IndyWatch Science and Technology News Feed Archiver

Go Back:30 Days | 7 Days | 2 Days | 1 Day

IndyWatch Science and Technology News Feed Today.

Go Forward:1 Day | 2 Days | 7 Days | 30 Days

IndyWatch Science and Technology News Feed was generated at World News IndyWatch.

Thursday, 22 March


AMD confirms processor flaws found by CTS Labs, firmware fixes are coming Help Net Security

Chipmaker AMD has confirmed that the vulnerabilities discovered by CTS Labs researchers earlier this month do affect a variety of its products, and that firmware patches mitigating them will be released in the coming weeks. Whats this all about? As you might remember, there was a big ballyhoo when CTS Labs publicized the flaws just one day after they reported them to AMD. The security community was salty about the company not giving AMD a More

The post AMD confirms processor flaws found by CTS Labs, firmware fixes are coming appeared first on Help Net Security.


880,000 payment cards, user info hit in Orbitz data breach Help Net Security

Expedia subsidiary Orbitz has revealed that a legacy Orbitz travel booking platform had been compromised and personal user information and payment card data might have been accessed by unauthorized parties. The security incident was discovered on March 1, 2018, and apparently an attacker may have accessed certain personal information, stored on this consumer and business partner platform, that was submitted for certain purchases made between January 1, 2016 and June 22, 2016 (for Orbitz platform More

The post 880,000 payment cards, user info hit in Orbitz data breach appeared first on Help Net Security.


Friday Hack Chat: All About The Hackaday Prize Hackaday

For this weeks Hack Chat, were talking all about the Hackaday Prize. Our guests for this weeks Hack Chat are Alberto Molina and Elecia White.

Elecia White was a Hackaday Prize judge in 2015 and 2016, and shell be discussing what makes a standout entry from a judging perspective. Elecia is an embedded software engineer at Logical Elegance, Inc., author of Making Embedded Systems, and host of the podcast.

Alberto Molina won the Grand Prize of the 2016 Hackaday Prize with Dtto, an Open Source, self-reconfiguring rescue robot that Alberto is continuing to develop.  Alberto is an Electronic engineer who wants to design the next generation of robots and he will share his insights on putting together a fantastic entry for your project.

The Hackaday Prize is the greatest hardware competition ever. Its the Academy Awards of Open Hardware (and will remain so until we get a cease and desist). The Hackaday Prize is a competition where thousands of hardware hackers, makers, and artists compet...


Dotcoms Bid to Compel Obama to Give Evidence Rejected By High Court TorrentFreak

With former US president Barack Obama in New Zealand until Friday, the visit provided a golden opportunity for Kim Dotcom to pile on yet more pressure over the strained prosecution of both him and his defunct cloud storage site, Megaupload.

In a statement issued yesterday, Dotcom reiterated his claims that attempts to have him extradited to the United States have no basis in law, chiefly due to the fact that the online dissemination of copyright-protected works by Megauploads users is not an extradition offense in New Zealand.

Mainly, however, Dotcom shone yet more light on what he perceives to be the dark politics behind the case, arguing that the Obama administration was under pressure from Hollywood to do something about copyright enforcement or risk losing funding. He says they pulled out all the stops and trampled his rights to prevent that from happening.

In a lengthy affidavit, filed this week to coincide with Obamas visit, Dotcom called on the High Court to compel the former president to give evidence in the entrepreneurs retaliatory multi-billion dollar damages claim against the Kiwi government.

This morning, however, Chief High Court Judge, Justice Geoffrey Venning, quickly shut that effort down.

With Obama enjoying a round of golf alongside former Prime Minister and Dotcom nemesis John Key, Justice Venning declined the request to compel Obama to give evidence, whether in New Zealand during the current visit or via letter of request to judicial authorities in the United States.

In his decision, Justice Venning notes that Dotcoms applications were filed late on March 19 and the matter was only handed to him yesterday. As a result, he convened a telephone conference this morning to deal with the application as a matter of urgency.

Dotcoms legal team argued that in the absence of a Court order its unlikely that Obama would give evidence. Equally, given that no date has yet been set for Dotcoms damages hearing, it will not be practicable to serve Obama at a later point in the United States.

Furthermore, absent an order compelling his attendance, Obama would be unlikely to be called as a witness, despite him being the most competent potential witness currently present in New Zealand.

Dotcom counsel Ron Mansfield accepted that there would be practical limitations on what could be achieved between March 21 and March 23 while Obama is in New Zealand. However, he asked that an order be granted so that it could be ser...


Russian Astronauts Prepare to Bring the 'Internet of Animals' Online IEEE Spectrum Recent Content full text

The Icarus project will track tens of thousands of animals from the International Space Station Photo: iStock Photo

An ambitious project to keep an eye on thousands of animals and birds from space in a sort of Internet of Animals is getting ready to kick off.

In February, German researchers sent three large 200-kilogram antennas to the International Space Station (ISS) on a Soyuz rocket. The antennas joined a computer that had been sent up in October. These pieces will be the ears and brain of ICARUS, short for International Cooperation for Animal Research Using Space, an initiative funded by the Russian and German space agencies to track the movement of the smallest animalsbirds, turtles, fish, and even insectsand tap into swarm intelligence.

Icarus researchers will outfit animals with tiny sensor-laden tags that will send their data to the computer aboard the ISS, which will clean it up and beam it down to a smart, central database. Technically, its an Internet of Things via satellite, says project leader  Martin Wikelski  at the Max Planck Institute for Ornithology.

A bird with a sensor tag on it's leg Photo: MaxCine/MPI for Ornithology Radolfzel This bird is equipped with a sensor tag for the Icarus project.

Remote monitoring of animals isnt new. It has revealed songbird migration patterns, allowed scientists to map ocean floors, and helped wildlife authorities to catch poachers. But Icarus is animal-tracking on steroids. It will allow scientists to scan all corners of the Earth to collect astounding details on tagged animals and their environment. 

The idea is that this large amount of data will reveal global patterns in animal populations, allow scientists to precisely track movements and living conditions, and show why and how animals dieinformation which could help protect species. 

Animals could then, in turn, aid us. Researchers could use such data to monitor fisheries and other human food sources, unravel the origin and spread of disease like Ebola and avian flu, understand climate change, and...

Mesa 18.0-RC5 Released, Mesa 18.0 Should Finally Be Out On Friday Phoronix

Nearly one and a half months since Mesa 18.0-RC4 and nearly one month since last seeing any Git activity on the "18.0" Mesa Git branch, it's finally been updated today with the availability of Mesa 18.0-RC5...


Improved VGA_Switcheroo Going Into Linux 4.17 Phoronix

Google's Sean Paul has sent in the final drm-misc-next pull request to DRM-Next of new feature material for the upcoming Linux 4.17 kernel cycle...


The Difficult Birth of the Many Worlds Interpretation of Quantum Mechanics Lifeboat News: The Blog

Hugh Everett, creator of this radical idea during a drunken debate more than 60 years ago, died before he could see his theory gain widespread popularity.


3D Printed Magnetic Stirrer Could Hardly be Simpler Hackaday

If youve spent much time in a chemistry or biology lab, youve probably seen a magnetic stirrer. This is a little table that you put a beaker on. A little bar (often called a flea or a pill) goes in the solution and spins to stir the beakers contents. Simple versions are not that expensive, but nicer ones can cost a bit. [John] decided to build his own using 3D printing and the design is delightfully simple.

The electronics is nothing more than a PC fan, an off-the-shelf fan controller with a display, and a 3D printed bracket with some magnets. The flea is also 3D printed, although wed probably buy cheap commercial fleas since they are usually coated with Teflon or some other non-reactive substance. Depending on what you are stirring, the reactivity of your 3D printed plastic and its porosity could be a concern. In addition, a commercial flea has a pivot ring that helps it spin smoothly, although we are sure the 3D printed one will work in most cases.

The 3D printed parts are on Thingiverse. Using the fan as a motor makes things simple. The controller and fan plug together, so theres nothing to solder. If you do go with the 3D printed flea, [John] suggests using friction welding to seal the two halves, although you could use glue as long as you arent planning on stirring anything that would attack the glue.

Weve seen stirrers before but this one is cheap, easy, and looks good. This would be a great project for a school or home lab that already has a 3D printer. Some stirrers have hot plates integrated and depending on the plastic you use, this might be a good upgrade.


Stephen Hawking's Final Work and Interment at Westminster Abbey SoylentNews

Stephen Hawking's ashes to be interred near Sir Isaac Newton's grave

The ashes of Professor Stephen Hawking will be interred next to the grave of Sir Isaac Newton at Westminster Abbey, it has been revealed. The renowned theoretical physicist's final resting place will also be near that of Charles Darwin, who was buried there in 1882.

Stephen Hawking's Last Paper (Probably) Doesn't Prove We Live in a Multiverse

A few months before physicist Stephen Hawking died, he published a paper that several media outlets touted as a way to finally prove (or disprove) the existence of parallel worlds. But that claim may be a bit of cosmic inflation, said several physicists who were not involved in Hawking's research.

"The paper makes no statements about observational tests. It's not entirely uninteresting, but it's one of literally several thousand ideas for what might possibly have happened in the early universe" many of which include parallel worlds, said Sabine Hossenfelder, a physicist at the Frankfurt Institute for Advanced Studies in Germany, who blogs at

Sabine Hossenfelder's blog post: Hawking's "Final Theory" is not groundbreaking

A Smooth Exit from Eternal Inflation? (arXiv:1707.07702 [hep-th])

Read more of this story at SoylentNews.


RawTherapee 5.4 released

Version 5.4 of the RawTherapee image-processing tool is out. New features include a new histogram-matching tool, a new HDR tone-mapping tool, a number of user-interface and performance improvements, and quite a bit more.


Stable kernels 4.15.12 and 4.14.29

Greg Kroah-Hartman has released stable kernels 4.15.12 and 4.14.29. As usual, they contain important fixes and users of those series should upgrade.


Security updates for Wednesday

Security updates have been issued by CentOS (firefox), Debian (plexus-utils), Fedora (calibre, cryptopp, curl, dolphin-emu, firefox, golang, jhead, kernel, libcdio, libgit2, libvorbis, ming, net-snmp, patch, samba, xen, and zsh), Red Hat (collectd and rh-mariadb101-mariadb and rh-mariadb101-galera), and Ubuntu (paramiko and tiff).


Protecting Code Integrity with PGP Part 6: Using PGP with Git

Protecting Code Integrity with PGP Part 6: Using PGP with Git


AMD Posts Open-Source Driver Patches For Vega 12 Phoronix

It's been a while since last hearing anything about the rumored "Vega 12" GPU but coming out this morning are a set of 42 patches providing support for this unreleased GPU within the mainline Linux kernel...


Professor who harvested Facebook data says he's a scapegoat The Hill: Technology Policy

Professor Aleksandr Kogan says that the British data firm Cambridge Analytica and Facebook are using him as a scapegoat after reports that the firm harvested millions of peoples private Facebook information.My view is that Im being basically...


Buying Machine Tools: Foreign or Domestic, New or Used? Hackaday

The last time we discussed machine tools, we talked about how to choose the size of the new metalworking lathe that your wallet is itching to pour itself into. The next big decision to make is new or used? If youre in North America, this question has a lot of overlap with the classic question Import or American?. The answer boils down to what your needs are, and what you want to get out of this machine.

If you are new to machining, and want to learn the skills, I recommend starting with an Asian import machine. If youre careful which one you select, youll end up with a very reasonably priced lathe that can do precise work right out of the crate. If your interest is in learning how these tools work, and in doing a restoration project, an old American machine is a great choice. Lets look at these two routes in more detail.

Navigating the World of Asian Import Tools

Buying an Asian import can be challenging, because there are a lot of choices. To complicate matters, there are a lot of local-to-you resellers who import these machines, fix them up (or not), repaint them (or not), and resell them. Sometimes you get technical support and an English manual in the bargain, sometimes you dont.

Its tempting to look at machines from Little Machine Shop, Harbor Freight, or Grizzly, see that they all look identical, assume therefore that they come from the same factory in China, and are thus equivalent in all but price. Dont make that mistake! These resellers often have a deal with the factory to build their machines differently (better bearings, different bed treatments, etc), and some resellers refine the machines themselves after import. Research is key here.

You really do get what you pay for. If an identical-seeming machine is priced $400 higher at Precision Mathews over Grizzly, it may be because they upgraded the bearings or include a higher quality chuck. Contact the resellers, research online, and know what youre paying for.

Consider the Timeline for Outgrowing Your First Lathe



Supersensitive Accelerometer Could Be the Answer to Better Drone Control IEEE Spectrum Recent Content full text

Supercapacitor technology could make tiny accelerometers as much as 1 million times more sensitive Photo: Ezzat Bakhoum

Accelerometers are everywhere. Youve probably got at least one on your person right now. But todays run-of-the-mill accelerometersMEMS devices that measure a minute change in capacitancejust arent very sensitive. Theyre built to fit into smartwatches and smaller things, and that small size hampers how well they can sense changes. Engineers in Florida have now come up with a new take on the accelerometer that is as much as 1 million times as sensitive as a typical smartphone accelerometer, and it maintains that sensitivity up to a car-crash-scale 100 gs.

That combination of high sensitivity and large dynamic range in a cube thats just 3 millimeters on a side should make the new accelerometer particularly useful in things that move quickly in three-dimensions, such as military drones, microrobots, and self-guided projectile s, according its inventors.

Ordinary MEMS accelerometers are made up of a moveable plate and a stationary plate, oriented perpendicular to each dimension measured. Together, the plates form a capacitor. When the device accelerates, the moveable plate bends toward or away from the stationary plate, changing the capacitance. Because the plate cant move far, the change in capacitance is pretty small. This is why the sensitivity is extremely poor, says Ezzat G. Bakhoum, associate professor at the University of West Florida, in Pensacola.

Bakhoum is an expert in supercapacitors (also called ultracapacitors). These are devices that, like a battery, store much more energy than a capacitor. Yet they can charge and discharge quickly, like a capacitor. So it was a natural move to try to make capacitive accelerometers super.

Supercapacitors replace the capacitors plates with a high surface-area materialcarbon nanotubes in this case. Between the material is an electrolytetetraethylammonium tetrafluoroborate dissolved in propylene carbonate (an-off-the-shelf solution despite its impenetrable name). Supercapacitors store more energy because of the greater surface area and because charge is also stored in ions of the liqui...


Creating a Seamless Thread from Design to Manufacturing with the Machine Shop Digital Twin IEEE Spectrum Recent Content full text

The machine shop digital twin enables companies to achieve an automated manufacturing process using the latest technologies.

Part manufacturers in all industries are under tremendous pressure to shorten the delivery time of high-quality products, with increasing complexity. The Electronics Industry has its own unique challenges but one theme resonates for all; in order to stay ahead in todays competitive marketplace, companies must innovate their manufacturing processes. Issues like poor quality, excessive lead times, unreliable delivery, and high costs can be resolved by embracing todays technology improvements. With new technologies like 3D simulation and Additive Hybrid manufacturing, Digitalization is literally transforming this business. Passing along accurate data models and keeping the digital thread connected provides the necessary control, accuracy, and quality. As well as providing necessary insight and visibility needed to connect the dots between designers and suppliers.

Learn how to prepare your business to meet the new demands and discover how successful machine shops can quickly turn around perfect products when and where the customer needs them:

  • How to drive efficient end-to-end manufacturing operations with CAD, CAM and additive manufacturing
  • Learn how creating 3D model markups can help drive efficiencies by reusing the information in part creation and inspection.
  • Develop complex molds precisely and efficiently, all the way from product design to pre-processing and 3D printing, to part finishing and quality.
  • Reduce production costs by printing a wide range of high-quality functional parts

The machine shop digital twin enables companies to achieve an automated manufacturing process using the latest technologies. A digital thread connects the entire process ensuring seamless information flow from design to engineering to the shop floor.




Mars's Oceans May Have Been Older and Shallower Than Previously Thought SoylentNews

Mars' oceans formed early, possibly aided by massive volcanic eruptions

A new scenario seeking to explain how Mars' putative oceans came and went over the last 4 billion years implies that the oceans formed several hundred million years earlier and were not as deep as once thought.

[...] The new model proposes that the oceans formed before or at the same time as Mars' largest volcanic feature, Tharsis, instead of after Tharsis formed 3.7 billion years ago. Because Tharsis was smaller at that time, it did not distort the planet as much as it did later, in particular the plains that cover most of the northern hemisphere and are the presumed ancient seabed. The absence of crustal deformation from Tharsis means the seas would have been shallower, holding about half the water of earlier estimates.

"The assumption was that Tharsis formed quickly and early, rather than gradually, and that the oceans came later," Manga said. "We're saying that the oceans predate and accompany the lava outpourings that made Tharsis."

It's likely, he added, that Tharsis spewed gases into the atmosphere that created a global warming or greenhouse effect that allowed liquid water to exist on the planet, and also that volcanic eruptions created channels that allowed underground water to reach the surface and fill the northern plains.

Timing of oceans on Mars from shoreline deformation (DOI: 10.1038/nature26144) (DX)

Related: Evidence of Giant Tsunami on Mars Suggests an Early Ocean
Evidence of Sea Floor Hydrothermal Deposits Found on Mars
Ceres May Have Had a Global Surface Ocean in the Past

Original Submission

Read more of this story at SoylentNews.


U-Boot 2018.03 Released, Now Supports iSCSI For Network Booting Phoronix

As a win for ARM single board computers and other systems relying upon U-Boot as the bootloader, iSCSI support is now available...


Understanding email fraud: Do you have visibility into email threats? Help Net Security

82% of boards are concerned with email fraud, and 59% consider it a top security risk no longer just an IT issue. Yet 30% of respondents to a survey conducted by Censuswide cited a lack of executive support as a key challenge to email fraud protection deployment, according to Proofpoint. Email fraud is highly pervasive and deceptively simple; hackers dont need to include attachments or URLs, emails are distributed in fewer volumes, and typically More

The post Understanding email fraud: Do you have visibility into email threats? appeared first on Help Net Security.


Middle East oil and gas companies are unprepared to address OT cyber risk Help Net Security

Cyber security breaches in the Middle East are widespread and frequently undetected, with 30 percent of the regions attacks targeting operational technology (OT), finds a new study by Siemens and Ponemon Institute. The study, which examines the regions oil and gas sector, reveals that while firms have begun to invest in protecting their assets from cyber threats, more needs to be done to increase awareness and the deployment rate of technology if they are to More

The post Middle East oil and gas companies are unprepared to address OT cyber risk appeared first on Help Net Security.


From Measurement to Insight: Put DevOps Metrics to Work

When you can measure the results of your DevOps program, that's where the magic happens.

I recently sat down with Dr. Nicole Forsgren, CEO and Chief Scientist at DORA and co-author of the book Accelerate. Together we discussed the importance of DevOps and Agile, metrics that matter to the business, and how data-driven decisions can guide continuous improvement efforts. Here is an overview of our key conversation points:


Apportioning Blame When Robocars Have Accidents IEEE Spectrum Recent Content full text

The death of a pedestrian in Tempe, Ariz., sparks a blame game Image:

When a self-driving car is involved in an accident, the rush to judgment begins before the hubcaps stop rolling.

Was it the fault of the cars programmers? The fleet operator? The person in the car, or in the car in front of it, or on the bicycle next to it? How about the road regulatorsfederal, state, and local? 

The blame game played out on Monday, when news was published of an  accident the night before  that had claimed the life of a 49-year-old woman who was walking her bike across a street in Tempe, Ariz.

At first it was unclear who, if anyone, was at fault. Then, later in the day, Tempe Police Chief Sylvia Moir told the San Francisco Chronicle  that the cars own video record of the accident had led her to conclude, preliminarily, that the automated system and its professional minder probably did nothing wrong.

Its very clear it would have been difficult to avoid this collision in any kind of mode (autonomous or human-driven) based on how she came from the shadows right into the roadway," Moir said.

Then the wheel turned again, with Reuters reporting that police have backed away from Moirs statement on the grounds that determining fault is properly the job of the county prosecutor. The final say, though, goes to the National Transportation Safety Board (NTSB), which has opened an investigation. It may take quite some time before we have any results.

I dont think anyone outside the NTSB is qualified to look at the facts and make conclusions, says Alex Roy, an editor at large at and an award-winning rally race driver. I do think its outrageous that self-driving cars arent being treated the same way as commercial aircraft, with transparency of data.

Roy declined to cast blame on anyone involved in the accident. But take a cursory look at social media, and youll find plenty of observers who were quick to assert that self-driving cars had been given too free a rein on the open road. The charge has been most commonly leveled against Arizona, which has been among the...

Go Back:30 Days | 7 Days | 2 Days | 1 Day

IndyWatch Science and Technology News Feed Today.

Go Forward:1 Day | 2 Days | 7 Days | 30 Days

Wednesday, 21 March


AI deployments to drive investments in storage, networking, and cloud infrastructure Help Net Security

The race for making perfect hardware to accelerate artificial intelligence (AI) applications is heating up and many companies are jumping in with their products and solutions. According to a new report from Tractica, of the three key parts of hardware infrastructure compute, networking, and storage compute has made significant progress in the last couple of years. The other two areas, storage and networking, are lagging behind and have yet to see major innovations More

The post AI deployments to drive investments in storage, networking, and cloud infrastructure appeared first on Help Net Security.


AMD will release the patches for the recently discovered flaws very soon Security Affairs

AMD concluded its investigation on the vulnerabilities recently discovered by CTS Labs and announced that security patches will be released very soon.

AMD has finally acknowledged 13 critical vulnerabilities and exploitable backdoors in its Ryzen and EPYC processors that were first disclosed earlier March by the researchers at the security firm CTS Labs.

The CTS Labs researchers did not disclose any technical details about the vulnerabilities to avoid abuses in the wild.

The vendor plans to roll out firmware updates in the incoming weeks to address the flaws affecting millions of devices worldwide.

The flaws could be potentially exploited to steal sensitive data, install malicious code on AMD-based systems, and gain full access to the compromised systems. The flaws expose servers, workstations, and laptops running vulnerable AMD Ryzen, Ryzen Pro, Ryzen Mobile or EPYC processors to attacks.

CTS-Labs promptly reported the flaws to AMD, Microsoft and a small number of companies that could produce patches and mitigations.

The analysis conducted by the security experts revealed four classes (RYZENFALL, FALLOUT, CHIMERA, and MASTERKEY) of vulnerabilities affecting the AMD Zen architecture processors and chipsets that usually contain sensitive information such as passwords and encryption keys.

The flaw could allow to bypass AMDs Secure Encrypted Virtualization (SEV) technology and also Microsoft Windows Credential Guard.

AMD flaws

This week AMD published a press release trying to downplay the severity of the flaws.

Its important to note that all the issues raised in the research require administrative access to the system, a type of access that effectively grants the user unrestricted access to the system and the right to delete, create or modify any of the folders or files on the computer, as well as change any settings. reads the press release published by AMD. Any attacker gaining unauthorized administrative access would have a wide range of attacks at their disposal well beyond the exploits identified in this research. 

Differently from what has happened for Meltdown and Spectre attacks, AMD sustains that the patches it is going to release are not expected to impact system performance.

CTS Labs are skeptica...


Good Compliance Practices Are Good Engineering Practices

Ibrahim Haddad: It is true that open source software has to a large extent simplified the process of software procurement. The traditional procurement model for proprietary software has always been heavy on the front end, as it involves trial and evaluation, negotiation related to possible customizations, licensing terms, fees, and several other factors. With open source, it is still true that you should evaluate the software, compare it to other possible alternatives, and evaluate if the license of that software is in line with how you plan to use it.


Japanese Basket-Weaving Inspires "Kagome Metal" Material SoylentNews

Japanese basket pattern inspires new material

Researchers have produced a metal with exotic electrical properties by mimicking a pattern from Japanese basket-weaving.

Kagome baskets are characterised by a symmetrical pattern of interlaced, corner-sharing triangles; the pattern has preoccupied physicists for decades.

Metals resembling a kagome pattern on the atomic scale should exhibit peculiar electrical characteristics.

The team behind the first kagome metal has published details in Nature.

Their product is an electrically conducting crystal, made from layers of iron and tin atoms, with each atomic layer arranged in the repeating pattern of a kagome lattice.

When they passed a current across the kagome layers within the crystal, they found that the triangular arrangement of atoms induced strange behaviour in that current.

Instead of flowing straight through, electrons instead veered, or bent back within the lattice.

Trihexagonal tiling.

Massive Dirac fermions in a ferromagnetic kagome metal (DOI: 10.1038/nature25987) (DX)

Original Submission

Read more of this story at SoylentNews.


How To Shutdown/Restart Windows 10 Without Any Prompts TechWorm

Shutdown/Restart Windows 10 Without Any Prompts, Heres How

Does the Shutdown/Restart Anyway prompt that appear on your Windows screen irritate you? This could likely be due to a program or app that is preventing the shutdown process of your Windows system.

Dont worry! In this article, we will show how you can skip this prompt and auto end the tasks without any prompts on your Windows system.

Heres how you can shutdown Windows 10 without getting Shutdown Anyway or Restart Anyway prompts on your screen:

Step 1Open registry editor.

Press Win + R to open Run dialog. Type regedit and press Enter key.

How To Shutdown/Restart Windows 10 Without Any Prompts

Step 2: In registry editor, navigate to this key: HKEY_USERS\.DEFAULT\Control Panel\Desktop. On the right window of Desktop, create a new String Value named AutoEndTasks.

How To Shutdown/Restart Windows 10 Without Any PromptsHow To Shutdown/Restart Windows 10 Without Any PromptsHow To Shutdown/Restart Windows 10 Without Any Prompts

Then, click Edit > New > String Value.

Once done, type in AutoEndTasks and press Enter.



Co-founder of WhatsApp: 'It is time. #deletefacebook' The Hill: Technology Policy

The co-founder of messaging platform WhatsApp is calling for people to leave Facebook in the wake of a scandal involving the improper use of data for tens of millions of the social media giant's users.Brian Acton, who left WhatsApp in 2017...


Alphabet's Outline Software Lets Anyone Run a Homebrew VPN

A VIRTUAL PRIVATE network, that core privacy tool that encrypts your internet traffic and bounces it through a faraway server, has always presented a paradox: Sure, it helps you hide from some forms of surveillance, like your internet service provider's snooping and eavesdroppers on your local network. But it leaves you vulnerable to a different, equally powerful spy: Whoever controls the VPN server you're routing all your traffic through.


Rotary Electric Gun Might Not Put Your Eye Out, Kid Hackaday

This one is clearly from the its all fun and games until someone loses an eye file, and its a bit of a departure from [Make It Extreme]s usual focus on building tools for the shop. But whats the point of having a well-equipped shop if you dont build cool things, like this unique homebrew electric gun?

When we hear electric gun around here, we naturally think of the rail guns and coil guns we feature on a regular basis, which use stored electric charge to accelerate a projectile using electromagnetic forces. This gun is much simpler than that, using purely mechanical means to accelerate the projectiles. The heart of the unit is a machined aluminum spiral from an old scroll compressor, which uses interleaved orbiting spirals to compress gasses. This scroll was cut down to reduce its mass and fixed to a complex shaft assembly allowing it to spin up to tremendous speed with a powerful electric motor. A hopper feeds the marble-sized ammo into the eye of the scroll, which spits it out at high speed. Lacking a barrel, the gun can only spew rounds in the general direction of the target, but it makes up for inaccuracy with an impressive rate of fire 100 rounds downrange in two seconds. Its pretty powerful, too, judging by the divots in the sheet steel target in the video below.

Like all of [Make It Extreme]s build, a lot of effort went into this, and it shows. Their other fun builds of dubious safety include these electromagnetic wall climbers and these Go Go Gadget legs.


Austin Bombing Suspect Killed Himself in Explosion as SWAT Approached SoylentNews

Austin bomb suspect blows self up as SWAT team approached

The suspect in a spate of bombings that terrorized residents of Austin, Texas, died after detonating an explosive inside his vehicle as a SWAT team approached to apprehend him on the side of a highway, officials said.

Early Wednesday, authorities tracked the suspect a 24-year-old white man to a hotel in Round Rock, a city in the Austin metropolitan area, Austin Police Chief Brian Manley told a news conference early Wednesday.

They tracked his vehicle until it pulled over on Interstate 35 and the suspect "detonated a bomb inside the vehicle, knocking one of our SWAT officers back and one of our officers fired on the vehicle as well," Manley said.

Austin serial bombings.

Also at CNN, BBC, and Bloomberg.

Previously: Two Injured in Fourth Package Bombing Incident this Month in Austin, Texas

Read more of this story at SoylentNews.


SUEPO: Today May Be Your Last Chance to Demonstrate Against the Seriously Flawed Reforms That Mr Battistelli Has Imposed on EPO Staff Techrights

Exactly a month ago: Rumour: European Patent Office to Lay Off a Significant Proportion of Its Workforce

Battistelli penthouse
Be sure that Battistelli will be back at the EPO routinely; he didnt just blow money intended for a Dutch contractor in another country (for a different project) because a private pub is a priority for the Office (Battistelli appears to have developed an 'addiction' to wine)

Summary: Benot Battistelli will likely remain involved in EPO affairs for a long time to come (even through a fellow Frenchman, Campinos, whom he swaps two chairs with at the Office and CEIPI), but today is the last opportunity for EPO staff to march in protest against the Battistelli regime, which for the first time ever will result in major staff cuts and growing irrelevance for the Office

The next meeting of the Administrative Council will take place on 27 and 28 June in The Hague, the staff union of the EPO (SUEPO) reminded staff this morning. So unless you want to travel to The Hague, today may be your last chance to demonstrate against the seriously flawed reforms that Mr Battistelli has imposed and continues to impose (CA/3/18 contracts instead of permanent employment for all new recruits) on the EPO.

They try to sort of borrow from the future.What has happened at the EPO under Battistelli is rather horrific, with a sharp decline in human decency around 2014. If one looks at the underlying numbers, that is also around the time the Office lost technical edge and lost control. About an hour ago the EPOs PR people were alluding to something we wrote about several days ago. Its just another way for EPO management to stuff the numbers as revenue is down probably for (at least) the second year in a row. They try to sort of borrow from the future. We already wrote a great deal about the so-called results, even...


Java JDK 10 Reaches General Availability With Experimental Java-Based JIT Compiler Phoronix

JDK 10 has reached general availability as the first Java release under Oracle's new six-month release model...


Stem Cell Treatment for Macular Degeneration SoylentNews

Macular degeneration: 'I've been given my sight back'

Doctors have taken a major step towards curing the most common form of blindness in the UK - age-related macular degeneration.

Douglas Waters, 86, could not see out of his right eye, but "I can now read the newspaper" with it, he says. He was one of two patients given pioneering stem cell therapy at Moorfields Eye Hospital in London.

[...] Doctors have devised a way of building a new retinal pigment epithelium and surgically implanting it into the eye. The technique, published in Nature Biotechnology [DOI: 10.1038/nbt.4114] [DX], starts with embryonic stem cells. These are a special type of cell that can become any other in the human body. They are converted into the type of cell that makes up the retinal pigment epithelium and embedded into a scaffold to hold them in place. The living patch is only one layer of cells thick - about 40 microns - and 6mm long and 4mm wide. It is then placed underneath the rods and cones in the back of the eye. The operation takes up to two hours.

Related: British Man Receives World's First Bionic Eye Implant for Macular Degeneration
Stem Cell Therapy for Macular Degeneration: Conflicting Reports

Original Submission

Read more of this story at SoylentNews.


A flaw in Ledger Crypto Wallets could allow to drain your cryptocurrency accounts. Fix it! Security Affairs

Saleem Rashid, a 15-year-old researcher from the UK, has discovered a severe vulnerability in cryptocurrency hardware wallets made by the Ledger company.

Hardware wallets enable transactions via a connection to a USB port on the users machine, but they dont share the private key with the host machine impossible malware to harvest the keys.

Saleem Rashid has found a way to retrieve the private keys from Ledger devices once obtained a physical access to the device.

The researchers discovered that a reseller of Ledgers devices could update the devices with malware designed to steal the private key and drain the users cryptocurrency accounts when the user will use it.

Giving a close look at the Ledgers hardware device, Saleem Rashid discovered that they include a secure processor chip and a non-secure microcontroller chip. The nonsecure chip is used for different non-security tacks such as displaying text on the display. The problem ties the fact that the two chips exchange data and an attacker could compromise the insecure microcontroller on the Ledger devices to run malicious code in stealth mode.

Even is Ledger devices implement a way to protect the integrity of the code running on them, the expert developed a proof-of-concept code to bypass it and run malicious code on the products.

nano s ledger wallet

The PoC code was published along with the official announcement from Ledger about the availability of a new firmware update that addresses the vulnerability.

Youre essentially trusting a non-secure chip not to change whats displayed on the screen or change what the buttons are saying, Rashid told to the popular cyber security expert Brian Krebs. You can install whatever you want on that non-secure chip, because the code running on there can lie to you.

Rashid published a resea...


A drug to slow spread of dementia could be available in three years Lifeboat News: The Blog

A drug to slow the spread of dementia could be available in three years and a vaccine that prevents the disease within a decade, experts say.

  • It is now a matter of when not if a cure will be found for Alzheimers
  • Last year dementia became Great Britains number one cause of death
  • Existing drugs for Alzheimers only treat the symptoms, not causes

By Colin Fernandez for the Daily Mail


AMD To Issue PSP/BIOS Firmware Updates For Recent Vulnerabilities Phoronix

Last week was the controversial publishing of the "AMD Flaws" CPU vulnerabilities for Ryzen and EPYC processors. AMD has now issued their first public update on the matter and have said they will be issuing PSP firmware and BIOS updates for mitigation...


Kubernetes: The Distributed Linux of the Cloud

Kubernetes is the first CNCF project to graduate this means it is mature and resilient enough to manage containers at scale across any industry in companies of all sizes. We talked with Chris Aniszczyk, COO of CNCF about Kubernetes popularity, whats next for this technology and what other projects are in line for graduation.


Lawmakers zero in on Zuckerberg The Hill: Technology Policy

Mark Zuckerberg is drawing intense scrutiny from lawmakers demanding that the Facebook founder testify to Congress about the Cambridge Analytica controversy.Facebooks data practices are under the microscope like never before following a report that...


DXVK Now Has An On-Disk Shader Cache Phoronix

DXVK, the exciting project implementing the Direct3D 11 API over Vulkan for Wine gamers, now has an on-disk shader cache...


Slax Linux Distribution Begins Planning For Its First 2018 Release Phoronix

Arriving last Christmas was a rejuvenated release of Slax, the long-running, lightweight Linux distribution with its development restarting last year and having shifted from being a Slackware derivative to Debian and moving from KDE to Fluxbox+Compton. Those involved are working on a new Slax release for 2018...


Freedreno's MSM DRM Driver Continues Prepping For Adreno 600 Series Support Phoronix

Rob Clark has submitted the MSM DRM driver changes to DRM-Next for the Linux 4.17 kernel for benefiting Qualcomm SoC owners...


Online Piracy Is More Popular Than Ever, Research Suggests TorrentFreak

Despite the growing availability of legal options, online piracy remains rampant. Every day pirate sites are visited hundreds of millions of times.

Piracy tracking outfit MUSO has documented the piracy landscape with data from tens of thousands of the largest global piracy sites.

In its latest report, the company recorded more than 300 billion visits to pirate sites last year alone. This is an increase of 1.6 percent compared to 2016.

More than half of all these visits (53%) are going to streaming sites, making that the most popular piracy tool. Torrent sites and direct download portals still have a significant user base, but follow at a respectable distance.

Most of the pirate visits came from the United States, followed by India and Brazil. Despite the various pirate site blockades, the UK also secured a spot in the top ten, ranked at the bottom with nine billion visits.

The top ten list favors large countries and with this in mind, there is a large player missing. China, which is often portrayed as a country where piracy is rampant, ended up in 18th place with only 4.6 billion visits.

Visits per country
# Country Billion visits
Data from Muso
1 United States 27.9
2 Russia 20.6
3 India 17.0
4 Brazil 12.7
5 Turkey 11.1
6 Japan 10.6
7 France 10.5
8 Indonesia 10.4
9 Germany 10.2
10 United kingdom 9.0

Muso tracks piracy trends across various media categories and has spotted some interesting trends. TV-shows remain the most popular among pirates with 106.9 billion visits last year, followed by music (73.9 billion) and film (53.2 billion).

Mobile piracy is on the rise as well. For the first time, more people were accessing pirated TV content via mobile devices (52%) where desktops used to be...


Hackadays Irish Excursion is on 7 April Hackaday

Try something a bit out of the ordinary with us on 7 April. Spend a Saturday with Hackaday in Dublin without really knowing what to expect. This is the Unconference format, and weve fallen in love with the spontaneity and consistently fascinating talks that come out of it.

Weve booked a fantastic hall in the Temple Bar district of Dublin, lined up snacks throughout the day and dinner for all who attend, plus theres an after bar and well buy the first round. All of this is yours if you grab one of the rapidly disappearing free tickets.

What we ask of you is to come prepared to give a 7 minute talk on something youre really excited about right now. This is low-pressure; the point of an Unconference is to learn about what people are working on right now (not to see a 40 minute talk that was polished over several months). There will not be enough time for absolutely everyone to speak but well get through as many as we can and make sure theres an interesting mash-up of topics throughout the day.

To break the ice, we have a few ringers who weve asked to lead off each talk session. Beth pidge Flanagan is an embedded and Linux expert who is well-known for her work on OpenEmbedded and Yocto and will talk about how the sausage is made specifically surrounding some advance metering infrastructure. Rachel Konichiwakitty will be speaking. Rachel was at our London Unconference back in September and were excited to hear about the stem cell research shes been doing as part of her Ph.D. work. James Twomey will be on hand to go into some of the craft of stage magic, and also talk about what we can learn from the battery-free magic of crystal set radios like the foxhole radios built during WWII.



Enhanced FTP

LFTP is an alternative to the FTP command set, which supports many protocols and offers countless parameters.

Although pretty much outdated, the File Transfer Protocol (FTP) still plays a significant role. For 20 years, LFTP has offered a greatly expanded command set for the command line that handles secure transmissions, without being excessively difficult to handle.


NVIDIA's Jetson TK1 Is Being EOL'ed Next Month Phoronix

Easily one of our favorite ARM single-board computers ever, the Jetson TK1 from NVIDIA, will be facing retirement next month...


The politics of innovation Lifeboat News: The Blog

Innovation is the latest social, political and economic battleground. Techno-optimists dismiss fears about innovation, typecasting non-believers as Luddites. The impact of recent technological changes, they believe, will be realised over time. Luddites, on the other hand, point to weaknesses in technology.

Policymakers are placing their faith on technological advancements to boost flagging growth. But it is founded more on hope than reality.

By Satyajit Das


Google Skaffold Automates Kubernetes Orchestration

Google is throwing an automation tool to developers looking to use Kubernetes to orchestrate enterprise applications.


SWSW, social credit, and the right to be forgotten Gregarious Mammal

In our latest episode, Chris reports back from SXSW and we talk about interesting articles from the week including the creation of the internet, China's efforts at social credit, the 'right to be forgotten' and more.



A team of scientists and medieval historians, led by the University of Cambridge, has used information contained within ice cores and tree rings to accurately date a massive volcanic eruption, which took place soon after the island was first settled. Having dated the eruption, the researchers found that Iceland's most celebrated medieval poem, which describes the end of the pagan gods and the coming of a new, singular god, describes the eruption and uses memories of it to stimulate the Christianisation of Iceland. The results are reported in the journal Climatic Change.

The Eldgj eruption: timing, long-range impacts and influence on the Christianisation of Iceland (open, DOI: 10.1007/s10584-018-2171-9) (DX)

Original Submission

Read more of this story at SoylentNews.


AMD Acknowledges Newly Disclosed Flaws In Its Processors Patches Coming Soon The Hacker News

AMD has finally acknowledged 13 critical vulnerabilities, and exploitable backdoors in its Ryzen and EPYC processors disclosed earlier this month by Israel-based CTS Labs and promised to roll out firmware patches for millions of affected devices in the coming weeks. According to CTS-Labs researchers, critical vulnerabilities (RyzenFall, MasterKey, Fallout, and Chimera) that affect AMD's


Building a Static Grass Applicator Hackaday

A Static Grass Applicator is very specialized tool used by model makers to create realistic grass. Dont feel bad if you didnt know that, neither did we. Anyway, the idea is that you distribute a fine filament over the surface, and then use static electricity to make the blades of grass stand up vertically. This is a huge improvement over the old school method of manually placing the grass on the model, but the tool itself is somewhat expensive, at least for a decent one.

But thanks to avid modeler [Luke Towan], those looking to up their diorama game without breaking the bank now have a fantastically detailed guide on building their own grass applicator that is not only fairly cheap (as little as $20 USD depending on what your part bins look like), but is robust enough to last for years of service.

The heart of the device, and probably the only part youd need to go out and buy especially for this project, is a small 12V negative ion generator. This is used to setup an electric charge between the grid of the applicator and a long wire that gets attached to the piece youre working on. What little wiring there is simply provides a switch and some status LEDs. The design [Luke] has come up with lets the user switch between and internal 9V battery for portability, o...


5 Types of Content Calendar and Social Media Planning Sydney Australia Course 2018 Social Network by Laurel Papworth

Here are the 5 types of social media planners you need. Depending on your organisation you may want different sections, different colour coding or completely different calendars:

Most people know content calendars for social media. This is content YOUR create. Earned Attention.
Social Media Outcome: Build Awareness

Promotions is Bought Attention. Through ads or free ebooks and downloads or perhaps a competition or some other way to get email signups or sales or promotions.
Social Media Outcome: Call to Action (CTA)

Engagement planning is deciding you want more comments and likes and replies and planning for it. Comment calendars or AMAs (Ask me anything, also called Town Hall).
Social Media Outcome: More engagement and better algorithm outcomes on Facebook, Instagram etc.

Sometimes the best marketing is outbound PR (Influencers talking to their audience instead of you purely building your own). Create collaboration teams and tag/share!
Social Media Outcome: improved Reach into the non-Direct channel

Looking back is as important...


Unsubscribe - Re: ES2018-05 Kamailio heap overflow Bugtraq

Posted by Gary Frank on Mar 21


Thanks, Gary
Sent from my iPhone


Unsubscribe - Re: CSNC-2017-026 Microsoft Intune - Preserved Keychain Entries Bugtraq

Posted by Gary Frank on Mar 21


Thanks, Gary
Sent from my iPhone


Windows Remote Assistance flaw could be exploited to steal sensitive files Security Affairs

A critical flaw in the Windows Remote Assistance tool allows someone you trust to take over your PC so they can help you fix a problem, and vice-versa.

A critical vulnerability in Microsofts Windows Remote Assistance (Quick Assist) feature affects all versions of Windows to date, including Windows 10, 8.1, RT 8.1, and 7. The flaw could be exploited by a remote attacker to steal sensitive files on the targeted machine.
Windows Remote Assistance tool allows someone you trust to take over your PC so they can help you fix a problem, and vice-versa.

The Windows Remote Assistance feature relies on the Remote Desktop Protocol (RDP) to establish a secure connection with the person in need.

Trend Micro Zero Day Initiative researchers Nabeel Ahmed discovered an information disclosure vulnerability in Windows Remote Assistance tracked as CVE-2018-0878. An attacker can trigger the flaw to obtain information to further compromise the victims system.
Microsoft fixed the vulnerability this month with the patch Tuesday, the issue resides in the way Windows Remote Assistance processes XML External Entities (XXE).

The CVE-2018-0878 vulnerability affects Microsoft Windows Server 2016, Windows Server 2012 and R2, Windows Server 2008 SP2 and R2 SP1, Windows 10 (both 32- and 64-bit), Windows 8.1 (both 32- and 64-bit) and RT 8.1, and Windows 7 (both 32- and 64-bit).

Nabeel has also released online technical details and a proof-of-concept exploit code for the vulnerability.

The attacker can use the Out-of-Band Data Retrieval attack technique to exploit this vulnerability that resides in MSXML3 parser. The attacker offers the victim access to his computer via Windows Remote Assistance.

To set up a Windows Remote Assistance connection the attacker can:

  • Invite someone to help him;
  • Respond to someone who needs help.

When you invite someone to help you, an invitation file is generated (i.e. invitation.msrcincident) which contains XML data used for authentication.

In the following table are reported the parameters included in the request.



Rocket Lab's Humanity Star Cast Out of the Heavens SoylentNews

Humanity Star to reach fiery doom earlier than expected

Rocket Lab's Humanity Star is expected to reach a fiery doom much earlier than expected.

The 8kg carbon fibre geodesic sphere with 65 reflective panels, which resembled a disco ball, was shot into orbit from the Mahia Peninsula on January 21 on board Rocket Lab's Electron rocket.

The launch also carried small satellites into the Earth's orbit for US companies Planet Labs and Spire Global.

It was expected the Humanity Star would be one of the brightest objects in the night sky for nine months, but satellite-tracking website Satview reported on Wednesday that it will re-enter the Earth's atmosphere and disintegrate at 3am on Friday.


Previously: Rocket Lab's Electron Rocket Launched "Humanity Star", a Temporary Source of Light Pollution

Original Submission

Read more of this story at SoylentNews.


[SECURITY] [DSA 4146-1] plexus-utils security update Bugtraq

Posted by Moritz Muehlenhoff on Mar 21

Debian Security Advisory DSA-4146-1 security () debian org Moritz Muehlenhoff
March 20, 2018

Package : plexus-utils
CVE ID : CVE-2017-1000487


18:08 Is Dead, Here Are Top 3 Alternatives TechWorm has shut down, the best 3 alternative free movie streaming websites similar to it

Ever since it arrived on the scene, Alluc has been the popular free search engine for streaming and downloading links online. Now, after 13 years, Alluc has discontinued its search engine on March 8, 2018.

For those unaware, Alluc is a free search engine for streaming links. It does not host any content itself nor contains any download links. However, it directly provides links to streaming video sharing websites that are made available and viewable through its own search. It has 80 million streaming links to more than 700 video services. Alluc, which sold itself as the premier streaming link site was loved not only for offering wide variety of content but also for magnificent search that allowed users to find streaming links to nearly everything, from old movies to the latest hit series. It had more than a billion unique visitors over the past decade.

With the shutting down of Alluc, all links on the site now no longer work. The people behind the site, which was regularly used by pirates, say they will concentrate on other projects instead.

A message posted on the sites homepage reads as follows,

The alluc search engine has been discontinued.

After 13 years of alluc, we decided to take a break and focus on other projects. Over this last decade alluc served more than one billion unique users in total and we would like to thank all of you for your support over the years.

The search engine framework we created from scratch for alluc lives on with the guys over at, the biggest porn search engine in existence!

PS: Any other sites using alluc in their name are not run by us.

It is still unclear as to why Alluc has decided to shut shop after 13 years. Similar websites in the past too have shut down due to decline in revenue, but that is not the case with Alluc, reports TorrentFreak.

The decision was not driven by monetary reasons. We started alluc when we were still in high-school and it became into something bigger and better than we could have ever imagined when we started it, Allucs Sebastian told TorrentFreak.

But now its time for us to move on. We hope to have contributed a lot to the video space and to have helped out a lot of people during these 13 years of running alluc full time.

Always looked upon as a pirate site by movie industry for providing both authorized and unauthorized content, Alluc always rejected the pirate label. It saw itself as an uncensored search engine and they still see a future for similar services.

There will always be a future for uncensored search and I hope us shutting down alluc can help to create the vacuum needed to incentivi...


AMD Confirms Ryzen Chip Vulnerability, Wants Investigation into Stock Trading SoylentNews

AMD confirmed all thirteen Ryzen and EPYC chip exploits unveiled by CTS-Labs, which will be patched within weeks.

AMD has responded to the reports last week of a range of security flaws affecting its Platform Security Processor (PSP) and chipset. The company acknowledges the bugs and says that, in coming weeks, it will have new firmware available to resolve the PSP bugs. These firmware fixes will also mitigate the chipset bugs.

Israeli firm CTS identified four separate flaw families, naming them Masterkey (affecting Ryzen and Epyc processors), Ryzenfall (affecting Ryzen, Ryzen Pro, and Ryzen Mobile), Fallout (hitting only Epyc), and Chimera (applying to Ryzen and Ryzen Pro systems using the Promonotory chipset).

[...] AMD's response today agrees that all four bug families are real and are found in the various components identified by CTS. The company says that it is developing firmware updates for the three PSP flaws. These fixes, to be made available in "coming weeks," will be installed through system firmware updates. The firmware updates will also mitigate, in some unspecified way, the Chimera issue, with AMD saying that it's working with ASMedia, the third-party hardware company that developed Promontory for AMD, to develop suitable protections. In its report, CTS wrote that, while one CTS attack vector was a firmware bug (and hence in principle correctable), the other was a hardware flaw. If true, there may be no effective way of solving it.

[...] The striking thing about the bugs was not their existence but rather the manner of their disclosure. CTS gave AMD only 24 hours notice before its public announcement that it had found the flaws. Prior to reporting the problems to AMD, CTS also shared the bugs, along with proofs of concept, with security firm Trail of Bits so that Trail of Bits could validate that the bugs were real and could be exploited the way that CTS described. While the computer security industry has no fixed, rigid procedure for disclosing bugs to vendors, a 90-day notice period is far more typical.

This short notice period led Linux creator Linus Torvalds to say that CTS' report "looks more like stock manipulation than a security advisory."

This perception wasn't helped when short-seller Viceroy Research (which claims to have no relationship with CTS) said that the flaws were "fatal" to AMD and, that its share price...


Expedia's Orbitz Says 880,000 Payment Cards Compromised in Security Breach The Hacker News

Chicago-based online travel booking company Orbitz, a subsidiary of Expedia, reveals that one of its old websites has been hacked, exposing nearly 880,000 payment card numbers of the people who made purchases online. The data breach incident, which was detected earlier this month, likely took place somewhere between October 2016 and December 2017, potentially exposing customers' information


Icoboard Software Defined Radio Platform Hackaday

The Icoboard is a plug-in for the Raspberry Pi with a Lattice iCE FPGA onboard. Combined with a cheap A/D converter, [OpenTechLab] build a software-defined radio using all open source tools. He found some inexpensive converters that cost about $25 and were fast enough (32 MHz) for the purpose at hand. The boards also had a digital to analog converter and he was able to find the data sheets. You can see a video with the whole project covered, below.

The video, by the way, is pretty extensive (about an hours worth) and covers the creation of a PC board to connect from the Icoboard to the converters. Theres also a 3D printed frame, and thats explained in detail as well.

One thing that isnt covered yet is actually doing software defined radio with the hardware. The test setup takes a signal on the input side of one converter, feeds it to the FPGA and the FPGA simply mimics it back via the digital to analog converter. That works, so the rest as they say, is mere details.

We are sure [OpenTechLab] will have more videos that start using this platform. There are two previous videos that cover setting up the Icoboard, if you need those. Of course, weve talked about the iCE FPGAs quite a bit. You might want to read our basic tutorials to get you started. After that, you can learn how to make a PWM generator with the device.


U.S. Bans Venezuela's Cryptocurrency SoylentNews

U.S. bans transactions with Venezuela's digital currency

President Donald Trump on Monday signed an executive order barring any U.S.-based financial transactions involving Venezuela's new petro cryptocurrency, as U.S. officials warned that it was a "scam" by President Nicolas Maduro's government to further undermine democracy in the OPEC country.

"The 'petro' is a desperate effort by a corrupt regime to defraud international investors," a senior U.S. administration official told reporters, strongly warning that any transactions in the petro digital currency would violate U.S. sanctions. "Investing in the 'petro' should be viewed as directly supporting this dictatorship and its attempts to undermine the democratic order in Venezuela," the official added.

Trump's order bars "all transactions related to, provision of financing for, and other dealings in, by a United States person or within the United States, any digital currency, digital coin, or digital token," issued by Venezuela's government since Jan. 9, the White House said in a statement.

Also at the New York Times.

Previously: Enter the "Petro": Venezuela to Launch Oil-Backed Cryptocurrency

Original Submission

Read more of this story at SoylentNews.


Targeting levels of specific protein could improve memory in aging, reduce symptoms of PTSD Lifeboat News: The Blog

A neural circuit mechanism involved in preserving the specificity of memories has been identified by investigators from the Massachusetts General Hospital (MGH) Center for Regenerative Medicine and the Harvard Stem Cell Institute (HSCI).

They also identified a genetic switch that can slow down #memory generalization the loss of specific details over time that occurs in both age-related memory impairment and in post-traumatic stress disorder (#PTSD), in which emotions originally produced by traumatic experiences are elicited in response to innocuous cues that have little resemblance to the traumatic memory.

The circuit mechanism we identified in mice allows us to preserve the precision or the details of memories over the passage of time in adult as well as aged animals, says Amar Sahay of the MGH Center for #Regenerative Medicine and HSCI, corresponding author of a paper appearing in Nature Medicine. These findings have implications for the generalization of traumatic memories in PTSD and for memory imprecision in...


Why Forests Give You Awe - Facts So Romantic Nautilus

When you walk in a tropical forest, the sheer abundance and variety of life can have a powerful and somewhat disorienting effect.Painting by Caspar David Friedrich (circa 1820-1821) / Wikicommons

Can you remember the time when you first felt awe, that feeling of being in the presence of something immense and mind-blowing? The natural worldwith its domineering mountains, colossal trees, and tall waterfallsis one of its main sources. I felt awe first when I was a young boy at the feet of the biggest tree in the world. I felt it next as a young man, when I walked in a tropical rainforest for the first time, in Sri Lanka. Heres how I described it in my 2016 book Gods, Wasps and Stranglers: The Secret History and Redemptive Future of Fig Trees:

It hugged all it contained in a humid, humming gloom. The trees towered over us, viscerally alive yet so alien to our animal ways. Their breath sweetened the air we inhaled. It is hard to explain, but I could feel the concentration of life around me, as if its great density there had somehow reached into me physically. What struck me was the
Read More


Xilinx 7nm FPGA SoC SoylentNews

Xilinx Announces Project Everest: The 7nm FPGA SoC Hybrid

This week Xilinx is making public its latest internal project for the next era of specialized computing. The new product line, called Project Everest in the interim, is based around what Xilinx is calling an ACAP an Adaptive Compute Acceleration Platform. The idea here is that for both compute and acceleration, particularly in the data center, the hardware has to be as agile as the software. Project Everest will combine Xilinx's highest performing next-generation programmable logic along with application processors, real-time processors, programmable engines, RF, high-speed SerDes, programmable IO, HBM, and a custom network-on-chip. The idea is that space typically devoted to hard blocks in FPGAs (such as memory controllers) are now optimized on chip, leaving more programmable silicon for the compute and adaptability. Project Everest is one of the Three Big Trends as identified by Xilinx's new CEO, Victor Peng.

[...] Xilinx's ACAP portfolio will be initiated with TSMC's 7nm manufacturing process, with the first tapeouts due in late 2018. Xilinx states that Project Everest has been a monumental internal effort, taking 4-5 years and 1500 engineers already, with over $1b in R&D costs. The final big chips are expected to weigh in at 50 billion transistors, with a mix of monolithic and interposer designs based on configurations.

Today's announcement is more of a teaser than anything else the diagram above is about the limit to which that Xilinx will talk about features and the product portfolio. The value of the ACAP, according to Xilinx, will be its feature set and millisecond-level configurability. For a server on the edge, for example, an ACAP can use both the programmable logic elements for millisecond bitstream reconfiguration of different processes along with the application processors for general logic or the programmable engines as ASIC-level acceleration. This can lead to, among other things, different AI acceleration techniques and 5G RF manageability by multiple containers/VMs on a single ACAP. The overriding idea is that the ACAP can apply dynamic optimization for workloads, with Xilinx citing a 10-100x speedup over CPUs and more use cases than GPUs or ASICs as a fundamental value to the new hardware, built through software and hardware programmability. Xilinx also stated that the RF will have four times the bandwidth of current 16nm radios, leveraging 16x16 800 MHz radios.

Also at The Register and...


Drugs to vaccinate over-50s against Alzheimers could be here in a decadewith a 9bn price tag Lifeboat News: The Blog

D rugs to vaccinate everyone over the age of 50 against Alzheimers could be available within 10 years, but would cost the NHS 9 billion, a new report has shown.

New analysis commissioned by Alzheimers Research UK found that drugs to halt, slow or reverse the disease could be available in as little as three years with major vaccine and screening programmes possible within a decade.

But dementia experts warned that demand from patients would be instant and huge and called on the NHS to act now to make sure funds were in place for when the breakthroughs occurred.


Make A Steam Cleaner From A Broken Clothes Iron Hackaday

As the old saying goes, when life gives you a broken iron, make a steam cleaner. Or something like that. Anyway, [Claudio] from [Accidental Science] had a clothes iron with a broken head that he decided to adapt into a steam blower that can be used to clean PCBs, glassware, degreasing parts or cleaning stains off the couch.

[Claudio] covers everything from tearing down the broken iron to crafting a new tip that avoids problems with water droplets condensing on the brass tip that he used first. After salvaging the switch in the head that controls the steam, he carved a wooden handle that is soaked and coated with high-temperature resin. The hot end was then reinstalled, and the whole thing put together.

This build should be approached with some caution, though: anything that mixes high-pressure steam with electricity has the potential to go wrong in unpleasant ways, so be careful out there.


Scientists aim to use lasers to turn light into matter Lifeboat News: The Blog

Scientists at Imperial College London are attempting to use powerful lasers turn light into matter, potentially proving the 84-year-old theory known as the Breit-Wheeler process. According to this theory, it is technically possible to turn light into matter by smashing two photons to create a positron and an electron. While previous efforts to achieve this feat have required added high-energy particles, the Imperial scientists believe they have discovered a method that does not need additional energy to function. This would be a pure demonstration of Einsteins famous equation that relates energy and mass: E=mc2, which tells us how much energy is produced when matter is turned to energy, explained Imperial Professor Steven Rose. What we are doing is the same but backwards: turning photon energy into mass, i.e. m=E/c2.


New material capable of detecting dark matter, scientists say Lifeboat News: The Blog

March 20 (UPI) Scientists believe a new material, known as a scintillator, will expand the search for dark matter.

New analysis suggests the scintillator material is sensitive to dark matter particles with less mass than a proton, which should allow scientists to look for dark matter among a previously unexplored mass range.

Weakly interacting massive particles, or WIMPs, describe dark matter particles with a mass greater than that of a proton. Scientists have tried to directly detect WIMPs using a variety of strategies, but with no success.


The worlds oldest working planetarium Lifeboat News: The Blog

Dutch amateur astronomer Eise Eisinga might have left school at 12 years old, but he built an inch-perfect model of the solar system in his living room.


So much for spring: Another historic storm is coming to paralyze the East Coast Lifeboat News: The Blog

A foot or more of snow could fall in the 4th noreaster in just 3 weeks, from Washington to Boston.


U.K. doctors use stem cells to restore patients eyesight Lifeboat News: The Blog

Researchers in the United Kingdom used stem cells to treat two people with age-related macular degeneration.


Tradewind Bioscience attacks the physiology of tumors to treat cancer Lifeboat News: The Blog

Cancer remains the one counterpoint to the march of medical progress that has scored human history over the last 200 years.

Last year 600,920 people in the U.S. died from cancer, and another 1.7 million received an initial diagnosis of the disease. Globally, one in six people die from cancer, according to the World Health Organization.

In the past decade, research in the field has expanded the possible treatments of the disease from surgery (which was the only option until the 20th century), radiotherapy, chemotherapy and hormonal therapy.


#DeleteFacebook Trending in Response to Cambridge Analytica Accusations SoylentNews

#DeleteFacebook trends in response to Cambridge Analytica

We all moved on from MySpace. We can move on from Facebook too." This was a typical message found on Twitter in the wake of accusations over Cambridge Analytica using personal data from 50 million Facebook users to influence the US presidential election in 2016. After reports of Cambridge Analytica using Facebook's user information came to light, people began to urge others to either #DeleteFacebook or #BoycottFacebook in response.

[...] A spokeswoman for Privacy International warned that privacy concerns extend beyond Facebook as "your data is being exploited all the time". A person on the technology subsection of Reddit agreed, saying removing Facebook "doesn't solve the long term problem [because] consent to data use is very weakly protected online right now". And one Twitter user seeking regulation of Facebook said having the ability to delete an account is "a privilege".

This is a campaign we can all get behind, regardless of your position on election interference and influences.

Previously: The Cambridge Analytica Files

Original Submission

Read more of this story at SoylentNews.


The Puzzle Of Quantum Reality Lifeboat News: The Blog

13.7: Cosmos And Culture Despite the incredibly accurate predictions of quantum theory, theres a lot of disagreement over what it says about reality or even whether it says anything at all about it, says guest Adam Becker.


This Weeks Hype Not Even Wrong

Many thanks to Sabine Hossenfelder for her efforts to debunk the attempt to use Hawkings death as a platform for multiverse hype. See her posting at Backreaction for a good explanation of what is going on here.

To summarize the problem, there are loads of news stories out there telling the public that Stephen Hawkings breathtaking final multiverse theory completed two weeks before he died, Stephen Hawkings Final Paper Proposes Way to Detect the Multiverse, etc., etc. Cosmologist Carlos Frenk and theorist Thomas Hertog seem to be among those encouraging this nonsense.

This is all based on this recent paper by Hawking and Hertog, which contains nothing like a way to detect the Multiverse'. Its a toy model of bubble universe formation, one the authors admit they cant even solve:

However, the setup we have considered does not allow us to describe the transition from the quantum realm of eternal inflation to a universe in the semiclassical gravity domain. This is because our duals are defined in the UV and live at future infinity. It therefore remains an open question whether the conjectured smoothness of global constant density surfaces impacts the eternity of eternal inflation. To answer this will require a significant extension of holographic cosmology to more realistic cosmologies

Their calculations inspire them to state: we conjecture that eternal inflation produces universes that are relatively regular on the largest scales, but this is just an extremely vague conjecture without much backing it. Using it to get press stories published claiming to have found a way to detect the Multiverse' is just absurd, and its sad to see Hawkings passing memorialized with a cloud of ridiculous hype.


NEW 'Off The Wall' ONLINE 2600 - 2600: The Hacker Quarterly

NEW 'Off The Wall' ONLINE

Posted 21 Mar, 2018 0:28:32 UTC

The new edition of Off The Wall from 20/03/2018 has been archived and is now available online.


SXSW Part 1- Blockchain and SpaceTech Gregarious Mammal

We hear promises of how blockchain will revolutionize tech, but most of its applications thus far seem rather mundane. Read on to see what devs are doing to change that.

HPR2513: Why I choose Aperture first Hacker Public Radio

David Whitman encourages you to choose Aperture as the most important setting in setting up your camera. Understanding Exposure, 3rd Edition by Bryan Peterson - a good book that is great for learning photography. Duck Duck Go can connect you with a place to buy this book. David's cache of BAD Photos mostly of Hunt Dogs (some cute girls with dogs too) Aperture - ISO - Shutter Speed - Have some fun. Take some photos and do a HPR episode.


Overnight Tech: Lawmakers zero in on Zuckerberg | AT&T, DOJ preview trial arguments | First lady vows to tackle cyberbullying The Hill: Technology Policy

LAWMAKERS FOCUS ON ZUCKERBERG: Mark Zuckerberg is facing bipartisan pressure to testify before Congress following reports that 50 million Facebook users had their data compromised by Cambridge Analytica, a political research firm tied to the...


Yale Study: Sad, Lonely Introverts Are Natural Born Social Psychologists SoylentNews

Submitted via IRC for Bytram

[...] The authors asked more than 1.000 subjects about how people think, act, and feel in social contexts. The two psychologists began the survey [...] by asking: Can you accurately infer how most people feel, think, and behave in social context? Gollwitzer and Bargh did a series of experiments to try and identify traits of those who accurately answered the questions.

[...] The key predictors of social psychological skill were the willingness to tackle a complex problem and cognitive ability, the authors claim.

Interestingly, the authors also found that lonely individuals, as well as individuals with lower self-esteem, tended to answer questions more accurately. Likewise, introverts answered more accurately than extroverts.


Original Submission

Read more of this story at SoylentNews.


Curved Wood LED Lamp Needs No Fancy Tools Hackaday

Those of us who arent familiar with woodworking might not expect that this curved wood and acrylic LED lamp by [Marija] isnt the product of fancy carving, just some thoughtful design and assembly work. The base is a few inches of concrete in a plastic bowl, then sanded and given a clear coat. The wood is four layers of beech hardwood cut on an inverted jigsaw with the middle two layers having an extra recess for two LED strips. After the rough-cut layers were glued together, the imperfections were rasped and sanded out. Since the layers of wood give a consistent width to the recess for the LEDs, it was easy to cut a long strip of acrylic that would match. Saw cutting acrylic can be dicey because it can crack or melt, but a table saw with a crosscut blade did the trick. Forming the acrylic to match the curves of the wood was a matter of gentle heating and easing the softened acrylic into place bit by bit.

Giving the clear acrylic a frosted finish was done with a few coats of satin finish clear coat from a spray can, which is a technique we havent really seen before. Handy, because it provides a smooth and unbroken coating along the entire length of the acrylic. This worked well and is a clever idea, but [Marija] could still see the LEDs and wires inside the lamp, so she covered them with some white tape. A video of the entire process is embedded below.

Remember the Heng lamp? Like [Marija]s lamp it also demonstrated an intersection between wood, curves, and LED lighting. And of course, in no time at all an inspired hacker with a laser cutter had made his own copy.


Toyota halts self-driving car tests on public roads The Hill: Technology Policy

Toyota has reportedly suspended its self-driving car tests on public roads in the United States in response to the death of a pedestrian who was struck and killed earlier this week by an autonomous Uber vehicle."Because we feel the incident may have...


QEMU 2.12 Release Candidates Begin, GTK2 Support Deprecated Phoronix

The first release candidate of QEMU 2.12 is now available as the next feature release for this important piece of the Linux virtualization stack...


XPRIZE's $10 Million Telepresence Robot Challenge Is Not Challenging Enough IEEE Spectrum Recent Content full text

The Avatar XPRIZE is a compelling idea, but it needs to recalibrate in order to significantly advance the technology Image: XPRIZE

At the South by Southwest festival last week, XPRIZE announced the launch of the $10 million ANA Avatar XPRIZE, a four-year global competition to develop real-life avatars. The idea is to bring together many different kinds of remote robotic technologies to create an easy to use, effective, and immersive remote experience. Challenges like these have proved very effective in the pastDARPA in particular has sponsored massive advances in both self-driving cars and humanoid robots.

Part of the reason that DARPA was able to do this is by carefully asking for what is almost, but not quite, impossible. Or what former DARPA program manager Gill Pratt used to call DARPA hard. XPRIZE, on the other hand, seems to be asking for the definitely possible, and in some cases, the already achieved.

The $10,000,000 ANA Avatar XPRIZE is a four-year global competition focused on accelerating the integration of several emerging and exponential technologies into a multipurpose avatar system that will enable us to see, hear, touch and interact with physical environments and other people through an integrated robotic device.

The ANA Avatar XPRIZE will incentivize innovators around the world to tackle the grand challenge of overcoming the limits of physical transportation. Teams will collaborate to allow us to more rapidly and efficiently distribute skills and expertise to geographic locations where and when they are needed, bridging the gap between distance, time, and cultures.

The winning team will combine state-of-the-art technologies to demonstrate a robotic avatar that allows an untrained operator to complete a diverse series of tasks, from simple to complex, in a physical environment at least 100km away.

The competition itself will consist of sets of tasks within three scenarios, each of which must be completed in 20 minutes or less. We should emphasize that these are onl...


Friday Free Software Directory IRC meetup time: March 23rd starting at 12:00 p.m. EDT/16:00 UTC FSF blogs

Help improve the Free Software Directory by adding new entries and updating existing ones. Every Friday we meet on IRC in the #fsf channel on

When a user comes to the Directory, they know that everything in it is free software, has only free dependencies, and runs on a free OS. With over 16,000 entries, it is a massive repository of information about free software.

While the Directory has been and continues to be a great resource to the world for many years now, it has the potential to be a resource of even greater value. But it needs your help! And since it's a MediaWiki instance, it's easy for anyone to edit and contribute to the Directory.

This weekend, LibrePlanet 2018 converges on Cambridge, MA. One fantastic feature of LibrePlanet is the accessibility and potential for remote attendance because of the livestream of events. Livestreaming concurrent events is no easy feat when considering the moving pieces; all this momentum pushes development from ABYSS to HumpBack Anglerfish. This week, while we work on adding new programs, we can also look back at our favorite LibrePlanet speeches from previous years.

If you are eager to help, and you can't wait or are simply unable to make it onto IRC on Friday, our participation guide will provide you with all the information you need to get started on helping the Directory today! There are also weekly Directory Meeting pages that everyone is welcome to contribute to before, during, and after each meeting.


Keynote: A Conversation with Linux and Git Creator Linus Torvalds

Linus Torvalds at Open Source Summit: "In the kernel community, weve come to the realization that its not about the small guy against the companies; it's about collaboration."


Building Helm Charts From the Ground Up: An Introduction to Kubernetes

Helm can make deploying and maintaining Kubernetes-based applications easier, said Amy Chen in her talk at KubeCon + CloudNativeCon.



Linux Powered Autonomous Arctic Buoys

At Embedded Linux Conference Europe, Satish Chetty explained his work on a Linux-driven sensor buoy deployed to monitor sea ice off the north coast of Alaska.



New Research Into Letter-Spacing Could Help Improve Children's Reading SoylentNews

Increased letter spacing helps individuals read faster, but not due to visual processing, according to new research from Binghamton University, State University of New York.

"Generally speaking, our lab is interested in learning about how kids learn to read. More specifically, we want to know how the brain activity of kids that have difficulty learning to read differs from those who are not." said Elizabeth Sacchi, a doctoral candidate at Binghamton University. "Through some of my studies, I came across this effect called the letter-spacing effect, which is this finding that both kids and adults with or without specific reading impairment read faster and more fluidly when you increase the spaces between letters in words."

Sacchi's research on letter spacing is part of the National Science Foundation-funded Reading Brain Project, directed by Sarah Laszlo, adjunct associate professor of psychology. The Reading Brain Project studies how children read, measuring their brain activity as they play a computerized reading game. The goal of the project is to help children become more successful readers. According to Sacchi, this is the first letter-spacing research to look at what is happening inside the brain when reading occurs.

"Everybody seemed pretty certain up until this point that it was about decluttering your visual scene, which may make identifying letters easier," said Sacchi. "What my results show is that it doesn't look like the effect is happening early enough to be related to visual processing."

Read more of this story at SoylentNews.


State of AGL: Plumbing and Services

Konsulkos Matt Porter and Scott Murray ran through the major components of the AGLs Unified Code Base at Embedded Linux Conference Europe.


uniprof: Transparent Unikernel Performance Profiling and Debugging

In this talk from Xen Summit, Florian Schmidt, a researcher at NEC Europe, describes uniprof, a unikernel performance profiler that can also be used for debugging.


OpenSSL: bug in modular exponentiation Open Source Security

Posted by Guido Vranken on Mar 20

My bignum fuzzer (
running on Google's oss-fuzz recently found a bug in affecting
constant-time modular exponentiation.
OpenSSL does not treat this as a security vulnerability. This is a
heads-up to developers who rely on the affected code so they can
review the impact on their applications on a case-by-case basis.

The bug is located in a function written in assembly language and the
bug can...


Why Did Swarm Launch Its Rogue Satellites? IEEE Spectrum Recent Content full text

Silicon Valley start-ups SpaceBees are being tracked on orbit, but they could be the companys last Photo: Mike Coletta Amateur satellite watcher Mike Coletta is keeping an eye out for possible SpaceBee transmissions.

Nearly two weeks after IEEE Spectrum broke the news that Swarm Technologies had carried out the first ever unauthorized satellite launch, mystery surrounds the companys reasons for doing so. And uncertainty clouds the air around it because its not clear what the consequences for the stealthy start-up might be.

For the past two years, the company has been working on four small SpaceBee satellites, prototypes for an innovative constellation it believes will enable Internet of Things data communications for as little as one-hundredth the cost of existing services.

In November, Swarms founder, Sara Spangelo, delivered the four satellites to Spaceflight, a company in Seattle that consolidates multiple small satellites (often called Cubesats) for launch alongside larger payloads. The satellites then made their way to India, so they could be loaded aboard a Polar Satellite Launch Vehicle (PSLV) operated by Antrix, the commercial launch arm of Indias space agency.

This photograph was posted by Swarms founder Sara Spangelo on Facebook, dated 11/05/17 and tagged as being in Seattle. Photo: Sara Spangelo/Facebook; Screenshot: IEEE Spectrum This photograph, dated 5 Nov. 2017 and geotagged as having been taken in Seattle, was posted on Facebook by Swarms founder Sara Spangelo.

However, a month after Spangelos Seattle trip, Swarm heard troubling news from the U.S. Federal Communications Commission (FCC); the agency had rejected the companys application for a launch license. The FCC feared that the tiny satellites would be difficult to track on orbit, and therefore pose a hazard to other satellites and spacecraft.

[Swarms founders] called me for advice and mentioned they were having trouble with the FCC approving things, says a senior industry figure who is actively involved in launching small satellites, but who asked to remain anonymous to protect his relationship with the U.S. government. I suggested they get in touch with lawyers that...


Security - it shouldnt just be the jewel in your crown, but your partners and suppliers too Graham Cluley

Before you entrust sensitive data to any third party, your company needs to be sure the partner can and will keep it safe from attack.

Read more in my article on the Bitdefender Business Insights blog.


Hackers steal banking & personal data of 800,000 Orbitz customers HackRead

By Waqas, a Chicago, Illinois based popular travel website owned by Expedia

This is a post from Read the original post: Hackers steal banking & personal data of 800,000 Orbitz customers


University Police use the "Library of Harm" to flag students words MassPrivateI

It seems like not a day goes by, where law enforcement isn't inventing new ways to spy on Americans.

According to a recent article in the Daily Progress, the University of Virginia Police Department is using a company called Social Sentinel (SS) to spy on college students and faculty Tweets etc. 

"Legal experts say theyre concerned about privacy and creating a surveillance state, but police say the program is just one more tool in the race to stay on top of online threats and messages."

To mask the real purpose behind spying on students and faculty, university police are calling their new spying officer the 'community service and crime prevention coordinator'. 

Perhaps they should call what it really is; the social media spying coordinator.

How do police know which social media words to look for?

The answer is very disturbing. 



Windows Server 2019 Goes Into Preview With WSL, Better Kubernetes Support Phoronix

Ubuntu 18.04 LTS, the eventual Red Hat Enterprise Linux 8, and other 2018 Linux distributions will now be running up against Microsoft Windows Server 2019 that the company plans to release in the second half of the year but is available today in preview form...


Privilege escalation on Unix machines via plugins for text editors Help Net Security

Several of the most popular extensible text editors for Unix environments could be misused by attackers to escalate privileges on targeted systems, SafeBreach researchers have found. They tested Sublime, Vim, Emacs, Gedit, Pico and its clone Nano on machines running Ubuntu, and have managed to exploit the process of loading plugins to achieve privilege escalation with all except the last two. What seems to be the problem? These text editors achieve extensibility through third-party plugins, More

The post Privilege escalation on Unix machines via plugins for text editors appeared first on Help Net Security.


AT&T, Justice Dept. lawyers outline cases ahead of Time Warner deal trial The Hill: Technology Policy

Lawyers for the Department of Justice (DOJ) and telecom giant AT&T on Tuesday previewed their cases ahead of opening arguments Wednesday as the company seeks permission to merge with Time Warner Inc.Reuters reports that the Trump...


Facial Recognition At US Airports Becomes A Routine SoylentNews

The new report, which was released Thursday, comes on the heels of a related 2016 report showing that half of Americans faces are already in a facial recognition database.

As currently envisioned, the program represents a serious escalation of biometric scanning of Americans, and there are no codified rules that constrain it, the report concludes.

In July 2017, Ars reported that facial-scanning pilot programs are already underway in international departure airports at six American airportsBoston, Chicago, Houston, Atlanta, New York City, and Washington, DC. More are set to expand next year. In a recent privacy assessment issued one month earlier, DHS noted that the only way for an individual to ensure he or she is not subject to collection of biometric information when traveling internationally is to refrain from traveling.

Were wondering if this is the best use of a billion dollars? [Laura Moy, a Georgetown law professor and one of the report's authors] said. Weve done the research and we think the answer to that question is no.

When American citizens travel by air, they should not have to choose between privacy and security, he said. The implementation of DHS facial scanning program for US citizens leaving the country raises a number of questions.

Original Submission

Read more of this story at SoylentNews.


AMDGPU DC's Latest 34 Patches Provide More Fixes Phoronix

Another week, another code drop derived from AMD's internal driver code-base providing an updated DC display code stack...


KeepVid Site No Longer Allows Users to Keep Videos TorrentFreak

For many years, KeepVid has been a prime destination for people who wanted to download videos from YouTube, Dailymotion, Facebook, Vimeo, and dozens of other sites.

The web application was free and worked without any hassle. This was still the case earlier this month when the site advertised itself as follows:

KeepVid Video Downloader is a free web application that allows you to download videos from sites like YouTube, Facebook, Twitch.Tv, Vimeo, Dailymotion and many more.

However, a few days ago the site radically changed its course. While the motivation is unknown at the time, KeepVid took its popular video download service offline without prior notice.

The old KeepVid

Video downloading from the Internet will become more and more difficult, and KeepVid encourages people to download videos via the correct and legal ways, the new KeepVid reads.

While the site already made some changes over the years, such as restricting YouTube downloads to only shared videos, turning the download service into a cautioning educational page is rather unexpected.

The new KeepVid

The site now lists several alternative options to enjoy videos and music, including Netflix, Hulu, Spotify, and Pandora.

The KeepVid team isnt commenting on the overhaul. When we asked the site about the reason for the turnaround, it confirmed that the downloading feature wont return, but thats about it.

KeepVid wont provide video/audio downloading feature from now on, a KeepVid representative informed TorrentFreak, adding that they will focus on developing other audio and video tools going forward.

Our follow-up question asking whether the move was motivated by legal pressure remains unanswered.

As a tiny glimmer of hope, the site mentions downloading videos could become possible again if video download tools and video sharing platforms reach an agreement in the future.

For now, however, its clear that, as a download service, the site is done.

Interestingly, the paid KeepVid pro software is still available. The...


Mystery Nixie Clock From 2001: A Space Odyssey, And Pulsar Hackaday

Every now and then something old comes along which were surprised has never been on Hackaday. Thats especially the case here since it includes nixie tubes and is a clock, two things beloved here by many. Then again, its not a hack, but it just should be (hint hint).

Pulsar mystery clock ...


RSA Conference Innovation Sandbox Contest 2018 finalists announced Help Net Security

RSA Conference announced the 10 finalists for its annual RSAC Innovation Sandbox Contest. The competition offers a leading platform for entrepreneurial cyber security companies to launch their research and innovation. On Monday, April 16, the Top 10 finalists listed below will present a three-minute quick-pitch to try to win the coveted Most Innovative Start Up at the 2018 RSA Conference in San Francisco. Industry veterans Asheem Chandna, Partner, Greylock Partners; Gerhard Eschelbeck, Vice President Security More

The post RSA Conference Innovation Sandbox Contest 2018 finalists announced appeared first on Help Net Security.


Cambridge Analytica CEO suspended by board following undercover video The Hill: Technology Policy

The CEO of Cambridge Analytica was suspended by the research firms board of directors on Tuesday following a video published by a London media outlet that showed him discussing the use of bribes and prostitutes to sway political elections.The board...


A look inside the big business of cybercrime Help Net Security

For three months, Armors Threat Resistance Unit (TRU) research team compiled and analyzed data from the black market to shed light on the type of activity threat actors are participating in and how underground forums operate in the burgeoning industry. Just as big businesses operate based on regulations, the laws of supply and demand, and even customer reviews, so does the black market. However, unlike the legitimate economy, the underground market is highly anonymized and More

The post A look inside the big business of cybercrime appeared first on Help Net Security.


Expedia-owned travel website Orbitz says 880,000 payment cards hit in data breach Security Affairs

Orbitz, the travel website owned by Expedia announced on Tuesday that it has suffered a security breach that affected hundreds of thousands of users. has millions of users, it was acquired by Expedia in 2015 for $1.6 billion.

Orbitz confirmed that attackers gained access to a legacy platform between October 1 and December 22, 2017, and stole personal and financial data belonging to consumers and business partners.

The exposed data includes full name, date of birth, gender, phone number, email address, physical and billing address, and payment card data. According to Orbitz, the security breach affected roughly 880,000 payment cards.

There is no evidence that the current website is affected, passport and travel itinerary information were not exposed in the incident.

The company discovered the breach on March 1 following an internal investigation, Orbitz hired security experts to investigate the issue and identify the flaws exploited by hackers.

The company also notified the incident to the law enforcement that is investigating the case too.

According to the investigators, the hackers may have accessed personal information of customers that made certain purchases between January 1 and June 22, 2016.


Attackers may have obtained information on Orbitz partners who made purchases between January 1, 2016, and December 22, 2017.

We are working quickly to notify impacted customers and partners. We are offering affected individuals one year of complimentary credit monitoring and identity protection service in countries where available. Additionally, we are providing partners with complimentary customer notice support for partners to inform their customers, if necessary, reads the statement issued by the company.

Anyone who is notified is encouraged to carefully review and monitor their payment card account statements and contact their financial institution or call the number on the back of their card if they suspect that their payment card may have been misused,

Customers can contact the firm by calling 1-855-828-3959 (toll-free in the U.S.) or 1-512-201-2214 (international), or by visiting the website

Expedias shares fell as much as 1.9 percent to $108.99.

This is...


Stone: A new era for Linux's low-level graphics - Part 1

Daniel Stone begins a series on how the Linux graphic stack has improved in recent times. "This has made mainline Linux much more attractive: the exact same generic codebases of GNOME and Weston that I'm using to write this blog post on an Intel laptop run equally well on AMD workstations, low-power NXP boards destined for in-flight entertainment, and high-end Renesas SoCs which might well be in your car. Now that the drivers are easy to write, and applications are portable, we've seen over ten new DRM drivers merged to the upstream kernel since atomic modesetting was merged."


Dirac: High-Fidelity Audio for Your Smartphone IEEE Spectrum Recent Content full text

The companys software minimizes the limitations of small speakers and headphones Photo: iStockphoto

photo of headphones and smartphone Photo: iStockphoto

In the years since the iPhone was launched, in 2007, smartphone manufacturers have competed primarily on the size and resolution of their screens, touting display capabilities sometimes to the exclusion of anything else. But as mobile display technology matures, manufacturers are looking to other areas to distinguish themselves, such as sound.

This is good news for a company like Dirac, which provides algorithmic audio-optimization tools. A few of the bigger brands around the world that already include Diracs optimizations are Alcatel, Huawei, Infinix, Motorola, and Tecno. So when Dirac offered IEEE Spectrum a chance to try out its demo suite, I took it. I wanted to see if these tools really made a noticeable difference.

First, I am not someone who could be considered, under any reasonable definition of the term, an audiophile. If anyone tries to talk to me about high fidelity, Im likely to just tune out. Thats why I was so surprised when testing Diracs tools. Not only was the audio difference arresting, but it was so superior that I was moderately bummed about going back to my own smartphone and earbuds.

The problem with acoustic driversthe components that actually vibrate in speakers and headphones to produce soundis that as a general rule, going smaller results in compromising sound quality, particularly for lower tones like bass notes. Dirac has created optimizations for small drivers that improve audio quality, both for built-in smartphone speakers and external speakers.

These optimizations come in two flavors. Dirac claims to be able to provide a surround soundlike experience with its Panorama Sound tuning, using just your phones speakers. Meanwhile, its Power Sound tuning is supposed to improve clarity, especially by bringing out lower bass registers that are often lost with built-in smartphone speakers.

Both settings do improve sound quality. Without Diracs tuning, listening to the provided clips of rain-forest and city noises on a Huawei Nexus 6p smartphone was underwhelming, to say the least. An audio clip of a lion growling and roaring was tinny and weak. In fact, without knowing that the...


Windows Remote Assistance Exploit Lets Hackers Steal Sensitive Files The Hacker News

You have always been warned not to share remote access to your computer with untrusted people for any reasonit's a basic cybersecurity advice, and common sense, right? But what if, I say you should not even trust anyone who invites or offer you full remote access to their computers. A critical vulnerability has been discovered in Microsoft's Windows Remote Assistance (Quick Assist) feature


How The Pirate Bay Helped Spotify Become a Success SoylentNews

One of the latest beneficiaries of sharing music online, according to TorrentFreak, turns out to be the streaming music service Spotify:

Without The Pirate Bay, Spotify may have never turned into the success it is today. Ten years ago record labels were so desperate to find an answer to the ever-growing piracy problem that they agreed to take a gamble. Now, more than a decade later, Spotify has turned into a billion-dollar company, with pirate roots.

Last autumn the EU suppressed a 300-page copyright study showing yet again that copyright infringement does not harm sales. It often helps sales. Both factors have been known for a long time, with other studies going back to the 1990s.

Earlier on SN:

Spotify Files for IPO After Losing $1.5 Billion in 2017
Spotify Raises Cash to Fight Apple for Streaming Music Market
Band Earns $20K for Silent Album on Spotify

Original Submission

Read more of this story at SoylentNews.


Decoder for PolyITAN-2-SAU Daniel Estvez

PolyITAN-2-SAU, or QB50 UA01, is a cubesat from National Technical University of Ukraine, that was launched on May 2017 as part of the QB50 proyect. When it was launched, I made a recording of several QB50 satellites, including PolyITAN-2-SAU. Presumably, the modulation and coding used by this satellite is 9k6 BPSK AX.25, with G3RUH scrambling. Back then, I commented that although the signal was strong and I could get a clean constellation plot, I was unable to get valid AX.25 packets.

I had completely forgotten this satellite, but the other day I saw that Andy UZ7HO had added support for PolyITAN-2-SAU to his SoundModem. I asked Andy for some help, since I suspected that the coding wasn't exactly standard G3RUH AX.25.

The trick is that this satellite uses two "layers" of NRZI encoding. The relevant part of the decoder is shown below. The BPSK symbols come in from the left of the figure and the AX.25 packets exit by the right. A standard G3RUH AX.25 decoder wouldn't have the extra NRZI decoder on the right.

PolyITAN-2-SAU decoder

Note that NRZI decoding and G3RUH descrambling commute, since the G3RUH polynomial has an odd number of terms. Therefore, the decoder can also be organized in a different way, with both NRZI decoders at one side (either the input or output) of the descrambler.

Having two NRZI decoders in chain is a really funny concept, so it almost seems as some kind of mistake from the satellite team (most QB50 satellites use standard BPSK or FSK AX.25 packet radio for compatibility). In fact, if we write an NRZI decoder as y_n = 1 + x_n + x_{n-1} , where ...


My Journey With Cancer and the Hope for the Future Lifeboat News: The Blog

I would like to share a story. A story about sadness, depression, anger, and frustration. But most of all this is my personal story about triumphing over the death sentence of #cancer. I hope this story will give others who went through and are going through hope for the future.

My story started about 4 years ago on a cold winter day. Up until this point my life seemed invincible. That all changed. At the time I was working at the plasma center and we were preparing for an audit by the FDA. Before an audit we would have the floors waxed and make the center look as nice as possible. A few co-workers and I stayed late to help move the donor beds. I knew I had been feeling pain in my neck/shoulder area for a few weeks so I really didnt want to. I figured it must have been from repetitive motions at work. I decided to just ignore it and help anyways: this decision changed my life dramatically.

As my coworker and I lifted a donor bed I felt a sharp pain in my neck. I could barely move my arm as it was so excruciating. I couldnt lift my arm to my chest. I shyly let my manager know that I hurt myself. My manager had me go to Concentra #Health since I was going to be covered under workers compensation there. It was there I met Dr. Kreiger, one of the doctors who helped save my life.


[$] Two perspectives on the maintainer relationship

Developers and maintainers of free-software projects are drawn from the same pool of people, and maintainers in one project are often developers in another, but there is still a certain amount of friction between the two groups. Maintainers depend on developers to contribute changes, but the two groups have a different set of incentives when it comes to reviewing and accepting those changes. Two talks at the 2018 Embedded Linux Conference shed some light on this relationship and how it can be made to work more smoothly.


Repurposing Inkjet Technology For 3D Printing Hackaday

You would be forgiven for thinking that 3D printing is only about plastic filament and UV-curing resin. In fact, there are dozens of technologies that can be used to create 3D printed parts, ranging from welders mounted to CNC machines to the very careful application of inkjet cartridges. For this years Hackaday Prize, [Yvo de Haas] is modifying inkjet technology to create 3D objects. If he gets this working with off-the-shelf parts, this will be one of the most interesting advances for 3D printing in recent memory.

The core of this build is a modification of HP45 inkjet print heads to squirt something other than overpriced ink. To turn this into a 3D printer, [Yvo] is filling these ink cartridges with water or alcohol. This is then printed on a bed of powder, either gypsum, sugar, sand, or ceramic, with each layer printed, then covered with a fine layer of powder. All of this is built around a 3D printer with an X/Y axis gantry, a piston to lower the print volume, and a roller to draw more powder over the print.

The hardest part of this build is controlling the inkjet cartridge itself, but theres prior work that makes this job easier. [Yvo] is successfully printing on paper with the HP45 cartridges, managing to spit out 150 x 150 pixel images, just by running the cartridge over a piece of paper. Already thats exceptionally cool, great for graffiti, and something we cant wait to see in a real, working printer.

You can check out [Yvo]s handheld printing efforts below.

The HackadayPrize2018 is Sponsored by:


Facebook stock sinks after report of federal probe into data breach The Hill: Technology Policy

Facebooks stock price fell deeper Tuesday after reports of expanding U.S. and U.K. probes into its role in the unauthorized use of personal information by a Trump-connected data firm.The social media company has been under fire since The New...


The Controversial Humanity Star Is Coming Back to Earth Early Lifeboat News: The Blog

A shiny satellite launched in January will burn up in Earths atmosphere a few months ahead of schedule.


Vitalik Buterin: The Best Thing to Donate Money to is The Fight Against Aging Lifeboat News: The Blog

An interview with Komsomolskaya Pravda during the conference Undoing Aging in Berlin.

A few days ago, LEAF representatives attended the Undoing Aging 2018 conference in Berlin, which was jointly organized by the SENS Research Foundation and the Forever Healthy Foundation. We invited one of the most professional Russian journalists writing about aging, Anna Dobryukha, to this conference, and she will write a series of articles and interviews in Komsomolskaya Pravda (KP) over the next weeks. As these articles are interesting to the global community, we decided to translate them for our blog.

Today, we publish the first article of this series, an interview that Anna conducted with Vitalik Buterin, the creator of the cryptocurrency Ethereum. Vitalik donated 2.4 million dollars to the SENS Research Foundation earlier this year, so lets find out what Vitaliks views are on rejuvenation biotech and life extension!

The original article, King of Ethereum Vitalik Buterin: the best thing to donate money to is the fight against aging, is by Anna Dobryukha and has been translated by Elena Milova and Joshua Conway.


Undoing Aging 2018 Personal Impressions Lifeboat News: The Blog

Steve Hill from the LEAF team gives some first impressions from the recent Undoing Aging 2018 conference in Berlin.

I have just returned home from the Undoing Aging conference in Berlin, where we spent three days listening to talks by the top researchers in aging, meeting some of the finest minds in research, and talking with thought leaders in the field.

There was a great deal of new and exciting research being presented, some of which has not been published and so cannot be discussed. We will be publishing articles on this news in the coming days as we edit the audio and video from the event. Today, however, instead of discussing research per se, Ill talk about my impressions of the event.

This was my first conference on aging, and I have to say that I was really impressed with the professional presentation and venue. I have been to many video game conferences in my life, and I have to say it was on par with such events, albeit on a somewhat smaller scale.


Radeon Pro 18.Q1.1 Enterprise Edition Released For Linux Workstations Phoronix

AMD on Monday quietly released their quarterly update to the Radeon Pro Software Enterprise Edition Linux driver that is derived from their AMDGPU-PRO stack for FirePro / Radeon Pro class hardware...


Cambridge Analytica and Facebooks privacy storm: Latest developments Help Net Security

A day before the most recent expos on Strategic Communication Laboratories (SCL)/Cambridge Analyticas exploitation of user data syphoned out of Facebook to fuel election campaigns, Facebook finally publicly confirmed that it happened. Facebooks reaction Journalists called it a breach and Facebook is claiming that the expression cannot be used in this context, as Aleksandr Kogan, the scientist that performed the harvesting, requested and gained access to information from users who chose to sign up to More

The post Cambridge Analytica and Facebooks privacy storm: Latest developments appeared first on Help Net Security.


Links 20/3/2018: GStreamer 1.14.0, Freespire 3.0, Endless OS 3.3.13 Techrights

GNOME bluefish



  • Desktop

    • Purchased a PlayStation 3 Between 2006 and 2010? You May Be Entitled to $65

      PS3 owners first qualified to receive compensation from Sony following the settlement of a lawsuit in 2016. That case dealt with the OtherOS feature that came with the console when it debuted. With OtherOS, Sony promised a new PlayStation that would operate like a computer, allowing users to partition their hard drive and install third-party operating systems like the open-source Linux software.

  • Server

    • Inspur Unveils Open Source Software Adapted Server at OpenPOWER Summit 2018

      Inspur, a member of the OpenPOWER Foundation, showcased its FP5280G2 server based on OpenPOWER9 that has completed the adaptation of mainstream open source software for cloud computing, big data and AI. It was the first time that this product was introduced in North America. As the initiator of the OpenPOWER Foundation, IBM disclosed more details of POWER9 processors: designed for emerging applications such as AI, cloud computing, and big data, and has 50% to 200% performance improvement compared to POWER8.

    • Updated Oracle Linux 7 update 4 ARM64/aarch64 with uek5 4.14.26-2

      We refreshed the installation media for OL7/ARM64 with the latest uek5 preview build based on upstream stable 4.14.26 and added perf and tuned.

      You can download it from the OTN OL ARM webpage. Ignore the 4.14-14 in the text, that will get updated. Were also working on updating the Raspberry Pi 3 image to match the same version. Hopefully using grub2 there as well to make it easier to have a single image repo.

    • ...


People Are Willing To Pay To Curate Their Online Social Image SoylentNews

Social media provides a new environment that makes it possible to carefully edit the image you want to project of yourself. A study from Lund University in Sweden suggests that many people are prepared to pay to "filter out" unfavorable information.

Economists Hkan Holm and Margaret Samahita have investigated how we curate our social image on the web using game theory.

Previous studies have been conducted on, for example, how anonymity affects our willingness to act pro-socially, and thus our concern for social image. However, the internet and social media now make it possible to edit the image we want to project of ourselves retroactively. One can therefore expect other, -- less impulsive, mechanisms to control this behavior. The purpose of the study was therefore to better understand online behavior.

Each subject participated in a cooperative situation with an anonymous person, and the participants earned real money during the experiment. They could be "good" and cooperate a lot, which is costly, or be less cooperative, which costs less. They then found out that information about how much they actually cooperated could be published online along with their name, but that they could avoid this publication if they paid to censor the information. It turned out that those who cooperated less, valued the censorship highest which meant that information about this group's actions tended to be filtered out.

"That the image people share of themselves is 'softened' on the internet is perhaps not that surprising. What is new is that this is shown under experimental control and that the will to 'filter out' is so strong that one is prepared to pay for it," explains Hkan Holm.

Hakan J. Holm, Margaret Samahita. Curating social image: Experimental evidence on the value of actions and selfies. Journal of Economic Behavior & Organization, 2018; 148: 83 DOI: 10.1016/j.jebo.2018.02.008

Original Submission

Read more of this story at SoylentNews.


15-Year-old Finds Flaw in Ledger Crypto Wallet Krebs on Security

A 15-year-old security researcher has discovered a serious flaw in cryptocurrency hardware wallets made by Ledger, a French company whose popular products are designed to physically safeguard public and private keys used to receive or spend the users cryptocurrencies.

Ledgers Nano-S cryptocurrency hardware wallet. Source: Amazon.

Hardware wallets like those sold by Ledger are designed to protect the users private keys from malicious software that might try to harvest those credentials from the users computer.  The devices enable transactions via a connection to a USB port on the users computer, but they dont reveal the private key to the PC.

Yet Saleem Rashid, a 15-year-old security researcher from the United Kingdom, discovered a way to acquire the private keys from Ledger devices. Rashids method requires an attacker to have physical access to the device, and normally such hacks would be unremarkable because they fall under the #1 rule of security namely, if an attacker has physical access to your device, then it is not your device anymore.

The trouble is that consumer demand for Ledgers products has frequently outpaced the companys ability to produce them (it has sold over a million of its most popular Nano S models to date). This has prompted the companys chief technology officer to state publicly that Ledgers built-in security model is so robust that it is safe to purchase their products from a wide range of third-party sellers, including Amazon and eBay.

Ledgers message to users regarding the lack of anti-tampering mechanisms on its cryptocurrency hardware wallets.

But Rashid discovered that a reseller of Ledgers products could update the devices with malicious code that would lie in wait for a potential buyer to use it, and then siphon the private key and drain the users cryptocurrency account(s) when the user goes to use it.

The crux of the problem is that Ledgers devices contain a secure processor chip and a non-secure microcontroller chip. The latter is used for a variety of non-security related purposes, from h...


Sophie Germain: The Mathematics of Elasticity Hackaday

When a 13-year old Marie-Sophie Germain was stuck in the house because of the chaotic revolution on the streets of Paris in 1789, she found a refuge for her active mind: her fathers mathematics books. These inspired her to embark on pioneering a new branch of mathematics that focussed on modeling the real world: applied mathematics.

Post-revolutionary France was not an easy place for a woman to study mathematics, though. She taught herself higher maths from her fathers books, eventually persuading her parents to support her unusual career choice and getting her a tutor. After she had learned all she could, she looked at studying at the new cole Polytechnique. Founded after the revolution as a military and engineering school to focus on practical science, this school did not admit women.

Anyone could ask for copies of the lecture notes, however, and students submitted their observations in writing. Germain got the notes and submitted her coursework under the pseudonym Monsieur Antoine-August Le Blanc. One of the lecturers that she impressed was Joseph Louis Lagrange, the mathematician famous for defining the mathematics of orbital motion that explained why the moon kept the same face to the earth. Lagrange arranged to meet this promising student and was surprised when Germain turned out to be a woman.

Gauss and Germain

Le Blanc also corresponded with German mathematician Carl Friedrich Gauss on number theory. When Napoleons armies occupied the town the famous mathematician lived in, Germain enlisted a family friend in the army to check that Gauss had not been harmed. Gauss didnt realize who had helped him out, until he discovered that Le Blanc was Sophie Germain, he wrote to her thanking her for her concern and praising her mathematical prowess given the hurdles set before her.

How sweet is the acquisition of a friendship so flattering and precious to my heart. The lively interest you took during this terrible war deserves the most sincere recognition.But when a person of this sex, who, for our mores and prejudices, must recognize infinitely more obstacles and difficulties than men to become acquainted with these thorny searches, knows how to get rid of these obstacles and to penetrate what they have, most hidden,  must undoubtedly, she has the most noble courage, talents quite extraordinary, genius superior.

As well as working on the thorny and theoretical problems of number theory, Germain worked on applying mathematics to real world problems. One of these was a challenge set by the Paris Academy of Science to mathematically describe the elasticity of metal plates. An experimenter called Ernest Chladni had demonstrated that a metal plate would resonate in odd ways when vibrated at certain frequencies. If you put sand on the pla...


Cambridge Analytica whistleblower to speak to House Intel Dems The Hill: Technology Policy

A self-described whistleblower on data firm Cambridge Analytica's data harvesting practices is slated to give an interview to Democrats on the House Intelligence Committee.Rep. Adam Schiff (Calif.), the top Democrat on the panel, tweeted...


Facebook to meet with officials on Capitol Hill amidst Cambridge Analytica fallout The Hill: Technology Policy

Facebook officials are scheduled to meet with officials on Capitol Hill this week to discuss the controversy around Cambridge Analytica's alleged misuse of its platform. The officials will brief Senate Commerce, Science and Transportation...


IBM Developing Worlds Tiniest Computer Smaller than a Grain of Salt HackRead

By Uzair Amir

At Thank 2018, IBM has announced developing worlds tiniest computer

This is a post from Read the original post: IBM Developing Worlds Tiniest Computer Smaller than a Grain of Salt


GStreamer 1.14 released

The GStreamer team has announced a major feature release of the GStreamer cross-platform multimedia framework. Highlights include WebRTC support, experimental support for the next-gen royalty-free AV1 video codec, support for the Secure Reliable Transport (SRT) video streaming protocol, and much more. The release notes contain more details.


Gartner unveils IT cost-optimization priority for CIOs Help Net Security

IT cost optimization in most organizations is now largely focused on business optimization rather than cost cutting, according to a recent survey by Gartner. Survey respondents revealed that their top criterion for selecting cost optimization priorities is business value or benefits realization, rather than the biggest or fastest cost reductions. The survey findings highlight how cost optimization has become a business-focused, continuous discipline that drives spending and cost reduction, while maximizing business value, said Stewart More

The post Gartner unveils IT cost-optimization priority for CIOs appeared first on Help Net Security.


Soil Fungi May Help Determine The Resilience Of Forests To Environmental Change SoylentNews

Nature is rife with symbiotic relationships, some of which take place out of sight, like the rich underground exchange of nutrients that occurs between trees and soil fungi.

But what happens in the dark may have profound implications above ground, too: A major new study reveals that soil fungi could play a significant role in the ability of forests to adapt to environmental change.

Kai Zhu, assistant professor of environmental studies at UC Santa Cruz, took a unique "big data" approach to investigating the role of symbiotic fungi in tree migration in forests across the eastern United States.

"Our climate is rapidly changing, and our forests are responding, but in very slow motion -- it's hardly detectable," said Zhu, who wanted to identify factors that contribute to the pace of that response.

Read more of this story at SoylentNews.


NES Controller Slider-Based Light Theremin Hackaday

For the uninitiated, a Theremin is a touch-less synthesizer that uses human capacitance and a pair of antennae to control oscillation and amplitude. In a light-based Theremin such as this one, the oscillation is controlled by the intensity of photons from a white LED and their interaction with a light-dependent resistor, also known as a photocell or squiggly resistor.

The oscillations themselves are created by wiring up the 555 as an astable oscillator, and the pitch is controlled with a potentiometer mounted on the back. It has a small built-in speaker, but [lonesoulsurfer] replaced the B button with a 3.5 mm audio jack so he can plug it into a powered speaker and really rock out. Weve got his demo tape queued up after the break.

We love pocket instruments around here. If you prefer brass and woodwinds, this pocket woodwind MIDI controller just might draw your lips into an O.


Abel Prize to Langlands Not Even Wrong

The 2018 Abel Prize has been awarded to Robert Langlands, an excellent choice. The so-called Langlands program has been a huge influence on modern mathematics, providing deep insight into the structure of number theory while linking together disparate fields of mathematics, as well as quantum field theories and physics.

The Abel Prize site provides a wealth of information about Langlands and his work. Davide Castelvecchi at Nature appropriately describes the Langlands program as a grand unified theory of mathematics (Edward Frenkels Love and Math popularized this description).

For the original work of Langlands himself, besides the material at the Abel site, the AMS Bulletin has recently published a long article by Julia Mueller. For the original sources and a wealth of other material written by Langlands himself, see the IAS site that collects his writings.


Security updates for Tuesday

Security updates have been issued by Arch Linux (clamav, curl, lib32-curl, lib32-libcurl-compat, lib32-libcurl-gnutls, libcurl-compat, and libcurl-gnutls), openSUSE (various KMPs), Oracle (firefox), Scientific Linux (firefox), SUSE (java-1_7_1-ibm), and Ubuntu (memcached).



Your Genome Isnt Really Secret, Says Google Venturess Bill Maris Lifeboat News: The Blog

The venture capitalist wants to extend human life expectancy, and he says fears over privacy and the security of DNA data shouldnt stand in the way.


Male Birth Control Pill Shows Promise in Trial SoylentNews

One of the latest experimental candidates for a male birth control drug is a compound that would be taken much like the daily birth control pill available for women. A pilot study presented Sunday at the Endocrine Society's annual meeting suggests that the compoundcalled dimethandrolone undecanoate (DMAU)can be safe and effective in human test subjects.

[...] DMAU is meant to act on the same receptors as testosterone and progestin. But it seems to be more easily absorbed by the body and longer-lasting. That theoretically means a single dose a day (when taken with food) should cause sterility without leading to other serious consequences, the authors say.

[...] The few side effects Page's team observed were weight gain and lowered levels of HDL cholesterol (the "good" kind). But they feel a tweaked dose could alleviate these symptoms. Importantly, the pill didn't seem to cause any other lasting symptoms of low testosterone. Eight men in the treatment group did report lower libido, but the effect faded away after treatment had ended.

Original Submission

Read more of this story at SoylentNews.


Uber Has An Autonomous Fatality Hackaday

You have doubtlessly heard the news. A robotic Uber car in Arizona struck and killed [Elaine Herzberg] as she crossed the street. Details are sketchy, but preliminary reports indicate that the accident was unavoidable as the woman crossed the street suddenly from the shadows at night.

If and when more technical details emerge, well cover them. But you can bet this is going to spark a lot of conversation about autonomous vehicles. Given that Hackaday readers are at the top of the technical ladder, it is likely that your thoughts on the matter will influence your friends, coworkers, and even your politicians. So what do you think?

The Technology Problem?

Uber, Waymo, and other companies developing self-driving cars have a lot of technology. There have been a few hiccups. An Uber car ran a red light in California. Another also in Arizona was struck by another vehicle and rolled over, although police blamed the other (human) driver. Now we have the [Herzberg] case and we dont know for sure if there was any technology component to the tragedy. But if there is, we are certain it is soluble. The technology to drive doesnt seem like it should be so difficult.

That doesnt mean machines will drive in the same way as a human. Humans have intuition and some pretty awesome pattern matching capability. On the other hand, they also have limited attention spans and dont always react as fast as they would like. Nor is the machine able to perform miracles. No matter if the driver uses silicon or protoplasm, it takes a certain amount of distance to stop a vehicle moving at a given speed. Vehicles will kill people no matter how smart the driving computers get.

It Isnt Technology

If the technology is there, why arent the highways saturated with robotic limos? Like most real-world technology, the technology is only one part of it. We can make plenty of electricity using nuclear power plants, but risk aversion, regulation, and tax structures make it infeasible. Im not saying thats appropriate or not, Im just saying that we know how to build atomic power plants, we just decided to stop. We have had the technology to go to the moon for a while. Wed have to develop some new ways if we wanted to go back, but we could do it. We just dont today. Making a self-driving car isnt a problem like sending a live human to the Andromeda galaxy.

Data from 2016 shows that just under 40,000 people a year die in United States traffic fatalities an average of 102 people a day. We dont have much data for robot vehicles, but intuitively you have to guess that well-designed autonomous vehicles ought to be able to do better...


Migrating to Linux: Installing Software

Migrating to Linux: Installing Software


Supreme Court in Russia ruled Telegram must provide FSB encryption keys Security Affairs

A Supreme Court in Russia ruled Telegram must provide the FSB with encryption keys to access users messaging data to avoid being blocked.

Bad news for Telegram, a Supreme Court in Russia ruled the company must provide the FSB with encryption keys to access users messaging data. If Telegram will refuse to comply the request the authorities will block the service in Russia.

Media watchdog Roskomnadzor asked Telegram to share technical details to access electronic messages shared through the instant messaging app.

Roskomnadzor requested to provide the FSB with the necessary information to decode electronic messages received, transmitted, or being sent within 15 days.

In June, Roskomnadzor, the Russian Government threatened to ban the popular instant messaging app because the company refused to be compliant with the countrys new data protection laws. In July,  the company agreed to register with Russia authorities to avoid the local ban, but it did not share user data.


Telegram appealed against the ruling, but the Supreme Court rejected the request of the company.

Telegram founder Pavel Durov labeled the FSB request as technically impossible to carry out and unconstitutional, then he left Russia in September 2017 in response to the request of the FSB.

In July, Russias Duma approved the bill to prohibit tools used to surf outlawed websites

Russian authorities requested private firms operating in the country to provide the FSB with information on user activities, all the data related to Russian users must be stored in local servers according to anti-terror legislation that passed in 2016.




Hackers pwn Edge, Firefox, Safari, macOS, & VirtualBox at Pwn2Own 2018 HackRead

By Waqas

The white hat hackers at Pwn2Own 2018, have once again proved

This is a post from Read the original post: Hackers pwn Edge, Firefox, Safari, macOS, & VirtualBox at Pwn2Own 2018


BIO, MDMA and PhRMA Are Pushing the PTAB-Hostile STRONGER Patents Act While IAM and Patently-O Continue to Bash PTAB Techrights

The only death squad (their term) is the patent extremists trying to shoot down PTAB and its judges

Death squad

Summary: The patent microcosm, which compares the Board to the above (crude analogy from Judge Rader and other patent extremists), is still trying to kill inter partes reviews (IPRs), in effect overlooking its own hypocrisy on the matter (they dont want patent justice, they just want to metaphorically shoot down the judges)

THE USPTO is improving things with inter partes reviews (IPRs), so its rather hard to imagine that anyone other than patent maximalists would wish to interfere.

We were a little stunned to see the STRONGER Patents Act mentioned again yesterday. We have hardly heard anything about it for nearly a year. What the CCIAs Josh Landau is saying here, along with that corny zombie silhouette, is that Like A Horror Movie Villain, The STRONGER Patents Act Returns, but as far as we can see/tell, it is still pretty much dead and not mentioned anywhere except Koch-funded think tanks (they mention it on occasions, usually in tweets). Landau wrote:

So, given that the STRONGER Patents Act will harm innovators and drive R&D overseas, why are Reps. Stivers (R-OH) and Foster (D-IL) planning to bring the STRONGER Patents Act back and introduce it in the House on Tuesday?


Who Greenlighted This Sequel, Anyway?

So whos supporting this bill, despite the harm to American innovation?


FTC probing Facebook for use of personal data: report The Hill: Technology Policy

The Federal Trade Commission (FTC) is reportedly launching an investigation into Facebook over whether it violated terms of a 2011 consent decree in the wake of reports a data firm harvested information from millions of profiles. Bloomberg News...


Dem Sen demands answers from Zuckerberg over Facebook Cambridge scandal The Hill: Technology Policy

Sen. Amy Klobuchar (D-Minn.) called on Facebook founder and CEO Mark Zuckerberg to explain the extent of the damage done in a breach of user data by research firm Cambridge Analytica, and how it is going to fix the problem. The firm, a...


British lawmakers call on Zuckerberg to appear before parliament The Hill: Technology Policy

A British lawmaker on Tuesday called on Facebook CEO Mark Zuckerberg to appear before parliament to respond to reports that Cambridge Analytica, the data firm used by the Trump campaign, harvested data from millions of people without their...


LLVM-MCA Will Analyze Your Machine Code, Help Analyze Potential Performance Issues Phoronix

One of the tools merged to LLVM SVN/Git earlier this month for the LLVM 7.0 cycle is LLVM-MCA. The LLVM-MCA tool is a machine code analyzer that estimates how the given machine code would perform on a specific CPU and attempt to report possible bottlenecks...

Go Back:30 Days | 7 Days | 2 Days | 1 Day

IndyWatch Science and Technology News Feed Today.

Go Forward:1 Day | 2 Days | 7 Days | 30 Days

Tuesday, 20 March


35 U.S.C. 101 is Still Effectively Tackling Software Patents in the US, But Patent Law Firms Lie/Distort to Sell These Anyway Techrights

The arts of being a good lawyer

Lying by omission
Reference: Lying by omission

Summary: The assertion that software patents are still worth pursuing in 2018 is based on carefully-constructed spin which mis-frames several court decisions and underplays/downplays/ignores pretty much everything that does not suit the narrative

YESTERDAY morning we wrote about how spin had evolved to convince people to pursue software patents (which even the USPTO let alone courts makes harder to attain/obtain).

Facts and marketing blend like water and sand. So its hardly surprising that little substance exists in these falsehoods-ridden infomercials.

We habitually cover cases that the patent microcosm prefers not to mention (or never to elaborate on). Such cases arent good for business (patenting and litigation) as they can discourage sales of services. The other day we took note/stock of several such cases.

Yesterday, Immersion Corp. v Fitbit, Inc. was brought up by a site of the patent microcosm, alluding to this latest outcome in a case initiated by Immersion, a notorious patent aggressor if not troll [1, 2] (its not exactly a troll, but it has no concrete products, just licensing).

Judge Koh is once again emerging as a somewhat technical judge who is hard to fool. Seeing what kind of patents Immersion is sporting,...


The More Opioids Doctors Prescribe, the More Money They Make SoylentNews

CNN Exclusive: The more opioids doctors prescribe, the more money they make (archive)

The data:

The CNN/Harvard analysis looked at 2014 and 2015, during which time more than 811,000 doctors wrote prescriptions to Medicare patients. Of those, nearly half wrote at least one prescription for opioids.

Fifty-four percent of those doctors -- more than 200,000 physicians -- received a payment from pharmaceutical companies that make opioids.

Among doctors in the top 25th percentile of opioid prescribers by volume, 72% received payments. Among those in the top fifth percentile, 84% received payments. Among the very biggest prescribers -- those in the top 10th of 1% -- 95% received payments.

On average, doctors whose opioid prescription volume ranked among the top 5% nationally received twice as much money from the opioid manufacturers, compared with doctors whose prescription volume was in the median. Doctors in the top 1% of opioid prescribers received on average four times as much money as the typical doctor. Doctors in the top 10th of 1%, on average, received nine times more money than the typical doctor. [...]

Some studies have looked at whether the amount of money a doctor receives makes a difference. Studies by researchers at Yale University, the George Washington University Milken Institute of Public Health and Harvard Medical School have all found that the more money physicians are paid by pharmaceutical companies, the more likely they are to prescribe certain drugs.

The story:

Angela Cantone says she wishes she had known that opioid manufacturers were paying her doctor hundreds of thousands of dollars; it might have prompted her to question his judgment.

Read more of this story at SoylentNews.


Uber Self-Driving Car struck and killed a woman in Tempe, Arizona Security Affairs

An Uber self-driving car has struck and killed a woman pedestrian in Tempe, Arizona. The incident raises questions about the safety and security of this kind of vehicles.

This is a sad page of the book of technology evolution, an Uber self-driving car has struck and killed a woman pedestrian in Tempe, Arizona.

The news was confirmed by the company, this is the first incident of this type.

According to the media, the accident occurred while the car, a Volvo  XC90 SUV, was in the self-driving mode.

Tempe police are investigating a deadly crash involving a self-driving Uber vehicle overnight. The Uber vehicle was reportedly headed northbound when a woman walking outside of the crosswalk was struck. states the TV station ABC15.

Tempe Police says the vehicle was in autonomous mode at the time of the crash and the vehicle operator, 44-year-old Rafaela Vasquez, was also behind the wheel. No passengers were in the vehicle at the time. 

The victim Elaine Herzberg (49), the Uber self-driving car has struck the woman while she was crossing the street outside of a crosswalk.

The woman was transported to the hospital where she has died.



Battistellis EPO Became Extremely Reliant on China for Distraction and on Endless Supply of Applications (Supply Which Doesnt Exist) Techrights

Applications are quickly running out in spite of discounts (which reduced revenue and failed to spur much demand)

EPO applications
Not much growth in Europe (as in European Patent Office)

EPO granting machine
China is ranked 38th for patent applications per capita (at the EPO) and accounts only for 5% of applications

Summary: Discussion about the EPO granting machine (or patent-printing machine) and figures the way EPO management would rather the public wont ever see them; the concept that China means redemption for this patent system is as laughable as always

IF the EPO was a goose that lays golden eggs, those eggs would be the backlog. Pending applications dont last forever and Battistelli now slaughters the goose, making redundancies quite imminent; Office rumour is, the Office will lay off about quarter of staff (the numbers/estimates heard vary).

Office rumour is, the Office will lay off about quarter of staff (the numbers/estimates heard vary).We dont wish to depress staff, but realistic expectations prevent disappointment. Earlier this month (and even this week in Twitter) the EPO was spreading false or misleading information which it called results. We responded in the following 4 posts (and limited that to 4 although we could go on and on):


Fresh Benchmarks Of CentOS 7 On Xeon & EPYC With/Without KPTI/Retpolines Phoronix

While every few weeks or so we have ended up running benchmarks of the latest Linux Git kernel to see the evolving performance impact of KPTI (Kernel Page Table Isolation) and Retpolines for Meltdown and Spectre V2 mitigation, respectively, a request came in last week from a premium supporter to see some new comparison test runs on CentOS 7 with its older 3.10-evolved kernel...


Uber Self-driving Car Kills Woman In Arizona TechWorm

Uber self-driving Car hits, kills Arizona pedestrian; company suspends testing

The self-driving car, which is considered to the future of transportation, was involved in a fatal vehicle accident that killed one pedestrian woman. An Uber self-driving car in Arizona was involved in a crash that killed a woman crossing the street early on Monday, ABC15 reported, making it the first fatality involving an autonomous vehicle in the U.S.

The Tempe police said in a statement that the self-driving car was in autonomous mode when the vehicle struck 49-year-old Elaine Herzberg while she was walking outside of a crosswalk. Herzberg was taken to a hospital where she later died of her injuries.

The pedestrian was outside of the crosswalk. As soon as she walked into the lane of traffic she was struck, Tempe Police Sergeant Ronald Elcock told reporters during a news conference. While the vehicle was moving around 40 miles per hour when it struck Herzberg reveal the preliminary investigation, it is not yet known how close Herzberg was to the vehicle when she stepped into the lane, he added.

Elcock also said he believed Herzberg may have been homeless.

Chief of police Sylvia Moir told the San Francisco Chronicle on Monday that video footage taken from cameras fitted to the autonomous Volvo SUV potentially indicate that Uber is not at fault and the victim is more likely to be blamed for the incident.

Its very clear it would have been difficult to avoid this collision in any kind of mode [autonomous or human-driven] based on how she came from the shadows right into the roadway, Moir told the paper, adding that the incident took place roughly 100 yards from a crosswalk. It is dangerous to cross roadways in the evening hour when well-illuminated managed crosswalks are available, she said.

Although the vehicle was operating in autonomous mode, a driver was present in the front seat. But Moir said there appears to be little he could have done to intervene before the crash.

The driver said it was like a flash, the person walked out in front of them, Moir said. His first alert to the collision was the sound of the collision.

Following the incident, Uber said it has suspended North American tests of its self-driving vehicles, which are currently going on in Arizona, Pittsburgh and Toronto. Uber said in a statement on Twitter: Our hearts go out to the victims family. We are fully cooperating with local authorities in their investigation of this incident. H...


ES2018-05 Kamailio heap overflow Open Source Security

Posted by Sandro Gauci on Mar 20

# Off-by-one heap overflow in Kamailio

- Authors:
- Alfred Farrugia <alfred () enablesecurity com>
- Sandro Gauci <sandro () enablesecurity com>
- Fixed versions: Kamailio v5.1.2, v5.0.6 and v4.4.7
- References: no CVE assigned yet
- Enable Security Advisory: <>
- Tested vulnerable versions: 5.1.1, 5.1.0, 5.0.0
- Timeline:


Re: Sanitize <= 4.6.2 HTML injection and XSS Open Source Security

Posted by Ryan Grove on Mar 20

CVE-2018-3740 has been assigned for this issue.

- Ryan


Re: CVE request: maliciously crafted notebook files in Jupyter Open Source Security

Posted by Gordo Lowrey on Mar 20

Obviously, running a python notebook from an untrusted party is a bad
idea, since notebooks are litearlly code executors...

Sure, there is something to be said about *javascript* execution... but
there are a plethora of addons for Python notebooks that generate
Javascript on-demand. Especially for visualizations, etc...

Why is this a "vulnerability" necessarily?

Just curious...

On Mon, Mar 19, 2018 at 7:53 AM, Ricter Zheng...


Cambridge Analytica controversy: Was there a Facebook data breach? Graham Cluley

Its not fair to describe what happened at Facebook as a data breach.

Its much worse than that.


Nimbus Data Unveils The Worlds Largest ExaDrive 100TB SATA SSD TechWorm

Worlds largest capacity 100TB SSD launched by Nimbus Data

Last month, Samsung Electronics unveiled the worlds largest 30.72TB capacity SSD (solid-state-drive), promising a new era of speed and storage space. Now, Nimbus Data, pioneer in flash memory solutions, announced its new ExaDrive DC100, a 100TB SSD, the highest capacity SSD ever produced that offers more than three times the storage capacity of its closest competitor, claims the company.

Basically, optimized for capacity and efficiency, Nimbus Datas DC100 is a 3.5-inch form factor and has a SATA interface used by hard drives, which means it can work as a plug-and-play compatible with hundreds of storage and server platforms. The SSD uses Nimbuss multi-processor architecture and 3D NAND, which provides enough capacity to store 20 million songs, 20,000 HD movies or 2,000 iPhones of data in a device that is small enough to fit in your back pocket.

The SSD model also offers up 500MB/s of sequential read and write throughput and up to 100,000 random read and write IOps (input/output operations per second). According to Nimbus Data, this performance also helps improve CPU performance by 50 percent or more.

The release of such a high capacity flash device that is fully compatible with HDD form factors opens up the opportunity to turbo charge big data platforms while at the same time improving reliability, significantly reducing device count, increasing data mobility, and lowering the TCO of multi-PB scale storage platforms, said Eric Burgener, research vice president of Storage at IDC. Devices of this class will allow flash to cost-effectively penetrate a broader set of use cases outside of tier 0 and tier 1 applications.

The DC100 model consumes only 0.1 watts per TB (terabyte), which is 80-90% lower than other competing large-capacity SSDs. This makes it appropriate for edge and IoT applications. These improvements reduce total cost of ownership per TB by 42% compared to competing enterprise SSDs, helping accelerate flash memory adoption in both cloud infrastructure and edge computing.

As flash memory prices decline, capacity, energy efficiency, and density will become the critical drivers of cost reduction and competitive advantage, stated Thomas Isakovich, CEO and founder of Nimbus Data. The ExaDrive DC100 meets these challenges for both data center...


Microsoft Announces Directx 12 Raytracing API SoylentNews

At GDC, Microsoft announced a new feature for DirectX 12: DirectX Raytracing (DXR). The new API offers hardware-accelerated raytracing to DirectX applications, ushering in a new era of games with more realistic lighting, shadows, and materials. One day, this technology could enable the kinds of photorealistic imagery that we've become accustomed to in Hollywood blockbusters.

[...] Because of the performance demands, Microsoft expects that DXR will be used, at least for the time being, to fill in some of the things that raytracing does very well and that rasterization doesn't: things like reflections and shadows. DXR should make these things look more realistic. We might also see simple, stylized games using raytracing exclusively.

The company says that it has been working on DXR for close to a year, and Nvidia in particular has plenty to say about the matter. Nvidia has its own raytracing engine designed for its Volta architecture (though currently, the only video card shipping with Volta is the Titan V, so the application of this is likely limited). When run on a Volta system, DXR applications will automatically use that engine.

In conjunction with Microsofts new DirectX Raytracing (DXR) API announcement, today NVIDIA is unveiling their RTX technology, providing ray tracing acceleration for Volta and later GPUs. Intended to enable real-time ray tracing for games and other applications, RTX is essentially NVIDIA's DXR backend implementation. For this NVIDIA is utilizing a mix of software and hardware including new microarchitectural features though the company is not disclosing further details.

Original Submission

Read more of this story at SoylentNews.


3D Printing And Modelling With A Robot Assistant Hackaday

[Huaishu Peng] and a group of other researchers have come up with a system that allows them to use virtual reality (VR) to model an object in a space in front of them while a robot simultaneously 3D prints that object in that same space, a truly collaborative effort they call the RoMA: Robotic Modelling Assistant. This is a step toward fixing the problem of designing something and then having to wait for the prototype to be made before knowing how well it fits the design goals.

The parts: designer, AR headset, AR controller, rotating platform, robotic printerThe parts

How does the designer/robot collaboration work? The designer wears an Oculus Rift VR headset with a camera mounted to the front, turning it into an AR (Augmented Reality) headset. In front of the designer is a rotating platform on which the object will be 3D printed. And on the other side of the platform is the 3D printing robot. In the AR headset, the designer views the platform, the object, and the robot as seen by the camera but with the model hes working on overlayed onto the object. An AR hand controller allows him to work on the model. Meanwhile, the robot 3D prints the model. See it in action in the video below.

Some of the advantages of this collaboration are demonstrated in the video below by designing and printing a teapot. When its time to model the teap...


The US International Trade Commission (USITC) Against Comcast, Courtesy of the Intellectual Ventures-Connected Rovi Techrights

Administrative Law Judge Photos
Reference: Administrative Law Judge Photos

Summary: The USITC/ITC, which mostly serves to impose embargoes (sometimes in shocking defiance of PTAB decisions), is being invoked by a firm connected to the worlds largest patent troll, Intellectual Ventures

WE occasionally mention the ITC in relation to sanctions. The ITC mostly services technology giants in the US, protecting these from foreign competition. A decade ago, for instance, Microsoft used the ITC to embargo imports of rival mice, using nothing but patent allegations rather than claims of counterfeiting (which would be more severe).

Yesterday the Docket Navigator picked a case in which the ITC had gotten involved.

What we find most interesting in all this is that here, for a change, a large company from the US is being targeted and the instigator is connected to a very notorious patent troll.The ALJ [Administrative Law Judge], it said, denied respondents motion to certify for judicial enforcement its prior art subpoena to two nonparties whom complainants sued for infringement of the same patents in district court because the documents sought were protected attorney work product.

Days prior to this we found this report about Rovi Corporation, which is connected to the worlds largest patent troll and is suing a lot [1, 2,...


Popular Pirate Streaming Giant 123movies Announces Shutdown TechWorm

123movies is the next one to shutdown

With clear legal pressure growing on illegal streaming sites, one more pirate streaming site is going to bite the dust very soon. 123movies(hub), also known as GoMovies, the worlds most popular illegal streaming site with millions of visitors per day, has announced shutdown on its website.

According to a message posted on the site, the sites operators say that they will shut down at the end of the week. However, the operators are simultaneously also advising their users to respect filmmakers by paying for movies and TV-shows instead of pirating them.

Weve been providing links to movies and shows for years. Now its time to say goodbye. Thank you for being our friends and thanks for staying with us that long, the 123movies team writes.

PS: Please pay for the movies/shows, thats what we should do to show our respect to people behind the movies/shows, the team adds.

The shutdown announcement, which is currently only visible on the classic homepage, comes after a recent investigation by the Motion Picture Association of America (MPAA) who discovered a new threat based in Vietnam and officially called 123movies, as the worlds most popular illegal movie site.

Right now, the most popular illegal site in the world, (at this point), is operated from Vietnam, and has 98 million visitors a month, MPAAs Executive Vice President & Chief of Global Content Protection, Jan van Voorn said.

There are more services like this [123movies] sites that are not helpful for local legitimate businesses, added Voorn, who is working with the Office of the Police Investigation Agency (C44) to tackle the problem.

Its unclear if this site is being closed down under pressure or for some other reason. The 123movies team has yet to provide a reason for the planned closure decision.

Do let us know what you think of shutting down of the illegal pirate streaming sites in the comments section mentioned below.

Source: TorrentFreak | Express UK

The post Popular Pirate Streaming Giant 123movies Announces Shutdown appeared first on TechWorm.


Developers Are Ethical But Not Responsible?

Ask a person if he or she is a racist and the answer is almost always no. Ask a developer if they consider ethical considerations when writing code and only six percent say no. If everyone acted the way they self-report, then there would be peace and love throughout the world.


Dotcom Affidavit Calls For Obama to Give Evidence in Megaupload Case TorrentFreak

For more than six years since the raid on Megaupload, founder Kim Dotcom has insisted that the case against him, his co-defendants, and his company, was politically motivated.

The serial entrepreneur states unequivocally that former president Barack Obamas close ties to Hollywood were the driving force.

Later today, Obama will touch down for a visit to New Zealand. In what appears to be a tightly managed affair, with heavy restrictions placed on the media and publicity, it seems clear that Obama wants to maintain control over his social and business engagements in the country.

But of course, New Zealand is home to Kim Dotcom and as someone who feels wronged by the actions of the former administration, he is determined to use this opportunity to shine more light on Obamas role in the downfall of his company.

In a statement this morning, Dotcom reiterated his claims that attempts to have him extradited to the United States have no basis in law, chiefly due to the fact that the online dissemination of copyright-protected works by Megauploads users is not an extradition offense in New Zealand.

But Dotcom also attacks the politics behind his case, arguing that the Obama administration was under pressure from Hollywood to do something about copyright enforcement or risk losing financial support.

In connection with his case, Dotcom is currently suing the New Zealand government for billions of dollars so while Obama is in town, Dotcom is demanding that the former president gives evidence.

Dotcoms case is laid out in a highly-detailed sworn affidavit dated March 19, 2018. The Megaupload founder explains that Hollywood has historically been a major benefactor of the Democrats so when seeking re-election for a further term, the Democrats were under pressure from the movie companies to make an example of Megaupload and Dotcom.

Dotcom notes that while he was based in Hong Kong, extradition to the US would be challenging. So, with Dotcom seeking residence in New Zealand, a plot was hatched to allow him into the country, despite the New Zealand government knowing that a criminal prosecution lay in wait for him. Dotcom says that by doing a favor for Hollywood, it could mean that New Zealand became a favored destination for US filmmakers.

The interests of the United States and New Zealand were therefore perfectly aligned. I provided the perfect opportunity for New Zealand to facilitate the United States show of force on copyright enforcement, Dotcom writes.



Tinder/Match Group Uses Software Patents to Sue a Rival, Obviously Choosing to Sue in Texas Techrights

Map of Texas

Summary: Software patents are being used for leverage, but only those which were likely granted before Alice and only in courts at districts somewhere around Texas

THE remnant of software patents granted by the USPTO is a massive liability. A lot of lawsuits rely on such patents, which are likely toothless and thus worthless after Alice.

A few days ago it turned out that Tinder had become a patent bully. Its suing over alleged infringement of software patents (which are likely bunk and void). Maybe it was hoping that the rival will just settle/fold/sell, or even remove features (modifying the platform); eventually came a lawsuit in an expectedly biased court:

Match Group, the online dating company that owns services like Tinder and, wants to buy Bumble, another popular dating app that lets women make the first move.

But Match may be trying to push the deal along in an unconventional way: A new patent infringement lawsuit filed late Friday in U.S. District court in Waco, Texas.

Match Group is suing Bumble, which was founded by one of Tinders co-founders, for infringing on two of its patents, including a design patent for Tinders now-famous swipe-to-connect feature, according to the suit.

Assuming that the lawsuit cannot be relocated (venue change), theres a chance they might get away with it.

Examiners ought to stop allowing monopolies on algorithms and applicants oughtnt bother patenting software (because courts dont really care for these).In the meantime, Judge Gilstrap is said to have supported a defendant in a patent case in the Eastern District of Texas (EDTX). Thats rare! So rare in fact that Docket Navigator gave it a special mention yesterday. The case is Adjustacam LLC v, Inc., et al and the summary is as follows: The court awarded defendant its attorney fees under 35 U.S.C. 285 and rejected plaintiffs argument that defendant was not entitled to attorney fees prior to claim construction.

That does not me...


Apple Blocks Sites From Abusing HSTS Security Standard to Track Users The Hacker News

If you are unaware, the security standard HTTP Strict Transport Security (HSTS) can be abused as a 'supercookie' to surreptitiously track users of almost every modern web browser online without their knowledge even when they use "private browsing." Apple has now added mitigations to its open-source browser infrastructure WebKit that underpins its Safari web browser to prevent HSTS abuse after


IBM Unveils The Worlds Smallest Computer, That Is Smaller Than A Grain Of Salt TechWorm

IBMs new worlds smallest computer is smaller than a salt grain

IBM, an American technology company famous for its computers and chips, has unveiled what it claims the worlds smallest computer, in its flagship conference IBM Think 2018 today. The tiny computer is small enough and cheap enough to be put anywhereand everywhere, asserts the company.

Measuring approximately 1x1mm or roughly the size of a grain of salt, the computer has the computing power of an x86 chip from the 1990s, which is quite impressive, considering the size, according to Mashable. The computer is so tiny that one would need the help of a microscope to identify it.

It will also consist of several hundred thousand transistors and allow the company to monitor, analyze, communicate, and even act on data. It will feature a static RAM, an LED, and photo-detector through which it will communicate and an integrated photovoltaic cell for power, as per Fortune.

The computer even works with blockchain applications making it possible for bitcoin users to use it too. Specifically, it is intended to help track the shipment of goods and detect theft, fraud, and non-compliance. It can also perform basic AI tasks, including sorting the given data.

According to IBM, this is only the beginning. Within the next five years, cryptographic anchors such as ink dots or tiny computers smaller than a grain of salt will be embedded in everyday objects and devices, said IBM head of research Arvind Krishna. Theyll be used in tandem with blockchains distributed ledger technology to ensure an objects authenticity from its point of origin to when it reaches the hands of the customer.

These technologies pave the way for new solutions that tackle food safety, authenticity of manufactured components, genetically modified products, identification of counterfeit objects and provenance of luxury goods.

While the future of computers definitely sounds interesting, there is still no clarity as to when the computer will be released. Currently, IBM researchers are testing the first prototype.



CSNC-2017-026 Microsoft Intune - Preserved Keychain Entries Bugtraq

Posted by Advisories on Mar 20

# Product: Microsoft Intune [1]
# Vendor: Microsoft
# CSNC ID: CSNC-2017-026
# Subject: Preserved Keychain Entries
# Risk: Medium
# Effect: Locally exploitable
# Author: Stephan Sekula <stephan.sekula () compass-security...


A New Era for Linux's Low-Level Graphics

A New Era for Linux's Low-Level Graphics


Reviewing Logins on Linux

The last command provides an easy way to review recent logins on a Linux system. It also has some useful options - such as looking for logins for one particular user or looking for logins in an older wtmp file.

The last command with no arguments will easily show you all recent logins. It pulls the information from the current wtmp (/var/log/wtmp) file and shows the logins in reverse sequential order (newest first).

7 Questions to Ask About Your DevSecOps Program

If youve implemented, or are implementing, a DevSecOps program, weve come up with several questions to consider below. By posing these questions, we hope to help spur new ideas and help identify areas for improvement. 

Is My Application (or Microservice) Leaking Data?


Ray-Tracing Is All The Rage At This Year's Game Developers Conference Phoronix

The annual Game Developers Conference (GDC 18) kicked off yesterday in San Francisco and one of the most popular topics this year is ray-tracing...


A Selfish Argument for Making the World a Better Place Lifeboat News: The Blog

Why should you care about the well-being of people half a globe away?

Kurzgesagt Newsletter:

Support us on Patreon so we can make more videos (and get cool stuff in return):

Kurzgesagt merch:


The music of the video here:


GStreamer 1.14.0 Released With WebRTC Support, AV1 Video & Better Rust Bindings Phoronix

GStreamer 1.14.0 is now available as the first big feature release of 2018 for this widely-used, open-source multimedia framework...


Nouveau NIR Support Appears Almost Baked, NV50 Support Added Phoronix

Karol Herbst at Red Hat started off this week by publishing his latest patches around Nouveau NIR support as part of the company's effort for getting SPIR-V/compute support up and running on this open-source NVIDIA driver...


Two Injured in Fourth Package Bombing Incident this Month in Austin, Texas SoylentNews

Two people have been killed and four have been injured by explosions caused by package bombs in Austin, TX this month:

In Texas, Another Explosion Injures 2 Men In Austin

Authorities in Austin, Texas, responded to an explosion in the southwest part of the city late Sunday, with the city's emergency medical service tweeting that it caused two serious but non-life-threatening injuries.

The blast comes on the heels of three package-bomb explosions in recent weeks that have killed two people and wounded two more, as well as a bomb threat that canceled a Saturday hip-hop concert at the South by Southwest festival. It is not yet known if Sunday night's explosion is related to any of the prior incidents.

Austin's police chief Brian Manley had made a direct appeal to the bomber(s) just hours earlier.

Original Submission

Read more of this story at SoylentNews.


ES2018-05 Kamailio heap overflow Bugtraq

Posted by Sandro Gauci on Mar 20

# Off-by-one heap overflow in Kamailio

- Authors:
- Alfred Farrugia <alfred () enablesecurity com>
- Sandro Gauci <sandro () enablesecurity com>
- Fixed versions: Kamailio v5.1.2, v5.0.6 and v4.4.7
- References: no CVE assigned yet
- Enable Security Advisory: <>
- Tested vulnerable versions: 5.1.1, 5.1.0, 5.0.0
- Timeline:


Unity Game Engine Plans For Rendering & Performance Improvements In 2018 Phoronix

Unity Tech made public at the Game Developers Conference their game engine plans for the year...


xf86-input-libinput 0.27.0 Released Phoronix

Aside from a few touchpad issues and other minor random issues with select hardware, libinput these days is mostly in great shape for being a generic input handling library that is working out well for both X.Org and Wayland users...


Frost Bank announced it has suffered a data breach that exposed check images Security Affairs

On Friday, Frost Bank announced that it has suffered a data breach that exposed check images, crooks could use them to forge checks.

Frost Bank announced on Friday that it has suffered a data breach that exposed check images.

The bank is a subsidiary of Cullen/Frost Bankers, Inc., its staff discovered an unauthorized access to its systems containing images of checks.

Attackers compromised a third-party lockbox software program, in this way they were able to access the images of checks stored electronically in the database.

In March 2018, Frost detected unauthorized access into a third-party lockbox software program that allowed unauthorized users to view and copy images of checks stored electronically in the image archive. reads the security advisory published by the company.

The identified incident did not impact other Frost systems. We have stopped the unauthorized access, and have reported the incident to and are cooperating with law-enforcement authorities.

The lockbox services are normally used by customers to send payments to a central post office box, once the bank will receive the payments it will credit them to a businesss account.

According to Frost Bank, its systems werent impacted by the security breach.

The bad news is that crooks once obtained the images could use them to forge checks.

Information from the accessed images can be used to forge checks. continues the advisory.

Frost Bank

According to Frost Bank, the unauthorized access was limited to one software program serving about 470 commercial customers who use the electronic lockbox,

The company confirmed it stopped the identified unauthorized access once discovered the breach.

Law enforcement is investigating the case, while Frost Bank hired an unnamed cybersecurity firm to investigate the security breach,

At Frost, we care deeply about taking care of our customers and protecting their information, and we regret that this situation has occurred. We are working very hard to m...


Test Ideas Now With Sensors Already In Your Pocket Hackaday

When project inspiration strikes, wed love to do some quick tests immediately to investigate feasibility. Sadly were usually far from our workbench and its collection of sensor modules. This is especially frustrating when the desired sensor is in the smartphone were holding, standing near whatever triggered the inspiration. We could download a compass app, or a bubble level app, or something similar to glimpse sensor activity. But if were going to download an app, consider Googles Science Journal app.

It was designed to be an educational resource, turning a smartphones sensor array into a pocket laboratory instrument and notebook for students. Fortunately it will work just as well for makers experimenting with project ideas. The exact list of sensors will depend on the specific iOS/Android device, but we can select a sensor and see its output graphed in real-time. This graph can also be recorded into the journal for later analysis.

Science Journal was recently given a promotional push by the band OK Go, as part of their OK Go Sandbox project encouraging students to explore, experiment, and learn. This is right up the alley for OK Go, who has a track record of making music videos that score high on maker appeal. Fans would enjoy their videos explaining behind-the-scene details in the context of math, science, and music.

An interesting side note. Anyone whos been to Hackaday Superconference or one of the monthly Hackaday LA meetups will likely recognized the venue used in many of the OK Go Sandbox videos. Many of them were filmed at the Supplyframe Design Lab in Pasadena. Its also nice to see AnnMarie Thomas (Hackaday Prize Judge from 2016 and 2017) collaborated with OK Go for the Sandbox project.

While the Science Journal app has provisions for add-on external sensors, carrying them around would reduce its handy always-available appeal. Not that were against pairing smartphones with clever accessories to boost their sensing capabilities: we love them! From trying to turn a smartphone into a Tricorder, to an inexpensive microscope, to exploring serious medical diagnosis, our pocket computers can do it all.

[via Engadget]



Police Ask Google For Data Of All People Near Crime Scenes SoylentNews

Fast Company reports that Police in Raleigh, North Carolina, have presented Google with warrants to obtain data from mobile phones from not just specific suspects who were in a crime scene area, but from the mobile phones of all people in the area.

The above story links to an investigative piece at WRAL:

In at least four investigations last year cases of murder, sexual battery and even possible arson at the massive downtown fire in March 2017 Raleigh police used search warrants to demand Google accounts not of specific suspects, but from any mobile devices that veered too close to the scene of a crime, according to a WRAL News review of court records. These warrants often prevent the technology giant for months from disclosing information about the searches not just to potential suspects, but to any users swept up in the search.

City and county officials say the practice is a natural evolution of criminal investigative techniques. They point out that, by seeking search warrants, they're carefully balancing civil rights with public safety.

Defense attorneys and privacy advocates, both locally and nationally, aren't so sure.

They're mixed on how law enforcement turns to Google's massive cache of user data, especially without a clear target in mind. And they're concerned about the potential to snag innocent users, many of whom might not know just how closely the company tracks their every move.

Read more of this story at SoylentNews.


DARPA wants to connect human brains and machines Lifeboat News: The Blog

Neurotechnology would significantly increase the speed at which information is transferred from humans to machines, and a brain-systems interface may be a requirement to keep up with the pace and complexity of future combat zones.


HTC's Vive Pro to Launch on April 5 SoylentNews

HTC's Vive Pro virtual reality headset is now open for preorders. Resolution has been increased to 28001600 from 21601200, a microphone for noise cancellation analysis has been added, and it has two front-facing cameras instead of one, possibly allowing it to detect objects and hand movements:

The Vive Pro was announced early this year at CES, marking the first major upgrade to the Vive since its launch in 2016. It substantially increases the Vive's screen resolution, using two OLED displays that offer 1400 x 1600 pixels per eye compared to 1080 x 1200 on the current Vive. It also includes a variety of ergonomic changes, including built-in headphones and a head strap that tightens via dial instead of velcro. You could get these options via a kit for the original Vive, but now they're built into the core device, and we've found the hardware to be a distinct improvement over its predecessor.

The Vive Pro will not come with accessories at its launch price of $799, although existing Vive accessories can be used:

HTC's higher-resolution Vive Pro, first announced back in January, is setting new records for the price of a mass-market virtual reality headset. In pre-orders starting today ahead of planned April 5 shipments, customers will have to shell out $799 for the improved Vive Pro headset, a price that does not include any controllers or Lighthouse tracking base stations.

Original Submission



Parts Bin Spooky Eye Build Hackaday

Halloween is a great holiday for hacks, bringing out the creativity in even the most curmudgeonly wielder of a soldering iron. [tdragger] was looking to have some good old fashioned Halloween fun, and got to thinking putting together this great Spooky Eyes build in their attic window.

The effect itself is simple just two glowing orange LEDs spaced the right distance apart, placed in the highest window in the house. As every young child knows, the attic is almost the spookiest room in the house, second only to the basement.

Various effects were programmed in to the Arduino running the show, like breathing and blinking effects, to give that frightful character. For maintenance and programming purposes, [tdragger] wanted to have the Arduino remotely mounted, and searched for a solution. Rather than leaning on a wireless setup or something modern and off-the-shelf, instead some old RJ11 telephone extension cables were pressed into service. These allowed the eyes to be placed in the window, allowing the Arduino to be placed in a more accessible location.

Its a basic project, but one that has a good fun factor. Sometimes its good to use what youve got to hand, so that the buzz of enjoyment isnt dampened by the long wait for shipping. For something bigger, check out this giant staring eyeball.


Potential For Personalized Immunotherapy To Large Variety Of Cancers SoylentNews

A Ludwig Cancer Research study shows that ovarian cancer, which has proved resistant to currently available immunotherapies, could be susceptible to personalized immunotherapy. Led by Ludwig Lausanne investigator Alexandre Harari and George Coukos, director of the Ludwig Institute for Cancer Research, Lausanne, the study shows that ovarian tumors harbor highly reactive killer T cells -- which kill infected and cancerous cells -- and demonstrates how they can be identified and selectively grown for use in personalized, cell-based immunotherapies.

"Tumors whose cells tend to be highly mutated, like those of melanoma and lung cancer, are the ones that respond best to immunotherapies," says Harari. "It has long been a question whether we'd even be able to detect sufficiently mutation-reactive T cells in patients with tumors that have low mutational loads."

[...] To get around this problem, researchers have been developing sophisticated methods to extract T cells from patients, select and expand those that best target a patient's cancer and reinfuse them into the patient. These approaches usually rely on T cells extracted from the bloodstream, not those already inside the tumor, which are referred to as TILs (for tumor infiltrating lymphocytes).

Journal Reference: Sara Bobisse, Raphael Genolet, et al. Sensitive and frequent identification of high avidity neo-epitope specific CD8 T cells in immunotherapy-naive ovarian cancer. Nature Communications, 2018; 9 (1) DOI: 10.1038/s41467-018-03301-0

Original Submission

Read more of this story at SoylentNews.


LFD435 Developing Embedded Linux Device Drivers

This course is designed to show experienced programmers how to develop device drivers for embedded Linux systems, and give them a basic understanding and familiarity with the Linux kernel.

LFD460 Embedded Linux Development with Yocto Project

Obtain a solid understanding of embedded development using the Yocto Project, including the Poky Reference Distribution and Bitbake, the use of emulators, building images for multiple architectures and the creation of board support packages (BSP).


Sanitize <= 4.6.2 HTML injection and XSS Open Source Security

Posted by Ryan Grove on Mar 19

Sanitize is a Ruby library that removes unacceptable HTML and CSS from a string based on a whitelist. Versions 4.6.2
and below contain an HTML injection vulnerability that allows XSS.

Details are included below, and can also be found at:


# Sanitize XSS vulnerability

This is a public disclosure of an HTML injection vulnerability in Sanitize that could allow XSS. Id like to thank the...


China will Ban People with Poor Social Credit from Planes and Trains SoylentNews

China said it will begin applying its so-called social credit system to flights and trains and stop people who have committed misdeeds from taking such transport for up to a year.

People who would be put on the restricted lists included those found to have committed acts like spreading false information about terrorism and causing trouble on flights, as well as those who used expired tickets or smoked on trains, according to two statements issued on the National Development and Reform Commissions website on Friday.

[...] China has flagged plans to roll out a system that will allow government bodies to share information on its citizens trustworthiness and issue penalties based on a so-called social credit score.

China to bar people with bad 'social credit' from planes, trains


Chinas dystopian social credit system is a harbinger of the global age of the algorithm

Original Submission

Read more of this story at SoylentNews.


Your Speech Is Packed With Misunderstood, Unconscious Messages - Facts So Romantic Nautilus

Imagine standing up to give a speech in front of a critical audience. As you do your best to wax eloquent, someone in the room uses a clicker to conspicuously count your every stumble, hesitation, um and uh; once youve finished, this person loudly announces how many of these blemishes have marred your presentation.

If disfluencies appear to generally help communication more than they hinder it, why are they so stigmatized?Photograph by Sean Lamb / Flickr

This is exactly the tactic used by the Toastmasters public-speaking club, in which a designated Ah Counter is charged with tallying up the speakers slip-ups as part of the training regimen. The goal is total eradication. The clubs punitive measures may be extreme, but they reflect the folk wisdom that ums and uhs betray a speaker as weak, nervous, ignorant, and sloppy, and should be avoided at all costs, even in spontaneous conversation.

Many scientists, though, think that our cultural fixation with stamping out what they call disfluencies is deeply misguided. Saying um is no character flaw, but an organic feature of speech; far from distracting listeners, theres evidence that it focuses their attention in ways that enhance comprehension.

Disfluencies arise mainly because of the time pressures inherent
Read More


UK Court Hears of Plot To Rape, Dissolve in Acid Children For Pleasure of Unnamed Top Politicians

The source article is paywalled at Court News UK: Plot to Abuse Children for Top Political People: A paedophile told an undercover police officer that they could make millions of pounds raping children on camera for top political people, a court heard. Gihan Muthukumarana, 28, claimed they could sell the film for 10m if they []


All Your iPhone Are Belong To Us Hackaday

Apples commitment to customer privacy took the acid test after the San Bernadino shooting incident. Law enforcement demanded that Apple unlock the shooters phone, and Apple refused. Court cases ensued. Some people think that the need to protect the public outweighs the need for privacy. Some people think that once they can unlock one iPhone, it wont stop there and that will be bad for everyone. This post isnt about either of those positions. The FBI dropped their lawsuit against Apple. Why? They found an Israeli firm that would unlock the phone for about $5,000. In addition, Malwarebytes a company that makes security software reports that law enforcement can now buy a device that unlocks iPhones from a different company.

Little is known about how the device from a company called Grayshift works. However, Malwarebytes has some unverified data from an unnamed source. Of course, the exploit used to break the iPhone security is secret because if Apple knew about it, theyd fix it. Thats happened before with a device called IP-box that was widely used for nefarious purposes.

That seems to be one of the biggest concern about devices and services like these is that they dont fall into the hands of phone or identity thieves. The other big concern is just government abuse. Even if you trust your government, there are plenty of other ones out there.

At first glance, the remote unit might seem less scary as long as you trust your law enforcement agencies. After all, if a box is stolen before setup, it would only be good as long as the home office was still allowing it to work. And, presumably, after setup, it wont work because it will know it is on the wrong network. Contrast this to the stand-alone unit. If you steal one of these with a password written on a sticky note and the two-factor token, you can unlock iPhones all day until Apple fixes whatever allows this to work.


IBM Highlights 5 Technologies It Hopes To Pioneer In 5 Years Lifeboat News: The Blog

The first step turning ideas into reality is to identify meaningful problems.

By Greg Satell


Trumps Election Consultants Filmed Saying They Use Bribes and Sex Workers to Entrap Politicians

Via: Channel 4: An undercover investigation by Channel 4 News reveals how Cambridge Analytica secretly campaigns in elections across the world. Bosses were filmed talking about using bribes, ex-spies, fake IDs and sex workers. Senior executives at Cambridge Analytica the data company that credits itself with Donald Trumps presidential victory have been secretly []


SpaceX BFR vs. ULA Vulcan Showdown in the 2020s SoylentNews

The United Launch Alliance's CEO Tory Bruno has been making his case for the upcoming Vulcan rocket and Advanced Cryogenic Evolved Stage. The system could compete against SpaceX's Falcon Heavy and BFR in the mid-2020s:

The maiden flight of the Vulcan currently is targeted for the middle of 2020. Two successful commercial launches are required as part of the government certification process, followed by a required upper stage upgrade to improve performance, either moving from two to four Centaur RL10 engines or using a different set of engines altogether. If all goes well, ULA will introduce its new upper stage in 2024, the Advanced Cryogenic Evolved Stage, or ACES, that Bruno says will revolutionize spaceflight. "This is on the scale of inventing the airplane," Bruno told reporters during the media roundtable. "That's how revolutionary this upper stage is. It's 1900, and I'm inventing the airplane. People don't even know what they're going to do with it yet. But I'm confident it's going to create a large economy in space that doesn't exist today. No one is working on anything like this."

The Vulcan will stand 228 feet tall with a first stage powered by two engines provided by either Blue Origin, a company owned by Amazon-founder Jeff Bezos, or Aerojet Rocketdyne. Blue Origin's BE-4 engine burns methane and liquid oxygen while Aerojet Rocketdyne's AR-1 powerplant burns a more traditional mixture of oxygen and highly refined kerosene.

[...] ULA plans to begin engine recovery operations after the Vulcan is routinely flying and after the ACES upper stage is implemented. Bruno said the engines represent two-thirds of the cost of the stage and getting them back every time, with no impact on mission performance, will pay big dividends. SpaceX, in contrast, must use propellant to fly its Falcon 9 stages back to touchdown. Heavy payloads bound for high orbits require most if not all of the rocket's propellant and in those cases, recovery may not be possible. As a result, SpaceX's ability to recover rocket stages depends on its manifest and the orbital demands of those payloads.

"Simplistically, if you recover the old booster propulsively then you can do that part of the time, you get all the value back some of the time," Bruno said. "Or, you can recover just the engine, which is our concept, and then you get only part of the value back, about two thirds ... but you get to do it every single time because there's no performance hit. So it really turns into math."

ULA expects to fly at least 7-8 more Delta IV Heavy ro...


[$] Porting Fedora to RISC-V

In my previous article, I gave an introduction to the open architecture of RISC-V. This article looks at how I and a small team of Fedora users ported a large part of the Fedora package set to RISC-V. It was a daunting task, especially when there is no real hardware or existing infrastructure, but we were able to get there in a part-time effort over a year and a half or so.

Subscribers can read on for a look at getting Fedora onto RISC-V by guest author Richard W.M. Jones.


Senate Commerce presses Facebook, Cambridge Analytica for answers on data The Hill: Technology Policy

The Senate Commerce Committee is pushing Facebook and Cambridge Analytica to answer questions about their dealings with one another, following controversy over data the firm allegedly took from 50 million Facebook accounts. We appreciate that...


Overnight Tech: Facebook faces crisis over Cambridge Analytica data | Lawmakers demand answers | What to watch for next | Day one of AT&T's merger trial | Self-driving Uber car kills pedestrian The Hill: Technology Policy

FACEBOOK UNDER SCRUTINY OVER CAMBRIDGE ANALYTICA DATA: Lawmakers are demanding answers from Facebook after reports that Cambridge Analytica, a research firm connected to the Trump campaign, obtained data on 50 million accounts, without the company's...


HPR2512: Intro to git remote Hacker Public Radio

Instantiate a git repo&#58; $ mkdir alice $ cd !$ $ git init Add a remote&#58; $ git remote add origin URI_OF_REMOTE Change a remote&#58; $ git remote set-url origin NEW_URI A remote can be a server, it can be a local directory, an NFS share, pretty much whatever you want. It is a Git convention that the primary remote is called origin. You don&#39;t have to call it that, but it&#39;s pretty common.

IBM's Tiny Computer for Anti-Counterfeiting SoylentNews

IBM has built a computer smaller than a grain of salt intended for anti-counterfeiting... and it uses a blockchain:

IBM has unveiled what it claims is the world's smallest computerthe size of a grain of salt. The computer will cost less than $0.10 to manufacture, and is intended for logistics applications.

The device is one type of what IBM calls "crypto-anchors""digital fingerprints" that can be embedded in everyday items in order to verify their provenance and contents. Another example of this concept is edible ink that can be stamped on pills.

The idea is to use these methods to link things to their records, which are stored on a blockchain.

The computer includes several hundred thousand transistors, static RAM, an LED and a photodetector for communication, and an integrated solar cell.

Also at Engadget, Notebookcheck, and CNET.

Original Submission

Read more of this story at SoylentNews.


Wayland 1.15 Beta Released With Weston 4.0 Beta Phoronix

The beta releases are available today of Wayland 1.15 and the Weston 4.0 reference compositor...


DIY Power Supply and TS100 Outlet Combo Shows off Great Layout Hackaday

Heres a combination of two important electronics workbench tools into a single, cleanly-assembled unit. [uGen] created a DC power supply complete with a plug for the popular TS100 soldering iron, and it looks great! Most of the main components are familiar offerings, like a LM2596 DC to DC buck converter board and a DPS3003 adjustable DC power supply unit (we previously covered a DIY power supply based around the similar DPS5005.) The enclosure is an economical, featureless desktop instrument case whose panels were carefully cut to fit the necessary components. Theres one limitation to the combo: the unit uses a switch to either power an attached TS100 iron, or act as a general DC power supply. It cannot do both at once. So long as one doesnt mind that limitation, its a nice bundle made from very affordable components.

Its easy for something to look like a hack job, but to look clean and professional involves thoughtful measurement, planning, and assembly. Fortunately, [uGen] has supplied all the drawings and bill of materials for the project so theres no need to start from scratch. Also, dont forget that if the capabilities of the DPS power supply units leave you wanting a bit more, there is alternative firmware in the form of OpenDPS; it even offers a remote control feature by adding an ESP8266.


Facebook security chief leaving company: report The Hill: Technology Policy

Facebooks chief information security officer is leaving the company over differences about its handling of disinformation during the 2016 presidential campaign, according to a report in The New York Times.The Times reported Monday that Alex Stamos...


Cambridge Analytica: Five things to watch The Hill: Technology Policy

The British data-mining firm Cambridge Analytica is facing massive scrutiny.Facebook late last week banned the company, saying it violated the platforms policies by failing to delete data on 50 million of the social media giants users.&...


Social media accounts of Cambridge Analytica whistleblower suspended HackRead

By Waqas

Earlier this week, it was reported that in 2015 the

This is a post from Read the original post: Social media accounts of Cambridge Analytica whistleblower suspended


Self-Driving Uber Car Kills Arizona Woman Crossing Street

Update: Tempe Police Chief Says Early Probe Shows No Fault by Uber Via: San Francisco Chronicle: Pushing a bicycle laden with plastic shopping bags, a woman abruptly walked from a center median into a lane of traffic and was struck by a self-driving Uber operating in autonomous mode. The driver said it was like a []



Conn. AG questions Zuckerberg about Cambridge Analytica data The Hill: Technology Policy

The Connecticut attorney general is demanding answers from Facebook following reports that the data research firm Cambridge Analytica obtained information on 50 million users without their consent."News reports that personal user information from...


Facebook hires digital forensics firm to audit Cambridge Analytica The Hill: Technology Policy

Facebook has hired a digital forensics firm to investigate Cambridge Analytica, a digital campaign firm that worked on President Trump's 2016 election bid, after reports that the company had obtained data on 50 million American users without their...


Pirate Streaming Giant 123Movies Announces Shutdown TorrentFreak

With millions of visitors per day, 123movies(hub), also known as Gomovies, is one of the largest pirate streaming sites on the web.

However, according to a new message posted on the site, this will soon end. The sites operators say that they will shut down at the end of the week.

Weve been providing links to movies and shows for years. Now its time to say goodbye. Thank you for being our friends and thanks for staying with us that long, the 123movies team writes.

In addition, 123movies encourages its users to respect filmmakers by paying for movies and TV-shows instead of pirating them.

PS: Please pay for the movies/shows, thats what we should do to show our respect to people behind the movies/shows, the team adds.

123movies shutdown notice

The shutdown announcement, which is currently only visible on the classic homepage, comes a few days after the MPAA branded the site as the the most popular illegal site in the world.

Right now, the most popular illegal site in the world, (at this point), is operated from Vietnam, and has 98 million visitors a month, MPAAs Executive Vice President & Chief of Global Content Protection, Jan van Voorn said.

That wasnt the first time the site had been called out. Last year the US Ambassador to Vietnam called on the local Government to criminally prosecute the sites operators on their alleged home turf. In addition, the site was also on the radar of the office of the US Trade Representative, which featured 123movies in its latest Notorious Markets report.

While 123movies has changed names several times over the course of the last few months, it was still a relative newcomer. It first emerged less than three years ago, but quickly became a dominant player.

According to the announcement, however, it will be all over in a few days. With millions of potential estranged users, that will leave a huge gap to fill.

The reason for the planned closure decision is unknown. Speculation would suggest legal pressure being high on the list, but the 123movies team hasnt commented on its...


[CVE-2018-8048] Loofah XSS Vulnerability Open Source Security

Posted by Mike Dalessio on Mar 19

Hello all,

A *medium* severity vulnerability has been identified and patched in
Loofah, which is a library used by `rails-html-sanitizer`. This issue has
been assigned CVE-2018-8048.

The public notice can be found here:

To save you a click, I've reproduced the contents of the initial
announcement here.


*# CVE-2018-8048 - Loofah XSS Vulnerability*

This issue has been created...


US-Russian crew to blast off for International Space Station mission Lifeboat News: The Blog

A handout photo made available by the National Aeronautics and Space Administration (NASA) shows the Soyuz rocket inside Building 112 prior to being rolled out by train to the launch pad at the Baikonur Cosmodrome in Kazakhstan, March 19, 2018. Expedition 55 crewmembers Ricky Arnold and Drew Feustel of NASA and Oleg Artemyev of Roscosmos are scheduled to launch at 1:44 p.m. Eastern time (11:44 p.m. Baikonur time) on March 21 and will spend the next five months living and working aboard the International Space Station (ISS), NASA said.


Retinal patch with stem cells treats macular degeneraiton Lifeboat News: The Blog

March 19 (UPI) Researchers in California have developed a retinal patch with stem cells to improve the vision of people with age-related macular degeneration.

In a clinical trial, researchers at the University of California Santa Barbara implanted the stem cell-derived ocular cells in two patients over the course of 12 months, publishing the results of the study Monday in the journal in Nature Biotechnology.

Macular degeneration, which affects the central, or reading, vision while leaving the surrounding vision normal, usually affects people over 50 years of age. The Centers for Disease Control and Prevention estimates that 1.8 million Americans aged 40 years and older have AMD, and its the leading cause of permanent impairment of close-up vision among people aged 65 years and older.


A Clever Animation That Explains the Heights and Purposes of Each Layer of the Earths Atmosphere Lifeboat News: The Blog

While many of us have a nebulous familiarity with the universe, a very clever animation by the Royal Observatory Greenwich explains the height and purposes of the different layers of the Earths atmosphere before it is officially considered to be space. These layers include the troposphere, stratosphere, mesosphere, and the Krmn Line. The thermosphere, which continues on and on eventually becomes the exosphere and then on to space as we know it.

Have you ever wondered how far away space is; how far are the different things you see above your head? Join the Royal Observatory Greenwich astronomers as they ascend up through the different layers of the Earths atmosphere to reveal what we would see at different heights.

The Royal Observatory also put together an equally clever animation that describes how the solar system was formed.


Worlds largest geyser erupts at Yellowstone National Park Lifeboat News: The Blog


USGS scientists and park staff stress that theres nothing to worry about in terms of the supervolcano underlying Yellowstone.

We have zero concerns that anything is happening volcanically, Stovall said, adding that there hasnt been a Yellowstone supervolcano eruption in more than 600,000 years. Theres been geysers erupting through that whole time and that doesnt mean that anything is happening with magma underground.


Nimbus Data Announces 50 and 100 TB 3.5" SSDs SoylentNews

Nimbus Data has announced 50 and 100 terabyte datacenter SSDs with five years of "unlimited endurance" at the maximum 500 MB/s write speed:

Nimbus Data on Monday introduced its new lineup of ultra-high capacity SSDs designed to compete against nearline HDDs in data centers. The ExaDrive DC drives use proprietary controllers and NAND flash in custom packaging to offer up to 100 TB of flash memory capacity in a standard 3.5-inch package. The SSDs use the SATA 6 Gbps interface and are rated for 'unlimited' endurance.

The Nimbus ExaDrive DC lineup will consist of two models featuring 50 TB and 100 TB capacities, a 3.5-inch form-factor, and a SATA 6 Gbps interface. Over time the manufacturer expects to release DC-series SSDs with an SAS interface, but it is unclear when exactly such drives will be available. When it comes to performance, the Nimbus DC SSDs are rated for up to 500 MB/s sequential read/write speeds as well as up to 100K read/write random IOPS, concurrent with most SATA-based SSDs in this space. As for power consumption, the ExaDrive DC100 consumes 10 W in idle mode and up to 14 W in operating mode.

[...] Speaking of endurance, it is worth noting that the 100 TB drive comes with an unlimited write endurance guarantee for the full five-year warranty period. This is not particularly surprising because it is impossible to write more than 43.2 TB of data per 24 hours at 500 MB/s, which equates to 43% of the 100TB drive. For those wondering, at that speed for five years comes to ~79 PB over the 5 year warranty of the drive (assuming constant writes at top speed for five years straight).

Original Submission

Read more of this story at SoylentNews.


Bipedal Robot Uses Jet-Powered Feet to Step Over Large Gaps IEEE Spectrum Recent Content full text

Ducted fans in its toes help this robot to balance while taking giant steps Photo: Guangdong University of Technology The ducted fans on Jet-HR1's feet allow the robot to stretch its legs out farther without falling and take bigger steps than it normally would be able to.

As you may have noticed, bipedal robots have a tendency to fall over. This often happens when the robots are trying to take a step, because stepping involves balancing on one foot while moving. All steps arent equal, of courseyouve got easy steps, when youre walking slowly across a flat surface, and youve got hard steps, when youre trying to avoid an obstacle by stepping over it or across it. Both robots and humans are constrained in the kinds of steps were able to take by (among other things) how far we can stick a leg out without falling over. Humans mitigate this to some extent by dynamic walking, also known as constantly falling forward, but for less dynamic (quasi-static) robots, step length puts a significant limitation on the kinds of obstacles they can deal with.

The fundamental problem here is that the longer the step you want to take, the more your center of gravity moves out toward the leg youre taking the step with. Try to take too big of a step, and youll fall forwards while extending your leg. Go on, try it!*

Solving this for a quasi-static robot (or human) can be done by changing the center of gravity somehow, either by reducing the weight of the leg youre sticking out, or increasing the weight of all of the rest of you. At Guangdong University of Technologys School of Automation in China roboticists are experimenting with using small ducted fans embedded in the feet of a bipedal robot. The idea is to change the robots center of gravity to help it balance as it takes giant steps over a wide gap that it normally wouldnt be able to cross.

The robot, called Jet-HR1, weighs 6.5 kilograms and has a height of 65 centimeters. On the end of each foot is a ducted fan jet engine, which weighs just 232 grams but can output up to 2 kg of thrust, nearly a third of the weight of the entire robot.

In one experiment, Jet-HR1 was tasked with stepping over a gaping chasm 37 cm wide, which required a step length of 80 percent of its leg. To make this work, the robot spooled up the ducted fan as it stuck its leg out, essentially holding the leg up and preventing the robot from tipping forwards. Once the robot has its jet foot planted on the far side of the gap, it...


Uber Robocar Kills Pedestrian, Despite Presence of Safety Driver IEEE Spectrum Recent Content full text

It's the first fatality involving a robocar under the care of a professional human minder Photo: Kristoffer Tripplaar/Sipa USA/AP Photo

Update: Video from the car now suggests that the woman darted out in front of the car too quickly for either the car or the safety driver to react.   The San Francisco Chronicle  interviewed Sylvia Moir, police chief in Tempe, Ariz., who said: I suspect preliminarily it appears that the Uber would likely not be at fault in this accident.

A self-driving Uber vehicle reportedly killed a pedestrian in Tempe, Ariz. last night, the first time such a thing has happened. The only other self-driving fatalityin May 2017involved the driver of a Tesla that crashed into a truck.

Uber has not confirmed that the vehicle, a modified Volvo XC90 SUV, was in self-driving mode. However, the Tempe Police Department said, in a statement, that it was in autonomous mode at the time of the collision, with a vehicle operator behind the wheel. 

The National Transportation Safety Board says its opening an investigation of the case.

Safety drivers are supposed to intervene when the car engages in inappropriate behavior. At night, one might suppose that the car, equipped as it was with lidar, would have been just as able to detect a pedestrian as if it were high noon. A human driver might have had a harder time of it.

Police identified the pedestrian as Elaine Herzberg, 49, and said she had been walking her bike across the street, outside the crosswalk. Its not clear whether that fact may have any bearing on Ubers legal liability. Television footage of the scene, shown in this report by Reuters , shows a twisted bike lying on a sidewalk near a visibly damaged SUV.

Uber said it was suspending its robocar tests in Tempe, Pittsburgh, San Francisco, and Toronto. It did the same thing back in May when one of its self-driving Volvos flipped over on its side in Tempe, then resumed testing soon after. No one was injured in that accident.

Arizona may come under scrutiny for the way it regulates the street-testing of self-driving v...


Data scientist who worked with Cambridge Analytica offers to testify to Congress The Hill: Technology Policy

The data scientist who provided data on millions of Americans to the data firm Cambridge Analytica offered Monday to testify before Congress, following reports about how that data was used to help elect President Trump in 2016."I've also...


Facebook faces new crisis over Cambridge Analytica data The Hill: Technology Policy

Lawmakers are demanding answers from Facebook following a report that data from 50 million users were compromised by a third party and collected by a research firm connected to the Trump campaign. Facebook CEO Mark Zuckerberg is now facing...


The biggest solar parks in the world are now being built in India Lifeboat News: The Blog

Long regarded as a laggard in the fight against climate change, India is building massive solar stations at a furious clip, helping to drive a global revolution in renewable energy and reduce its dependence on coal and other carbon-spewing fossil fuels blamed for warming the planet.


MRI for all men suspected of prostate cancer could save thousands of lives Lifeboat News: The Blog

G iving all men with suspected prostate cancer an immediate MRI scan would save thousands of lives a year, the results of a new study suggest.

A trial by British scientists found the comprehensive scan was 12 per cent more likely to detect dangerous tumours than the traditional biopsy, and that the number of men who undergo a biopsy needlessly could be reduced by 28 per cent.

Every year more than 120,000 men in the UK undergo a biopsy, which involves inserting an ultrasound probe into the affected area to take a sample of cells from the prostate that might contain cancer.


Numerai will give $1 million in crypto tokens to Kaggle users who sign up to its crowdsourced hedge fund Lifeboat News: The Blog

You may have heard of Numerai the unorthodox hedge fund that crowdsources predictive stock market models from data scientists around the world. It is now seeking more brain power and announced today that it is giving away $1 million worth of cryptocurrency to Kaggle users who sign up. The San Francisco-based hedge fund incentivizes its community members by giving them digital tokens they can stake during tournaments to express confidence in their predictions. The best trading algorithms are then selected based on how they perform on the live market, and their creators are rewarded with more tokens.

Looking at most Wall Street hedge funds models, its fair to say open, collaborative efforts arent at their core. Movies like Wall Street, which portrays a greedy Gordon Gekko, and The Wolf of Wall Street, which highlights the derailing decadence of power and money, paint a rather unflattering picture of egocentric traders and financiers. Numerai founder and CEO Richard Craib is looking to change that.

The 30-year-old South African wants to create a more open and decentralized ecosystem for hedge funds. Rather than restricting access to trading data, Craib encrypts it before sharing it with his global network of data scientists, which effectively prevents them stealing and replicating the trades on their own. They can, however, use the shared information to build predictive models for the hedge fund.


The first SpaceX BFR should make orbital launches by 2020 Lifeboat News: The Blog

Elon Musk has a reputation for pushing the envelop and making bold declarations. In 2002, he founded SpaceX with the intention of making spaceflight affordable through entirely reusable rockets. In April of 2014, his company achieved success with the first successful recovery of a Falcon 9 first stage. And in February of this year, his company successfully launched its Falcon Heavy and managed to recover two of the three boosters.

But above and beyond Musks commitment to reusability, there is also his longer-term plans to use his proposed Big Falcon Rocket (BFR) to explore and colonize Mars. The topic of when this rocket will be ready to conduct launches was the subject of a recent interview between Musk and famed director Jonathon Nolan, which took place at the 2018 South by Southwest Conference (SXSW) in Austin, Texas.

During the interview, Musk reiterated his earlier statements that test flights would begin in 2019 and an orbital launch of the full BFR and Big Falcon Spaceship (BFS) would take place by 2020. And while this might seem like a very optimistic prediction (something Musk is famous for), this timeline does not seem entirely implausible given his companys work on the necessary components and their success with reusability.


Mastercard will support cryptocurrencies, if theyre backed by governments Lifeboat News: The Blog

It seems Mastercard is gradually softening its stance on cryptocurrency, after CEO Ajay Banga downplayed non-government mandated digital currencies as junk back in October last year.

In a conversation with Financial Times, Ari Sarkar, Mastercard co-president for the Asia-Pacific region, said the company is open to explore cryptocurrencies created and backed by governments.

If governments look to create national digital currency wed be very happy to look at those in a more favourable way [compared with existing cryptocurrencies], Sarkar told Financial Times.


Building a Tricorder Prop Worthy of Mr Spock Hackaday

Weve all been there. You want to assemble a proper Star Trek: The Original Series landing party prop set, but the TOS tricorders you can find on the market are little more than overpriced toys. Imagine the embarrassment of beaming down to Cestus III with a plastic tricorder. The Metrons wouldnt have even bothered with the trial by combat with such a sorry showing.

Unhappy with the state of Star Trek props, [Dean O] decided to take matters into his own hands. He purchased a TOS tricorder from Diamond Select Toys and set out to modify it into something a bit closer to Starfleet standards. Anything painted metallic silver on the toy was replaced with a machined aluminum duplicate, adding some much needed heft. He even spruced up the controls and display.

To start, [Dean] stripped the tricorder down, separating all of the silver plastic parts and finding aluminum stock that was close enough to the desired dimensions. This ended up being .125 plate for the sides, and .500 bars for the horizontal dividers. To make the side panels he placed the original plastic parts over the aluminum, marked the mounting holes with a punch, and used the belt sander to shape them.

[Dean] then put in a more screen accurate Moire disc, and went as far as to get real watch crowns for the buttons (just like the prop used in the show). In a particularly b...




Cambridge Analytica CEO filmed talking about using bribes, sex workers in political work The Hill: Technology Policy

The CEO of the British data firm Cambridge Analytica was filmed saying that his firm used bribes and sex workers to trap politicians in compromising situations, an undercover investigation by Channel 4 News in London reported Monday.Channel 4...


Email service: White House staffer was a 'password idiot' The Hill: Technology Policy

Encrypted email service ProtonMail is mocking a White House staffer who reportedly left his account login information at a bus stop in Washington, D.C., calling him "a password idiot." Ryan McAvoy left his ProtonMail...


Cambridge Analytica 'strongly denies' mishandling Facebook users' information The Hill: Technology Policy

Cambridge Analytica, the data firm used by the Trump campaign, pushed back Monday against reports that it obtained the private information of millions of Facebook users without their permission and failed to destroy it.The company said in a...


Radeon GPUs Are Increasingly Competing With NVIDIA GPUs On Latest RadeonSI/RADV Drivers Phoronix

As it's been a few weeks since last delivering a modest Linux GPU comparison and given the continuously evolving state of the Linux kernel Git tree as well as the Mesa project that houses the RadeonSI OpenGL and RADV Vulkan drivers, here are our latest benchmarks showing the current state of the AMD Radeon open-source Linux graphics driver performance relative to NVIDIA's long-standing and high-performance but proprietary driver using several different graphics cards.


Pedestrian Bridge in Miami Collapses Days After its Construction Began SoylentNews

An "instant" pedestrian bridge at Florida International University in Miami collapsed on March 15, killing a number of motorists. A 174-foot, 950-ton span of the bridge was installed on Saturday, March 10 over a busy portion of Tamiami Trail called Southwest Eighth Street. The incomplete bridge suddenly collapsed on Thursday:

The bridge gave way suddenly while the traffic light for motorists on Tamiami Trail was red, so that the concrete span fell on top of a row of stopped vehicles. A woman stopped at the light who was heading westbound said the structure fell without warning. The woman, who asked that her name not be used, said it was immediately clear to her that several people were dead.

[...] The bridge crashed across six lanes of heavily traveled Tamiami Trail, crushing a still undetermined number of cars and killing a still unclear number of people. Police on the scene said at least six people could be dead.

From an earlier article:

The rapid span installation was the result of months of preparation. The bridge's main 174-foot span was assembled by the side of the Trail while support towers were built at either end. The 950-ton span was then picked up, moved and lowered into place by special gantry cranes at the intersection of Southwest 109th Avenue in an operation that lasted several hours Saturday morning.

[...] The innovative installation method significantly reduced risks to workers, pedestrians and motorists and minimized traffic disruptions, FIU said. The architecturally distinctive, cable-supported bridge is the product of a collaboration between MCM Construction and FIGG Bridge Design, the firm responsible for the iconic Sunshine Skyway Bridge over Tampa Bay.


Read more of this story at SoylentNews.


Water Level Sensors, Alexa in a Fish, and Modular Synths During World Create Day Hackaday

On Saturday we saw a flood of interesting hacks come to life as more than 100 community organized meetups were held for World Create Day. Thank you to all of the organizers who made these events possible, and for everyone who decided to get together and hack.

Students Learning Hardware Design in Islamabad, Pakistan

The students at LearnOBots took on a slew of great projects during World Create Day like a smart medicine dispenser, electronics that control mains appliances, parking sensors, and a waste bin that encourages you to feed it. The group did a wonderful job of showing off their event by publishing several updates with pictures, stories, and video presentations from all the students. Nice work!



Former Student Sues University for Cost of Her Education SoylentNews

The World Socialist Web Site reports

[...] a former student of Anglia Ruskin University [...] is suing the UK institution for breach of contract and fraudulent misrepresentation.

[...] Graduate Pok Wong is claiming 60,000 compensation--her estimated cost of her university education--on the basis that her degree did not offer the "quality education and prospect of employment after graduation" claimed by the university.

This suit demonstrates the corrosive consequences of students being encouraged to view themselves as consumers entering into contracts with universities for economic advantage. The collective endeavour of learning is replaced by a purely financial and adversarial relationship between two parties, in which each is incentivised to push the other for maximum "cost efficiency".

In comments to the Sunday Telegraph, Wong explained her hopes that the case would "set a precedent so that students can get value for money, and if they don't they get compensated".

Her comments accept the principles of marketised education and attempt to leverage them for individual students' self-interest.

[...] Wong refers in her legal papers to Anglia Ruskin's claim to carry out "world-leading research". In fact, the university is ranked in the 301st-350th bracket for quality of research by Times Higher Education. A number of other institutions have promoted themselves with similar lies or distortions.

Last November, the Advertising Standards Authority watchdog ordered seven universities to change false claims about their status made in advertisements to students. The University of Strathclyde, for example, was told to change its claim, "We're ranked No. 1 in the UK" for physics. Teesside University had to stop calling itself the "Top university in England for long-term graduate prospects".

[...] in 2013, [...] replies to freedom of information requests at 70 universities found that [...] Anglia Ruskin was listed as one of a number of institutions, particularly newer ones, whose spending [on marketing themselves] skyrocketed in these years. It spent 1.76 million in 2012-13, about 1 million more than in 2010-11.

Original Submission

Read more of this story at SoylentNews.


Trump bans trade in Venezuelan government cryptocurrency The Hill: Technology Policy

President Trump on Monday imposed new sanctions against the Venezuelan government, banning U.S. citizens from dealing in the South American country's newly minted cryptocurrency.An executive order bans "all transactions related to,...


[$] Super long-term kernel support

Some years ago, prominent community leaders doubted that even short-term stable maintenance of kernel releases was feasible. More recently, selecting an occasional kernel for a two-year maintenance cycle has become routine, and some kernels, such as 3.2 under the care of Ben Hutchings, have received constant maintenance for as much as six years. But even that sort of extended maintenance is not enough for some use cases, as Yoshitake Kobayashi explained in his Embedded Linux Conference talk. To meet those needs, the Civil Infrastructure Platform (CIP) project is setting out to maintain releases for a minimum of 20 years.


Links 19/3/2018: Linux 4.16 RC6, Atom 1.25, antiX 17.1, GNU Mcron 1.1 Techrights

GNOME bluefish




Three Hacking Groups You Definitely Need to Know About Hacker News Bulletin | Find the Latest Hackers News

Hacker groups began to flourish in the early 1980s with the emergence of computer. Hackers are like predators that can access your private data at any time by exploiting the vulnerabilities of your computer. Hackers usually cover up their tracks by leaving false clues or by leaving absolutely no evidence behind. In the light of

The post Three Hacking Groups You Definitely Need to Know About appeared first on Hacker News Bulletin | Find the Latest Hackers News.

Why the Cyber Criminals at Synack need $25 Million to Track Down Main Safety Faults Hacker News Bulletin | Find the Latest Hackers News

The enormous number of hacks in 2014 have propelled information safety into the front of the news and the brains of many companies. Cyber attacks on big enterprises like Target, Sony, and Home Depot lately caused President Obama to call for partnership amongst the two sectors (private and public) in order to share the information

The post Why the Cyber Criminals at Synack need $25 Million to Track Down Main Safety Faults appeared first on Hacker News Bulletin | Find the Latest Hackers News.

Mysql create user Hacker News Bulletin | Find the Latest Hackers News

Creating a mysql user is a very common task and a very important one. Many developers after creating a user grant them all permissions over a mysql schema and this can be a big security flaw. When you are creating a user you must think of all permissions that user will need and grant them the

The post Mysql create user appeared first on Hacker News Bulletin | Find the Latest Hackers News.


Researcher makes $225,000, legally, by cyber attacking browsers Hacker News Bulletin | Find the Latest Hackers News

A single researcher who is actually a cyber criminal made $225,000 this week  that too all by legal means! This cyber research hacker cyber criminally attacked browsers this past week. For the past two days, safety researchers have tumbled down on Vancouver for a Google sponsored competition called Pwn 2 Own,

The post Researcher makes $225,000, legally, by cyber attacking browsers appeared first on Hacker News Bulletin | Find the Latest Hackers News.

The Health insurance Company Premera Blue Cross of the United States of America was cyber criminally attacks and 11 million records were accessed Hacker News Bulletin | Find the Latest Hackers News

Pemera Blue Cross, a United States of America based health insurance corporation, has confided in that its systems were infringed upon and their security and associability was breached when  cyber criminals hacked the company and made their way in 11 million of their customers records. It is the second cyber attack in a row

The post The Health insurance Company Premera Blue Cross of the United States of America was cyber criminally attacks and 11 million records were accessed appeared first on Hacker News Bulletin | Find the Latest Hackers News.

Vanished in 60 seconds! Chinese cyber criminals shut down Adobe Flash, Internet Explorer Hacker News Bulletin | Find the Latest Hackers News

Associates of two Chinese cyber crime teams have hollowed out the best prizes at a main yearly hacking competition held in Vancouver, Canada. Cyber attackers at Pwn2Own, commenced in 2007, were triumphant in violating the security of broadly -used software including Adobe Flash, Mozillas Firefox browser, Adobe PDF Reader and Microsofts freshly discontinued Internet

The post Vanished in 60 seconds! Chinese cyber criminals shut down Adobe Flash, Internet Explorer appeared first on Hacker News Bulletin | Find the Latest Hackers News.

Anonymous wants to further its engagement in the exploration of space Unite as Species Hacker News Bulletin | Find the Latest Hackers News

The hack tivist cyber criminal group Anonymous, more often than not related with cyber campaigns in opposition to fraudulent government administrations and terrorist organizations, has now set its sights on space. They posted a video on the groups most important You Tube channel on the 18th of March, and called on to everyone through

The post Anonymous wants to further its engagement in the exploration of space Unite as Species appeared first on Hacker News Bulletin | Find the Latest Hackers News.

Political analysts caution air plane connections systems that are susceptible to cyber attacks Hacker News Bulletin | Find the Latest Hackers News

Marketable and even martial planes have an Achilles heel that could abscond them as susceptible to cyber criminals on the ground, who specialists say could possibly seize cockpits and generate disorder in the skies. At the present, radical groups are thought to be short of the complexity to bring down a plane vaguely, but it

The post Political analysts caution air plane connections systems that are susceptible to cyber attacks appeared first on Hacker News Bulletin | Find the Latest Hackers News.

Microsoft Remote Desktop Connection Manager Hacker News Bulletin | Find the Latest Hackers News

Imagine having the access and control to your computer to any place in the world from your iPhone. That would be really futuristic, no? Actually, this is not because there are applications available that can let you tap into your computer from on your mobile. These remote control applications do more than simply allow you

The post Microsoft Remote Desktop Connection Manager appeared first on Hacker News Bulletin | Find the Latest Hackers News.

Want to have a VPN Server on Your Computer (Windows) Without setting up Any Software? Hacker News Bulletin | Find the Latest Hackers News

Windows has the added facility to work as a VPN server, even though this choice is undisclosed. This can work on both versions of Windows Windows 8 and Windows 7. To enable this, the server makes use of the point-to-point tunneling protocol (PPTP.) This could be valuable for linking to your home system on

The post Want to have a VPN Server on Your Computer (Windows) Without setting up Any Software? appeared first on Hacker News Bulletin | Find the Latest Hackers News.


Woman dies after being hit by self-driving Uber The Hill: Technology Policy

A woman has died after being hit by a self-driving Uber car in Tempe, Ariz.The woman was reportedly struck by the car while walking through a crosswalk, according to local ABC affiliate KNXV. She was taken to the hospital but died from her injuries...


CUDA is Like Owning a Supercomputer Hackaday

The word supercomputer gets thrown around quite a bit. The original Cray-1, for example, operated at about 150 MIPS and had about eight megabytes of memory. A modern Intel i7 CPU can hit almost 250,000 MIPS and is unlikely to have less than eight gigabytes of memory, and probably has quite a bit more. Sure, MIPS isnt a great performance number, but clearly, a top-end PC is way more powerful than the old Cray. The problem is, its never enough.

Todays computers have to processes huge numbers of pixels, video data, audio data, neural networks, and long key encryption. Because of this, video cards have become what in the old days would have been called vector processors. That is, they are optimized to do operations on multiple data items in parallel. There are a few standards for using the video card processing for computation and today Im going to show you how simple it is to use CUDA the NVIDIA proprietary library for this task. You can also use OpenCL which works with many different kinds of hardware, but Ill show you that it is a bit more verbose.

Dessert First

One of the things thats great about being an adult is you are allowed to eat dessert first if you want to. In that spirit, Im going to show you two bits of code that will demonstrate just how simple using CUDA can be. First, heres a piece of code known as a kernel that will run on the GPU.

void scale(unsigned int n,...


Linux Foundation Announces OpenBMC Project To Create Open-Source BMC Firmware Phoronix

Last week Intel announced their open-source sound firmware project while the latest project in the open-source realm comes via the Linux Foundation with the launch of OpenBMC...


How The Pirate Bay Helped Spotify Become a Success TorrentFreak

When Spotify launched its first beta in the fall of 2008, many people were blown away by its ease of use.

With the option to stream millions of tracks supported by an occasional ad, or free of ads for a small subscription fee, Spotify offered something that was more convenient than piracy.

In the years that followed, Spotify rolled out its music service in more than 60 countries, amassing over 160 million users. While the service is often billed as a piracy killer, ironically, it also owes its success to piracy.

As a teenager, Spotify founder and CEO Daniel Ek was fascinated by Napster, which triggered a piracy revolution in the late nineties. Napster made all the music in the world accessible in a few clicks, something Spotify also set out to do a few years later, legally.

I want to replicate my first experience with piracy, Ek told Businessweek years ago. What eventually killed it was that it didnt work for the people participating with the content. The challenge here is about solving both of those things.

While the technical capabilities were certainly there, the main stumbling block was getting the required licenses. The music industry hadnt had a lot of good experiences with the Internet a decade ago so there was plenty of hesitation.

The same was true of Sweden, where The Pirate Bay had just gained a lot of traction. There was a pro-sharing culture being cultivated by Piratbyrn, Swedish for the Piracy Bureau, which was the driving force behind the torrent site in the early days.

After the first Pirate Bay raid in 2006, thousands of people gathered in the streets of Stockholm to declare their support for the site and their right to share.

Pro-piracy protest in Stockholm (Jon slund, CC BY 2.5)

Interestingly, however, this pro-piracy climate turned out to be in Spotifys favor. In a detailed feature in the Swedish newspaper Breakit Per Sundin, CEO of Sony BMG at the time, suggests that The Pirate Bay helped Spotify.

If Pirate Bay had not exist...


Chrissie Lightfoot, CEO of Robot Lawyer LISA, joins our Robotics/AI Board. Lifeboat News

Chrissie Lightfoot, CEO of Robot Lawyer LISA, joins our Robotics/AI Board. Chrissie Lightfoot, CEO of Robot Lawyer LISA, joins our Robotics/AI Board.


How to Keep Your Customers Safe Online 2018 HackRead

By Waqas

Internet safety is a key concern both professionally and personally

This is a post from Read the original post: How to Keep Your Customers Safe Online 2018


Injectable Body Sensors Take Personal Chemistry to a Cell Phone Closer to Reality Lifeboat News: The Blog

Editors Note: The American Chemical Society is also issuing a press release today embargoed for 5am Eastern Time that can be requested at or call 504670-6721.

NEW ORLEANS, March 19, 2018 Up until now, local inflammation and scar tissue from the so-called foreign body response has prevented the development of in-body sensors capable of continuous, long-term monitoring of body chemistry. But today scientists are presenting results showing tiny biosensors that become one with the body have overcome this barrier, and stream data to a mobile phone and to the cloud for personal and medical use.

While fitness trackers and other wearables provide insights into our heart rate, respiration and other physical measures, they dont provide information on the most important aspect of our health: our bodys chemistry, explained Natalie Wisniewski, Ph.D. Based on our ongoing studies, tissue-integrated sensor technology has the potential to enable wearables to live up to the promise of personalized medicine, revolutionizing the management of health in wellness and disease. Dr. Wisniewski, who leads the team of biosensor developers, is the chief technology officer and co-founder of Profusa Inc., a San Francisco Bay Area-based life science company.


19mar2018 Trivium


A Startup is Pitching a Mind-Uploading Service That is 100 Percent Fatal SoylentNews

Submitted via IRC for AndyTheAbsurd

The startup accelerator Y Combinator is known for supporting audacious companies in its popular three-month boot camp.

There's never been anything quite like Nectome, though.

Next week, at YC's "demo days," Nectome's cofounder, Robert McIntyre, is going to describe his technology for exquisitely preserving brains in microscopic detail using a high-tech embalming process. Then the MIT graduate will make his business pitch. As it says on his website: "What if we told you we could back up your mind?"

So yeah. Nectome is a preserve-your-brain-and-upload-it company. Its chemical solution can keep a body intact for hundreds of years, maybe thousands, as a statue of frozen glass. The idea is that someday in the future scientists will scan your bricked brain and turn it into a computer simulation. That way, someone a lot like you, though not exactly you, will smell the flowers again in a data server somewhere.

This story has a grisly twist, though. For Nectome's procedure to work, it's essential that the brain be fresh. The company says its plan is to connect people with terminal illnesses to a heart-lung machine in order to pump its mix of scientific embalming chemicals into the big carotid arteries in their necks while they are still alive (though under general anesthesia).

The company has consulted with lawyers familiar with California's two-year-old End of Life Option Act, which permits doctor-assisted suicide for terminal patients, and believes its service will be legal. The product is "100 percent fatal," says McIntyre. "That is why we are uniquely situated among the Y Combinator companies."


Original Submission

Read more of this story at SoylentNews.


Mobile World Congress 2018: The Tangled Fate of Graphene and 5G IEEE Spectrum Recent Content full text

These two technologies have long been hyped, and proponents of each are finally starting to work together Photo: Dexter Johnson Flexible circuits made of graphene, such as this one created by AMO GmbH in Germany, could be inserted into smartphones and other electronics.

5G report logo, link to report landing page

Graphene has been heralded as a wonder material for well over a decade now, and 5G has been marketed as the next big thing for at least the past five years. Analysts have suggested that 5G could be the golden ticket to virtual reality and artificial intelligence, and promised that graphene could improve technologies within electronics and optoelectronics.

But proponents of both graphene and 5G have also been accused of stirring up hype. There now seems to be a rising sense within industry circles that these glowing technological prospects will not come anytime soon.

At Mobile World Congress (MWC) in Barcelona last month, some misgivings for these long promised technologies may have been put to rest, though, thanks in large part to each other. For the third year in a row, MWC hosted The Graphene Pavilion organized by The Graphene Flagship, the EUs 1 billion, 10-year plan to make Europe the Silicon Valley of graphene.

In a meeting at MWC with Jari Kinaret, a professor at Chalmers University in Sweden and director of the Graphene Flagship, I took a guided tour around the Pavilion to see some of the technologies poised to have an impact on the development of 5G.

We know that there are some challenges that we need to solve, but they are mostly in the manufacturing domain Jari Kinaret, Chalmers University

Being invited back to the MWC for three years is a p...


Linux Foundation LFCS: Ahmed Alkabary

Linux Foundation LFCS: Ahmed Alkabary


Senators call for tech CEOs to appear before Judiciary Committee The Hill: Technology Policy

Sens. Amy Klobuchar (D-Minn.) and John Kennedy (R-La.) on Monday called for a Senate Judiciary Committee hearing to question major technology companies in the wake of a report that a data firm harvested information from millions of Facebook users....


Ubuntu 18.10 Looking At LZ4-Compressed Initramfs Image By Default Phoronix

With Ubuntu 18.10 being the release after an LTS cycle, it's shaping up to be another big feature period. They have already been discussing Zstd-compressed Debian packages for Ubuntu 18.10 while the latest proposal for this next cycle is on switching from Gzip to LZ4 for the default kernel initramfs image...


Prilex ATM Malware Modified to Clone Chip-and-Pin Payment Cards HackRead

By Uzair Amir

It is just another day with just another ATM malware

This is a post from Read the original post: Prilex ATM Malware Modified to Clone Chip-and-Pin Payment Cards


Whistleblower: Cambridge Analytica met with Lewandowski before Trump campaign launch The Hill: Technology Policy

A former Cambridge Analytica employee said Monday that the data firm met with former Trump campaign manager Corey Lewandowski in 2015, before President Trump declared his candidacy.Christopher Wylie, a self-described whistleblower on the companys...


MPLS Explained

Multi-protocol label switching is a way to insure reliable connections for real-time applications, but it's expensive, leading enterprises to consider SD-WAN as a way to limit its use.

The thing about MPLS is that its a technique, not a service so it can deliver anything from IP VPNs to metro Ethernet. It's expensive, so with the advent of SD-WAN enterprises are trying to figure how to optimize its use vs. less expensive connections like the internet.

Monday, 19 March


Linux Mint 19 'Tara' Cinnamon Will Be Faster

Is Linux Mint slow? Hell, no! The operating system is plenty fast. Speed is in the eye of the beholder, however, and the Mint developers apparently thought app-launching seemed slow when using the Cinnamon desktop environment. They didn't have any proof, but they felt that both Mate and Xfce were faster in this regard.


Coalition presses Transportation Dept. for stricter oversight of driverless cars The Hill: Technology Policy

A coalition of organizations across the country is calling on Transportation Secretary Elaine Chao to take part in stricter oversight of driverless cars.In a letter signed by more than 25 organizations, the groups leaders call the Transportation...


Week ahead in tech: AT&T, DOJ merger fight heads to trial The Hill: Technology Policy

The Justice Department and AT&T are heading to court on Monday in the fight over the telecommunication giant's $85 billion bid to merge with Time Warner.It's already shaping up to be the biggest antitrust court battle in decades.The trial...

IndyWatch Science and Technology News Feed Archiver

Go Back:30 Days | 7 Days | 2 Days | 1 Day

IndyWatch Science and Technology News Feed Today.

Go Forward:1 Day | 2 Days | 7 Days | 30 Days

IndyWatch Science and Technology News Feed was generated at World News IndyWatch.

Resource generated at IndyWatch using aliasfeed and rawdog