks that could put the value of the company up to $120 billion for an initial public offering that could happen as soon as early next year, according to the Wall Street Journal. That value...


Re: ghostscript: 1Policy operator gives access to .forceput CVE-2018-18284 Open Source Security

Posted by Tavis Ormandy on Oct 16

We have to work with what we've got.

Even with the easy to exploit stuff compiled out (which upstream do not
support), I haven't been bothering to get CVE's for all the memory
corruption or UaF I've been reporting, because nobody can keep up with
these operator leaks anyway.



AMD Dual EPYC 7601 Benchmarks - 9-Way AMD EPYC / Intel Xeon Tests On Ubuntu 18.10 Server Phoronix

Arriving earlier this month was a Dell PowerEdge R7425 server at Phoronix that was equipped with two AMD EPYC 7601 processors, 512GB of RAM, and 20 Samsung 860 EVO SSDs to make for a very interesting test platform and our first that is based on a dual EPYC design with our many other EPYC Linux benchmarks to date being 1P. Here is a look at the full performance capabilities of this 64-core / 128-thread server compared to a variety of other AMD EPYC and Intel Xeon processors while also doubling as an initial look at the performance of these server CPUs on Ubuntu 18.10.


TechVPS 6GB KVM VPS for $10/mo, 512MB $12/yr & more in Los Angeles and New York! Low End Box

John from TechVPS has sent over their first ever offer for the LowEndBox community today! They are offering RAID-10 powered KVM services out of Los Angeles and New York with amazing pricing so you can get your foot in the door and try them out! Please let us know if you have any questions and enjoy this new offer.

Heres what they had to say:

TechVPS is an infrastructure hosting provider comprised of a team of developers who are on a mission to improve the internet. All of us here at TechVPS are a lot like you making it easier to understand what you need. We are a company that is here to stay, inspiring change in the ways that we fulfill our customers needs. With our state of the art datacenters TechVPS has the resources to meet all hosting needs.

TechVPS has now expanded to New York datacenter location, and we are here to share some KVM VPS deal for the community based out of New York and Los Angeles California!!!

  • 512MB RAM
  • 1x CPU Core
  • 10GB Storage
  • 1TB Bandwidth
  • 100Mbps Uplink
  • 1 x IPv4
  • KVM/SolusVM
  • $7/semi-yearly OR $12/yr
  • [ORDER]
  • 1GB RAM
  • 1x CPU Core
  • 20GB Storage
  • 2TB Bandwidth
  • 100Mbps Uplink
  • 1 x IPv4
  • KVM/SolusVM
  • $2.50/mo OR $19/yr
  • [ORDER]
  • 3GB RAM
  • 3x CPU Core
  • 50GB Storage
  • 3TB Bandwidth
  • 100Mbps Uplink
  • 1 x IPv4
  • KVM/SolusVM
  • $5/mo OR $35/yr
  • [ORDER]
  • 6GB RAM
  • 6x CPU Core
  • 100GB Storage
  • 6TB Bandwidth
  • 100Mbps Uplink
  • 1 x IPv4
  • KVM/SolusVM
  • $10/mo OR $70/yr
  • [ORDER]

TechVPS supports payment through PayPal/Credit Cards, Bitcoin, Litecoin, and Ethereum. Kindly read their Terms of Service before making any purchase.

Network information

Los Angeles, California (Psychz Networks)
Test IPv4:
Los Angeles, California...


Hacker Pops Top On NFC Vending Machines Hackaday

Vending machines used to be a pretty simple affair: you put some coins in, and food or drink that in all likelihood isnt fit for human consumption comes out. But like everything else today, they are becoming increasingly complex Internet connected devices. Forget fishing around for pocket change; the Coke machine at the mall more often than not has a credit card terminal and a 30 inch touch screen display to better facilitate dispensing cans of chilled sugar water. Of course, increased complexity almost always goes hand in hand with increased vulnerability.

So when [Matteo Pisani] recently came across a vending machine that offered users the ability to pay from an application on their phone, he immediately got to wondering if the system could be compromised. After all, how much thought would be put into the security of a machine that basically sells flavored water? The answer, perhaps not surprisingly, is very little.

The write-up [Matteo] has put together is an outstanding case study in hacking Android applications, from pulling the .apk package off the phone to decompiling it into its principal components with programs like apktool and jadx. He even shows how you can reassemble the package and get it suitable for reinstallation on your device after fiddling around with the source code. If you...


Sears files for bankruptcy after years of turmoil SoylentNews

Arthur T Knackerbracket has found the following story:

Sears, the one-time titan of American retail, filed for bankruptcy ahead of a $134 million debt payment due Monday and announced that it will close 142 stores.

For years, Sears has contended with the threat that it would become the latest big-name retailer to fall to online competition and crushing debt. The icon once known for its pristine catalogs, and more recently known for decrepit showrooms and a controversial chief executive, saw its stock price plunge last week after reports that it had hired an advisory firm to prepare a bankruptcy filing ahead of the Oct. 15 payment.

Early Monday morning, Sears announced it had filed for Chapter 11 bankruptcy -- which would allow it to reorganize and possibly reemerge from bankruptcy with some part of the business intact -- and received commitments for $300 million in debtor-in-possession financing to carry through the bankruptcy period while it restructures its debt and reorganizes its business.

[...] Sears will close 142 unprofitable stores near the end of this year, with liquidation sales at those stores expected to begin soon. It was not immediately clear where those stores are located or how many jobs would be affected. Those store closings are in addition to 46 others that were expected by next month.

[...] It has also already sold off many of its brands, including Craftsman tools, and hasn't turned a profit since 2010. Many of its most valuable properties have been sold off, with the other half leased and offering little cost savings from rent restructurings since Sears already pays below market rents.

-- submitted from IRC

Original Submission

Read more of this story at SoylentNews.


Re: ghostscript: 1Policy operator gives access to .forceput CVE-2018-18284 Open Source Security

Posted by Perry E. Metzger on Oct 16

On Tue, 16 Oct 2018 11:06:14 -0700 Tavis Ormandy <taviso () google com>

Again, given that PostScript is an archival format for a lot of
do anything dangerous removed from the interpreter at compile time be

(And yes, it wouldn't be "standard" but I don't know that I
care much about that, and it would mean it would be safe to look...


Russia-linked APT group DustSquad targets diplomatic entities in Central Asia Security Affairs

Kaspersky experts published a detailed analysis of the attacks conducted by the Russian-linked cyber espionage group DustSquad.

Earlier October, security experts from ESET shared details about the operations of a cyber espionage group tracked as Nomadic Octopus, a threat actor focused on diplomatic entities in Central Asia.

The group has been active since at least 2015, ESET researchers presented their findings at the Virus Bulletin conference.

ESET researchers recently discovered an interesting cyber espionage campaign active in several countries of Central Asia. We attribute these attacks to a previously undocumented APT group that we have named Nomadic Octopus. states the blog post published by Virus Bulletin.

Our findings suggest that this APT group has been active since at least 2015. The main goal of Nomadic Octopus appears to be cyber espionage against high-value targets, including diplomatic missions in the region

The experts presented their findings at the Virus Bulletin conference.

Now Kaspersky experts published a detailed analysis of the attacks conducted by the group, tracked by the Russian firm as DustSquad, and the tools they used.

Kaspersky is monitoring the activity of the group for the last two years, DustSquad is a Russian-language cyberespionage group particularly active in Central Asian.

For the last two years we have been monitoring a Russian-language cyberespionage actor that focuses on Central Asian users and diplomatic entities. We named the actor DustSquad and have provided private intelligence reports to our customers on four of their campaigns involving custom Android and Windows malware. states the analysis published by Kaspersky Lab.

The name was originally coined by ESET in 2017 after the 0ct0pus3.php script used by the actor on their old C2 servers. We also started monitoring the malware and, using Kaspersky Attribution Engine based on similarity algorithms, discovered that Octopus is related to DustSquad, something we reported in April 2018. 

The group targeted the victims with spear-phishing emails, the threat actors use Russian malware filenames.

Kaspersky tracked a campaign conducted by the group back to 2014 when hackers targeted entities in the former Soviet republics of Central Asia, plus Afghanistan.


Elementary OS 5.0 "Juno" Released For A Pleasant Linux Desktop Experience Phoronix

Just ahead of Ubuntu 18.10, Solus 4, and Fedora 29 among other forthcoming Linux distribution releases, Elementary OS 5 "Juno" has been released for a polished desktop experience that aims to compete with macOS and Windows for desktop usability...


Paul Allen Remembered IEEE Spectrum Recent Content full text

The Microsoft cofounder was a different kind of tech billionaire

Think buddy movie.

The advent of personal computers in the late 1970s, which foreshadowed todays laptops and smartphones, was shaped by two dynamic duos. In northern California, the two StevesJobs and Wozniakcreated Apple Computer. To the north, in Seattle, two teenage pals, Bill Gates and Paul Allen, created Microsoft.

The parallels between these two sets of buddies were clear and durable. Jobs and Gates became public figures of enormous influence. Wozniak and Allen, both socially awkward, were viewed as solitary geeks, idiosyncratic digital geniuses, and idealists. The latter pair were known to be impatient with the very logic business that so energized Jobs and Gates and pushed those two to seek fame and fortune.

Before long, perhaps inevitably, these partnerships frayed and fractured. Jobs shed Wozniak and Gates shed Paul Allen. But while Wozniak left Apple relatively penniless and to this day remains a lovable curiosity bereft of social status, Allen insisted on retaining his large stake in Microsoft. He beat back Gates attempt to reduce his holdings, and left Microsoft with an equity position of staggering size.

On the strength of his vast shares in Microsoft, Allen, an IEEE member, amassed a fortune estimated at more than US $20 billion. He also carved out an unconventional life and a singular legacy that makes him, to my eyes, the most interesting of the digital-age tycoons.

Before Mark Cuban and Steve Ballmer, Allen was the first super-rich geek to buy a sports team. He purchased the Portland Trailblazers of the National Basketball Association and later the Seattle Seahawks of the National Football League, ensuring that these beloved northwest cities retained a foothold in the world of big-time sports.

That wasnt the extent of his civic mindedness. He revived a neglected neighborhood of Seattle, and made enormous investments into the health sciences, and understanding the human brain.

But while passionately interested in science and technology, he stayed clear of computer software and hardware, to keep out of the path of Bill Gates. And while Gates created the largest foundation in history, Allen eschewed bureaucracies, and retained an auteurs flair for innovation. His list of activities and charitable endeavors seemed hand-crafted, rolled out and sustained without public bombast or the large self-protective bureaucracies that often isolate and alienate the super successful fro...

Boston Dynamics' SpotMini Can Dance Now IEEE Spectrum Recent Content full text

A quadruped robot dance-off is inevitable

At IROS in Madrid a few weeks ago, Marc Raibert showed a few new videos during his keynote presentation. One was of Atlas doing parkour, which showed up on YouTube last week, and the other was just a brief clip of SpotMini dancing, which Raibert said was a work in progress. Today, Boston Dynamics posted a new video of SpotMini (which theyre increasingly referring to as simply Spot) dancing to Uptown Funk, and frankly displaying more talent than the original human performance

The twerking is cute, but gets a little weird when you realize that SpotMinis got some eyeballs back there as well.

While we dont know exactly whats going on in this video (as with many of Boston Dynamics video), my guess would be that these are a series of discrete, scripted behaviors that are played in sequence. Theyre likely interchangeable and adaptable to different beats, but (again, as with many of their videos) its not clear to what extent these dancing behaviors are autonomous, and how it would react to a different song. 

With that in mind, if I were writing a paper about dancing robots, Id probably say something like:

The development of robots that can dance has received considerable attention. However, they are often either limited to a pre-defined set of movements and music or demonstrate little variance when reacting to external stimuli, such as microphone or camera input.

Im not writing a paper about dancing robots, because Im not in the least bit qualified, but the folks at ANYbotics and the Robotics Systems Lab at ETH Zurich definitely are, and that was the intro to their 2018 IROS paper on Real-Time Dance Generation to Music for a Legged Robot. Why write a paper on this? Why is teaching ANYmal to dance important? Its because people like dancing, of course, and we want people to like robots, too!

Dance, as a performance art form, has been part of human social interaction for multiple millennia. It helps us express emotion, communicate feelings and is often used as a form of entertainment. Consequently, this form of interaction has often been attempted to be imitated by robots.

Our goal with this work is to bridge the gap between the ability to react to external stimuli (in this case music), and the execution of dance motions that are both synchronized to the beat, and visually pleasing and varied.

The first step to all of this is a beat tra...


Distribution Release: elementary OS 5.0 News

elementary OS is an Ubuntu-based distribution which features the Pantheon desktop environment and a custom application store. The project's latest stable release is elementary OS 5.0 "Juno". There are several new improvements to the desktop, file manager and software centre in the new version: "We're happy to debut....


The Next Linux Kernel Will Bring More Drivers Converted To Use BLK-MQ I/O Phoronix

More Linux storage drivers have been converted to the "blk-mq" interfaces for the multi-queue block I/O queuing mechanism for the 4.20~5.0 kernel cycle...


Millions of People Living and Working in Space Lifeboat News: The Blog

Blue Origin believes in a future where millions of people are living and working in space. Why? Because we believe that in order to preserve Earth, our home, for our grandchildrens grandchildren, we must go to space to tap its unlimited resources and energy. If we can lower the cost of access to space with reusable launch vehicles, we can enable this dynamic future for humanity.

Its a hopeful vision.

Blue Origin is committed to building a road to space so our children can build a future.


These Twenty Projects Won The Musical Instrument Challenge In The Hackaday Prize Hackaday

The Hackaday Prize is the greatest hardware competition on the planet. Its the Academy Awards of Open hardware, and over the past few months weve challenged makers and artists to create the Next Big Thing. All things must come to an end, though, and last week we wrapped up the final challenge in the Hackaday Prize. The results were fantastic, with over one hundred entries to the Musical Instrument Challenge. Now, were ready to announce the winners.

Over the past few months, weve been running a series of five challenges, and picking the best twenty projects to come out of these challenges. The Musical Instrument Challenge was the final challenge in The Hackaday Prize, and now were happy to announce the winners. These projects have been awarded a $1,000 cash prize, and theyre moving onto the final round where one lucky winner will receive the Grand Prize of $50,000. Here are the winners of the Musical Instrument Challenge, in no particular order:

Musical Instrument Challenge Hackaday Prize finalists:


Gene Editing Jobs Expected to Increase SoylentNews

Why gene editing could create so many jobs

As more treatments that rely on gene editing move from research laboratories into hospitals around the world, the demand for the skilled genetic engineers who make it possible is expected to soar. The UK government predicts there could be more than 18,000 new jobs created by gene and cell therapy in Britain alone by 2030, while the US Bureau of Labor Statistics estimates it will see a 7% increase in jobs for biomedical engineers and a 13% increase in medical scientists, together accounting for around 17,500 jobs.

But there will also be a need for people away from the laboratory bench, including those who can help make sense of the huge amounts of data that will be generated as medical treatment becomes increasingly personalised to patients' individual genomes.

"Gene therapy is rapidly becoming an accepted and growing part of the medical research and development industry," says Michele Calos, president of the American Society of Gene and Cell Therapy and a professor of genetics at Stanford University. "The growth of established and new gene therapy companies is expected to be accompanied by an increase in jobs, as these companies recruit scientists to staff their expanded operations.

"The gene therapy industry requires a range of graduates, with backgrounds in scientific fields like genetics, medicine, molecular biology, virology, bioengineering and chemical engineering, as well as business graduates."

Original Submission

Read more of this story at SoylentNews.



ghostscript: 1Policy operator gives access to .forceput CVE-2018-18284 Open Source Security

Posted by Tavis Ormandy on Oct 16

Hello, this <>
is CVE-2018-18284, another ghostscript sandbox escape. Because procedures
in postscript are just executable arrays, all system procedures need to be
marked as executeonly, so that users cannot peek at their internals with
array operators.

We have also recently learned that they must be marked as pseudo-operators,
otherwise their contents might leak to error...


Anki Vector Robot Review Techmoan

Many of the early videos about of the Anki Vector have beeen sponsored by the manufacturer - this one isn't. I bought my Vector on a pre-order and received it a couple of days before it went on general sale. Here's my independent review. 

Available from Amazon (US) (UK)

(Affiliated Links)


Your video - on vinyl Techmoan

In this follow up to my video about VinylVideo. I'm taking a look at one of the first custom cut Vinylvideo discs off the Supersense record lathe featuring yours truly.


You can get a custom Vinylvideo disc cut here



NASA wants to send humans to Venus and its a brilliant idea Lifeboat News: The Blog

The upper atmosphere of Venus is the most Earth-like location in the solar system.

Popular science fiction of the early 20th century depicted Venus as some kind of wonderland of pleasantly warm temperatures, forests, swamps, and even dinosaurs.

In 1950, the Hayden Planetarium at the American Natural History Museum were soliciting reservations for the first space tourism mission, well before the modern era of Blue Origins, SpaceX, and Virgin Galactic. All you had to do was supply your address and tick the box for your preferred destination, which included Venus.

Today, Venus is unlikely to be a dream destination for aspiring space tourists. As revealed by numerous missions in the last few decades, rather than being a paradise, the planet is a hellish world of infernal temperatures, a corrosive toxic atmosphere, and crushing pressures at the surface.


The best Neck Speaker Techmoan

I went a bit crazy and bought all the wireless neck speakers on the market. In this video I pass on everthing I've learned about them, which is a sound buy and which are a pain in the neck. 



SONY on ebay






Cool Tools: Deus Ex Autorouter Hackaday

The first thing you probably asked yourself when learning how to lay out PCBs was cant the computer do this? which inevitably led to the phrase never trust the autorouter!. Even if it hooks up a few traces the result will probably be strange to human eyes; not a design youd want to use.

But what if the autorouter was better? What if it was so far removed from the autorouter you know that it was something else? Thats the technology that JITX provides. JITX is a company that has developed new tools that can translate a coarse textual specification of a board to KiCAD outputs autonomously.


How do you use JITX? At this point the company provides a front end to their tools; you use their...


Hyperactive Comet Wirtanen to Show off During Historically Close Flyby SoylentNews

Hyperactive Comet Wirtanen to Show off During Historically Close Flyby:

The comet 46P/Wirtanen was discovered in 1948, but this could be the best year to get a good look at the small, hyperactive space ball of rock, ice and debris.

That's because when the comet passes nearest to Earth on Dec. 16 at a distance of 7.1 million miles (11.5 million kilometers), it'll be the 10th closest encounter with our planet since 1950. And it could be the brightest of the entire top 10.

It should become visible with the naked eye in the night sky as it approaches and could remain that way for weeks, according to the University of Maryland's astronomy department, which is leading an observation campaign of the comet.

[...] Astronomers are already busy tracking and observing Wirtanen, but expect it to become the subject of some excitement and numerous star parties as it becomes visible to the rest of us in December.

At closest approach, it would still be at 30 times the Earth-Moon distance; no risk of impact with the Earth. This time around, at least.

Original Submission

Read more of this story at SoylentNews.


Bioquark Inc. Real Bodies Ms. Chiara Bordi HealthQe QantiQa Ira Pastor Lifeboat News: The Blog

Exciting visitor at the Real Bodies ( exhibit!

The lovely Ms. Chiara Bordi (, Miss Italia 3rd place runner up (aka the Bionic Beauty) stopping by to visit our associates at HealthQE (, and QantiQa (, to test out their new Musyke device

Bio-mechanics and Bio-acoustics

Two critical components in the regeneration, repair, and rejuvenation equation, and part of the integrated age-reversal paradigm of Embrykinesis at Bioquark Inc.- (


Bro becomes Zeek

The Bro network security monitoring project has announced a name change to "Zeek". "On the Leadership Team of the Bro Project, we heard clear concerns from the Bro community that the name 'Bro' has taken on strongly negative connotations, such as 'Bro culture'. These send a sharp, anti-inclusive - and wholly unintended and undesirable - message to those who might use Bro. The problems were significant enough that during BroCon community sessions, several people have mentioned substantial difficulties in getting their upper management to even consider using open-source software with such a seemingly ill-chosen, off-putting name."


Ask LEAF Anything Lifeboat News: The Blog

Today is our first Ask LEAF Anything where you can ask us questions about our work in the rejuvenation biotechnology field.


In 2014, the Life Extension Advocacy Foundation was established as a 501(3) non-profit organization dedicated to promoting healthy human lifespan through fiscally sponsoring longevity research projects and raising awareness regarding the societal benefits of healthy life extension.


Links 1610/2018: Linux 4.19 RC8, Xfce Screensaver 0.1.0 Released Techrights

GNOME bluefish



  • Desktop

    • Chrome OS Stable Channel Gets Linux Apps

      After months of user testing in developer and beta channels, the Crostini project at Google finally delivered the goods, Linux apps for most users of Chromebooks in the stable channeldefinitely worth the wait. While this still is aimed primarily at developers using Chromebooks, I think theres a good chance these Linux apps will be used and enjoyed by the general public using Chromebooks as well. Theres still a bit of a learning curve to overcome before that possibility is realized, but if you already are a user of any Linux distro, it will feel very familiar. Heres an overview of how to install it and what to expect afterward.

    • Update KB4468550 Fixes Audio Issues Caused In Windows 10 October Patch [Ed: Alternative (better) headline is, Microsoft admits breaking your machine]

      If your Windows is updated to the latest Windows 10 October 2018 update then there are chances that you might be facing audio problems , something along the lines of No Audio Output Device is installed.


Vodlocker Hammers Streaming Sites with JavaScript-based DDoS TorrentFreak

Last year we highlighted a rather interesting service which makes it easy for anyone to embed a pirated movie.

Requiring only an IMDb number, allows anyone to embed videos, many of which are pirated.

This turned out to be a welcome feature for many smaller site operators, who use basic scripts to set up a streaming portal with minimal investment. In exchange, Vodlocker can serve some extra ads on these sites, which makes it a win-win for both parties.

More recently, however, it appears that someone has added some extra code to the Vodlocker site that does more than streaming video or placing ads. As a result, the embedded videos are also being used to DDoS certain video streaming portals.

Looking at the source of the embed pages, we see a piece of JavaScript that attempts to load content from external sites. This is triggered by unwitting visitors; not once, but dozens of times per second. The smaller sites in question, understandably, collapse under this load.

The script

When we checked the site on Monday, and were being targeted, resulting in downtime. Today, the code has been updated and its now pointing, which is mostly unreachable as a result. attack in action

Its not clear what the motivation for this attack is, or if Vodlocker is perhaps compromised, but it appears to be an intentional effort to take these streaming sites down.

Before the weekend the German news site Tarnkappe reported that another site,, was suffering from a similar DDoS attack.

Many of the sites that rely on these embed codes probably have no idea that they are participating in the attacks. The same is true for their visitors, who are unwittingly transformed into an army of stream-watching DDoS bots.

We contacted several of the affected sites for a comment but havent heard back. has no contact address listed, so we havent been able to reach out to the site itself.

The JavaScript-based attack itself isnt new. Cloudflare previously highlighted the problem, describing it as a grow...


Amazon worker pushes Bezos to stop selling facial recognition tech to law enforcement The Hill: Technology Policy

An Amazon employee is seeking to put new pressure on the company to stop selling its facial recognition technology to law enforcement. An anonymous worker, whose employment at Amazon was verified by Medium, published an op-ed on...


NVIDIA 410.66 Linux Driver Released With RTX 2070 Support, Vulkan Ray-Tracing, Etc Phoronix

NVIDIA has released the 410.66 Linux graphics driver today as their first stable release in the 410 series and comes with support for the new GeForce RTX 2070 graphics card...


Bug in Newly Released iOS 12.0.1 Gives Access To Your Photos HackRead

By Waqas

An iOS user Jose Rodriguez, who discovered a passcode bypass related flaw in iOS 12 last month, has now identified another passcode bypass bug in the recently released iOS 12.0.1. According to Rodriguez, a Spanish security researcher, the new bug offers an easy access to Photo Library of any locked iPhone. An attacker can select []

This is a post from Read the original post: Bug in Newly Released iOS 12.0.1 Gives Access To Your Photos


Just in Time for Halloween: Another Talking Skull Hackaday

It isnt a unique idea, but we liked [Eric Wiemerss] take on the classic animated skull for Halloween. In addition to showing you the code and the wiring, the video spends some time discussing what the audio looks like and what has to happen to get it into a format suitable for the Arduino. You can see the spooky video, below.

Of course, this is also a 3D printing project, although the skull is off-the-shelf. We wondered if he felt like a brain surgeon taking the Dremel to the poor skull. To fix the two parts of the device, he used brass threaded inserts that are heat set, something weve seen before, but are always surprised we dont see more often.

Of course, the project uses a servo. We may have missed it but other than freezing the video, we didnt see the Arduino source code online. It isnt much code, though, so typing it from the video is an option. The schematic is a little easier to read when you realize the top part is the schematic and the bottom part is the as built layout.

We are glad this skull doesnt taunt us with our time remaining like some weve seen. Weve seen this done with fewer parts, by the way, and you can compare the videos to see how different the circuits respond.


SFLC: Automotive Software Governance and Copyleft

The Software Freedom Law Center has announced the availability of a whitepaper [PDF] about automotive software and copyleft, written by Mark Shuttleworth and Eben Moglen. At its core, it's an advertisement for Ubuntu and Snap, but it does look at some of the issues involved.

The fine grain of interface access rights provided by the snapd governance agent can thus provide further isolation and security when it is running user-modified code, guaranteed under the snap packaging paradigm to cause no other program code to be modified, to break, or to perform differently because of the presence of the user-modified program. Such a structure of modification permission can be operated by the OEM consistent with the requirements of GPLv3. The OEM can publish an authenticated record of the installation permission issued, indexed by the Vehicle Identification Numberwithout publishing the car owners personal informationso that public and private parties can be assured that no surreptitious modification of vehicle software occurs.


Judge approves SEC settlement with Tesla, Musk The Hill: Technology Policy

A federal judge on Tuesday approved a settlement between the Securities and Exchange Commission (SEC), Tesla and its CEO Elon Musk.The settlement follows an SEC investigation last month into a Musk tweet from August in which he said he had...


Ganymede Was Shaped by Past Tectonic Activity SoylentNews

Even Ganymede is Showing Tectonic Activity. We're Going to Need Another Icy Moon Orbiter

Ganymede was shaped by pronounced periods of tectonic activity in the past, according to a new paper. It's no longer active and its surface is more-or-less frozen in place now. But this discovery opens the door to better planning for future missions to Jupiter's other frozen moon Europa. Unlike Ganymede, Europa is still tectonically active, and understanding past geological activity on Ganymede helps us understand present-day Europa.

Ganymede is one of Jupiter's moons, and it has a sub-surface ocean under a solid layer of frost and ice. The moon shows signs of strike-slip faulting, or strike-slip tectonism. On Earth, this type of tectonic activity created features like the San Andreas fault, a seismically-active region at the boundary between the Pacific Plate and the North American Plate.

Europa is considered a prime target in the search for life in our Solar System because of its sub-surface ocean. Europa is exposed to Jupiter's intense radiation, but the icy sphere surrounding the sub-surface ocean may act as a radiation barrier, protecting life from its harmful effects. Not only is the sub-surface ocean protected from radiation, it's warm.

Ganymede will be visited by ESA's Jupiter Icy Moons Explorer, which should launch in June 2022, reach Jupiter orbit in October 2029, and orbit Ganymede starting in 2033. The mission may include a Russian-built Ganymede lander.

Morphological mapping of Ganymede: Investigating the role of strike-slip tectonics in the evolution of terrain types (DOI: 10.1016/j.icarus.2018.06.024) (DX)

1982 paper: The tectonics of Ganymede (DOI: 10.1038/295290a0) (DX)

Related: NASA Analyzes Forgotten Galileo Data from Flyby of Ganymede

Original Submission

Read more of this story at SoylentNews.


CodeWeavers CrossOver Linux 18 Released With DXVK/VKD3D Support Phoronix

While CodeWeavers' developers have been busy with improvements to Wine and Valve's downstream "Proton" for allowing a great Windows-on-Linux gaming experience, they haven't parted ways with their core business and today they announced the availability of CrossOver 18...


Tesla aims for new neural net computer in production in 6 months, results in 5002000% increase in ops/sec, says Elon Musk Lifeboat News: The Blog

Tesla CEO Elon Musk updated the timeline to release the companys new neural net computer, which they claimed will be the worlds most advanced computer for autonomous driving.

They are now aiming for the new computer to be in production in about 6 months and it could result in a 5002000% increase in operation per second, according to Musk.

The release of this new computer with Teslas own AI chip would be the culmination of a long project that Tesla started about 3 years ago as it anticipated a need for more computing power in its vehicles.


AI on a MEMS Device Brings Neuromorphic Computing to the Edge IEEE Spectrum Recent Content full text

For first time artificial intelligence has been integrated into a MEMS device

In order to achieve the edge computing that people talk about in a host of applications including 5G networks and the Internet of Things (IoT), you need to pack a lot of processing power into comparatively small devices.

The way forward for that idea will be to leverage artificial intelligence (AI) computing techniquesfor so-called AI at the edge. While some are concerned about how technologists will tackle AI for applications beyond traditional computingand some are wringing their hands over which country will have the upper hand in this new frontierthe technology is still pretty early in its development cycle.

But it appears that still-too-early-yet status is about to change a bit. Researchers at the Universit de Sherbrooke in Qubec, Canada, have managed to equip a micro-electromechanical system (MEMS) device with a form of artificial intelligence, marking the first time that any type of AI has been included in a MEMs device. The result is a kind of neuromorphic computing that operates like the human brain, but in a microscale device. The combination makes it possible to process data on the device itself, thus improving the prospects for edge computing.

We had already written a paper last year showing theoretically that MEMS AI could be done, said Julien Sylvestre, a professor at Sherbrooke and co-author of the research paper detailing the advance. Our latest breakthrough was to demonstrate a device that could do it in the lab.

The AI method the researchers demonstrated in their research, which is described in the Journal of Applied Physics, is something called reservoir computing.  Sylvestre explains that to understand a bit about reservoir computing, you need to understand a bit about how...


Security updates for Tuesday

Security updates have been issued by CentOS (ghostscript and spamassassin), Debian (moin, spice, and tomcat8), Fedora (kernel-headers, kernel-tools, and libgit2), Oracle (ghostscript and tomcat), Red Hat (ghostscript and tomcat), Scientific Linux (ghostscript and tomcat), SUSE (git, kernel, python, and samba), and Ubuntu (net-snmp and thunderbird).


Police use electronic ticketing to fine more people and increase profits MassPrivateI

The opening seconds of the Saltus Technologies video says it all. Electronic tickets are about one thing, increasing productivity (profits).

"The digiTICKET electronic ticketing solution is an innovative force multiplier for Public Safety - enabling officers to quickly create and submit tickets electronically. "

Enabling police officers to write more tickets increases profits.

According to Saltus, their entire business model appears to be focused on profits.

"Saltus Technologies is dedicated solely to developing and marketing digiTICKET an eCitation solution for Public Safety agencies. Electronic ticketing provides an excellent return on investment."

Is this what policing has become?  Is electronic ticketing and ticket quotas really an excellent return on investment?

Ticketing profitability measured in real-time

To convince police departments to switch to electronic ticketing, Saltus offers funding incentives or vehicles to assist them with acquiring their electronic ticketing program.

One of digiTICKET's main selling points is that police can measure "ticketing productivity" in real-time. To emphasize that fact, Saltus mentions increased cash flow or "increased productivity" four times in their eCtitation Solutions page.

Saltus has even created the KLER Justice Solution and "eCitation Solution" to make it easier for police departments to purchase digiTICKETS.

Electronic ticketing or eCitations is so profitable that the eleven companies involved in providing ticketing to law enforcement and court systems started their own eCitation Coalition.

The coalition calls the companies profiting from digital ticketing "the best-of-the-best at making law enforcement and courts more productive". Below is a list...


Qualcomm Introduces New Chipsets for 60-Gigahertz Wi-Fi IEEE Spectrum Recent Content full text

The chipsets are the first to utilize the new 802.11ay standard

Millimeter waves arent just for 5G networks. The gigahertz frequencies could also be a boon for Wi-Fi. Routers like the Nighthawk XR700, which send and receive signals at 60 gigahertz, have emerged in the past few years, though theyve remained useful largely for specialized applications like online gaming.

60-GHz Wi-Fi is not new by any means, says Caleb Banks, a senior manager of product marketing at Qualcomm. But its very complex. Putting millimeter wave technology into a mobile device is challenging.

Qualcomm hopes to make 60-GHz Wi-Fi easier with two new chipsets, announced today. The chipsets, the QCA64x8 and QCA64x1, make use of the new IEEE standard 802.11ay. 802.11ay improves upon the 2014 standard 802.11ad, which laid the groundwork for 60 GHz Wi-Fi.

Traditionally, the 2.4 GHz and 5 GHz bands have been synonymous with Wi-Fi. However, data demands continue to growparticularly with applications like AR/VR on the horizonand the old Wi-Fi spectrum bands wont be able to cope on their own.

At first blush, 60 GHz Wi-Fi offers a whole host of advantages over 2.4 and 5 GHz Wi-Fi. The higher frequency offers multi-gigabit speeds and much lower latency. A 60 GHz router could also theoretically be more power efficient, since it will take far less time for uploads and downloads, meaning it can spend more time in power saver mode.

That said, 60-GHz Wi-Fi faces some of the same challenges as 5G cellular networks, which will operate in similar regions of the spectrum. The limitation to 60 GHzand millimeter waves in generalis range, says Banks. By range, Banks means that the problem is not just the fact that millimeter waves dont have as much effective distance as longer-wavelength, lower-frequency communications do, but also comes from their inability to penetrate objects. 2.4 and 5 [GHz] are great, says Banks. Theyll go through walls. 60 GHz will not.

That said, Qualcomm still sees potential. 60-GHz Wi-Fi has lots of great applications, if you have line of sight, Banks says. That includes straightforward applications like high-speed downloads to emerging uses like Wi-Fi sensing to detect people and gestures using millimeter waves.

The Wireless Gigabit Alliance (WiGig), a trade association focused on developing the 60 GHz band, helped de...


How the Internet of Things Can Save You Money on Insurance IEEE Spectrum Recent Content full text

Discounts can be garnered by installing monitoring devices in the smart home or by using telematics to monitor driving habits.

In the home, the internet of things (IoT) is quickly becoming ubiquitous in terms of how it connects multiple devices and appliances to the internet in order to make it easier to enable home automation.

These smart devices such as thermostats, locks, lighting, security, appliances, curtains and more are generally controlled through a proprietary app allowing homeowners to control these home automation features either directly or remotely. There are also a multitude of smart speakers such as voice assistants from Amazon, Google and Apple that can control these IoT devices through voice recognition.

While many consumers have already adopted a smart thermostat or smart lock or are currently using an Amazon Alexa-enabled device or Google Home, one of the more interesting aspects to the IoT is what it is enabling in other adjacent markets.

While offering more efficiencies in the home, IoT is also bringing these same efficiencies into the insurance market from homeowners to automotive. As adoption levels in the IoT increase, the benefits of having connected devices in the home and in the car will bring new ways to experience return on investment in the insurance world while at the same time providing insurance with more data on users to determine fair rates and provide services that keep people and assets safe.

Protecting the Home While Getting a Discount

Water leak detection devices such as iHome Smart Water Leak Sensor use a smartphone app to alert homeowners to potential property damaging situations Credit: iHome Figure 1: Water leak detection devices such as iHome Smart Water Leak Sensor use a smartphone app to alert homeowners to potential property damaging situations.

Sure, the IoT can allow users to stream music from lightbulbs or monitor a home security system through a smartphone, but it can also save users a load of money on homeowners insurance.

Damage from plumbing problems and from household appliances can result in thousands of dollars in repairs or insurance claims. With the IoT, these problems can be prevented or mitigated by installing monitoring devices next to plumbing fixtures and appliances such as washing machines, dishwashers, water heaters, toilets and sinks.

When a leak is detected, a signal is sent to an electronic unit that closes the homes main water supply and alerts the homeowner. Other systems limit damage by connecting leak detectors to a central monitoring system, which then relays the problem to the homeowner to prevent a bigger disaster. Because o...


Spinnaker: The Kubernetes of Continuous Delivery

Spinnaker: The Kubernetes of Continuous Delivery


Expert disclosed a new passcode bypass to access photos and contacts on a locked iPhone Security Affairs

iOS passionate Jose Rodriguez disclosed a new passcode bypass bug that could be to access photos and contacts on a locked iPhone XS.

The security passionate Jose Rodriguez has discovered a new passcode bypass bug that could be exploited on the recently released iOS 12.0.1.

Now the expert discovered a similar flaw that is very easy to execute by a physical attacker to access photo album of a locked device. The bug allows the attacker to select photos and send them to anyone using Apple Messages.

The new hack devised by Rodriguez leverage Siri assistant and VoiceOver screen reader to bypass the passcode.

Below the step-by-step procedure for the passcode bypass discovered by Rodriguez:

  1. Call the target phone from any other phone.
  2. Instead of answering the call, click on Message in the call window.
  3. Select Custom to reply via text message. That will open the Messages input screen.
  4. Invoke Siri to activate VoiceOver, the iOS feature that helps sight-impaired users use an iPhone.
  5. Click on the camera icon.
  6. Invoke Siri with the iPhones home button while you double-tap the display. The screen will turn black. This is where the bug kicks in and iOS gets confused.
  7. From here, click on the home button again while the screen remains black.
  8. Swipe up to the upper left corner while the screen remains black. VoiceOver will tell you what you have selected.
  9. Keep swiping to the top left corner until VoiceOver tells you that you can select the Photo Library (Fototeca in Rodriguez video).
  10. Tap to select Photo Library....


Printable solar materials could soon turn many parts of a house into solar panels Lifeboat News: The Blog

New houses could soon deliver on a long-awaited promise and incorporate windows or roof tiles that harvest solar energy, research conducted at KAUST suggests.

Derya Baran, at the KAUST Solar Center, and her colleagues have developed a photovoltaic organic material that captures light efficiently and that potentially could be coated on building .

Traditional roof-mounted solar panels are made from slabs of silicon, but can also capture energy from sunlight. These molecules could be formulated as inexpensive printable inks that are applied to regular building components such as windows. Turning sunlight into electricity is a multistep process, and the key to developing high-performance has been to find organic molecules that are good at every step, Baran explains.


Independent solar power could offer reliable electricity to sub-saharan Africa Lifeboat News: The Blog

Six-hundred million people in Sub-Saharan Africa lack access to electricity. To meet these power needs, a mix of large public-run utility grids and standalone systems will be necessary for universal access in the region. Governments, aid organizations, and scientists are working to understand which electricity grid solution would be most cost-effective and reliable across urban, peri-urban, and rural areas.

Standalone, or decentralized electricity systemsmost often solar power with battery storageare usually thought to be too expensive compared to large state-run grids in all but the most remote locations. However, declining costs of solar and new battery technologies are changing the best pathways to deliver reliable power to people that currently lack access to electricity. New UC Berkeley research published today in Nature Energy finds that decentralized electricity systems in sub-saharan Africa can be designed for extremely high reliability, and that this may come at remarkably low costs in the future.

Jonathan Lee, a Ph.D. candidate in the Energy and Resources Group (ERG) and Associate Professor Duncan Callaway worked with more than 10 years of solar data from NASA and developed an optimization that determines the lowest cost way to build a standalone system given component costs and a target reliability. At current costs, their model indicates that most regions in Sub-Saharan Africa can get 95% reliable powermeaning customers can use electricity from some combination of solar panels and batteries 95% of the timefor roughly USD$0.40 per kWh. Though that cost is high relative to current costs, their model indicates that with aggressive but plausible future cost declines in decentralized system costs, largely in batteries, these costs would drop to levels competitive with the grid in many parts of the continent in less than a decade.


The Science of Landing on an Asteroid Hackaday

Exploiting the resources of the rock-strewn expanse of space between Mars and the outer planets has been the stuff of science fiction for ages. Theres gold in them thar space rocks, or diamonds, or platinum, or something that makes them attractive targets for capitalists and scientists alike. But before actually extracting the riches of the asteroid belt, stuck here as we are at the bottom of a very deep gravity well thats very expensive to climb out of, we have to answer a few questions. Like, how does one rendezvous with an asteroid? Whats involved with maneuvering near a comparatively tiny celestial body? And most importantly, how exactly does one land on an asteroid and do any useful work?

Back in June, a spacecraft launched by the Japanese Aerospace Exploration Agency (JAXA) finally caught up to an asteroid named Ryugu after having chased it for the better part of four years. The Hayabusa2 was equipped to answer all those questions and more, and as it settled in close to the asteroid with a small fleet of robotic rovers on board, it was about to make history. Heres how they managed to not only land on an asteroid, but how the rovers move around on the surface, and how theyll return samples of the asteroid to Earth for study.

These Are Not the Rovers Youre Looking For



Molecular semiconductors could be the future of electronics, and this new technique offers a way to mass produce them Lifeboat News: The Blog

Visions for what we can do with future electronics depend on finding ways to go beyond the capabilities of silicon conductors. The experimental field of molecular electronics is thought to represent a way forward, and recent work at KTH may enable scalable production of the nanoscale electrodes that are needed in order to explore molecules and exploit their behavior as potentially valuable electronic materials.


Studying the stars with machine learning Lifeboat News: The Blog

To keep up with an impending astronomical increase in data about our universe, astrophysicists turn to machine learning.


DNS_Probe_Finished_No_Internet fix for the chrome browser TechWorm

Ignoring the fact that you love playing with this dinosaur, having it while browsing the internet can be a huge pain. This dns_probe_finished_no_internet or DNS probe finished no internet error irritates lots of people in many ways. So in this article, we are providing you with the ways to fix it. But before learning these methods, we must be familiar with the reasons for its occurrence.

How dns_probe_finished_no_internet error occur?

There can be many reasons behind this.

It may originate from multiple sources or It can be a result of several issues at once or just one at a time. So at first glance, you just cant be sure on how to fix it, since different problems require different solutions.

So what to do? How to fix it?. Is there any way to fix it? The answer to all these questions is Yes.

But in order to fix this error, just make sure you dont mess with the default router settings. As it might give you a problem later. So without further ado, lets get right into it.

How to fix dns_probe_finished_no_internet

Method 1: Checking the Internet Connectivity

Yes, the first and foremost reason to have this error on your web browser screen is having poor internet connectivity or no-working internet.

So make sure to plug in all your wifi modem cables or check the router if it is working or not.

If all your cables are plugged in and modem/router is working properly then still dont worry. There are some other ways as well.

One of them is a ping test and it can be done with the help of command prompt.

  • Step 1

Navigate to the start menu and search for command prompt.

  • Step 2

Then Click on Command prompt

  • Step 3

When the command prompt opens, type the following command and hit enter.

  • ping -t

After hitting enter, the following lines will appear.

Reply from bytes=32 time=106ms TTL=55

If these lines are repeating continuously then its a sign of working internet.

So this clearly means that the issue lies somewhere else. Al...


Bing Is Suggesting the Worst Things You Can Imagine SoylentNews

Submitted via IRC for chromas

Bing Is Suggesting the Worst Things You Can Imagine

If you use Bings image search, youre going to see the worst filth you can imagine.  Bing suggests racist terms and shows horrifying images. Bing will even suggest you search for exploited children if you have SafeSearch disabled.

We contacted Microsoft for comment, and Jeff Jones, Senior Director at Microsoft, gave us the following statement:

We take matters of offensive content very seriously and continue to enhance our systems to identify and prevent such content from appearing as a suggested search. As soon as we become aware of an issue, we take action to address it.

Update: Since publication, Microsoft has been working on cleaning up the offensive Bing suggestions that we mentioned. Based on our research, there are still many other offensive suggestions that have not yet been fixed, including a few that weve mentioned below. We are unsure if they are simply fixing the offensive items we pointed out, or if they are improving the algorithm.

Read more of this story at SoylentNews.


Longevity Impact Forum will make digital health mainstream Lifeboat News: The Blog

Invite to consolidation of efforts.

Top of Longevity and healthtech companies. AI, blockchain, digital health and mHealth are the top investment opportunities in aging world.


Anthem will pay $16 million to settle HIPAA violation due to 2015 breach Help Net Security

Anthem has agreed to pay $16 million to the U.S. Department of Health and Human Services, Office for Civil Rights (OCR) and take substantial corrective action to settle potential violations of the Health Insurance Portability and Accountability Act (HIPAA) Privacy and Security Rules after a series of cyberattacks led to the largest U.S. health data breach in history and exposed the electronic protected health information of almost 79 million people. Details of the Anthem HIPAA More

The post Anthem will pay $16 million to settle HIPAA violation due to 2015 breach appeared first on Help Net Security.


The Higgs Boson May Have Saved Our Universe from Cosmic Collapse. For Now Lifeboat News: The Blog

Our universe is permeated with a vast, unseen force that seems to oppose gravity. Physicists call this force dark energy, and it is thought to be constantly pushing our universe outward.

But in June, a group of physicists published a paper in the preprint journal arXiv implying that dark energy changes over time. This means that the universe will not expand forever but might eventually collapse into the size it was before the Big Bang.

Almost immediately, however, physicists found problems with the theory: Several independent groups subsequently published papers that suggested revisions to the conjecture. Now, a paper published on Oct. 2 in the journal Physical Review D suggests that, as it stands, the original conjecture cant be true because it cant explain the existence of the Higgs boson which we know exists, thanks to the Large Hadron Collider, the massive particle collider on the border between France and Switzerland. [Beyond Higgs: 5 Elusive Particles That May Lurk in the Universe].


Scientists discover new properties of uranium compounds Lifeboat News: The Blog

Scientists from Russia, China and the United States predicted and have now experimentally identified new uranium hydrides, predicting superconductivity for some of them. The results of their study were published in Science Advances.


Coalition says new autism guidelines wont affect NDIS access Lifeboat News: The Blog

Fletcher told the ABC the guidelines were developed in consultation with people living with autism, researchers and doctors, and had been approved by the National Health and Medical Research Council.

It does not change what the NDIS does and indeed it may well be that there are people who, today, would not be diagnosed who will be diagnosed, he said. That will be a judgment for clinicians and medical profession and the NDIS will continue to do what it does, which is make an assessment of the impairment that somebody suffers as a result of a disability. Is it likely to be permanent and lifelong? Is it significant? What impact does it have on the functioning?

Dr Wenn Lawson, the co-chair of the Australian Autism Research Council, said a consistent assessment and diagnosis process for autism meant people would be able to access more appropriate supports.


Twenty-five years of using microlensing to study dark matter Lifeboat News: The Blog

The impact of gravitational-microlensing observations from 1993.


All in the family: Kin of gravitational wave source discovered Lifeboat News: The Blog

On October 16, 2017, an international group of astronomers and physicists excitedly reported the first simultaneous detection of light and gravitational waves from the same sourcea merger of two neutron stars. Now, a team that includes several University of Maryland astronomers has identified a direct relative of that historic event.


Is age an illness? Lifeboat News: The Blog

We cant all be Dorian Gray, Father time (and natural selection) comes for us all.


Stunning new sea slug species look just like seaweed Lifeboat News: The Blog

This may be the best example of an animal masquerading as a plant that we have, biologist Nicholas Paul, an expert on seaweed and algae at Australias University of the Sunshine Coast, said in an email. He wasnt involved with the new study.

The new species exclusively feed on the seaweed genus Caulerpa and are found throughout the Pacific, including Malaysia, Australia, Guam, and the Philippines. Humans consider the algaes caviar-like bulbs, called sea grapes, a delicacybut few sea creatures dare eat the stuff, making them highly invasive. Thanks to the global aquarium trade, the algae has invaded waters from the Mediterranean to Japan.


MIT Knows That AI Is The Future Lifeboat News: The Blog

MIT has launched the Stephen A. Schwarzman College of Computing, a $1 billion center dedicated to reshaping its academic program around AI. The idea, said MIT president L. Rafael Reif, is to use AI, machine learning and data science with other academic disciplines to educate the bilinguals of the future, defining bilingual as those working in biology, chemistry, politics, history and linguistics with computing skills that can be used in their field.


Pepper the robot tells MPs about artificial intelligence Lifeboat News: The Blog

My name is Pepper, robot tells MPs

Jump to media player Pepper the robot answers questions from MPs on the education select committee about helping to care for older people.


NVIDIA GeForce RTX 2070 Linux Benchmarks Will Be Coming Phoronix

NVIDIA's embargo for reviews on the GeForce RTX 2070 graphics cards has now expired ahead of the expected retail availability on Wednesday...

Go Back:30 Days | 7 Days | 2 Days | 1 Day

IndyWatch Science and Technology News Feed Today.

Go Forward:1 Day | 2 Days | 7 Days | 30 Days

Tuesday, 16 October


2018 US voter records offered for sale on hacking forum Help Net Security

Somebody is selling US voter registration databases on an English-language speaking dark web hacker forum and the offer comes with the promise they will be updated every week, Anomali and Intel 471 researchers have discovered. About the databases for sale The databases include information about voters of 19 US states: Montana, Louisiana, Iowa, Utah, Oregon, South Carolina, Wisconsin, Kansas, Georgia, New Mexico, Minnesota, Wyoming, Kentucky, Idaho, Tennessee, South Dakota, Mississippi, West Virginia and Texas. Anomali More

The post 2018 US voter records offered for sale on hacking forum appeared first on Help Net Security.


10 Best Sites To Watch Hindi Movies Online- Free And Legally In 2018 TechWorm

Bollywood often referred to as Hindi movies is the Indian Hindi-language film industry with the highest number of movie releases per year. Moreover, Bollywood also has one of the highest viewers in the movie industry around the world. A decade ago a majority of Indians relied on movie theatres and television to watch Hindi movies.

Not every movie lover goes to watch Hindi movies in cinema halls or they watch Bollywood movies on tv. Smartphones and the drastic increase in the number of internet users over the past few years has completely transformed the way we watch movies. Many of us now rely on the internet to watch online Hindi movies or to download Bollywood movies.

We can now watch Hindi movies online and even download them for offline viewing. That said, its relatively difficult to find the perfect website for watching Hindi movies online legally. Most of the site available online to watch Bollywood movies either share pirated content or carries adware and malware.

So heres a list of ten best sites or services that offer an extensive collection of Bollywoods Hindi movies to watch online.


List of best Websites to Watch Bollywood movies online

1. Box TV

The first website on the list is Box TV. Surprisingly, Box TV is one of many few sites that offer an extensive collection of Hollywood, Tollywood and Bollywood movies. In addition to that, a majority of content on Box TV is free to watch. Unlike other websites, you can find content on BoxTV in more than a dozen languages.

BoxTV is owned and operated by Times Internet group. Consequently, watching content on BoxTV is entirely legal. This popular service offers impressive video quality, and the streaming speeds are also reliable. Moreover, you can get a monthly plan of Rs.199 for enjoying ad-free movies.

BoxTV Best Features

  • An extensive collection of Hollywood, Bollywood, and Tollywood movies.
  • Available for smartphones, PC, and Roku TV.
  • Movies are available in more than a dozen languages.


CVE-2018-10933: libssh: authentication bypass in server code Open Source Security

Posted by Marcus Meissner on Oct 16


libssh 0.8.4 and 0.7.6 security and bugfix release

This is an important security and maintenance release in order to address CVE-2018-10933.

libssh versions 0.6 and above have an authentication bypass vulnerability in the server code. By presenting the server
an SSH2_MSG_USERAUTH_SUCCESS message in place of the SSH2_MSG_USERAUTH_REQUEST message...


The Nature of Indefinite Life Extension in Context of Immanuel Kants Insights on Ethics and Duty Lifeboat News: The Blog

Is working to pioneer the full scope of everything that exists a duty? I have been contemplating aspects of that question for some years now. Here I move in the direction of articulating its nature and making the case by drawing out correlations with life extension and Immanuel Kants thoughts in The Metaphysical Elements of Ethics.

IV. What are the Ends which are also Duties? They are: A. Our own perfection, B. Happiness of others.

His notion of categorical imperative is that of a universally applicable, non-contradictory, absolute necessity which everyone can use pure practical reason to understand without it needing to be experienced or taught to them.

He says that ethics may also be defined as the system of the ends of the pure practical reason.

Perfection is doing whats necessary, virtuous, moral, ethical and so forth, and doing it well, but its more of a direction to move in than a destination to be at.

He says its adding to happiness of others that is necessary, not happiness of ourselves, but if pain, poverty or so forth are to become us, it is our duty to remedy it not for our happiness, but to secure proper functioning of our moral agent in pursuit of our own perfection and happiness of others.

That this beneficence is a duty results from this: that since our self-love cannot be separated from the need to be loved by others (to obtain help from them in case of necessity), we therefore make ourselves an end for others; and this maxim can never be obligatory except by having the specific character of a universal law, and consequently by means of a will that we should also make others our ends. Hence the happiness of others is an end that is also a duty.

Its pursuit of perfection of oneself that already covers personal happiness. If we took our own happiness on as an end then it would be unstructured, superfluous and generally unconcerned with imperative ends. That time could be used on the fulfilling and consequential variety of satisfaction that comes from sense of uprightness, accomplishment, and humanity-scale progress and security gained from contributing to and belonging to a happier collective when one is in pursuit of perfection. As people like Viktor Frankl and Abraham Maslow have told us, the brand of fulfillment derived from contributing to progress of humanity takes a person to a level beyond happiness and is capable even of eliminating suffering. Kant says:

For he who is to feel himself happy in the mere consciousness of his uprightness already possesses that perfection which in the previous section was defined as that end which is also duty.

To make others happy is not to go out of ones way to shower them with greatness so much as it is to make sure that you arent a creator of its deficit. Its just as easy to keep the peace. Any joy we impart beyond that is all bonus. A needlessly rude neighbor, for instance, is neglecting their duty because th...


Physics: Not everything is where it seems to be Lifeboat News: The Blog

Scientists at TU Wien, the University of Innsbruck and the AW have for the first time demonstrated a wave effect that can lead to measurement errors in the optical position estimation of objects. The work now published in Nature Physics could have consequences for optical microscopy and optical astronomy, but could also play a role in position measurements using sound, radar, or gravitational waves.

With modern optical imaging techniques, the position of objects can be measured with a precision that reaches a few nanometers. These techniques are used in the laboratory, for example, to determine the position of atoms in quantum experiments.

We want to know the position of our quantum bits very precisely so that we can manipulate and measure them with laser beams, explains Gabriel Araneda from the Department of Experimental Physics at the University of Innsbruck.


SoundBender levitates objects Lifeboat News: The Blog

Levitation is often thought of as the realm of magicians or The Jetsons, but it is technically possible. That said, the tech seems to be moving pretty slowly. Now, researchers at the University of Sussex have developed SoundBender, a technology that bends sound waves around obstacles to acoustically levitate objects above them.


Tesla Model 3 Drive System Designed to Last for Over One Million Miles

Via: Electrek: Tesla says that the Model 3 drive system is designed and validated for over one million miles of range. Today, the automaker released impressive pictures of Model 3 drive units after testing, which Elon Musk says drove 1M miles.


Winamp to make a comeback as a mobile app in 2019 TechWorm

Winamp reimagined as an audio app for mobile could arrive in 2019

Winamp, the 21-year-old iconic media player, is set to receive a major overhaul and will be available on desktop and mobile devices in 2019, reports TechCrunch.

For those unaware, Winamp is one of the oldest popular MP3 players for Microsoft Windows devices, that supports numerous audio and video formats. Released in 1997, Winamp was originally developed by Justin Frankel and Dmitry Boldyrev by their company Nullsoft, which they later sold to AOL in 1999 for $80 million. However, in January 2014, Winamp was acquired by Radionomy for an undisclosed sum.

He added, What I see today is you have to jump from one player to another player or aggregator if you want to listen to a radio station, to a podcast player if you want to listen to a podcast this, to me, is not the final experience.

According to TechCrunch, the Winamp 6 could allow you to connect to Spotify, Google Music, podcasts, Audible, play your MP3s, and also have a search feature that lets you use all of it from one user interface. The aim is to make all of your media accessible in one place.

The post Winamp to make a comeback as a mobile app in 2019 appeared f...


Polarity Governs Atomic Interaction Through Two-Dimensional Materials SoylentNews

Submitted via IRC for Bytram

The vast majority of computing devices today are made from silicon, the second most abundant element on Earth, after oxygen. Silicon can be found in various forms in rocks, clay, sand, and soil. And while it is not the best semiconducting material that exists on the planet, it is by far the most readily available. As such, silicon is the dominant material used in most electronic devices, including sensors, solar cells, and the integrated circuits within our computers and smartphones.

Now MIT engineers have developed a technique to fabricate ultrathin semiconducting films made from a host of exotic materials other than silicon. To demonstrate their technique, the researchers fabricated flexible films made from gallium arsenide, gallium nitride, and lithium fluoridematerials that exhibit better performance than silicon but until now have been prohibitively expensive to produce in functional devices.

The new technique, researchers say, provides a cost-effective method to fabricate flexible electronics made from any combination of semiconducting elements, that could perform better than current silicon-based devices.

"We've opened up a way to make flexible electronics with so many different material systems, other than silicon," says Jeehwan Kim, the Class of 1947 Career Development Associate Professor in the departments of Mechanical Engineering and Materials Science and Engineering. Kim envisions the technique can be used to manufacture low-cost, high-performance devices such as flexible solar cells, and wearable computers and sensors.

and see for a more readable summary


Original Submission

Read more of this story at SoylentNews.


Linux's LoRa Is Ready To Deliver Long-Range, Low-Power Wireless Phoronix

Adding to the long list of new features for what will be Linux 4.20 or likely renamed to Linux 5.0 per Linus Torvalds' numbering preferences is a new wireless networking subsystem within the kernel's networking code... Meet LoRa...


Judge-Bashing Tactics, Undermining PTAB, and Iancus Warpath for the Litigation and Insurance Industries Techrights

The existing USPTOs management feels like it doesnt care about justice (facts), technology and science, only about legal bills

Trump and Iancu

Summary: Many inter partes reviews (IPRs) at the Patent Trial and Appeal Board (PTAB) of the U.S. Patent and Trademark Office (USPTO) leverage 35 U.S.C. 101 against software patents; instead of putting an end to such patents Director Iancu decides to just serve the industry he came from (a meta-industry where his firm had worked for Donald Trump)

THE USPTO under the new leadership (Director) deviates further and further away from Federal Circuit (CAFC) rulings and SCOTUS caselaw. The Office does so at its own peril, however, as the certainty associated with US patents will be further reduced. More and more granted patents will be presumed invalid. Is the leadership/Director OK with that?

This post binds together last weeks stories about court cases and Office policies. What we hope to show is a divergence from the law; the Office just cares about granting patents, not defending their value by limiting their scope.

We begin with this affirmation by CAFC one in which a U.S. District Court was supported by CAFC. The divergence between the courts is being lowered over time. CAFC learned to obey SCOTUS and U.S. District Courts have, in turn, become more like CAFC. This is a good thing as its indicative of correct or at least consistent judgment. The same cannot be said about the Office because far too many patents these days are later discovered/unmasked as fake patents.

Yesterday Kluwer Patent Blog wrote about a British court finding that the claims in question were invalid for obviousness. Its not just a US issue.

A couple of days ago Steve Brachmann and Gene Quinn (Watchtroll)...


35 million US voter records available for sale in a hacking forum Security Affairs

Millions of voter records are available for sale on the Dark Web, experts discovered over 35 million US voter records for sale in a hacking forum.

Millions of voter records are available for sale on the Dark Web, experts from Anomali and Intel 471 discovered 35 million US voter records for sale in a hacking forum.

Researchers have analyzed a sample of voter records and determined the data to be valid with a high degree of confidence.

Records in the voter registration database include personal and voting history information of US residents.

Certain states require the seller to personally travel to locations in-state to receive the updated voter information. reads the post published by Anomali.

This suggests the information disclosure is not necessarily a technical compromise but rather a likely targeted campaign by a threat actor redistributing possibly legitimately obtained voter data for malicious purposes on a cybercrime forum, 

The seller only provided the number of records for the lists of voters belonging to three states asking for prices between $1,300 and $12,500.

  • Louisiana (3 million);
  • Wisconsin (6 million);
  • Texas (14 million);

us voter records

The seller also claims to have lists of voters for other states, including Montana, Iowa, Utah, Oregon, South Carolina, Wisconsin, Kansas, Georgia, New Mexico, Minnesota, Wyoming, Kentucky, Idaho, South Carolina, Tennessee, South Dakota, Mississippi, and West Virginia.

According to the seller, voting lists are weekly updated with the help of people in the state governments.

Certain states require the seller to personally travel to locations in-state to receive the updated voter information. reads a...


The Biggest Features Of Linux 4.19: Intel/AMD, CoC, 802.11ax, EROFS, GPS & GASKET Phoronix

With the Linux 4.19 kernel set to be released next weekend, here's a recap of the most prominent features to be found in this next kernel release...


Considering Electronic Document Signing? Try OneSpan Sign Free For 30 Days Graham Cluley

Graham Cluley Security News is sponsored this week by the folks at OneSpan. Thanks to the great team there for their support!

More than 10,000 customers in 100 countries rely on OneSpan to secure access, manage identities, verify transactions, simplify document signing and protect high value assets and systems.

In todays digital era, more and more organizations choose e-Signature technology as part of their digitization process.

OneSpan Sign is the white-labeled solution behind some of the most trusted brands and security-conscious organizations in the world. The last ten industry reports show that OneSpan Sign received the highest overall customer satisfaction score among e-signature products. 99% of users rated it four or five stars.

Try sending and e-signing documents now, free of charge, and discover how to:

  • Enhance user experience across all channels
  • Increase operational efficiency
  • Meet compliance challenges

Start e-signing in minutes on web and mobile, by signing-up for an Unlimited 30-Day Trial now!

If youre interested in sponsoring my site for a week, and reaching an IT-savvy audience that cares about computer security, you can find more information here.


Life Imitates Art: 3D Printed Banksy Frame Shreds Oeuvre, Prints Money Hackaday

[David] is working on a re-design of his piece which will be easier to build so keep an eye on his Reddit thread if youd like to print your own.


Qt 5.12 Beta 2 Brings Many Fixes Phoronix

Just two weeks after the Qt 5.12 beta release, a second beta is now available for testing of this forthcoming tool-kit update...


Jeff Bezos Wants Us All to Leave Earthfor Good Lifeboat News: The Blog

At Blue Origin, Amazons space-obsessed founder is building rockets, and he hopes to someday blast humanity into an extraterrestrial future.


Apple Donates 1,000 Apple Watches to Binge Eating Study SoylentNews

Apple donates 1,000 watches to eating disorder study

The use of Apple Watches in medical studies now includes research into eating disorders. Apple is donating 1,000 smartwatches to a University of North Carolina study (the Binge Eating Genetics Initiative, or BEGIN) that will help understand bulimia nervosa patients and others with binge eating behavior. The wristwear will track heart rates over a month-long period to see if there are any spikes ahead of binging incidents. If there are, it might be possible to alert caregivers and patients before these acts take place.

They either have too many unwanted smartwatches laying around, or want doctors to prescribe the Apple Watch treatment.

Also at 9to5Mac and Fast Company.

Related: Apple's Watch Can Detect an Abnormal Heart Rhythm With 97% Accuracy, UCSF Study Says
Apple Watch Could be Used to Detect Hypertension and Sleep Apnea
FDA Approves First Medical Device Accessory for the Apple Watch
AliveCor Sensor for Apple Watch Could Detect Dangerous Levels of Potassium in the Blood
What Cardiologists Think About the Apple Watch's Heart-Tracking Feature

Original Submission

Read more of this story at SoylentNews.


Cloud, AI and Other Buzzwords as Excuses for Granting Fake Patents on Software Techrights

Cloud on beach

Summary: With resurgence of rather meaningless terms like so-called clouds (servers/hosting) and AI (typically anything in code which does something clever, including management of patents) the debate is being shifted away from 35 U.S.C. 101 (Section 101); but courts would still see past such faade

THE EPO and USPTO both have a bad new habit that they spread to other patent offices, such as KIPO in Korea. They use or misuse buzzwords. They try to make things outside patent scope seem so innovative that somehow this supposed innovation defies the rules (scope). Sometimes that manages to impress or at least confuse examiners and judges.

So lets start with this assumption that patent maximalists have come to accept Section 101/Alice renders software patents worthless and even overzealous, very large law firms (Finnegan is one of the biggest) insist that patenting has gone too far for practical purposes. Where do they go from here? Buzzwords.Its hard to patent software. So its not hard to see why patent maximalists would pursue such tricks. As recently as Sunday Watchtroll published this rant about Section 101/Alice the basis (or legal framework) upon which most software patents become void. This has prompted many to cast a grim prospect for the software patent industry, Babak Nouri (at Watchtroll) wrote less than a couple of days ago, as if the patents themselves are the industry

A Realistic Perspective on post-Alice Software Patent Eligibility is the headline and heres a snide remark directed at the law itself: Much of the havoc wrought in the software patent system by the landmark decision Alice v. CLS Bank International, 134 S. Ct. 2347 (2014) stems from the unworkable two-part patent eligibility test based on vaguely defined and nebulous Abstract idea and significantly more constructs. The High courts reluctance or perhaps inability to precisely define these standards and the perceived lack of discernible consistency by the patent community in the way these standards have been applied in the compendious jumble of case law, has perpetuated a sense of uncertainty. This has prompted many to cast a grim prospect for the software patent industry.

Who said this so-called industry...


Eta Compute Debuts Spiking Neural Network Chip for Edge AI IEEE Spectrum Recent Content full text

Chip can learn on its own and inference at 100-microwatt scale company says at Arm Tech Con

At Arm Tech Con today, West Lake Village, Calif.-based startup Eta Compute showed off what it believes is the first commercial low-power AI chip capable of learning on its own using a type of machine learning called spiking neural networks. Most AI chips for use in low-power or battery-operated IoT devices have a neural network that has been trained by a more powerful computer to do a particular job. A neural network that can do whats called unsupervised learning can essentially train itself: Show it a pack of cards and it will figure out how to sort the threes from the fours from the fives.

Eta Computes third generation chip, called TENSAI, also does traditional deep learning using convolutional neural networks. Potential customers already have samples of the new chip, and the company expects to begin mass production in the first quarter of 2019.

Neural networks are essentially a group of nodes having values called weights and connections to other nodes. The combination of connections and weights is the intelligence that can tell a slug from a snake in a photo or the word slug from the word snake in a spoken sentence. In convolutional neural networks (the deep learning kind), these weights are often 8- or 16-bit numbers. But in spiking neural networks, theyre all just 1s or 0s. In consequence, the key neural network operationmultiply and accumulatebecomes mostly addition, reducing the amount of computation and therefore the power consumed. Its a much more simple operation, says Paul Washkewicz, cofounder and vice president of marketing.

Another difference is that while the nodes in a convolutional neural network tend to be densely connected, the connections for spiking networks wind up being quite sparse. The combination of a sparse network and less complex math means it takes less data and time to come to an answer. For example, to recognize the cheetah seen in the photo in the video below, a CNN needs 100,000 pixels; the spiking neural network needs less than 1000.

One of the holy grails of machine learning is unsupervised learning, says Washkewicz. Usually, networks are trained on hundreds or thousands of labeled examples of what theyll need to recognize in the real world. For an embedded system, the resulting set of weights and connections is then programmed onto the chip. When you talk about the democratization of machine learning and getting regular engineers and computer scientists...


Microsoft co-founder Paul Allen dead at 65 Lifeboat News: The Blog

Some of Allens philanthropy has taken a scientific bent: Allen founded the Allen Institute for Brain Science in 2003, pouring $500 million into the non-profit that aims to give scientists the tools and data they need to probe how brain works. One recent project, the Allen Brain Observatory, provides an open-access catalogue of activity in the mouses brain, Saskia de Vries, senior scientist on the project, said in a video. That kind of data is key to piecing together how the brain processes information.

Microsoft co-founder Paul Allen died today from complications with non-Hodgkins lymphoma. He was 65. Allen said earlier this month that he was being treated for the disease.

Allen was a childhood friend of Bill Gates, and together, the two started Microsoft in 1975. He left the company in 1983 while being treated for Hodgkins lymphoma and remained a board member with the company through 2000. He was first treated for non-Hodgkins lymphoma in 2009, before seeing it go into remission.

In a statement given to ABC News, Gates said he was heartbroken by the passing of one of my oldest and dearest friends. He went on to commend his fellow co-founder for his life after Microsoft:


Kali Linux for Vagrant: Hands-On

What Vagrant actually does is provide a way of automating the building of virtualized development environments using a variety of the most popular providers, such as VirtualBox, VMware, AWS and others. It not only handles the initial setup of the virtual machine, it can also provision the virtual machine based on your specifications, so it provides a consistent environment which can be shared and distributed to others.


The Expected Feature We Didn't See Yet For Ubuntu 18.10 Phoronix

While Ubuntu 18.10 is set to roll out this week with its new theme and an assortment of package updates and other enhancements, there is one feature Canonical previously talked about for the Ubuntu 18.10 "Cosmic Cuttlefish" cycle that we have yet to see made public...


Set Up a CI/CD Pipeline with a Jenkins Pod in Kubernetes (Part 2)

Set Up a CI/CD Pipeline with a Jenkins Pod in Kubernetes (Part 2)


5 Things Your Team Should Do to Make Pull Requests Less Painful

In this article well go over some best practices that help ensure good pull requests. Writing good pull requests and having an effective workflow will increase a teams productivity and minimize frustration. Although a pull request is traditionally considered the final point in the developer workflow, these best practices span the entire development process. Well focus on the key points that affect the quality of a pull request.


Intel DRM Linux Driver Working On DisplayPort Forward Error Correction Phoronix

Going in hand with their work on display stream compression for dealing with next-generation displays, the Intel Direct Rendering Manager driver developers are working on "FEC" support to deal with any errors that come up in the stream...


Fake or Real? New Study Finds Consumers Wary of Manipulated Photos SoylentNews

Submitted via IRC for Bytram

Fake or real? New study finds consumers wary of manipulated photos

In the age of fake news and doctored photos, wary consumers are not nearly as gullible as one might presumeespecially if they have knowledge of social media, experience with the internet and are familiar with online photo-imaging tools. But the source of the images does not matter much as people evaluate what is fake and what is real, a University of California, Davis, study suggests.

In an online experiment with 3,476 people ranging from 20 to 87 years in age, researchers found that most people were able to correctly identify fake images, rating image credibility fairly low on a 7-point scale (1 being not credible at all, 7 being extremely credible). This was true even when they were told they came from The New York Times or NPR, or other known news organizations.

"We found that participants' internet skills, photo-editing experience, and social media use were significant predictors of image credibility evaluation," said the study's lead author, Cuihua (Cindy) Shen, professor of communication at UC Davis. "The results show that participants, no matter how careless or distracted they may be, can still be discerning consumers of digital images."

The findings, published in the journal New Media & Society, surprised researchers. Credibility of the source, and acceptance by others (those who hit buttons to share, like, "favorite" or retweet images), swayed photo viewers in previous studies, but not so much in the current study.

More information: Cuihua Shen et al, Fake images: The effects of source, intermediary, and digital media literacy on contextual assessment of image credibility online, New Media & Society (2018). DOI: 10.1177/1461444818799526

Original Submission

Read more of this story at SoylentNews.


IBM rolls out cybersecurity operations center on wheels Help Net Security

IBM Security launched the mobile Security Operations Center, capable of traveling onsite for cybersecurity training, preparedness, and response. The IBM X-Force Command Cyber Tactical Operations Center (C-TOC) will travel around the U.S. and Europe, running incident response drills with clients, providing on-demand cybersecurity support, and building cybersecurity awareness and skills with professionals, students and consumers. The IBM X-Force C-TOC is an operational Security Operations Center on wheels, modeled after Tactical Operations Centers used by the More

The post IBM rolls out cybersecurity operations center on wheels appeared first on Help Net Security.


Trend Micro redefines endpoint security with Trend Micro Apex One Help Net Security

Trend Micro launched the evolution of its endpoint security offering. Now re-branded as Trend Micro Apex One, the product redefines endpoint security with the capabilities delivered as a single agent, with consistency across SaaS and on-premises deployments. This offering enhances automated detection and response and provides actionable insights that maximize security for customers and offers growth opportunities for the channel. Overextended IT security teams are overwhelmed by the number of products required to protect their More

The post Trend Micro redefines endpoint security with Trend Micro Apex One appeared first on Help Net Security.


CyberArk launches Privileged Session Management for Cloud Help Net Security

CyberArk launched CyberArk Privileged Session Manager for Cloud. Through a transparent user experience, this new offering extends privileged access session isolation, monitoring and control to the most common web applications, cloud and social media platforms. As part of an integrated solution, Privileged Session Manager for Cloud also leverages risk scoring capabilities to detect and alert on suspicious privilege-related activity. CyberArk Privileged Session Manager for Cloud will be available as part of the CyberArk Privileged Access More

The post CyberArk launches Privileged Session Management for Cloud appeared first on Help Net Security.


RiskSense cloud service protects against cyber threats and vulnerabilities ahead of midterm elections Help Net Security

RiskSense released its AI-Assisted Pen Testing Service called Attack Surface Validation for Election Systems which provides visibility and prioritization of security vulnerabilities that enables any district to remediate problems before the midterms. Findings are delivered through the RiskSense cloud-service and cover the assessment of a districts entire voting ecosystem, including devices, applications, databases, networks, etc., for vulnerabilities, missing patches, misconfigurations, and more. RiskSense allows resource and security expert-constrained districts to know what to fix, and More

The post RiskSense cloud service protects against cyber threats and vulnerabilities ahead of midterm elections appeared first on Help Net Security.


How Cybercriminals are Targeting free Wi-Fi Users? Security Affairs

Free Wi-Fi is convenient, but it is also unsafe and puts users at great risk. Heres how the cybercriminals attack user on these open networks.

The free Wi-Fi is one of the catchiest things for the users in todays world. This is the main reason why so many free public Wi-Fi can be found without much of a problem. It is not only free but convenient to use these open networks. However, many might not be aware of the fact that these free open Wi-Fi hotspots are actually unsafe and they put the users at great risk.

There are multiple ways in which many cybercriminals are targeting the users of these free Wi-Fi hotspots. Many of these users are at least aware that the open networks they connect are actually unsafe. But what they do not know are various ways in which they are being targeted by the cybercriminals and hackers on these open networks.

Ways in which Hackers Target free Wi-Fi Users

The open for all nature of the free public Wi-Fi networks makes them unsafe for all the users. All the cybercriminals are always on the lookout to get their hands on users personal or financial data or they look for vulnerabilities to get access to their devices. These free networks give the cybercriminals the perfect opportunity to fulfill their purpose. The following are some of the common ways how cybercriminals target the free Wi-Fi users.

free Wi-Fi

  1. Man in the middle attack

The man in the middle attack is one of the most commonly used attacks where the cybercriminal places himself between the user and the router. This way, all the requests by the user actually routes through the hacker. This way, the hacker can actually have full control over the network, and he or she can easily get what they want from the user.

Carrying this attack successfully is so eas...


Pentagon data breach puts personal details of 30,000 staff at risk Graham Cluley

The Pentagon has admitted that up to 30,000 military workers and civilian personnel have had their personal information and credit card data exposed following a security breach.

Read more in my article on the Hot for Security blog.


Best-selling author C.J. Lifeboat News

Best-selling author C.J. Cherryh joins our Futurists Board. Read her Hugo Award-winning novels "Downbelow Station" and "Cyteen".


Performing A Chip Transplant To Resurrect A Dead Board Hackaday

[Uri Shaked] accidentally touched a GPIO pin on his 3.3 V board with a 12 V alligator clip, frying the board. Sound familiar? A replacement would have cost $60, which for him wasnt cheap. Also, he needed it for an upcoming conference so time was of the essence. His only option was to try to fix it, which in the end involved a delicate chip transplant.

Removing the shield on the Bluetooth LE boardThe board was the Pixl.js, an LCD board with the nRF52832 SoC with its ARM Cortex M4, RAM, flash, and Bluetooth LE. It also has a pre-installed Espruino JavaScript interpreter and of course the GPIO pins through which the damage was done.

Fortunately, he had the good instinct to feel the metal shield over the nRF52832 immediately after the event. It was hot. Applying 3.3 V to the board now also heated up the chip, confirming for him that the chip was short-circuiting. All he had to do was replace it.

Digging around, he found another nRF52832 on a different board. To our surprise, transplanting it and getting the board up and running again took only an hour, including the time to document it. If that sounds simple, it was only in the way that a skilled person makes something seem simple. It included plenty of delicate heat gun work, some soldering iron microsurgery, and persistence with...


New iPhone Bug Gives Anyone Access to Your Private Photos The Hacker News

A security enthusiast who discovered a passcode bypass vulnerability in Apple's iOS 12 late last month has now dropped another passcode bypass bug that works on the latest iOS 12.0.1 that was released last week. Jose Rodriguez, a Spanish amateur security researcher, discovered a bug in iOS 12 in late September that allows attackers with physical access to your iPhone to access your contacts


Google Algorithm Effective at Spotting Breast Cancer SoylentNews

Google AI can spot advanced breast cancer more effectively than humans

Google has delivered further evidence that AI could become a valuable ally in detecting cancer. The company's researchers have developed a deep learning tool that can spot metastatic (advanced) breast cancer with a greater accuracy than pathologists when looking at slides. The team trained its algorithm (Lymph Node Assistant, aka LYNA) to recognize the characteristics of tumors using two sets of pathological slides, giving it the ability to spot metastasis in a wide variety of conditions. The result was an AI system that could tell the difference between cancer and non-cancer slides 99 percent of the time, even when looking for extremely small metastases that humans might miss.

LYNA was even more effective when serving as a companion -- pathologists performing simulated diagnoses found that the deep learning tech made their work easier. It not only reduced the rate of missed micro-metastases by a "factor of two," it cut the inspection time in half to a single minute.

Artificial IntelligenceBased Breast Cancer Nodal Metastasis Detection (open, DOI: 10.5858/arpa.2018-0147-OA) (DX)

Impact of Deep Learning Assistance on the Histopathologic Review of Lymph Nodes for Metastatic Breast Cancer (open, DOI: 10.1097/PAS.0000000000001151) (DX)

Original Submission

Read more of this story at SoylentNews.


A simple message containing certain symbols could crash the Sony PlayStation 4 Security Affairs

PlayStation 4 gaming consoles could crash when they receive messages containing certain symbols from fellow gamers.

The consoles could freeze on while the owners are playing their preferred games, the DoS condition is triggered while the devices are parsing symbols in messages received.

There is a new glitch that basically bricks your console and forces you to factory reset it. Even deleting the message from the mobile app doesnt work. It happened to me during Rainbow Six: Siege. A player from the other team used a dummy account to send the message and crashed my entire team. We all have had to factory reset. Only one of our guys wasnt affected and he has his messages private. reads a thread on Reddit.

Many users reported the glitch in the PlayStation 4, even deleting the message from the mobile app the problem persists. Some users fixed the issue by restoring the gaming console to factory settings, but in this way, they have lost data related to their game if they did not subscribe to PS Plus service that backs them up automatically to Sony cloud.

PlayStation 4 parser error

According to the Reddit thread, some gamers playing online multiplayer games sent the malicious message to the members of the opposing team, causing them crashing.

The error triggered by the message was tracked as with the PS4 code CE-36329-3.

Fortunately, the issue could be easily fixed by deleting the crashing message from the mobile app.

Experts recommend to rebuild the database of the console to completely fix the problem, below the step-by-step procedure:

  1. Turn off the PS4 system by pressing the power button on the front panel. The power indicator will blink for a few moments before turning off.
  2. Once the PS4 system is off, press and hold the power button again. Release it after you hear the second beep: one beep will sound when you first press, and another seve...


Court Orders Swedish ISP Telia to Block The Pirate Bay & FMovies TorrentFreak

In an effort to reduce levels of copyright infringement, content companies and distributors have adopted site-blocking as one of their preferred anti-piracy tools.

The practice is now commonplace across Europe, with many of the main torrent and streaming portals blocked by local ISPs.

In Sweden, pirate site blocking became a reality in February 2017 when ISP Bredbandsbolaget (Broadband Company) was ordered to block The Pirate Bay and streaming portal Swefilmer.

That process took a long time to come to fruition. The original lawsuit, filed in 2014 by Universal Music, Sony Music, Warner Music, Nordisk Film, and the Swedish Film Industry, initially went in the ISPs favor.

A subsequent appeal, however, saw the rightsholders emerge victorious, with Bredbandsbolaget ordered to implement technical measures to prevent its customers from accessing the pirate sites through a number of domain names and URLs.

For more than a year, other ISPs in Sweden have been able to provide subscribers with access to The Pirate Bay, since the earlier case was targeted at just one ISP. Now, however, local ISP Telia finds itself in a similar position following an order handed down Monday by the Patent and Market Court.

Following an application by a huge coalition of content companies and groups including the Swedish Film Industry, Nordisk Film, Disney, Paramount, Columbia, Disney, and Twentieth Century Fox, Telia must now block subscriber access to several pirate sites.

As is often the case, torrent favorite The Pirate Bay heads the list, with streaming platforms Fmovies, Dreamfilm and NyaFilmer following closely behind.

Cited by IDG, Per Strmbck of the Film and TV Industry Cooperation Committee said that a favorable decision was anticipated.

The decision was expected and complies with the current legal situation. Now its high time that Telia takes the same responsibility in Sweden as it already does in Denmark and Norway, Strmbck said.

While the move to site blocking in Sweden hasnt always plain sailing, last years decision in the Bredbandsbolaget case laid down some valuable pointers.

The Court found that under EU law it is possible for copyright holders to obtain an injunction against ISPs whose services are used to commit copyright infringement, noting that the Swedish Copyright Act should be interpreted in the light of EU law.

Before deciding on an injunction, the Court also sought to ensure that any blocking would be proportional. Since s...


Astronomers detect moon outside solar system for first time Terra Forming Terra

Its is truly astounding just how wonderfully we have advanced in our ability to observe planets and now moons.  The  next scope going up will likely wink out a slew of moons associated with known planets.
Soon enough we will learn how to  produce and direct wormholes in space.  This will certainly allow sending telescopes out into deep space allowing excellent triangulation long before we travel ourselves. 
I even have a starting point on that technology and it s also central to so called time travel.  We do have evidence that it has been developed in our near future.  Maybe i will get to converge on it.

In the event, our first application of wormholes will be to establish space observatories several light years away in at least four directions and then many more thereafter.  Easy data transfer will also be possible and all that data can be integrates to provide superb resolutions.
We will always have lots of questions to follow up on but that will typically be messy and never that efficient even with sis billion eyeballs working on it... .


Astronomers detect moon outside solar system for first time

Space telescopes find giant body orbiting planet 8,000 light-years from Earth3
 Clive Cookson, Science Editor
Astronomers have compelling evidence that they have made the first discovery of an exomoon a moon orbiting a planet far beyond our solar system. The team at Columbia University, New York, combined observations from two space telescopes, Kepler and Hubble, to determine that a huge natural satellite accompanies planet K1625...


The Army May Have Found Its Next Rifle In A Colorado Garage Terra Forming Terra

army rifle colorado ribbon gun

This appears to be promising.  we have had about three generations of work with light rapid fire automatic weapons which lay on the fire power but always give up accuracy.  This often means a loss of reliability as well.  The AK 47 stills works well enough in that environment even if it is  seventy years old.

Something like this may well solve the reliability problem while throwing real weight down range. 

My personal standard is still the military Lee - Enfield 303 which has only now been replaced by the Arctic Rangers. The delay was for reasons that i can completely appreciate. The new weapon had to be able to stop a charging polar bear.  It is what I want if I  were so unfortunate as to face a charging grizzly.  Trained hands can lay down an aimed  shot every second.  A bear is traveling at thirty miles per hour and you are at less than one hundred yards.  That means you have about three shots at best and you will not need to breathe.

Laying down four rounds from this device may have the same weight and rapid fire ability.  Reports have suggested that anything less is likely fatal even if you pepper the bear with a large mag of smaller ammunition.


The Army May Have Found Its Next Rifle In A Colorado Garage 

By Tom Roeder, The Gazette (Colorado Springs, Colo.) on October 1, 2018
The Army adopted its battle rifle in 1963 and has spent 55 years looking for a replacement for the M-16 and its variants.

They might have found it in Martin Gr...


Churchill, Hitler and "The Unnecessary War" with Pat Buchanan Terra Forming Terra

I had largely come to this opinion years ago but reading this book rather clearly makes the whole argument.  The only thing missing in this mix was the continuing pressure from Russia at the same time that set up the French opportunity  to play revenge.

Churchill's grasp of strategy was always lacking and famously so.  That he strengthened Grey before the WWI led directly to the central decision of jumping into France without an escape strategy was a complete folly that ultimately allowed the American's to dismantle the British Empire which was also folly of the American kind...

I was brought up in a school system still loyal to the British Empire. My teachers had lived and participated in WWII.  I have always thought that the decision to help France was the death of the Empire and unforgivable.  When it went quickly wrong, they never got out.  They could have at any point.  How stupid is proven over and over again.

It is a bracing reminder of just how wrong headed a political leader can be and how baleful his influence.
Churchill, Hitler and "The Unnecessary War": How Britain Lost Its Empire and the West Lost the World


Patrick J. Buchanan



Due Process and the Trump Presidency Terra Forming Terra

I am writing this item to address our natural impatience.  All of us have seen politicians and their enablers go out and essentially flaunt the law.  Others such as my self have investigated the genesis of many important decisions in many areas including medical in particular and easily locate a troubling stream of behavior that is best described as corrupt.  That is the direct evidence.  At the same time we all mostly understand human behavior and understand that the easy road is to initiate a corrupt practice.

My key point though is that it is easy to be a witness to a criminal act.  The correction of that criminal action is hard and demands due process.  This takes a lot of time.  Weeks and months elapse.

We had a riot in Vancouver caught on ample camera points.  At the same time riots took place in England, folks were arrested and no charges were ever possible and they were all released almost immediately.  In Vancouver they applied due process.  In a few weeks arrests took place and convictions secured.  Do you think that this encourages similar behavior next opportunity?  Of course not.  Everyone knows that they will pay.

Two years ago Trump elected to apply the full power of due process with no deals and unleashed the full investigative powers of the State to fully correct the festering corruption of the whole governmental apparatus.  That is why thousands of pedophile cases have finally gone forward double step.  That is why there is now 55,766  sealed indictments outstanding while he cleans up the whole judiciary as well.

Feeding this monumental housecleaning is the astounding reality that since 9/11, we have collected all electronic communication, particularly in government.  Thus the same guys who found Saddam Hussein can identify networks and review cash transfers to establish probable cause.  A computer does all the hard work.  A coup...


Eneasz Brodski, author of Red Legacy, joins our Futurists Board. Lifeboat News

Eneasz Brodski, author of "Red Legacy", joins our Futurists Board.


4 Useful Tools to Run Commands on Multiple Linux Servers

4 Useful Tools to Run Commands on Multiple Linux Servers


9 in 10 organizations have a cybersecurity culture gap Help Net Security

With cybersecurity threats continuing to escalate worldwide, the ISACA/CMMI Institute Cybersecurity Culture Report found that just 5 percent of employees think their organizations cybersecurity culture is as advanced as it needs to be to protect their business from internal and external threats. Cybersecurity culture is a workplace culture in which security awareness and behaviors are integrated into everyones daily operations, as well as an executive leadership priority. In a threat-ripe environment, an effective cybersecurity culture More

The post 9 in 10 organizations have a cybersecurity culture gap appeared first on Help Net Security.


Have We Already Detected a Dark Matter Particle? Lifeboat News: The Blog

Dark matter supposedly makes up 85% of the matter in the universe, but so far, efforts to catch hypothesized dark matter particles have all ended in failure. Weakly interacting massive particles (WIMPs) are no-shows at grand experiments housed in Italy, Canada, and the United States. Even tinier axions have not been detected either. Neutralinos, born out of supersymmetry, may look nice on paper but so far have no bearing on reality.


Stephen Hawkings words from beyond the grave bring Lifeboat News: The Blog

Speaking from beyond the grave, Professor Stephen Hawking has told a new generation growing up in an increasingly insular world: Remember to look up at the stars and not down at your feet.

The eminent cosmologist, who had motor neurone disease and died in March, had his final public thoughts broadcast at a special event to launch his last book, Brief Answers To The Big Questions.

Prof Hawkings words of advice and defiance, echoing from an Imax screen at Londons Science Museum, brought tears to the eyes of his daughter Lucy.


Worlds fastest camera can shoot light in slow motion Lifeboat News: The Blog

The slow motion modes on modern smartphones crank up the speed of video recording so that when its played back at regular speed, the motion you see on the screen is slowed down. Its a neat feature to mess around with, but slow motion capture has some very serious scientific applications as well. Capturing the microscopic world at high speeds can help researchers shed light on all kinds of interesting behaviors and phenomena that shape our reality.

Now, imaging specialists have built what is being called the fastest camera on the planet, allowing for the capture of movement at up to 10 trillion frames per second. Forget slowing down a video of a home run at your kids softball game, this incredible contraption can slow down light itself.

A new paper published in Light: Science & Applications explains how the camera works, and boy is it complicated. To put it in its most basic terms, the camera uses laser pulses so ultra-fast that they are measured in quadrillionths of a second and combines those frames with images captured from a second camera moving at the same speed, allowing for high-quality images generated 10 trillion times every second.


How Inclusive Capitalism, Technology And Social Prescribing Could Reverse Flagging Life Expectancy Lifeboat News: The Blog

Hard as it is to believe, for the first time the life expectancy for Americans (not counting  the effect of wars) has target=_blank rel= nofollow noopener noreferrer data-ga-track= ExternalLink:>dropped for two consecutive years. Perhaps less hard to believe is that this is target=_blank rel= nofollow noopener noreferrer data-ga-track= ExternalLink:>not true across economic levels. The richest Americans are gaining in longevity, indeed to unprecedented levels. The poor dont have it so well, and in the U.S., this includes the shrinking middle class, who are also dying earlier. With the widening income gap, theres a growing discrepancy between life expectancies for the rich and poor. Depending on geography, those on the lower end of the income bracket spread can expect to live 20 years less than their better-off counterparts, a shocking finding from an target=_blank rel= nofollow noopener noreferrer data-ga-track= ExternalLink:>in-depth study coming out of the University of Washington.



You are who you say you are: Establishing digital trust with the blockchain Help Net Security

Over the last few years, blockchain use has gained popularity driven partly by the interest in cryptocurrency, but mostly with the growing understanding of what distributed ledger technology can enable through decentralization of trust. Most large companies have innovation teams looking at ways that blockchain technology can be applied, and many analyst firms, system integrators and other influencers have focused teams providing advice on applications of blockchain technology. I have spoken to experts at leading More

The post You are who you say you are: Establishing digital trust with the blockchain appeared first on Help Net Security.


Paul Allen Dead at 65 SoylentNews

Paul Allen has died at age 65:

Paul Allen, who co-founded Microsoft with his childhood friend Bill Gates, has died. He was 65.

Allen's company Vulcan said in a statement that he died Monday. Earlier this month Allen said the cancer he was treated for in 2009, non-Hodgkin lymphoma, had returned.

Allen, who was an avid sports fan, owned the Portland Trail Blazers and the Seattle Seahawks.

Of course the article has more information. There was more to Paul Allen that just mentioned above. Bound to hit multiple sources with different takes so be on the lookout for something from a source you like.

takyon: Allen Institute bio and Vulcan Inc. statement.

Related: Billionaire Boater Destroys almost 14,000 square feet of Reef in Cayman Islands
Scientists Force Genetically Engineered Mouse to Watch Classic Film Noir
Stratolaunch: The World's Largest Plane Rolls Out
Paul Allen Finds Lost World War II Cruiser USS Indianapolis
Allen Brain Atlas Releases Data on Live Human Brain Cells
World's Largest Plane is Designed to Lift Rockets Into the Stratosphere

Original Submission

Read more of this story at SoylentNews.


History of dark matter Lifeboat News: The Blog

The standard model of modern cosmology is unthinkable without dark matter, although direct detections are still missing. A broad perspective of how dark matter was postulated and became accepted is presented, from prehistory, over observations of galaxy clusters, galaxy rotation curves, the search for baryonic dark matter, possible alternative explanations via modified gravity, up to the hunt for dark matter particles. The interplay is described between observational discoveries and theoretical arguments which led finally to the adoption of this paradigm.

Sylvain Neuvel, author of Sleeping Giants, joins our Futurists Board. Lifeboat News

Sylvain Neuvel, author of "Sleeping Giants", joins our Futurists Board. This novel has been optioned by Sony Pictures for development into a film and was sold for translation into twenty languages.


Exploring the current state of employee knowledge in cybersecurity and data privacy Help Net Security

Seventy-five percent of professionals pose a moderate or severe risk to the corporate data of the companies they work for. According to MediaPROs third-annual State of Privacy and Security Awareness Report, workers in the financial sector are more likely to be a risk with 85 percent of survey respondents falling into one of the two risk categories. MediaPRO surveyed more than 1,000 employees across the U.S. to quantify the state of privacy and security awareness More

The post Exploring the current state of employee knowledge in cybersecurity and data privacy appeared first on Help Net Security.


This is how Earth feeds volcanic supereruptions Lifeboat News: The Blog

Scientists studying the Taupo Volcanic Zone in New Zealand have uncovered clues to what causes giant eruptions.


What Is A Quantum Computer? The 30,000 Foot Overview Lifeboat News: The Blog

If you replace classical bits with qubits, though, you go back to only needing one per spin in the system, because all the quantum stuff comes along for free. You don&s;t need extra bits to track the superposition, because the qubits themselves can be in superposition states. And you don&s;t need extra bits to track the entanglement, because the qubits themselves can be entangled with other qubits. A not-too-big quantum computer again, 50100 qubits can efficiently solve problems that are simply impossible for a classical computer.

These sorts of problems pop up in useful contexts, such as the study of magnetic materials, whose magnetic nature comes from adding together the quantum spins of lots of particles, or some types of superconductors. As a general matter, any time you&s;re trying to find the state of a large quantum system, the computational overhead needed to do it will be much less if you can map it onto a system of qubits than if you&s;re stuck using a classical computer.

So, there&s;s your view-from-30,000-feet look at what quantum computing is, and what it&s;s good for. A quantum computer is a device that exploits wave nature, superposition, and entanglement to do calculations involving collective mathematical properties or the simulation of quantum systems more efficiently than you can do with any classical computer. That&s;s why these are interesting systems to study, and why heavy hitters like Google, Microsoft, and IBM are starting to invest heavily in the field.


Scientists achieve first ever acceleration of electrons in plasma waves Lifeboat News: The Blog

The Large Hadron Collider (LHC) at the European Organization for Nuclear Research (CERN) near Geneva, Switzerland is said to be the largest particle accelerator in the world. The accelerator occupies a tunnel 27 kilometers in circumference as deep as 175 meters beneath the French-Swiss border. The facility has helped scientists uncover the Higgs boson, the last particle predicted by the Standard Model, in 2012.


Two HUGE earthquakes STRIKE New Caledonia tremors RICOCHET across Ring of Fire Lifeboat News: The Blog

TWO MASSIVE earthquakes have struck the French island of New Caledonia sending aftershocks ricocheting through the volatile Ring of Fire region.


Cryptomining attacks against Apple devices increase sharply Help Net Security

Check Point has published its latest Global Threat Index for September 2018, revealing a near-400% increase in cryptomining malware attacks against Apple iPhones. These attacks are using the Coinhive mining malware, which continues to occupy the top position in the Index that it has held since December 2017. Coinhive now impacts 19% of organizations worldwide. Check Points researchers also observed a significant increase in Coinhive attacks against PCs and devices using the Safari browser, which More

The post Cryptomining attacks against Apple devices increase sharply appeared first on Help Net Security.


Legacy government networks stifle cloud migration Help Net Security

67 percent of government agencies legacy network infrastructures are simply not prepared to handle the cloud migration lift or keep pace with the changing demands of cloud and hybrid networks, according to MeriTalk. One of the biggest areas holding agencies back is the chaos and lack of prioritization to properly update networks necessary for cloud adoption and IT modernization efforts, 51 percent of managers reported. Respondents also noted that to reach their cloud goals, agencies More

The post Legacy government networks stifle cloud migration appeared first on Help Net Security.


Photo-catalytic Killing of HeLa Cancer Cells Using Facile Synthesized Pure and Ag Loaded WO3 Nanoparticles Lifeboat News: The Blog

The cancer is a group of diseases characterized by the uncontrolled growth and spread of abnormal cells, and in most of the cases develop into malignant masses of tissues called tumors, and it is the leading causes of mortality and a major public health challenge worldwide. In normal body, genes in the cell nucleus, containing long strings of DNA (deoxyribonucleic acid) regulate the controlled division and function of cells and any damage to DNA causes the mutation of genes, which in turn triggers the uncontrolled division of abnormal cells, leading to the damage of vital organs. Cancer cells can detach from the original mass of tumor and migrate to new locations through blood and lymphatic system and also cancer cells produce enzymes that are capable of breaking the normal cells. For cancer diagnostics, the conventional histopathological and radiological examinations are still used for evaluating the clinical and pathologic staging, needed for cancer treatments. Depends on the stage of cancer development, different treatment options like chemotherapy, radiation therapy, stem cell transplant, immunotherapy, hormone therapy, targeted drug therapy and surgery are advised. The major disadvantages of the available advanced treatment options include non localized invasion to other body parts, intolerable cytotoxicity, unsystematic distribution of antitumor agents, immune to chemical agents, low bioavailability and limited option to evaluate the tumor cell response to therapies4,5. In spite of the drawbacks of these advanced treatment options, cancer is curable if it is diagnosed at an early stage.

Phototherapy has been used for the treatment of jaundice, cancer, dermatological conditions, and ophthalmological disorders by simply using the light of certain selected wavelength. Photodynamic therapy, on the other han...


Circuit Bending A TV For Better Input Hackaday

If you havent noticed, CRTs are getting hard to find. You cant get them in Goodwill, because thrift stores dont take giant tube TVs anymore. You cant find them on the curb set out for the trash man, because they wont pick them up. Its hard to find them on eBay, because no one wants to ship them. Thats a shame, because the best way to enjoy old retrocomputers and game systems is with a CRT with RGB input. If you dont already have one, the best you can hope for is an old CRT with a composite input.

But theres a way. [The 8-Bit Guy] just opened up late 90s CRT TV and modded it to accept RGB input. Thats a monitor for your Apple, your Commodore, and a much better display for your Sega Genesis.

There are a few things to know before cracking open an old CRT and messing with the circuits. Every (color) CRT has three electron guns, one each for red, green, and blue. These require high voltage, and in CRTs with RGB inputs youre looking at a circuit path that takes those inputs, amplifies them, and sends them to the gun. If the TV only has a composite input, theres a bit of circuitry that takes that composite signal apart and sends it to the guns. In [8-bit guy]s TV and just about every CRT TV you would find from the mid to late 90s theres a Jungle IC that handles this conversion, and most of the time theres RGB inputs meant for the on-screen display. By simply tapping into those inputs, you can add RGB inputs with fancy-schmancy RCA jacks on the back.

While the actual process of adding RGB inputs to a late 90s CRT will be slightly different for each individual make and model, the process is pretty much the same. Its really just a little bit of soldering and then sitting back and playing with old computers that are finally displaying the right colors on a proper screen.


Gwyneth Jones, author of Divine Endurance, in which she created the term gynoid, joins our Futurists Board. Lifeboat News

Gwyneth Jones, author of "Divine Endurance", in which she created the term gynoid, joins our Futurists Board.


Paul Allen: Microsoft co-founder and billionaire dies aged 65 - Linux - News

"Paul Allen, who co-founded Microsoft, has died aged 65 from complications of non-Hodgkin's lymphoma."


Spontaneous genetic mutations in the womb may drive the majority of dementia cases Lifeboat News: The Blog

New research, led by scientists at the University of Cambridge, suggests spontaneous DNA mutations that occur when a babys brain is growing in the womb may help explain why so many people develop dementia without having any prior family history with the disease.


Shocking stories about monitoring Yellowstone National Park Lifeboat News: The Blog

Yellowstone Caldera Chronicles is a weekly column written by scientists and collaborators of the Yellowstone Volcano Observatory. This weeks contribution is from Beth Bartel and Tim Dittman, from the non-profit UNAVCO consortium in Boulder, Colorado.

About 18 miles west of the Yellowstone National Park boundary in Idaho, UNAVCO field engineer Tom Lyman surveys the damage at GPS station P361 on Sawtell Peak. This is an important site, not only because it is located close to active faults in the Yellowstone region, but also because it serves as a data relay for four additional nearby GPS stations. None of the GPS equipment is transmitting data.

UNAVCO, a member of the Yellowstone Volcano Observatory consortium, is responsible for maintaining the deformation network in and around Yellowstone. In Yellowstone National Park alone this network includes 14 GPS stations and six borehole geophysics stations. All the data are free and open access.


Researchers Find Oldest Evidence of Animal Life on Earth Lifeboat News: The Blog

The oldest clue of animal life, dating back at least 100 million years before the Cambrian period, when most major types of animals appear, has been found by University of California, Riverside (UCR) researchers.

The researchers have been tracking molecular signs of animal life, called biomarkers, as far back as 660635 million years ago during the Neoproterozoic Era. They found a steroid compound produced only by sponges, which are among the earliest forms of animal life, in ancient rocks and oils from Oman, Siberia, and India.

The biomarker identified, a steroid compound named 26-methylstigmastane (26-mes), has a unique structure that is currently only known to be synthesized by certain species of modern sponges called demosponges.


New treatment prevents transplant rejection Lifeboat News: The Blog

A new treatment strategy could increase the success rate of stem cell transplants, according to University of Queensland researchers.

The approach removes the need for donor matching and the use of immunosuppressant drugs to prevent rejection, and could make stem cell treatment accessible to more patients.

UQ Diamantina Institute researcher Dr Jatin Patel said researchers found immunosuppressant drugs had a negative impact on the transplanted stem cells.


NASA's Chandra X-Ray Observatory Fixed SoylentNews

After briefly going offline, NASA's Chandra X-ray space telescope is back in action

After briefly going into safe mode last week, NASA's Chandra X-ray Observatory which observes galaxies and nebulas from Earth's orbit should be getting back to normal operations soon. The cause of the disruption was a small glitch in one of the spacecraft's instruments used for steering and pointing. But the space agency has since fixed the problem, and the telescope will be back to observing the Universe by the end of the week.

[...] The glitch resulted in the gyro measuring three seconds of "bad data," which led Chandra's onboard computer to come up with the wrong value for the vehicle's momentum, according to NASA. This apparently prompted the safe mode. Now, NASA has decided to use one of Chandra's other gyros in its place and put the glitchy one on reserve.

Also at

Previously: NASA's Chandra X-Ray Observatory Enters Safe Mode; Investigation Underway

Related: Puzzling X-Ray Emissions From Pluto
A New Stellar X-Ray 'Reality' Show Debuts
Galaxy Collision Creates Ring of Black Holes and Neutron Stars

Original Submission

Read more of this story at SoylentNews.


GCC Is Preparing To End Support For Solaris 10 Phoronix

Solaris 10, what may will argue as the last "good" Solaris operating system release before Sun Microsystems fell under control of Oracle, may soon see its support deprecated by the GCC compiler stack...


Archeologists find a 66-foot Viking ship buried in Norway Lifeboat News: The Blog

Whether theyll ever be able to unearth it from a vast complex of at least seven dome-shaped burial mounds remains to be seen.


RiskRecon invents asset risk valuation algorithms Help Net Security

RiskRecon released its asset valuation algorithms that determine the inherent risk value of any Internet-facing system. Automatically determining asset value is critical to managing cyber risk because it enables organizations to create action plans focused on addressing risk. Risk professionals spend too much time analyzing mountains of issues to determine the risk relevance, explained Kelly White, Co-Founder and CEO of RiskRecon. RiskRecon automatically contextualizes every issue with issue severity and asset value that enables professionals More

The post RiskRecon invents asset risk valuation algorithms appeared first on Help Net Security.


The Social Media Purge Continues Carey Wedler Lifeboat News: The Blog

This is an issue that we cannot simply stand back and do nothing. This Social Media Purge is beneath Western Civilization and we have the power to stop it.

The WaPo hit piece in question:

Note: Im now unable to find the list Prop or Not compiled, but suffice to say Anti-Media was on it, and so were multiple others purged today. To be safe, Ill modify my statement in video from a lot of the outlets to at least some.


New Version of Winamp Planned for 2019 SoylentNews

Winamp 6, due out in 2019, aims to whip more llama ass

[...] The Belgian company that bought Winamp from AOL in January 2014 hasn't really done much with it since buying the remnants of the property just months after AOL finally pulled the plug.


Related: "Whipping the Llama's Ass" with this Javascript WinAmp Emulator

Original Submission

Read more of this story at SoylentNews.


Bezos says commercial space travel is his most important work The Hill: Technology Policy

Amazon CEO Jeff Bezos said Monday that his aerospace company, Blue Origin, is his "most important" project.Bezos made the comments at the Wired 25th anniversary summit in San Francisco, according to CNBC.He added that he expects there to one...


To The Stars Academy $37 Million Deficit

Take Off Your Pants and Jacket and bend over: If were fucked up, youre to blame Via: Ars Technica: The accompanying financial statements have been prepared on a going concern basis, which contemplates the realization of assets and the satisfaction of liabilities in the normal course of business. The Company has incurred losses from operations []


Telit introduces new smaller IoT form factor module family Help Net Security

Telit released the xE310 family of miniature IoT modules. With initial models planned in LTE-M, NB-IoT and European 2G, the new form factor will enable Telit to meet growing demand for modules for wearable medical devices, fitness trackers, industrial sensors, smart metering, and other applications. Telit will start shipping xE310 modules in Q4 this year. The xE310 family is one of the smallest LGA form factors available in the market with a flexible perimeter footprint More

The post Telit introduces new smaller IoT form factor module family appeared first on Help Net Security.


Hams see Dark Side Of The Moon Without Pink Floyd Hackaday

Ham radio operators bouncing signals off the moon have become old hat. But a ham radio transmitter on the Chinese Longjiang-2 satellite is orbiting the moon and has sent back pictures of the Earth and the dark side of the moon. The transceivers main purpose is to allow hams to downlink telemetry and relay messages via lunar orbit.

While the photo was received by the Dwingeloo radio telescope, reports are that other hams also picked up the signal. The entire affair has drawn in hams around the world. Some of the communications use a modulation scheme devised by [Joe Taylor, K1JT] who also happens to be a recipient of a Nobel prize for his work with pulsars. The Dwingeloo telescope has several ham radio operators including [PA3FXB] and [PE1CHQ].

You can find technical particulars about the satellite on its web page. There are also GNU Radio receivers and information about tracking. If you want to listen in, youll need some gear, but it looks very doable. The same page details several successful ham radio stations including those from [PY2SDR], [CD3NDC], [PY4ZBZ], [N6RFM], and many others. While the Dwingeloo telescope is a 25-meter dish, most of the stations have more conventional looking Yagi or helical antennas.

If your Mandarin is up to it, there is live telemetry on that page, too. You might have more luck with the pictures.

For working conventional satellites, you often need an agile antenna. We suspect the lunar orbiting satellite appears to move less, but youll have other problems with more noise and weak signals. Although hams have been bouncing signals off the moon for decades, theyve only recently started bouncing them off airplanes.


Smart Home Surveillance: Governments Tell Googles Nest To Hand Over Data 300 Times

Shocker. Via: Forbes: Anyone pumped for this weeks launch of Googles Home Hub might want to temper their excitement. A smart home is a surveilled home. Thats been the concern of privacy activists since citizens started lighting up their abodes with so-called smart tech in recent years. Take Googles current smart home division, Nest Labs. []


Are Black Holes Actually Dark Energy Stars? Lifeboat News: The Blog

George Chapline believes that the Event Horizon Telescope will offer evidence that black holes are really dark energy stars. NASAWhat


Therap announces enhanced secure communication tool Help Net Security

Therap announces an improved and user-friendly interface for its HIPAA-compliant secure messaging module. User experience is enhanced through a simple and intuitive design. The new design maintains the functionality of the module while streamlining the communication process, reducing the steps needed to complete the task. The secure communications (SComm) module facilitates the exchange of information among users in an agency or across different agencies, in a secure, HIPAA compliant way. SComm messages help improve communication More

The post Therap announces enhanced secure communication tool appeared first on Help Net Security.


Nucleus Cyber acquires Security Sheriff Help Net Security

Nucleus Cyber acquired the Security Sheriff platform from Cyxtera Technologies and launched into the Microsoft SharePoint, Office 365 and file share space to advance the data security in on-premises, cloud and hybrid environments. Kurt A. Mueffelmann, former CEO of HiSoftware, the company that developed Security Sheriff, returns as CEO for Nucleus Cyber. New investment, leadership and domain expertise are expected to drive technology innovation that has already enabled dozens of Fortune 1000 customers to safeguard More

The post Nucleus Cyber acquires Security Sheriff appeared first on Help Net Security.


HP Footnote Leads Intel to Confirm Support for 128 GB of DRAM for 9th-Generation Processors SoylentNews

Following HP's announcement of new ZBook mobile workstations, Intel has confirmed that the memory controller in 9th generation Intel Core processors will support up to 128 GB of DRAM. AMD's memory controller should also support 128 GB of DRAM:

Normally mainstream processors only support 64GB, by virtue of two memory channels, two DIMMs per memory channel (2DPC), and the maximum size of a standard consumer UDIMM being 16GB of DDR4, meaning 4x16GB = 64GB. However the launch of two different technologies, both double height double capacity 32GB DDR4 modules from Zadak and G.Skill, as well as new 16Gb DDR4 chips coming from Samsung, means that technically in a consumer system with four memory slots, up to 128GB might be possible.

With AMD, the company has previously stated that its memory controller can support future memory that comes to market (with qualification), however Intel has been steadfast in limiting its memory support on its chips specifically within the specification. HP is now pre-empting the change it its latest launch with the following footnote:

1. 128GB memory planned to be available in December 2018

This has forced Intel into a statement, which reads as the following:

The new 9th Gen Intel Core processors memory controller is capable of supporting DDR4 16Gb die density DIMMs which will allow the processors to support a total system memory capacity of up to 128GB when populating both motherboard memory channels with 2 DIMMs per Channel (2DPC) using these DIMMs. As DDR4 16Gb die density DIMMs have only recently become available, we are now validating them, targeting an update in a few months' time.

Here's an example of double height, double capacity 32 GB memory modules from G.Skill, which uses 8 Gb DRAM chips.

These are the Samsung 32 GB SO-DIMM DDR4 modules for laptops mentioned in the article. They are of a normal size but use Samsung's latest 16 Gb chips instead of 8 Gb.

Original Submission

Read more of this story at SoylentNews.


Mesa Vulkan Drivers Move Ahead With PCI Bus Info, Calibrated Timestamps Phoronix

With this weekend's release of Vulkan 1.1.88 stealing the show was the Vulkan transform feedback capability to allow projects like DXVK to support Direct3D's Stream Output functionality. But besides VK_EXT_transform_feedback, there are other extensions also being worked on for Mesa ANV / RADV Vulkan driver coverage...


HPR2662: Repairing a motherboard Hacker Public Radio

Continued from hpr2549 :: DVD ripping using old hardware Acquired new user tower, replaced old tower with blown caps Dell Pentium 4 CPU 3.20GHz, 2Gb RAM sudo shred -n 5 -vz /dev/sdX -n, --iterations=N -v, --verbose show progress -z, --zero add a final overwrite with zeros to hide shredding Used same Slackware USB from old tower Used soldering iron from Amazon - Weller WLC100 40-Watt Soldering Station;psc=1


Hillicon Valley: Microsoft co-founder Paul Allen dies at 65 | Pentagon gets cyber wake-up call | Google pulls out of Saudi conference | Facebook takes steps against voter misinformation The Hill: Technology Policy

Welcome to Hillicon Valley, The Hill's newsletter detailing all you need to know about the tech and cyber news from Capitol Hill to Silicon Valley.Welcome! Follow the cyber team, Olivia Beavers (@olivia_beavers) and Jacqueline Thomsen (@jacq_thomsen...


[$] Fighting Spectre with cache flushes

One of the more difficult aspects of the Spectre hardware vulnerability is finding all of the locations in the code that might be exploitable. There are many locations that look vulnerable that aren't, and others that are exploitable without being obvious. It has long been clear that finding all of the exploitable spots is a long-term task, and keeping new ones from being introduced will not be easy. But there may be a simple technique that can block a large subset of the possible exploits with a minimal cost.


Damage Control: Boeing-Sponsored Newsletter Praises Space Launch System (SLS), Trashes Saturn V SoylentNews

Elon Musk pegs SpaceX BFR program at $5B as NASA's rocket booster nears $5B in cost overruns

[Compared] to Boeing's first serious 2014 contract for the SLS Core Stages $4.2B to complete Core Stages 1 and 2 and launch EM-1 in Nov. 2017 the company will ultimately end up 215% over-budget ($4.2B to $8.9B) and ~40 months behind schedule (42 months to 80+ months from contract award to completion). Meanwhile, as OIG notes, NASA has continued to give Boeing impossibly effusive and glowing performance reviews to the tune of $323 million in "award fees", with grades that would under the contracting book NASA itself wrote imply that Boeing SLS Core Stage work has been reliably under budget and ahead of schedule (it's not).

[...] Boeing recently brought to light as the likely source of a spate of egregiously counterfactual op-eds published with the intention of dirtying SpaceX's image also took it upon itself to sponsor what could be described as responses to NASA OIG's scathing October 10th SLS audit. Hilariously, a Politico newsletter sponsored by Boeing managed to explicitly demean and belittle the Apollo-era Saturn V rocket as a "rickety metal bucket built with 1960s technology", of which Boeing was very tenuously involved thanks to its eventual acquisition of companies that actually built Saturn and sent humans to the Moon.

At the same time, that newsletter described SLS as a rocket that will be "light years ahead of thespacecraft [sic] that NASA astronauts used to get to the moon 50 years ago." At present, the only clear way SLS is or will be "light years" ahead as much a measure of time as it is of distance of Saturn V is by continuing the rocket's trend of endless delays. Perhaps NASA astronomers will soon be able to judge exactly how many "light years ahead" SLS is by measuring the program's redshift or blueshift with one of several ground- and space-based telescopes.

Here's a typical Boeing shill response (archive) to the NASA Inspector General report.

See also: Will the US waste $100+ billion on SLS, Orion and LOP-G by 2030?

Previously: Maiden Flight of the Space Launch System Delayed to 2019 (now delayed to June 2020, likely 2021)
First SLS Mission Will be Unmanned


Hybrid Robot Walks, Transforms, And Takes Flight Hackaday

[Project Malaikat] is a 3D printed hybrid bipedal walker and quadcopter robot, but theres much more to it than just sticking some props and a flight controller to a biped and calling it a day. Not only is it a custom design capable of a careful but deliberate two-legged gait, but the props are tucked away and deployed on command via some impressive-looking linkages that allow it to transform from walking mode to flying mode.

Creator [tang woonthai] has the 3D models available for download (.rar file) and the video descriptions on YouTube contain a bill of materials, but beyond that there doesnt seem to be much other information available about [Malaikat]. The creator does urge care to be taken should anyone use the design, because while the robot may be small, it does essentially have spinning blades for hands.

Embedded below are videos that show off the robots moves, as well as a short flight test demonstrating that while control was somewhat lacking during the test, the robot is definitely more than capable of actual flight.

This video has the best resolution and demonstrates walking.

Heres a video showing more walking, and the flight hardware (deploying rotors starts at 1:40 in the video below).

Finally, a brief flight test showing that the robot is more than capable of liftoff:

The low-level flight work is being done by a CC3D ATOM flight controller, which takes care of managing thrust to maintain stability. Multirotor flight controllers are incredible pieces of technology in their own right, demonstrated well by making an...


To be or not to be an enhanced human Lifeboat News: The Blog

Should there be any ethical or legal boundaries to technologies that enhance humans? I pondered this last week as I read an online article about the recent trials of upper-body exoskeletons by production line staff at Volkswagen and at Chrysler-Fiat. These lightweight wearable frames greatly reduce the physical strain of repetitive overhead assembly work, and will be an important industrial enhancement as workforces age.

We tend to think of medical advancement in terms of better cures for diseases and recovery from injury. Enhancement however goes beyond therapy, and extends us in ways that some may argue are unnatural. Some human enhancements are of course also pre-emptive therapeutic interventions. Vaccination is both an enhancement of our immune system, and a therapeutic intervention. However, in cases where there is little preventative justification, what degree of enhancement is acceptable?

We drink coffee expecting our work performance to improve. We accept non-elective operations, breast implants, orthodontic improvements and other interventions which improve our perception of ourselves. We generally accept such enhancements with little question. However devices and drugs that improve athletic performance can lead us to question their legitimacy.


AI can analyze changes in Earths magnetic field to predict quakes unprecedentedly early Lifeboat News: The Blog

Researchers have revealed a radical new use of AI to predict earthquakes.

A team from Tokyo Metropolitan University have used machine-learning techniques to analyze tiny changes in geomagnetic fields.

These allow the system, to predict natural disaster far earlier than current methods.


Purism Shares The Latest Librem 5 Smartphone Progress - Dev Kits Going Out Soon Phoronix

Purism has shared the latest details on their efforts to deliver the open-source Linux Librem 5 smartphone to market in 2019...


Microsoft co-founder Paul Allen dies at 65 The Hill: Technology Policy

Paul Allen, a co-founder of Microsoft, died on Monday at age 65.Allen died of complications from non-Hodgkins lymphoma, according to a statement from his family.My brother was a remarkable individual on every level. While most knew Paul Allen as a...


Facebook bans midterm voting disinformation The Hill: Technology Policy

Facebook announced on Wednesday that it is taking new steps to prevent voter suppression by banning fake voting requirement information and hoax reports of violence at polling stations ahead of next month's midterm elections.The move comes as a...


Linux's Qualcomm Ath10k Driver Getting WoWLAN, WCN3990 Support Phoronix

The Qualcomm/Atheros "Ath10k" Linux driver coming up in the Linux 4.20~5.0 kernel merge window is picking up two prominent features...


Invisible Manipulation: 10 Ways our Data is Being Used Against Us SoylentNews

Invisible Manipulation: 10 Ways our Data is Being Used Against Us:

The era where we were in control of the data on our own computers has been replaced with devices containing sensors we cannot control, storing data we cannot access, in operating systems we cannot monitor, in environments where our rights are rendered meaningless. Soon the default will shift from us interacting directly with our devices to interacting with devices we have no control over and no knowledge that we are generating data. Below we outline 10 ways in which this exploitation and manipulation is already happening.

As just one example from the short article:

8. Invisible Discrimination and Poverty

Online, and increasingly offline, companies gather data about us that determine what advertisements we see; this, in turn, affects the opportunities in our lives. The ads we see online, whether we are invited for a job interview, or whether we qualify for benefits is decided by opaque systems that rely on highly granular data. More often than not, such exploitation of data facilitates and exacerbates already existing inequalities in societieswithout us knowing that it occurs. As a result, data exploitation disproportionately affects the poorest and most vulnerable in society.

That reminds me of the old saying: "The rich get richer and the poor get poorer." Percy Bysshe Shelley.

Here's another old saying:

"If one would give me six lines written by the hand of the most honest man, I would find something in them to have him hanged." Cardinal Richelieu.

How much data would suffice to accomplish this, today?

Original Submission

Read more of this story at SoylentNews.


How do we practice alternative medicine? Terra Forming Terra

This is a good question that i have spent some time on as uniting methodologies needs to be fully addressed.  The current economic model actually mitigates against real progress.
At the same time massive effort is now been spent in the fitness industry applying techniques that are both effective but also damaging and do nned to be also addressed.
 Most folks supplying services are usually skilled technicians and are blinkered by their own medical narrative.  That happens to include doctors generally.
I do think that a working gym needs to be integrated with medical technicians to optimize medical care.  It needs to include a range of machines but particularly including passive systems that induce muscle engagement as a whole body system that generates whole body muscle tone.  From such a base it is possible to address issues as needed..
How do we practice alternative medicine?

Published on October 2, 2018

How do we practice alternative medicine? What is alternative medicine exactly and isnt the real questionwhat is the best way to practice medicine? There must be a right way and a wrong way to practice medicine. The concept of malpractice sustains this belief. Medical malpractice kills 500 times more Americans than accidental gun deaths do. An eight-year study from Johns Hopkins found that there are at least 250,000 deaths due to malpractice in America each year. Other studies have found such deaths surpass 400,000 per year. We also know that over 100,000 Americans die each year from properly prescribed medicines.

As presently defined alternative medicine is the practice of anything other than mainstream medicine, which really means pharmaceutical medicine and other foul things like nuclear medicine and vaccine medicine. I created Natural Allopathic Medicine not to be...


Study: Nearly all unique comments to FCC opposed net neutrality repeal The Hill: Technology Policy

Nearly 100 percent of unique comments made on net neutrality to the Federal Communications Commission (FCC) last year were in opposition to the agency's eventual move to repeal the regulations, according to a new study by a Stanford University...


3D Print Real Tools, Not Toys IEEE Spectrum Recent Content full text

Register to receive two free Markforged sample partsone printed with standard thermoplastic, and one reinforced with continuous carbon fiber.

3D Print Real Tools, Not Toys

Register to receive two free Markforged sample partsone printed with standard thermoplastic, and one reinforced with continuous carbon fiber.

Can your 3D printer deliver parts tough enough for the factory floor? With  Markforged, 3D printed composite parts are up to 23x stronger than ABS, giving you the reliability you need to keep production lines running smoothly.

Ideal for applications in manufacturing tooling, custom, end-use production and functional prototyping, only Markforged composite 3D printers can embed continuous reinforcing fibers carbon, fiberglass, or Kevlar to print lightweight, non-marring parts with the strength of 6061 aluminum.

Request your sample part today, and test the strength yourself.


David Walton, author of the award-winning novel Terminal Mind, joins our Futurists Board. Lifeboat News

David Walton, author of the award-winning novel "Terminal Mind", joins our Futurists Board.


Google pulls out of Saudi investor conference The Hill: Technology Policy

Google became the latest company to pull out of a Saudi business conference being held in Riyadh later this month.A Google spokesperson confirmed Monday that Diane Greene, CEO of the companys cloud computing division, would no longer be attending...


DSLWP-B Moonbounce cross-correlation analysis Daniel Estvez

In one of my latest posts I commented on the Moonbounce signal of the Chinese lunar satellite DSLWP-B, as received in Dwingeloo. In the observation made in 2018-10-07 Cees Bassa discovered a signal in the waterfall of the Dwingeloo recordings that seemed to be a reflection off the Moon of DSLWP-Bs 70cm signal. My analysis showed that the Doppler of this signal was compatible with a specular reflection on the lunar surface.

In this post I study the cross-correlation of the Moonbounce signal against the direct signal. This gives some information about how the radio signals behave when reflecting off the Moon. Essentially, we compute the Doppler spread and time delay of the Moonbounce channel.

In the previous post weve seen that the reflected signal was weak, barely visible over the noise floor. Still, we can compute the cross-correlation between the reflected and direct signals. The calculations have been done in this Jupyter notebook.

The cross-correlation algorithm I have used can be summarised by the following formula:\[(x \star y)_k(\tau, \omega) = \sum_{j = 0}^{M-1} |\mathcal{F}_N^{-1}[z_{k+js,\omega}](\tau)|^2,\]where\[z_{k,\omega} = \mathcal{F}_N(x(n+k)w(n) e^{i\omega n} )\overline{\mathcal{F}_N(y(n+k) w(n))},\] and \(x,y\) are the direct and reflected signals respectively, \(\tau\) is the time delay, \(\omega\) is the frequency, \(k\) is the starting sample for the correlation calculation, \(\mathcal{F}_N\) denotes an \(N\)-point DFT, and \(w\) is a window function.

The parameter \(s\) determines the DFT overlap. An usual choice which we will use here is \(s = N/2\), which means that half of the points of one DFT overlap with the next one.

The parameters \(N\) and \(M\) give the so-called coherent integration length and non-coherent integration length. We say that the coherent integration length is \(N\) samples and the non-coherent integration length is \(M(s-1) + N\) samples (or that we do \(M\) non-coherent integrations). The choice of the coherent and non-coherent integration lengths is important because it determines the SNR of the correlation, the frequency resolution and the computational cost. It is also related to the frequency stability of the signal: unstable signals do not get an SNR gain when doing longer coherent integrations.

The recordings made at Dwingeloo use a sampling rate of 40ksps. After several trials I have decided to set a coherent length of \(N = 2^{16}\) samples, or 1.64 seconds. I have chosen \(M = 20\), which gives a non-coherent length of 17.2 seconds.



Text Bomb Causing PS4 to Crash HackRead

By Uzair Amir

Sonys most prestigious gaming console till date PlayStation 4 or PS4 contains a bug that exploits and crashes the console through a text message. It is believed that malicious threat actors are sending infected messages to the console to crash it. Reddit is bursting with reports from PS4 users who are complaining about receiving strings []

This is a post from Read the original post: Text Bomb Causing PS4 to Crash


Microsoft employees urge company not to pursue $10 billion Pentagon contract The Hill: Technology Policy

A group of Microsoft employees urged the company not to bid for a lucrative military contract, citing ethical concerns. An anonymous group of employees wrote a letter posted on Medium asking that Microsoft forgo bidding on the Joint Enterprise...


Generation Z, millennials most likely victims of tech support scams: Microsoft The Hill: Technology Policy

A new study shows that younger internet users might be the most susceptible group to online scams, bucking the conventional wisdom that older users are the most likely to fall prey to digital fraud. New research by Microsoft found...


GTA Cheat Developers Have Homes Searched and Assets Frozen TorrentFreak

Over the past year there has been a wave of copyright infringement lawsuits against alleged cheaters or cheat makers.

More than a handful have been filed in the US, but theres also been some action in Australia recently.

In one case, filed last month, GTA V developer Rockstar Games and its parent company Take-Two Interactive are going after several people believed to be linked to the popular Infamous cheat.

This lawsuit is notable because the Federal Court of Australia has signed off on several broad enforcement actions. Not only are the defendants restrained from any cheating related activity, they are also the subject of a search and assets freezing order.

The orders are issued against the person or persons known as Christopher Anderson, Cycus Lesser, Sfinktah, Koroush Anderson, and Koroush Jeddian. Per the courts order, all are prohibited from cheating and can be imprisoned if they refuse to comply.


The associated search order identifies two Melbourne premises. It allows a search party to enter the buildings and search, copy, or remove relevant evidence including any computer, electronic storage device, or documents related to Infamous. Any cars that are located at these locations can also be searched.

In addition to the search order, the Federal Court also issued a freezing order preventing the defendants from taking out more money than needed for regular expenses.

You must not remove from Australia or in any way dispose of, deal with or diminish the value of any of your assets in Australia (Australian assets) up to the unencumbered value of AU$286,609.80 (the Relevant Amount), the order states.

This freezing order also applies to any cryptocurrency and other digital currency, including the money stored in the PayPal account thats assigned to Christopher Anderson.

It is likely that Rockstar Games and Take-Two Interactive will try to obtain copyright infringement related damages, and with the freezing order they can make sure that the money isnt spent beforehand.

The orders in question were initially not disclosed, but that restriction has now been lifted. From the information we have available the searches were carried out late last month. In a follow-up order, the federal court ruled that the freezing and other orders should remain in place for now.

The defendant(s) have yet to file a defense, which is expected later this month. Whatever the outcome, these orders and actions reveal that GTA Vs developer and its parent company are taking cheating...


Ubisoft Promises to Release Hieroglyphics Initiative Tools as Open Source SoylentNews

Ubisoft pledge to make hieroglyph translation algorithm open access

During development [of Assassin's Creed Origins], [Ubisoft] partnered with Egyptologists, and in doing so they apparently discovered that translating hieroglyphs is very difficult and time consuming. In response, they started looking into ways to streamline the process using machine learning, and this week, they presented their initial progress.

[...] Ubisoft's first step was asking for volunteers to trace hieroglyphs on their website, and Assassin's Creed fans were well up for it "more than 80,000 glyphs were drawn in the tool" on the first night it was active.

[...] Now they've got the basics in place, they've pledged to bring the algorithm into open access by the end of the year, so that academics can both use it and help them to improve it. They're taking the drawing tool and reworking it as a teaching tool for students learning the hieroglyphic script, too.

Ubisoft, Google Cloud and Psycle demonstrate the power of machine learning, lay the ground for automated hieroglyphics translation

The support of Academic contributors around the world has helped shape the Hieroglyphics Initiative. However it is only starting and now requires the contribution of the scientific community to deliver its full promise, therefore the data and tools will open source before the end of the year.

[...] Ubisoft will keep supporting the Hieroglyphics Initiative on the longer term in collaboration with Google Cloud teams as both hope for it to have a long-lasting legacy, and be the basis for more innovations in the study of Middle Egyptian.

2017 video (2m45s).

Original Submission

Read more of this story at SoylentNews.


This Weeks Hype Not Even Wrong

The story of string theory as a theory of everything has settled into a rather bizarre steady-state, with these three recent links providing a look at where we are now:

  • At his podcast site, Sean Carroll has an interview with string theorist Clifford Johnson. Its accurately entitled Whats So Great About Superstring Theory, since its an hour of unrelenting propaganda about the glories of string theory, save for a short mention that there had been some criticism from (unnamed) sources a decade or so ago.

    The truly odd thing about the discussion though was the way it seemed frozen in time back in 1998 just after the advent of AdS/CFT duality, with almost no discussion of developments of the last twenty years. Nothing about the string theory landscape and the controversy over it, nothing about the negative SUSY results from the LHC. The attitude of Carroll and Johnson towards the failure of string theory unification seems to be to simply refuse to talk about it, and try to keep alive the glory days just after the publication of The Elegant Universe. Theyve taken to heart the post-fact environment we now live in, one where if you keep insisting something is true (string theory unification is a great idea) despite all evidence, then for all practical purposes it is true. Johnson has famously admitted that he refuses to read my book or Lee Smolins. As far as hes concerned our arguments do not exist, and Carroll goes along with this by not even mentioning them.

  • For the latest on the Swampland (for background, see here), theres String Theorists Heads Bobble Over Potential Dark Energy Wobble, where were told that string theorists are claiming huge excitement over the possibility that string theory might make a prediction about dark energy. Over the years there have been endless claims about predictions of string theory, none of which have ever turned out to actually exist, and this is just one more in that long line. The rather odd aspect of this latest prediction is indicated by how it is described in the last paragraph of the article:

    The real excitement comes from how soon we might know whether Vafas work has produced a testable prediction of string theorywhich would be a first. Experiments like the Dark Energy Survey or the upcoming WFIRST telescope could possibly detect whether dark energy is constant or changing over time, and could perhaps do so within the next few years.

    Reading this, one gets the impression that well know what string theor...


Wind Turbine Pushes Limits Of Desktop 3D Printing Hackaday

There was a time, not so long ago, when hype for desktop 3D printing as so high that it seemed you could print anything. Just imagine it, and your handy dandy magical 3D printer could manifest it into reality. But now that more people have had first hand experience with the technology, the bubble has burst. Reality has sobered us up a bit, and today weve got a much better idea of what can and cannot be printed on a traditional desktop 3D printer.

But that doesnt mean we arent surprised from time to time. As a perfect example, take a look at this almost entirely 3D printed wind turbine designed and built by [Nikola Petrov]. Outside of the electronics, the pole its mounted to, and some assorted bits and bobs, he produced all the parts on his own large-format TEVO Black Widow printer. He mentions there are a few things he would do differently if he was to build another one, but its hard to find much to complain about with such a gorgeous build.

To be sure, this one isnt for the 3D printing novice. First of all, youll need a printer with a bed thats at least 370 mm wide just to print the blades. [Nikola] also recommends printing the parts in ABS and coating them with acetone to smooth and harden the out...


Chance the Rapper works as Lyft driver to raise money for Chicago schools The Hill: Technology Policy

Chicago hip-hop artist Chance the Rapper surprised unsuspecting Lyft riders in his latest effort to raise money for Chicagos public schools.Lyft shared a video of the rapper and philanthropist appearing as an undercover driver to encourage riders...


Mammals cannot evolve fast enough to escape current extinction crisis Lifeboat News: The Blog

Humans are exterminating animal and plant species so quickly that natures built-in defence mechanism, evolution, cannot keep up. An Aarhus-led research team calculated that if current conservation efforts are not improved, so many mammal species will become extinct during the next five decades that nature will need 3 to 5 million years to recover.

There have been five upheavals over the past 450 million years when the environment has changed so dramatically that the majority of Earths plant and animal species became extinct. After each mass extinction, evolution has slowly filled in the gaps with new species.

The sixth is happening now, but this time, the extinctions are not being caused by natural disasters; they are the work of humans. A team of researchers from Aarhus University and the University of Gothenburg has calculated that the extinctions are moving too rapidly for evolution to keep up.


These Are The Most Distant Objects Weve Ever Discovered In The Universe Lifeboat News: The Blog

The cosmic records we have are meant to be broken, but oh, have we ever gone so far.


Real-time Google Translate available on all Google Assistant headphones TechWorm

Real-time translation is coming to all Google Assistant-optimized headphones and Android phones

When Google launched the Google Assistant-enabled Pixel Buds last year, one of the highlighted features of the headphone was its ability to translate in real-time using Google Translate. However, until now this feature was exclusive only to Pixel Buds paired with a Google Pixel smartphone.

Google is now opening up the feature to more users and bringing real-time translation capabilities to all Google Assistant-powered headphones, according to a report from Droid-Life.

Google has updated the support page for the Pixel Buds that reads Google Translate is available on all Assistant-optimised headphones and Android phones. The Google Assistant on Google Pixel Buds is only available on Android and requires an Assistant-optimised Android device and data connection.

Check out the video demonstration from the 2017 Made By Google event that shows how Google translate works on the Pixel Buds:

Some of the few headphones that are equipped with the Google Assistant include the Pixel Buds, Bose Quiet Control 35 II, Sony WI-1000X, Sony WH-1000XM2, Sony WH-1000XM3, JBL Everest 710GA, JBL Everest 110GA, OnePlus Bullets and a few more come with built-in Google Assistant.

If you are interested in trying out the feature, all you need to do is say Hey Google, help me speak (name of the language) to the Google Assistant on your earphone or device.

The post Real-time Google Translate available on all Google Assistant headphones appeared first on TechWorm.


Introducing our new associate member forum! FSF blogs

I'm excited to share that we've launched a new forum for our associate members. We hope that you find this forum to be a great place to share your experiences and perspectives surrounding free software and to forge new bonds with the free software community. If you're a member of the FSF, head on over to to get started. You'll be able to log in using the Central Authentication Service (CAS) account that you used to create your membership. (Until we get WebLabels working for the site, you'll have to whitelist its JavaScript in order to log in and use it, but rest assured that all of the JavaScript is free software, and a link to all source code can be found in the footer of the site.) Participation in this forum is just one of many benefits of being an FSF member if you're not a member yet, we encourage you to join today, for as little as $10 per month, or $5 per month for students.

The purpose of this member forum is to provide a space where members can meet, communicate, and collaborate with each other about free software, using free software. While there are other places on the Internet to talk about free software, this forum is unique in that it is focused on the common interests of FSF members, who care very much about using, promoting, and creating free software.

The forum software we chose to use is Discourse.

One of the technical requirements for the forum was that it needs to work well with single sign-on (SSO) systems, specifically our CAS system. In the process of launching the new member forum, I patched our CAS server so that it would verify FSF associate membership. I also wrote a patch for the Discourse CAS SSO service so that we can require email validation when users log into Discourse for the first time.

We built our own patched instance of Discourse's base Docker image to resolve a freedom issue, and as preparation for any times in the future that we may need to make changes to the upstream source code for our local installation.

I spent some time trying to set up Discourse without using Docker, but getting email delivery to work without a Docker image proved to be very challenging. In the end, we decided that using Docker adds complexity when making patches to the software, but think that it makes using Discourse easier overall.

One of the reasons we chose Discourse is because it allows users to respond to conversations via email. Users may enable the "mailing list mode" in their user settings, which allows us to interact with the member forum as if it were a mailing list.

I would like to thank the Discourse team for creating this software, and for their responsiveness to my questions about Discourse patching, new features, configuration, and deployment. They responded very quickly to a security issue that I reported, and d...


Apples iOS 12.0.1 software update causing new problems to users TechWorm

Apples iOS 12.0.1 software update creating network and signal connectivity problems, broken calls

After the update, a number of iPhones users are facing problems such as frequently broken calls, network and signal connectivity problems along with issues pertaining to battery life as well.

Since upgrading, owners of both new and old iPhones are finding their phones either dont make or receive calls. Bluetooth connectivity, Wi-Fi and battery-related issues are again surfacing on an iOS generation which Apple has promoted as being all about efficiency, stability and speed, Forbes reported on Friday.

Among other fixes, Apple has also reportedly addressed the iOS 12 issue with iMessage delivering personal messages to wrong and multiple people.

Apple has been telling users that iMessage accidentally sending messages to wrong people is actually a feature for iOS 12 and that it is happening because Apple is now organising all contacts by Apple ID, so if family members or friends share an ID now all these messages are shared simultaneously with everyone who has that ID, the report added.

Recently, Apple also released a minor update for the WatchOS 5 to fix the charging issue and activity-related problems that were experienced by some users.

The post Apples iOS 12.0.1 software update causing new problems to users appeared first on TechWorm.


Blood Pressure Monitoring Off the Cuff IEEE Spectrum Recent Content full text

Cuffless blood pressure monitors could help continuously measure this vital sign

Blood pressure is normally monitored using a cuff wrapped around the upper arm, but new research could one day lead to a cuffless, noninvasive way to measure blood pressure.

Blood pressure reflects both physical health and emotional states. Traditionally, doctors measure this vital sign using an inflating cuff that applies pressure against the arm to stop blood flow and slowly releases this outside pressure to help sensors detect the amount of pressure in the blood as it surges back into the arm.

Researchers would like to monitor the blood pressure of people while they are engaged in a variety of activities to help shed light on precisely how this vital sign fluctuates after exercise or mood swings. However, cuffs that repeatedly impede blood flow can damage the body over time, limiting how much data standard blood pressure monitors can gather. As such, doctors would prefer cuffless techniques for blood pressure monitoring.

One way to potentially eliminate the cuffs involves soft devices placed on the skin to measure the velocity of pulse waves inside arteries. Two equations can then convert these velocity measurements to blood pressure.

That strategy could also lead to a noninvasive method of continuous blood pressure monitoring, which is essential for the care of critically ill patients. Today, continuous blood pressure monitoring is typically accomplished by inserting a needle into an artery, an invasive technique that exposes patients to risks of dangerous complications.

We realized that our unique skin-interfaced biophysical sensors could, potentially, address this challenge, but we found a lack of rigorous, physics-based models in the existing literature, says study co-author John Rogers, a materials scientist at Northwestern University in Evanston, Illinois.

Previous work found that one of the two equations for converting pulse wave velocity to blood pressure relied on unrealistic assumptions that do not hold for human arteries. Among the debunked beliefs: Artery walls are essentially thin shells, and that artery thickness and diameter remain fixed as blood pressure changes. Moreover, although the other equation is based on both pulse wave velocity and blood pressure data, there is no theoretical basis for how...


Check how many CPUs are there in Linux system nixCraft

I am a new Linux user. How do you check how many CPUs are there in Linux system using the command line option?

The post Check how many CPUs are there in Linux system appeared first on nixCraft.


Chrome, Firefox, Edge and Safari Plans to Disable TLS 1.0 and 1.1 in 2020 The Hacker News

All major web browsers, including Google Chrome, Apple Safari, Microsoft Edge, Internet Explorer, and Mozilla Firefox, altogether today announced to soon remove support for TLS 1.0 (20-year-old) and TLS 1.1 (12-year-old) communication encryption protocols. Developed initially as Secure Sockets Layer (SSL) protocol, Transport Layer Security (TLS) is an updated cryptographic protocol used to


Serialized Fiction Review: DeathWorlders SoylentNews

What if Earth was an unusually volcanic and hostile planet? What if an unusually bright sun and unusually high gravity made humans unusually compact and strong? What if religion kept humans sane and striving in such a hostile environment? What if apex predators were the exception rather than the norm? What if 30,000 alien abductees had been taken for medical research and the Interspecies Dominion had no qualms with indigenous flora and fauna (and especially meat-eating fauna) being taken in this manner? These are not new ideas but rarely have they been expounded so thoroughly.

The Jenkinsverse begins with Kevin Jenkins caught in a bureaucratic trap. The Canadian barman with a prominent crucifix tattoo was abducted by Alien Grays, forcibly given an experimental translator implant and dumped at an interstellar trading post. He is unable to assert citizenship, get a job or go home. Where is Earth, anyhow? Many bureaucratic systems refuse to register sentient life from a planet similar to Earth and some bureaucrats think he's a liar. After being pushed around for six months, he saves numerous lives when marauding cannibal spiders attack a space-station. He becomes famous throughout the galaxy - although he is deemed insane after he mentions religion.

The warrior cannibals are not pleased with defeat. An advance party attacks Earth. They foolishly decide to attack a televised ice hockey game in Vancouver. They are quickly beaten to pulp with ice hockey sticks. Many humans think that the event was a hoax to gain television ratings. The alien technology recovered from the attack leads to the formation of SCERF [Scotch Creek Extra-terrestrial Research Facility] in Canada. A Private Investigator, Kevin Jenkins and a bunch of other abductees descend on the facility (much like Close Encounters Of The 22nd Kind). They arrive with a sketched catalog of alien species and it is promptly leaked on the Internet. Despite this, Kevin Jenkins gets a job running SCERF's caf and bar where his input to casual conversations is pivotal. The Private Investigator encounters misfortune - and so does the police officer investigating the Private Investigator.

The police officer wants a fresh start and this allows the reader to follow one o...


The Incredible Judges Of The Hackaday Prize Hackaday

The last challenge of The Hackaday Prize has ended. Over the past few months, weve gotten a sneak peek at over a thousand amazing projects, from Open Hardware to Human Computer Interfaces. This is a contest, though, and to decide the winner, were tapping some of the greats in the hardware world to judge these astonishing projects.

Below are just a preview of the judges in this years Hackaday Prize. In the next few weeks, well be sending the judging sheets out to them, tallying the results, and in just under a month well be announcing the winners of the Hackaday Prize at the Hackaday Superconference in Pasadena. This is not an event to be missed not only are we going to hear some fantastic technical talks from the hardware greats, but were also going to see who will walk away with the Grand Prize of $50,000.

Sherry Huss

Sherry Huss is the former vice president of Maker Media, and oversees the publishing of Make Magazine and Maker Faires across the globe. Sherry is a major advocate of all things maker in the global community, and her vision and passion for the maker movement was instrumental in growing the Make: brand within the maker ecosystem. Under her guidance, the largest Maker Faires, the Bay Area and World Maker Faire in New York, have grown from just a few thousand people in 2006 to events with over 200,000 attendees each year. Sherry is a giant in the Maker world, and an unending advocate of make...


Doug Drexler joins our Futurists Board. Lifeboat News

Doug Drexler joins our Futurists Board. He is a visual effects artist, designer, sculptor, illustrator, scenic artist, graphic designer, and a makeup artist who has collaborated with such talents as Al Pacino, Dustin Hoffman, James Caan, Meryl Streep, and Warren Beatty.


The App that Fights Congestion, Emissions IEEE Spectrum Recent Content full text

Maryland transportation engineers develop incenTrip to nudge users toward greener, more efficient travel decisions

The average American lost 41 hours to rush-hour congestion in 2017, according to a scorecard published by transportation analytics company INRIX, placing the U.S. with nations like Indonesia, Venezuela, and Russia on the list of top five countries with the highest average peak hours spent in congestion. And while expanding road networks and public transit systems may seem like the only way to combat gridlock, researchers at the University of Maryland A. James Clark School of Engineering are betting they can meaningfully shave these hours down with a more personal approach.

UMD incenTrip is available to D.C.-Baltimore area travelers on Google Play or the Apple Store. Illustration by B Creative Group.

Theyve built an AI and big-data based travel app that nudges users to make smarter travel decisionsones that benefit the environment, the user, and other travelers.

We know that we will never build our way out of congestion, said Lei Zhang, director of the Clark Schools Maryland Transportation Institute (MTI) and the Herbert Rabin Distinguished Professor of civil engineering. But with artificial intelligence, we can build tools that get more accurate and helpful with each use, allowing us to manage travel demand while also helping people get where they want to go more smoothly.

incenTrip, part of a $4.5 million project funded by the Department of Energy to reduce energy consumption in personal transportation, awards points based on how a user chooses to get around, giving more points for taking public transportation or commuting outside peak travel times, for example. These points can then be redeemed for gift cards to Amazon and the Apple Store.

Like other travel apps, incenTrip offers users a handful of travel modes to choose from: car, ridesharing, bus, subway, and biking. But the UMD app takes this formula a bit further, showing travelers how much fuel is consumed by each option and even suggesting that a user travel at another time or mix-and-match modes to ultimately cut time spent in traffic.

The options displayedas well as the points assigned to themare generated by algorithms that consider real-time road and transit conditions, how traffic will change throughout the trip, and the users individual behavior. The modeling and data fueling these algorithms come from MTI and the Clark Schools Center for Advanced Transportation Technology Laboratory, which manages...


FUSE File-Systems Pick Up Another Performance Boost With Symlink Caching Phoronix

FUSE file-systems in user-space are set to be running faster with the upcoming Linux 4.20~5.0 kernel thanks to several performance optimizations...


Peter Cawdron, author of Anomaly, joins our Futurists Board. Lifeboat News

Peter Cawdron, author of "Anomaly", joins our Futurists Board.


Geoengineering will happen, China controlling rain across Tibet Lifeboat News: The Blog

The initiation of geoengineering will not involve a global public debate or vote.

Do not bother having debates about if or will we use geoengineering. The best thing is to work out the best combination of approaches to make it work the best way possible and minimize side effects. We will probably end up learning a fair bit after we start implementing.

China controls weather and will not blink before starting geoengineering when they think it is needed.


Kaloom delivers fully automated, programmable data center fabric Help Net Security

Kaloom announced the general availability of its Software Defined Fabric (SDF) product family. Kaloom was founded with the vision of providing the automated and programmable data center networking fabric, one that will disrupt how data centers are built and managed by cloud providers, telcos and enterprises. Beta customers have turned to Kaloom for increased automation and feature velocity while reducing network latency, costs and time to introduce new services and features. Kalooms SDF leverages open More

The post Kaloom delivers fully automated, programmable data center fabric appeared first on Help Net Security.


Did Jamal Khashoggis Apple Watch record his murder at Saudi consulate? Probably not Graham Cluley

A Turkish newspaper claims that audio files of journalists death were recorded on his Apple Watch. Such a claim, if true, would be rather convenient for the intelligence services in Turkey - who might not want to reveal their methods.


Teardown: D50761 Aircraft Quick Access Recorder Hackaday

Everyones heard of the black box. Officially known as the Flight Data Recorder (FDR), its a mandatory piece of equipment on commercial aircraft. The FDR is instrumental in investigating incidents or crashes, and is specifically designed to survive should the aircraft be destroyed. The search for the so-called black box often dominates the news cycle after the loss of a commercial aircraft; as finding it will almost certainly be necessary to determine the true cause of the accident. What you probably havent heard of is a Quick Access Recorder (QAR).

While its the best known, the FDR is not the only type of recording device used in aviation. The QAR could be thought of as the non-emergency alternative to the FDR. While retrieving data from the FDR usually means the worst has happened, the QAR is specifically designed to facilitate easy and regular access to flight data for research and maintenance purposes. Its data is stored on removable media and since the QAR is not expected to survive the loss of the aircraft it isnt physically hardened. In fact, modern aircraft often use consumer-grade technology such as Compact Flash cards and USB flash drives as storage media in their QAR.

Through the wonders of eBay, I recently acquired a vintage Penny & Giles D50761 Quick Access Recorder. This wa...


Slipshod Cybersecurity for U.S. Defense Dept. Weapons Systems IEEE Spectrum Recent Content full text

After decades of DoD recalcitrance, the Government Accountability Office has given up making recommendations in favor of public shaming

Last week, the U.S. Government Accountability Office (GAO) released yet another report on the state of the U.S. Department of Defenses cybersecurity. The GAOs conclusions can be summed up in two words: unsurprisingly abysmal. The report states, Nearly all major acquisition programs that were operationally tested between 2012 and 2017 had mission-critical cyber vulnerabilities that adversaries could compromise.

In addition, the report asserts that the Defense Department does not know the full extent of its weapon systems cyber vulnerabilities due to limitations on tests that have been conducted. It pretty much goes downhill from there.

This latest report is just one of many from the GAO, other government groups, and research organizations that have been sounding the alarm since the early 1990s about the Defense Departments woefully inadequate approach to cybersecurity across the board, and with regard to its weapon systems in particular. After each stinging report, the DoD promises to improve tomorrow. Yet, tomorrow never seems to arrive. This failure to act might help explain why its major weapon systems are accessed by foreign powersat least 29 at last count (allegedly) by China alone.

The GAO, which has made hundreds of recommendations on how the Defense Department could improve its cybersecurity over the years, has apparently decided to take a different tack. Instead of new suggestions, it is laser focused on documenting the (in)adequacy of the Departments cybersecurity, starting with its weapon systems. The GAO perhaps is thinking that the only way the department will ever truly change its behavior is for its lackluster cybersecurity to become the object of a public shaming campaign. Reason and successful cyberattacks havent proven sufficiently motivational.

Because cybersecurity key performance parameters were not required, Joint [Defense] Staff officials and some program officials said that many current weapon systems [programs] had no high-level cybersecurity requirements when they began

Generating incredulity is not difficult to do. The GAO report documents a consistently ignorant as well as arrogant attitude when it comes to the Pentagons approach to weapon systems cybersecurity. For instance, t...

Moneyland - the Country You Never Heard of... and Will Never Visit. SoylentNews

Understanding 'Moneyland' the offshore world of the super-rich

Many of the world's problems from declining public services to corruption can be explained in two words: offshore wealth. That's according to investigative journalist Oliver Bullough, who is working to unravel the intricate global web of money and power. To try and de-mystify the idea, Bullough came up with his own word: Moneyland. "I invented 'Moneyland' to try and get my own head around this problem, basically," he says.

[...] One of the greatest stumbling blocks in addressing the issues around offshore tax havens, Bullough says, is that the very term is relatively ambiguous and generally difficult to conceptualise. "'Offshore' isn't a place, it's not the British Virgin Islands or Hong Kong or whatever," he says. "'Offshore' just means not here; elsewhere. It's a legal construct that essentially means something can hide without being anywhere in particular."

To try and de-mystify the idea, Bullough came up with his own word: Moneyland. "I invented 'Moneyland' to try and get my own head around this problem, basically," he says. Moneyland also the name of Bullough's book on the issue makes up roughly 10 per cent of the world's wealth, he says. "If you look at its economy, it is the third biggest economy in the world after America and China, it's absolutely massive." Bullough declares London to be the likely capital of Moneyland, followed closely by New York. According to Oxfam, the top three-and-a-half dozen people in the world this year owns the same amount of stuff as the bottom 3.5 billion people in the world.

How far does the Gini curve have to bend before something snaps?

Original Submission

Read more of this story at SoylentNews.


X.Org Server 1.20.2 Released With A Bunch Of Bug Fixes Phoronix

It's almost been a half-year already since the release of the long delayed X.Org Server 1.20, but with no signs of X.Org Server 1.21 releasing soon, xorg-server 1.20.2 was announced today as the latest stable point release...


How Many Households Qualify as Middle Class?

Via: Of Two Minds: By the standards of previous generations, the middle class has been stripmined of income, assets and purchasing power. What does it take to be middle class nowadays? Defining the middle class is a parlor game, with most of the punditry referring to income brackets as the defining factor. People tend to []


Distribution Release: IPFire 2.21 Core 124 News

IPFire is a Linux distribution for firewalls which offers a range of security tools and is designed to be easy to set up. The distribution's developers have released IPFire 2.21 Core Update 124 that features kernel and network hardening for improved security. "We have updated the Linux kernel....


Myanmar's military organized Facebook disinformation campaign against Rohingya: report The Hill: Technology Policy

Myanmars military was behind a disinformation effort on Facebook that helped foment ethnic cleansing against the countrys Rohingya Muslim minority, according to a New York Times investigation.The operation spread anti-Rohingya propaganda by...

03:32 Might Formally Join Forces With The X.Org Foundation Phoronix is already effectively part of X.Org given the loose structure of, the key members/administrators being part of both projects, and long being the de facto hosting platform from the X.Org Server to Mesa and much more. But now they may be officially joining forces...


Franklin Horton, author of the bestselling series The Borrowed World, joins our Futurists Board. Lifeboat News

Franklin Horton, author of the bestselling series "The Borrowed World", joins our Futurists Board.


Moons of moons could exist, and scientists call them moonmoons Lifeboat News: The Blog

A moon orbiting a planet can have a moon of its own, scientists say.


The Potential of Thymus Regeneration Lifeboat News: The Blog

Intervene Immune is a company focused on the age-related decline of the immune system, which is known as immunosenescence. Here, Bobby Brooke, CEO of Intervene Immune, discusses the clinical potential of regenerating the thymus as a means of reversing age-related immune system decline.

Earlier this year, we hosted the Ending Age-Related Diseases 2018 conference at the Cooper Union, New York City. This was a conference designed to bring together the best in the aging research and biotech investment worlds and saw a range of industry experts sharing their insights.

As the human body ages, the thymus begins to shrink, and fewer numbers of T cells are created and trained to fight. The thymus tissue also turns to fat rather than healthy immune cell-producing thymic tissue. Eventually, the thymus wastes away, becoming a useless fatty organ that no longer produces immune cells.

This structural decay of the thymus and the failure of the immune system when we are old opens us up to multiple age-related diseases, particularly cancer, along with infectious diseases, such as pneumonia and flu.


The state of the Early Universe: The beginning was fluid Niels Bohr Institute University of Copenhagen Lifeboat News: The Blog

The particle physicists at the Niels Bohr Institute have obtained new results, working with the LHC, replacing the lead-ions, usually used for collisions, with Xenon-ions. Xenon is a smaller atom with fewer nucleons in its nucleus. When colliding ions, the scientists create a fireball that recreates the initial conditions of the universe at temperatures in excess of several thousand billion degrees. In contrast to the Universe, the lifetime of the droplets of QGP produced in the laboratory is ultra short, a fraction of a second (In technical terms, only about 10-22 seconds). Under these conditions the density of quarks and gluons is very large and a special state of matter is formed in which quarks and gluons are quasi-free (dubbed the strongly interacting QGP). The experiments reveal that the primordial matter, the instant before atoms formed, behaves like a liquid that can be described in terms of hydrodynamics.

How to approach the moment of creation

One of the challenges we are facing is that, in heavy ion collisions, only the information of the final state of the many particles which are detected by the experiments are directly available but we want to know what happened in the beginning of the collision and first few moments afterwards, You Zhou, Postdoc in the research group Experimental Subatomic Physics at the Niels Bohr Institute, explains. We have developed new and powerful tools to investigate the properties of the small droplet of QGP (early universe) that we create in the experiments. They rely on studying the spatial distribution of the many thousands of particles that emerge from the collisions when the quarks and gluons have been trapped into the particles that the Universe consists of today. This reflects not only the initial geometry of the collision, but is sensitive to the properties of the QGP. It can be viewed as a hydrodynamical flow.


Get an Introduction to Open Source, Git, and Linux with New Training Course

Get an Introduction to Open Source, Git, and Linux with New Training Course


The 3D Printed Plotter You Didnt Know You Needed Hackaday

Weve been seeing an influx of repurposed 3D printers recently. Thrifty hackers have been leveraging cheap 3D printers as a way to bootstrap their builds, on everything from laser engravers to pick and place machines. Theres nothing wrong with that, and honestly when you can get a cheap 3D printer for less than the cost of the components separately thanks to the economies of scale, youd be foolish not to.

But theres still something to be said for the classic RepRap mentality of building things using printed parts and smooth rods. Case in point, the largely 3D printed plotter that [darth vader] sent in for our viewing pleasure. This isnt somebody sicking a pen on the extruder of their open box Monoprice special, this is a purpose built plotter and it shows. In the video after the break you can see not only how well it draws, but also how large of a work area it has compared to a modified 3D printer.

If you know your way around a 3D printer, most of it should look pretty familiar to you. Using the same GT2 belts, steppers, end stop switches, and linear bearings which are ubiquitous in 3D printers, it shouldnt be difficult to source the parts to build your own. It even uses a Mega 2560 with RAMPS 1.4 ru...


Harris Corp. and L3 Technologies Plan to Merge and Become the Sixth Largest U.S. Defense Contractor SoylentNews

Defense giants Harris, L3 Technologies to merge

Harris Corp. and L3 Technologies Inc. on Sunday announced plans to combine in the largest-ever defense merger, reacting to Pentagon efforts to get companies to boost investment and speed the development of weapons.

The enlarged company would have annual sales of around $16 billion this year and 48,000 staff, ranking sixth among U.S. defense contractors by revenue as the industry enjoys a bump in Pentagon spending after five years of budget cuts.

The deal, first reported by The Wall Street Journal on Saturday, would unite two companies with a combined market value of about $33.5 billion.

Also at Bloomberg, Reuters, and The Washington Post.

See also: Schumer: Rochester won't lose jobs as a result of Harris Corp. merger

Original Submission

Read more of this story at SoylentNews.


Malicious Platform Independent Trojan GPlayed Disguised as Google Play Store HackRead

By Waqas

Newly discovered Trojan malware, which has been dubbed as GPlayed by the IT security experts at Cisco Talos, disguises itself as Google Play Store to trick users into downloading it. After getting installed, it steals location information and bank details from the device. Additionally, it is capable of transferring code between desktop and mobile platforms. []

This is a post from Read the original post: Malicious Platform Independent Trojan GPlayed Disguised as Google Play Store


Windows 10 October 2018 Update Performance Against Ubuntu 18.10, Fedora 29 Phoronix

As the latest of our benchmarks using the newly re-released Microsoft Windows 10 October 2018 Update, here are benchmarks of this latest Windows 10 build against seven different Linux distributions on the same hardware for checking out the current performance of these operating systems.


Security updates for Monday

Security updates have been issued by Arch Linux (wireshark-cli), Debian (imagemagick, otrs2, tomcat7, and wireshark), Fedora (ca-certificates, dislocker, dolphin-emu, kernel-headers, kernel-tools, libgit2, mbedtls, mingw-openjpeg2, nekovm, openjpeg2, patch, strongswan, and thunderbird), Mageia (firefox, git, nextcloud, and texlive), Oracle (kernel and openssl), Scientific Linux (spamassassin), SUSE (libtirpc), and Ubuntu (requests).


Experimental Patches For Using SIMD32 Fragment Shaders With Intel's Linux Driver Phoronix

Existing Intel graphics hardware already supports SIMD32 fragment shaders and the Intel open-source Linux graphics driver has supported this mode for months, but it hasn't been enabled. That though is in the process of changing...


Construction Cranes Versus Hurricanes Hackaday

When engineers are designing buildings, bridges, or other large construction projects, a lot of thought is given to the environment. Some of these considerations might seem obvious, like designing a skyscraper in San Francisco to tolerate earthquakes, building a stadium in New York City to hold up not only its own weight but the weight of several feet of snow on the roof, or constructing bridges in any coastal area to be able to tolerate salt spray. Not everything is this straightforward, though. Not only do the structures themselves have to tolerate the environmental conditions they are in, but the equipment that is used to build them must tolerate these conditions as well, specifically the large cranes that are often semi-permanently attached to their construction sites.

Perhaps the most extreme example of this in recent memory was during Typhoon Manghut as it hit Hong Kong. There were several large construction cranes that didnt fare too well with the high winds. At least one toppled as a result and catching the free-spinning of another on video is more than enough to make you gasp. Other videos of construction cranes surfaced from this typhoon showing some concerning, but surprisingly well-designed, emergency operation of the same type of crane.

The Cranes that Build Tall Buildings

Before digging into the considerations for extreme weather, its worth discussing some of the different types of cranes that might be found on a construction site. The large cranes used to construct skyscrapers (and the ones seen in various states of distress in the linked videos) are known as tower cranes. These are fixed to a concrete base specifically built to hold the crane during the course of construction. Once the base is complete, the parts of the crane are lifted by a lighter-duty crane and assembled one section at at time. Parts of the mast may also be fixed to the lower parts of the building for added strength. These cranes commonly have a fixed jib (the horizontal part at the top that holds the counterweight and the payload) with a rolling trolley. Other cranes at the site may have luffing jibs that can move up and down, and some cranes are mobile and can be disassembled onto a truck for quick and easy movement from site to site.

At sites with many tower cranes operating simultaneously, they are all built at different heights in order to keep the jibs...


Japan Plans to Criminalize Pirate Link Sites, Up to Five Years in Jail for Operators TorrentFreak

For the past several months, authorities in Japan have been grappling with the thorny issue of online piracy. The country has attempted to deal with the issue previously but there now appears to be greater momentum.

Back in September an advisory panel for the Agency for Cultural Affairs recommended that pirate indexing sites (known locally as leech sites) should be outlawed. These platforms host no infringing content themselves but provide hyperlinks to content hosted elsewhere.

Unlike in Europe where such sites are illegal when they deliberately provide access to content on a for-profit basis, in Japan there is no law that specifically renders them illegal. An estimated 200 leech sites exist locally and plugging the legal loopholes could make a significant impact on piracy rates, the government believes.

The aim will be to criminalize the act of knowingly linking to copyrighted content, or linking to the same when site operators should reasonably be expected to know that the content is infringing. Copyright holders will be able to have such links taken down and when site operators fail to respond, hefty sentences will apply.

According to Mainichi, the proposals currently contain a recommendation for prison sentences of up to five years for the worst offenders. The publication notes that in October last year, the people behind Japans largest leech site were arrested on suspicion of copyright infringement but authorities were only able to take action due to parallel bootlegging offenses.

The agency will submit proposals for amendments to the Copyright Act to lawmakers in 2019. Meanwhile, efforts are underway to introduce a site-blocking regime in Japan to deal with overseas sites that infringe copyright.

Earlier this year, ISPs NTT Communications Corp., NTT Docomo Inc. and NTT Plala Inc. voluntarily blocked access three sites identified by the government Mangamura, AniTube! and MioMio adding that more sites could be blocked upon request.

The government, however, is keen to have blocking measures enshrined in law, along with pirate sites being removed from search results and site operators prevented from generating revenue from advertising.

Source: TF, for the latest info on copyright, file-sharing,...


Kernel prepatch 4.19-rc8

As expected, the 4.19 development cycle has gone to 4.19-rc8. "Please go and test and ensure that all works well for you. Hopefully this should be the last -rc release."


President Trump Signs Federal Aviation Administration Reauthorization Act of 2018 SoylentNews

The Federal Aviation Administration Reauthorization Act of 2018 regulates airline seat sizes and allows authorities to shoot down drones without obtaining a warrant:

Despite objection, Congress passes bill that lets U.S. authorities shoot down private

U.S. authorities will soon have the authority to shoot down private drones if they are considered a threat a move decried by civil liberties and rights groups. [...] [Critics] say the new authority that gives the government the right to "disrupt," "exercise control," or "seize or otherwise confiscate" drones that's deemed a "credible threat" is dangerous and doesn't include enough safeguards.

Federal authorities would not need to first obtain a warrant, which rights groups say that authority could be easily abused, making it possible for Homeland Security and the Justice Department and its various law enforcement and immigration agencies to shoot down anyone's drone for any justifiable reason.

Also at CBS and Aero News Network.

See also: New FAA Rules for Drones Go Into Effect

Original Submission

Read more of this story at SoylentNews.


Fake Adobe update really *does* update Flash (while also installing cryptominer) Graham Cluley

Online criminals are planting cryptomining code on victims Windows computers, using the camouflage of an update to Adobe Flash Player.

Read more in my article on the Tripwire State of Security blog.


Artificial intelligence aids automatic monitoring of single molecules in cells Lifeboat News: The Blog

To understand the mechanisms by which molecules act in cells, or the effects of drugs on them, it would be ideal to be able to track individual molecules, including where in the cell they are located and what modifications they undergo when conditions in the cell change. However, this has proven difficult with existing technologies, particularly given the amount of time required to perform such monitoring.

A research team centered at Osaka University, in collaboration with RIKEN, has developed a system that can overcome these difficulties by automatically searching for, focusing on, imaging, and tracking single within living . The team showed that this approach could analyze hundreds of thousands of single molecules in hundreds of cells in a short period, providing reliable data on the status and dynamics of molecules of interest.

For the development of this method, reported in the journal Nature Communications, the team used an -based system, involving the training of to learn to focus correctly on a sample and to automatically search for cells, followed by the tracking of single fluorescently labeled molecules with a total internal reflection fluorescence microscope.


Facebook data breach: Victims will not be offered free identity theft protection Help Net Security

Facebook announced that the recent data breach it has suffered is a little less massive than initially thought: only 30 million users have been affected. But, although highly personal information has been harvested from the profiles of 14 millions of the victims, Facebook has told the BBC that it does not plan, at this time, to provide them with free identity theft protection services. New information On Friday, while still insisting on calling this data More

The post Facebook data breach: Victims will not be offered free identity theft protection appeared first on Help Net Security.


A first look at Chinas Mars simulation base out in the Gobi Desert Lifeboat News: The Blog

Chinas first Mars simulation base opened to the press on Friday in Gansu Province in the northwest of the country, providing a glimpse of the project mainly intended to popularise space among youth.

The base is located in the Gobi Desert, 40 kilometres away from the downtown area of Jinchang, a city in Gansu. The natural features, landscape and climate are being described as resembling Martian conditions.

The newly-built base has an extravehicular site and nine modules, including an airlock module, a general control module and a bio-module.

Monday, 15 October


Online market for counterfeit goods in Russia has reached $1,5 billion Security Affairs

Group-IB: The online market for counterfeit goods in Russia has reached $1,5 billion, while the number of phishing attacks has surpassed 1,200 daily

Group-IB, an international company that specialises in the prevention of cyber attacks, has estimated that online sales of counterfeit goods are now worth $1.5 billion. This information was first made public by experts from Group-IBs Brand Protection team at the CyberCrimeCon 2018 international cybersecurity conference.

According to Group-IB, the online market for counterfeit goods in Russia has increased by 23% in a year and totaled more than $1.5 billion in 2017, compared to $1.2 billion in 2016.  Fraudsters use their websites to sell household appliances and computer equipment, clothing and footwear, jewelry, accessories, cosmetics, medicinal products, and much more, often at hugely discounted prices up to 80% off. According to Group-IBs statistics, every fifth counterfeit product was bought online. On average, Russians spend $78 per year on counterfeit goods.

For large organisations, the actions of online fraudsters mean not only a direct loss in revenue, but also damaged customer loyalty, brand abuse, and fewer shoppers, says Andrey Busargin, Director of Brand Protection at Group-IB. It also leads to a decrease in what we call the psychological price, i.e. the cost that customers are willing to pay for a product from the official retailer. Around 64% of users stop buying a companys goods after a negative experience.

 Counterfeit goods are not the only threat to popular brands on the Internet. Scammers create fake websites of known brands, fraudulent promotional campaigns, and fake accounts on social media. In recent years, an often-used fraud method has been fake mobile applications: 36% of users are unable to distinguish between genuine and fake apps, and 60% of the latter request access to the users personal data. 

Fraudsters use various ways to deceive users: phishing websites, fake mobile apps, accounts and groups on social media. Phishing remains one of the most common online fraud. According to the experts from Group-IB Brand Protection, around 1,270...


Set Up a CI/CD Pipeline with Kubernetes Part 1: Overview

Set Up a CI/CD Pipeline with Kubernetes Part 1: Overview


The Illustrated TLS Connection

Every byte of a TLS connection explained and reproduced.

In this demonstration, a client has connection to a server, negotiated a TLS 1.2 session, sent "ping", received "pong", and then terminated the session. Click below to begin exploring.

Client Hello



Chrome OS Stable Channel Gets Linux Apps

After months of user testing in developer and beta channels, the Crostini project at Google finally delivered the goods, Linux apps for most users of Chromebooks in the stable channeldefinitely worth the wait. While this still is aimed primarily at developers using Chromebooks, I think there's a good chance these Linux apps will be used and enjoyed by the general public using Chromebooks as well. There's still a bit of a learning curve to overcome before that possibility is realized, but if you already are a user of any Linux distro, it will feel very familiar.

IndyWatch Science and Technology News Feed Archiver

Go Back:30 Days | 7 Days | 2 Days | 1 Day

IndyWatch Science and Technology News Feed Today.

Go Forward:1 Day | 2 Days | 7 Days | 30 Days

IndyWatch Science and Technology News Feed was generated at World News IndyWatch.

Resource generated at IndyWatch using aliasfeed and rawdog